{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T14:49:01Z","timestamp":1778510941200,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T00:00:00Z","timestamp":1589587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T00:00:00Z","timestamp":1589587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004192","name":"National Science and Technology Development Agency","doi-asserted-by":"publisher","award":["Coordinating Center for Thai Government Science and Technology Scholarship Students (CSTS)"],"award-info":[{"award-number":["Coordinating Center for Thai Government Science and Technology Scholarship Students (CSTS)"]}],"id":[{"id":"10.13039\/501100004192","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004071","name":"Khon Kaen University","doi-asserted-by":"publisher","award":["Grant 59257"],"award-info":[{"award-number":["Grant 59257"]}],"id":[{"id":"10.13039\/501100004071","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004396","name":"Thailand Research Fund","doi-asserted-by":"publisher","award":["IRN61W0006"],"award-info":[{"award-number":["IRN61W0006"]}],"id":[{"id":"10.13039\/501100004396","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12652-020-02090-z","type":"journal-article","created":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T06:02:36Z","timestamp":1589608956000},"page":"873-895","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["An energy-efficient fuzzy-based scheme for unequal multihop clustering in wireless sensor networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Songyut","family":"Phoemphon","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1026-191X","authenticated-orcid":false,"given":"Chakchai","family":"So-In","sequence":"additional","affiliation":[]},{"given":"Phet","family":"Aimtongkham","sequence":"additional","affiliation":[]},{"given":"Tri Gia","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,16]]},"reference":[{"key":"2090_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2014.09.005","volume":"46","author":"MM Afsar","year":"2014","unstructured":"Afsar MM, Tayarani-N MH (2014) Clustering in sensor networks: a literature survey. J Netw Comput Appl 46:198\u2013226","journal-title":"J Netw Comput Appl"},{"key":"2090_CR2","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1016\/j.asoc.2012.12.029","volume":"13","author":"H Bagci","year":"2013","unstructured":"Bagci H, Yazici A (2013) An energy aware fuzzy approach to unequal clustering in wireless sensor networks. Appl Soft Comput 13:741\u20131749","journal-title":"Appl Soft Comput"},{"key":"2090_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/1214720","volume":"2017","author":"B Balakrishnan","year":"2017","unstructured":"Balakrishnan B, Balachandran S (2017) FLECH: fuzzy logic based energy efficient clustering hierarchy for nonuniform wireless sensor networks. Wirel Commun Mob Comput 2017:1\u201313","journal-title":"Wirel Commun Mob Comput"},{"key":"2090_CR4","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.asoc.2015.11.044","volume":"40","author":"B Baranidharan","year":"2016","unstructured":"Baranidharan B, Santhi B (2016) DUCF: Distributed load balancing unequal clustering in wireless sensor networks using Fuzzy approach. Appl Soft Comput 40:495\u2013506","journal-title":"Appl Soft Comput"},{"key":"2090_CR5","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s12652-019-01382-3","volume":"11","author":"J Bhola","year":"2020","unstructured":"Bhola J, Soni S, Cheema GK (2020) Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks. J Ambient Intell Humaniz Comput 11:1281\u20131288","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"2090_CR6","first-page":"2089","volume":"9","author":"J Chen","year":"2007","unstructured":"Chen J, Shen H (2007) MELEACH an energy-efficient routing protocol for WSNs. China J Sens Actuators 9(4):2089\u20132094","journal-title":"China J Sens Actuators"},{"key":"2090_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cie.2016.08.028","volume":"101","author":"R Currya","year":"2016","unstructured":"Currya R, Smith J (2016) A survey of optimization algorithms for wireless sensor network lifetime maximization. Comput Ind Eng 101:145\u2013166","journal-title":"Comput Ind Eng"},{"key":"2090_CR8","doi-asserted-by":"crossref","unstructured":"Devadevan V, Suresh S (2016) Energy efficient routing protocol in forest fire detection system. In: Proceedings of the 6th international conference on advanced computing (IACC), pp 618\u2013622","DOI":"10.1109\/IACC.2016.120"},{"issue":"2","key":"2090_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/SURV.2011.020211.00058","volume":"14","author":"S Ehsan","year":"2012","unstructured":"Ehsan S, Hamdaoui B (2012) A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Commun Surv Tutor 14(2):265\u2013278","journal-title":"IEEE Commun Surv Tutor"},{"key":"2090_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.pmcj.2017.11.004","volume":"43","author":"M Elappila","year":"2018","unstructured":"Elappila M, Chinara S, Parhi DR (2018) Survivable path routing in WSN for IoT applications. Pervasive Mob Comput 43:49\u201363","journal-title":"Pervasive Mob Comput"},{"key":"2090_CR11","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1016\/j.asoc.2017.07.045","volume":"68","author":"M Faheem","year":"2018","unstructured":"Faheem M, Gungor VC (2018) Energy efficient and QoS\u2013aware routing protocol for wireless sensor network\u2013based smart grid applications in the context of industry 4.0. Appl Soft Comput 68:910\u2013922","journal-title":"Appl Soft Comput"},{"key":"2090_CR12","unstructured":"GNSS (2017) RTK and satellite positioning concepts"},{"issue":"4","key":"2090_CR13","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660\u2013670","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"2090_CR14","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/JIOT.2016.2600569","volume":"3","author":"A Kamilaris","year":"2016","unstructured":"Kamilaris A, Pitsillides A (2016) mobile phone computing and the internet of things: a survey. IEEE Internet Things J 3(6):885\u2013898","journal-title":"IEEE Internet Things J"},{"key":"2090_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2019.2925985","volume":"19","author":"J Kang","year":"2019","unstructured":"Kang J, Sohn I, Lee SH (2019) Enhanced message-passing based LEACH protocol for wireless sensor networks. Sensors 19:1\u201317","journal-title":"Sensors"},{"key":"2090_CR16","doi-asserted-by":"crossref","unstructured":"Kim J, Park S, Han Y, Chung T (2008) CHEF: cluster head election mechanism using fuzzy logic in wireless sensor networks. Proceedings of the 10th international conference on advanced communication technology (ICACT), pp 654\u2013659","DOI":"10.1109\/ICACT.2008.4493846"},{"issue":"2","key":"2090_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0165-0114(97)00409-0","volume":"111","author":"YH Kim","year":"2000","unstructured":"Kim YH, Ahn SC, Kwon WH (2000) Computational complexity of general fuzzy logic control and its simplification for a loop controller. Fuzzy Sets Syst 111(2):215\u2013224","journal-title":"Fuzzy Sets Syst"},{"key":"2090_CR18","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.asoc.2014.08.064","volume":"25","author":"P Kuila","year":"2014","unstructured":"Kuila P, Jana PK (2014) A novel differential evolution based clustering algorithm for wireless sensor networks. Appl Soft Comput 25:414\u2013425","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2090_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-010-0252-4","volume":"17","author":"B Latr\u00e9","year":"2011","unstructured":"Latr\u00e9 B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel Netw 17(1):1\u201318","journal-title":"Wirel Netw"},{"key":"2090_CR20","unstructured":"Li CF, Ye M, Chen GH, and Wu J (2005) An energy\u2013efficient unequal clustering mechanism for wireless sensor networks. In: Proceedings of the 2nd international conference on mobile ad\u2013hoc and sensor systems (MASS), pp 604\u2013611"},{"key":"2090_CR21","doi-asserted-by":"crossref","unstructured":"Liu Y, Gao J, Jia Y, Zhu L (2008) A cluster maintenance algorithm based on LEACH-DCHS protocol. In: Proceedings of the international conference on networking, architecture, and storage, pp 165\u2013166","DOI":"10.1109\/NAS.2008.59"},{"key":"2090_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.comcom.2017.07.005","volume":"111","author":"M Mirzaie","year":"2017","unstructured":"Mirzaie M, Mazinani SM (2017) Adaptive MCFL: an adaptive multi\u2013clustering algorithm using fuzzy logic in wireless sensor network. Comput Commun 111:56\u201367","journal-title":"Comput Commun"},{"key":"2090_CR23","unstructured":"Open Automation (2020) MicaZ Wireless Measurement System [online]. http:\/\/www.openautomation.net\/uploadsproductos\/micaz_datasheet.pdf. Accessed 25 Apr 2020"},{"key":"2090_CR24","first-page":"173","volume-title":"Ad hoc networking","author":"CE Perkins","year":"2001","unstructured":"Perkins CE, Royer EM (2001) The ad hoc on\u2013demand distance vector protocol. Ad hoc networking. Addison-Wesley Longman Publishing Co. Inc, Boston, pp 173\u2013219"},{"issue":"6","key":"2090_CR25","doi-asserted-by":"publisher","first-page":"4728","DOI":"10.1109\/JIOT.2018.2811741","volume":"5","author":"S Phoemphon","year":"2018","unstructured":"Phoemphon S, So-In C, Leelathakul N (2018a) Fuzzy weighted centroid localization with virtual node approximation in wireless sensor networks. IEEE Internet Things J 5(6):4728\u20134752","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2090_CR27","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11276-016-1372-2","volume":"24","author":"S Phoemphon","year":"2018","unstructured":"Phoemphon S, So-In C, Nguyen TG (2018b) An enhanced wireless sensor network localization scheme for radio irregularity models using hybrid fuzzy deep extreme learning machines. Wirel Netw 24(3):799\u2013819","journal-title":"Wirel Netw"},{"issue":"4","key":"2090_CR28","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.asoc.2018.01.004","volume":"65","author":"S Phoemphon","year":"2018","unstructured":"Phoemphon S, So-In C, Niyato D (2018c) A hybrid model using fuzzy logic and an extreme learning machine with vector particle swarm optimization for wireless sensor network localization. Appl Soft Comput 65(4):101\u2013120","journal-title":"Appl Soft Comput"},{"key":"2090_CR26","doi-asserted-by":"publisher","first-page":"113044","DOI":"10.1016\/j.eswa.2019.113044","volume":"143","author":"S Phoemphon","year":"2020","unstructured":"Phoemphon S, So-In C, Leelathakul N (2020) A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Syst Appl 143:113044","journal-title":"Expert Syst Appl"},{"key":"2090_CR29","doi-asserted-by":"crossref","unstructured":"Rajaram V, Kumaratharan N (2020) Multi-hop optimized routing algorithm and load balanced fuzzy clustering in wireless sensor networks. J Ambient Intell Humaniz Comput","DOI":"10.1007\/s12652-020-01827-0"},{"issue":"1","key":"2090_CR30","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/JIOT.2015.2498900","volume":"3","author":"MA Razzaque","year":"2016","unstructured":"Razzaque MA, Milojevic-Jevric M, Palade A, Clarke S (2016) Middleware for internet of things: a survey. IEEE Internet Things J 3(1):70\u201395","journal-title":"IEEE Internet Things J"},{"key":"2090_CR31","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.asoc.2014.11.063","volume":"30","author":"SA Sert","year":"2015","unstructured":"Sert SA, Bagci H, Yazici A (2015) MOFCA: multi\u2013objective fuzzy clustering algorithm for wireless sensor networks. Appl Soft Comput 30:151\u2013165","journal-title":"Appl Soft Comput"},{"key":"2090_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2016.03.003","volume":"30","author":"T Shankara","year":"2016","unstructured":"Shankara T, Shanmugavelb S, Rajesha A (2016) Hybrid HSA and PSO algorithm for energy efficient cluster head selection in wireless sensor networks. Swarm Evolut Comput 30:1\u201310","journal-title":"Swarm Evolut Comput"},{"issue":"2","key":"2090_CR33","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10723-017-9394-2","volume":"15","author":"Y Verginadis","year":"2017","unstructured":"Verginadis Y, Michalas A, Gouvas P, Schiefer G, H\u00fcbsch G, Paraskakis I (2017) PaaSword: a holistic data privacy and security by design framework for cloud services. J Grid Comput 15(2):219\u2013234","journal-title":"J Grid Comput"},{"key":"2090_CR34","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.future.2016.08.004","volume":"76","author":"J Wanga","year":"2017","unstructured":"Wanga J, Caoa Y, Lia B, Kimb H, Lee S (2017) Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Future Gener Comput Syst 76:452\u2013457","journal-title":"Future Gener Comput Syst"},{"key":"2090_CR35","doi-asserted-by":"crossref","unstructured":"Xiangning F, Yulin S (2007) Improvement on LEACH protocol of wireless sensor network. In: Proceedings of the international conference on sensor technologies and applications, pp 260\u2013264","DOI":"10.1109\/SENSORCOMM.2007.4394931"},{"key":"2090_CR36","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.asoc.2018.03.053","volume":"68","author":"Y Xu","year":"2018","unstructured":"Xu Y, Ding O, Qu R, Li K (2018) Hybrid multi\u2013objective evolutionary algorithms based on decomposition for wireless sensor network coverage optimization. Appl Soft Comput 68:268\u2013282","journal-title":"Appl Soft Comput"},{"key":"2090_CR37","unstructured":"Ye M, Li C, Chen G, Wu J (2005) EECS: an energy efficient clustering scheme in wireless sensor networks. In: Proceedings of the 24th international conference on performance, computing and communications (IPCCC), pp 535\u2013540"},{"key":"2090_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0646-0","volume-title":"Fuzzy set theory and its applications","author":"HJ Zimmermann","year":"2001","unstructured":"Zimmermann HJ (2001) Fuzzy set theory and its applications, 4th edn. Kluwer Academic Publishers Group, Boston","edition":"4"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02090-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02090-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02090-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T23:46:16Z","timestamp":1621122376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02090-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,16]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2090"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02090-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,16]]},"assertion":[{"value":"11 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there are no conflicts of interest related to the publication of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}