2019
DOI: 10.1007/s12652-019-01382-3
|View full text |Cite
|
Sign up to set email alerts
|

Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 134 publications
(81 citation statements)
references
References 16 publications
0
81
0
Order By: Relevance
“…WSN discovery applications are mainly used to collect information from remote locations, such as environmental monitoring, military, and transportation security [6]. In order to use the lifetime of effector nodes to improve energy efficiency, they proposed an energy-saving routing protocol, low-energy adaptive clustering hierarchy (LEACH), and optimization algorithm genetic algorithm (GA) [7]. Due to the diversification of the application environment of unconnected effector Internet and different design requirements and goals of each environment, the routing algorithms used in each Internet are also considered to be changed, and as the application environment changes and improves, routing algorithm also becomes diversified [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…WSN discovery applications are mainly used to collect information from remote locations, such as environmental monitoring, military, and transportation security [6]. In order to use the lifetime of effector nodes to improve energy efficiency, they proposed an energy-saving routing protocol, low-energy adaptive clustering hierarchy (LEACH), and optimization algorithm genetic algorithm (GA) [7]. Due to the diversification of the application environment of unconnected effector Internet and different design requirements and goals of each environment, the routing algorithms used in each Internet are also considered to be changed, and as the application environment changes and improves, routing algorithm also becomes diversified [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Mao et al [32], Du et al [33], and Zhang et al [34] have applied a reinforcement learning approach for mitigating stragglers, which reduce job completion time, but the preciseness of identification of stragglers may not be optimum. Existing approaches used in decentralizing data consists of Alternating Direction Method of Multipliers (ADMM) based algorithms like [35][36][37][38][39].…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Nevertheless, some group of researchers from the literature tried to achieve the implementation of the first and second parameters on a multiheterogeneous network area to improve the lifetime of the network further. Similarly, to get the desired result for energy efficiency, some constraints of WSNs strategies were adopted for minimizing the data among the communicating parameters [23][24][25][26][27].…”
Section: Mobile Information Systemsmentioning
confidence: 99%