SlideShare a Scribd company logo
1 of 7
Download to read offline
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1577
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING
STATE TRANSITION AND GENETIC ALGORITHM
Ritu Rani
1
, Anita Kumari
2
1
Student, Department of Electronics and Communication, Rayat Bahra University, Mohali, India
2
Professor, of Electronics and Communication, Rayat Bahra University, Mohali, India
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract— Clustering is one of the prominent methods
that are opted for routing in wireless networks. Clustering
is such a vast field itself that lots of research works is in
conduct in order to solve the various clustering issues. One
of the issues is that, the trust model was used for electing
the cluster heads to represent the particular cluster in the
network. By using trust model, the node with the highest
trust value was elected as cluster head.
In this study a proposal is presented which comprises of
trust model for evaluating trust values of the nodes and GA
and State Transition for optimizing the cluster heads. The
proficiency of the proposed work is evaluated by
comparing the proposed work on the basis of variations in
number of total nodes in the network.
Keywords—Wireless Sensor Network, routing,
Clustering. Trust Model, GA, State Transition,
Optimization.
I. INTRODUCTION
Wireless Sensor Networks are the networks which consist
of multiple small sensors which initialize and complete the
communication from source to destination node by
creating a dedicated route to transmit the message.
Routing is a term that is used to describe the process of
route creation by inter-connecting the nodes in a wireless
network. But for completing the transmission of data the
nodes consumes the energy. If the energy consumed by the
nodes is at high level then in this way the allotted energy to
the nodes will be exhausted earlier which affects the
reliability and proficiency of the network. Therefore it is
mandatory that the network should be energy efficient so
that it consumes only feasible amount of energy or each
and every processing in the network. For this purpose
various concepts had been developed such as clustering,
energy efficient protocols etc.
Clustering is the well-organized method [5] to exploit the
energy in a competent manner. Grouping of sensors that
performing alike tasks are recognized as clusters. In
hierarchical cluster, it encloses Cluster Head, sensor nodes
and Base Station. Successive to the cluster head is chosen,
it gathers the data from all of its related nodes and growing
it in order to eliminate the redundancy. Thus, it limits the
quantity of data transmitted to the Base Station, therefore
the residual energy level is augmented and network
lifetime is exploited.
There are various key attributes [6] which must be
cautiously deliberate, while creating the clusters in WSN:
 Issues to be considered in Clustering
To generate a structure surrounded through sensor nodes
in WSN, it has the capability to deploy them in an ad hoc
manner, because it is not possible to systematize these
nodes into groups pre-deployment. Intended for this
reason, there has been a huge amount of research in
conduct of generating these organizational structures or
clusters. The clustering occurrence, plays significant role in
not just association of the network, but can noticeably
influence network performance. There are various key
confines in WSNs, that clustering methods must be
considered.
1) Limited Energy Dissimilar energetic designs, wireless
sensor nodes are off-grid, connotation that they have
inadequate vigor storage and the well-organized use of
this energy will be imperative in identifying the range
of appropriate applications for these networks. The
derisory energy in sensor nodes must be considered
for proper clustering can decrease the all over energy
custom in a network.
2) Network Lifetime: The vigor restraint on nodes
results in an insufficient network lifetime for nodes in
a network. Appropriate clustering should attempt to
decrease the power usage, and hereby augments
network lifetime.
3) Limited Abilities: The diminutive physical
measurement and minute quantity of stored energy in
a sensor node limit various capabilities of nodes in the
terms of the indulgence and communication
capabilities. A perfect clustering algorithm should
make use of communal resources contained through
an organizational structure, as taking into account the
restraint on individual node capabilities.
4) Application Dependency: Recurrently a given
application will really rely on cluster organization.
When manipulative a clustering algorithm, application
forcefulness must be measured because a high-quality
clustering algorithm should be able to acclimatize to a
diversity of application requirements.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1578
The parameters that are used in proposed work for cluster
head selection are as below;
1. Trust Model
2. Reputation Value
1. TRUST MODEL
In a wireless sensor network, trust identifies the
dependability or trustworthiness of sensor nodes. Trust
[3] might be secret in dissimilar methods based upon,
however they are used. A trust may be slanted or object
based upon the task. Depending on possessions, trust
might be communal trust or QOS trust. Communal trust
considers intimacy, sincerity, solitude, centrality,
connectivity. QOS trust considers vigor, selflessness,
ability, cooperativeness, dependability, task achievement
capability, etc. Generally, a trust may be secret as
behavioral or computational trust based upon where it is
used. Behavioral trust describes trust relations that are
surrounded through people and organizations.
Computational trust defines the trust relation through
devices, computers, and networks.
The given table (Table 1) shows the advantages and
disadvantages of trust models. But it is concluded that the
advantages outnumbers the disadvantages which makes it
more useful and preferable to use for clustering.
Table I Pros and Cons of Trust Model
S.No
Structure Pros Cons
1. Centralized Least
computational
overhead, less
memory
usage
Most
Communication
overhead, least
reliable, lack of
scalability
2. Distributed Most reliable
and scalable
Most
computational
overhead
3. Hybrid Less
communicatio
n overhead
than
centralized
and less
memory
Large
computational
overhead than
centralized,
large memory
requirement
than centralized
, less reliable
and scalable
compared to
distributed
The evaluation of trust values can be defined in two types
i.e. evaluation of direct trust value and evaluation of
indirect trust value. These calculations are defined as
below.
Calculation of direct trust value
Choose any two adjoining nodes Ni and Nj (i, j=1, 2......n,
where n is the numeral of nodes in the network), S i->j
(where i is the ID of surveillance nodes, and j is the ID of
objective nodes) is the number of winning interactions
among Ni and Nj. Ci->j( where i is the ID of observation
nodes, j is the ID of goal nodes) is the total number of
victorious interactions among Ni and Nj. The computation
formula of the direct trust value T_direct (i->j) nodes Ni
and Nj is as below:
( )
( )
( )
Wolddirect and Wnewdirect are the heaviness value of the older
direction, trust value (Tolddirecr) and the load value of the
novel direct trust value (Tnewdirect) correspondingly. The
values of Wolddirect and Wnewdirect are resolute based upon the
exact deployment situation.
The subsequent is the analysis of the consequence of
Wolddirect and Wnewdirect on direct trust value computation:
=Wolddirect/Wnewdirect
Calculation of indirect trust value
In the algorithm, the indirect trust value can be attained
from the ordinary neighbors of the e spectator and the
experiential, the indirect trust value (Trecommnd (i->j)) of
node i in node j can be computed based upon the billowing
method:
( ) ⁄ ∑ ( ) ( )
Wherever, m is the numeral of ordinary adjoining nodes of
nodes i and j.
2. REPUTATION VALUE
It is one of the parameter that is used to evaluate for
cluster head selection. It is a parameter which is used to
measure the reputation value of each and every node on
the basis of routing information of the node. It is evaluated
by using the following equation:
( )
For more justification let’s consider an example, suppose
total number of delivered packets are 100 and out which
80 are routed successfully and 20 are dropped then as per
equation (8) the reputation value is
( )
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1579
The node with routed packet will give a positive
acknowledgement and the node with dropped packet will
give a negative acknowledgement
II. PROBLEM FORMULATION
As in earlier Wireless Sensor Network protocols are used
to improve the energy efficiency and to enhance the
lifetime of the network. In this process first of all the
whole network is divided into small clusters. The number
of these clusters can vary from network to network. And
then from these clusters, cluster heads are selected then
cluster heads collect the sensed data form clusters and
then forward this collected data to the base station and
sink node. The only problem in traditional work was the
criteria opted for selection of cluster heads. Earlier only
trust value was considered for selecting the cluster heads.
The node having maximum trust value was selected as a
cluster head. Additionally none of the algorithm had been
applied to the network for the purpose of optimization.
This increases the efficiency of the network but only up to
certain limited point. This process leads to the reduction
in security of the network as a single node can become
cluster head again and again. Therefore the main problem
was less number of parameters was considered for cluster
head selection. Hence there is a need to develop such a
method which can remove the backlogs of the traditional
work.
III. PROPOSED WORK
In the proposed technique the security of the system is
enhanced by changing the criterion for CH selection. In the
earlier techniques only the trust value of nodes was
considered for CH selection but in this proposed technique
reputation value is also considered along with the trust
value of nodes. In proposed work, an optimization is also
applied to the network after selecting the CH. For
optimization purpose State Transition algorithm is applied.
Hence this approach increases the effectiveness and recital
of the network. In proposed work first of all network
parameters are initialized. Then trust value of nodes on the
basis of defined parameters is calculated. After trust value
a reputation value is generated. Then on the basis of trust
value and reputation value the process of CH selection has
been initialized. After this the State Transition algorithm is
applied for CH optimization. And at last the generated
results of performance parameters prove the efficiency of
the proposed work.
IV. METHODOLOGY
The methodology and block diagram of proposed work is
as follows:
1. First step is to initialization and creation of the
network parameters.
2. After network initialization process of nodes
deployment in the given area of the network.
3. Then trust value of the deployed nodes will be
calculated.
4. After evaluation of trust value, a reputation value
corresponding to the nodes will be generated.
5. Then the criterion for CH selection is considered by
combining the trust value and reputation value of
the nodes.
6. Then the GA and ST algorithms are applied for
optimization of Cluster Heads. The GA performs
crossover and mutation is replaced with state
transition algorithm.
7. Then data transmission is done between clusters
and Base station through Cluster heads.
8. At last performance parameters are calculated and
compared.
Figure 1: Block Diagram of Proposed Work
V. RESULTS
This section represents the results that are obtained after
implementing the proposed work. The implementation is
done in the MATLAB. There are some graphs in this section
which proves the efficiency of proposed technique with
respect to various aspects such as number of dead nodes,
number of alive nodes and energy etc. These parameters
are examined using following equations such as:
Initialize Network by defining
Network parameters
Calculate the Trust values
Generate Reputation value
Initial Stage of Cluster Head
Selection
Optimization of CH using GA
and ST
Result calculation
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1580
1. No. of Dead Nodes
Nodes whose energy is less than or equal to 0 is considered
as the dead nodes in the network. The evaluation of the
dead nodes is done as:
………………….(2)
In the above equation E is referred as the energy
parameter and compares it with the value 0. If the node’s
energy is less than or equal to 0 then the corresponding
node is declared as the dead node.
2. No. of Alive Nodes
Those Nodes whose energy is greater than 0 are
considered as the alive nodes in the network. These nodes
can be used for the transmission from source to the sink.
………………..(3)
In the equation 2, is considered as the total
number of nodes in the network and for the simulation it is
100. And is the total number of dead nodes
among the total nodes. Therefore, the total number of alive
nodes will be the subtraction of dead nodes from the total
number of nodes used for the simulation.
3. Energy
The amount of energy depletion has done through the
following used equations such as:
1. Dissipated energy to run the transmitter
…………..(4)
2. Energy Dissipation of the transmission
amplifier
………….(5)
3. Transmission Costs
( ) …………………(6)
4. Receiving Costs
( ) …………………………(7)
In the above equations, K represents the message length in
bits, d referred as the distance between the nodes and 𝞴 is
the path loss exponent i.e. . On the basis of these
parameters the performance of the traditional as well as
proposed technique can be judged and conclude.
Figure 2 Comparison of LEACH and proposed technique
with respect to dead nodes in the network
The graph (fig 2) shows the efficiency of the proposed
work in the terms of dead nodes with respect to traditional
technique such as LEACH and proposed. All the nodes are
dead in case of traditional but in the proposed technique
some of the nodes are still alive for the transmission. For
the simulation, dead nodes are examined with respect to
time which is varying from 2000 to 14000.
The figure 3 defines the comparison graph of traditional
technique i.e. LEACH and proposed work on the basis of
number of alive nodes in the network. The graph shows
that the proposed system has large number of alive nodes
in the network as compare to other works. The Number of
alive nodes till number of rounds is more stable in case of
proposed technique as compared to LEACH i.e. traditional
work.
Figure 3 Comparison of LEACH and proposed technique in
terms of Alive nodes in the network versus rounds
2000 4000 6000 8000 10000 12000 14000
0
10
20
30
40
50
60
70
80
90
100
Dead Nodes In Network (Proposed Work)
Time
Dead
Nodes
Leach
Proposed Work
2000 4000 6000 8000 10000 12000 14000
0
10
20
30
40
50
60
70
80
90
100
Lifetime In Network (Proposed Work)
Time
Lifetime
Leach
Proposed Work
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1581
Figure 4 Residual energy of different techniques in the
network
The figure4 shows a comparison graph on the basis of
average residual energy in the network. The graph shows
that the average residual energy of LEACH is exhausted
after 7000 hr, whereas in case of proposed work the
residual energy remains till the completion of rounds.
Moreover, initially energy was at peak point and suddenly
falls down whereas in proposed work it is more stable.
The following table 2 shows the results value acquired
after applying traditional and proposed technique. Table 2
represents the performance parameters when the number
of nodes in considered being 100 in the network.
Table 3 depicts the values corresponding to performance
parameters when network consist of 150 sensor nodes.
Similarly in Table 4 represents the resultant values
corresponding to the network which is made up of 200
nodes.
The parameters used for the evaluation are total number
of nodes, number of dead nodes, number of alive nodes,
Initial energy of the network and residual energy.
From the statistical analysis it has shown that the
proposed technique surpasses the traditional technique in
terms of each parameter while having same number of
nodes and initial energy.
Table 2 Results acquired from Traditional and Proposed
technique (Nodes 100)
TECHNIQUES
PARAMETERS
PROPOSED
TECHNIQUE
TRADITIONAL
TECHNIQUE
Total number of
nodes
100 100
Initial Energy 0.5 0.5
Number of Dead
Nodes
23 100
Number of Alive
Nodes
77 0
Residual Energy 0.1591 0
Table 6.2 Results acquired from Traditional and Proposed
technique (Nodes 150)
TECHNIQUES
PARAMETERS
PROPOSED
TECHNIQUE
TRADITIONAL
TECHNIQUE
Total number of
nodes
150 150
Initial Energy 0.5 0.5
Number of Dead
Nodes
71 150
Number of Alive
Nodes
79 0
Residual Energy 0.14841 0
Table 6.3 Results acquired from Traditional and Proposed
technique (Nodes 150)
TECHNIQUES
PARAMETERS
PROPOSED
TECHNIQUE
TRADITIONAL
TECHNIQUE
Total number of
nodes
200 200
Initial Energy 0.5 0.5
Number of Dead
Nodes
82 200
Number of Alive
Nodes
118 0
2000 4000 6000 8000 10000 12000 14000
-10
0
10
20
30
40
50
60
Residual Energy of Nodes (Proposed Work)
Time
Energy
Leach
Proposed Work
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1582
Residual Energy 0.13529 0
VI. CONCLUSION AND FUTURE SCOPE
After reading the related work section it is concluded that
the performance an lifetime of the wireless sensor network
relies on the amount of energy consumed by its nodes for
data transmission, amount of energy consumed by the
nodes. There are various techniques have been developed
which are helpful for route selection. But all of these
techniques have some lacking point. This work proposes a
new technique for enhancing the lifetime of the network
and for efficient routing on the basis of State Transition
and Genetic Algorithm. The proposed technique selects the
route for data delivery on the basis of various parameters
such as Trust value of the nodes, reputation of the nodes.
The efficiency of the proposed work is measured in various
terms such as number of alive nodes, number of dead
nodes, energy consumed by the nodes and number of alive
nodes in the network. Hence proves that the proposed
work is able to enhance the lifetime and security of the
network as it works on several parameters rather than a
single trust parameter.
In future more updations can be performed in the
proposed techqniue such as:
 The Proposed model can be updated with recent
trending optimization techniques such as PSO etc.
 The scenario of the proposed technique can also
be analyzed in the Mobile Ad Hoc Networks.
REFERENCES
[1] Illsoo Sohn, Jong-Ho Lee and Sang Hyun Lee, “Low-
Energy Adaptive Clustering Hierarchy Using Affinity
Propagation for Wireless Sensor Networks”, IEEE
Communications Letters, Pp. 1-5, 2015
[2] P. Kavitha Rani and E. Kannan,“My way — Routing in
multi hop heterogeneous wireless sensor networks
using straight line algorithm. V2”, IEEE Transactions
on Wireless Communications, Vol 2, pp. 1-4,
November 2014
[3] Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao
Zhang, “TIGHT: A Geographic Routing Protocol for
Cognitive Radio Mobile Ad Hoc Networks”, IEEE
Transactions on Wireless Communications, vol. 13,
no. 8, pp. 4670-4681, August 2014
[4] Yan Sun, Haiqin Liu and Min Sik Kim, “Energy-
Efficient Routing Protocol in Event-Driven Wireless
Sensor Networks”, Springer, pp. 1-5, May 2010
[5] Samer A. B. Awwad, CheeKyun Ng, Nor Kamariah
Noordin and Mohd. Fadlee A. Rasid, “Cluster Based
Routing Protocol for Mobile Nodes in Wireless
Sensor Network”, Springer wireless personal
communications, DOI 10.1007, pp. 251-281, May
2010.
[6] Chu-Fu Wang, Jau-Der Shih, Bo-Han Pan and Tin-Yu
Wu, “A Network Lifetime Enhancement Method for
Sink Relocation and Its Analysis in Wireless Sensor
Networks”, IEEE Sensors Journal, vol. 14, no. 6, pp.
1932-1943, June 2014
[7] Ez-ZaidiAsmaa and Rakrak Said, “Efficient data
collection in wireless sensor networks using mobile
sink”, IEEE Transactions on Mobile Computing,
vol.14, April 2014
[8] Kemal Akkaya and Mohamed Younis, “A survey on
routing protocols for wireless sensor networks”,
ELSEVIER, vol. 3, no. 3, pp. 325-349, May 2005
[9] B. Manzoor, N. Javaid, O. Rehman, M. Akbar, Q.
Nadeem, A. Iqbal and M. Ishfaq, “Q-LEACH: A New
Routing Protocol for WSNs”, ELSEVIER Procedia
Computer Science, vol. 19, pp. 926-931,2013
[10]Mario Di Francesco and Sajal K. Das, “Data Collection
in Wireless Sensor Networks with Mobile Elements:
A Survey”, ACM Trans. Sensor Networks, vol. 8, no. 1,
pp. 1–31
[11]Mohammad Hammoudeh, Robert Newman,
“Adaptive routing in wireless sensor networks:
QoSoptimization for enhanced application
performance”, ELSEVIER, Information Fusion, Vol
22, Pp3-15, 2015
[12]PratyayKuila , Prasanta K. Jana, “Energy efficient
clustering and routing algorithms for wireless
sensor networks: Particle swarm optimization
approach”, ELSEVIER Engineering Applications of
Artificial intelligence, Vol33, Pp 127-140, 2014
[13]Zhengmao Ye, HabibMohamadian, “Adaptive
Clustering based Dynamic Routing of Wireless
Sensor Networks via Generalized Ant Colony
Optimization”, ELSEVIER IERI Procedia, Vol 10, Pp 2-
10, 2011
[14] Ningzhe Xing, SiyaXu , Sidong
Zhang , ShaoyongGuo, “Load balancing-based
routing optimization mechanism for power
communication networks”, IEEE, China
Communication, Vol 3, Issue 8, 2016.
[15] Xiaonan Wang ; Hongbin Cheng ; Yufeng Yao,
“Addressing-Based Routing Optimization for
6LoWPAN WSN in Vehicular Scenario”, IEEE,
Sensors Journal, Vol 16, Issue 10, 2016
[16] Markus Leinonen ; Marian
Codreanu ; MarkkuJuntti, “Distributed Joint
Resource and Routing Optimization in Wireless
Sensor Networks via Alternating Direction Method
of Multipliers”, IEEE, Transaction on wireless
communication, Vol12, Issue 11, 2013.
[17] Baolin Sun ; Layuan Li, “A QoS multicast routing
optimization algorithm based on genetic algorithm”,
IEEE, Journal of communication and networks, Vol 8,
Issue 1, 2006
[18]H. Cho ; T. Kwon ; Y. Choi, “Route Optimization Using
Tree Information Option for Nested Mobile
Networks”, IEEE,Journal on Selected Area of
Communication, Vol 24, Issue 9, 2006
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1583
[19] Dimitrios Alanis ; PanagiotisBotsinis ; Zunaira
Babar ; Soon Xin Ng ; LajosHanzo, “Non-Dominated
Quantum Iterative Routing Optimization for
Wireless Multihop Networks”, IEEE, IEEE Access, Vol
3, 2015
[20] Sabyasachi Gupta ; Ranjan Bose, “Energy-efficient
joint routing and power allocation optimisation in
bit error rate constrained multihop wireless
networks”, IEEE, IET Communication, Vol 9, Issue 9,
2015
[21]Jin Woo Jung ; Mary Ann Weitnauer, “On Using
Cooperative Routing for Lifetime Optimization of
Multi-Hop Wireless Sensor Networks: Analysis and
Guidelines”, IEEE, IEEE Transaction on
Communication, Vol 61, Issue 8, 2013
[22]Jalal Habibi ; Ali Ghrayeb ; Amir G. Aghdam,
“Energy-Efficient Cooperative Routing in Wireless
Sensor Networks: A Mixed-Integer Optimization
Framework and Explicit Solution”, IEEE,
Transaction nad Communication, Vol 61, Issue 8,
2013
[23] EbrahimKarami ; SavoGlisic, “Joint Optimization of
Scheduling and Routing in Multicast Wireless Ad Hoc
Networks Using Soft Graph Coloring and Nonlinear
Cubic Games”, IEEE, Transaction on Vehicular
Technology, Vol 60, Issue 7, 2011
[24] Jia Liu ; Y. Thomas Hou ; Yi Shi ; Hanif D. Sherali,
“Cross-Layer Optimization for MIMO-Based Wireless
Ad Hoc Networks: Routing, Power Allocation, and
Bandwidth Allocation”, IEEE journals on selected
area in Communication, Vol 26, Issue 6, 2008
[25]Kemal Akkaya and Mohamed Younis,“A survey on
routing protocols for wireless sensor networks”,
ELSEVIER, Vol 3, Pp 325-349,2003
[26]Palvinder Singh Mann and Satvir Singh, “Energy
efficient clustering protocol based on improved
metaheuristic in wireless sensor networks”,
ELSEVIER, Vol. 83, Pp. 40-52, April 2017
[27]Palvinder Singh Mann and Satvir Singh, “Improved
metaheuristic based energy-efficient clustering
protocol for wireless sensor networks”, ELSEVIER,
Vol. 57, Pp. 142-152, January 2017
[28]Avinash More and Vijay Raisinghani, “A survey on
energy efficient coverage protocols in wireless
sensor networks”, ELSEVIER, September 2016
[29]Muhammad Saleem, IsrarUllah and
MuddassarFarooq, “BeeSensor: An energy-efficient
and scalable routing protocol for wireless sensor
networks”, ELSEVIER, Vol. 200, Pp. 38-56, October
2012
[30]D. Yi and H. Yang, “HEER – A delay-aware and
energy-efficient routing protocol for wireless sensor
networks”, ELSEVIER, Vol. 104, Pp 155–173, July
2016
[31]Juhi R. Srivastava and T.S.B. Sudarshan, “A genetic
fuzzy system based optimized zone based energy
efficient routing protocol for mobile sensor
networks (OZEEP)”, ELSEVIER, Vol. 37, Pp. 863-886,
December 2015
[32]Rakhee and M.B. Srinivas, “Cluster Based Energy
Efficient Routing Protocol Using ANT Colony
Optimization and Breadth First Search”, ELSEVIER
Procedia Computer Science , Vol. 89, Pp. 124-133,
2016
[33]FengXiaa, XuhaiZhaoa, JianhuiZhangb, Jianhua Mac
and XiangjieKonga, “BeeCup: A bio-inspired energy-
efficient clustering protocol for mobile learning”,
ELSEVIER Procedia Computer Science, Vol. 37, Pp.
449-460, July 2014
[34]Du Lijuan, Wang Yuanpeng and Jing WeiPeng,
“Wireless Sensor Networks Energy-Efficient MAC
Protocol”, ELSEVIER Physics Procedia, Vol. 33, Pp.
444-448, 2012
[35]R.Vadivel. and V. MuraliBhaskaran, “Energy Efficient
With Secured Reliable Routing Protocol (EESRRP)
For Mobile Ad-Hoc Networks”, ELSEVIER Procedia
Technology, Vol. 4, Pp. 703-707, 2012
[36]Jieun Cho, JongwonChoe, Kwanho Song and
YongTae Shin, “A routing protocol using relative
landmark based on virtual grid in wireless sensor
network”, IEEE Information Networking, pp. 1-3,
April 2009
[37]Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao
Zhang, “TIGHT: A Geographic Routing Protocol for
Cognitive Radio Mobile Ad Hoc Networks”, IEEE
Transactions On Wireless Communications, vol. 13,
no. 8, August 2014
[38]Amir EhsaniZonouz, Liudong Xing, “Hybrid wireless
Sensor Networks: A Reliability, Cost and Energy
Aware Approach”, IEEE Wireless Sensor Systems,
Pp:42-48, 2016
[39]Madhumathy P, Sivakumar D, “Enabling Energy
Sensory data Collection using multiple mobile sink”,
IEEE, Pp:347-355, 2014
[40]Gulcin Dinc Yalcın, Nihal Erginel, “Fuzzy multi-
objective programming algorithm for
vehicle routingproblems with backhauls”, Expert
Systems with Applications, Volume 42, Issue
13, Pages 5632-5644, 2015

More Related Content

Similar to OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM

IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET Journal
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocoleSAT Journals
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol surveyeSAT Publishing House
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET Journal
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkIRJET Journal
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingIRJET Journal
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET Journal
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
 
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...IRJET Journal
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSNIRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSNIRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
 

Similar to OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM (20)

IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...Optimizing the Packet Routing with Effective Probability Association in Wirel...
Optimizing the Packet Routing with Effective Probability Association in Wirel...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSNIRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1577 OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GENETIC ALGORITHM Ritu Rani 1 , Anita Kumari 2 1 Student, Department of Electronics and Communication, Rayat Bahra University, Mohali, India 2 Professor, of Electronics and Communication, Rayat Bahra University, Mohali, India -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract— Clustering is one of the prominent methods that are opted for routing in wireless networks. Clustering is such a vast field itself that lots of research works is in conduct in order to solve the various clustering issues. One of the issues is that, the trust model was used for electing the cluster heads to represent the particular cluster in the network. By using trust model, the node with the highest trust value was elected as cluster head. In this study a proposal is presented which comprises of trust model for evaluating trust values of the nodes and GA and State Transition for optimizing the cluster heads. The proficiency of the proposed work is evaluated by comparing the proposed work on the basis of variations in number of total nodes in the network. Keywords—Wireless Sensor Network, routing, Clustering. Trust Model, GA, State Transition, Optimization. I. INTRODUCTION Wireless Sensor Networks are the networks which consist of multiple small sensors which initialize and complete the communication from source to destination node by creating a dedicated route to transmit the message. Routing is a term that is used to describe the process of route creation by inter-connecting the nodes in a wireless network. But for completing the transmission of data the nodes consumes the energy. If the energy consumed by the nodes is at high level then in this way the allotted energy to the nodes will be exhausted earlier which affects the reliability and proficiency of the network. Therefore it is mandatory that the network should be energy efficient so that it consumes only feasible amount of energy or each and every processing in the network. For this purpose various concepts had been developed such as clustering, energy efficient protocols etc. Clustering is the well-organized method [5] to exploit the energy in a competent manner. Grouping of sensors that performing alike tasks are recognized as clusters. In hierarchical cluster, it encloses Cluster Head, sensor nodes and Base Station. Successive to the cluster head is chosen, it gathers the data from all of its related nodes and growing it in order to eliminate the redundancy. Thus, it limits the quantity of data transmitted to the Base Station, therefore the residual energy level is augmented and network lifetime is exploited. There are various key attributes [6] which must be cautiously deliberate, while creating the clusters in WSN:  Issues to be considered in Clustering To generate a structure surrounded through sensor nodes in WSN, it has the capability to deploy them in an ad hoc manner, because it is not possible to systematize these nodes into groups pre-deployment. Intended for this reason, there has been a huge amount of research in conduct of generating these organizational structures or clusters. The clustering occurrence, plays significant role in not just association of the network, but can noticeably influence network performance. There are various key confines in WSNs, that clustering methods must be considered. 1) Limited Energy Dissimilar energetic designs, wireless sensor nodes are off-grid, connotation that they have inadequate vigor storage and the well-organized use of this energy will be imperative in identifying the range of appropriate applications for these networks. The derisory energy in sensor nodes must be considered for proper clustering can decrease the all over energy custom in a network. 2) Network Lifetime: The vigor restraint on nodes results in an insufficient network lifetime for nodes in a network. Appropriate clustering should attempt to decrease the power usage, and hereby augments network lifetime. 3) Limited Abilities: The diminutive physical measurement and minute quantity of stored energy in a sensor node limit various capabilities of nodes in the terms of the indulgence and communication capabilities. A perfect clustering algorithm should make use of communal resources contained through an organizational structure, as taking into account the restraint on individual node capabilities. 4) Application Dependency: Recurrently a given application will really rely on cluster organization. When manipulative a clustering algorithm, application forcefulness must be measured because a high-quality clustering algorithm should be able to acclimatize to a diversity of application requirements.
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1578 The parameters that are used in proposed work for cluster head selection are as below; 1. Trust Model 2. Reputation Value 1. TRUST MODEL In a wireless sensor network, trust identifies the dependability or trustworthiness of sensor nodes. Trust [3] might be secret in dissimilar methods based upon, however they are used. A trust may be slanted or object based upon the task. Depending on possessions, trust might be communal trust or QOS trust. Communal trust considers intimacy, sincerity, solitude, centrality, connectivity. QOS trust considers vigor, selflessness, ability, cooperativeness, dependability, task achievement capability, etc. Generally, a trust may be secret as behavioral or computational trust based upon where it is used. Behavioral trust describes trust relations that are surrounded through people and organizations. Computational trust defines the trust relation through devices, computers, and networks. The given table (Table 1) shows the advantages and disadvantages of trust models. But it is concluded that the advantages outnumbers the disadvantages which makes it more useful and preferable to use for clustering. Table I Pros and Cons of Trust Model S.No Structure Pros Cons 1. Centralized Least computational overhead, less memory usage Most Communication overhead, least reliable, lack of scalability 2. Distributed Most reliable and scalable Most computational overhead 3. Hybrid Less communicatio n overhead than centralized and less memory Large computational overhead than centralized, large memory requirement than centralized , less reliable and scalable compared to distributed The evaluation of trust values can be defined in two types i.e. evaluation of direct trust value and evaluation of indirect trust value. These calculations are defined as below. Calculation of direct trust value Choose any two adjoining nodes Ni and Nj (i, j=1, 2......n, where n is the numeral of nodes in the network), S i->j (where i is the ID of surveillance nodes, and j is the ID of objective nodes) is the number of winning interactions among Ni and Nj. Ci->j( where i is the ID of observation nodes, j is the ID of goal nodes) is the total number of victorious interactions among Ni and Nj. The computation formula of the direct trust value T_direct (i->j) nodes Ni and Nj is as below: ( ) ( ) ( ) Wolddirect and Wnewdirect are the heaviness value of the older direction, trust value (Tolddirecr) and the load value of the novel direct trust value (Tnewdirect) correspondingly. The values of Wolddirect and Wnewdirect are resolute based upon the exact deployment situation. The subsequent is the analysis of the consequence of Wolddirect and Wnewdirect on direct trust value computation: =Wolddirect/Wnewdirect Calculation of indirect trust value In the algorithm, the indirect trust value can be attained from the ordinary neighbors of the e spectator and the experiential, the indirect trust value (Trecommnd (i->j)) of node i in node j can be computed based upon the billowing method: ( ) ⁄ ∑ ( ) ( ) Wherever, m is the numeral of ordinary adjoining nodes of nodes i and j. 2. REPUTATION VALUE It is one of the parameter that is used to evaluate for cluster head selection. It is a parameter which is used to measure the reputation value of each and every node on the basis of routing information of the node. It is evaluated by using the following equation: ( ) For more justification let’s consider an example, suppose total number of delivered packets are 100 and out which 80 are routed successfully and 20 are dropped then as per equation (8) the reputation value is ( )
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1579 The node with routed packet will give a positive acknowledgement and the node with dropped packet will give a negative acknowledgement II. PROBLEM FORMULATION As in earlier Wireless Sensor Network protocols are used to improve the energy efficiency and to enhance the lifetime of the network. In this process first of all the whole network is divided into small clusters. The number of these clusters can vary from network to network. And then from these clusters, cluster heads are selected then cluster heads collect the sensed data form clusters and then forward this collected data to the base station and sink node. The only problem in traditional work was the criteria opted for selection of cluster heads. Earlier only trust value was considered for selecting the cluster heads. The node having maximum trust value was selected as a cluster head. Additionally none of the algorithm had been applied to the network for the purpose of optimization. This increases the efficiency of the network but only up to certain limited point. This process leads to the reduction in security of the network as a single node can become cluster head again and again. Therefore the main problem was less number of parameters was considered for cluster head selection. Hence there is a need to develop such a method which can remove the backlogs of the traditional work. III. PROPOSED WORK In the proposed technique the security of the system is enhanced by changing the criterion for CH selection. In the earlier techniques only the trust value of nodes was considered for CH selection but in this proposed technique reputation value is also considered along with the trust value of nodes. In proposed work, an optimization is also applied to the network after selecting the CH. For optimization purpose State Transition algorithm is applied. Hence this approach increases the effectiveness and recital of the network. In proposed work first of all network parameters are initialized. Then trust value of nodes on the basis of defined parameters is calculated. After trust value a reputation value is generated. Then on the basis of trust value and reputation value the process of CH selection has been initialized. After this the State Transition algorithm is applied for CH optimization. And at last the generated results of performance parameters prove the efficiency of the proposed work. IV. METHODOLOGY The methodology and block diagram of proposed work is as follows: 1. First step is to initialization and creation of the network parameters. 2. After network initialization process of nodes deployment in the given area of the network. 3. Then trust value of the deployed nodes will be calculated. 4. After evaluation of trust value, a reputation value corresponding to the nodes will be generated. 5. Then the criterion for CH selection is considered by combining the trust value and reputation value of the nodes. 6. Then the GA and ST algorithms are applied for optimization of Cluster Heads. The GA performs crossover and mutation is replaced with state transition algorithm. 7. Then data transmission is done between clusters and Base station through Cluster heads. 8. At last performance parameters are calculated and compared. Figure 1: Block Diagram of Proposed Work V. RESULTS This section represents the results that are obtained after implementing the proposed work. The implementation is done in the MATLAB. There are some graphs in this section which proves the efficiency of proposed technique with respect to various aspects such as number of dead nodes, number of alive nodes and energy etc. These parameters are examined using following equations such as: Initialize Network by defining Network parameters Calculate the Trust values Generate Reputation value Initial Stage of Cluster Head Selection Optimization of CH using GA and ST Result calculation
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1580 1. No. of Dead Nodes Nodes whose energy is less than or equal to 0 is considered as the dead nodes in the network. The evaluation of the dead nodes is done as: ………………….(2) In the above equation E is referred as the energy parameter and compares it with the value 0. If the node’s energy is less than or equal to 0 then the corresponding node is declared as the dead node. 2. No. of Alive Nodes Those Nodes whose energy is greater than 0 are considered as the alive nodes in the network. These nodes can be used for the transmission from source to the sink. ………………..(3) In the equation 2, is considered as the total number of nodes in the network and for the simulation it is 100. And is the total number of dead nodes among the total nodes. Therefore, the total number of alive nodes will be the subtraction of dead nodes from the total number of nodes used for the simulation. 3. Energy The amount of energy depletion has done through the following used equations such as: 1. Dissipated energy to run the transmitter …………..(4) 2. Energy Dissipation of the transmission amplifier ………….(5) 3. Transmission Costs ( ) …………………(6) 4. Receiving Costs ( ) …………………………(7) In the above equations, K represents the message length in bits, d referred as the distance between the nodes and 𝞴 is the path loss exponent i.e. . On the basis of these parameters the performance of the traditional as well as proposed technique can be judged and conclude. Figure 2 Comparison of LEACH and proposed technique with respect to dead nodes in the network The graph (fig 2) shows the efficiency of the proposed work in the terms of dead nodes with respect to traditional technique such as LEACH and proposed. All the nodes are dead in case of traditional but in the proposed technique some of the nodes are still alive for the transmission. For the simulation, dead nodes are examined with respect to time which is varying from 2000 to 14000. The figure 3 defines the comparison graph of traditional technique i.e. LEACH and proposed work on the basis of number of alive nodes in the network. The graph shows that the proposed system has large number of alive nodes in the network as compare to other works. The Number of alive nodes till number of rounds is more stable in case of proposed technique as compared to LEACH i.e. traditional work. Figure 3 Comparison of LEACH and proposed technique in terms of Alive nodes in the network versus rounds 2000 4000 6000 8000 10000 12000 14000 0 10 20 30 40 50 60 70 80 90 100 Dead Nodes In Network (Proposed Work) Time Dead Nodes Leach Proposed Work 2000 4000 6000 8000 10000 12000 14000 0 10 20 30 40 50 60 70 80 90 100 Lifetime In Network (Proposed Work) Time Lifetime Leach Proposed Work
  • 5. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1581 Figure 4 Residual energy of different techniques in the network The figure4 shows a comparison graph on the basis of average residual energy in the network. The graph shows that the average residual energy of LEACH is exhausted after 7000 hr, whereas in case of proposed work the residual energy remains till the completion of rounds. Moreover, initially energy was at peak point and suddenly falls down whereas in proposed work it is more stable. The following table 2 shows the results value acquired after applying traditional and proposed technique. Table 2 represents the performance parameters when the number of nodes in considered being 100 in the network. Table 3 depicts the values corresponding to performance parameters when network consist of 150 sensor nodes. Similarly in Table 4 represents the resultant values corresponding to the network which is made up of 200 nodes. The parameters used for the evaluation are total number of nodes, number of dead nodes, number of alive nodes, Initial energy of the network and residual energy. From the statistical analysis it has shown that the proposed technique surpasses the traditional technique in terms of each parameter while having same number of nodes and initial energy. Table 2 Results acquired from Traditional and Proposed technique (Nodes 100) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 100 100 Initial Energy 0.5 0.5 Number of Dead Nodes 23 100 Number of Alive Nodes 77 0 Residual Energy 0.1591 0 Table 6.2 Results acquired from Traditional and Proposed technique (Nodes 150) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 150 150 Initial Energy 0.5 0.5 Number of Dead Nodes 71 150 Number of Alive Nodes 79 0 Residual Energy 0.14841 0 Table 6.3 Results acquired from Traditional and Proposed technique (Nodes 150) TECHNIQUES PARAMETERS PROPOSED TECHNIQUE TRADITIONAL TECHNIQUE Total number of nodes 200 200 Initial Energy 0.5 0.5 Number of Dead Nodes 82 200 Number of Alive Nodes 118 0 2000 4000 6000 8000 10000 12000 14000 -10 0 10 20 30 40 50 60 Residual Energy of Nodes (Proposed Work) Time Energy Leach Proposed Work
  • 6. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1582 Residual Energy 0.13529 0 VI. CONCLUSION AND FUTURE SCOPE After reading the related work section it is concluded that the performance an lifetime of the wireless sensor network relies on the amount of energy consumed by its nodes for data transmission, amount of energy consumed by the nodes. There are various techniques have been developed which are helpful for route selection. But all of these techniques have some lacking point. This work proposes a new technique for enhancing the lifetime of the network and for efficient routing on the basis of State Transition and Genetic Algorithm. The proposed technique selects the route for data delivery on the basis of various parameters such as Trust value of the nodes, reputation of the nodes. The efficiency of the proposed work is measured in various terms such as number of alive nodes, number of dead nodes, energy consumed by the nodes and number of alive nodes in the network. Hence proves that the proposed work is able to enhance the lifetime and security of the network as it works on several parameters rather than a single trust parameter. In future more updations can be performed in the proposed techqniue such as:  The Proposed model can be updated with recent trending optimization techniques such as PSO etc.  The scenario of the proposed technique can also be analyzed in the Mobile Ad Hoc Networks. REFERENCES [1] Illsoo Sohn, Jong-Ho Lee and Sang Hyun Lee, “Low- Energy Adaptive Clustering Hierarchy Using Affinity Propagation for Wireless Sensor Networks”, IEEE Communications Letters, Pp. 1-5, 2015 [2] P. Kavitha Rani and E. Kannan,“My way — Routing in multi hop heterogeneous wireless sensor networks using straight line algorithm. V2”, IEEE Transactions on Wireless Communications, Vol 2, pp. 1-4, November 2014 [3] Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao Zhang, “TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks”, IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, August 2014 [4] Yan Sun, Haiqin Liu and Min Sik Kim, “Energy- Efficient Routing Protocol in Event-Driven Wireless Sensor Networks”, Springer, pp. 1-5, May 2010 [5] Samer A. B. Awwad, CheeKyun Ng, Nor Kamariah Noordin and Mohd. Fadlee A. Rasid, “Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network”, Springer wireless personal communications, DOI 10.1007, pp. 251-281, May 2010. [6] Chu-Fu Wang, Jau-Der Shih, Bo-Han Pan and Tin-Yu Wu, “A Network Lifetime Enhancement Method for Sink Relocation and Its Analysis in Wireless Sensor Networks”, IEEE Sensors Journal, vol. 14, no. 6, pp. 1932-1943, June 2014 [7] Ez-ZaidiAsmaa and Rakrak Said, “Efficient data collection in wireless sensor networks using mobile sink”, IEEE Transactions on Mobile Computing, vol.14, April 2014 [8] Kemal Akkaya and Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, ELSEVIER, vol. 3, no. 3, pp. 325-349, May 2005 [9] B. Manzoor, N. Javaid, O. Rehman, M. Akbar, Q. Nadeem, A. Iqbal and M. Ishfaq, “Q-LEACH: A New Routing Protocol for WSNs”, ELSEVIER Procedia Computer Science, vol. 19, pp. 926-931,2013 [10]Mario Di Francesco and Sajal K. Das, “Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey”, ACM Trans. Sensor Networks, vol. 8, no. 1, pp. 1–31 [11]Mohammad Hammoudeh, Robert Newman, “Adaptive routing in wireless sensor networks: QoSoptimization for enhanced application performance”, ELSEVIER, Information Fusion, Vol 22, Pp3-15, 2015 [12]PratyayKuila , Prasanta K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach”, ELSEVIER Engineering Applications of Artificial intelligence, Vol33, Pp 127-140, 2014 [13]Zhengmao Ye, HabibMohamadian, “Adaptive Clustering based Dynamic Routing of Wireless Sensor Networks via Generalized Ant Colony Optimization”, ELSEVIER IERI Procedia, Vol 10, Pp 2- 10, 2011 [14] Ningzhe Xing, SiyaXu , Sidong Zhang , ShaoyongGuo, “Load balancing-based routing optimization mechanism for power communication networks”, IEEE, China Communication, Vol 3, Issue 8, 2016. [15] Xiaonan Wang ; Hongbin Cheng ; Yufeng Yao, “Addressing-Based Routing Optimization for 6LoWPAN WSN in Vehicular Scenario”, IEEE, Sensors Journal, Vol 16, Issue 10, 2016 [16] Markus Leinonen ; Marian Codreanu ; MarkkuJuntti, “Distributed Joint Resource and Routing Optimization in Wireless Sensor Networks via Alternating Direction Method of Multipliers”, IEEE, Transaction on wireless communication, Vol12, Issue 11, 2013. [17] Baolin Sun ; Layuan Li, “A QoS multicast routing optimization algorithm based on genetic algorithm”, IEEE, Journal of communication and networks, Vol 8, Issue 1, 2006 [18]H. Cho ; T. Kwon ; Y. Choi, “Route Optimization Using Tree Information Option for Nested Mobile Networks”, IEEE,Journal on Selected Area of Communication, Vol 24, Issue 9, 2006
  • 7. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 09 ISSUE: 01 | JAN 2022 WWW.IRJET.NET P-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1583 [19] Dimitrios Alanis ; PanagiotisBotsinis ; Zunaira Babar ; Soon Xin Ng ; LajosHanzo, “Non-Dominated Quantum Iterative Routing Optimization for Wireless Multihop Networks”, IEEE, IEEE Access, Vol 3, 2015 [20] Sabyasachi Gupta ; Ranjan Bose, “Energy-efficient joint routing and power allocation optimisation in bit error rate constrained multihop wireless networks”, IEEE, IET Communication, Vol 9, Issue 9, 2015 [21]Jin Woo Jung ; Mary Ann Weitnauer, “On Using Cooperative Routing for Lifetime Optimization of Multi-Hop Wireless Sensor Networks: Analysis and Guidelines”, IEEE, IEEE Transaction on Communication, Vol 61, Issue 8, 2013 [22]Jalal Habibi ; Ali Ghrayeb ; Amir G. Aghdam, “Energy-Efficient Cooperative Routing in Wireless Sensor Networks: A Mixed-Integer Optimization Framework and Explicit Solution”, IEEE, Transaction nad Communication, Vol 61, Issue 8, 2013 [23] EbrahimKarami ; SavoGlisic, “Joint Optimization of Scheduling and Routing in Multicast Wireless Ad Hoc Networks Using Soft Graph Coloring and Nonlinear Cubic Games”, IEEE, Transaction on Vehicular Technology, Vol 60, Issue 7, 2011 [24] Jia Liu ; Y. Thomas Hou ; Yi Shi ; Hanif D. Sherali, “Cross-Layer Optimization for MIMO-Based Wireless Ad Hoc Networks: Routing, Power Allocation, and Bandwidth Allocation”, IEEE journals on selected area in Communication, Vol 26, Issue 6, 2008 [25]Kemal Akkaya and Mohamed Younis,“A survey on routing protocols for wireless sensor networks”, ELSEVIER, Vol 3, Pp 325-349,2003 [26]Palvinder Singh Mann and Satvir Singh, “Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks”, ELSEVIER, Vol. 83, Pp. 40-52, April 2017 [27]Palvinder Singh Mann and Satvir Singh, “Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks”, ELSEVIER, Vol. 57, Pp. 142-152, January 2017 [28]Avinash More and Vijay Raisinghani, “A survey on energy efficient coverage protocols in wireless sensor networks”, ELSEVIER, September 2016 [29]Muhammad Saleem, IsrarUllah and MuddassarFarooq, “BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks”, ELSEVIER, Vol. 200, Pp. 38-56, October 2012 [30]D. Yi and H. Yang, “HEER – A delay-aware and energy-efficient routing protocol for wireless sensor networks”, ELSEVIER, Vol. 104, Pp 155–173, July 2016 [31]Juhi R. Srivastava and T.S.B. Sudarshan, “A genetic fuzzy system based optimized zone based energy efficient routing protocol for mobile sensor networks (OZEEP)”, ELSEVIER, Vol. 37, Pp. 863-886, December 2015 [32]Rakhee and M.B. Srinivas, “Cluster Based Energy Efficient Routing Protocol Using ANT Colony Optimization and Breadth First Search”, ELSEVIER Procedia Computer Science , Vol. 89, Pp. 124-133, 2016 [33]FengXiaa, XuhaiZhaoa, JianhuiZhangb, Jianhua Mac and XiangjieKonga, “BeeCup: A bio-inspired energy- efficient clustering protocol for mobile learning”, ELSEVIER Procedia Computer Science, Vol. 37, Pp. 449-460, July 2014 [34]Du Lijuan, Wang Yuanpeng and Jing WeiPeng, “Wireless Sensor Networks Energy-Efficient MAC Protocol”, ELSEVIER Physics Procedia, Vol. 33, Pp. 444-448, 2012 [35]R.Vadivel. and V. MuraliBhaskaran, “Energy Efficient With Secured Reliable Routing Protocol (EESRRP) For Mobile Ad-Hoc Networks”, ELSEVIER Procedia Technology, Vol. 4, Pp. 703-707, 2012 [36]Jieun Cho, JongwonChoe, Kwanho Song and YongTae Shin, “A routing protocol using relative landmark based on virtual grid in wireless sensor network”, IEEE Information Networking, pp. 1-3, April 2009 [37]Xiaocong Jin, Rui Zhang, Jingchao Sun and Yanchao Zhang, “TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks”, IEEE Transactions On Wireless Communications, vol. 13, no. 8, August 2014 [38]Amir EhsaniZonouz, Liudong Xing, “Hybrid wireless Sensor Networks: A Reliability, Cost and Energy Aware Approach”, IEEE Wireless Sensor Systems, Pp:42-48, 2016 [39]Madhumathy P, Sivakumar D, “Enabling Energy Sensory data Collection using multiple mobile sink”, IEEE, Pp:347-355, 2014 [40]Gulcin Dinc Yalcın, Nihal Erginel, “Fuzzy multi- objective programming algorithm for vehicle routingproblems with backhauls”, Expert Systems with Applications, Volume 42, Issue 13, Pages 5632-5644, 2015