You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

RESEARCH ARTICLE OPEN ACCESS

Extensive Review of Energy Efficient Clustering


Approaches in Wireless Sensor Networks
Dr. Rupinder Singh
Assistant Professor, Department of Computer Applications, Chandigarh Group of Colleges- Mohali

ABSTRACT
In wireless sensor networks (WSNs), nodes take restricted energy and could not be recharged. For tackling this
problem, clustering models were utilized for optimization energy utilization, collect information and also
improve the effectual lifespan of the network. Although the clustering models benefits, there are until a few
essential challenges namely selecting a sensor as cluster head (CH) that is an important effect on energy
efficiency. During the clustering phase, nodes are separated as few clusters and then few nodes is called as CH,
are elected that exist the head of all clusters. In classic clustered WSNs, nodes sense the field and send the
sensed data to CH, afterward gathered and aggregated data, CH transmitting themselves to BS. The node
clustering in WSNs is several benefits namely scalability, energy efficiency, and decreasing routing delay. In
this paper, a many clustering techniques were study for demonstrating benefits and drawbacks. Among them, a
few techniques deals with homogenous networks, whereas some deal with heterogeneous. In this paper,
clustering techniques based on evolutionary algorithms are reviewed.
Keyword: wireless sensor networks (WSNs), nodes take restricted energy and could not be recharged.

I. INTRODUCTION
Formation of WSNs shows difficulties because of
Recently, wireless sensor networks (WSNs) have the restricted assets regarding capacity, handling,
accomplished huge plays in many applications and and transmission of messages. In the majority of
have attracted the consideration of researchers sensor applications, these assets become non-
because of their difficult, diverse prerequisites renewable moreover. Hypothetical assessment
which frequently unveil inherent tradeoffs [1]. A couldn't be exact enough in numerous situations to
WSN is comprised of sensor nodes associated anticipate and forestall disappointment of sensor
through a specially appointed and automated networks. The structure difficulty of WSNs
availability. A sensor node comprises a radio increments with arising applications and their
transceiver (that carries out the part of both conditions. Conventional techniques intended for
transmitter and receiver), a microcontroller, and ad hoc networks are not adequate to oblige the
electronic circuit for interfacing with the related necessities of these sensor applications and this
sensors and energy source (generally the battery or orders new strategies and protocol that exits. The
an installed type of energy reaping). The expense groups are furnished with cluster heads (CH) and
and size of sensor nodes show a huge level of these group heads send the collected information to
variety relying on the idea of the applications. the base station (BS) or the sink. The essential
Based on the idea of uses, different classifications benefit of clustering is the scalability of execution
of sensor nodes are given for monitored parameters across the growing sensor networks. Furthermore,
like temperature, motion of objects, sound, clustering approach gives various optional benefits.
moisture, and so on. Generally, sensor networks A clustering arrangement can propose a
make up for human action in unavailable rest/wakeup plan for a WSN to adequately lessen
landscapes and present more agreeable, keen power utilization. In many sensor applications, all
depictions of the climate. In the new future, sensor the sensor nodes are not needed to be in wakeup
networks would overcome an essential piece of state and burn-through energy. In light of the
human existence and make existing PCs, mobile worldly and spatial conditions, some sensor nodes
transmission devices, and other registering gadgets can be placed in rest mode in which no energy is
less mainstream. A sensor network might be made burned-through. A powerful timetable can be
out of homogenous or heterogeneous sensor nodes. concocted and imparted to these sensor nodes
They may screen either space or articles or through the sink. Likewise, clustering makes sure
cooperations of these two. Each sensor application scalability of the application execution because of
requests its own arrangement of necessities and their semi-appropriated nature.
qualities. Some sensor applications utilize reactors In this paper, many clustering techniques were
in the location of customary sensors to respond to studied for demonstrating benefits and drawbacks.
the occasions in suitable way. Among them, a few techniques deals with
homogenous networks, whereas some deals with

ISSN: 2347-8578 www.ijcstjournal.org Page 41


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

heterogeneous. In this paper, clustering techniques swarm advancement and GSA and analyzes the
based on evolutionary algorithms are reviewed. outcome against LEACH protocol. [13] present an
energy efficient clustering routing technique.
II. RELATED WORK Regarding the non-uniform traffic distributions, it
can be present a lopsided cluster development
[2] established BM-BWO with FL based HEED model for load adjusting and energy effectiveness.
protocol (BMBWFL-HEED). In BMBWFL-HEED, Also, it is present a circulated CH turn system to
it is utilized the group of the helped transformation adjust energy utilization inside all clusters.
based BM-BWO technique with HEED protocol [14] introduced a protocol that considers several
for choosing the greater RE. Especially, the change clustering factors identified with energy utilization
period of the BWO technique is enhanced with to choose CH like RE, distance from node to BS,
assistance of heading normal methodology (BM- neighbors, and count of neighbors with weighting
BWO). The FL framework chooses the most lastly changes the subject of productive Clustering
significant and optimum CH. [3] present a bio- as to optimize of 2 parameters. [15] propose a
motivated and trust-based CH determination fuzzy decision-making model to determination of
method for WSN received in ITS uses. A trust bunch heads. The fuzzy multiple attribute decision-
method is planned and utilized for registering a making (MADM) model is utilized for choosing
trust level to all nodes and BOA is employed to CHs utilizing three standards containing REs, count
choose the CHs. of neighbours, and the separation from the BS of
[4] centers around an efficient CH political race the nodes.
conspire that pivots the CH position amongst the
nodes with superior energy level when contrasted III. CONCLUSION
with other. [5] present a strategy named the HQCA
for creating high-quality clusters. [6] presented In this paper, a many clustering techniques were
FEEC-IIR protocol for WSN helped IoT studied for demonstrating benefits and drawbacks.
framework. In order to an ideal CH choice, AF- Among them, a few techniques deals with
MCDM is utilized that is a combine fuzzy AHP homogenous networks, but few deals with
and TOPSIS technique is presented an energy- heterogeneous. In this paper, clustering techniques
efficient clustering calculation. [7] manages based on evolutionary algorithms are reviewed.
determination of optimum way in routing which
improves network lifetime and network's energy REFERENCES
effectiveness. Different meta-heuristic strategies [1] Saleh, Y.N., Chibelushi, C.C., Abdel-
especially PSO have been adequately utilized yet Hamid, A.A. and Soliman, A.H., 2020.
with worst local optimal issue. The presented Privacy Preservation for Wireless Sensor
strategy is based on PSO and Tabu search Networks in Healthcare: State of the Art,
algorithms. and Open Research Challenges. arXiv
[8] direct a wide review of presented improved preprint arXiv:2012.12958.
clustering arrangements these days. To assess them, [2] Sheriba, S.T. and Rajesh, D.H., 2021.
we think about 10 parameters. In view of this Energy-efficient clustering protocol for
parameter, it can be presented an examination of WSN based on improved black widow
these optimized clustering techniques. [9] presents optimization and fuzzy
a hierarchical routing protocol dependent on the k- logic. Telecommunication Systems, pp.1-18.
d tree technique, to take a separate data structure of [3] Gaber, T., Abdelwahab, S., Elhoseny, M.
the space to sort out nodes as to clusters. In [10], and Hassanien, A.E., 2018. Trust-based
enhanced clustering hierarchy (ECH) model was secure clustering in WSN-based intelligent
presented for accomplishing energy-efficiency in transportation systems. Computer
WSNs by utilizing sleeping-waking method for Networks, 146, pp.151-158.
covering and adjoining nodes. [11] introduces [4] Behera, T.M., Mohapatra, S.K., Samal,
another plan of distinguishing gathered data U.C., Khan, M.S., Daneshmand, M. and
accuracy for collecting information in CHs in Gandomi, A.H., 2019. Residual energy-
hierarchical WSN dependent on enhancing based cluster-head selection in WSNs for
grouping of SVM. The optimum parameter SVM is IoT application. IEEE Internet of Things
carried out by improved flower pollination Journal, 6(3), pp.5132-5139.
algorithm (IFPA) to accomplish classifier accuracy. [5] Baradaran, A.A. and Navi, K., 2020.
In [12], the procedure of CH choice is developed as HQCA-WSN: High-quality clustering
single-objective optimize issue to discover better algorithm and optimal cluster head selection
group CHs to shape, one-hop clusters, to adjust using fuzzy logic in wireless sensor
energy utilization, and scalability utilizing GSA. networks. Fuzzy Sets and Systems, 389,
The issue has been addressed utilizing molecule pp.114-144.

ISSN: 2347-8578 www.ijcstjournal.org Page 42


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

[6] Preeth, S.S.L., Dhanalakshmi, R., Kumar, R. learning. Int. J. Neural Netw. Appl, 5(1), 47-
and Shakeel, P.M., 2018. An adaptive fuzzy 53.
rule based energy efficient clustering and [18] Jayanthi, J., Jayasankar, T., Krishnaraj, N.,
immune-inspired routing protocol for WSN- Prakash, N. B., Sagai Francis Britto, A., &
assisted IoT system. Journal of Ambient Vinoth Kumar, K. (2021). An Intelligent
Intelligence and Humanized Computing, Particle Swarm Optimization with
pp.1-13. Convolutional Neural Network for Diabetic
[7] Vijayalakshmi, K. and Anandan, P., 2019. A Retinopathy Classification Model. Journal
multi objective Tabu particle swarm of Medical Imaging and Health
optimization for effective cluster head Informatics, 11(3), 803-809.
selection in WSN. Cluster computing, 22(5), [19] S. Kumari and S. Namasudra, “System
pp.12275-12282. reliability evaluation using budget
[8] Wohwe Sambo, D., Yenke, B.O., Förster, A. constrained real d-MC search”, Computer
and Dayang, P., 2019. Optimized clustering Communications, vol. 171, 2021. DOI:
algorithms for large wireless sensor https://doi.org/10.1016/j.comcom.2021.02.0
networks: A review. Sensors, 19(2), p.322. 04
[9] Anzola, J., Pascual, J., Tarazona, G. and [20] Shankar, K., Perumal, E. A novel hand-
Gonzalez Crespo, R., 2018. A clustering crafted with deep learning features based
WSN routing protocol based on kd tree fusion model for COVID-19 diagnosis and
algorithm. Sensors, 18(9), p.2899. classification using chest X-ray
[10] El Alami, H. and Najid, A., 2019. ECH: An images. Complex Intell. Syst. (2020).
enhanced clustering hierarchy approach to https://doi.org/10.1007/s40747-020-00216-6
maximize lifetime of wireless sensor [21] Mansour, R. F., & Aljehane, N. O. (2021).
networks. IEEE Access, 7, pp.107142- An optimal segmentation with deep learning
107153. based inception network model for
[11] Dao, T.K., Nguyen, T.T., Pan, J.S., Qiao, Y. intracranial hemorrhage diagnosis. Neural
and Lai, Q.A., 2020. Identification failure Computing and Applications, 1-13.
data for cluster heads aggregation in WSN [22] Alzubi, J. A. (2020). Bipolar fully recurrent
based on improving classification of deep structured neural learning based attack
SVM. IEEE Access, 8, pp.61070-61084. detection for securing industrial sensor
[12] Morsy, N.A., AbdelHay, E.H. and Kishk, networks. Transactions on Emerging
S.S., 2018. Proposed energy efficient Telecommunications Technologies, e4069.
algorithm for clustering and routing in [23] Kavitha, M., Lavanya, G., & Janani, J.
WSN. Wireless Personal (2018). Enhanced SVM classifier for breast
Communications, 103(3), pp.2575-2598. cancer diagnosis. International Journal of
[13] Wang, Z., Qin, X. and Liu, B., 2018, April. Engineering Technologies and Management
An energy-efficient clustering routing Research, 5(3), 67-74.
algorithm for WSN-assisted IoT. In 2018 [24] Parvathy, P., Subramaniam, K., Venkatesan,
IEEE Wireless Communications and G. P., Karthikaikumar, P., Varghese, J., &
Networking Conference (WCNC) (pp. 1-6). Jayasankar, T. (2020). Development of hand
IEEE. gesture recognition system using machine
[14] Han, G. and Zhang, L., 2018. WPO-EECRP: learning. Journal of Ambient Intelligence
energy-efficient clustering routing protocol and Humanized Computing, 1-8.
based on weighting and parameter [25] S. Namasudra, “Data access control in the
optimization in WSN. Wireless Personal cloud computing environment for
Communications, 98(1), pp.1171-1205. bioinformatics”, International Journal of
[15] Azad, P. and Sharma, V., 2013. Cluster head Applied Research in Bioinformatics
selection in wireless sensor networks under (IJARB), vol. 11, no. 1, pp. 40-50, 2021.
fuzzy environment. International Scholarly DOI: 10.4018/IJARB.2021010105
Research Notices, 2013. [26] K. Shankar, Y. Zhang, Y. Liu, L. Wu and C.
[16] Alzubi, J. A. (2021). Blockchain-based Chen, "Hyperparameter Tuning Deep
Lamport Merkle Digital Signature: Learning for Diabetic Retinopathy Fundus
Authentication tool in IoT Image Classification," in IEEE Access, vol.
healthcare. Computer Communications, 170, 8, pp. 118164-118173, 2020, doi:
200-208. 10.1109/ACCESS.2020.3005152.
[17] Kavitha, M., & Palani, S. (2012). Retinal [27] Mansour, R. F., & Abdelrahim, E. M.
blood vessel segmentation algorithm for (2019). An evolutionary computing enriched
diabetic retinopathy and abnormality RS attack resilient medical image
classification by supervised machine steganography model for telemedicine

ISSN: 2347-8578 www.ijcstjournal.org Page 43


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

applications. Multidimensional Systems and https://doi.org/10.1007/978-981-13-0617-


Signal Processing, 30(2), 791-814. 4_16
[28] Alzubi, O. A. (2015, September). [38] S. Kumari, R. J. Yadav, S. Namasudra, and
Performance evaluation of AG block turbo C. H. Hsu, “Intelligent deception techniques
codes over fading channels using BPSK. In against adversarial attack on industrial
Proceedings of the The International system”, International Journal of Intelligent
Conference on Engineering & MIS 2015 Systems, vol. 36, no. 5, pp. 2412-2437,
(pp. 1-6). 2021. DOI: 10.1002/int.22384
[29] Kavitha, M., & Palani, S. (2014). [39] Uthayakumar, J., Elhoseny, M., & Shankar,
Hierarchical classifier for soft and hard K. (2020). Highly reliable and low-
exudates detection of retinal fundus images. complexity image compression scheme
Journal of Intelligent & Fuzzy Systems, using neighborhood correlation sequence
27(5), 2511-2528. algorithm in WSN. IEEE Transactions on
[30] Anuradha, M., Jayasankar, T., Prakash, N. Reliability, 69(4), 1398-1423.
B., Sikkandar, M. Y., Hemalakshmi, G. R., [40] Chavhan, S., Gupta, D., Nagaraju, C.,
Bharatiraja, C., & Britto, A. S. F. (2021). Rammohan, A., Khanna, A., & Rodrigues, J.
IoT enabled cancer prediction system to J. (2021). An Efficient Context-Aware
enhance the authentication and security Vehicle Incidents Route Service
using cloud computing. Microprocessors Management for Intelligent Transport
and Microsystems, 80, 103301. System. IEEE Systems Journal.
[31] S. Namasudra, S. Dhamodharavadhani, and [41] Mansour, R. F., El Amraoui, A., Nouaouri,
R. Rathipriya, “Nonlinear neural network I., Díaz, V. G., Gupta, D., & Kumar, S.
based forecasting model for predicting (2021). Artificial Intelligence and Internet of
COVID-19 cases”, Neural Processing Things Enabled Disease Diagnosis Model
Letters, 2021. DOI: 10.1007/s11063-021- for Smart Healthcare Systems. IEEE
10495-w Access, 9, 45137-45146.
[32] Elhoseny, M., & Shankar, K. (2019). [42] Alzubi, O. A. (2016). An empirical study of
Reliable data transmission model for mobile irregular ag block turbo codes over fading
ad hoc network using signcryption channels. arXiv preprint arXiv:1604.00564.
technique. IEEE Transactions on [43] Kavitha, M., & Palani, D. S. (2012). A New
Reliability, 69(3), 1077-1086. Fast Curvelet Transform with
[33] Mukherjee, R., Kundu, A., Mukherjee, I., Morphological Operations based method for
Gupta, D., Tiwari, P., Khanna, A., & Extraction of Retinal blood vessels using
Shorfuzzaman, M. (2021). IoT-cloud based Graphical User Interface‖. International
healthcare model for COVID-19 detection: Journal of Scientific & Engineering
an enhanced k-Nearest Neighbour classifier Research, 3(6).
based approach. Computing, 1-21. [44] Ramesh, S., Yaashuwanth, C.,
[34] Li, L., Sun, L., Xue, Y., Li, S., Huang, X., & Prathibanandhi, K., Basha, A. R., &
Mansour, R. F. (2021). Fuzzy Multilevel Jayasankar, T. (2021). An optimized deep
Image Thresholding Based on Improved neural network based DoS attack detection
Coyote Optimization Algorithm. IEEE in wireless video sensor network. Journal of
Access, 9, 33595-33607. Ambient Intelligence and Humanized
[35] Alzubi, O. A. A deep learning-based frechet Computing, 1-14.
and dirichlet model for intrusion detection in [45] P. Pavithran, S. Mathew, S. Namasudra and
IWSN. Journal of Intelligent & Fuzzy P. Lorenz, “A novel cryptosystem based on
Systems, (Preprint), 1-11. DNA cryptography and randomly generated
[36] Kavitha, M., & Palani, S. (2014). Blood Mealy machine”, Computers & Security,
vessel, optical disk and damage area-based vol. 104, 2021. DOI:
features for diabetic detection from retinal https://doi.org/10.1016/j.cose.2020.102160
images. Arabian Journal for Science and [46] Le, DN., Parvathy, V.S., Gupta, D. et al. IoT
Engineering, 39(10), 7059-7071. enabled depthwise separable convolution
[37] Sangeetha J., Jayasankar T. (2019) Emotion neural network with deep support vector
Speech Recognition Based on Adaptive machine for COVID-19 diagnosis and
Fractional Deep Belief Network and classification. Int. J. Mach. Learn. &
Reinforcement Learning. In: Mallick P., Cyber. (2021).
Balas V., Bhoi A., Zobaa A. (eds) Cognitive https://doi.org/10.1007/s13042-020-01248-7
Informatics and Soft Computing. Advances [47] Sekaran, R., Goddumarri, S. N., Kallam, S.,
in Intelligent Systems and Computing, vol Ramachandran, M., Patan, R., & Gupta, D.
768. Springer, Singapore. (2021). 5G Integrated Spectrum Selection
and Spectrum Access using AI-based Frame

ISSN: 2347-8578 www.ijcstjournal.org Page 44


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

work for IoT based Sensor Networks. cloud computing”, Peer-to-Peer Networking
Computer Networks, 186, 107649. and Applications, 2020. DOI:
[48] Zhang, Y. H., Li, Z., Zeng, T., Chen, L., Li, 10.1007/s12083-020-00959-6
H., Gamarra, M., ... & Cai, Y. D. (2021). [59] Mansour, R. F. (2015). Using adaptive
Investigating gene methylation signatures mutation to accelerate the convergence of
for fetal intolerance prediction. Plos one, immune algorithms for prediction of 3D
16(4), e0250032. molecular structure. International Journal of
[49] Alzubi, O. A., Alzubi, J. A., Dorgham, O., Computers and Applications, 37(3-4), 127-
& Alsayyed, M. (2020). Cryptosystem 133.
design based on Hermitian curves for IoT [60] Shankar, K., Elhoseny, M., Kumar, R. S.,
security. The Journal of Lakshmanaprabu, S. K., & Yuan, X. (2020).
Supercomputing, 76(11), 8566-8589. Secret image sharing scheme with encrypted
[50] Kavitha, M., & Palani, S. (2020). A shadow images using optimal homomorphic
comprehensive analysis for retinal image encryption technique. Journal of Ambient
classification methods using real-time Intelligence and Humanized
database. International Journal of Business Computing, 11(5), 1821-1833.
Information Systems, 34(2), 229-252. [61] Abukharis, S., Alzubi, J. A., Alzubi, O. A.,
[51] Nair, L. R., Subramaniam, K., Alamri, S., & O'Farrell, T. (2016). Packet
PrasannaVenkatesan, G. K. D., Baskar, P. error rate performance of IEEE802. 11g
S., & Jayasankar, T. (2020). Essentiality for under bluetooth interface. arXiv preprint
bridging the gap between low and semantic arXiv:1602.05556.
level features in image retrieval systems: an [62] Kavitha, M., & Palani, S. (2015).
overview. Journal of Ambient Intelligence Hierarchical Classifier For Microaneurysm
and Humanized Computing, 1-13. Detection. International Journal of Applied
[52] S. Namasudra, “Fast and secure data Engineering Research, 10(1), 1449-1458.
accessing by using DNA computing for the [63] Anuradha, M., Ganesan, V., Oliver, S.,
cloud environment”, IEEE Transactions on Jayasankar, T., & Gopi, R. (2020). Hybrid
Services Computing, 2020. DOI: firefly with differential evolution algorithm
10.1109/TSC.2020.3046471 for multi agent system using clustering
[53] Shankar, K., Sait, A. R. W., Gupta, D., based personalization. Journal of Ambient
Lakshmanaprabu, S. K., Khanna, A., & Intelligence and Humanized Computing, 1-
Pandey, H. M. (2020). Automated detection 10.
and classification of fundus diabetic [64] Hnatiuc, M., Geman, O., Avram, A. G.,
retinopathy images using synergic deep Gupta, D., & Shankar, K. (2021). Human
learning model. Pattern Recognition Signature Identification Using IoT
Letters, 133, 210-216. Technology and Gait Recognition.
[54] Mansour, R. F. (2017). Evolutionary Electronics, 10(7), 852.
computing enriched ridge regression model [65] Miled, A. B., Dhaouadi, R., & Mansour, R.
for craniofacial reconstruction. Multimedia F. (2020). Knowledge Deduction and Reuse
Tools and Applications, 1-18. Application to the Products’ Design Process.
[55] Pustokhina, I. V., Pustokhin, D. A., Kumar International Journal of Software
Pareek, P., Gupta, D., Khanna, A., & Engineering and Knowledge Engineering,
Shankar, K. (2021). Energy‐efficient 30(02), 217-237.
cluster‐based unmanned aerial vehicle [66] S. Namasudra, R. Chakraborty, A.
networks with deep learning‐based scene Majumder and N. R. Moparthi, “Securing
classification model. International Journal of multimedia by using DNA based encryption
Communication Systems, e4786. in the cloud computing environment”, ACM
[56] Sholiyi, A., Alzubi, J. A., Alzubi, O. A., Transactions on Multimedia Computing,
Almomani, O., & O'Farrell, T. (2016). Near Communications, and Applications, vol. 16,
capacity irregular turbo code. arXiv preprint no. 3s, 2020. DOI:
arXiv:1604.01358. https://doi.org/10.1145/3392665
[57] Muthumayil, K., Buvana, M., & Jayasankar, [67] Shankar, K., & Elhoseny, M. (2019). Trust
T. (2021). Energy Utilization using Based Cluster Head Election of Secure
Artificial Bee Colony Algorithm for Message Transmission in MANET Using
Network Life Time Enhancement of Multi Secure Protocol with TDES. J.
Homogeneous WSNs. International Journal UCS, 25(10), 1221-1239.
of Modern Agriculture, 10(2), 1649-1656. [68] Chen, T. M., Blasco, J., Alzubi, J. A.,
[58] S. Namasudra, R. Chakraborty, S. Kadry, G. & Alzubi O. A. (2014). Intrusion
Manogaran and B. S. Rawal, “FAST: Fast detection. IET, 1(1), 1-9.
accessing scheme for data transmission in

ISSN: 2347-8578 www.ijcstjournal.org Page 45


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 3, May-Jun 2021

[69] Kavitha, M., Syedakbar, S., Meenal, T.,


Kumar, R. S., & Stonier, A. A. (2021,
February). Enhanced Algorithm for Bio
Metric Based Secret Data Hiding. In IOP
Conference Series: Materials Science and
Engineering (Vol. 1055, No. 1, p. 012126).
IOP Publishing.
[70] Punarselvam, E., Sikkandar, M. Y., Bakouri,
M., Prakash, N. B., Jayasankar, T., &
Sudhakar, S. (2020). Different loading
condition and angle measurement of human
lumbar spine MRI image using
ANSYS. Journal of Ambient Intelligence
and Humanized Computing, 1-14.
[71] S. Namasudra, “An improved
attribute‐based encryption technique
towards the data security in cloud
computing”, Concurrency and Computation:
Practice and Exercise, vol. 31, no. 3, 2019.
DOI: 10.1002/cpe.4364
[72] Shankar, K., Lakshmanaprabu, S. K.,
Khanna, A., Tanwar, S., Rodrigues, J. J., &
Roy, N. R. (2019). Alzheimer detection
using Group Grey Wolf Optimization based
features with convolutional
classifier. Computers & Electrical
Engineering, 77, 230-243.
[73] Alrabea, A., Alzubi, O. A., & Alzubi, J. A.
(2019). A task-based model for minimizing
energy consumption in WSNs. Energy
Systems, 1-18.
[74] KAVITHA, M., GANESH, R., &
RAJKUMAR, A. FACILITIES
NAVIGATION ANDPATIENT
MONITORING SYSTEM USING
IBEACON TECHNOLOGY.
[75] Kumar, K. V., Jayasankar, T.,
Eswaramoorthy, V., & Nivedhitha, V.
(2020). SDARP: Security based Data Aware
Routing Protocol for ad hoc sensor
networks. International Journal of Intelligent
Networks, 1, 36-42.
[76] S. Namasudra and P. Roy, “Time saving
protocol for data accessing in cloud
computing”, IET Communications, vol. 11,
no. 10, pp. 1558-1565, 2017.
[77] Shankar, K., Lakshmanaprabu, S. K., Gupta,
D., Khanna, A., & de Albuquerque, V. H. C.
(2020). Adaptive optimal multi key based
encryption for digital image
security. Concurrency and Computation:
Practice and Experience, 32(4), e5122.

ISSN: 2347-8578 www.ijcstjournal.org Page 46

You might also like