Skip to main content
Computational Intelligence and Neuroscience logoLink to Computational Intelligence and Neuroscience
. 2022 Aug 13;2022:5393251. doi: 10.1155/2022/5393251

Optimization of Leach Protocol in Wireless Sensor Network Using Machine Learning

S Ramesh 1, R Rajalakshmi 2, Jaiprakash Narain Dwivedi 3, S Selvakanmani 4, Bhaskar Pant 5, N Bharath Kumar 6, Zelalem Fissiha Demssie 7,
PMCID: PMC9392616  PMID: 35996654

Abstract

The Wireless Sensor Network is a network formed in areas human beings cannot access. The data need to be sensed by the sensor and transferred to the sink node. Many routing protocols are designed to route data from a single node to the sink node. One of the routing protocols is the hierarchical routing protocol, which passes on the sensed data hierarchically. The Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the hierarchical methods in which communication happens in two steps: the setup phase and the steady-state phase. The efficiency of the LEACH has to be optimized to improve the network lifetime. Therefore, the k-means clustering algorithm, which comes under the unsupervised machine learning method, is incorporated with the LEACH algorithm and has shown better results. But the selection of cluster head needs to improvise because it will transfer the summed-up data to the sink node, so it is to be efficient enough. So, this paper proposes the modified k-means algorithm with LEACH protocol for optimizing the Wireless Sensor Network. In the modified k-means algorithm, the weight of the cluster head is tested and elected, and the clusters are formed using the Euclidean distance formula. The proposed work yields 48.85% efficiency compared to the existing protocol. It is also proven that the proposed work showed more successful data transfer to the sink node. The cluster head selection process elects the more efficient node as the head with less failure rate. The proposed work optimistically balanced the whole network in terms of energy and successful data transfer.

1. Introduction

The remotely controlled systems are greatly helping today's technology to grow. One such system is Wireless Sensor Network [1]. This network is formed by tiny sensors made to be in different positions in a scalable area. Those sensors are very tiny, battery-powered, and capable of gathering the information from their sensing area [2]. These nodes will communicate with each other through simple message exchanges. The sensors need to sense the information, transmit the gathered information, and request acknowledgement [3]. The data collected by nodes should be successfully transmitted to the central station for further processing [4]. This network's main usage is for forest, surveillance, aquaculture, mountain areas, etc. The transmission of information gathered and the usage of energy by the sensors are a very important parameter for increasing the lifetime of the Wireless Sensor Networks [5]. The resilience of the nodes or motes that have been used is an important criterion. The motes used may be movable or static. Many advancements are taking place in the hardware area of the sensor [6]. But proper protocols will help the sensors to transfer the data successfully and efficiently utilize energy for transferring and sensing the data. One such protocol is routing protocol, where the routing of information from one node to another and from nodes to central stations can take place following certain rules [7]. There are many routing protocols like data-centric routing protocol, hierarchical routing protocol, source-initiated routing protocol, destination-initiated routing protocol, location-based routing protocol, etc. [8]. Praveen Kumar et al. surveyed different machine learning methods used in the Wireless Sensor Networks for different purposes. Machine learning helps the sensor detect and send information according to the data sets already trained. So, machine learning schemes play a major role in Wireless Sensor Networks. All the routing protocols and many types of research were carried out in hierarchical protocols because it is a simple and economical way of processing the information [9].

Vishwakarma [10] discussed the principle of the LEACH algorithm which comes under the hierarchical routing protocol which has clusters formed in the scalable networks in which certain nodes will act as cluster heads, and other nodes will act as normal. The normal nodes collect information and transmit it to the cluster head. The cluster head will transmit the data gathered from all the nodes and send it to the central node [10]. Aziz and Arioua [11] used a hybrid k-means unsupervised algorithm in the clustered Wireless Sensor Network which trains the nodes with previous data collected and transmits the data from one cluster to another and so on [11]. The approach is for coordinating the movement of multiple sinks which are mobile through a central coordination point. To reduce the message overheads of storing the information of the prior sink movement path, they proposed another mechanism that proved to be energy efficient through simulations. The multiple MS path navigation algorithm for the multiple MS had maximum network coverage. The modified movement pattern was simulated and compared against existing protocols to prove the validity of the modified algorithm in terms of lifetime. A stable and energy-efficient data gathering approach uses mobile sinks for time-critical applications. According to the author, the speed at which the mobile sin moves is critical for data gathering for emergency applications. The modified protocol was validated by comparing it against competent protocols in the literature.

This research proposes the modified k-means unsupervised machine learning method in the LEACH routing protocol to enhance its life and optimize the network capacity.

2. Leach Routing Protocol

LEACH is the Low Energy Adaptive Clustering Hierarchical routing protocol. The main aim of this protocol is to keep the balanced weightage among all the nodes. It maintains the hierarchy by maintaining three members named sink, cluster head, and cluster nodes. The sink is the central station which receives the information from all the nodes and uses it for further processing [12]. The cluster head is the node randomly selected among the nodes with the criteria that it should not be selected more than once as a cluster head. This criterion is maintained to avoid the overloads for the same node once again. With its limited scalability, the cluster head selects the nodes within it. The cluster does this by sending the request messages to its nearby nodes. The nodes that send the acknowledgement back to the cluster head are added to its cluster. The cluster nodes play to sense the data from where it is deployed and transmit it to the cluster head, which goes to the sleep mode. The cluster head will wait for the information from all the nodes it added to its cluster network.

After receiving the information, the cluster head starts to aggregate the information and send the aggregated information to the sink node [13]. Few researchers conducted a detailed survey of the different mobility models in WSNs. The work proposed in this paper provided researchers with an insight into the available mobility models and their properties. According to the authors, each sink mobility model has its own properties. A categorization of the mobility models based on their general behaviour was also given in this paper. The basic categories mentioned are homogeneous mobility model and heterogeneous mobility model. Subcategories like controlled mobility, random mobility, totally and partially random mobility, predictable mobility, and geographic mobility were also mentioned.

Two phases occur in the LEACH protocol: the setup and steady-state phases. In the cluster head's setup phase, the cluster node's selection is made by the particular cluster head. In the steady-state phase, the transfer of information from the node to the cluster head and aggregated data from the cluster head to the sink node will occur [14]. The advantage of this LEACH protocol is a balanced workload among the nodes, fault tolerance, an easy and simple approach, an economical, easy manipulation process, etc. [15]. The main drawback of this approach is that the work in cluster head is overloaded because its capacity should be high enough to receive the data and send those data to the sink node; the cluster head will waste more energy if it is far away from the sink node; the cluster head is randomly selected which may not have enough energy to receive, aggregate, and transmit the data to the cluster head if the cluster head dies the information gathered by the nodes that are fully lost which leads to poor energy management; the overheated process will take place; the lifetime of the cluster head will reduce once it acts as the head; it may be exhausted fast, etc. [16]. Therefore, many advancements in the LEACH protocol were carried out differently. One of the best approaches is using machine learning algorithms in the LEACH protocol. Both supervised and unsupervised algorithms were used and studied. With the help of the data sets, the nodes are working smart and reducing the overhead.

3. Proposed LEACH Algorithm

This paper proposes a new method of using modified k-means machine learning with the LEACH routing protocol. The k-means algorithm is a grouping of elements based on the centroids calculated [17]. The centroids are calculated using Euclidean methods. The k number of the cluster is formed by categorizing the nearest value of the neighbours. At first, the points are selected randomly. Later using the iterative method, the centroids are found and the clusters are formed. It is quite simple to manipulate. In Wireless Sensor Network, k-means algorithms are used in the LEACH algorithm by forming clusters by choosing the cluster head with the help of centroids [18]. At first, the cluster head is chosen randomly by calculating the Euclidean distance and the cluster head is selected [19]. The selection of unsupervised learning is involved because the Wireless Sensor Network cannot be manipulated with the existing data set because the sensors are deployed only in the area where the human being is unaware.

In the proposed work, the cluster head is selected depending on the weightage assigned to the nodes. The weightage of the nodes is assigned according to the 'energy level of the particular sensor node. So the cluster head, along with the Euclidean distance, also has to satisfy the energy weightage. The cluster head is elected only if it is above the weightage parameter fixed. The main aim of fixing the weightage of the node is that it should be able to manage the work of the cluster head. The energy required to transmit the aggregated data needs to be calculated [20].

The energy required for the cluster head is

ECH=nkEelec+Efsd2for d<0,ECH=nkEelec+Eampd4for d0. (1)

Here ECH is the energy required by the cluster headn is the number of nodes assigned for the cluster, k is the number of message bits, Eelec is the energy required for sending and receiving the data bit, £fs and £amp are the parameter for calculating the L-bit message transmitting over free space multipath propagation, d is the transmitting distance towards the sink node.

The equation can represent the cluster head election using the k-means algorithm:

f=c=1mygcyihc2. (2)

F is the function of the k-means algorithm, c is the number of clusters, y is a mote of the cluster, and h is the head to be elected.

The Euclidean distance can be given by

dyi,hc=yihc2. (3)

d is the Euclidean distance of the nodes in the cluster.

In (2), the application of the k-means algorithm in the LEACH protocol is explained. Equation (3) tells the cluster formation using the Euclidean distance formula.

4. Results and Discussions

The proposed work is simulated using the parameters given in Table 1. The network area of 10000 m is taken where the 100 nodes were deployed. The initial node energy assigned to all the sensor nodes is considered 0.5 J. For the transmission and reception process, the sensor hardware needs 50 nJ energy [21]. The communication needs to be in free space or through multipath which is selected using the value d; accordingly, the value of £fs or £amp is selected. The energy consumed for the aggregation of data is taken as 5 nJ. With these parameters, the network is formed, and the connection between the nodes and the sink is established. Now, the LEACH algorithm is applied in the first round. From the second round, the cluster head was elected using the k-means algorithm, and weightage was calculated. Nearly 5000 rounds are simulated, and the nodes' energy is a routing protocol especially to reduce the energy consumption and balance the network energy. They used clustering and data filtering within the CHS. An application of the proposed protocol where the urban buses carry the mobile sinks was also explained [22]. This application was able to achieve maximum energy balance, connectivity, and throughput.

Table 1.

Simulation parameters.

Simulation values Values
Network area 100100 m
Position of the BS (50, 50)
Number of nodes deployed 100
Initial node energy 0.5 J
Message size 4000 bits
Number of rounds 5000
Transmission amplifier free space, £fs 10 pJ/bit/m2
Transmission amplifier multipath, £amp 0.0013 pJ/bit/m4
Transmitting energy 50 nJ
Receiving energy 50 nJ
Aggregated data energy 5 nJ/bit/msg

Figure 1 shows the simulation of the number of rounds versus the alive nodes. It is seen from the graph that simulation is taken for 5000 rounds for deployed 100 nodes. In the proposed work, after 950 rounds, the node energy is exhausted and dead. But in the existing protocol, the node death starts at 495 rounds itself [23]. The proposed work nodes are exhausted gradually compared to the existing algorithm. The presence of alive nodes is still 4555 rounds whereas for the existing algorithm, the system's total energy is exhausted at 2495 rounds itself. Figure 1 therefore proves that the proposed work enhanced the lifetime of the Wireless Sensor Network [24]. Therefore, the network's lifetime is increased by 45% compared to the existing algorithm. From Figure 1, it is seen that after 1000 rounds the alive nodes are decreasing but it is not the sudden fall as an existing method. In the proposed work due to the allowable loads given to the nodes, the work efficiency and the duration of life of every single node are increased. Therefore, the conclusion can be made that, due to iterations, training, and weightage factor, the energy of the whole network is optimally used. Therefore, the Wireless Sensor Network optimization is done through the proposed work. The cluster head selected based on its energy level helps all the nodes act as cluster head as well, and all nodes efficiently utilize its energy-packed up. It is seen that 48% of nodes were alive compared to the proposed work [25].

Figure 1.

Figure 1

Number of rounds versus alive nodes.

Figure 2 shows the simulation results of the number of rounds versus dead nodes for the proposed work. It is seen that it is the reverse calculation of Figure 1. The plot for this is to know the increase in the dead nodes during the number of nodes. From the analysis, it is seen that nearly 1 or none of the nodes were dead at many of the rounds. Approximately there is a depth of 5 to 6 nodes every 200 rounds after the death of the first node is calculated. Therefore, the node that acted as cluster head seems to be less dead. If the cluster head is not exhausted, the data collected from other nodes from the cluster are safely transmitted to the sink node [26]. Therefore, the energy weightage proposed helps the cluster save its energy for future use and prolong its lifetime in the network. The 100th node death happened at 4555 rounds. Therefore, the whole network was actively working till 3000 rounds. After that, 25% of the nodes were dead, making the network efficiency a little less. Therefore, the proposed work optimized the whole network [27].

Figure 2.

Figure 2

Number of rounds versus dead nodes.

Figure 3 shows the simulation result of the number of rounds versus packets to the base station. Initially, 4000 bits were assigned for the node transmission. It is seen that nearly 310 kBps data were transmitted. Moreover, it is noticed that the data were successfully transmitted to the base station. Therefore, 77% of the data assigned to each sensor node were used and successfully transmitted to the sink node [28]. The cluster head selection with a good energy level plays a major role in successfully transmitting data packets. If the cluster head without sufficient energy was selected, it might not have the energy to aggregate and transmit data to the sink node. It leads to the loss of data and also the loss of the energy of the nodes present in that cluster [29]. Therefore, the proposed work optimally used all nodes and collected the sensed data efficiently [30]. The concept of BS mobility to extend the network lifetime provided theoretical results for the optimal movement of a BS where the transformation of the entire routing from the time domain to the space domain is given. An optimal period of the BS at specific points to increase the overall efficiency is found, and based on this, an approximation algorithm or routing was also developed [31].

Figure 3.

Figure 3

Rounds versus packets to BS.

The packets to BS are ten times the packets to the CH. This is because an average of 10 cluster heads will be elected in every round. Those ten cluster heads transfer data to the sink node. The problem related to the energy hole formation near the sinks was addressed by many researchers [32]. The energy holes near the sink partition the network and threaten the network's lifetime. The authors modified sink mobility to solve this problem [21]. They studied the network performance when the sink moves through predefined paths and stops at specific locations. This process achieved up to 4.86 times improvement in the network lifetime [33]. They also modified an algorithm wherein the sink can predict its next movement and presented simulation results to verify this approach [34].

Data delivery latency influenced the speed of the mobile sink. In a real-time scenario, mobile sink speed is restricted due to many factors. A solution for the same by choosing an optimal path as well as minimizing the energy consumption was proposed in this work. Theoretical analysis and simulation experiments were performed to validate the same in terms of energy consumption with existing algorithms [35].

Figure 4 shows the number of rounds versus the number of cluster heads elected. From the plot, it is seen that till the 1000 rounds, there were nearly 20 cluster heads elected for every round. After the 1000 rounds, the number of clusters elected is reduced and gradually decreases due to the reduction in energy level. It is also seen that the cluster head was present till 4500 rounds and after the cluster head selection is stopped. It shows that the nodes with proper weightage are only elected as cluster heads [36]. The nodes selected as cluster heads have sufficient energy to be elected, meaning nearly 10 nodes passed this threshold value in every round. Therefore, the node's energy was balanced, making it use its energy throughout the network lifetime [37].

Figure 4.

Figure 4

Rounds versus number of cluster heads elected.

Nearly ten nodes were elected as cluster heads in every round, which shows that all the nodes deployed in the network were given a role to act as cluster heads more than a time. A reliable and energy-efficient clustering algorithm was proposed by switching the roles of CHs, which focussed on predicting the CHs and controlling power levels. Balancing load among the sensors was also taken care of, leading to increased lifetime. They introduced a new formula for the probability of CH selection and the CH competition, which resulted in lifetime enhancement compared to LEACH. It gives an overview of the various energy-efficient clustering protocols. The authors highlighted the pros and cons of each protocol [35].

Figure 5 shows the number of packets to the cluster head versus several rounds. It shows the number of bits transmitted by the nodes to the cluster head for further transmission. It is seen that till 4000 rounds, 3.5 Mbps data packets were transmitted to all the nodes elected as cluster heads. Therefore, the cluster head efficiently used the k-means algorithm for forming the cluster and connecting the nodes to it. As the rounds increased, the data packets also increased gradually, showing the successful data transfer link between the cluster head and nodes. While using the proposed work, the cluster heads were effectively elected and the cluster head performed its role more efficiently. After aggregating and removing the same data obtained from the nodes, the cluster head transfers to the base station. If more cluster heads are elected, a greater number of clusters are formed, which leads to an overlap of information, and the energy of the nodes will get wasted. Therefore, the proposed work in every round approximately elects 10 cluster heads, forming nearly 10 clusters with nine nodes [38]. Therefore, it helps the cluster head efficiently form the network link and receive the data from the node in its Euclidean distance.

Figure 5.

Figure 5

Rounds versus packets to CH.

Figure 6 shows the plot of several nodes versus the energy consumption. It is known that 0.5 J energy is assumed for every node deployed. The above simulation is done for a single round. It is seen that nearly 10 microjoules of energy were spent by the whole every single round. Therefore, considering all the node's energy will be 50 J, only 10 microjoules of energy is spent in every round. Therefore, this is how the proposed work increased the network lifetime of the Wireless Sensor Network. Therefore, at 4000 rounds and total 50 joules of energy of all the nodes will be exhausted. It is seen that 10 microjoules of energy is used for a single round; therefore, for 4000 rounds, it will approximately come around 0.4 J of energy, equivalent to the energy of the nodes we assumed. Therefore, the proposed work optimistically manages the energy level of every node and enhances the lifetime of the Wireless Sensor Network. LEACH protocol for microsensor wireless networks provides ease of deployment, achieving maximum lifetime extension and latency and providing the application-specific quality. In LEACH, local computation is performed, reducing the overheads of data transmission, configuration, and operation of the network configuration. Experiment results showcased the high performance of LEACH in the constraints of the wireless environment.

Figure 6.

Figure 6

Number of nodes versus energy consumption.

Figure 7 shows the iterative result for the proposed work and the existing work. For 3 iterations, there were only 100 to 500 rounds of variation for the death of the first node. The iterative result therefore concluded that the proposed work obtained nearly 5% efficiency compared to the current work. The modified LEACH introduced an alternate CH replacement scheme and dual transmitting power levels. The performance of the modified MODLEACH was evaluated based on the parameters like throughput, formation of CHs and lifetime, and keeping hard and soft thresholds. The main aim of all the enhancements of the LEACH protocol is to increase energy efficiency.

Figure 7.

Figure 7

Iterative results for the proposed work.

5. Conclusion

The Wireless Sensor Network is optimized using LEACH protocol and a modified k-means algorithm. 48.85% efficiency has been obtained in terms of the lifetime of the network through the proposed work. The cluster head selection is also made in a balanced manner considering the nodes' energy. The packets to BS and packets to cluster head rate are increased using the proposed algorithm. The optimization between energy and the successful data transfer is very well maintained in this work. The overhead of the nodes is increased due to the addition of extra data regarding the energy of the nodes. It has increased the data bits usage. The sink node work also increased during the election of the cluster head. The cluster head was elected till the end of the lifetime of the whole network, which shows that the overall energy consumption is well maintained. Nearly 77% of the data sensed were transmitted to the sink node. The processing time of the k-means algorithm is increased due to the extra addition of the threshold value of the energy. It needs to be optimized in further work. The node's overhead increases due to the extra addition of energy status and the request message. The k-means algorithm increases the processing time for completion of the election of cluster head.

Algorithm 1.

Algorithm 1

LEACH protocol Algorithm.

Acknowledgments

The authors thank Saveetha School of Engineering, SIMATS, Chennai, for the technical assistance. The authors appreciate the supports from Ambo University, Ethiopia.

Data Availability

The data used to support the findings of this study are included within the article. Should further data or information be required, they are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

  • 1.Abdulkarem M., Samsudin K., Rokhani F. Z., A Rasid M. F. Wireless sensor network for structural health monitoring: a contemporary review of technologies, challenges, and future direction. Structural Health Monitoring . 2020;19(3):693–735. doi: 10.1177/1475921719854528. [DOI] [Google Scholar]
  • 2.Gope P., Das A. K., Kumar N., Cheng Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics . 2019;15(9):4957–4968. doi: 10.1109/tii.2019.2895030. [DOI] [Google Scholar]
  • 3.Gao Y., Xiao F., Liu J., Wang R. Distributed soft fault detection for interval type-2 fuzzy-model-based stochastic systems with wireless sensor networks. IEEE Transactions on Industrial Informatics . 2019;15(1):334–347. doi: 10.1109/tii.2018.2812771. [DOI] [Google Scholar]
  • 4.Yarinezhad R. Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure. Ad Hoc Networks . 2019;84:42–55. doi: 10.1016/j.adhoc.2018.09.016. [DOI] [Google Scholar]
  • 5.Toor A. S., Jain A. K. Energy aware cluster based multi-hop energy efficient routing protocol using multiple mobile nodes (MEACBM) in wireless sensor networks. AEU - International Journal of Electronics and Communications . 2019;102:41–53. doi: 10.1016/j.aeue.2019.02.006. [DOI] [Google Scholar]
  • 6.Kaur S., Mahajan R. Hybrid meta-heuristic optimization based energy efficient protocol for wireless sensor networks. Egyptian Informatics Journal . 2018;19(3):145–150. doi: 10.1016/j.eij.2018.01.002. [DOI] [Google Scholar]
  • 7.Sundararaj V., Muthukumar S., Kumar R. S. An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers & Security . 2018;77:277–288. doi: 10.1016/j.cose.2018.04.009. [DOI] [Google Scholar]
  • 8.Fu X., Fortino G., Pace P., Aloi G., Li W. Environment-fusion multipath routing protocol for wireless sensor networks. Information Fusion . 2020;53:4–19. doi: 10.1016/j.inffus.2019.06.001. [DOI] [Google Scholar]
  • 9.Praveen Kumar D., Amgoth T., Annavarapu C. S. R. Machine learning algorithms for wireless sensor networks: A survey. Information Fusion . 2019;49:1–25. doi: 10.1016/j.inffus.2018.09.013. [DOI] [Google Scholar]
  • 10.Vishwakarma S. An analysis of LEACH protocol in wireless sensor network: a survey. International Journal of Computer Science Engineering and Technology . 2015;6(3):148–155. [Google Scholar]
  • 11.Aziz M., Arioua M. Energy- efficient hybrid k- means algorithms for clustered wireless sensor networks. International Journal of Electrical and Computer Engineering . 2017;7(4):2054–2060. [Google Scholar]
  • 12.Cheng D., Ding X., Zeng J., Yang N. Hybrid K-means algorithm and genetic algorithm for cluster Analysis. TELKOMNIKA Indonesian Journal of Electrical Engineering . 2014;12(4):2924–2935. doi: 10.11591/telkomnika.v12i4.4805. [DOI] [Google Scholar]
  • 13.Jain D. K., Tyagi S. K. S., Neelakandan S., Prakash M., Natrayan L. Metaheuristic optimization-based resource allocation technique for cybertwin-driven 6G on IoE environment. IEEE Transactions on Industrial Informatics . 2022;18(7):4884–4892. doi: 10.1109/tii.2021.3138915. [DOI] [Google Scholar]
  • 14.Kaliappan S., Raj Kamal M. D., Mohanamurugan S., Nagarajan P. K. Analysis of an innovative connecting rod by using finite element method. Taga Journal Of Graphic Technology . 2018;14:1147–1152. [Google Scholar]
  • 15.Lee E. K., Viswanathan H., Pompili D. RescueNet: Reinforcement-learning-based communication framework for emergency networking. Computer Networks . 2016;98:14–28. doi: 10.1016/j.comnet.2016.01.011. [DOI] [Google Scholar]
  • 16.Sundaram S. S., Basker N. H, Natrayan L. Smart clothes with bio-sensors for ECG monitoring. International Journal of Innovative Technology and Exploring Engineering . 2019;8(4):298–301. [Google Scholar]
  • 17.Asha P, Natrayan L, Geetha B. T, et al. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environmental research . 2022;205 doi: 10.1016/j.envres.2021.112574.112574 [DOI] [PubMed] [Google Scholar]
  • 18.Shaikh F. K., Zeadally S. Energy harvesting in wireless sensor networks: a comprehensive review. Renewable and Sustainable Energy Reviews . 2016;55:1041–1054. doi: 10.1016/j.rser.2015.11.010. [DOI] [Google Scholar]
  • 19.Mittal M., de Prado R. P., Kawai Y., Nakajima S., Muñoz-Expósito J. E. Machine learning techniques for energy efficiency and anomaly detection in hybrid wireless sensor networks. Energies . 2021;14(11):p. 3125. doi: 10.3390/en14113125. [DOI] [Google Scholar]
  • 20.Nagarajan K., Rajagopalan A., Angalaeswari S., Natrayan L., Mammo W. D. Combined economic emission dispatch of microgrid with the incorporation of renewable energy sources using improved mayfly optimization algorithm. Computational Intelligence and Neuroscience . 2022;2022:1–22. doi: 10.1155/2022/6461690.6461690 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 21.Kanimozhi G., Natrayan L., Angalaeswari S., Paramasivam P. An effective charger for plug-in hybrid electric vehicles (PHEV) with an enhanced PFC rectifier and ZVS-ZCS DC/DC high-frequency converter. Journal of Advanced Transportation . 2022;2022 doi: 10.1155/2022/7840102.7840102 [DOI] [Google Scholar]
  • 22.Gantassi R., Ben Gouissem B., Cheikhrouhou O., El Khediri S., Hasnaoui S. Optimizing quality of service of clustering protocols in large-scale wireless sensor networks with mobile data collector and machine learning. Security and Communication Networks . 2021;2021:2021–2112. doi: 10.1155/2021/5531185.5531185 [DOI] [Google Scholar]
  • 23.Mahmood T., Li J., Pei Y., et al. An intelligent fault detection approach based on reinforcement learning system in wireless sensor network. The Journal of Supercomputing . 2022;78(3):3646–3675. doi: 10.1007/s11227-021-04001-1. [DOI] [Google Scholar]
  • 24.Vaishali K. R., Rammohan S. R., Natrayan L., Usha D., Niveditha V. R. Guided container selection for data streaming through neural learning in cloud. International Journal of System Assurance Engineering and Management . 2021;16:1–7. doi: 10.1007/s13198-021-01124-9. [DOI] [Google Scholar]
  • 25.Kaliappan A. S. Mohanamurugan S., Nagarajan P. K. Numerical investigation of sinusoidal and trapezoidal piston profiles for an IC engine. Journal of Applied Fluid Mechanics . 2020;13(1):287–298. doi: 10.29252/jafm.13.01.29881. [DOI] [Google Scholar]
  • 26.Kumar M. J., G. V. S. R. K., Krishna P. S. R., Raghavendra Sai N. Secure and efficient data transmission for wireless sensor networks by using optimized leach protocol. Proceedings of the 2021 6th International Conference on Inventive Computation Technologies (ICICT); January 2021; Coimbatore, India. IEEE; pp. 50–55. [DOI] [Google Scholar]
  • 27.Al I, Abdulaziz I., Al-Akhras M., ALsahli M. S., Mohammed A. Using machine learning to detect DoS attacks in wireless sensor networks. Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT); April 2019; Amman, Jordan. IEEE; pp. 107–112. [DOI] [Google Scholar]
  • 28.Wibowo, Wahyu F., Sediyono E., Purnomo H. D. An adaptive framework using machine learning in wireless sensor network. Proceedings of the 2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat); December 2020; Batam, Indonesia. IEEE; pp. 234–239. [DOI] [Google Scholar]
  • 29.Magesh S, Niveditha V. R, Rajakumar P. S, Natrayan L. Pervasive computing in the context of COVID-19 prediction with AI-based algorithms. International Journal of Pervasive Computing and Communications . 2020;16(5):477–487. doi: 10.1108/ijpcc-07-2020-0082. [DOI] [Google Scholar]
  • 30.Anupama C. S. S, Natrayan L, Laxmi L. E, et al. Deep learning with backtracking search optimization-based skin lesion diagnosis model. Computers, Materials & Continua . 2021;70(1):1297–1313. [Google Scholar]
  • 31.Malik M., Joshi A., Sakya G. Network lifetime improvement for WSN using machine learning. Proceedings of the 2021 7th International Conference on Signal Processing and Communication (ICSC); November 2021; Noida, India. IEEE; pp. 80–84. [DOI] [Google Scholar]
  • 32.Cui Y., Zhang L., Hou Y., Tian Ge. Design of intelligent home pension service platform based on machine learning and wireless sensor network. Journal of Intelligent and Fuzzy Systems . 2021;40(2):2529–2540. doi: 10.3233/jifs-189246. [DOI] [Google Scholar]
  • 33.Lavanya S., Prasanth A., Jayachitra S., Shenbagarajan A. A Tuned classification approach for efficient heterogeneous fault diagnosis in IoT-enabled WSN applications. Measurement . 2021;183 doi: 10.1016/j.measurement.2021.109771.109771 [DOI] [Google Scholar]
  • 34.Hanna O. A., Ezzeldin Y. H., Fragouli C., Diggavi S. Quantization of distributed data for learning. IEEE Journal on Selected Areas in Information Theory . 2021;2(3):987–1001. doi: 10.1109/jsait.2021.3105359. [DOI] [Google Scholar]
  • 35.Sundararajan R. K., Arumugam U. Event detection and information passing using LEACH protocol in wireless sensor networks. Wireless Personal Communications . 2018;101(3):1703–1714. doi: 10.1007/s11277-018-5785-3. [DOI] [Google Scholar]
  • 36.sendrayaperumal A., Mahapatra S., Parida S. S., et al. Energy auditing for efficient planning and implementation in commercial and residential buildings. Advances in Civil Engineering . 2021;2021:1–10. doi: 10.1155/2021/1908568.1908568 [DOI] [Google Scholar]
  • 37.Natrayan L, sundaram P. S. S, Elumalai J. Analyzing the Uterine physiological with MMG Signals using SVM. International journal of pharmaceutical research . 2019;11(2):165–170. [Google Scholar]
  • 38.Sharma D., Singh Tomar G. Comparative energy evaluation of LEACH protocol for monitoring soil parameter in wireless sensors network. Materials Today Proceedings . 2020;29:381–396. doi: 10.1016/j.matpr.2020.07.292. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data used to support the findings of this study are included within the article. Should further data or information be required, they are available from the corresponding author upon request.


Articles from Computational Intelligence and Neuroscience are provided here courtesy of Wiley

RESOURCES