This document presents a new energy-efficient clustering protocol called EEIT2-F LEACH for wireless sensor networks. It uses an interval type-2 fuzzy inference system to select cluster heads, taking into account the residual energy, distance to the base station, and centrality of each node. The proposed protocol runs in set-up and steady-state phases similar to the LEACH protocol. In the set-up phase, cluster heads are selected based on the interval type-2 fuzzy logic system. Simulation results show that the new protocol outperforms existing approaches in terms of energy consumption and extending the network lifetime.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
A multi-hop routing protocol for an energy-efficient in wireless sensor networkIJECEIAES
The low-energy adaptive clustering hierarchy (LEACH) protocol has been developed to be implemented in wireless sensor networks (WSNs) systems such as healthcare and military systems. LEACH protocol depends on clustering the employed sensors and electing one cluster head (CH) for each cluster. The CH nodes are changed periodically to evenly distribute the energy load among sensors. Updating the CH node requires electing different CH and re-clustering sensors. This process consumes sensors’ energy due to sending and receiving many broadcast and unicast messages thus reduces the network lifetime, which is regarded as a significant issue in LEACH. This research develops a new approach based on modifying the LEACH protocol to minimize the need of updating the cluster head. The proposal aims to extend the WSN’s lifetime by maintaining the sensor nodes’ energy. The suggested approach has been evaluated and shown remarkable efficiency in comparison with basic LEACH protocol and not-clustered protocol in terms of extending network lifetime and reducing the required sent messages in the network reflected by 15%, and, in addition, reducing the need to reformatting the clusters frequently and saving network resources.
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
The longevity of the network and the lack of resources are the main problems within the WSN. Minimizing energy dissipation and optimizing the lifespan of the WSN network are real challenges in the design of WSN routing protocols. Load balanced clustering increases the reliability of the system and enhances coordination between different nodes within the network. WSN is one of the main technologies dedicated to the detection, sensing, and monitoring of physical phenomena of the environment. For illustration, detection, and measurement of vibration, pressure, temperature, and sound. The WSN can be integrated into many domains, like street parking systems, smart roads, and industrial. This paper examines the efficiency of our two proposed clustering algorithms: Fuzzy C-means based hierarchical routing approach for homogeneous WSN (F-LEACH) and fuzzy distributed energy efficient clustering algorithm (F-DEEC) through a detailed comparison of WSN performance parameters such as the instability and stability duration, lifetime of the network, number of cluster heads per round and the number of alive nodes. The fuzzy C-means based on hierarchical routing approach is based on fuzzy C-means and low-energy adaptive clustering hierarchy (LEACH) protocol. The fuzzy distributed energy efficient clustering algorithm is based on fuzzy C-means and design of a distributed energy efficient clustering (DEEC) protocol. The technical capability of each protocol is measured according to the studied parameters.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
An energy efficient optimized cluster establishment methodology for sensor n...nooriasukmaningtyas
The compatibility of WSN is with various applications such as; healthcar eand environmental monitoring. Whereas nodes present in that network have limited ‘battery-life’ that cause difficulty to replace and recharge those batteries after deployment. Energy efficiency is a major problem in the present situation. In present, many algorithms based on energy efficiency have been introduced to improvise the conservation of energy in WSN. The LEACH algorithm improvises the network lifetime in comparison to direct transmission and multi-hop, but it has several limitations. The selection of CHs can be randomly done that doesn’t confirm the optimal solution, proper distribution and it lacks during complete network management. The centralized EE optimized cluster establishment approach (OCEA) for sensor nodes is proposed to decrease the average energy dissipation and provide significant improvement. The proposed EE WSN model with the sensor nodes is examined under a real-time scenario and it is compared with stateof-art techniques where it balances the energy consumption of the network and decreasing the cluster head number.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
A multi-hop routing protocol for an energy-efficient in wireless sensor networkIJECEIAES
The low-energy adaptive clustering hierarchy (LEACH) protocol has been developed to be implemented in wireless sensor networks (WSNs) systems such as healthcare and military systems. LEACH protocol depends on clustering the employed sensors and electing one cluster head (CH) for each cluster. The CH nodes are changed periodically to evenly distribute the energy load among sensors. Updating the CH node requires electing different CH and re-clustering sensors. This process consumes sensors’ energy due to sending and receiving many broadcast and unicast messages thus reduces the network lifetime, which is regarded as a significant issue in LEACH. This research develops a new approach based on modifying the LEACH protocol to minimize the need of updating the cluster head. The proposal aims to extend the WSN’s lifetime by maintaining the sensor nodes’ energy. The suggested approach has been evaluated and shown remarkable efficiency in comparison with basic LEACH protocol and not-clustered protocol in terms of extending network lifetime and reducing the required sent messages in the network reflected by 15%, and, in addition, reducing the need to reformatting the clusters frequently and saving network resources.
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
One of the main challenges for researchers to build routing protocols is how to use energy efficiently to extend the lifespan of the whole wireless sensor networks (WSN) because sensor nodes have limited battery power resources. In this work, we propose a Sector Tree-Based clustering routing protocol (STB-EE) for Energy Efficiency to cope with this problem, where the entire network area is partitioned into dynamic sectors (clusters), which balance the number of alive nodes. The nodes in each sector only communicate with their nearest neighbour by constructing a minimum tree based on the Kruskal algorithm and using mixed distance from candidate node to base station (BS) and remaining energy of candidate nodes to determine which node will become the cluster head (CH) in each cluster? By calculating the duration of time in each round for suitability, STB-EE increases the number of data packets sent to the BS. Our simulation results show that the network lifespan using STB-EE can be improved by about 16% and 10% in comparison to power-efficient gathering in sensor information system (PEGASIS) and energy-efficient PEGASIS-based protocol (IEEPB), respectively.
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
The longevity of the network and the lack of resources are the main problems within the WSN. Minimizing energy dissipation and optimizing the lifespan of the WSN network are real challenges in the design of WSN routing protocols. Load balanced clustering increases the reliability of the system and enhances coordination between different nodes within the network. WSN is one of the main technologies dedicated to the detection, sensing, and monitoring of physical phenomena of the environment. For illustration, detection, and measurement of vibration, pressure, temperature, and sound. The WSN can be integrated into many domains, like street parking systems, smart roads, and industrial. This paper examines the efficiency of our two proposed clustering algorithms: Fuzzy C-means based hierarchical routing approach for homogeneous WSN (F-LEACH) and fuzzy distributed energy efficient clustering algorithm (F-DEEC) through a detailed comparison of WSN performance parameters such as the instability and stability duration, lifetime of the network, number of cluster heads per round and the number of alive nodes. The fuzzy C-means based on hierarchical routing approach is based on fuzzy C-means and low-energy adaptive clustering hierarchy (LEACH) protocol. The fuzzy distributed energy efficient clustering algorithm is based on fuzzy C-means and design of a distributed energy efficient clustering (DEEC) protocol. The technical capability of each protocol is measured according to the studied parameters.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
An energy efficient optimized cluster establishment methodology for sensor n...nooriasukmaningtyas
The compatibility of WSN is with various applications such as; healthcar eand environmental monitoring. Whereas nodes present in that network have limited ‘battery-life’ that cause difficulty to replace and recharge those batteries after deployment. Energy efficiency is a major problem in the present situation. In present, many algorithms based on energy efficiency have been introduced to improvise the conservation of energy in WSN. The LEACH algorithm improvises the network lifetime in comparison to direct transmission and multi-hop, but it has several limitations. The selection of CHs can be randomly done that doesn’t confirm the optimal solution, proper distribution and it lacks during complete network management. The centralized EE optimized cluster establishment approach (OCEA) for sensor nodes is proposed to decrease the average energy dissipation and provide significant improvement. The proposed EE WSN model with the sensor nodes is examined under a real-time scenario and it is compared with stateof-art techniques where it balances the energy consumption of the network and decreasing the cluster head number.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Novel reliable and dynamic energy-aware routing protocol for large scale wire...IJECEIAES
Wireless sensor networks (WSN) are made up of an important number of sensors, called nodes, distributed in random way in a concerned monitoring area. All sensor nodes in the network are mounted with limited energy sources, which makes energy harvesting on top of the list of issues in WSN. A poor communication architecture can result in excessive consumption, reducing the network lifetime and throughput. Centralizing data collection and the introduction of gateways (GTs), to help cluster heads (CHs), improved WSN life time significantly. However, in vast regions, misplacement and poor distribution of GTs wastes a huge amount of energy and decreases network’s performances. In this work, we describe a reliable and dynamic with energy-awareness routing (RDEAR) protocol that provides a new GT’s election approach taking into consideration CHs density, transmission distance and energy. Applied on 20 different networks, RDEAR reduced the overall energy consumption, increased stability zone and network life time as well as other compared metrics. Our proposed approach increased network’s throughput up to 75.92% , 67.7% and 9.78% compared to the low energy adaptive clustering hierarchy (LEACH), distributed energy efficient clustering (DEEC) and static multihop routing (SMR), protocols, respectively.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
A Deterministic Heterogeneous Clustering Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol
(CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster
head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to
collect information from target field. On rotation basis, a head-set member receives data from the neighbor
nodes and transmits the aggregated results to the distance base station. This protocol reduces energy
consumption quite significantly and prolongs the life time of sensor network. It is found that CBHRP
performs better than other well accepted hierarchical routing protocols like LEACH in term of energy
consumption and time requirement.
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
Clustering is considered as one of the most prominent solutions to preserve theenergy in the wireless sensor networks. However, for optimal clustering, anenergy efficient cluster head selection is quite important. Improper selectionofcluster heads(CHs) consumes high energy compared to other sensor nodesdue to the transmission of data packets between the cluster members and thesink node. Thereby, it reduces the network lifetime and performance of thenetwork. In order to overcome the issues, we propose a novelcluster headselection approach usinggrey wolf optimization algorithm(GWO) namelyGWO-CH which considers the residual energy, intra-cluster and sink distance.In addition to that, we formulated an objective function and weight parametersfor anefficient cluster head selection and cluster formation. The proposedalgorithm is tested in different wireless sensor network scenarios by varyingthe number of sensor nodes and cluster heads. The observed results conveythat the proposed algorithm outperforms in terms of achieving better networkperformance compare to other algorithms.
Lifetime enhanced energy efficient wireless sensor networks using renewable e...IJECEIAES
In this paper, we consider a remote environment with randomly deployed sensor nodes, with an initial energy of E0 (J) and a solar panel. A hierarchical clustering technique is implemented. At each round, the normal nodes send the sensed data to the nearest cluster head (CH) which is chosen on the probability value. Data after aggregation at CHs is sent to the base station (BS). CH requires more energy than normal nodes. Here, we energize only CHs if their energy is less than 5% of its initial value with the use of solar energy. We evaluate parameters like energy consumption, the lifetime of the network, and data packets sent to CH and BS. The obtained results are compared with existing techniques. The proposed protocol provides better energy efficiency and network lifetime. The results show increased stability with delayed death of the first node. The network lifetime of the proposed protocol is compared to the multi-level hybrid energy efficient distributed (MLHEED) technique and low-energy adaptive clustering hierarchy (LEACH) variants. Network lifetime is enhanced by 13.35%. Energy consumption is reduced with respect to MLHEED-4, 5, and 6 by 7.15%, 12.10%, and 14.975% respectively. The no. of packets transferred to the BS is greater than the MLHEED protocol by 39.03%.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wireless sensor networks
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Novel reliable and dynamic energy-aware routing protocol for large scale wire...IJECEIAES
Wireless sensor networks (WSN) are made up of an important number of sensors, called nodes, distributed in random way in a concerned monitoring area. All sensor nodes in the network are mounted with limited energy sources, which makes energy harvesting on top of the list of issues in WSN. A poor communication architecture can result in excessive consumption, reducing the network lifetime and throughput. Centralizing data collection and the introduction of gateways (GTs), to help cluster heads (CHs), improved WSN life time significantly. However, in vast regions, misplacement and poor distribution of GTs wastes a huge amount of energy and decreases network’s performances. In this work, we describe a reliable and dynamic with energy-awareness routing (RDEAR) protocol that provides a new GT’s election approach taking into consideration CHs density, transmission distance and energy. Applied on 20 different networks, RDEAR reduced the overall energy consumption, increased stability zone and network life time as well as other compared metrics. Our proposed approach increased network’s throughput up to 75.92% , 67.7% and 9.78% compared to the low energy adaptive clustering hierarchy (LEACH), distributed energy efficient clustering (DEEC) and static multihop routing (SMR), protocols, respectively.
Outage performance of downlink NOMA-aided small cell network with wireless po...journalBEEI
This article considers the outage performance of the downlink transmission for a small cell network in a heterogeneous network. Due to mobility and distribution of users, it is necessary to study massive connections and high energy efficiency for such kind of systems. To be an enabler of energy harvesting, a power beacon is helpful to support the base station to send signals to distant users, and wireless power transfer (WPT) is exploited to guarantee the data packets transmission from the power beacon to the base station. To provide massive connections, we propose a novel non-orthogonal multiple access (NOMA) technique combined with WPT to enhance outage performance and latency reduction. Furthermore, we derive outage probability (OP) to characterize the system performance. Simulation results are verified to match well between theoretical and analytical methods, and main parameters are determined to understand how they affect the proposed scheme.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
A Deterministic Heterogeneous Clustering Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol
(CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster
head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to
collect information from target field. On rotation basis, a head-set member receives data from the neighbor
nodes and transmits the aggregated results to the distance base station. This protocol reduces energy
consumption quite significantly and prolongs the life time of sensor network. It is found that CBHRP
performs better than other well accepted hierarchical routing protocols like LEACH in term of energy
consumption and time requirement.
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
Clustering is considered as one of the most prominent solutions to preserve theenergy in the wireless sensor networks. However, for optimal clustering, anenergy efficient cluster head selection is quite important. Improper selectionofcluster heads(CHs) consumes high energy compared to other sensor nodesdue to the transmission of data packets between the cluster members and thesink node. Thereby, it reduces the network lifetime and performance of thenetwork. In order to overcome the issues, we propose a novelcluster headselection approach usinggrey wolf optimization algorithm(GWO) namelyGWO-CH which considers the residual energy, intra-cluster and sink distance.In addition to that, we formulated an objective function and weight parametersfor anefficient cluster head selection and cluster formation. The proposedalgorithm is tested in different wireless sensor network scenarios by varyingthe number of sensor nodes and cluster heads. The observed results conveythat the proposed algorithm outperforms in terms of achieving better networkperformance compare to other algorithms.
Lifetime enhanced energy efficient wireless sensor networks using renewable e...IJECEIAES
In this paper, we consider a remote environment with randomly deployed sensor nodes, with an initial energy of E0 (J) and a solar panel. A hierarchical clustering technique is implemented. At each round, the normal nodes send the sensed data to the nearest cluster head (CH) which is chosen on the probability value. Data after aggregation at CHs is sent to the base station (BS). CH requires more energy than normal nodes. Here, we energize only CHs if their energy is less than 5% of its initial value with the use of solar energy. We evaluate parameters like energy consumption, the lifetime of the network, and data packets sent to CH and BS. The obtained results are compared with existing techniques. The proposed protocol provides better energy efficiency and network lifetime. The results show increased stability with delayed death of the first node. The network lifetime of the proposed protocol is compared to the multi-level hybrid energy efficient distributed (MLHEED) technique and low-energy adaptive clustering hierarchy (LEACH) variants. Network lifetime is enhanced by 13.35%. Energy consumption is reduced with respect to MLHEED-4, 5, and 6 by 7.15%, 12.10%, and 14.975% respectively. The no. of packets transferred to the BS is greater than the MLHEED protocol by 39.03%.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
Similar to EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wireless sensor networks (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wireless sensor networks
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 2672~2680
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2672-2680 2672
Journal homepage: http://ijece.iaescore.com
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering
protocol in wireless sensor networks
Enaam Abd Al-Hussain, Ghaida Abdulrazzaq Al-Suhail
Department of Computer Engineering, College of Engineering, University of Basrah, Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Mar 19, 2021
Revised Oct 9, 2021
Accepted Nov 5, 2021
Improving the network lifetime is still a vital challenge because most
wireless sensor networks (WSNs) run in an unreached environment and offer
almost impossible human access and tracking. Clustering is one of the most
effective methods for ensuring that the relevant device process takes place to
improve network scalability, decrease energy consumption and maintain an
extended network lifetime. Many researches have been developed on the
numerous effective clustering algorithms to address this problem. Such
algorithms almost dominate on the cluster head (CH) selection and cluster
formation; using the intelligent type1 fuzzy-logic (T1-FL) scheme. In this
paper, we suggest an interval type2 FL (IT2-FL) methodology that assumes
uncertain levels of a decision to be more efficient than the T1-FL model. It is
the so-called energy-efficient interval type2 fuzzy (EEIT2-F) low energy
adaptive clustering hierarchical (LEACH) protocol. The IT2-FL system
depends on three inputs of the residual energy of each node, the node
distance from the base station (sink node), and the centrality of each node.
Accordingly, the simulation results show that the suggested clustering
protocol outperforms the other existing proposals in terms of energy
consumption and network lifetime.
Keywords:
Base station
Cluster heads
Cluster members
Energy aware
IT2-fuzzy logic
LEACH
WSN
This is an open access article under the CC BY-SA license.
Corresponding Author:
Enaam Abd Al-Hussain
Department of Computer Engineering, College of Engineering, University of Basrah
Basrah, Iraq
Email: enaam.mansor@uobasrah.edu.iq
1. INTRODUCTION
Recent days have seen significant advances in the area of wireless sensor networks (WSNs). The
implementations of these networks are visible in basic consumer electronic equipment and modern space
technologies. However, many communication protocols were developed under the low energy adaptive
clustering hierarchical (LEACH) protocol [1]–[5] to improve energy consumption efficiency in the WSN
nodes. Different factors such as the network size, the position of the base station (BS), and the initial sensor
node energy will influence the performance of a wireless network. When the energy from sensor nodes is
retained by LEACH, its energy efficiency is still somewhat disadvantaged because of random, faster power
drainage, In particular, smaller nodes per cluster are induced by the unequal distribution of nodes in clusters
and time limit due to the use of the time division multiple access (TDMA) media access control (MAC)
Protocol, Thereby, just one parameter, such as energy in the probabilistic model should not be assumed to
elect the cluster heads (CHs). More criteria such as distance to BS, concentration, centrality, number of
neighbors may be used to select the CHs. But, since there are some complexities in the relationship between
the network lifetime and the other parameters of the sensor nodes, thus many researchers have suggested the
use of optimization algorithms such as bat algorithm (BA), ant colony optimization (ACO), practical swarm
optimization (PSO), flower pollination algorithm (FPA), and swarm intelligence [6]–[12] as an effective
2. Int J Elec & Comp Eng ISSN: 2088-8708
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in … (Enaam Abd Al-Hussain)
2673
approach to reduce the consumed energy in WSNs and thus increase the network lifetime. Meanwhile, other
researchers have also suggested using neuro-fuzzy and deep learning approaches to optimize the cluster-
based routing protocol issues, some of them are: Thangaramya et al. [13] which introduce a new cluster
formation and routing protocol based on the neuro-fuzzy rule for performing efficient routing in LEACH
protocol. Also, Thakur and Sakravdia in [14], proposes an efficient method based on fuzzy deep learning for
improving the reliability of energy irregularity models.
Nevertheless, numerous researchers have emphasized the concept of fuzzy logic (FL) in decision-
making for CH efficiency in WSNs. These approaches are scalable, versatile, and intelligent enough to
spread the load between sensor nodes and eventually improve network lifetime. Among these, recent research
in [15]–[17], They suggested different cluster head (CH) selection algorithms based on type 1 fuzzy logic,
each of which employs effective parameters such as Residual energy, distance to the BS, and others as an
input parameter to the fuzzy inference system to decide on the best solution for choosing the suitable CHs
and cluster formation. Ayati et al. [18] proposed a super CH election scheme using fuzzy logic in three levels
Mamdani inference engine. On the contrary, interval type-2 fuzzy logic was also introduced by some
researchers to assume the decision of uncertain levels to be more efficient than the T1-FL model. For
example, Nayak and Vathasavai [19] proposed a clustering algorithm based on interval type-2 FL model
using the remaining battery power, distance to BS, and concentration as input parameters to fuzzy inference
system (FIS), the simulation results show that it provides better scalability and better network lifetime than
T1-FL LEACH protocol. Several studies in [20]–[22] presented efficient CHs selection methods relying on
T2-FL as a controller for decision making, compared to the traditional LEACH. Such methods can prove a
good quality of services (QoS) of the network performance via improving the residual energy and the
network lifetime.
To achieve the highest QoS performance, this paper presents a new approach that depends on
modifying the threshold equation of the LEACH protocol taking into account the Sugeno IT2-FLC model as
a powerful tool in the election of the optimal number of CHs. Such modified LEACH is so-called energy
efficient based interval type2-Fuzzy LEACH (EEIT2-FLEACH). It can work in two phases, the Set-Up
phase, and the Steady-state phase. The IT2-fuzzy inference system depends on three effective key
parameters: i) residual energy (REN), ii) The node’s distance from the base station (DBS), and iii) the node’s
centrality (CEN). The output represents the chance of choosing the CHs. the proposed protocol efficiently
improves the network lifetime and reduces the energy consumption during its rounds.
The rest of this paper will be structured as follows. Firstly, the network and energy models are
addressed in section 2. In section 3, the proposed protocol is described in detail. Section 4 displays and
discusses the simulation results. Finally, in section 5, the conclusion has been drawn.
2. NETWORK AND ENERGY MODEL
2.1. Network model
The network model is assumed to be a set of sensor nodes (N) distributed uniformly around the
(M X M) interested area, all nodes are stationary (nonmobile), and have the capability to sense, aggregate,
and forward the data to the BS (act as a sink node). Also, they are non-rechargeable and homogeneous in
terms of initial energy. It is presumed that communication links between nodes are symmetric. So that, the
data rate and the energy consumption between any two nodes are symmetric in terms of packet transmission.
On the other hand, the sink node (BS) is also assumed to be nonmobile. Meanwhile, its location is
assumed to be changed in three scenarios (at the center of the network field, at the upper right corner, and out
of the network area) to investigate the impact of BS position on WSN performance. Moreover, in each round
of the proposed protocol, the cluster heads are still selected randomly but with extra IT2-fuzzy logic criteria
to improve the LEACH protocol's CH selection process.
2.2. Radio energy model
Energy consumption is an important factor in designing WSNs protocols. Sensor nodes are highly
energy limited since it consumes energy for sensing data, processing, and wireless communication [23]. In
particular, communication mainly causes higher energy consumption on both sides of the communications
(sender and receiver). Thus, in This paper, we depend on the first-order energy dissipation model (traditional
energy model of LEACH protocol) [24], [25]. However, in this model to transmit the data packet of K bits
along with a distance d from the sender to the receiver, Energy consumption can be estimated using a free
space channel model or a multi-path fading channel as (1):
𝐸𝑇𝑋(𝐾, 𝑑) = {
𝐾 ∗ 𝐸𝑒𝑙𝑒𝑐 + 𝐾 ∗ 𝜀𝑎𝑚𝑝 ∗ 𝑑4
𝑖𝑓 𝑑 ≥ 𝑑0
𝐾 ∗ 𝐸𝑒𝑙𝑒𝑐 + 𝐾 ∗ 𝜀𝑓𝑠 ∗ 𝑑2
𝑖𝑓 𝑑 < 𝑑0
(1)
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2672-2680
2674
where, Eelec indicates the energy consumption per bit of a functioning transmitter or receiver circuitry, K
denotes the data packet length, d is the distance from the transmitter to the receiver, 𝜀𝑓𝑠 and 𝜀𝑎𝑚𝑝 are the
proportional constants of the energy consumption of the transmitting amplifier in the model of the free space
channel.
𝑑0 = (
𝜀𝑓𝑠
𝜀𝑎𝑚𝑝
)
1/2
(2)
And the consumed energy to receive these bits is estimated as (3):
𝐸𝑅𝑋(𝐾) = 𝐸𝑒𝑙𝑒𝑐 ∗ 𝐾 (3)
3. THE PROPOSED PROTOCOL
3.1. Interval type 2-fuzzy inference system (IT2-FIS)
In general, the interval type 2 fuzzy inference system operates in five stages, as seen in Figure 1:
− Fuzzification: a fuzzifier determines the value of inputs depending on the intersection points of
trapezoidal membership functions and generates fuzzy sets.
− Fuzzy rule: it consists of a compilation of 27 IF-THEN rules running in parallel order on fuzzy inputs.
Since IF-THEN rules have several entries, the AND operator is applied with minimum selection to
choose at least three memberships to attain the single output value.
− Aggregation: to merge multiple output values into a single fuzzy set, we used the fuzzy union operator
(OR), which chooses the limit of our fuzzy rule base output to construct the fuzzy output set.
− Type-reduction: the Kuhn–Munkres (KM) algorithm is used to reduce an interval type-2 fuzzy set to an
interval-valued type-1 fuzzy set before defuzzification will take place.
− Defuzzification: the defuzzified value is simply the average of the two-interval end-points produced from
the type reducer.
Figure 1. IT2-fuzzy inference system
To measure the chance of a node being CH, we use three fuzzy inputs and if-then fuzzy rules in our
proposed process. The fuzzy inputs are defined as follows:
− REN: the nodes with high residual energy will have a high chance to be selected as CHs.
− The node’s distance from the base station (DBS): the nodes close to BS will have a high chance to be
selected as CHs. The Euclidean distance calculated of each node from the BS calculated as (4):
𝐷𝐵𝑆𝑖 = √(𝑋𝑖 − 𝑋𝐵𝑆)2 + (𝑌𝑖 − 𝑌𝐵𝑆)2 (4)
− 3- Centrality (CEN): The centrality of the node can be defined as the total of distances from nodes within
a certain range R of the node. Thus, the range R is expressed by (5):
𝑅 = √
𝑀
𝜋𝑁 𝑃
(5)
where M is the sensor space's size, P is the Probability of CHs selection (typically, P=0.05), and N is the total
number of nodes (N=100). Figure 2 explains the concept of node centrality.
𝐶𝐸𝑁 = 𝑑1 + 𝑑2 + 𝑑3 + 𝑑4 + 𝑑5 (6)
4. Int J Elec & Comp Eng ISSN: 2088-8708
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in … (Enaam Abd Al-Hussain)
2675
The node with less centrality has a higher chance to be selected as CH.
Figure 2. Node centrality
In our proposed FLC, three separated parameters (REN, DBS, and CEN) are considered as inputs
for IT2-FIS to select CH's. Each parameter is normalized with the universe set to [0, 1]. Trapezoidal
membership functions are defined for the input linguistic variables as shown in Figures 3(a), 3(b), and 3(c),
respectively. Consequently, the linguistic variables for the input/output MFs with output MFs intervals are
shown in Tables 1 and 2 as well. Meanwhile, each input parameter divides into three levels, so it requires
33
=27 rules listed in Table 3.
(a) (b)
(c)
Figure 3. The MFs of input variables in proposed FIS model (a) MFs of input variable REN, (b) MFs of input
variable DBS, and (c) MFs of input variable CEN
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2672-2680
2676
Table 1. Inputs/output linguistic variables
Parameter Linguistic variable
Residual energy (REN) Low (Low), Medium, (Med), High (Hig)
Distance to BS (DBS) Close (Cls), Average (Avg), Far (Far)
Centrality (CEN) Little (Lit), Approprate (App), Distant (Dst)
Chance Very low (VL), Low (LW), Rather Low (RL)
Low Medium (LM), Medium (MD), High medium (HM)
Rather high (RH), High (HG), Very high (VH)
Table 2. Intervals of output MFs
O/P MFs Intervals
VL 0.0-0.1
LW 0.0-0.4
RL 0.2-0.4
LM 0.4-0.5
MD 0.4-0.7
HM 0.6-0.7
RH 0.7-0.8
HG 0.7-1.0
VH 0.9-1.0
Table 3. Input/output rules
No. REN DBS CEN Chance No. REN DBS CEN
1 Low Cls Lit RL 15 Med Avg Dis
2 Low Cls App LW 16 Med Far Lit
3 Low Cls Dst VL 17 Med Far App
4 Low Avg Lit RL 18 Med Far Dst
5 Low Avg App LW 19 Hig Cls Lit
6 Low Avg Dst VL 20 Hig Cls App
7 Low Far Lit RL 21 Hig Cls Dst
8 Low Far App LW 22 Hig Avg Lit
9 Low Far Dst VL 23 Hig Avg App
10 Med Cls Lit HM 24 Hig Avg Dst
11 Med Cls App MD 25 Hig Far Lit
12 Med Cls Dst LM 26 Hig Far App
13 Med Avg Lit HM 27 Hig Far Dst
14 Med Avg App MD
3.2. Proposed IT2-fuzzy logic-based clustering protocol
EEIT2-F LEACH performs its operation at rounds based on LEACH protocol. Thereby, each round
starts in two phases: set-up phase and steady-state phase.
− The set-up phase provides a selection for the CHs based on the IT2-FIS. The BS sends a request for ID,
residual energy, distance to BS, and the Centrality for each sensor node in the network and waits for a
response from the sensor nodes (SN). Once these values are received from the sensors, a CHs chance is
calculated by the BS according to the modified threshold equation together with a fuzzy chance, which is
defined as (7):
𝑇(𝑛) = {
𝑃
1−𝑃(𝑟 𝑚𝑜𝑑 1 𝑃
⁄ )
+
𝐸𝑠
𝐸𝑖
∗ 𝑃 𝑖𝑓𝑛 ∈ 𝐺
0 𝑂𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(7)
where P denotes the desired percentage of CHs, r represents the current round's number, n is the number
of sensor nodes (SNs), G is the set of nodes that have not become CH within the last 1/p rounds, Es, and
Ei are the current energy of the sensor node, and Initial Energy of the sensor node respectively, and 1/P
indicates the expected number of nodes in a cluster. As the CHs are elected, each CH sends advertisement
(ADV) messages to all sensor nodes to join it. and based on the strength of the received signal (RSSI), the
sensor nodes join its CH.
− In the Steady-State phase each CH makes a TDMA schedule based on the number of Cluster Members
(CMs), and each SN sends its data packet within its time slot. The selected CHs gather the information
from their CMs and transmits it to the BS. Algorithm 1 describes the general steps of the EEIT2-F
LEACH. Thus, the General Flowchart of EEIT2-F LEACH Protocol can be obtained as in Figure 4.
6. Int J Elec & Comp Eng ISSN: 2088-8708
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in … (Enaam Abd Al-Hussain)
2677
Algorithm 1. The Proposed EEIT2-F LEACH
Begin:
The BS sends a request for ID, residual energy, distance to BS, centrality for each sensor
node in the network and waits for a response from the sensor nodes.
Define REN, DBS, and CEN as inputs to IT2-FIS to produce a fuzzy chance.
Select CH based on the following criteria:
If (rand (0,1) < T(n) & Chance >=Q) then the node is selected as a CH.
Otherwise, the node is selected as a CM.
T(n) represents the threshold value of LEACH protocol which was modified by adding (Es/Ei)
to avoid the random selection of the CHs in the set-up phase and Q is the fuzzy threshold
value (0.5).
𝑇(𝑛) = {
𝑃
1 − 𝑃(𝑟 𝑚𝑜𝑑 1 𝑃
⁄ )
+
𝐸𝑠
𝐸𝑖
∗ 𝑃 𝑖𝑓𝑛 ∈ 𝐺
0 𝑂𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
For each CH
Sends advertisement (ADV) messages to all sensor nodes to join it.
Based on the strength of the received signal (RSSI), the sensor nodes join its CH.
Makes a TDMA schedule based on the number of CMs
CH collects the data from its CMs and sends it to the sink (BS)
End For
End
Figure 4. The general flowchart of EEIT2-FLEACH protocol
Start
BS Sends request for ID, Residual
Energy (REN), Distance to BS
(DBS), Centrality (CEN)
Select CH based on the fuzzy chance
Produced from FIS and the new
Criteria of LEACH CH Probability
Send CHs information to the
network
Collect data from CHs
End
Yes
All N nodes
are dead?
NO
Wait information about
CHs
Node is CH?
Yes No
CH Sends ADV
message to all
SNs to join it
Each SN send join
message based on
the strength of the
received signal
Form TDMA
schedule based on
the number of CMs
Sends Request
&wait for TDMA
slot
Collect data
from CMs
Each SN sends the
sensed data within its
time slot
Wait information from the SN i
(Packet that contains ID, REN,
DBS, CEN)
If the Both Conditions are satisfied, the SN is
classified as a Cluster Head (CH). Otherwise,
the SN acts as a member. Repeat the procedure
for each node
Define REN & DBS, CEN as Inputs
to FIS to produce a fuzzy cost
(chance)
All the sensor nodes are
deployed uniformly
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2672-2680
2678
4. RESULTS AND DISCUSSION
In this section, the efficiency of our proposed EEIT2-F LEACH protocol was assessed using the
MATLAB simulation tool. The proposed protocol was tested using the simulation parameters in Table 4.
Moreover, the results obtained are contrasted with the traditional LEACH protocol.
Table 4. Simulation parameters
Parameters Value Parameters Value
Network Size 100×100 m2
Eelec 50 nJ/bit
No. of Nodes 100 εamp 0.0013 PJ/bit/m4
Percentage of CHs 0.1 εfs 10 PJ/bit/m2
Location of BS 50×50 m Simulation time 3000 s
Node distribution Random Hello Packet Size 25 Bytes
Initial Energy 1 Joule Data Packet Size 2000 Bytes
4.1. Experimental case I
Figure 5 shows the first node dead (FND), half nodes dead (HND), and last node dead (LND). The
results reveal that the EEIT2-F LEACH protocol outperforms the LEACH in terms of FND, HND, and LND
by 49.98%, 48%, and 49.8%, respectively. Now, Figure 6 illustrates the significant increase in the network
lifetime after the first 20% of nodes are dead nodes up to 3073, while the LEACH Lifetime is limited to
1452.
Figure 5. FND, HND, and LND of EEIT2-F LEACH Figure 6. The lifetime of EEIT2-F LEACH
In addition, the average consumed Energy was examined in Figure 7. In LEACH protocol, the
consumption becomes nearly 68.16% of the sensor energy during the first 1500 rounds; while the proposed
protocol consumed just 45% of the sensor energy. Furthermore, Figure 8 also depicts the average energy of
all sensors in EEIT2-F LEACH that can efficiently save 54.91% of the energy at 1500 rounds compared to
energy savings of 31.9% for LEACH protocol.
Figure 7. Consumed energy of EEIT2-F LEACH Figure 8. Average energy of EEIT2-F LEACH
8. Int J Elec & Comp Eng ISSN: 2088-8708
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in … (Enaam Abd Al-Hussain)
2679
4.2. Experimental case 2
This experiment represents the performance evaluation of EEIT2-F LEACH based on three
scenarios. To address the effect of changing the BS location (position) on the overall network performance:
scenario 1: BS at (50, 50), scenario 2: BS at (100, 100), and scenario 3: BS at (50, 175). The tests of these
scenarios are performed with 100 sensors distributed uniformly over 100×100 m2
, and all of the sensors are
homogeneous with initial energy equal to 0.5 Joule. The obtained results:
− Figure 9 in scenario 1. The values of FND, HND, and LND are 66.4%, 19.95%, and 12% superior to
scenario 2. While it is 54.4%, 21.51%, and 16% superior to scenario 3 in terms of FND, HND, and LND
respectively.
− Figure 10 displays the network lifetime of scenario 1 increased by 37%, 37.86% compared to scenarios 2
and 3.
Figure 9. FND, HND, and LND in three scenarios Figure 10. Network lifetime in three scenarios
5. CONCLUSION
This paper has proposed a new approach for the application of the IT2-fuzzy scheme to improve
sensor node performance in WSNs and to compare them to the LEACH. Within this methodology, utilizing
interval type-2 fuzzy logic supported in dealing with the uncertainties that prevailed in WSN environments.
The simulation results demonstrate that the proposal efficiently minimizes energy consumption, resulting in
energy savings in network nodes and an improvement in the expected network lifetime. Notice that the
results of the three scenarios related to the BS location obviously show that the BS location at the center of
the network area (scenario 1) has more efficient effect on the proposed protocol than the other two scenarios
in terms of the network lifetime, and the corresponding FND, HND, and LND. For future improvement, the
intelligent algorithms such as FPA, grey wolf optimizer (GWO), ant colony optimization (ACO), artificial
bee colony (ABC) algorithms can be employed to improve the routing strategy in sensor networks.
REFERENCES
[1] Y. Liu, Q. Wu, T. Zhao, Y. Tie, F. Bai, and M. Jin, “An improved energy-efficient routing protocol for wireless sensor networks,”
Sensors, vol. 19, no. 20, Oct. 2019, doi: 10.3390/s19204579.
[2] I. Daanoune, B. Abdennaceur, and A. Ballouk, “A comprehensive survey on LEACH-based clustering routing protocols in
wireless sensor networks,” Ad Hoc Networks, vol. 114, Apr. 2021, doi: 10.1016/j.adhoc.2020.102409.
[3] W. Abushiba, P. Johnson, S. Alharthi, and C. Wright, “An energy efficient and adaptive clustering for wireless sensor network
(CH-leach) using leach protocol,” in 2017 13th International Computer Engineering Conference (ICENCO), Dec. 2017,
pp. 50–54, doi: 10.1109/ICENCO.2017.8289762.
[4] A. A. Hussien, S. W. Al-Shammari, and M. J. Marie, “Performance evaluation of wireless sensor networks using LEACH
protocol,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 1, pp. 395–402, Jul. 2020,
doi: 10.11591/ijeecs.v19.i1.pp395-402.
[5] R. Zagrouba and A. Kardi, “Comparative study of energy efficient routing techniques in wireless sensor networks,” Information,
vol. 12, no. 1, Jan. 2021, doi: 10.3390/info12010042.
[6] Z. Cui, Y. Cao, X. Cai, J. Cai, and J. Chen, “Optimal LEACH protocol with modified bat algorithm for big data sensing systems
in internet of things,” Journal of Parallel and Distributed Computing, vol. 132, pp. 217–229, Oct. 2019, doi:
10.1016/j.jpdc.2017.12.014.
[7] N. Sharma and V. Gupta, “Meta-heuristic based optimization of WSNs energy and lifetime-a survey,” in Proceedings of the
Confluence 2020 - 10th International Conference on Cloud Computing, Data Science and Engineering, Jan. 2020, pp. 369–374,
doi: 10.1109/Confluence47617.2020.9058294.
[8] M. A. Tamtalini, A. E. B. El Alaoui, and A. El Fergougui, “ESLC-WSN: a novel energy efficient security aware localization and
clustering in wireless sensor networks,” in 1st International Conference on Innovative Research in Applied Science, Engineering
and Technology (IRASET), Apr. 2020, pp. 1–6, doi: 10.1109/IRASET48871.2020.9092203.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2672-2680
2680
[9] G. Devika, D. Ramesh, and A. G. Karegowda, “Swarm intelligence–based energy‐efficient clustering algorithms for WSN:
overview of algorithms, analysis, and applications,” Swarm Intelligence Optimization. Wiley, pp. 207–261, Dec. 2020, doi:
10.1002/9781119778868.ch12.
[10] Deepshikha, P. Arora, and Varsha, “Enhanced NN based RZ leach using hybrid ACO/PSO based routing for WSNs,” in 2017 8th
International Conference on Computing, Communication and Networking Technologies (ICCCNT), Jul. 2017, pp. 1–7, doi:
10.1109/ICCCNT.2017.8203901.
[11] T. Shankar, T. James, R. Mageshvaran, and A. Rajesh, “Lifetime improvement in WSN using flower pollination meta heuristic
algorithm based localization approach,” Indian Journal of Science and Technology, vol. 9, no. 37, Oct. 2016, doi:
10.17485/ijst/2016/v9i37/102117.
[12] C. Patra, S. Biswas, and S. Mullick, “Effect of different optimization methods in determining the clusterheads in wireless sensor
network,” in 2018 5th International Conference on Signal Processing and Integrated Networks, SPIN 2018, Feb. 2018,
pp. 497–502, doi: 10.1109/SPIN.2018.8474124.
[13] K. Thangaramya, K. Kulothungan, R. Logambigai, M. Selvi, S. Ganapathy, and A. Kannan, “Energy aware cluster and neuro-
fuzzy based routing algorithm for wireless sensor networks in IoT,” Computer Networks, vol. 151, pp. 211–223, Mar. 2019, doi:
10.1016/j.comnet.2019.01.024.
[14] Y. S. Thakur and D. K. Sakravdia, “An improved reliability on wireless sensor network for energy irregularity models using fuzzy
deep learning protocol: FLDP,” International Journal of Scientific and Technology Research, vol. 9, no. 1, pp. 4384–4389, 2020.
[15] R. Logambigai and A. Kannan, “Fuzzy logic based unequal clustering for wireless sensor networks,” Wireless Networks, vol. 22,
no. 3, pp. 945–957, Apr. 2016, doi: 10.1007/s11276-015-1013-1.
[16] S. H. Abbas and I. M. Khanjar, “Fuzzy logic approach for cluster-head election in wireless sensor network,” International Journal
of Engineering Research and Advanced Technology, vol. 5, no. 7, pp. 14–25, 2019, doi: 10.31695/ijerat.2019.3460.
[17] S. Lata, S. Mehfuz, S. Urooj, and F. Alrowais, “Fuzzy clustering algorithm for enhancing reliability and network lifetime of
wireless sensor networks,” IEEE Access, vol. 8, pp. 66013–66024, 2020, doi: 10.1109/ACCESS.2020.2985495.
[18] M. Ayati, M. H. Ghayyoumi, and A. Keshavarz-Mohammadiyan, “A fuzzy three-level clustering method for lifetime
improvement of wireless sensor networks,” Annals of Telecommunications, vol. 73, pp. 535–546, Aug. 2018, doi:
10.1007/s12243-018-0631-x.
[19] P. Nayak and B. Vathasavai, “Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy
logic,” IEEE Sensors Journal, vol. 17, no. 14, pp. 4492–4499, Jul. 2017, doi: 10.1109/JSEN.2017.2711432.
[20] K. M. Ramya and S. N. Hanumanthappa, “Cluster head enhance selection using type-II fuzzy logic for multi-hop wireless sensor
network,” in Lecture Notes on Data Engineering and Communications Technologies, vol. 38, 2020, pp. 11–24.
[21] J. C. Cuevas-Martinez, A. J. Yuste-Delgado, and A. Trivino-Cabrera, “Cluster head enhanced election type-2 fuzzy algorithm for
wireless sensor networks,” IEEE Communications Letters, vol. 21, no. 9, pp. 2069–2072, Sep. 2017, doi:
10.1109/LCOMM.2017.2703905.
[22] V. K. Alla and M. Mallikarjuna, “Routing protocol based on bacterial foraging optimization and type-2 fuzzy logic for wireless
sensor networks,” in 2020 11th International Conference on Computing, Communication and Networking Technologies
(ICCCNT), Jul. 2020, pp. 1–6, doi: 10.1109/ICCCNT49239.2020.9225436.
[23] J.-S. Lee and C.-L. Teng, “An enhanced hierarchical clustering approach for mobile sensor networks using fuzzy inference
systemss,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 1095–1103, Aug. 2017, doi: 10.1109/JIOT.2017.2711248.
[24] Y. Zhou, H. Zhang, L. Zhang, B. Tang, and Y. Liu, “LEACH-FIS: an improved leach based on fuzzy inference system in WSNs,”
in 2018 IEEE/CIC International Conference on Communications in China (ICCC), Aug. 2018, pp. 699–703, doi:
10.1109/ICCChina.2018.8641089.
[25] M. Radhika and P. Sivakumar, “Energy optimized micro genetic algorithm based LEACH protocol for WSN,” Wireless Networks,
vol. 27, no. 1, pp. 27–40, Jan. 2021, doi: 10.1007/s11276-020-02435-8.
BIOGRAPHIES OF AUTHORS
Enaam Abd Al-Husain received her B.Sc. degree in Computer Engineering
from the Department of Computer Engineering, College of Engineering, University of
Basrah, Iraq, in 2017. Currently, she is pursuing the M.Sc. degree at the same university.
Her current research interests include Wireless Sensor Networks, Internet of Things,
Cluster Based Routing Protocols, Simulation, Energy Consumption Optimization, Fuzzy
Logic system, and Intelligent Algorithms. She can be contacted at email:
enaam.mansor@uobasrah.edu.iq and enaam.alhusain@gmail.com.
Ghaida Abdulrazzaq Al-Suhail received her B.Sc., M.Sc., and Ph.D. degrees
in Electrical Engineering in 1984, 1989, and 2007, respectively all at University of Basrah
in Iraq. She became an Assistant Professor in 1996. Currently, she is a Full Professor at the
Department of Computer Engineering, College of Engineering, University of Basrah in
Iraq. Her current research interests include Multimedia Communications, Wireless
Networks, Cross-layer Design, Internet of Things, Routing Protocols in Ad hoc and Sensor
Networks, Chaotic Radars, and Optical Communications. She was a Fulbright Scholar in
2011 at the Michigan State University (MSU), USA, and Endeavour Fellowship Scholar in
2009 at the Australian National University (ANU), RSISE, Australia. She has published
several papers in prestigious International Journals and Conferences. She can be contacted
at email: ghaida.suhail@uobasrah.edu.iq.