SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 1, February 2023, pp. 502~510
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i1.pp502-510  502
Journal homepage: http://ijece.iaescore.com
Ameliorate the performance using soft computing approaches
in wireless networks
Chandrika Dadhirao, Ravi Sankar Sangam
School of Computer Science and Engineering, VIT-AP University, Andhra Pradesh, India
Article Info ABSTRACT
Article history:
Received Jan 13, 2022
Revised Jul 28, 2022
Accepted Aug 25, 2022
Wireless sensor networks are an innovative and rapidly advanced network
occupying the broad spectrum of wireless networks. It works on the
principle of “use with less expense, effort and with more comfort.” In these
networks, routing provides efficient and effective data transmission between
different sources to access points using the clustering technique. This work
addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s
main backdrop of choosing head nodes based on a random value. In this, the
soft computing methods are used, namely the fuzzy approach, to overcome
this barrier in LEACH. Our approach’s primary goal is to extend the
network lifetime with efficient energy consumption and by choosing the
appropriate head node in each cluster based on the fuzzy parameters. The
proposed clustering algorithm focused on two fuzzy inference structures,
namely Mamdani and Sugeno fuzzy logic models in two scenarios,
respectively. We compared our approach with four existing works, the
conventional LEACH, LEACH using the fuzzy method, multicriteria cluster
head delegation, and fuzzy-based energy efficient clustering approach
(FEECA) in wireless sensor network. The proposed scenario based fuzzy
LEACH protocol approaches are better than the four existing methods
regarding stability, network survivability, and energy consumption.
Keywords:
Energy efficiency
Head node
Mamdani
Network lifetime
Sugeno
Wireless sensor networks
routing protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Chandrika Dadhirao
School of Computer Science and Engineering, VIT-AP University
near Vijayawada, 522237, Andhra Pradesh, India
Email: chandrikad10@gmail.com
1. INTRODUCTION
Microcontrollers, networking technology, microelectromechanical systems, and nanotechnology
have developed novel sensing and communication systems, referred to as wireless sensor networks. These
new technologies have also contributed to the advancement of nanotechnology (WSNs). Figure 1 presents a
schematic representation of a wireless sensor network.
They are skilled with opportunity providing technology which pings its role in a wide range of
applications that bare minimum human intervention and play a critical function in making the future smarter.
It uses spatially distributed self-governing nodes that use sensors to track any circumstance, either physical or
environmental. WSN are continuing to be the most effective aid to sensing and monitoring tasks. The ability
to work in uncertain environments, easy implementation, and high performances are among the many reasons
for the popularity. Their primary benefit is the ability to be carried out to any discipline and in any
surroundings. Unlike popular networks that, for their application, require extensively stringent conditions. In
this mechanism, node energy, in conjunction with balancing glide, is the primary trouble in which sources are
scarcely to claim approximately a way to reduce strength intake and prolong the network lifetime for the
structure of WSNs using existing routing protocols.
Int J Elec & Comp Eng ISSN: 2088-8708 
Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao)
503
In terms of productivity in WSNs, routing protocols [1], [2] play a vital role. Routing is one of the
most challenging techniques on WSN. It is necessary to find the best path between the source node and the
target node. This method is the mathematical portrayal of human concepts. The main motto of any network is
the efficient and effective transmission of information between the source and the final destination. This
routing is one of the best solutions to provide an efficient and best path for wireless sensor networks. In
routing, in this work the clustering approach is chosen [3]–[9] for selecting the best way for intra-clustering
and inter-clustering. The classification of routing protocols [10]–[12] relies upon two critical elements, i.e.,
first off, primarily based on network structure and secondly based on the protocol operation. The chore of
discovering and retaining routes in WSNs is not minor, as energy restrictions and sudden changes in a node.
WSN has attracted tremendous attention from academics and industry worldwide in the past, present, and
future. The wide range of applications [13] of WSNs is flora and fauna, military, industrial, urban,
environmental, health, education, entertainment [14]–[20]. WSN involve millions of nodes that operate
together, detecting and transmitting ambient knowledge to the base station [21]. Apart from those have
worked on multiple sink nodes in a WSN to increase the scalability and lifetime of the network [22]. Many
cluster heads choose a specific sink node and try to send their data to the sink simultaneously. Sujith et al.
[23] suggested an energy-efficient zone-based clustering algorithm for WSN. In their approach, they
considered zones as clusters and zone monitor as cluster head. Bagga et al. [24] has initiated an fuzzy logic-
based clustering routing (FLBCR) protocol as a routing scheme that applies fluctuating logic to determine the
likelihood of selecting a node as a cluster head (CH) with a variable setting existence a network. For instance,
an improved low-energy adaptive clustering hierarchy–mobile fuzzy (LEACH MF) protocol has been
addressed to prolong lifetime of wireless sensor networks and they show in their results that the proposed
modified parameter LEACH MF is better in performance and energy consumption [25]. This compared type1
and type2 fuzzy logic approach in choosing cluster head selection to increase the wireless sensor networks.
Figure 1. Layout of the wireless sensor network
2. METHOD
The main steps of our proposed fuzzy based LEACH approach are discussed in this section. In
proposed algorithm, optimum number of head nodes are chosen using Kopt from (1).
𝐾𝑜𝑝𝑡 =
√𝑏
√2∗𝑇ℎ
∗ 𝜃0 ∗
𝑀
𝑑𝐵𝑆2 (1)
where b is the number of nodes, Th is the user defined threshold value, θ0 is the computed ratio of energy
dissipated in the free space (µ) by the energy dissipated in multi path (ϑ), M is the product of area of the
network and sink coordinates, and dBS2
is the first form of Euclidean distance of respective node to the sink
node. The current heads of nodes calculate their W i (output fuzzy parameter) value using the fuzzy method
and broadcast the current head node (HN) message to all nodes coming under the communication range. The
member nodes choose the nearest HN and join it to form clusters, respectively using dBS (2):
𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒 = min⁡
(√(𝑆𝑝 − 𝑆𝑞)
2
, (𝑆𝑞 − 𝑆𝑏𝑗)2) (2)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510
504
where 𝑆𝑝 and 𝑆𝑞 are the length and width of the area of the network, respectively, and 𝑆𝑏𝑖 and 𝑆𝑏𝑗 are the sink
coordinates. The residual energy γRe is calculated based on node coordinates Bbij and user defined threshold
value ψ:
ϒ𝑅𝑒⁡ = ⁡𝛹 ∗ (∑ 𝐻𝑖
𝑏
𝑖=1 ) − (∑ 𝐶𝑗
𝑏
𝑗=1 ) (3)
where i,j are the coordinating positions of the node deployed in the network, b is the total number of nodes in
the area, H is x coordinate of the node, and C is the y coordinate of the node. The calculations of Dist and d
are shown in (4).
𝐷𝑖𝑠𝑡𝑚𝑖𝑛 = √∑ ((𝐻𝑖 − 𝑗)2 + (𝐶𝑖 − 𝐶𝑗)2)
𝑏
𝑞𝑖,𝑗=1
(4)
Initially, the cluster range will be considered as a value. Based on the calculated distance of the
nodes with respect to the mote is checked. Whether the distance is less than the range of the cluster
℧
Clusterrange in the network is calculated as (5):
ʊ𝐶𝑙𝑢𝑠𝑡𝑒𝑟𝑅𝑎𝑛𝑔𝑒 = 𝐷𝑖𝑠𝑡⁡ ≤⁡ʊ𝐶𝑙𝑢𝑠𝑡𝑒𝑟𝑅𝑎𝑛𝑔𝑒 (5)
𝑑 = √∑ ((𝑆𝑝𝑖 − (𝐻𝑖)2)⁡ + (𝑆𝑞𝑗 − (𝐶𝑗)2)⁡)
𝑏
𝑞𝑖,𝑗=1
(6)
where 𝑆𝑝 and 𝑆𝑞 are the length and width of the area of the network, respectively, and 𝑆𝑏𝑖 and 𝑆𝑏𝑗 are the sink
coordinates.
𝐶𝑜𝑠𝑡 =
𝐷𝑖𝑠𝑡(𝑇ℎ𝑛)
((𝑇ℎ𝑛)−1)+𝑑
(7)
where Thn is the tentative head node, d is the minimum distance. The CH generates a time division multiple
access (TDMA) schedule and sends it to its members until the CH and its members are fixed. The method of
choosing a head node by the use of fuzzy procedure is done in 4 steps for Scenario 1.
a. Input and fuzzification: We fetch the three input values to the fuzzy inference system using (3), (2) and
(7). Those input fuzzy parameters determine the cost of each enter based on the respective membership
feature µ.
b. Fuzzy inferences: We offer the membership values acquired to our if then rules to acquire to our new
fuzzy set output. Our fuzzy if then rules have more than one input and the bushy and operator which
selects the minimal of our 3 membership values.
c. Aggregation: The aggregation is a unity of all the results from the implementation of all rules received.
We use an OR fuzzy logic operator when we aggregate all our rules in our FIS as shown in Table 1. To
produce a new aggregate fuzzy set which will be used in the defuzzification stage, this operator chooses
the limit of the rule evaluation values.
d. Defuzzification: With a purpose to calculate the chance of each node, we mixture the effects of every rule
the usage of Mamdani technique. This manner is known as defuzzification which unearths the threat price
of each node to choose head node. In our proposed we use centroid method has been used for
defuzzification.
The following components constitute the type-2 fuzzy logic model is done in 6 steps for Scenario 2
used in this work.
a. Fuzzification module: This module maps the crisp input to a type-2 fuzzy set using the gaussian2
membership function.
b. Inference engine: This module evaluates the rules in the knowledge base against the type-2 fuzzy set
gotten from the fuzzification module to produce another type-2 fuzzy set.
c. Type reducer: Type reducer uses Karnik-Mendel algorithm to reduce an interval type-2 fuzzy set to
type-1 fuzzy set.
d. Defuzzification module: It maps the fuzzy set produced by the type of reducer to a crisp output using the
center of gravity defuzzification method.
e. Fuzzy knowledge base: This is a database of rules to be used by the inference engine.
f. Membership function: This mathematical equation helps the fuzzification module convert the crisp input
into a fuzzy set.
Figure 2 represents pseudocode for the proposed algorithm.
Int J Elec & Comp Eng ISSN: 2088-8708 
Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao)
505
Table 1. The fuzzy if then rules
Rule no Residual energy Cost Distance Chance
1 High High Low High
2 High Medium Medium Very high
3 High Low High Medium
4 High High Low Medium
5 High Medium Medium Very high
6 High Low High Medium
7 High High Low Medium
8 High Medium Medium Very high
9 High Low High Medium
10 Medium High Low High
11 Medium Medium Medium Medium
12 Medium Low High High
13 Medium High Low High
14 Medium Medium Medium Medium
15 Medium Low High High
16 Medium High Low High
17 Medium Medium Medium Medium
18 Medium Low High High
19 Low High Low Low
20 Low Medium Medium Medium
21 Low Low High Very low
22 Low High Low Very low
23 Low Medium Medium Medium
24 Low Low High Very low
25 Low High Low Very low
26 Low Medium Medium High
27 Low Low High Very low
Figure 2. The pseudocode for the proposed approach
3. RESULTS AND DISCUSSION
All the following results in this paper are executed using MATLAB R2018a, which system
configuration is Intel i5 processor (2.7 GHz) with 16 GB memory running on Windows 10 operating system.
During the simulation process of data transmission between nodes from the source, through intermediate
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510
506
nodes and to the final destination nodes, each node uses its limited power, causing depletion. Any node
which has reached a specific limit value of user choice is considered dead. The simulation parameters for
performing our experiment are shown in Table 2.
Table 2. Simulation parameters
Type Parameter Value
Network topology Number of nodes 100, 200, 500, 1000
Number of clusters 20
Network coverage 100, 100, 50, 175
Deployment Random
Radio model Initial energy 2 J
Energy consumption per bit 50 nJ/bit
Energy loss in free space 100 pJ/bit/m2
Energy loss in multipath 0.0013 pJ/bit/m4
Application Simulation rounds 5000
Packet header times 25 bytes
Broadcast packet size 16 bytes
Data packet size 3200
Competition radius 25 m
Bandwidth 1 Mb/s
Here we compared three protocols fuzzy LEACH, multi-criteria cluster head delegation based on
fuzzy logic (MUCH) and the proposed fuzzy logic LEACH. Simulation was done in MATLAB simulator and
initially a total of 100 nodes are randomly scattered in a 100 m–by–100 m square area. Depicts the number of
sensor nodes alive in the network.
3.1. First node die
Figure 3 illustrates the point in time at which the first node is removed from the graph (FND). Based
on the findings of the study, we are able to conclude that the FND can be found using the existing approaches
even at the early rounds when compared with the methods that we have provided.
Figure 3. First node die
3.2. Quarter node die
Figure 4 illustrates the round at which a quarter of the nodes are removed from the graph (QND).
Based on the findings of the investigation, we can conclude that, in comparison to our suggested technique,
the existing methods produce at earlier rounds.
3.3. Half-node die
Figure 5 illustrates the round at which the half nodes are considered dead (HND). The findings of
the study allow us to conclude that, in comparison to the way that we have presented, the existing methods
produce HNDs at earlier rounds.
100 200 500 1000
179 178 143 119
358
178 145 129
183 171 160 138
1009
719
415
223
1599
1269
1096
1011
1779
1652
1494
1352
First Node Die
LEACH
LEACH USING FUZZY
MUCH
FEECA
Scenario1
Scenario2
Int J Elec & Comp Eng ISSN: 2088-8708 
Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao)
507
Figure 4. Quarter node die
Figure 5. Half-node die
3.4. Number of nodes survived
Figure 6 shows the total number of nodes alive after completion of a certain number of simulation
rounds. It is observed that in initial fuzzy LEACH and one of the improved fuzzy LEACHs termed MUCH,
has 99% of nodes die after completing of 5000 rounds but in our proposed methods only 81% and 93% of
nodes die these results better energy efficiency of the nodes as well as improved network lifetime. The
comparison is made based on residual energy, lifetime of sensor nodes, and throughput. These three
parameters are used as comparison parameters. Figures 7 to 9 show the comparative analysis in the following
subsections, respectively.
Figure 6. Nodes alive after completion of 5,000 rounds
LEACH
LEACH
USING
FUZZY
MUCH
FEECA
Scenario1
Scenario2
279 548
261
1141
2344
2228
209
275 308
855
1801
2136
263
264
269 497
1698
2028
262 263
252 289
1668
1819
Quarter Node Die(QND)
100 200 500 1000
LEACH
LEACH
USING
FUZZY
MUCH
FEECA
Scenario1
Scenario2
455
915
449
1201
2798
2562
460
464
512
896
2303 2378
430
439
441 520
2084 2224
380 389 384
309
2042 2003
Half Node Die(HND)
100 200
500 1000
LEACH
LEACH USING FUZZY MUCH
FEECA
Scenario1
Scenario2
1
1
1
1
19
7
0
0
0 1
22
2
0
0
0
0
14
1
0
0
0
0
15
1
Number of Nodes Alive 100 200 500 1000
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510
508
3.5. Throughput
The term “universal performance” or “throughput” refers to the amount of packets that are received
by the sink using its available resource. As can be seen in Figure 7, our suggested protocol has a higher
throughput in comparison to LEACH, LEACH with fuzzy, MUCH, fuzzy-based energy efficient clustering
approach (FEECA), and both of our proposed methods, which are Scenario 1 and Scenario 2, respectively.
Figure 7. Performance of the node based on data transmission among nodes to mote
3.6. Lifetime of sensor nodes
The average network lifetime of the wireless network has been calculated using three mentioned
routing protocols. Here, the forwarder node is regarded in each round to be the node with the most
considerable rest energy. As Figure 8 shows, the average network life will be extended when the information
is transferred from nodes to sinks through our suggested protocol routing. In other words, in terms of average
network life, our proposed plan outperformed existing schemes.
Figure 8. Lifetime of the sensor nodes in the network
Round
Round
Int J Elec & Comp Eng ISSN: 2088-8708 
Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao)
509
3.7. Residual energy
In this experiment, we have considered the average residual energy of all the nodes as a measure of
performance and compared our protocol to three others. Higher residual energy is essential to extend the
network life. From Figure 9, we can see that this residual average power is above the three mentioned
protocols.
Figure 9. Total energy dissipated among the nodes during each round
4. CONCLUSION
Wireless sensor networks are becoming relevant in a broad range of emerging technologies. One of
the challenges to WSNs is to reduce the use of resources and increase the networks' existence, for which
routing may be a remedy. As the propagation energy is proportional to the distance between the sender and
the receiver, the clustering mechanism minimizes energy use in routing. Using fuzzy reasoning, WSN can
resist complicated mathematical models and provide considerable stability in the networks life to deal with
uncertainty and interpretation. These suggested strategies described in both scenarios are a revision of the
option of LEACH to select the optimal number of head node selection and select the best head node selection
in any round during each cluster. The simulation findings indicate that our proposed solution delivers more
robust results than four other existing state-of-the-art algorithms and proves to be more scalable after
completing rounds in FND, QND, HND, and the number of nodes alive.
REFERENCES
[1] R. T. Ai-Zubi, N. Abedsalam, A. Atieh, and K. A. Darabkh, “Lifetime-improvement routing protocol for wireless sensor
networks,” in 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), Mar. 2018, pp. 683–687, doi:
10.1109/SSD.2018.8570628.
[2] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications,
vol. 11, no. 6, pp. 6–28, Dec. 2004, doi: 10.1109/MWC.2004.1368893.
[3] J. A. Patel and Y. Patel, “The clustering techniques for wireless sensor networks: a review,” in 2018 Second International
Conference on Inventive Communication and Computational Technologies (ICICCT), Apr. 2018, pp. 147–151, doi:
10.1109/ICICCT.2018.8473153.
[4] H. Yetgin, K. T. K. Cheung, M. El-Hajjar, and L. Hanzo, “A survey of network lifetime maximization techniques in wireless
sensor networks,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 828–854, 2017, doi:
10.1109/COMST.2017.2650979.
[5] K. A. Darabkh, W. S. Al-Rawashdeh, R. T. Al-Zubi, and S. H. Alnabelsi, “C-DTB-CHR: centralized density- and threshold-based
cluster head replacement protocols for wireless sensor networks,” The Journal of Supercomputing, vol. 73, no. 12, pp. 5332–5353,
Dec. 2017, doi: 10.1007/s11227-017-2089-4.
[6] L. XingGuo, W. JunFeng, and B. LinLin, “LEACH protocol and its improved algorithm in wireless sensor network,” in 2016
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Oct. 2016,
pp. 418–422, doi: 10.1109/CyberC.2016.87.
[7] V. Kadrolli and J. Agarkhed, “Soft computing routing techniques in wireless sensor network,” in 2016 2nd International
Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Feb. 2016,
pp. 748–751, doi: 10.1109/AEEICB.2016.7538395.
[8] B. Bhushan and G. Sahoo, “Routing protocols in wireless sensor networks,” in Computational intelligence in sensor networks,
2019, pp. 215–248.
Round
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510
510
[9] M. F. S. Yagoub, J. J. P. C. Rodrigues, O. O. Khalifa, A. B. Mohammed, and V. Korotaev, “Service redundancy and cluster-based
routing protocols for wireless sensor and mobile ad hoc networks: A survey,” International Journal of Communication Systems,
vol. 33, no. 16, 2020, doi: 10.1002/dac.4471.
[10] H. S. Bazzi, A. M. Haidar, and A. Bilal, “Classification of routing protocols in wireless sensor network,” in International
Conference on Computer Vision and Image Analysis Applications, Jan. 2015, pp. 1–5, doi: 10.1109/ICCVIA.2015.7351790.
[11] A. Krishnamoorthy and V. Vijayarajan, “Energy aware routing technique based on Markov model in wireless sensor network,”
International Journal of Computers and Applications, vol. 42, no. 1, pp. 23–29, 2020, doi: 10.1080/1206212X.2017.1396423.
[12] J. Tan et al., “An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor
networks,” IEEE Access, vol. 7, pp. 6703–6723, 2019, doi: 10.1109/ACCESS.2019.2890862.
[13] D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras, “Applications of wireless sensor networks: An up-to-date survey,” Applied
System Innovation, vol. 3, no. 1, Feb. 2020, doi: 10.3390/asi3010014.
[14] K. A. Darabkh and J. N. Zomot, “An improved cluster head selection algorithm for wireless sensor networks,” in 2018 14th
International Wireless Communications & Mobile Computing Conference (IWCMC), Jun. 2018, pp. 65–70, doi:
10.1109/IWCMC.2018.8450446.
[15] I. A. T. Hashem et al., “The role of big data in smart city,” International Journal of Information Management, vol. 36, no. 5,
pp. 748–758, Oct. 2016, doi: 10.1016/j.ijinfomgt.2016.05.002.
[16] D. P. Agrawal, “Applications of sensor networks,” in Embedded Sensor Systems, vol. 8, no. 9S3, Singapore: Springer Singapore,
2017, pp. 35–63.
[17] B. Rashid and M. H. Rehmani, “Applications of wireless sensor networks for urban areas: A survey,” Journal of Network and
Computer Applications, vol. 60, pp. 192–219, Jan. 2016, doi: 10.1016/j.jnca.2015.09.008.
[18] S. R. Jino Ramson and D. J. Moni, “Applications of wireless sensor networks — A survey,” in 2017 International Conference on
Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), Feb. 2017, pp. 325–329, doi:
10.1109/ICIEEIMT.2017.8116858.
[19] T. Khan et al., “A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks,”
IEEE Access, vol. 7, pp. 58221–58240, 2019, doi: 10.1109/ACCESS.2019.2914769.
[20] S. S. Desai and M. J. Nene, “Node-level trust evaluation in wireless sensor networks,” IEEE Transactions on Information
Forensics and Security, vol. 14, no. 8, pp. 2139–2152, Aug. 2019, doi: 10.1109/TIFS.2019.2894027.
[21] D. Agrawal and S. Pandey, “Optimization of the selection of cluster‐head using fuzzy logic and harmony search in wireless sensor
networks,” International Journal of Communication Systems, vol. 34, no. 13, Sep. 2021, doi: 10.1002/dac.4391.
[22] A. Shahidinejad and S. Barshandeh, “Sink selection and clustering using fuzzy-based controller for wireless sensor networks,”
International Journal of Communication Systems, vol. 33, no. 4, Aug. 2020, doi: 10.1002/dac.4557.
[23] A. Sujith, D. R. Dorai, and V. N. Kamalesh, “Energy efficient zone‐based clustering algorithm using fuzzy inference system for
wireless sensor networks,” Engineering Reports, vol. 3, no. 4, Apr. 2021, doi: 10.1002/eng2.12310.
[24] S. Bagga, A. Goyal, G. Gupta, and D. K. Sharma, “FLBCR: Fuzzy logic based clustering routing protocol,” in 2019 10th
International Conference on Computing, Communication and Networking Technologies (ICCCNT), Jul. 2019, pp. 1–7, doi:
10.1109/ICCCNT45670.2019.8944547.
[25] S. Sharma and N. Mittal, “An improved LEACH-MF protocol to prolong lifetime of wireless sensor networks,” in 2018 IEEE 8th
International Advance Computing Conference (IACC), Dec. 2018, pp. 174–179, doi: 10.1109/IADCC.2018.8692096.
BIOGRAPHIES OF AUTHORS
Chandrika Dadhirao is a research scholar in the School of Computer Science
and Engineering at VIT-AP University, near Vijayawada. Her areas of interest are wireless
sensor networks, soft computing, and cloud computing. She can be contacted at email:
chandrikad10@gmail.com.
Ravi Sankar Sangam is an associate professor in the School of Computer
Science and Engineering at VIT-AP University, near Vijayawada. His specialization areas are
data clustering and mining, wireless sensor networks. He can be contacted at email:
srskar@gmail.com.

More Related Content

PDF
A novel energy efficient data gathering algorithm for wireless sensor network...
PDF
Energy-efficient routing protocol for wireless sensor networks based on prog...
PDF
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
PDF
06. Wireless Networks with Machine Learning Routing Enabled.pdf
PDF
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
PDF
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
PDF
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
PDF
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
A novel energy efficient data gathering algorithm for wireless sensor network...
Energy-efficient routing protocol for wireless sensor networks based on prog...
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
06. Wireless Networks with Machine Learning Routing Enabled.pdf
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...

Similar to Ameliorate the performance using soft computing approaches in wireless networks (20)

PDF
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
PDF
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
PDF
An energy-efficient cluster head selection in wireless sensor network using g...
PDF
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
PDF
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
PDF
Energy Proficient and Security Protocol for WSN: A Review
PDF
J031101064069
PDF
Power balancing optimal selective forwarding
PDF
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
PDF
An Ant colony optimization algorithm to solve the broken link problem in wire...
PDF
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
PDF
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
PDF
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
PDF
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
PDF
Implementation and analysis of multiple criteria decision routing algorithm f...
PDF
C1804011117
PDF
Performance analysis of ml and mmse decoding using
PDF
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
PDF
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
PDF
La3518941898
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
An energy-efficient cluster head selection in wireless sensor network using g...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Energy Proficient and Security Protocol for WSN: A Review
J031101064069
Power balancing optimal selective forwarding
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
An Ant colony optimization algorithm to solve the broken link problem in wire...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementation and analysis of multiple criteria decision routing algorithm f...
C1804011117
Performance analysis of ml and mmse decoding using
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
La3518941898
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...
Ad

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
composite construction of structures.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
573137875-Attendance-Management-System-original
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Current and future trends in Computer Vision.pptx
Sustainable Sites - Green Building Construction
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
composite construction of structures.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CH1 Production IntroductoryConcepts.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
573137875-Attendance-Management-System-original
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

Ameliorate the performance using soft computing approaches in wireless networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 13, No. 1, February 2023, pp. 502~510 ISSN: 2088-8708, DOI: 10.11591/ijece.v13i1.pp502-510  502 Journal homepage: http://ijece.iaescore.com Ameliorate the performance using soft computing approaches in wireless networks Chandrika Dadhirao, Ravi Sankar Sangam School of Computer Science and Engineering, VIT-AP University, Andhra Pradesh, India Article Info ABSTRACT Article history: Received Jan 13, 2022 Revised Jul 28, 2022 Accepted Aug 25, 2022 Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption. Keywords: Energy efficiency Head node Mamdani Network lifetime Sugeno Wireless sensor networks routing protocol This is an open access article under the CC BY-SA license. Corresponding Author: Chandrika Dadhirao School of Computer Science and Engineering, VIT-AP University near Vijayawada, 522237, Andhra Pradesh, India Email: [email protected] 1. INTRODUCTION Microcontrollers, networking technology, microelectromechanical systems, and nanotechnology have developed novel sensing and communication systems, referred to as wireless sensor networks. These new technologies have also contributed to the advancement of nanotechnology (WSNs). Figure 1 presents a schematic representation of a wireless sensor network. They are skilled with opportunity providing technology which pings its role in a wide range of applications that bare minimum human intervention and play a critical function in making the future smarter. It uses spatially distributed self-governing nodes that use sensors to track any circumstance, either physical or environmental. WSN are continuing to be the most effective aid to sensing and monitoring tasks. The ability to work in uncertain environments, easy implementation, and high performances are among the many reasons for the popularity. Their primary benefit is the ability to be carried out to any discipline and in any surroundings. Unlike popular networks that, for their application, require extensively stringent conditions. In this mechanism, node energy, in conjunction with balancing glide, is the primary trouble in which sources are scarcely to claim approximately a way to reduce strength intake and prolong the network lifetime for the structure of WSNs using existing routing protocols.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao) 503 In terms of productivity in WSNs, routing protocols [1], [2] play a vital role. Routing is one of the most challenging techniques on WSN. It is necessary to find the best path between the source node and the target node. This method is the mathematical portrayal of human concepts. The main motto of any network is the efficient and effective transmission of information between the source and the final destination. This routing is one of the best solutions to provide an efficient and best path for wireless sensor networks. In routing, in this work the clustering approach is chosen [3]–[9] for selecting the best way for intra-clustering and inter-clustering. The classification of routing protocols [10]–[12] relies upon two critical elements, i.e., first off, primarily based on network structure and secondly based on the protocol operation. The chore of discovering and retaining routes in WSNs is not minor, as energy restrictions and sudden changes in a node. WSN has attracted tremendous attention from academics and industry worldwide in the past, present, and future. The wide range of applications [13] of WSNs is flora and fauna, military, industrial, urban, environmental, health, education, entertainment [14]–[20]. WSN involve millions of nodes that operate together, detecting and transmitting ambient knowledge to the base station [21]. Apart from those have worked on multiple sink nodes in a WSN to increase the scalability and lifetime of the network [22]. Many cluster heads choose a specific sink node and try to send their data to the sink simultaneously. Sujith et al. [23] suggested an energy-efficient zone-based clustering algorithm for WSN. In their approach, they considered zones as clusters and zone monitor as cluster head. Bagga et al. [24] has initiated an fuzzy logic- based clustering routing (FLBCR) protocol as a routing scheme that applies fluctuating logic to determine the likelihood of selecting a node as a cluster head (CH) with a variable setting existence a network. For instance, an improved low-energy adaptive clustering hierarchy–mobile fuzzy (LEACH MF) protocol has been addressed to prolong lifetime of wireless sensor networks and they show in their results that the proposed modified parameter LEACH MF is better in performance and energy consumption [25]. This compared type1 and type2 fuzzy logic approach in choosing cluster head selection to increase the wireless sensor networks. Figure 1. Layout of the wireless sensor network 2. METHOD The main steps of our proposed fuzzy based LEACH approach are discussed in this section. In proposed algorithm, optimum number of head nodes are chosen using Kopt from (1). 𝐾𝑜𝑝𝑡 = √𝑏 √2∗𝑇ℎ ∗ 𝜃0 ∗ 𝑀 𝑑𝐵𝑆2 (1) where b is the number of nodes, Th is the user defined threshold value, θ0 is the computed ratio of energy dissipated in the free space (µ) by the energy dissipated in multi path (ϑ), M is the product of area of the network and sink coordinates, and dBS2 is the first form of Euclidean distance of respective node to the sink node. The current heads of nodes calculate their W i (output fuzzy parameter) value using the fuzzy method and broadcast the current head node (HN) message to all nodes coming under the communication range. The member nodes choose the nearest HN and join it to form clusters, respectively using dBS (2): 𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒 = min⁡ (√(𝑆𝑝 − 𝑆𝑞) 2 , (𝑆𝑞 − 𝑆𝑏𝑗)2) (2)
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510 504 where 𝑆𝑝 and 𝑆𝑞 are the length and width of the area of the network, respectively, and 𝑆𝑏𝑖 and 𝑆𝑏𝑗 are the sink coordinates. The residual energy γRe is calculated based on node coordinates Bbij and user defined threshold value ψ: ϒ𝑅𝑒⁡ = ⁡𝛹 ∗ (∑ 𝐻𝑖 𝑏 𝑖=1 ) − (∑ 𝐶𝑗 𝑏 𝑗=1 ) (3) where i,j are the coordinating positions of the node deployed in the network, b is the total number of nodes in the area, H is x coordinate of the node, and C is the y coordinate of the node. The calculations of Dist and d are shown in (4). 𝐷𝑖𝑠𝑡𝑚𝑖𝑛 = √∑ ((𝐻𝑖 − 𝑗)2 + (𝐶𝑖 − 𝐶𝑗)2) 𝑏 𝑞𝑖,𝑗=1 (4) Initially, the cluster range will be considered as a value. Based on the calculated distance of the nodes with respect to the mote is checked. Whether the distance is less than the range of the cluster ℧ Clusterrange in the network is calculated as (5): ʊ𝐶𝑙𝑢𝑠𝑡𝑒𝑟𝑅𝑎𝑛𝑔𝑒 = 𝐷𝑖𝑠𝑡⁡ ≤⁡ʊ𝐶𝑙𝑢𝑠𝑡𝑒𝑟𝑅𝑎𝑛𝑔𝑒 (5) 𝑑 = √∑ ((𝑆𝑝𝑖 − (𝐻𝑖)2)⁡ + (𝑆𝑞𝑗 − (𝐶𝑗)2)⁡) 𝑏 𝑞𝑖,𝑗=1 (6) where 𝑆𝑝 and 𝑆𝑞 are the length and width of the area of the network, respectively, and 𝑆𝑏𝑖 and 𝑆𝑏𝑗 are the sink coordinates. 𝐶𝑜𝑠𝑡 = 𝐷𝑖𝑠𝑡(𝑇ℎ𝑛) ((𝑇ℎ𝑛)−1)+𝑑 (7) where Thn is the tentative head node, d is the minimum distance. The CH generates a time division multiple access (TDMA) schedule and sends it to its members until the CH and its members are fixed. The method of choosing a head node by the use of fuzzy procedure is done in 4 steps for Scenario 1. a. Input and fuzzification: We fetch the three input values to the fuzzy inference system using (3), (2) and (7). Those input fuzzy parameters determine the cost of each enter based on the respective membership feature µ. b. Fuzzy inferences: We offer the membership values acquired to our if then rules to acquire to our new fuzzy set output. Our fuzzy if then rules have more than one input and the bushy and operator which selects the minimal of our 3 membership values. c. Aggregation: The aggregation is a unity of all the results from the implementation of all rules received. We use an OR fuzzy logic operator when we aggregate all our rules in our FIS as shown in Table 1. To produce a new aggregate fuzzy set which will be used in the defuzzification stage, this operator chooses the limit of the rule evaluation values. d. Defuzzification: With a purpose to calculate the chance of each node, we mixture the effects of every rule the usage of Mamdani technique. This manner is known as defuzzification which unearths the threat price of each node to choose head node. In our proposed we use centroid method has been used for defuzzification. The following components constitute the type-2 fuzzy logic model is done in 6 steps for Scenario 2 used in this work. a. Fuzzification module: This module maps the crisp input to a type-2 fuzzy set using the gaussian2 membership function. b. Inference engine: This module evaluates the rules in the knowledge base against the type-2 fuzzy set gotten from the fuzzification module to produce another type-2 fuzzy set. c. Type reducer: Type reducer uses Karnik-Mendel algorithm to reduce an interval type-2 fuzzy set to type-1 fuzzy set. d. Defuzzification module: It maps the fuzzy set produced by the type of reducer to a crisp output using the center of gravity defuzzification method. e. Fuzzy knowledge base: This is a database of rules to be used by the inference engine. f. Membership function: This mathematical equation helps the fuzzification module convert the crisp input into a fuzzy set. Figure 2 represents pseudocode for the proposed algorithm.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao) 505 Table 1. The fuzzy if then rules Rule no Residual energy Cost Distance Chance 1 High High Low High 2 High Medium Medium Very high 3 High Low High Medium 4 High High Low Medium 5 High Medium Medium Very high 6 High Low High Medium 7 High High Low Medium 8 High Medium Medium Very high 9 High Low High Medium 10 Medium High Low High 11 Medium Medium Medium Medium 12 Medium Low High High 13 Medium High Low High 14 Medium Medium Medium Medium 15 Medium Low High High 16 Medium High Low High 17 Medium Medium Medium Medium 18 Medium Low High High 19 Low High Low Low 20 Low Medium Medium Medium 21 Low Low High Very low 22 Low High Low Very low 23 Low Medium Medium Medium 24 Low Low High Very low 25 Low High Low Very low 26 Low Medium Medium High 27 Low Low High Very low Figure 2. The pseudocode for the proposed approach 3. RESULTS AND DISCUSSION All the following results in this paper are executed using MATLAB R2018a, which system configuration is Intel i5 processor (2.7 GHz) with 16 GB memory running on Windows 10 operating system. During the simulation process of data transmission between nodes from the source, through intermediate
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510 506 nodes and to the final destination nodes, each node uses its limited power, causing depletion. Any node which has reached a specific limit value of user choice is considered dead. The simulation parameters for performing our experiment are shown in Table 2. Table 2. Simulation parameters Type Parameter Value Network topology Number of nodes 100, 200, 500, 1000 Number of clusters 20 Network coverage 100, 100, 50, 175 Deployment Random Radio model Initial energy 2 J Energy consumption per bit 50 nJ/bit Energy loss in free space 100 pJ/bit/m2 Energy loss in multipath 0.0013 pJ/bit/m4 Application Simulation rounds 5000 Packet header times 25 bytes Broadcast packet size 16 bytes Data packet size 3200 Competition radius 25 m Bandwidth 1 Mb/s Here we compared three protocols fuzzy LEACH, multi-criteria cluster head delegation based on fuzzy logic (MUCH) and the proposed fuzzy logic LEACH. Simulation was done in MATLAB simulator and initially a total of 100 nodes are randomly scattered in a 100 m–by–100 m square area. Depicts the number of sensor nodes alive in the network. 3.1. First node die Figure 3 illustrates the point in time at which the first node is removed from the graph (FND). Based on the findings of the study, we are able to conclude that the FND can be found using the existing approaches even at the early rounds when compared with the methods that we have provided. Figure 3. First node die 3.2. Quarter node die Figure 4 illustrates the round at which a quarter of the nodes are removed from the graph (QND). Based on the findings of the investigation, we can conclude that, in comparison to our suggested technique, the existing methods produce at earlier rounds. 3.3. Half-node die Figure 5 illustrates the round at which the half nodes are considered dead (HND). The findings of the study allow us to conclude that, in comparison to the way that we have presented, the existing methods produce HNDs at earlier rounds. 100 200 500 1000 179 178 143 119 358 178 145 129 183 171 160 138 1009 719 415 223 1599 1269 1096 1011 1779 1652 1494 1352 First Node Die LEACH LEACH USING FUZZY MUCH FEECA Scenario1 Scenario2
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao) 507 Figure 4. Quarter node die Figure 5. Half-node die 3.4. Number of nodes survived Figure 6 shows the total number of nodes alive after completion of a certain number of simulation rounds. It is observed that in initial fuzzy LEACH and one of the improved fuzzy LEACHs termed MUCH, has 99% of nodes die after completing of 5000 rounds but in our proposed methods only 81% and 93% of nodes die these results better energy efficiency of the nodes as well as improved network lifetime. The comparison is made based on residual energy, lifetime of sensor nodes, and throughput. These three parameters are used as comparison parameters. Figures 7 to 9 show the comparative analysis in the following subsections, respectively. Figure 6. Nodes alive after completion of 5,000 rounds LEACH LEACH USING FUZZY MUCH FEECA Scenario1 Scenario2 279 548 261 1141 2344 2228 209 275 308 855 1801 2136 263 264 269 497 1698 2028 262 263 252 289 1668 1819 Quarter Node Die(QND) 100 200 500 1000 LEACH LEACH USING FUZZY MUCH FEECA Scenario1 Scenario2 455 915 449 1201 2798 2562 460 464 512 896 2303 2378 430 439 441 520 2084 2224 380 389 384 309 2042 2003 Half Node Die(HND) 100 200 500 1000 LEACH LEACH USING FUZZY MUCH FEECA Scenario1 Scenario2 1 1 1 1 19 7 0 0 0 1 22 2 0 0 0 0 14 1 0 0 0 0 15 1 Number of Nodes Alive 100 200 500 1000
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510 508 3.5. Throughput The term “universal performance” or “throughput” refers to the amount of packets that are received by the sink using its available resource. As can be seen in Figure 7, our suggested protocol has a higher throughput in comparison to LEACH, LEACH with fuzzy, MUCH, fuzzy-based energy efficient clustering approach (FEECA), and both of our proposed methods, which are Scenario 1 and Scenario 2, respectively. Figure 7. Performance of the node based on data transmission among nodes to mote 3.6. Lifetime of sensor nodes The average network lifetime of the wireless network has been calculated using three mentioned routing protocols. Here, the forwarder node is regarded in each round to be the node with the most considerable rest energy. As Figure 8 shows, the average network life will be extended when the information is transferred from nodes to sinks through our suggested protocol routing. In other words, in terms of average network life, our proposed plan outperformed existing schemes. Figure 8. Lifetime of the sensor nodes in the network Round Round
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Ameliorate the performance using soft computing approaches in wireless networks (Chandrika Dadhirao) 509 3.7. Residual energy In this experiment, we have considered the average residual energy of all the nodes as a measure of performance and compared our protocol to three others. Higher residual energy is essential to extend the network life. From Figure 9, we can see that this residual average power is above the three mentioned protocols. Figure 9. Total energy dissipated among the nodes during each round 4. CONCLUSION Wireless sensor networks are becoming relevant in a broad range of emerging technologies. One of the challenges to WSNs is to reduce the use of resources and increase the networks' existence, for which routing may be a remedy. As the propagation energy is proportional to the distance between the sender and the receiver, the clustering mechanism minimizes energy use in routing. Using fuzzy reasoning, WSN can resist complicated mathematical models and provide considerable stability in the networks life to deal with uncertainty and interpretation. These suggested strategies described in both scenarios are a revision of the option of LEACH to select the optimal number of head node selection and select the best head node selection in any round during each cluster. The simulation findings indicate that our proposed solution delivers more robust results than four other existing state-of-the-art algorithms and proves to be more scalable after completing rounds in FND, QND, HND, and the number of nodes alive. REFERENCES [1] R. T. Ai-Zubi, N. Abedsalam, A. Atieh, and K. A. Darabkh, “Lifetime-improvement routing protocol for wireless sensor networks,” in 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), Mar. 2018, pp. 683–687, doi: 10.1109/SSD.2018.8570628. [2] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6–28, Dec. 2004, doi: 10.1109/MWC.2004.1368893. [3] J. A. Patel and Y. Patel, “The clustering techniques for wireless sensor networks: a review,” in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Apr. 2018, pp. 147–151, doi: 10.1109/ICICCT.2018.8473153. [4] H. Yetgin, K. T. K. Cheung, M. El-Hajjar, and L. Hanzo, “A survey of network lifetime maximization techniques in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 828–854, 2017, doi: 10.1109/COMST.2017.2650979. [5] K. A. Darabkh, W. S. Al-Rawashdeh, R. T. Al-Zubi, and S. H. Alnabelsi, “C-DTB-CHR: centralized density- and threshold-based cluster head replacement protocols for wireless sensor networks,” The Journal of Supercomputing, vol. 73, no. 12, pp. 5332–5353, Dec. 2017, doi: 10.1007/s11227-017-2089-4. [6] L. XingGuo, W. JunFeng, and B. LinLin, “LEACH protocol and its improved algorithm in wireless sensor network,” in 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Oct. 2016, pp. 418–422, doi: 10.1109/CyberC.2016.87. [7] V. Kadrolli and J. Agarkhed, “Soft computing routing techniques in wireless sensor network,” in 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Feb. 2016, pp. 748–751, doi: 10.1109/AEEICB.2016.7538395. [8] B. Bhushan and G. Sahoo, “Routing protocols in wireless sensor networks,” in Computational intelligence in sensor networks, 2019, pp. 215–248. Round
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 502-510 510 [9] M. F. S. Yagoub, J. J. P. C. Rodrigues, O. O. Khalifa, A. B. Mohammed, and V. Korotaev, “Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: A survey,” International Journal of Communication Systems, vol. 33, no. 16, 2020, doi: 10.1002/dac.4471. [10] H. S. Bazzi, A. M. Haidar, and A. Bilal, “Classification of routing protocols in wireless sensor network,” in International Conference on Computer Vision and Image Analysis Applications, Jan. 2015, pp. 1–5, doi: 10.1109/ICCVIA.2015.7351790. [11] A. Krishnamoorthy and V. Vijayarajan, “Energy aware routing technique based on Markov model in wireless sensor network,” International Journal of Computers and Applications, vol. 42, no. 1, pp. 23–29, 2020, doi: 10.1080/1206212X.2017.1396423. [12] J. Tan et al., “An adaptive collection scheme-based matrix completion for data gathering in energy-harvesting wireless sensor networks,” IEEE Access, vol. 7, pp. 6703–6723, 2019, doi: 10.1109/ACCESS.2019.2890862. [13] D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras, “Applications of wireless sensor networks: An up-to-date survey,” Applied System Innovation, vol. 3, no. 1, Feb. 2020, doi: 10.3390/asi3010014. [14] K. A. Darabkh and J. N. Zomot, “An improved cluster head selection algorithm for wireless sensor networks,” in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Jun. 2018, pp. 65–70, doi: 10.1109/IWCMC.2018.8450446. [15] I. A. T. Hashem et al., “The role of big data in smart city,” International Journal of Information Management, vol. 36, no. 5, pp. 748–758, Oct. 2016, doi: 10.1016/j.ijinfomgt.2016.05.002. [16] D. P. Agrawal, “Applications of sensor networks,” in Embedded Sensor Systems, vol. 8, no. 9S3, Singapore: Springer Singapore, 2017, pp. 35–63. [17] B. Rashid and M. H. Rehmani, “Applications of wireless sensor networks for urban areas: A survey,” Journal of Network and Computer Applications, vol. 60, pp. 192–219, Jan. 2016, doi: 10.1016/j.jnca.2015.09.008. [18] S. R. Jino Ramson and D. J. Moni, “Applications of wireless sensor networks — A survey,” in 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), Feb. 2017, pp. 325–329, doi: 10.1109/ICIEEIMT.2017.8116858. [19] T. Khan et al., “A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks,” IEEE Access, vol. 7, pp. 58221–58240, 2019, doi: 10.1109/ACCESS.2019.2914769. [20] S. S. Desai and M. J. Nene, “Node-level trust evaluation in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2139–2152, Aug. 2019, doi: 10.1109/TIFS.2019.2894027. [21] D. Agrawal and S. Pandey, “Optimization of the selection of cluster‐head using fuzzy logic and harmony search in wireless sensor networks,” International Journal of Communication Systems, vol. 34, no. 13, Sep. 2021, doi: 10.1002/dac.4391. [22] A. Shahidinejad and S. Barshandeh, “Sink selection and clustering using fuzzy-based controller for wireless sensor networks,” International Journal of Communication Systems, vol. 33, no. 4, Aug. 2020, doi: 10.1002/dac.4557. [23] A. Sujith, D. R. Dorai, and V. N. Kamalesh, “Energy efficient zone‐based clustering algorithm using fuzzy inference system for wireless sensor networks,” Engineering Reports, vol. 3, no. 4, Apr. 2021, doi: 10.1002/eng2.12310. [24] S. Bagga, A. Goyal, G. Gupta, and D. K. Sharma, “FLBCR: Fuzzy logic based clustering routing protocol,” in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Jul. 2019, pp. 1–7, doi: 10.1109/ICCCNT45670.2019.8944547. [25] S. Sharma and N. Mittal, “An improved LEACH-MF protocol to prolong lifetime of wireless sensor networks,” in 2018 IEEE 8th International Advance Computing Conference (IACC), Dec. 2018, pp. 174–179, doi: 10.1109/IADCC.2018.8692096. BIOGRAPHIES OF AUTHORS Chandrika Dadhirao is a research scholar in the School of Computer Science and Engineering at VIT-AP University, near Vijayawada. Her areas of interest are wireless sensor networks, soft computing, and cloud computing. She can be contacted at email: [email protected]. Ravi Sankar Sangam is an associate professor in the School of Computer Science and Engineering at VIT-AP University, near Vijayawada. His specialization areas are data clustering and mining, wireless sensor networks. He can be contacted at email: [email protected].