{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:10:55Z","timestamp":1753884655151,"version":"3.41.2"},"reference-count":26,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p> To perceive the data utilizing sensor nodes, wireless sensor network (WSN) consists of several nodes connected to a wireless channel. However, the sink node, also known as a base station (BS), provides power to the WSN and acts as an access node for a number of the network\u2019s sensor devices. Weather monitoring, field surveillance, and the collection of meteorological data are just a few of the various uses for WSN. The energy of each node directly affects how long a wireless network will last. So, to increase the lifespan of WSN, effective routing is required. Using the suggested Taylor sea lion optimization-based deep belief network (TSLnO-based DBN), the ultimate purpose of this research is to build a method for energy-aware communication in WSN. In the setup stage, cluster head (CH) is chosen using a hybrid optimization technique called ant lion whale optimization (ALWO), which is created by fusing the whale optimization algorithm (WOA) and ant lion optimizer (ALO). It is important to note that CH\u2019s selection criteria are solely based on fitness factors such as energy and distance. The second phase, known as the steady state step, is when the updating of energy and trust takes place. In the prediction phase, the network classifier is trained using a newly created optimization method called TSLnO, and the age of neighbor nodes is predicted by estimating the energy of neighbors using DBN. By combining the Taylor Series and the sea lion optimization (SLnO) method, the proposed TSLnO is produced. The communication\/route discovery phase, which occurs in the fourth phase, is where the path through nearby nodes is chosen. The maintenance phase of the route is the fifth phase. <\/jats:p>","DOI":"10.1142\/s0218001423520018","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T01:39:39Z","timestamp":1675993179000},"source":"Crossref","is-referenced-by-count":1,"title":["Age Prediction for Energy-Aware Communication in WSN Using Hybrid Optimization-Enabled Deep Belief Network"],"prefix":"10.1142","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8633-7429","authenticated-orcid":false,"given":"K. Suresh","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Annamalai University, Annamalai Nagar, Chidambaram, Tamil Nadu, 608002, India"},{"name":"Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, Guntur District, Andhra Pradesh, India"}]},{"given":"P.","family":"Vimala","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Annamalai University, Annamalai Nagar, Chidambaram, Tamil Nadu, 608002, India"}]}],"member":"219","published-online":{"date-parts":[[2023,4,7]]},"reference":[{"key":"S0218001423520018BIB001","doi-asserted-by":"crossref","first-page":"96974","DOI":"10.1109\/ACCESS.2019.2929578","volume":"7","author":"Ahmed E. F.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218001423520018BIB002","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","volume":"93","author":"Airehrour D.","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"S0218001423520018BIB003","doi-asserted-by":"crossref","first-page":"117823","DOI":"10.1109\/ACCESS.2021.3107230","volume":"9","author":"Alabdali A. M.","year":"2021","journal-title":"IEEE Acess"},{"issue":"2","key":"S0218001423520018BIB004","first-page":"37","volume":"2","author":"AlBalushi F. M.","year":"2019","journal-title":"J. Netw. Commun. Syst."},{"issue":"6","key":"S0218001423520018BIB005","first-page":"850","volume":"2","author":"Barani S.","year":"2012","journal-title":"Indian J. Comput. Sci. Eng."},{"issue":"4","key":"S0218001423520018BIB006","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1007\/s11277-019-06357-3","volume":"107","author":"Beheshtiasl A.","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"S0218001423520018BIB007","doi-asserted-by":"crossref","first-page":"101029","DOI":"10.1016\/j.pmcj.2019.05.010","volume":"58","author":"Bhardwaj R.","year":"2019","journal-title":"Pervasive Mob. Comput."},{"key":"S0218001423520018BIB008","doi-asserted-by":"crossref","first-page":"170019","DOI":"10.1109\/ACCESS.2019.2955993","volume":"7","author":"Daneshvar S. M. M. H.","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"S0218001423520018BIB009","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TDSC.2011.57","volume":"9","author":"Das A.","year":"2011","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"S0218001423520018BIB010","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11276-011-0393-0","volume":"18","author":"Ghosal A.","year":"2012","journal-title":"Wirel. Netw."},{"key":"S0218001423520018BIB011","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/HICSS.2000.926982","volume-title":"Proc. 33rd Annual Hawaii Int. Conf. System Sciences","author":"Heinzelman W. R.","year":"2000"},{"issue":"1","key":"S0218001423520018BIB012","first-page":"24","volume":"2","author":"Kelotra A.","year":"2019","journal-title":"J. Netw. Commun. Syst."},{"issue":"5","key":"S0218001423520018BIB013","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1007\/s11276-015-1039-4","volume":"22","author":"Kumar R.","year":"2016","journal-title":"Wirel. Netw."},{"key":"S0218001423520018BIB014","doi-asserted-by":"crossref","first-page":"108250","DOI":"10.1016\/j.comnet.2021.108250","volume":"197","author":"Kumar K. S.","year":"2021","journal-title":"Comput. Netw."},{"issue":"2","key":"S0218001423520018BIB015","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s11277-017-4940-6","volume":"98","author":"Li F.","year":"2018","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"S0218001423520018BIB016","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s00521-018-3637-4","volume":"31","author":"Mahesh N.","year":"2019","journal-title":"Neural. Comput. Appl."},{"issue":"5","key":"S0218001423520018BIB017","first-page":"388","volume":"10","author":"Masadeh R.","year":"2019","journal-title":"Sea"},{"key":"S0218001423520018BIB018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2014.11.021","volume":"297","author":"Min J.-K.","year":"2015","journal-title":"Inf. Sci."},{"key":"S0218001423520018BIB019","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","volume":"83","author":"Mirjalili S.","year":"2015","journal-title":"Adv. Eng. Softw."},{"key":"S0218001423520018BIB020","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"Mirjalili S.","year":"2016","journal-title":"Adv. Eng. Softw."},{"key":"S0218001423520018BIB021","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1016\/j.procs.2016.04.266","volume":"83","author":"Negra R.","year":"2016","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"S0218001423520018BIB022","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","volume":"105","author":"Selvi M.","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"S0218001423520018BIB023","doi-asserted-by":"crossref","first-page":"4637","DOI":"10.1007\/s11276-020-02348-6","volume":"26","author":"Solapure S. S.","year":"2020","journal-title":"Wirel. Netw."},{"issue":"5","key":"S0218001423520018BIB024","first-page":"1857","volume":"34","author":"Vinitha A.","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"S0218001423520018BIB026","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/HICSS.2001.926537","volume-title":"Proc. 34th Annual Hawaii Int. Conf. on System Sciences","author":"Yang Q.","year":"2001"},{"issue":"1","key":"S0218001423520018BIB027","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TKDE.2011.145","volume":"25","author":"Ye M.","year":"2011","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001423520018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T10:44:19Z","timestamp":1683801859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001423520018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":26,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1142\/S0218001423520018"],"URL":"https:\/\/doi.org\/10.1142\/s0218001423520018","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2023,4]]},"article-number":"2352001"}}