Submit Search
Upload
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM
•
0 likes
•
16 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i1/IRJET-V9I1283.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET Journal
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET Journal
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET Journal
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
IJARIIE JOURNAL
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET Journal
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
IRJET Journal
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET Journal
Recommended
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET Journal
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET Journal
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET Journal
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
IJARIIE JOURNAL
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET Journal
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
IRJET Journal
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET Journal
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET Journal
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET Journal
Dead node detection in teen protocol
Dead node detection in teen protocol
eSAT Journals
Dead node detection in teen protocol survey
Dead node detection in teen protocol survey
eSAT Publishing House
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET Journal
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET Journal
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
IRJET Journal
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
IRJET Journal
Power balancing optimal selective forwarding
Power balancing optimal selective forwarding
eSAT Publishing House
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
IRJET Journal
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET Journal
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET Journal
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...
IRJET Journal
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
IRJET Journal
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET Journal
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET Journal
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET Journal
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET Journal
Dead node detection in teen protocol
Dead node detection in teen protocol
eSAT Journals
Dead node detection in teen protocol survey
Dead node detection in teen protocol survey
eSAT Publishing House
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET Journal
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET Journal
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
IRJET Journal
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
IRJET Journal
Power balancing optimal selective forwarding
Power balancing optimal selective forwarding
eSAT Publishing House
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
IRJET Journal
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET Journal
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET Journal
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...
IRJET Journal
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
IRJET Journal
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET Journal
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET Journal
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET Journal
Similar to OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM
(20)
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
Dead node detection in teen protocol
Dead node detection in teen protocol
Dead node detection in teen protocol survey
Dead node detection in teen protocol survey
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
Power balancing optimal selective forwarding
Power balancing optimal selective forwarding
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
result management system report for college project
result management system report for college project
Tonystark477637
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Recently uploaded
(20)
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
result management system report for college project
result management system report for college project
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM
1.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1577 OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM Ritu Rani 1 , Anita Kumari 2 1 Student, Department of Electronics and Communication, Rayat Bahra University, Mohali, India 2 Professor, of Electronics and Communication, Rayat Bahra University, Mohali, India -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract— Clustering is one of the prominent methods that are opted for routing in wireless networks. Clustering is such a vast field itself that lots of research works is in conduct in order to solve the various clustering issues. One of the issues is that, the trust model was used for electing the cluster heads to represent the particular cluster in the network. By using trust model, the node with the highest trust value was elected as cluster head. In this study a proposal is presented which comprises of trust model for evaluating trust values of the nodes and GA and State Transition for optimizing the cluster heads. The proficiency of the proposed work is evaluated by comparing the proposed work on the basis of variations in number of total nodes in the network. Keywords—Wireless Sensor Network, routing, Clustering. Trust Model, GA, State Transition, Optimization. I. INTRODUCTION Wireless Sensor Networks are the networks which consist of multiple small sensors which initialize and complete the communication from source to destination node by creating a dedicated route to transmit the message. Routing is a term that is used to describe the process of route creation by inter-connecting the nodes in a wireless network. But for completing the transmission of data the nodes consumes the energy. If the energy consumed by the nodes is at high level then in this way the allotted energy to the nodes will be exhausted earlier which affects the reliability and proficiency of the network. Therefore it is mandatory that the network should be energy efficient so that it consumes only feasible amount of energy or each and every processing in the network. For this purpose various concepts had been developed such as clustering, energy efficient protocols etc. Clustering is the well-organized method [5] to exploit the energy in a competent manner. Grouping of sensors that performing alike tasks are recognized as clusters. In hierarchical cluster, it encloses Cluster Head, sensor nodes and Base Station. Successive to the cluster head is chosen, it gathers the data from all of its related nodes and growing it in order to eliminate the redundancy. Thus, it limits the quantity of data transmitted to the Base Station, therefore the residual energy level is augmented and network lifetime is exploited. There are various key attributes [6] which must be cautiously deliberate, while creating the clusters in WSN: Issues to be considered in Clustering To generate a structure surrounded through sensor nodes in WSN, it has the capability to deploy them in an ad hoc manner, because it is not possible to systematize these nodes into groups pre-deployment. Intended for this reason, there has been a huge amount of research in conduct of generating these organizational structures or clusters. The clustering occurrence, plays significant role in not just association of the network, but can noticeably influence network performance. There are various key confines in WSNs, that clustering methods must be considered. 1) Limited Energy Dissimilar energetic designs, wireless sensor nodes are off-grid, connotation that they have inadequate vigor storage and the well-organized use of this energy will be imperative in identifying the range of appropriate applications for these networks. The derisory energy in sensor nodes must be considered for proper clustering can decrease the all over energy custom in a network. 2) Network Lifetime: The vigor restraint on nodes results in an insufficient network lifetime for nodes in a network. Appropriate clustering should attempt to decrease the power usage, and hereby augments network lifetime. 3) Limited Abilities: The diminutive physical measurement and minute quantity of stored energy in a sensor node limit various capabilities of nodes in the terms of the indulgence and communication capabilities. A perfect clustering algorithm should make use of communal resources contained through an organizational structure, as taking into account the restraint on individual node capabilities. 4) Application Dependency: Recurrently a given application will really rely on cluster organization. When manipulative a clustering algorithm, application forcefulness must be measured because a high-quality clustering algorithm should be able to acclimatize to a diversity of application requirements.
2.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1578 The parameters that are used in proposed work for cluster head selection are as below; 1. Trust Model 2. Reputation Value 1. TRUST MODEL In a wireless sensor network, trust identifies the dependability or trustworthiness of sensor nodes. Trust [3] might be secret in dissimilar methods based upon, however they are used. A trust may be slanted or object based upon the task. Depending on possessions, trust might be communal trust or QOS trust. Communal trust considers intimacy, sincerity, solitude, centrality, connectivity. QOS trust considers vigor, selflessness, ability, cooperativeness, dependability, task achievement capability, etc. Generally, a trust may be secret as behavioral or computational trust based upon where it is used. Behavioral trust describes trust relations that are surrounded through people and organizations. Computational trust defines the trust relation through devices, computers, and networks. The given table (Table 1) shows the advantages and disadvantages of trust models. But it is concluded that the advantages outnumbers the disadvantages which makes it more useful and preferable to use for clustering. Table I Pros and Cons of Trust Model S.No Structure Pros Cons 1. Centralized Least computational overhead, less memory usage Most Communication overhead, least reliable, lack of scalability 2. Distributed Most reliable and scalable Most computational overhead 3. Hybrid Less communicatio n overhead than centralized and less memory Large computational overhead than centralized, large memory requirement than centralized , less reliable and scalable compared to distributed The evaluation of trust values can be defined in two types i.e. evaluation of direct trust value and evaluation of indirect trust value. These calculations are defined as below. Calculation of direct trust value Choose any two adjoining nodes Ni and Nj (i, j=1, 2......n, where n is the numeral of nodes in the network), S i->j (where i is the ID of surveillance nodes, and j is the ID of objective nodes) is the number of winning interactions among Ni and Nj. Ci->j( where i is the ID of observation nodes, j is the ID of goal nodes) is the total number of victorious interactions among Ni and Nj. The computation formula of the direct trust value T_direct (i->j) nodes Ni and Nj is as below: ( ) ( ) ( ) Wolddirect and Wnewdirect are the heaviness value of the older direction, trust value (Tolddirecr) and the load value of the novel direct trust value (Tnewdirect) correspondingly. The values of Wolddirect and Wnewdirect are resolute based upon the exact deployment situation. The subsequent is the analysis of the consequence of Wolddirect and Wnewdirect on direct trust value computation: =Wolddirect/Wnewdirect Calculation of indirect trust value In the algorithm, the indirect trust value can be attained from the ordinary neighbors of the e spectator and the experiential, the indirect trust value (Trecommnd (i->j)) of node i in node j can be computed based upon the billowing method: ( ) ⁄ ∑ ( ) ( ) Wherever, m is the numeral of ordinary adjoining nodes of nodes i and j. 2. REPUTATION VALUE It is one of the parameter that is used to evaluate for cluster head selection. It is a parameter which is used to measure the reputation value of each and every node on the basis of routing information of the node. It is evaluated by using the following equation: ( ) For more justification let’s consider an example, suppose total number of delivered packets are 100 and out which 80 are routed successfully and 20 are dropped then as per equation (8) the reputation value is ( )
3.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1579 The node with routed packet will give a positive acknowledgement and the node with dropped packet will give a negative acknowledgement II. PROBLEM FORMULATION As in earlier Wireless Sensor Network protocols are used to improve the energy efficiency and to enhance the lifetime of the network. In this process first of all the whole network is divided into small clusters. The number of these clusters can vary from network to network. And then from these clusters, cluster heads are selected then cluster heads collect the sensed data form clusters and then forward this collected data to the base station and sink node. The only problem in traditional work was the criteria opted for selection of cluster heads. Earlier only trust value was considered for selecting the cluster heads. The node having maximum trust value was selected as a cluster head. Additionally none of the algorithm had been applied to the network for the purpose of optimization. This increases the efficiency of the network but only up to certain limited point. This process leads to the reduction in security of the network as a single node can become cluster head again and again. Therefore the main problem was less number of parameters was considered for cluster head selection. Hence there is a need to develop such a method which can remove the backlogs of the traditional work. III. PROPOSED WORK In the proposed technique the security of the system is enhanced by changing the criterion for CH selection. In the earlier techniques only the trust value of nodes was considered for CH selection but in this proposed technique reputation value is also considered along with the trust value of nodes. In proposed work, an optimization is also applied to the network after selecting the CH. For optimization purpose State Transition algorithm is applied. Hence this approach increases the effectiveness and recital of the network. In proposed work first of all network parameters are initialized. Then trust value of nodes on the basis of defined parameters is calculated. After trust value a reputation value is generated. Then on the basis of trust value and reputation value the process of CH selection has been initialized. After this the State Transition algorithm is applied for CH optimization. And at last the generated results of performance parameters prove the efficiency of the proposed work. IV. METHODOLOGY The methodology and block diagram of proposed work is as follows: 1. First step is to initialization and creation of the network parameters. 2. After network initialization process of nodes deployment in the given area of the network. 3. Then trust value of the deployed nodes will be calculated. 4. After evaluation of trust value, a reputation value corresponding to the nodes will be generated. 5. Then the criterion for CH selection is considered by combining the trust value and reputation value of the nodes. 6. Then the GA and ST algorithms are applied for optimization of Cluster Heads. The GA performs crossover and mutation is replaced with state transition algorithm. 7. Then data transmission is done between clusters and Base station through Cluster heads. 8. At last performance parameters are calculated and compared. Figure 1: Block Diagram of Proposed Work V. RESULTS This section represents the results that are obtained after implementing the proposed work. The implementation is done in the MATLAB. There are some graphs in this section which proves the efficiency of proposed technique with respect to various aspects such as number of dead nodes, number of alive nodes and energy etc. These parameters are examined using following equations such as: Initialize Network by defining Network parameters Calculate the Trust values Generate Reputation value Initial Stage of Cluster Head Selection Optimization of CH using GA and ST Result calculation
4.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1580 1. No. of Dead Nodes Nodes whose energy is less than or equal to 0 is considered as the dead nodes in the network. The evaluation of the dead nodes is done as: ………………….(2) In the above equation E is referred as the energy parameter and compares it with the value 0. If the node’s energy is less than or equal to 0 then the corresponding node is declared as the dead node. 2. No. of Alive Nodes Those Nodes whose energy is greater than 0 are considered as the alive nodes in the network. These nodes can be used for the transmission from source to the sink. ………………..(3) In the equation 2, is considered as the total number of nodes in the network and for the simulation it is 100. And is the total number of dead nodes among the total nodes. Therefore, the total number of alive nodes will be the subtraction of dead nodes from the total number of nodes used for the simulation. 3. Energy The amount of energy depletion has done through the following used equations such as: 1. Dissipated energy to run the transmitter …………..(4) 2. Energy Dissipation of the transmission amplifier ………….(5) 3. Transmission Costs ( ) …………………(6) 4. Receiving Costs ( ) …………………………(7) In the above equations, K represents the message length in bits, d referred as the distance between the nodes and 𝞴 is the path loss exponent i.e. . On the basis of these parameters the performance of the traditional as well as proposed technique can be judged and conclude. Figure 2 Comparison of LEACH and proposed technique with respect to dead nodes in the network The graph (fig 2) shows the efficiency of the proposed work in the terms of dead nodes with respect to traditional technique such as LEACH and proposed. All the nodes are dead in case of traditional but in the proposed technique some of the nodes are still alive for the transmission. For the simulation, dead nodes are examined with respect to time which is varying from 2000 to 14000. The figure 3 defines the comparison graph of traditional technique i.e. LEACH and proposed work on the basis of number of alive nodes in the network. The graph shows that the proposed system has large number of alive nodes in the network as compare to other works. The Number of alive nodes till number of rounds is more stable in case of proposed technique as compared to LEACH i.e. traditional work. Figure 3 Comparison of LEACH and proposed technique in terms of Alive nodes in the network versus rounds 2000 4000 6000 8000 10000 12000 14000 0 10 20 30 40 50 60 70 80 90 100 Dead Nodes In Network (Proposed Work) Time Dead Nodes Leach Proposed Work 2000 4000 6000 8000 10000 12000 14000 0 10 20 30 40 50 60 70 80 90 100 Lifetime In Network (Proposed Work) Time Lifetime Leach Proposed Work
5.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1581 Figure 4 Residual energy of different techniques in the network The figure4 shows a comparison graph on the basis of average residual energy in the network. The graph shows that the average residual energy of LEACH is exhausted after 7000 hr, whereas in case of proposed work the residual energy remains till the completion of rounds. Moreover, initially energy was at peak point and suddenly falls down whereas in proposed work it is more stable. The following table 2 shows the results value acquired after applying traditional and proposed technique. Table 2 represents the performance parameters when the number of nodes in considered being 100 in the network. Table 3 depicts the values corresponding to performance parameters when network consist of 150 sensor nodes. Similarly in Table 4 represents the resultant values corresponding to the network which is made up of 200 nodes. The parameters used for the evaluation are total number of nodes, number of dead nodes, number of alive nodes, Initial energy of the network and residual energy. From the statistical analysis it has shown that the proposed technique surpasses the traditional technique in terms of each parameter while having same number of nodes and initial energy. Table 2 Results acquired from Traditional and Proposed technique (Nodes 100) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 100 100 Initial Energy 0.5 0.5 Number of Dead Nodes 23 100 Number of Alive Nodes 77 0 Residual Energy 0.1591 0 Table 6.2 Results acquired from Traditional and Proposed technique (Nodes 150) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 150 150 Initial Energy 0.5 0.5 Number of Dead Nodes 71 150 Number of Alive Nodes 79 0 Residual Energy 0.14841 0 Table 6.3 Results acquired from Traditional and Proposed technique (Nodes 150) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 200 200 Initial Energy 0.5 0.5 Number of Dead Nodes 82 200 Number of Alive Nodes 118 0 2000 4000 6000 8000 10000 12000 14000 -10 0 10 20 30 40 50 60 Residual Energy of Nodes (Proposed Work) Time Energy Leach Proposed Work
6.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1582 Residual Energy 0.13529 0 VI. CONCLUSION AND FUTURE SCOPE After reading the related work section it is concluded that the performance an lifetime of the wireless sensor network relies on the amount of energy consumed by its nodes for data transmission, amount of energy consumed by the nodes. There are various techniques have been developed which are helpful for route selection. But all of these techniques have some lacking point. This work proposes a new technique for enhancing the lifetime of the network and for efficient routing on the basis of State Transition and Genetic Algorithm. The proposed technique selects the route for data delivery on the basis of various parameters such as Trust value of the nodes, reputation of the nodes. The efficiency of the proposed work is measured in various terms such as number of alive nodes, number of dead nodes, energy consumed by the nodes and number of alive nodes in the network. Hence proves that the proposed work is able to enhance the lifetime and security of the network as it works on several parameters rather than a single trust parameter. In future more updations can be performed in the proposed techqniue such as: The Proposed model can be updated with recent trending optimization techniques such as PSO etc. The scenario of the proposed technique can also be analyzed in the Mobile Ad Hoc Networks. REFERENCES [1] Illsoo Sohn, Jong-Ho Lee and Sang Hyun Lee, “Low- Energy Adaptive Clustering Hierarchy Using Affinity Propagation for Wireless Sensor Networks”, IEEE Communications Letters, Pp. 1-5, 2015 [2] P. Kavitha Rani and E. Kannan,“My way — Routing in multi hop heterogeneous wireless sensor networks using straight line algorithm. V2”, IEEE Transactions on Wireless Communications, Vol 2, pp. 1-4, November 2014 [3] Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao Zhang, “TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks”, IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, August 2014 [4] Yan Sun, Haiqin Liu and Min Sik Kim, “Energy- Efficient Routing Protocol in Event-Driven Wireless Sensor Networks”, Springer, pp. 1-5, May 2010 [5] Samer A. B. Awwad, CheeKyun Ng, Nor Kamariah Noordin and Mohd. Fadlee A. Rasid, “Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network”, Springer wireless personal communications, DOI 10.1007, pp. 251-281, May 2010. [6] Chu-Fu Wang, Jau-Der Shih, Bo-Han Pan and Tin-Yu Wu, “A Network Lifetime Enhancement Method for Sink Relocation and Its Analysis in Wireless Sensor Networks”, IEEE Sensors Journal, vol. 14, no. 6, pp. 1932-1943, June 2014 [7] Ez-ZaidiAsmaa and Rakrak Said, “Efficient data collection in wireless sensor networks using mobile sink”, IEEE Transactions on Mobile Computing, vol.14, April 2014 [8] Kemal Akkaya and Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, ELSEVIER, vol. 3, no. 3, pp. 325-349, May 2005 [9] B. Manzoor, N. Javaid, O. Rehman, M. Akbar, Q. Nadeem, A. Iqbal and M. Ishfaq, “Q-LEACH: A New Routing Protocol for WSNs”, ELSEVIER Procedia Computer Science, vol. 19, pp. 926-931,2013 [10]Mario Di Francesco and Sajal K. Das, “Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey”, ACM Trans. Sensor Networks, vol. 8, no. 1, pp. 1–31 [11]Mohammad Hammoudeh, Robert Newman, “Adaptive routing in wireless sensor networks: QoSoptimization for enhanced application performance”, ELSEVIER, Information Fusion, Vol 22, Pp3-15, 2015 [12]PratyayKuila , Prasanta K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach”, ELSEVIER Engineering Applications of Artificial intelligence, Vol33, Pp 127-140, 2014 [13]Zhengmao Ye, HabibMohamadian, “Adaptive Clustering based Dynamic Routing of Wireless Sensor Networks via Generalized Ant Colony Optimization”, ELSEVIER IERI Procedia, Vol 10, Pp 2- 10, 2011 [14] Ningzhe Xing, SiyaXu , Sidong Zhang , ShaoyongGuo, “Load balancing-based routing optimization mechanism for power communication networks”, IEEE, China Communication, Vol 3, Issue 8, 2016. [15] Xiaonan Wang ; Hongbin Cheng ; Yufeng Yao, “Addressing-Based Routing Optimization for 6LoWPAN WSN in Vehicular Scenario”, IEEE, Sensors Journal, Vol 16, Issue 10, 2016 [16] Markus Leinonen ; Marian Codreanu ; MarkkuJuntti, “Distributed Joint Resource and Routing Optimization in Wireless Sensor Networks via Alternating Direction Method of Multipliers”, IEEE, Transaction on wireless communication, Vol12, Issue 11, 2013. [17] Baolin Sun ; Layuan Li, “A QoS multicast routing optimization algorithm based on genetic algorithm”, IEEE, Journal of communication and networks, Vol 8, Issue 1, 2006 [18]H. Cho ; T. Kwon ; Y. Choi, “Route Optimization Using Tree Information Option for Nested Mobile Networks”, IEEE,Journal on Selected Area of Communication, Vol 24, Issue 9, 2006
7.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1583 [19] Dimitrios Alanis ; PanagiotisBotsinis ; Zunaira Babar ; Soon Xin Ng ; LajosHanzo, “Non-Dominated Quantum Iterative Routing Optimization for Wireless Multihop Networks”, IEEE, IEEE Access, Vol 3, 2015 [20] Sabyasachi Gupta ; Ranjan Bose, “Energy-efficient joint routing and power allocation optimisation in bit error rate constrained multihop wireless networks”, IEEE, IET Communication, Vol 9, Issue 9, 2015 [21]Jin Woo Jung ; Mary Ann Weitnauer, “On Using Cooperative Routing for Lifetime Optimization of Multi-Hop Wireless Sensor Networks: Analysis and Guidelines”, IEEE, IEEE Transaction on Communication, Vol 61, Issue 8, 2013 [22]Jalal Habibi ; Ali Ghrayeb ; Amir G. Aghdam, “Energy-Efficient Cooperative Routing in Wireless Sensor Networks: A Mixed-Integer Optimization Framework and Explicit Solution”, IEEE, Transaction nad Communication, Vol 61, Issue 8, 2013 [23] EbrahimKarami ; SavoGlisic, “Joint Optimization of Scheduling and Routing in Multicast Wireless Ad Hoc Networks Using Soft Graph Coloring and Nonlinear Cubic Games”, IEEE, Transaction on Vehicular Technology, Vol 60, Issue 7, 2011 [24] Jia Liu ; Y. Thomas Hou ; Yi Shi ; Hanif D. Sherali, “Cross-Layer Optimization for MIMO-Based Wireless Ad Hoc Networks: Routing, Power Allocation, and Bandwidth Allocation”, IEEE journals on selected area in Communication, Vol 26, Issue 6, 2008 [25]Kemal Akkaya and Mohamed Younis,“A survey on routing protocols for wireless sensor networks”, ELSEVIER, Vol 3, Pp 325-349,2003 [26]Palvinder Singh Mann and Satvir Singh, “Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks”, ELSEVIER, Vol. 83, Pp. 40-52, April 2017 [27]Palvinder Singh Mann and Satvir Singh, “Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks”, ELSEVIER, Vol. 57, Pp. 142-152, January 2017 [28]Avinash More and Vijay Raisinghani, “A survey on energy efficient coverage protocols in wireless sensor networks”, ELSEVIER, September 2016 [29]Muhammad Saleem, IsrarUllah and MuddassarFarooq, “BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks”, ELSEVIER, Vol. 200, Pp. 38-56, October 2012 [30]D. Yi and H. Yang, “HEER – A delay-aware and energy-efficient routing protocol for wireless sensor networks”, ELSEVIER, Vol. 104, Pp 155–173, July 2016 [31]Juhi R. Srivastava and T.S.B. Sudarshan, “A genetic fuzzy system based optimized zone based energy efficient routing protocol for mobile sensor networks (OZEEP)”, ELSEVIER, Vol. 37, Pp. 863-886, December 2015 [32]Rakhee and M.B. Srinivas, “Cluster Based Energy Efficient Routing Protocol Using ANT Colony Optimization and Breadth First Search”, ELSEVIER Procedia Computer Science , Vol. 89, Pp. 124-133, 2016 [33]FengXiaa, XuhaiZhaoa, JianhuiZhangb, Jianhua Mac and XiangjieKonga, “BeeCup: A bio-inspired energy- efficient clustering protocol for mobile learning”, ELSEVIER Procedia Computer Science, Vol. 37, Pp. 449-460, July 2014 [34]Du Lijuan, Wang Yuanpeng and Jing WeiPeng, “Wireless Sensor Networks Energy-Efficient MAC Protocol”, ELSEVIER Physics Procedia, Vol. 33, Pp. 444-448, 2012 [35]R.Vadivel. and V. MuraliBhaskaran, “Energy Efficient With Secured Reliable Routing Protocol (EESRRP) For Mobile Ad-Hoc Networks”, ELSEVIER Procedia Technology, Vol. 4, Pp. 703-707, 2012 [36]Jieun Cho, JongwonChoe, Kwanho Song and YongTae Shin, “A routing protocol using relative landmark based on virtual grid in wireless sensor network”, IEEE Information Networking, pp. 1-3, April 2009 [37]Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao Zhang, “TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks”, IEEE Transactions On Wireless Communications, vol. 13, no. 8, August 2014 [38]Amir EhsaniZonouz, Liudong Xing, “Hybrid wireless Sensor Networks: A Reliability, Cost and Energy Aware Approach”, IEEE Wireless Sensor Systems, Pp:42-48, 2016 [39]Madhumathy P, Sivakumar D, “Enabling Energy Sensory data Collection using multiple mobile sink”, IEEE, Pp:347-355, 2014 [40]Gulcin Dinc Yalcın, Nihal Erginel, “Fuzzy multi- objective programming algorithm for vehicle routingproblems with backhauls”, Expert Systems with Applications, Volume 42, Issue 13, Pages 5632-5644, 2015
Download now