• Nu S-Au Găsit Rezultate

View of A Novel Quantum Beetle Swarm Optimization based Route Selection and Hybrid Data Transmission in Wireless Sensor Networks


Academic year: 2022

Share "View of A Novel Quantum Beetle Swarm Optimization based Route Selection and Hybrid Data Transmission in Wireless Sensor Networks"


Text complet


2434 http://annalsofrscb.ro

A Novel Quantum Beetle Swarm Optimization based Route Selection and Hybrid Data Transmission in Wireless Sensor Networks

¹A.Sathish and ²L.R.Aravind Babu

¹Research Scholar, ²Assistant Professor, Department of Computer and Information Science, Annamalai University, Annamalainagar-608002, Tamilnadu, India.

Email: [email protected] Abstract

Energy efficiency remains a major issue in the design of wireless sensor networks (WSN).

Earlier studies reported that the routing techniques can be employed to reduce energy consumption and lengthen the lifetime of WSN. Numerous routing techniques with dissimilarfeaturesareproposed in the literature to design an energy-efficient WSN. This paper presents a novel quantum beetle swarm optimization based route selection and hybrid data transmission (QBSOR-HDT) protocol for WSN. The BSO algorithm is presented to enhance the effectiveness of the swarm optimization by the foraging principle of beetles. The presented model chooses the possible routes to destination based on the fitness function involving residual energy, distance to base station (BS), and node degree. Besides, the presented model follows hybrid data transmission process where the data is transmitted at periodic time duration and reactive way. Moreover, a thresholding mechanism is applied for reactive data transmission. This process helps to balance the load properly and thereby achieves energy efficiency. In order to validate the performance of the QBSOR-HDT protocol, extensive set of experimentations were carried out. The experimental values ensured the energy efficiency and network lifetime performance of the QBSOR-HDT protocol under different numbers of nodes.

Keywords: Wireless sensor networks, Routing, Beetle swarm optimization, Thresholding concept, Quantum Computing

1. Introduction

In last decades, rapid progression in wireless sensor networks (WSN) has stimulated the development of cost-effective and low energized tools. Generally, sensors are composed of signal processing materials, and sensing device with numerous potentials to compute WSN nodes and initialize wireless networks. Also, sensor networks are applicable in numerous applications namely chemical plant, disaster region, as well as nuclear reactor. WSN is


2435 http://annalsofrscb.ro

assumed to be a network with diverse nodes for collecting data from adjacent node and send the senses data to sink node or Base Station (BS) in sovereign fashion [1]. Therefore, WSN is capable of monitoring the physical environments and transform the sensed data into user- readable form. Ultimately, WSN is applied in numerous functions like home, armed force, weather prediction, and medical sector [2]. In addition, future application for huge-scale WSN is assumed in diverse fields like environment prediction, civilian forces, and surveillance. Furthermore, sensors are low-cost, donate minimum battery power, and restricted with energy constraints.

One of the significant problems in WSN is to enhance the network lifespan if the initial node is unfit to send the data to BS. For data collection, every node is accountable for sending the data packets to BS node. The procedure of combining data intends to reduce the data traffic and power consumption by unifying various input data packets as single packets. Hence, massive applications are developed to expand the network lifespan [3]. The power efficiency is also a major issue in WSN because the sensor nodes are simulated with the help of battery.

Therefore, power consumption is balanced to extend the network lifespan. The routing modules [4, 5] are essential in WSN due to their simplicity and their reduced power consumption, delay, Quality of Service (QoS), as well as data throughput.

Cengiz and Dag [6] proposed a protocol called energy-efficient multi-hop routing protocol to route the data in WSN. In this approach, green routing protocol has been developed for limiting the additional burden. It is applicable to extend the network lifespan and mitigates the load simultaneously with the help of energy effective protocol. Additionally, relay nodes are employed to transmit accumulated cluster data under the application of inter-cluster transmissions.Purkait and Tripathi [7] introduced a protocol termed energy-efficient cluster based routing protocol based on Fuzzy Logic (FL) with the help of multi-hop routing scheme where the cluster size is dynamic. The outline of cluster size and FL method is applied for protocol implementation. Hence, the working function is estimated according to the protocol developed with active nodes count and neighboring protocols. As a result, the network lifetime is increased and limited the premature death of nodes. The processing time is greater in this approach.

Selvi et al. [8] established a delay constrained energy-effective routing method for multi-hop routing in WSN. This model has achieved delay minimization and offered trusted routing to reduce power consumption by organizing effective clusters with no increase in delay. Finally,


2436 http://annalsofrscb.ro

enhanced performance is achieved by means of network lifespan and overload caused by this method is handled significantly. But it does not consider mobility parameters to enhance the QoS service relied upon congestion control, flow control, and routing.Sajwan et al. [9]

presented Hybrid energy-efficient multi-path routing mechanism which has reduced the power utilized by nodes, however, the distance is a major factor which affects the working function.

Sert et al. [10] projected a framework called Two-Tier Distributed FL Based Protocol (TTDFP) to extend the survival rate of WSNs by estimating the routing proficiency. This model is named as distribution adaptive protocol that implements in sensor network domains.

Followed by, the technique utilized in fuzzy clustering to optimize the WSN performance.

Unfortunately, it is not suitable for alternate optimization models like Particle Swarm Optimization (PSO) [11] and requires excess WSN embedded parameters.

Chen and Shen [12] implied a scheme called grid-based dependableon multi-hop routing protocol to perform routing in WSN. It is capable of managing the power consumption and optimized cluster head (CH) election dependent on Residual Energy (RE) and node position.

Also, the stability duration is improved and depicted a better performance based on power, delays, and assured scalable transmission. Eventually, nodes with maximum energy are completely suitable for working as relays. Moreover, the power consumption of transmitter and receiver is combined for modeling the link weight between the nodes. Finally, Dijkstra algorithm is applied to search the path in cost-effective process. In addition, 2Multi- Hop(MH) protocols were originated according to the Balanced and Energy Efficient Multi- Hop (BEEMH) approach.

Fawzyet al. [13] developed a method BEEMH for computing multi-hop routing in WSN. It is deployed from Dijkstra algorithm. A node with maximum power is applied to transmitter and receiver node to offer inter-CH communications between clustering routing protocols.

Furthermore, it is an effective platform to optimize the CH election by using numerous attributes like power and position. But it is unfit for grid optimization and defected the scalable communication between nodes which has resulted in inferior performance. The network duration is enhanced, however, it becomes a complex process in routing tradeoff among the attributes. Hence, energy effective clustering has improved the network duration, where the throughput is non-reliable[14].


2437 http://annalsofrscb.ro

This paper presents a novel quantum beetle swarm optimization based route selection and hybrid data transmission (QBSOR-HDT) protocol for WSN. The presented model chooses the possible routes to destination based on the fitness function (FF) involving residual energy (RE), distance to base station (BS), and node degree (ND). Also, the presented model follows hybrid data transmission process where the data is transmitted at periodic time duration and reactive way. Besides, a thresholding mechanism is applied for reactive data transmission.

This process supports balancing the load properly and thereby achieves energy efficiency. A detailed set of simulations were performed under varying scenarios. The experimental results portrayed that the QBSOR-HDT protocol has maximized the energy efficiency and lifetime of WSN.

2. The Proposed QBSOR-HDT Model

The multi hop routing in WSN is utilized for optimizing the network transmission. Usually, multi hop routing is applied for computing effectual data transmission. But power is one of the major constraints in multi hop routing. To overcome these problems, the newly developed QBSOR-HDT applies multi hop routing where the source node forwards the data to CH by using intermediate nodes within a cluster. In this framework, a source node in a cluster forwards the data to adjacent node and reduces the transmission energy. Also, QBSOR-HDT has gained maximum hops according to the newly developed FF to perform routing in WSN.

Hence, solution encoding process represents the solution accomplished from QBSOR-HDT approach. Fig. 1 demonstrates the overall working process of the proposed QBSOR-HDT model.

Fig. 1. Working process of QBSOR-HDT model


2438 http://annalsofrscb.ro

In this approach, the solution is best route selected for data transmission. Also, optimization models apply the presented QBSOR-HDT framework according to the newly developed multi-objective FF to determine optimal hop from collection of hops in WSN. Therefore, FF value is measured to identify best solution by applying collective parameters. Hence, fitness estimated for QBSOR-HDT applies 3 parameters called power, distance, and ND. In this module, fitness is assumed as a maximization metric. Certainly, the solution which poses higher ND, low power, and distance is employed for routing. Thus, solution implying higher fitness value is referred to multihop routing. Finally, fitness of newly developed QBSOR- HDT is expressed as,

𝐹𝑖𝑡𝑛𝑒𝑠𝑠 𝑓𝑢𝑛𝑐𝑡𝑖𝑜𝑛 = 𝑊1× 𝐸 + 𝑊2× 𝐷 + 𝑊3× 𝑁𝐷 (1) Where 𝑊1, 𝑊2𝑎𝑛𝑑 𝑊3represents the weights, E, D, and ND shows the power, inter-cluster distance, and ND correspondingly.

Energy: The summary of power in all hops is referred to be the system energy which points the RE in nodes. Hence, energy should have maximum value and depict as,

𝑃 =1

𝑏 𝐸 𝐽𝑘




Where, b implies the count of hops considered in multihop routing, and 𝐸(𝐽𝑘) depicts the power of kth hop.

Inter-cluster distance: The ratio of distance amongst 2 clusters are named as inter-cluster distance which has to be maximum to offer effectual routing and it is expressed by,

𝑋 = 𝑛𝑥=1 𝑛𝑡=𝑥+1𝑋 𝐺𝑥, 𝐺𝑡

𝛽 (3) Where, 𝑋(𝐺𝑥, 𝐺𝑡) refers the distance amongst 2 clusters, and 𝑛 illustrates the overall CH count.

Node degree: It describes the count of sensor nodes from CH. A CH with minimum sensors are decided as CHs with maximum Cluster Members (CM) drops the power within a short duration. And, ND is represented in Eq. (4).


2439 http://annalsofrscb.ro

𝑁𝐷 = 𝐼𝑖




Where Ii signifies count of sensor nodes from 𝐶𝐻𝑖. 2.1. QBSOR Algorithm

To achieve the above process, the QBSO algorithm is applied by integrating the concepts of BSO with quantum computing concept. In past decades, it is defined that beetle antenna search (BAS) models are effective in dealing with high-dimension functions with considerable performance and the iterative outcome depends upon the location of a beetle.

Besides, position is a major factor in BAS which affects the proficiency of optimization. It is evolved by swarm optimization method where further enhancements are deployed in BAS model by extending the version named BSO framework [15]. Here, a beetle is considered as a potential solution for optimization issues, and every beetle corresponds a fitness value computed by FF. As same as PSO mechanism, beetles share the data, however, the distance as well as direction of beetles are evaluated by the speed and data intensity to be predicted by the prolonged probes.

In numerical format, the principle of PSO has been followed. Consider a population of n beetles depicted as 𝑋 = 𝑋1, 𝑋2, ⋯ , 𝑋𝑛 in S‐dimensional search space, in which 𝑖 th beetle shown S‐dimensional vector 𝑋𝑖 = 𝑥𝑖1, 𝑥𝑖2, ⋯ , 𝑥𝑖𝑆 𝑇, indicates the location of 𝑖 th beetle in S‐dimensional search space, and defines a capable potential solution to the applied problem.

Based on the target function, fitness value of a beetle position is estimated. The robustness of 𝑖 th beetle is represented as 𝑉𝑖 = 𝑉𝑖1, 𝑉𝑖2, ⋯ , 𝑉𝑖𝑆 𝑇. This, separable extremity of beetle is denoted by 𝑃𝑖 = 𝑃𝑖1, 𝑃𝑖2, ⋯ , 𝑃𝑖𝑆 𝑇, and set of extreme value in population is illustrated by 𝑃𝑔 = 𝑃𝑔1, 𝑃𝑔2, ⋯ , 𝑃𝑔𝑆 𝑇. The numerical method for simulating the behavior is provided in the following:

𝑋𝑖𝑠𝑘+1 = 𝑋𝑖𝑠𝑘 + 𝜆𝑉𝑖𝑠𝑘 + 1 − 𝜆 𝜉𝑖𝑠𝑘 (5) Where 𝑠 = 1,2, ⋯ , 𝑆; 𝑖 = 1,2, ⋯ , 𝑛; 𝑘 defines the recent number of iterations. 𝑉𝑖𝑠 illustrates the efficiency of beetles, and 𝜉𝑖𝑠 implies the update in beetle position. 𝜆 defines positive constants. Afterward, speed value is computed by:

𝑉𝑖𝑠𝑘+1 = 𝑐𝑜𝑉𝑖𝑠𝑘 + 𝑐1𝑟1 𝑃𝑖𝑠𝑘 − 𝑋𝑖𝑠𝑘 + 𝑐2𝑟2 𝑃𝑔𝑠𝑘 − 𝑋𝑔𝑠𝑘 (6)


2440 http://annalsofrscb.ro

Where 𝑐1 and 𝑐2 defines 2 positive constants, and 𝑟1 and 𝑟2 demonstrates 2 random functions from [0,1]. 𝜔 indicates the inertia weight. In PSO method, 𝜔 is considered as a fixed constant, however, with gradual enhancement of a model, developers have presented a changing inertia factor.

This work applies the principle of reducing inertia weight, and it is formulated by:

𝜔 = 𝜔max −𝜔max − 𝜔min

𝐾 ∗ 𝑘 (7) Where 𝜔min and 𝜔max implies minimum and maximum value of 𝜔. 𝑘 and 𝐾 depict present and maximum number of iterations. Here, higher value of 𝜔 is 0.9, and low value is 0.4, thus the model is applicable to search maximum range and identify best solution. When 𝜔 is reduced, beetle’s speed is also minimized and enters into local search. The 𝜉 function defines the incremental function and is evaluated as given below.:

𝜉𝑖𝑠𝑘+1 = 𝛿𝑘 ∗ 𝑉𝑖𝑠𝑘 ∗ 𝑠𝑖𝑔𝑛 𝑓 𝑋𝑟𝑠𝑘 − 𝑓 𝑋𝑟𝑠𝑘 (8)

This module is extended to high dimension. 𝛿 implies the step size. Therefore, search behaviors of right as well as left antenna are demonstrated as:

𝑋𝑟𝑠𝑘+1= 𝑋𝑟𝑠𝑘 + 𝑉𝑖𝑠𝑘 ∗ 𝑑/2 (9) 𝑋𝑙𝑠𝑘+1= 𝑋𝑙𝑠𝑘 + 𝑉𝑖𝑠𝑘 ∗ 𝑑/2

The search path is visualized by using minimum population size and implied the change in position of 3D space. Under the existence of factors like step length and inertial weight, coefficient is reducing in iterative process, and algorithm does not cover the target point and eliminates the group falling within a local optimum. Initially, BSO simulates a collection of random solutions. In all iterations, search agent upgrades the position relied on search mechanism and optimal solution is accessible. The pseudo-code of BSO approach has been projected. Here, the BSO model is composed of exploration and exploitation process which comes under global optimization. Moreover, linear combination of speed as well as beetle search improvises the robustness and accuracy of population which results in stable approach.

Fig. 2 showcases the flowchart of BSO model.


2441 http://annalsofrscb.ro

Fig. 2. Flowchart of BSO algorithm

In order to improve the performance of the BSO method, quantum computing concept is incorporated into it. Quantum computing is defined as domain in computer science marketed in quantum computers under the application of quantum mechanics like state superposition, entanglement as well as quantum gate [16]. The basic data unit in quantum computing is Q- bit. A Q-bit might be in a state |0 >, or in a state |1 > or in a superposition of states |0 > and

|1 > concurrency. Based on the Dirac function, Q‐bit is expressed as the unification of states

|0 > and |1 > as given in the following:

|𝑄 >= 𝛼|0 > +𝛽|1 > 𝑠𝑢𝑐𝑕 𝑡𝑕𝑎𝑡 |𝛼|2+ |𝛽|2= 1 (10) where 𝛼 and 𝛽 define complicated value. |𝛼|2 (resp. |𝛽|2) depicts the possibility of identifying Q‐bit in state 0 (resp. in state 1). The quantum register of size 𝑛 is limited from set of 𝑛Q‐bits. It is actually composed of 2𝑛 possible values at the same time. Additionally, quantum register is illustrated by the given function:

𝛹 = 𝐶𝑋



|𝑋 > (11)

The amplitudes 𝐶𝑥 meet the given property:


2442 http://annalsofrscb.ro




𝐶𝑋|2 = 1 (12)

The state of Q‐bit is modified by a quantum gate (Q‐gate). The Q‐gate is a reversible gate which is depicted as a unitary operator 𝑈 that is facilitated on Q‐bit basis states by meeting the 𝑈+𝑈 = 𝑈𝑈+, where 𝑈+ refers the Hermitian adjoint of 𝑈. Various Q‐gates are available in this approach namely NOT gate, controlled NOT gate, rotation gate, Hadamard gate, and so on.

2.2. Hybrid Data Transmission

When the data aggregation is computed by CH, hybrid data transmission is initialized [17].

First, CHs broadcast the adjacent parameters:

Attribute (A): It is defined as user-based attribute for accomplishing the data.

Threshold values: It is composed of Hard Threshold (HT) and Soft Threshold (ST). HT is defined as specific parameter value and value that exceeds HT is transmitted. Thus, ST refers a small difference in parameter value, which simulates the data transmission.

Schedule: In scheduling process, Time-division multiple access (TDMA)is applied in that a slot has been declared for all nodes.

Timer: It describes greater duration among 2 subsequent reports forward by a node. It has several TDMA schedule lengths and employed for proactive data conversion.

Under the application of hybrid data transmission, irregular and repeated data transmission is ignored. Finally, higher power efficiency and throughput enhancement have been accomplished.

3. Experimental Evaluation

The QBSOR-HDT model is executed by applying MATLAB R2014a. In order to point the efficiency of QBSOR-HDT, series of processes has been performed under various testing scenarios.In order to validate the consistency of QBSOR-HDT approach, it is sampled in 3 diverse scenarios on the basis of BS as depicted by S1, S2, and S3 correspondingly.

 S1- BS is suited at middle of target area

 S2- BS is placed in the corner of target area


2443 http://annalsofrscb.ro

 S3- BS has positioned far away from target area

In order to make sure the effective function of protocols, average power application of S1, S2, and S3 are processed and demonstrated in Figs. 3-5.

Fig. 3. Average energy consumption: Scenario 1

Fig. 4. Average energy consumption: Scenario 2


2444 http://annalsofrscb.ro

Here, the power utilization is estimated by processing the overall power consumed by a sensor node, for all iterations. Hence, the newly developed framework is considered as energy effective when compared with traditional methodologies. It is due to the fact of productive forwarding set selection with the help of QBSOR-HDT. It makes sure that a node with maximum power and minimum distance would be selected as relay nodes. Eventually, the volume of energy expended for data transmission is reduced. LEACH demonstrates poor action when compared with alternate models by means of features like random routes selection makes feasible transmission for a node to become a CH when a node with minimum RE is considered as CH. Also, CH does consider parameters which are suitable for best path selection. Moreover, the inexistence of multi hop data transmission generates maximum power consumption. The reactive behavior of TEEN protocol intends in minimum power utilization when compared with LEACH and simultaneously the single hop data transmission tends to fail than DEEC, EAUCF, and QBSOR-HDT models. Even though EAUCF applies FL for CH election, probability based tentative CHs selection reduces the complete performance. Afterward, network lifespan is an important factor for calculating the movement of clustering in WSN. Network duration is called a number of rounds completed until the nodes in WSN drain the energy.

Fig. 5. Average energy consumption: Scenario 3


2445 http://annalsofrscb.ro

Table 1 Comparison of existing with proposed QBSOR-HDT method interms of FND, HND and LND


Scenario 1 Scenario 2 Scenario 3


LEACH 802 1126 1278 542 849 1024 452 614 857

TEEN 1024 1089 1327 768 889 1124 389 602 945

DEEC 1088 1102 1386 948 1041 1206 894 948 986

EAUCF 1342 1496 1532 1196 1274 1304 941 988 1035

QBSOR-HDT 1399 1735 1945 1213 1480 1679 989 1245 1401

Fig. 6. No. of dead nodes for several rounds: Scenario 1


2446 http://annalsofrscb.ro

Fig. 7. No. of dead nodes for several rounds: Scenario 2

Fig. 8. No. of dead nodes for several rounds: Scenario 3


2447 http://annalsofrscb.ro

As the adjacent nodes in WSN forward the similar data and FND does not show a greater impact of overall network performance. However, the quality of sensing data has been limited. If the LND reaches, the complete WSN is referred as dead. Hence, attained FND, HND, and LND of QBSOR-HDT model on 3 scenarios are depicted in Table 1. The simulation outcome of dead nodes in 3 scenarios isdemonstrated in Figs. 6-8correspondingly.

From the figure, it is evident that FND of QBSOR-HDT does not incur previously when compared with traditional methods.

4. Conclusion

This paper has developed an effective QBSOR-HDT protocol for WSN. The QBSOR-HDT protocol determines the optimal routes to BS by deriving a fitness function comprising RE, distance to BS, and ND. Followed by, the QBSOR-HDT protocol determines the route to BS and then data transmission process has begun in a hybrid way, i.e., the data is transmitted at periodic time duration and reactive way. In addition, a thresholding mechanism is applied for reactive data transmission. A detailed set of simulations were performed under varying scenarios. The experimental results portrayed that the QBSOR-HDT protocol has maximized the energy efficiency and lifetime of WSN. As a part of future extension, the proficiency of the QBSOR-HDT protocol can be improvised using clustering and data aggregation approaches.


[1] Jain, N., Trivedi, P., 2012. An adaptive sectoring and cluster head selection based multi-hop routing algorithm for WSN. In: Proceedings of International Conference on Engineering, pp. 1–6.

[2] K.Vinoth Kumar,T. Jayasankar, V. Eswaramoorthy,V. Nivedhitha, SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks, International Journal of Intelligent Networks (2020),vol.1,2020,pp. 36–42.


[3] Hussain, S., Islam, O., 2007. An energy efficient spanning tree based multi-hop routing in wireless sensor networks. Wireless Commun. Networking, 4383– 4388.

[4] E.Vishnupriya, T. Jayasankar and P. Maheswara Venkatesh, “SDAOR: Secure Data Transmission of Optimum Routing Protocol in Wireless Sensor Networks For Surveillance Applications”, ARPN Journal of Engineering and Applied Sciences, Vol.

10, No.16, Sep 2015, pp 6917-6931


2448 http://annalsofrscb.ro

[5] G.Mani, V.Nivedhitha, N.S.Pradeep, T.Jayasankar and K.Vinothkumar , “Reliable Wormhole Detection System (RWDS) Based Secure Routing and Authentication for Environmental Monitoring”, Journal of Green Engineering (JGE) Vol.10, No.3, pp.734- 749,March 2020

[6] K.VinothKumar, T.Jayasankar, M.Prabhakaran and V.Srinivasan, “Fuzzy Logic based Efficient Multipath Routing for Mobile Adhoc Networks”, Appl. Math. Inf. Sci.

Vol.11, No.2, March 2017, pp.449–455.DOI: http://dx.doi.org/10.18576/amis/110213 [7] Purkait, R., Tripathi, S., 2017. Energy aware fuzzy based multi-hop routing protocol

using unequal clustering. Wireless Pers. Commun. 94 (3), 809–833.

[8] Selvi, M., Velvizhy, P., Ganapathy, S., Nehemiah, H.K., Kannan, A., 2017. A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Comput., 1–10.

[9] Sajwan, M., Gosain, D., Sharma, A.K., 2018. Hybrid energy-efficient multi-path routing for wireless sensor networks. Comput. Electr. Eng. 67, 96–113.

[10] Sert, S.A., Alchihabi, A., Yazici, A., 2018. A two-tier distributed fuzzy logic based protocol for efficient data aggregation in Multihop wireless sensor networks. IEEE Trans. Fuzzy Syst. 26 (6), 3615–3629.

[11] kulkarni, Y.R., Murugan, T.S., 2019. Hybrid weed-particle swarm optimization algorithm and CMixture for data publishing. Multimedia Res. 2 (3), 33–42.

[12] Chen, Z., Shen, H., 2018. A grid-based reliable multi-hop routing protocol for energy- efficient wireless sensor networks, 14(3).

[13] Fawzy, A.E., Shokair, M., Saad, W., 2018. Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks, 7, 33–43

[14] S.Gopinath, K.VinothKumar, T.Jayasankar, “Secure Location Aware Routing Protocol With Authentication For Data Integrity”, Springer- Cluster Comput, 22, 13609-13618 (2019) .https://doi.org/10.1007/s10586-018-2020-7

[15] Wang, T., Yang, L. and Liu, Q., 2018. Beetle swarm optimization algorithm: Theory and application. arXiv preprint arXiv:1808.00206.

[16] Zouache, D., Nouioua, F. and Moussaoui, A., 2016. Quantum-inspired firefly algorithm with particle swarm optimization for discrete optimization problems. Soft Computing, 20(7), pp.2781-2799.

[17] Arjunan, S. and Sujatha, P., 2018. Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Applied Intelligence, 48(8), pp.2229-2246.



"Balancing security and energy consumption in wireless sensor networks." In International Conference on Mobile Ad- Hoc and Sensor Networks, pp. Springer, Berlin,

This paper proposes anintegrated approach of Internet of Things ,wireless sensor networks and Image processing bydesigninghybrid Unmanned Aerial Vehicle(UAV)to forest fire

This paper proposes anintegrated approach of Internet of Things ,wireless sensor networks and Image processing bydesigninghybrid Unmanned Aerial Vehicle(UAV)to forest fire

In our study we have proposed a hybrid method based on K-Means, Particle swarm optimization and cuttlefish optimization to get the most optimizing solution6. While applying

A global adversary using a Bayesian maximum-a- posteriori (MAP) evaluation strategy tried to screen communication between nodes in their research. A dynamic framework

Proving secure path is a major challenging security issues in wireless networks because various attacks occur in mobile networks during the route establishment

The results show that proposed scheme outperforms well compared to the existing schemes in terms of maximizes the coverage with respect to number of nodes & simulation

Keywords: Particle Swarm Optimization (PSO), Convolutional Neural Networks (CNN), Image classification, Pooling

[11] had proposed a novel hybrid feature selection method utilizinga filter bank Common Spatial Pattern (CSP)and a grey wolf optimization algorithm for an optimal feature

(2009) planned a different algorithm based on hybrid swarm intelligence which comprises three techniques namely optimization using particle swarm, procedures of simulated

A novel hybrid feature relevance score metric is proposed for preliminary feature selection in driver inattention detection application. The hybrid score is based on

The optimization problem is formulated based on the condition when primary transmission is present and absent in cognitive radio (CR) network. The optimization problem

Wrapper approach that employs Intelligence algorithms, namely, Score based Artificial Fish Swarm Algorithm (SAFSA), Mutation Score Butterfly Optimization Algorithm (MSBOA) and Score

Here, a novel method is known as the Hybrid Linear stacking model for feature selection and Xgboost algorithm for heart disease classification (HLS-Xgboost)1. This model

In thispaper, a hybrid performance for data organization and information extrapolation is recommended.The Honey Bee MatingOptimization (HBMO) algorithm and

In wireless sensor networks (WSNs), long lifetime necessity of various applications and restricted energy stockpiling capacity of sensor hubs has driven us to discover new

To increase the delivery of packets and decrease the delay and energy consumption, this paper proposes a protocol inspired namely Beckoning Penguin Swarm

Security in wireless sensor networks, Key management, Network Attacks, Node capture

The Best Path Selection For Data Transmission In Vanet Is Achieved With The Hybrid Direction- Finding Protocol Based On Both Geographical Information And

The experimental studyrevealedthat there is no commonresult for the problems of the LEACH and k- meansalgorithms for WSNs rather each of the existingdeviations of the algorithm

Proposed routing Cluster formation and selecting cluster head, which transfer data from their cluster nodes to base station, uses hierarchical clustering algorithm and considers

Therefore, in this research study, the final output is retrieved from the database using feature extraction from the input query images.In this research study,

Nugroho, Widyawan, ‘Deep learning multilayer perceptron (MLP) for flood prediction model using wireless sensor network based hydrology time series data mining’,