2023
DOI: 10.32604/csse.2022.021924
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Unequal Fault Tolerance Clustering Approach

Abstract: For achieving Energy-Efficiency in wireless sensor networks (WSNs), different schemes have been proposed which focuses only on reducing the energy consumption. A shortest path determines for the Base Station (BS), but fault tolerance and energy balancing gives equal importance for improving the network lifetime. For saving energy in WSNs, clustering is considered as one of the effective methods for Wireless Sensor Networks. Because of the excessive overload, more energy consumed by cluster heads (CHs) in a clu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Overall, this proved effective in simulating controlled structures and enabling autonomous monitoring. The authors of [51,52] investigated the monitoring of the vital signs of patients by using blockchain-based smart contracts. This system was designed using hyper ledger fabric and provided various benefits to individuals, irrespective of their location.…”
Section: H-iot In Blockchainmentioning
confidence: 99%
“…Overall, this proved effective in simulating controlled structures and enabling autonomous monitoring. The authors of [51,52] investigated the monitoring of the vital signs of patients by using blockchain-based smart contracts. This system was designed using hyper ledger fabric and provided various benefits to individuals, irrespective of their location.…”
Section: H-iot In Blockchainmentioning
confidence: 99%
“…The training and classification of blockchain comprise three security categories, namely Smart T, Mod T, and Avoid T for smart homes, which can be achieved through a neural network. The neural network is trained using a dataset of examples, and each example is labeled as either Smart T, Mod T, or Avoid T. The neural network learns to recognize patterns in the data that are associated with each of the three categories and then uses this knowledge to classify new examples [30,31]. The process of training a neural network involves adjusting the weights of its connections between neurons in order to minimize the loss function.…”
Section: The Data Selection For Rankingmentioning
confidence: 99%
“…Therefore, data privacy and protection are important considerations in IoT healthcare systems with respect to data transmission [20]. Few researchers have proposed secure platforms or resources for healthcare systems based on IoT data transmission [21,22]. Therefore, in this study, we analyze a healthcare system in terms of computational duration, accuracy and development issues with the aim of arriving at a superior solution.…”
Section: Introductionmentioning
confidence: 99%