{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:08:36Z","timestamp":1767967716232,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s00521-022-07970-3","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T11:06:34Z","timestamp":1667473594000},"page":"5381-5393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks"],"prefix":"10.1007","volume":"35","author":[{"given":"Anselme R.","family":"Affane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7393-5726","authenticated-orcid":false,"given":"Hassan","family":"Satori","sequence":"additional","affiliation":[]},{"given":"Farah","family":"Sanhaji","sequence":"additional","affiliation":[]},{"given":"Yousssef","family":"Boutazart","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,3]]},"reference":[{"key":"7970_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/047011276X","volume-title":"Wireless sensor networks: technology, protocols, and applications","author":"K Sohraby","year":"2007","unstructured":"Sohraby K, Minoli D, Znati T (2007) Wireless sensor networks: technology, protocols, and applications. John wiley and sons, New Jersey"},{"issue":"1","key":"7970_CR2","first-page":"112","volume":"1","author":"H Kalkha","year":"2016","unstructured":"Kalkha H, Satori H, Satori K (2016) Performance evaluation of aodv and leach routing protocol. Adv Inf Technol Theory Appl 1(1):112\u2013118","journal-title":"Adv Inf Technol Theory Appl"},{"issue":"1","key":"7970_CR3","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.adhoc.2012.07.005","volume":"11","author":"Carlos Medina","year":"2013","unstructured":"Medina Carlos, Segura Jos\u00e9 C, de la Torre Angel (2013) Accurate time synchronization of ultrasonic tof measurements in ieee 802.15. 4 based wireless sensor networks. Ad Hoc Netw 11(1):442\u2013452","journal-title":"Ad Hoc Netw"},{"key":"7970_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102301","volume":"110","author":"R Almesaeed","year":"2021","unstructured":"Almesaeed R, Jedidi A (2021) Dynamic directional routing for mobile wireless sensor networks. Ad Hoc Netw 110:102301","journal-title":"Ad Hoc Netw"},{"key":"7970_CR5","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.54.3328","author":"H Kalkha","year":"2017","unstructured":"Kalkha H, Satori H, Satori K (2017) A dynamic clustering approach for maximizing scalability in wireless sensor networ. Trans Mach Learn Artif Intell. https:\/\/doi.org\/10.14738\/tmlai.54.3328","journal-title":"Trans Mach Learn Artif Intell"},{"issue":"4","key":"7970_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Weilian S, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"key":"7970_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102695","volume":"165","author":"G Zurita","year":"2020","unstructured":"Zurita G, Shukla AK, Pino JA, Merig\u00f3 JM, Lobos-Ossand\u00f3n V, Muhuri PK (2020) A bibliometric overview of the journal of network and computer applications between 1997 and 2019. J Netw Comput Appl 165:102695","journal-title":"J Netw Comput Appl"},{"key":"7970_CR8","doi-asserted-by":"crossref","unstructured":"Russel A, Moundounga A, Satori H, Satori K (2020). An overview of routing techniques in wsns. In: 2020 fourth international conference on intelligent computing in data sciences (ICDS), pp 1\u20137. IEEE","DOI":"10.1109\/ICDS50568.2020.9268764"},{"issue":"1","key":"7970_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3122863","volume":"9","author":"A Basheer","year":"2017","unstructured":"Basheer A, Sha K (2017) Cluster-based quality-aware adaptive data compression for streaming data. J Data Inf Qual (JDIQ) 9(1):1\u201333","journal-title":"J Data Inf Qual (JDIQ)"},{"issue":"1","key":"7970_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2528948","volume":"10","author":"MA Razzaque","year":"2013","unstructured":"Razzaque MA, Bleakley C, Dobson S (2013) Compression in wireless sensor networks: a survey and comparative evaluation. ACM Trans Sens Netw (TOSN) 10(1):1\u201344","journal-title":"ACM Trans Sens Netw (TOSN)"},{"issue":"6","key":"7970_CR11","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/JSEN.2014.2306429","volume":"14","author":"C-F Wang","year":"2014","unstructured":"Wang C-F, Shih J-D, Pan B-H, Tin-Yu W (2014) A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sens J 14(6):1932\u20131943","journal-title":"IEEE Sens J"},{"key":"7970_CR12","doi-asserted-by":"crossref","unstructured":"Capo-Chichi EP, Guyennet H, Friedt JM (2009) K-rle: a new data compression algorithm for wireless sensor network. In: 2009 third international conference on sensor technologies and applications, pp 502\u2013507. IEEE","DOI":"10.1109\/SENSORCOMM.2009.84"},{"key":"7970_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102354","volume":"112","author":"AP Ortega","year":"2021","unstructured":"Ortega AP, Ramchurn SD, Tran-Thanh L, Merrett GV (2021) Partner selection in self-organised wireless sensor networks for opportunistic energy negotiation: a multi-armed bandit based approach. Ad Hoc Netw 112:102354","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"7970_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-013-1021-9","volume":"68","author":"P Rawat","year":"2014","unstructured":"Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1\u201348","journal-title":"J Supercomput"},{"key":"7970_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101924","volume":"93","author":"RR Swain","year":"2019","unstructured":"Swain RR, Dash T, Khilar PM (2019) A complete diagnosis of faulty sensor modules in a wireless sensor network. Ad Hoc Netw 93:101924","journal-title":"Ad Hoc Netw"},{"key":"7970_CR16","doi-asserted-by":"crossref","unstructured":"Park GY, Kim H, Jeong HW, Youn HY (2013) A novel cluster head selection method based on k-means algorithm for energy efficient wireless sensor network. In: 2013 27th international conference on advanced information networking and applications workshops, pp 910\u2013915. IEEE","DOI":"10.1109\/WAINA.2013.123"},{"key":"7970_CR17","doi-asserted-by":"crossref","unstructured":"Eshaftri M, Al-Dubai AY, Romdhani I, Yassien MB (2015) A new energy efficient cluster based protocol for wireless sensor networks. In: 2015 federated conference on computer science and information systems (FedCSIS), pp 1209\u20131214. IEEE","DOI":"10.15439\/2015F193"},{"issue":"3","key":"7970_CR18","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3390\/s19030561","volume":"19","author":"A Hamzah","year":"2019","unstructured":"Hamzah A, Shurman M, Al-Jarrah O, Taqieddin E (2019) Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks. Sensors 19(3):561","journal-title":"Sensors"},{"key":"7970_CR19","doi-asserted-by":"crossref","unstructured":"Li J, Liu D (2015) Dpso-based clustering routing algorithm for energy harvesting wireless sensor networks. In: 2015 international conference on wireless communications and signal processing (WCSP), pp 1\u20135. IEEE","DOI":"10.1109\/WCSP.2015.7341030"},{"key":"7970_CR20","doi-asserted-by":"crossref","unstructured":"Singh DP, Bhateja V, Soni SK (2014) Prolonging the lifetime of wireless sensor networks using prediction based data reduction scheme. In: 2014 international conference on signal processing and integrated networks (SPIN), pp 420\u2013425. IEEE","DOI":"10.1109\/SPIN.2014.6776990"},{"issue":"2","key":"7970_CR21","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.compeleceng.2013.10.010","volume":"40","author":"A Boudries","year":"2014","unstructured":"Boudries A, Aliouat M, Siarry P (2014) Detection and replacement of a failing node in the wireless sensors networks. Comput Electr Eng 40(2):421\u2013432","journal-title":"Comput Electr Eng"},{"key":"7970_CR22","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1016\/j.procs.2012.06.140","volume":"10","author":"V Obado","year":"2012","unstructured":"Obado V, Djouani K, Hamam Y (2012) Hidden markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Proc Comput Sci 10:1010\u20131017","journal-title":"Proc Comput Sci"},{"key":"7970_CR23","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.procs.2019.01.028","volume":"148","author":"H Kalkha","year":"2019","unstructured":"Kalkha H, Satori H, Satori K (2019) Preventing black hole attack in wireless sensor network using hmm. Proc Comput Sci 148:552\u2013561","journal-title":"Proc Comput Sci"},{"key":"7970_CR24","doi-asserted-by":"crossref","unstructured":"Saihi M, Boussaid B, Zouinkhi A, Abdelkrim N (2015) Distributed fault detection based on hmm for wireless sensor networks. In: 2015 4th international conference on systems and control (ICSC), pp 189\u2013193. IEEE","DOI":"10.1109\/ICoSC.2015.7153274"},{"issue":"4","key":"7970_CR25","first-page":"351","volume":"42","author":"X Xiaofei","year":"2020","unstructured":"Xiaofei X, Zhang Z, Chen Y, Li L (2020) Hmm-based predictive model for enhancing data quality in wsn. Int J Comput Appl 42(4):351\u2013359","journal-title":"Int J Comput Appl"},{"key":"7970_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.adhoc.2015.04.004","volume":"33","author":"S Kumar","year":"2015","unstructured":"Kumar S, Tiwari SN, Hegde RM (2015) Sensor node tracking using semi-supervised hidden markov models. Ad Hoc Netw 33:55\u201370","journal-title":"Ad Hoc Netw"},{"key":"7970_CR27","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-981-16-5301-8_31","volume-title":"Soft computing for security applications","author":"S Anand","year":"2022","unstructured":"Anand S, Rafeeque KM (2022) Enhancing the security in wireless sensor network using hidden markov model. Soft computing for security applications. Springer, Berlin, pp 409\u2013423"},{"issue":"6","key":"7970_CR28","doi-asserted-by":"publisher","first-page":"477","DOI":"10.32604\/csse.2020.35.477","volume":"35","author":"S Tabatabaei","year":"2020","unstructured":"Tabatabaei S (2020) A novel fault tolerance energy-aware clustering method via social spider optimization (sso) and fuzzy logic and mobile sink in wireless sensor networks (wsns). Comput Syst Sci Eng 35(6):477\u2013494","journal-title":"Comput Syst Sci Eng"},{"key":"7970_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108521","volume":"200","author":"X Fu","year":"2021","unstructured":"Fu X, Pace P, Aloi G, Li W, Fortino G (2021) Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model. Comput Netw 200:108521","journal-title":"Comput Netw"},{"issue":"7","key":"7970_CR30","doi-asserted-by":"publisher","first-page":"6046","DOI":"10.1109\/JIOT.2019.2958097","volume":"7","author":"F Song","year":"2019","unstructured":"Song F, Zhu M, Zhou Y, You I, Zhang H (2019) Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Int Things J 7(7):6046\u20136055","journal-title":"IEEE Int Things J"},{"issue":"1","key":"7970_CR31","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TWC.2017.2762674","volume":"17","author":"MS Bahbahani","year":"2017","unstructured":"Bahbahani MS, Alsusa E (2017) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):101\u2013111","journal-title":"IEEE Trans Wirel Commun"},{"issue":"5","key":"7970_CR32","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1109\/TSP.2006.871973","volume":"54","author":"C Budianu","year":"2006","unstructured":"Budianu C, Ben-David S, Tong L (2006) Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Trans Signal Process 54(5):1703\u20131715","journal-title":"IEEE Trans Signal Process"},{"key":"7970_CR33","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-1-4612-1784-8_33","volume-title":"Stochastic analysis, control, optimization and applications","author":"P Gupta","year":"1999","unstructured":"Gupta P, Kumar PR (1999) Critical power for asymptotic connectivity in wireless networks. Stochastic analysis, control, optimization and applications. Springer, Berlin, pp 547\u2013566"},{"issue":"7","key":"7970_CR34","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1177\/0142331220969580","volume":"43","author":"M Mozaffari","year":"2020","unstructured":"Mozaffari M, Safarinejadian B, Shasadeghi M (2020) A novel mobile agent-based distributed evidential expectation maximization algorithm for uncertain sensor networks. Trans Inst Meas Control 43(7):1609\u20131619","journal-title":"Trans Inst Meas Control"},{"key":"7970_CR35","doi-asserted-by":"crossref","unstructured":"Wang Q, Hassanein H, Takahara G (2004) Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In: Workshops on mobile and wireless networking\/high performance scientific, engineering computing\/network design and architecture\/optical networks control and management\/Ad Hoc and Sensor Networks\/Compil, pp 456\u2013463. IEEE","DOI":"10.1109\/ICPPW.2004.1328055"},{"issue":"10","key":"7970_CR36","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.comcom.2004.01.004","volume":"27","author":"RAF Mini","year":"2004","unstructured":"Mini RAF, Loureiro AAF, Nath B (2004) The distinctive design characteristic of a wireless sensor network: the energy map. Comput Commun 27(10):935\u2013945","journal-title":"Comput Commun"},{"key":"7970_CR37","volume-title":"A guide to theory, algorithm, and system development, spoken language processing","author":"X Huang","year":"2001","unstructured":"Huang X, Acero A, Hon H-W, Reddy R (2001) A guide to theory, algorithm, and system development, spoken language processing. Prentice Hall PTR, New Jersey"},{"key":"7970_CR38","doi-asserted-by":"crossref","unstructured":"Hu P, Zhou Z, Liu Q, Li F (2007) The hmm-based modeling for the energy level prediction in wireless sensor networks. In: 2007 2nd IEEE conference on industrial electronics and applications, pp 2253\u20132258. IEEE","DOI":"10.1109\/ICIEA.2007.4318812"},{"key":"7970_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102164","volume":"103","author":"Nazli Tekin and Vehbi Cagri Gungor","year":"2020","unstructured":"Nazli Tekin and Vehbi Cagri Gungor (2020) Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Netw 103:102164","journal-title":"Ad Hoc Netw"},{"issue":"2019","key":"7970_CR40","first-page":"1","volume":"2019","author":"S Yang","year":"2019","unstructured":"Yang S, Ma L, Jia S, Qin D (2019) A novel markov model-based low-power and secure multihop routing mechanism. J Sens 2019(2019):1\u201311","journal-title":"J Sens"},{"issue":"11","key":"7970_CR41","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1287\/mnsc.17.11.712","volume":"17","author":"JY Yen","year":"1971","unstructured":"Yen JY (1971) Finding the k shortest loopless paths in a network. Manag Sci 17(11):712\u2013716","journal-title":"Manag Sci"},{"key":"7970_CR42","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.adhoc.2018.10.006","volume":"85","author":"T Stahlbuhk","year":"2019","unstructured":"Stahlbuhk T, Shrader B, Modiano E (2019) Learning algorithms for scheduling in wireless networks with unknown channel statistics. Ad Hoc Netw 85:131\u2013144","journal-title":"Ad Hoc Netw"},{"key":"7970_CR43","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ieri.2012.06.101","volume":"2","author":"A-G Malek","year":"2012","unstructured":"Malek A-G, Chunlin L, Zhiyong Y, Hasan AHN, Xiaoqing Z (2012) Improved the energy of ad hoc on-demand distance vector routing protocol. IERI Proc 2:355\u2013361","journal-title":"IERI Proc"},{"issue":"5","key":"7970_CR44","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.adhoc.2008.09.001","volume":"7","author":"S Liu","year":"2009","unstructured":"Liu S, Srivastava R, Koksal CE, Sinha P (2009) Pushback: a hidden markov model based scheme for energy efficient data transmission in sensor networks. Ad Hoc Netw 7(5):973\u2013986","journal-title":"Ad Hoc Netw"},{"key":"7970_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102389","volume":"112","author":"Rohit Kumar and Joy Chandra Mukherjee","year":"2021","unstructured":"Rohit Kumar and Joy Chandra Mukherjee (2021) On-demand vehicle-assisted charging in wireless rechargeable sensor networks. Ad Hoc Netw 112:102389","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"7970_CR46","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013286","journal-title":"Proc IEEE"},{"key":"7970_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-71760-9","volume-title":"Introduction to network simulator NS2","author":"T Issariyakul","year":"2009","unstructured":"Issariyakul T, Hossain E (2009) Introduction to network simulator 2 (ns2). Introduction to network simulator NS2. Springer, Berlin, pp 1\u201318"},{"key":"7970_CR48","unstructured":"Vouma Lekoundji J-B (2014) Mod\u00e8les de Markov cach\u00e9s, PhD thesis, Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-022-07970-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T05:06:41Z","timestamp":1728277601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-022-07970-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,3]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["7970"],"URL":"https:\/\/doi.org\/10.1007\/s00521-022-07970-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,3]]},"assertion":[{"value":"9 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}