You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

28 April 2020

An Energy Efficient Enhanced Dual-Fuzzy Logic Routing Protocol for Monitoring Activities of the Elderly Using Body Sensor Networks

,
,
,
and
1
Department of Immersive Content Convergence, KwangWoon University, Seoul 01897, Korea
2
Department of Plasma Bioscience and Display, KwangWoon University, Seoul 01897, Korea
3
Ingenium College of Liberal Arts, KwangWoon University, Seoul 01897, Korea
4
Department of Computer Engineering, Catholic University of Pusan, Busan 46252, Korea
This article belongs to the Special Issue Electronic Solutions for Artificial Intelligence Healthcare

Abstract

Wireless body area networks (WBANs) are an important application in wireless sensor networks (WSNs). Specifically, in healthcare monitoring systems, it is important to screen the patient’s biometric signals. For example, the elderlies’ vital signs, such as ECG (Electrocardiogram), blood pressure, heart rate, and blood glucose, can be used as measures of their well-being and are all critically important for remote elderly care in tracking their physical and cognitive capabilities. Therefore, WBANs require higher energy efficiency and data transmission. This paper proposes a cluster-based routing protocol which is suitable for WBANs while analyzing energy efficiency issue in data transmission. Considering the importance of sensor nodes in a specific environment for improving the network’s lifetime, the protocol based on the LEACH (low energy adaptive clustering hierarchy) algorithm is proposed. Due to its avoidance of long-distance transmission, the clustering technique is an efficient algorithm for prolonging the lifetimes of sensor networks. Therefore, this paper suggests an enhanced LEACH-dual fuzzy logic (ELEACH-DFL) protocol based-on clustering for CH (cluster head) selection and cluster configuration in wireless sensor networks. The simulation and analysis results address that the enhanced algorithm reduces the energy consumption effectively and extends the lifespan of the entire network. For wired sensors, attaching sensors to the user may cause problems and inconvenience of mobility. This leads to the use of wireless sensors to proceed with body sensors, which should consider the problem of battery efficiency, which concerns the configuration of wireless sensors. The LEACH protocol is energy efficient until the first node dead is generated. However, there is a sharp drop in energy efficiency after that. The ELEACH-DFL protocol has the advantage of maintaining energy efficiency even after the first node dead is generated, with the utmost consideration being given to stability in consideration of cluster selection and cluster head selection. In a field of 50 × 50, the FND efficiency improvement rate of ELEACH-DFL versus LEACH protocol is approximately 32%. In addition, in a field of 50 × 150, the FND efficiency improvement rate of ELEACH-DFL versus LEACH protocol is approximately 159%.

1. Introduction

With the development of industry, the aging of mankind, and increasing medical costs, research on the new healthcare system has expanded. As semiconductor manufacturing technology advances, tiny implanted (Bio) sensors are used to measure the biometric signs. These sensors can analyze and store measured data, which can also be transmitted to an external device such as a medical server to diagnose the patient’s or the elderly’s status. For that purpose, hardwired connections are difficult for patients to wear, and expensive for deployment and maintenance. This makes it easier and cheaper to apply sensors to patients using a wireless interface [1,2].
The increasing usage of wireless network and the miniaturization of sensors have bolstered the development of wireless body area networks (WBAN). In these networks, various sensors are attached to clothes or bodies or implanted under the skin. The wireless characteristics of the network and various sensors provide numerous new, practical, and innovative applications to improve healthcare and the quality of life. Body sensor networks can help people live comfortably by providing users with various activities and behavioral monitoring servicers through applications in healthcare, emergency treatment, fitness, etc. [3].
Users can screen their health status through various sensors in real time with personal desktops and smartphones. Medical institutions can obtain their sensor information and analyze it remotely or offline. By collecting and analyzing users’ biometric information from sensors, body sensor-based medical services can provide users with accurate medical services. Due to the convenience of mobile devices such as smartphones and the development of WBAN, research on mobile healthcare is actively carrying on [4].
Mobile healthcare is expected to facilitate the prevention and management of diseases, since the sensor information can be obtained through mobile devices and the medical service area can be expanded to the observer rather than the medical institution center. Therefore, mobile healthcare systems can provide the users with ease of use, reduced risk of infection, reduced risk of failure, reduced user discomfort, and lower cost of care delivery [5,6].
The functionalities of a mobile healthcare system are:
  • To alert its user of the approach or development of a potential medical emergency, so that precautionary action can be taken.
  • To alert the medical emergency system if vital signs drop below a certain threshold.
  • To measure a real-time bio-signal for local processing.
WBANs imply a ubiquitous environment in which sensor devices have formed a network near the human body. Unlike sensor networks, sensor devices deployed in WBANs are very small in size, and there is another limitation that requires a long operational lifetime of the sensors: it is difficult to replace or recharge batteries in cases in which sensors are placed in a person’s body or clothing. Therefore, a sensor device’s energy technology is a very important in WBAN.
One of innovations used in WBAN to extend the lifetimes of sensors is to use transmission power control algorithms. The transmission power control algorithm regulates the transmission power of a transmitter to reduce energy consumption for every transmitting channel [7]. Existing transmission power control algorithms perform transmission power regulation based on the closed-loop mechanism. A closed-loop-based algorithm means a method in which a node sensor, usually called cluster head or sink, informs other sensors of transmission power level through a control message channel when conducting communication between a sensor and a cluster head (CH). A sensor can transmit the collected data with the transmission power received from CH. This closed loop mechanism, however, has the disadvantage of high energy consumption due to excessive control messages [8].
Another innovation used in WBAN to extend the lifetimes of sensors is a cluster-based routing protocol. Due to various restrictions on wireless networks, routing protocols used in networks are also subject to a number of constraints. Many studies have been conducted in this field and two types of topological structures have been proposed, primarily planar topologies and layered topologies. In a planar structure, all nodes in a network are at the same level and have the same routing capabilities, making it simple and efficient in a small network. The problem, however, is that as the network grows, the amount of routing information increases rapidly, and it takes a long time for routing information to reach the final node. For large networks, cluster-based hierarchical routing can be used to resolve the problem. In hierarchical routing, nodes within the network are dynamically configured by being grouped into areas called clusters, and clusters are eventually assembled into base stations. Routing with clustering has the following advantages:
  • Clusters help maintain a relatively stable network topology.
  • Routing overhead can be significantly reduced by propagating high levels of information through cluster heads.
  • Only CH or intermediate nodes need to maintain path information.
  • Reduce energy consumption across all networks.
  • Improve network scalability.
Consequently, the use of hierarchical routing protocols will maximize the energy efficiency. Optimal CH selection and clustering configuration methods are required to ensure equal energy consumption to maximize the network lifetime in a routing protocol. In this paper, we propose a hierarchical routing protocol and utilize fuzzy logic in the method of optimal CH selection and clustering configuration.
The rest of this paper is as follows. In Section 2, we introduce the related research. More details of enhanced LEACH-dual fuzzy logic (ELEACH-DFL) with optimal CH selection method and clustering configuration are presented in Section 3. In Section 4, we evaluate the performances of the ELEACH-DFL. Finally, the paper is concluded in Section 5.

3. Proposed Protocol: ELEACH-DFL

We propose the ELEACH-DFL which is applied two fuzzy logics for CHs selection and cluster configuration, based on LEACH algorithms, for an energy-efficient network. In the process of selecting CHs, we consider the residual energy and local distance as fuzzy inputs and make rules on which nodes with more residual energy and higher centrality are selected as CHs. After selecting CHs, another FIS is applied to clusters configuration. The remaining energy of Non-CH nodes, distances from CHs, and distances between CHs and BS are used as fuzzy inputs. These two logics allow a network to increase its lifetime.

3.1. Cluster Head Selection

When each round starts, each node calculates its own chance value through fuzzy operation. To select the optimal CHs to extend the network lifetime, the remaining energy of each sensor node and the local distance, the sum of the distances from the nodes within a certain range, are regarded as input variables. Figure 5 is the first FIS block diagram for CH selection. The inputs and the output of the first FIS are described in terms of variable names and meanings in Table 2. Membership functions of the FIS are configured like Figure 6 to get optimal performances in terms of energy. The selection of CH candidates is fulfilled using Equation (1), T(n) threshold equation of LEACH. Subsequently, after randomly forming a cluster, compare the calculated chance between the CH candidate and the node with the highest chance in a cluster of becoming the CH. The detailed sequence of the CH selection process is shown in below Figure 7.
Figure 5. First FIS for cluster head (CH) selection.
Table 2. Input and output names and meanings.
Figure 6. Membership functions of inputs and output in the first FIS.
Figure 7. Flowchart of the cluster head selection process.

3.2. Cluster Configuration

After deciding on CHs, clusters are formed with several non-CH nodes. The second FIS considers the energies of the CHs, distance from BS, and distances between nodes and CHs among on-CH nodes, and obtains the chance values from these three inputs. Figure 8 is the second FIS block diagram for the cluster configuration process. The inputs and output of the second FIS are described in regard to variable names and meanings in Table 3. Membership functions of the FIS are set like Figure 9 to get optimal cluster formations to get optimal performances in terms of energy.
Figure 8. Second FIS for cluster configuration.
Table 3. FIS input and output variables during cluster formation.
Figure 9. Membership functions of inputs and output in second FIS.
Once clusters are formed, each node transmits the measured data to its CH, and then, CHs collect the data and aggregate the collected data if needed or necessary, and send the fuzzed data to the BS. The clustering formation process is described in Figure 10 in detail.
Figure 10. Flowchart of cluster configuration process.
The following Figure 11 shows the proposed algorithm’s pseudocode. Lines 13–49 of the code are the CH selection and cluster configuration section. Line 15 is the part that determines whether the node’s random number is less than the T(n) of LEACH if the node is alive. If true, the CH selection section, lines 17–31 will be executed. Line 18 is a FIS operation function, and lines 3–12 are its executing code. If the conditions of line 15 are false, the node becomes a member node and progresses to lines 35–48, which are part of the cluster configuration.
Figure 11. Pseudocode of CH and cluster configuration.

4. Simulation and Performances

4.1. Simulation Conditions

The radio model used in this paper is a two-path propagation model, consisting of two types of reflecting wave and a LOS (line of sight) wave. All sensor nodes were assumed to transmit a certain amount of homogeneous data after converting the measured data into digital signals using an internal A/D converter, and we made a general assumption about the wireless sensor field. That is, the wireless sensor network consists of homogeneous sensor nodes, the distance can be measured according to radio signal strength, and once deployed, the node does not move. Additionally, all sensor nodes have the same initial energy, and the base station is located in the centre or outside of whole the sensor field. Experimental parameters are defined as shown in Table 4 and parameters and meanings for the radio model are summarized in Table 5.
Table 4. Experimental parameters.
Table 5. Parameters and meanings for the radio model.
We used MATLAB to simulate the proposed ELEACH-DFL and compare it with the LEACH protocol in terms of energy consumption. We evaluate and compare FND (first node dead), HND (half node dead) and LND (last node dead) values, which are normally used to evaluate energy performance.

4.2. Performance Comparison

Table 6 shows the constellation of sensor nodes and clusters when the proposed protocol is adopted, when the location of BS is set to (50, 50) at the inside of the sensor field at first, second, and FND rounds. The FND takes place in 3942 rounds. The FND of the LEACH protocol is 2983. The FND efficiency improvement rate of ELEACH-DFL over the LEACH protocol is approximately 32%. The results are confirmed in Figure 12 and Figure 13.
Table 6. Network lifetime comparisons between protocols.
Figure 12. Constellation of nodes and clusters’ configuration.
Figure 13. Network lifetime comparison between protocols (base station (BS)): inside the sensor field).
Table 7 shows the constellation of sensor nodes and clusters when the proposed protocol is adopted, when the location of BS is set to (50, 150) at the outside of the sensor field at first, second, and FND rounds.
Table 7. Network lifetime comparisons between protocols.
The FND takes place in 3654 rounds in the proposed algorithm. The FND of the LEACH protocol is 1412. The FND improvement rate of ELEACH-DFL over LEACH is approximately 159%. When compared to around 80 percent of nodes being alive and HND, the proposed algorithm is improved by 30% and 51% respectively. The results are confirmed Figure 14 and Figure 15.
Figure 14. Constellation of nodes and clusters’ configuration.
Figure 15. Network lifetime comparison between protocols (BS: outside the sensor field).
The above experiments did not take into account the calculation quantity or the reliability of transmission; however, as the results indicate, the proposed algorithm has better energy efficiency characteristics than conventional LEACH regardless of the location of the BS.

5. Conclusions

For wired sensor networks, wiring sensors to the user may cause problems and inconvenience regarding mobility. This led to the use of wireless sensor networks to proceed with body sensor networks, which should take into account the problem of power efficiency. Specifically, in body sensor networks, using implanted sensors and optimizing the energy consumption can keep sensors alive long.
The LEACH protocol is energy efficient before the first node is dead. However, there is a sharp drop in energy efficiency after FND. The proposed protocol, ELEACH-DFL, has the advantage of maintaining energy efficiency even after FND occurs, while considering cluster configuration and CH selection separately. In a cluster-based routing WSN protocol, network lifetime is severely affected by the configuration of clusters and the location of CHs. Without considering these, LEACH improved only the problem of one node being selected continuously as the CH by ensuring that all nodes are selected evenly.
Therefore, ELEACH-DFL proposes using a fuzzy logic to improve CH selection issues. Thus, ELEACH-DFL allows the optimal CH to be selected by considering the energy of each node and the location or density of the nodes. The ELEACH-DFL (extended LEACH-dual fuzzy logic) proposes both CH selection and cluster configuration methods. When selecting a CH, the CH candidate was firstly selected using the threshold equation, and the node with a highest chance was determined as the CH by comparing the remaining energies of the nodes among the candidates and the distances of the near nodes together. After CH selection, it was decided that when each non-CH candidate node participates in a cluster, it should participate in the appropriate cluster based on the remaining energy of the CH, distance from BS, and distance to the CH.
We compared the proposed ELEACH-DFL with LEACH in terms of energy efficiency, FND, and HND. In a field size of 50 × 50, the FND efficiency improvement rate of ELEACH-DFL versus LEACH protocol is approximately 32%. In addition, in a field of 50 × 150, the FND efficiency improvement rate of ELEACH-DFL versus the LEACH protocol is approximately 159%. The proposed algorithm has better energy efficiency characteristics than conventional LEACH, regardless of the location of the BS. It would be better for further research to consider the computational amounts and reliability of data transmission simultaneously.

Author Contributions

The authors of D.Y.Y. and T.K. conducted a basic survey on the research, and the overall study of ELEACH-DFL was led by the authors of J.-Y.L. and D.L., and the thesis research was conducted overally by the author of S.Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

No external funding available.

Conflicts of Interest

The authors have no conflicts of interest.

References

  1. Jovanov, E.; Milenkovic, A.; Otto, C.; De Groen, P.; Johnson, B.; Warren, S.; Taibi, G. A WBAN system for ambulatory monitoring of physical activity and health status: Applications and challenges. Conf. Proc. IEEE Eng. Med. Biol. Soc. 2005, 2005, 3810–3813. [Google Scholar]
  2. Hayajneh, T.; Almashaqbeh, G.; Ullah, S.; Vasilakos, A.V. A survey of wireless technologies coexistence in WBAN: Analysis and open research issues. Wirel. Netw. 2014, 20, 2165–2199. [Google Scholar] [CrossRef]
  3. Barakah, D.M.; Ammad-Uddin, M. A survey of challenges and applications of Wireless Body Area Network (WBAN) and role of a virtual doctor server in existing architecture. In Proceedings of the Third International Conference on Intelligent Systems Modelling and Simulation, Kota Kinabalu, Malaysia, 8–10 February 2012; pp. 214–219. [Google Scholar]
  4. Otto, C.A.; Jovanov, E.; Milenkovic, A. A WBAN-based system for health monitoring at home. In Proceedings of the 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, Cambridge, MA, USA, 4–6 September 2006; pp. 20–23. [Google Scholar]
  5. Huh, J.H. Implementation of lightweight intrusion detection model for security of smart green house and vertical farm. Int. J. Distrib. Sens. Netw. 2018, 14, 1–11. [Google Scholar] [CrossRef]
  6. Crosby, G.V. Wireless body area networks for healthcare: A survey. Int. J. Ad Hoc Sens. Ubiquitous Comput. 2012, 3, 1–26. [Google Scholar] [CrossRef]
  7. Cavallari, R.; Martelli, F.; Rosini, R.; Buratti, C.; Verdone, R. A survey on wireless body area networks: Technologies and design challenges. IEEE Commun. Surv. Tutor. 2014, 16, 1635–1657. [Google Scholar] [CrossRef]
  8. Amna, A.; Sumra, I.A. Applications of wireless body area network (wban): A survey. Eng. Sci. Technol. Int. Res. J. 2017, 1, 64–71. [Google Scholar]
  9. Khan, N.; Javaid, N.; Khan, Z.A.; Jaffar, M.; Rafiq, U.; Bibi, A. Ubiquitous healthcare in wireless body area networks. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 1960–1967. [Google Scholar]
  10. Latré, B.; Braem, B.; Moerman, I.; Blondia, C.; Demeester, P. A survey on wireless body area networks. Wirel. Netw. 2010, 17, 1–18. [Google Scholar] [CrossRef]
  11. Omeni, O.; Wong, A.C.W.; Burdett, A.J.; Toumazou, C. Energy efficient medium access protocol for wireless medical body area sensor networks. IEEE Trans. Biomed. Circuits Syst. 2008, 2, 251–259. [Google Scholar] [CrossRef]
  12. Li, H.; Tan, J. Heartbeat-driven medium-access control for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 2009, 14, 44–51. [Google Scholar] [CrossRef]
  13. Ren, H.; Meng, M.Q.-H. Rate control to reduce bioeffects in wireless biomedical. In Proceedings of the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose, CA, USA, 17–21 July 2006. [Google Scholar]
  14. Tang, Q.; Tummala, N.; Gupta, S.; Schwiebert, L. Communication scheduling to minimize thermal effects of implanted biosensor networks in homogeneous tissue. IEEE Trans. Biomed. Eng. 2005, 52, 1285–1294. [Google Scholar] [CrossRef]
  15. Bag, A.; Bassiouni, M.A. Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks. In Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Vancouver, BC, Canada, 9–12 October 2006; pp. 604–609. [Google Scholar]
  16. Takahashi, D.; Xiao, Y.; Hu, F.; Chen, J.; Sun, Y. Temperature-aware routing for telemedicine applications in embedded biomedical sensor networks. EURASIP J. Wirel. Commun. Netw. 2007, 2008, 1–11. [Google Scholar] [CrossRef]
  17. Watteyne, T.; Augé-Blum, I.; Dohler, M.; Barthel, D. AnyBody: A self-organization protocol for body area networks. In Proceedings of the 2nd International Conference on Body Area Networks, Florence, Italy, 11–13 June 2007. [Google Scholar]
  18. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar]
  19. Moh, M.; Culpepper, B.; Dung, L.; Moh, T.-S.; Hamada, T.; Su, C.-F. On data gathering protocols for in-body biomedical sensor networks. In Proceedings of the GLOBECOM ’05. IEEE Global Telecommunications Conference, St. Louis, MO, USA, 28 November–2 December 2005; Volume 5, p. 2996. [Google Scholar]
  20. Latré, B.; Braem, B.; Moerman, I.; Blondia, C.; Reusens, E.; Joseph, W.; Demeester, P. A low-delay protocol for multihop wireless body area networks. In Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous), Philadelphia, PA, USA, 6–10 August 2007; pp. 1–8. [Google Scholar]
  21. Latré, B.; De Poorter, E.; Moerman, I.; Demeester, P. MOFBAN: A Lightweight Modular Framework for Body Area Networks; Springer Science and Business Media LLC: Berlin, Germany, 2007; Volume 4808, pp. 610–622. [Google Scholar]
  22. Moerman, I.; Latre, B.; Demeester, P.; Braem, B.; Blondia, C. The wireless autonomous spanning tree protocol for multihop wireless body area networks. In Proceedings of the Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, San Jose, CA, USA, 17–21 July 2006. [Google Scholar]
  23. Jamil, F.; Iqbal, M.A.; Amin, R.; Kim, D.-H. Adaptive thermal-aware routing protocol for wireless body area network. Electronics 2019, 8, 47. [Google Scholar] [CrossRef]
  24. Jin, Z.; Ding, M.; Li, S. An energy-efficient and obstacle-avoiding routing protocol for underwater acoustic sensor networks. Sensors 2018, 18, 4168. [Google Scholar] [CrossRef] [PubMed]
  25. Anwar, M.; Abdullah, A.H.; Altameem, A.; Qureshi, K.; Masud, F.; Faheem, M.; Cao, Y.; Kharel, R. Green communication for wireless body area networks: Energy aware link efficient routing approach. Sensors 2018, 18, 3237. [Google Scholar] [CrossRef] [PubMed]
  26. Jadoon, R.N.; Zhou, W.; Jadoon, W.; Khan, I.A. RARZ: Ring-zone based routing protocol for wireless sensor networks. Appl. Sci. 2018, 8, 1023. [Google Scholar] [CrossRef]
  27. Huh, J.H. (Ed.) Smart Grid Test Bed Using OPNET and Power Line Communication; IGI Global: Hershey, PA, USA, 2017; pp. 1–425. [Google Scholar]
  28. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  29. Heinzelman, W.B. Application-Specific Protocol Architectures for Wireless Networks. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2000. [Google Scholar]
  30. WooSuk, L.; Jung, K.-D.; Lee, J.-Y. Improvement of cluster head selection of LEACH protocol. Int. J. Appl. Eng. Res. 2017, 12, 10002–10006. [Google Scholar]
  31. WooSuk, L.; Jung, K.-D.; Lee, J.-Y. Improved the Transmission Method of Cluster Head in LEACH Protocol. J. Eng. Appl. 2018, 13, 8730–8732. [Google Scholar]
  32. Hu, X.; Ma, L.; Ding, Y.; Xu, J.; Li, Y.; Ma, S. Fuzzy logic-based geographic routing protocol for dynamic wireless sensor networks. Sensors 2019, 19, 196. [Google Scholar] [CrossRef]
  33. Lee, J.-Y.; Lee, D. The LEACH fuzzy-logic using a uniform electing algorithm for the cluster head. In Proceedings of the International Conference on Future Information & Communication Engineering, Yokohama, Japan, 29–30 July 2016; Volume 8. [Google Scholar]
  34. Gupta, M.M.; Rao, D. On the principles of fuzzy neural networks. Fuzzy Sets Syst. 1994, 61, 1–18. [Google Scholar] [CrossRef]
  35. Gupta, M.M. Fuzzy information and decision processes. IFAC Proc. Vol. 1982, 15, 409–411. [Google Scholar] [CrossRef]
  36. Gupta, M.; Qi, J. On fuzzy neuron models. In Proceedings of the IJCNN-91-Seattle International Joint Conference on Neural Networks, Seattle, WA, USA, 8–12 July 2002. [Google Scholar]
  37. Ran, G.; Zhang, H. Improving on LEACH protocol of wireless sensor networks using fuzzy logic. J. Inf. Comput. 2010, 7, 767–775. [Google Scholar]
  38. Banimelhem, O.; Taqieddin, E.; Mowafi, M.; Awad, F.; Al-Ma’Aqbeh, F. Information resources management association fuzzy logic-based cluster heads percentage calculation for improving the performance of the LEACH protocol. Fuzzy Syst. 2017, 4, 609–627. [Google Scholar]
  39. Dastgheib, S.J.; Oulia, H.; Ghassami, M.R.S. An efficient approach for clustering in wireless sensor network using fuzzy logic. In Proceedings of the International Conference on Computer Science and Network Technology, Harbin, China, 24–26 December 2011; Volume 3, pp. 1481–1486. [Google Scholar]
  40. Mhemed, R.; Aslam, N.; Phillips, W.; Comeau, F. An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Comput. Sci. 2012, 10, 255–262. [Google Scholar] [CrossRef]
  41. Gajjar, S.; Sarkar, M.; Dasgupta, K.; Chaniyara, D. Low energy fuzzy based unequal clustering multihop architecture for wireless sensor networks. Proc. Natl. Acad. Sci. USA 2017, 88, 539–556. [Google Scholar] [CrossRef]
  42. Ishibuchi, H.; Nozaki, K.; Yamamoto, N.; Tanaka, H. Selecting fuzzy if-then rules for classification problems using genetic algorithms. IEEE Trans. Fuzzy Syst. 1995, 3, 260–270. [Google Scholar] [CrossRef]
  43. Karnik, N.N.; Mendel, J.M. Centroid of a type-2 fuzzy set. Inf. Sci. 2001, 132, 195–220. [Google Scholar] [CrossRef]
  44. Sugeno, M. An introductory survey of fuzzy control. Inf. Sci. 1985, 36, 59–83. [Google Scholar] [CrossRef]
  45. Kwon, O.S.; Jung, K.-D.; Lee, J.-Y. WSN protocol based on LEACH protocol using fuzzy. Int. J. Appl. Eng. Res. 2017, 12, 10013–10018. [Google Scholar]
  46. Lee, J.-Y.; Lee, D. Improving network lifetime using fuzzy logic in cluster-based WSN protocol. Int. J. Grid Distrib. Comput. 2018, 11, 23–32. [Google Scholar] [CrossRef]
  47. Lee, J.-Y.; Lee, D. Cluster configuration method using fuzzy in Wireless sensor network. In Proceedings of the International Conference on Future Information & Communication Engineering, Pattaya, Thailand, 25–28 June 2019; Volume 11. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.