iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/SPE.2797
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:25:39Z","timestamp":1726061139239},"reference-count":44,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[2021,12]]},"abstract":"Summary<\/jats:title>Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in several applications, there are some areas for improvement. In the current work, we have concentrated on minimizing the energy consumption of sensors in the IoT network that will lead to an increase in the network lifetime. In this work, to optimize the energy consumption, most appropriate Cluster Head (CH) is chosen in the IoT network. The proposed work makes use of a hybrid metaheuristic algorithm, namely, Whale Optimization Algorithm (WOA) with Simulated Annealing (SA). To select the optimal CH in the clusters of IoT network, several performance metrics such as the number of alive nodes, load, temperature, residual energy, cost function have been used. The proposed approach is then compared with several state\u2010of\u2010the\u2010art optimization algorithms like Artificial Bee Colony algorithm, Genetic Algorithm, Adaptive Gravitational Search algorithm, WOA. The results prove the superiority of the proposed hybrid approach over existing approaches.<\/jats:p>","DOI":"10.1002\/spe.2797","type":"journal-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T12:04:25Z","timestamp":1581422665000},"page":"2558-2571","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":154,"title":["A metaheuristic optimization approach for energy efficiency in the IoT networks"],"prefix":"10.1002","volume":"51","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4350-3911","authenticated-orcid":false,"given":"Celestine","family":"Iwendi","sequence":"first","affiliation":[{"name":"Department of Electronics BCC of Central South University of Forestry and Technology Changsha China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4209-2495","authenticated-orcid":false,"given":"Praveen Kumar Reddy","family":"Maddikunta","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering Vellore Institute of Technology Vellore India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0097-801X","authenticated-orcid":false,"given":"Thippa Reddy","family":"Gadekallu","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering Vellore Institute of Technology Vellore India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3480-4851","authenticated-orcid":false,"given":"Kuruva","family":"Lakshmanna","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering Vellore Institute of Technology Vellore India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Department of Computing and Mathematics Manchester Metropolitan University Manchester Manchester UK"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3229-6785","authenticated-orcid":false,"given":"Md. Jalil","family":"Piran","sequence":"additional","affiliation":[{"name":"Computer Engineering Department Sejong University Seoul South Korea"}]}],"member":"311","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694469"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.017"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919769"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/13614576.2017.1297734"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6000-2"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.07.009"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2446475"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.003"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.024"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.10.021"},{"issue":"6","key":"e_1_2_8_13_1","first-page":"13095","article-title":"A hybrid cluster head selection model for Internet of things","volume":"22","author":"Reddy MPK","year":"2019","journal-title":"Cluster Comput"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1628-3"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1566-2"},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"SrinidhiNN LakshmiJ KumarSD. Hybrid energy efficient and QoS aware algorithm to prolong IoT network lifetime. Paper presented at: International Conference on Ubiquitous Communications and Network Computing; February 2019; Cham Switzerland: Springer:80\u201095.","DOI":"10.1007\/978-3-030-20615-4_6"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847036"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2728705"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2618909"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2856776"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842773"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2018.02.003"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955544"},{"key":"e_1_2_8_24_1","first-page":"1","article-title":"A context\u2010aware encryption protocol suite for edge computing\u2010based IoT devices","volume":"2","author":"Dar Z","year":"2019","journal-title":"J Supercomput"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923916"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.11-6-2019.160835"},{"key":"e_1_2_8_27_1","doi-asserted-by":"crossref","unstructured":"MittalM SaraswatLK IwendiC AnajembaJH. A neuro\u2010fuzzy approach for intrusion detection in energy efficient sensor routing. Paper presented at: 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT\u2010SIU); April 2019; Ghaziabad India: IEEE:1\u20105.","DOI":"10.1109\/IoT-SIU.2019.8777501"},{"issue":"2","key":"e_1_2_8_28_1","first-page":"317","article-title":"Employing data mining on highly secured private clouds for implementing a security\u2010asa\u2010service framework","volume":"59","author":"Thippa Reddy G","year":"2014","journal-title":"J Theor Appl Inf Technol"},{"issue":"11","key":"e_1_2_8_29_1","first-page":"173","article-title":"A case study: home environment monitoring system using Internet of things","volume":"8","author":"Raghavan R","year":"2017","journal-title":"Int J Mech Eng Technol"},{"key":"e_1_2_8_30_1","doi-asserted-by":"crossref","unstructured":"ReddyGT KaluriR ReddyPK LakshmannaK KoppuS RajputDS. A novel approach for home surveillance system using IoT adaptive security. Proceedings of International Conference on Sustainable Computing in Science Technology and Management (SUSCOM) Amity University Rajasthan India February 26\u201028 2019;3:1616\u20101625.http:\/\/dx.doi.org\/10.2139\/ssrn.3356525.","DOI":"10.2139\/ssrn.3356525"},{"issue":"1","key":"e_1_2_8_31_1","first-page":"1","article-title":"Smart security implementation for wireless sensor network nodes","author":"Iwendi C","year":"2015","journal-title":"J Wirel Sens Netw"},{"key":"e_1_2_8_32_1","doi-asserted-by":"crossref","unstructured":"IwendiC ZhangA DuX. ACO based key management routing mechanism for WSN security and data collection. Paper presented at: 2018 IEEE International Conference on Industrial Technology (ICIT); 2018; Lyon France:1935\u20101939.","DOI":"10.1109\/ICIT.2018.8352482"},{"key":"e_1_2_8_33_1","doi-asserted-by":"crossref","unstructured":"IwendiCO AllenAR. Enhanced security technique for wireless sensor network nodes. Paper presented at: IET Conference on Wireless Sensor Systems (WSS 2012) June 18\u201019 2012:1\u20105.","DOI":"10.1049\/cp.2012.0610"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2018.08.112"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.053"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8111331"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864111"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924584"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19173667"},{"key":"e_1_2_8_41_1","doi-asserted-by":"crossref","unstructured":"LimSJ BashirAK RheeSY ParkMS. Energy\u2010based re\u2010transmission algorithm of the leader node's neighbor node for reliable transmission in the PEGASIS. Computing and Multimedia Applications. UCMA 2011. Berlin Germany: Springer. CCIS; vol 150.","DOI":"10.1007\/978-3-642-20975-8_13"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2789442"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2633809"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.023"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.2797","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.2797","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/spe.2797","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.2797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:37:08Z","timestamp":1693244228000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.2797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,11]]},"references-count":44,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["10.1002\/spe.2797"],"URL":"https:\/\/doi.org\/10.1002\/spe.2797","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,11]]},"assertion":[{"value":"2019-12-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}