2017
DOI: 10.17485/ijst/2017/v10i20/110311
|View full text |Cite
|
Sign up to set email alerts
|

Performance Enhancement of LEACH for Secured Data Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The approach specified in (8) uses fuzzy to select the cluster head providing intermediate solution rather than the optimal solution as it requires entire network information, hence this approach does not suit in the environment where the nodes are deployed randomly. The cluster heads in WSN are selected using metaheuristic approach, as these approaches support next generation algorithms in selecting a better set of population providing a better offspring by making use of fitness functions (20) .…”
Section: Introductionmentioning
confidence: 99%
“…The approach specified in (8) uses fuzzy to select the cluster head providing intermediate solution rather than the optimal solution as it requires entire network information, hence this approach does not suit in the environment where the nodes are deployed randomly. The cluster heads in WSN are selected using metaheuristic approach, as these approaches support next generation algorithms in selecting a better set of population providing a better offspring by making use of fitness functions (20) .…”
Section: Introductionmentioning
confidence: 99%