{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:49Z","timestamp":1775470429375,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T00:00:00Z","timestamp":1717545600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Energy efficiency is critical for prolonging the survivability of wireless sensor networks (WSNs), and clustering algorithms play a significant role in achieving this goal. An application\u2010specific wireless sensor network requires adapted methods and techniques to meet its requirements. A vast amount of research has been done on optimizing energy consumption and enhancing network lifetime of sensor nodes. To increase the lifetime of WSNs, we present and evaluate an energy\u2010efficient clustering algorithm based on distributed fuzzy logic (EECADFL). High reliability, low error rates during clustering, and its ability to perform well in large\u2010scale networks with many nodes are some of the main benefits of this method. In wireless sensor networks, simulation results showed that the scheme provided better lifetime performance while limiting dead nodes and improving cluster head selection.<\/jats:p>","DOI":"10.1002\/itl2.549","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T05:29:20Z","timestamp":1717565360000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Energy\u2010efficient clustering algorithm using distributed fuzzy\u2010logic to prolong the survivability of wireless sensor networks"],"prefix":"10.1002","volume":"8","author":[{"given":"Lulwah M.","family":"Alkwai","sequence":"first","affiliation":[{"name":"College of Computer Engineering &amp; Science University of Ha'il  Ha'il Kingdom of Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6658-6839","authenticated-orcid":false,"given":"Kusum","family":"Yadav","sequence":"additional","affiliation":[{"name":"College of Computer Engineering &amp; Science University of Ha'il  Ha'il Kingdom of Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2024,6,5]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3200597"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12514"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-023-05452-x"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3365392"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2014.6923043"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDST.307900"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02228-8"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/math11102332"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67585-5_56"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/42.996338"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11082\u2010023\u201005371\u2010x"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500\u2010023\u201008931\u20101"},{"key":"e_1_2_8_16_1","unstructured":"ChenY YangY YiW.A cooperative routing algorithm for lifetime maximization in wireless sensor networks.2010."},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.063011.100744"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMICON.2017.8279043"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.05.100168"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0260-4"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.04.004"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2012.2204737"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2012.2207950"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119448"},{"key":"e_1_2_8_25_1","first-page":"427","volume-title":"Paper presented at: 2013 Sixth International Conference on Contemporary Computing (IC3); 08\u201010 August 2013","author":"Pal R","year":"2013"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1013-1"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150820373"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:51:23Z","timestamp":1741740683000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,5]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.1002\/itl2.549"],"URL":"https:\/\/doi.org\/10.1002\/itl2.549","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.549\/v2\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v1\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v2\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.549\/v2\/decision1","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,5]]},"assertion":[{"value":"2024-02-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e549"}}