Dimension learning based chimp optimizer for energy efficient wireless sensor networks

Wireless sensors are the basic requisite of today’s smart infrastructure based on internet of things (IoTs), 5G and wireless sensor networks (WSNs). WSNs are widely used in industrial applications, precision agriculture and animal tracking systems, environment monitoring, smart grids, energy control systems, smart buildings and entertainment industry etc. The distributed and dynamic scheme of WSNs establishes very unique demands in developing clustering and routing protocols. In order to meet the demand of efficient WSNs, most important requirement is energy management and extension of network lifetime. So energy constraints issue is one of the most emerging area for research to reduce the complexity of network functioning. Due to the complexity of this task we need more robustness optimizer algorithms which can tackle these types of tasks. In this article we are trying to develop one improved version of chimp optimizer for energy constraint issues. In this modification have been integrated the chimp optimizer with dimension learning based hunting (DLH) search technique, known as Improved Chimp Optimizer Algorithm (IChoA). Here the DLH search strategy helps in maintaining diversity and improves the balance between exploitation and exploration. To compute the robustness in solving the optimizer issues, IChoA has been tested on 29-CEC-2017 test suites and energy constraint issues. Experimental solutions obtained by proposed methods are verified with recent methods. All simulation shows that the IChoA method can be most effective in solving the standard complex suites and energy constraint issues.


Literature review
The life span of the battery of each sensor device is limited which severely constrains the operation of the sensor network. Therefore, proper schemes must be proposed to tackle this problem so that the exploitation of sensor networks can become practical. The key point to develop a clustering algorithm is distribution strategy of nodes, cluster formation method, data dissemination process, communication protection, stability, synchronization etc. The exhaustive literature is reviewed in this section as follows: Singh et al. 21 designed concentric layered architecture (CLA) for optimal location of layers and numbers of SN in every layer in static and random WSN multi level clustering. CLA divided the entire area into layers depending upon nodes in every layer and node density. CLA divided the WSN into concentric layers for numerous SNs so that the outer later consisted of two times compared to internal layers to avoid intra cluster load. CLA evaluated for PSO-C and simulation results showed that it performed appreciably in terms of energy efficiency and prolonged lifetime compared to PSO-ECHS, BERA, and PSO-C.
Purkar et al. 22 invented an energy efficient clustering Protocol to enhance for performance of heterogeneous WSN (EECPEP-HWSN). The proposed protocol divided the nodes into three different levels known as normal, advance and super nodes. The Cluster formed and CH elected on the basis of starting energy, hop count and remaining residue power. The EECPEP-HWSN protocol outperformed in comparison to existing protocols 188% better than LEACH, 150% than DEEC and 141% than SEP. Also, contributed to improve network lifetime, stability, energy efficiency and remaining energy in the network.
Singh et al. 23 proposed multilevel clustering protocol (MLCP) for load balancing and energy efficient data aggregation in large scale scalable WSNs. Hierarchal clustering architecture developed for clustering and routing issues. CH selection done using hybrid algorithms of dragonfly and PSO. MLCP considered various parameters of network such as node degree, inter and intra cluster distance for scalability, load balancing and energy efficiency. The simulated results for MLCP proved the increase of 90% in lifetime and 19.36% in energy consumption in comparison to existing techniques BERA, PSO-ECHS and PSO-C for achieving load balancing and energy efficiency.
Inam et al. 24 introduced energy efficient clustering and shortest path routing Protocol (EECSRP) for WSNs by reducing network overhead, enhancing network lifetime, maximum PDR and energy conservation. The CH selected on the basis of residue energy, node degree and RSS (received signal strength). Also, RSS based network distribution implemented for estimating gradient based on demand path selection between SN and BS. During the clustering process, when CH residual energy attained the threshold level and reduced the transmission for control packets. To avoid the data collision and MAC layer conflict BS collected data from every CH. The simulated results provided consistent performance of the network in terms of average energy consumption, pack delivery ratio, controlled overhead and average end to end delivery compared to the existing protocols i.e. R-LEACH, CCMAR and EESAA.
Mood et al. 25 modified the GSA (Gravitation search algorithm) for energy efficient clustering in WSNs. The proposed algorithm efficiently organized these clusters and calculated optimum number of CH depending upon the link quality and energy consumption. A new fitness function is proposed to organize the compact clusters by modifying GSA for calculating the mass values of power distance sums scaling technique. The fuzzy controller employed for identifying performance metrics of this technique for exploitation and exploration. The method presented minimized number of active CH to reduce energy conservation. The simulated results discovered that modified GSA performed better than existing metahueristics such as LEACH PSO-C, CSA, GSA and PDSS-GSA to enhance the network lifetime for energy efficient WSNs.
Raju Pal et al. 26 developed a new GA based energy efficient clustering weighted clustering (EEWC) for heterogeneous WSN. New weighted fitness objective function provided the modified steady state phase of LEACH for three important clustering constraints named as density, partition and numeral cluster heads. The proposed optimization function used to find the finest sets for CH in SS phase of LEACH by virtue of GA. The simulated outcomes improved the performance of WSN as compared to SEP, ERP and IHCR in terms of network lifetime, stability and complete residue energy.
Delgado et al. 27 presented a DCAGBS approach (distributed clustering algorithm guided by base station) to improve the network life time of the WSNs. The clusters formed dynamically with the help of BS and here BS sent three information data for the time to reconfigure SKIP value (number of round where CHs have same values) in accordance with fuzzy logic approach named as TAGAKI-Sugeno-Kang model. The concluded results showed that the centralized techniques are not feasible as they relayed too much information on severs that in turn increased the size and cost of the network so proposed distributed fuzzy based system for section of CH with dynamically configured BS. The proposed DCAFBS algorithm compared with the existing distributed and centralized methods (LEACH, CHEF, EEDCF, and EUDFC) to evaluate the network lifetime.
Singh et al. 28 proposed a EESCP (energy efficient scalable clustering protocol) for balanced clustering based on inter an intra cluster distance to form clusters of equal size among the entire network. PSO based Dragon fly algorithm is employed for selecting cluster heads and cost of communication is reduced by minimizing the intra cluster distance to achieve the maximum network coverage. The simulated results implemented for various network densities and sizes and EESCP outperformed in comparison to other algorithms such as BBO, DE, ABC, PSO in regards to balanced cluster formation, rotation of cluster head, network lifetime, energy consumption and throughput. Also, the WSN function performed robustly for different network densities and sizes. www.nature.com/scientificreports/ Sharma et al. 29 presented eeTMFO/GA (energy efficiency trusted moth flame optimization and genetic algorithm) for CH selection and the fitness function evaluated for residue energy, average cluster distance, node density, packet transmission and delay in transmission. The proposed optimizer MFO for CH election provided the overall enhancement of reliability and security of the network. The implemented results performed better for stable network and energy consumption compared to existing protocols such as 56.09% from HEED, 60% from LEACH and proved the better performance 42.26% and 16.36% with ABC and QABC respectively. Also, eeTMFO/GA showed huge reduction in electing malicious sensor nodes to be selected as CH as compared to ALM, TCM.
Qin et al. 30 proposed a distributed clustering algorithm with normalized information measures for sensor networks. Initially, normalized information distance (NID) selected for cluster data and label by minimizing the objective function. And then by introducing minimum normalized information distance based algorithm (MNID) by minimizing NID for model selection by exploring the capabilities of non Gaussian data clustering. The MNID algorithm implemented for distributing clustering employed for finite time multi agent consensus to calculate the global parameters where local variable exchanged for single hop neighbors. MNID algorithms simulated for both centralized and distributed network coverage by numerically tested for both synthetic and real data. The proposed algorithm outperformed in comparison to existing algorithms in terms of network performance.
Ullah et al. 31 investigated clustering protocols for network lifetime and SNs energy based on HEED for WSNs and summarized the advantages and disadvantages. The focus aimed to enhance network lifetime and energy consumption parameters for quality of service for both homogeneous and heterogeneous WSN. The analysis provided helpful information based on various HEED algorithms such as DWEHC, RUHEED, HEED-NPF, HELPER-HEED, U-HEED, H-HEED, D-HEED AND fuzzy based H-HEED.
Nadimi-Shahraki et al. 32 proposed an improved grey wolf optimizer (I-GWO) for solving the engineering design optimization problems by developing premature convergence, lack of population diversity and imbalance between exploitation and exploration capability of GWO algorithm. I-GWO provided DLH (dimension learning based hunting) approach inherited from independent hunting of wolves in nature which provided balance in-between global and local search for maintaining diversity. The results for I-GWO simulated for uni-modal, multi-modal, hybrid and composite bench mark functions and are compared to various existing techniques such as PSO, KH, GWO, WOA,EEGWO, HGSO and proved that proposed I-GWO outperformed for various statistical tests and experiments for well suited for engineering problems and power flow issues.
Devassy et al. 33 proposed a novel bio-inspired algorithm (NBA) protocol by combining LEACH with dragonfly algorithm for CH selection. The dragonfly algorithm utilized for deploying sensor nodes and selecting best possible route for delivery of packets to BS. The proposed algorithm performed better in expanding network lifetime as compared to existing algorithms such as LEACH, MS-LEACH, SFFA and ESO-LEACH) in terms of dead nodes, PDR and number of live nodes.
Bangotra et al. 34 proposed two nature inspired routing algorithms for attaining energy efficiency and secure WSN named as intelligent opportunistic routing protocol (IOP) and trust based secured secure intelligent opportunistic routing protocol (TBSIOP). The proposed algorithms compared with ACO and PSO terms of energy efficiency, average risk level, network lifetime, end to end delivery and packet delivery ratio.

Chimp optimization algorithm (ChoA)
Freshly, chimp optimizer is a newly population based nature inspired algorithm is developed by Khishe et al. 35 for handling the complex real issues. This metaheuristic method is motivated by sexual inspiration and specific intelligence of chimps which is famous for their own group hunting. The robustness of this method shows yourself different from others. During finding the best target it works under four categories as barrier, driver, attacker and chaser respectively. The details of these categories are illustrated under the following steps as; Firstly, chasing and driving phase is amended by the following Eqs. (1,2) where n, c,m and a is denoted the number of iterations and coefficient vectors. The coefficient vectors are amended by the Eqs. (3,4); where r 1 and r 2 are illustrates the random constants and these lies amid [0, 1] . Further m illustrates the chaotic vector and l is reduces non-linearly from 2.5 to 0 through the generation process. The behavior of each chimp is amended by mathematically under this stage. It assumed the first solution is available by the driver, attacker, chaser and barrier are superior information conveyed about the position of the best target. First four best solutions are stored for updating the next new position and rest members are forced to update their own location according to the best search agents location in the search space during the search process. This process is done in the search space by the following Eqs. (6)-(9).

The proposed IChoA algorithm
The various complex domain real world optimization tasks related to energy constraint issues in wireless sensor networks are huge challenges for the optimizer methods. Last few decades, a large number of robust optimizer methods have been developed by scientists. But due to their various shortcomings these are not able to prove their own robustness for complex domain issues. Each optimizer method may be faced with some shortcomings (6) d attacker =|c 1 a attacker − m 1 .x| (7) d barrier =|c 2 a barrier − m 2 .x| (8) d chaser =|c 3 a chaser − m 3 .x| (9) d driver =|c 4 a driver − m 4 .x| (10) x 1 =a attacker − a 1 .d attacker (11) x 2 =a barrier − a 2 .d barrier (12) x 3 =a chaser − a 3 .d chaser www.nature.com/scientificreports/ for finding the best solution in the complex domains, so being that reasons these methods could be failure to trap the best optima location in the search domain for these complex suites. Hence, due to the current demand of the various domains of engineering, computer science and many more, we need a huge amount of most powerful optimizer methods which would fulfill the current and future demands related to Wireless Sensor Networks (WSN), engineering applications and many other optimization tasks. As an example, these methods could easily tackle complex tasks, if the exploration and exploitation phases of these optimizer methods would be most powerful.
In this work, we are trying to introduce a newly enhanced version of chimp optimizer for tackling the energy constraint issues in wireless sensor networks. This version also helps to overcome the various shortcomings of the chimp optimizer such as imbalance amid the exploitation and exploration, diversity and premature convergence respectively. The proposed method benefits from a new drive technique known as dimension learning based hunting (DLH) search technique congenital from the specific chasing performance of the search members in search space. This strategy applies to construct a local region for every search member in the search space in which the best region information can be shared amid search members. Under this methodology, the DLH strategy helps in maintaining diversity and improves the balance between exploitation and exploration.The implementation stages of the proposed method are illustrated in detail by the following steps; where n and d signifies the size of crowd and size of function.
For fitness of population has been utilized the following Eq. (17); where fm i are denotes the fitness value of the ith member. In the same way, the subsequent matrices can be express for the target by mathematical Eqs. (18) and (19); where n, d and fp i are illustrates the total search members, dimension and fitness value of the ith member.
Fitness evaluation. The following Eqs. (20) and (21) are utilized to evaluate the fitness best and worst score of crowd ; Drive stage. DLH strategy helps to specifically chase the goal of the population members in the search area. This strategy applies to construct a local region for all chimps in the search area in which the best region or neighbors information can be shared amid chimps. Further the following subsection signifies how DLH and canonical ChoA portions create different members. www.nature.com/scientificreports/ Canonical ChoA phase. In the basic algorithm the first four finest population members are dignified as attacker, barrier, chaser and driver etc via Eqs. (6)- (9). The a and c coefficient vectors are estimated via Eqs. (3) and (4). After that, the finest place of x 1 , x 2 , x 3 and x 4 search members are evaluated via Eqs. (10)- (13). Finally the first crowd member for the novel place of chimp x i (n) named x i−ChoA (n + 1) is amended via Eq. (14).
DLH phase. In basic ChoA method the place is amended via first four member of the crowd. With this fact the original algorithm offers the crowd fails diversity too early, slow convergence, and population members can stuck in the native optima. To minimizing these drawbacks, in IChoA the DLH part supports in the distinct chasing of population agents that is learned by its neighbors.
In DLH strategy, all aspect of the fresh place is amended via a mathematical equation in which this diverse population agent is learned via its dissimilar neighbors and a randomly chosen member from the population. Then, further x i−ChoA (n + 1) , the DLH phase produces supplementary population candidate for the fresh place of chimp X i (n) named X i−DLH (n + 1) . To do this, a radius R t (n) is assessed put on Euclidean distance amid existing place of population member x i (n) and the candidate location X i−ChoA via mathematical Eq. (22).
Then, the near search members of x i (n) indicated by L t (n) are evaluated by Eq. (23) with respect to Eq. (22). Here M i shows the Euclidean distance between x i and x i .
After that, the multi-neighbors learning is executed by the following mathematical formulation of Eq. (24); where d is illustrate the dimension.
Position update stage. Over this part the finest population agent is designated via comparing the fitness outcome of dissimilar crowd members x i−ChoA (n + 1) and x i−DLH (n + 1) by equation; So, according to the previous mathematical equation if the fitness output of the chosen population agent is < x i (n) , then x i (n) is amended via the selected crowd agent. Else, x i (n) remains unchanged in the population.

Stopping condition.
Last of all, the bring to an end conditions is taken for amending the fresh place of the population member in the search domain. This process is continuously repetitive, up until it does not satisfy the standards of prevention.

Pseudocode of IChoA.
The pseudocode of Improved Chimp Optimizer is reported in Algorithm 2.

Algorithm 2 Pseudo-code of IChoA algorithm
Inputs: The crowd size (N ) and number of generations t Crowd Initialization X i (i = 1, 2, . . . , N) (14) Amend R i (n) by equation (22) Modify neighborhood x i (n) with radius R i by equation (23) for d=1 to D do Modify multi-neighbors learning by equation (24) end for Choose best (x i−ChoA (n + 1), x i−DLH (n + 1)) by equation (25) Modify crowd end for end for Return the best output

Results and discussion
For evaluating the robustness of the proposed method has been verified by various recent meta-heuristics such as SCA 36 , Chimp 35 , SBPSO 37 and AOA 38 respectively. Further, the performance of the presented method has been discussed by following subsections;  (30), total iter (500), dimension of functions (10-100), lb and ub taken between − 100 to 100 etc. For examine the robustness and efficiency of the IChoA method, a well-known standard CEC'2017 test suites have been applied and reported in Table 1 39 . The 3-D graphs of these suites are illustrated by Fig. 1. In which these suites are involves four types of functions such as Unimodal (1-2), Simple multi-modal (3-9), Hybrid (10)(11)(12)(13)(14)(15)(16)(17)(18)(19) and Composition (20)(21)(22)(23)(24)(25)(26)(27)(28)(29) respectively. Experiment and comparison. The trial must be done multiple n-times to create constant or stable statistical outputs for validating the accuracy and robustness of the metaheuristics. In this work, the same procedure has been applied for validating the performance of the algorithms. Output of the algorithms are verified in the terms of least and highest objective value, mean and standard deviation respectively. Experimental outputs and convergence performance of the metaheuristics are illustrated by Tables 2, 3 and 4  Experimental results and convergence graphs show that the IChoA method is giving the effective and highly accurate solutions on 29-CEC'2017 standard test suites as comparison than others. In addition, the results have been discussed in full details in the following subsections. Tables 2, 3 and 4. This subsection is split into different categories as firstly, the unimodal suites outputs denote the exploitation ability of the algorithms. Secondly, the various local optima are involved in multimodal suites which examine the ability of algorithms for many optima in the search space. Thirdly, the hybrid and composite test suites have been utilized to assess exploration ability of the algorithms.

Discussion on solutions of
Assessment of exploitation capability. Uni-modal test suites which involve only single global and these have been utilized for testing the exploitation phase. Experiments showed that the IChoA method has demonstrated superior exploitation ability as comparison than other recent metaheuristics. Results of Tables 2, 3 and 4, can be given strong evidence that the proposed technique is able to give the best and accurate solutions for all unimodal  www.nature.com/scientificreports/ suites than others. Simulated results prove that this modification and enhancement of ChoA method allowed the test suites to reach the optimum score. So here it can be concluded that the IChoA method can be found with the best optima score during the search process in the search space with strong exploitation behavior which could be implemented for complex issues that need to be addressed. As stated formerly, these suites are more compatible for evolutionary and benchmarking techniques. Experiments illustrate that the IChoA method is extremely functional. All simulations have proven that the  Balance between exploration and exploitation. Hybrid and Composite test suites which involve large numbers of global and local optima. Generally these suites are used for verifying the accuracy of the algorithms in local and global optima survivors and balance amid exploitation and exploration respectively. Experiments give strong evidence that the IChoA is able to create a strong balance between exploitation and detection. With this fact, we can say that during finding the best optima score in the search area which showed the strong exploration and exploitation behavior of the proposed method. This strategy helps to create a new best location for all chimps in the search area at each generation and chimps amend their own current locations to the best location or with superior fitness in many points of view that make it possible for IChOA algorithm to reach the best score. Numerical and Statistical measurements show the strong detection behavior of the IChoA method in finding the best global values in the complex space. Because in hybrid and composite test suites involves more complex space so highly exploration and exploitation behavior based methods are needed for finding the accurate and best solution for these kinds of issues. Experiments give strong proof that the IChoA leads to best global optima with the help of their best scan behavior. In addition, IChoA method involve a strong local optima avodance from which helps in finding best optima fastly.
Accuracy. In this subsection, we are discussing the statistical accuracy for the global optima score and performance of the proposed optimizer. The average value of each algorithm has been reported in Table 3. In Table 5, the average values have been illustrated into two different categories such as best (B) and worst (W) etc.These www.nature.com/scientificreports/ best and worst symbols have been assigned by the average values of Table 3. Normally the least average score shows the accuracy of the algorithm in finding the best optima in the search area. Results of Table 5, proof that the IChoA gives the least average value on maximum test suites as comparison than others. Hence it can be concluded that the IChOA method is able to provide the best or accurate solution for the complex suites than others.
Stability. In Fig. 2 the standard score of each method has been plotted. This graph has been plotted against the results of Table 4. If the standard score of algorithms lies near to zero this shows the stability of the algorithm for the optimal solutions of the given suites. In Table 4 and Fig. 2, it can be easily see that the IChoA is providing the least standard score at maximum test suites against the other methods. The least standard also shows the fast convergence speed of the algorithm for traps the optima in the search area. Hence the results of table and figure, gives the proof of the stability and fast convergence speed of the proposed method against others that the IChOA is able to trap the optima score fastly outperforms than others.
Convergence graphs analysis and discussion. The convergence performance graphs of algorithms are drawn against the number of the iterations and best solution so far etc and presented in Figs. 3, 4, 5, 6. Kindly keep in mind that the best optima that are obtained against every iteration which illustrated through the best solution so far. In Figs. 3, 4, 5, and 6, the x-axis denotes the number of iterations and y-axis illustrates the best solution found against each iteration during the search process. As per V.D. Berg et al. 40 ,this behaviour can guarantee that the evolutionary methods eventually touch to a target and find the local or global in a search domain. So, IChoA improves the fitness score for all chimps in a search area and assurance traps accurate targets for complex suites as iteration rises. Here can be said that this happens by this modification of the ChoA method. As each chimp travels from highest optima to lowest optima score, therefore with the hypothesis of growing in ChoA, the overall champs and their fitness values are amended against each iteration.
With this strategy we save the best score and apply these scores for finding the next best location for the entire swarm in the search area. Experiments and convergence graphs shows that the IChoA method is capable of giving the higher grantee finds the optima against the least number of iterations in a complex space as comparison to www.nature.com/scientificreports/ others. This behavior illustrates the fast convergence speed of the proposed method. So, the proposed strategy is to help the chimps for finding the better regions fastly of the complex suites.

Parameter settings of energy constraints problem (ECP)
To design WSN, clustering module and the routing module is discussed here for the proposed network architecture. Proposed architecture utilizes dynamic clustering algorithm with hierarchical cluster formation to achieve the energy efficient routing. To start with the designing of the network, initial network parameters are created and listed in Table 6.

Formulation of energy constraints problem
To support the data aggregation in WSN, the network nodes can be accommodated in the small groups called the Clusters. Clustering can be defined as the division of the nodes in the groups on the basis of some mechanism. Clustering is done to achieve the energy efficiency and the scalability of the network. Formation of the cluster also involves the assigning the role to the node on the basis of their perimeters. Optimal clustering has a strong influence on the performance of WSN. Data aggregation is enabled at CH in order to discard the unwanted and uncorrelated data, thus saving the sensor node energy. As just CHs have to continue the local route set-up, routing can be managed easily and so just small routing information is required, this again enhances the scalability of the network to a significant extent. As the SNs communicate only with their CHs, communication bandwidth is also conserved thus avoiding the exchange of redundant messages within themselves. The Energy constraint is a big challenging task in the field of WSNs. During these efforts we are trying to propose a new Low energy, routing and efficient scalable clustering protocol based on Metaheuristics in WSNs for improving the lifetime and enhancing the wireless sensor networks (WSNs) quality of service. In this proposed strategy has been taken new constants for optimizing the cluster heads selection. The proposed algorithm introduced various characteristics including energy, load on the node, weight of a node, scalability and balanced cluster respectively. Here the proposed method, gives the optimize path from the search agents of the cluster to the cluster head by selecting the most efficient path, going over sensors taking not as much of distance to attain  www.nature.com/scientificreports/ where n and e s i illustrates the number and energy of the node. We find the all nodes nearby the neighborhood or locality of the node S i . After that we are evaluated the distance separating these nodes and S i .At this stage a afresh constant is introduce such as weight (W).This parameter and constant is calculated by the following equ. (27) 41 ; where d is denotes the distance of the nodes and E S i and its neighbors respectively.
For creating the relationship amid the living and neighborhood nodes the following Eq. (28) has been applied 41 ; where N S i indicates the no's of neighbors of the node S and n denotes the no's of living nodes. After calculating the node's S s i the following leach Eq. (29) has been applied for verifying the solution 41 ; where p denotes the probability of cluster head in all round which is the ratio of the nodes and no's of cluster head. Further r and M are illustrated the recent round number and set of the nodes.
The lode of routed packets have been calculated by the following equation; where L i illustrates the load of i-th routed packets and R pk denotes the routed packets respectively. The fitness function has been illustrated by the Eq. (31).This function is developed by the above equations. On the basis of this function we are calculating the maximum weight and neighboring life of the node sensor S i etc.
On the basis of load function (30) has been derived the following new function for calculating the maximum load on the nodes; where E c,i and h c,i are denotes the energy and health of the nodes.
For intra-cluster distance has been applied the following Eq. (34). To most effective and well-organized networks converge this function must be needed to minimized. Since the least intra-cluster distance (ICD) shows the energy spent of each cluster for the communication of files or data 42 .  www.nature.com/scientificreports/ Here, this function have been applied for evaluating the total distance between sensor networks and cluster heads in the network. The scalability of the network has been evaluated through the following Eq. (36).This formulation shows the capability of the protocol to deliver the constant message facilities while density and size of network differs 42 .  www.nature.com/scientificreports/ The least distance between ICD and each cluster head shows the balance of the clustering. For this purpose the following mathematical formulation has been applied 42 ; where cd k denotes the average ICD of the network and c d illustrates the ID of kth cluster.
Finally, for the objective of achieving the energy well-organized network, balanced cluster and scalability development the following fitness function has been applied 42 .

Implementation
During this work, the proposed method has been implemented on the F 1 − F 5 functions to achieving the maximum weight, neighboring life of the node sensor, maximum load on the nodes, the energy well-organized network, balanced clustering and scalability develop respectively. The implementation steps of IChoA based cluster head selection has been illustrated through Algorithm 3;

Pseudocode of IChoA based cluster head selection algorithm.
The pseudocode of Improved Chimp Optimizer is reported in Algorithm 3.

Algorithm 3 Pseudo-code of IChoA based cluster head selection algorithm
Inputs: The set of sensor networks (S = {s 1 , s 2 , · · · , s N }),no's of cluster heads (K), crowd size (N ) and number of generations t Crowd Initialization Find x 1 ,x 2 ,x 3 and x 4 for w=1:nodes do for i=1 to N do Compute d st xi,j for all s k S end for Search min(d st xi,j ) and set as cluster head for the recent generation Amend x 1 ,x 2 ,x 3 and x 4 by equations(10)-(13) end for Amend x i−ChoA (n + 1) by equation (14) Amend R i (n) by equation (22) Modify neighborhood x i (n) with radius R i by equation (23) for d=1 to D do Modify multi-neighbors learning by equation (24) end for Choose best (x i−ChoA (n + 1), x i−DLH (n + 1)) by equation (25) Modify crowd end for Return the best output (37)

Simulation outputs and discussion
The routine of the clustering protocol is depending on the objective functions. The main objective of this work is to produce a good cluster in a least network area and poor clusters in a large network area. For obtaining this objective here we are implementing a various population based method such as GA 43 , ALO 44 , OBCA, Chimp 35 , SCA 36 . The performance of the energy efficient scalable clustering protocol (EESCP) in WSNs has been tested and verified by the various methods such as GA, OBCA, ALO, Chimp, SCA and IChoA respectively. The robustness of the algorithms have been verified in the terms of energy consumption, balanced clustering, network life, throughput, best least and highest fitness values etc. In the following subsections the brief explanation has been presented on the output solutions of the algorithms.
The communication plot for packet transmission is shown in Figs. 7 and 8 using F 2 and F 6 for randomly deployed sensor nodes and cluster heads.The sensor nodes for proposed network architecture are deployed with the initial parameters. The robustness of the algorithms has been verified in the terms of packet loss, energy consumption, balanced clustering, network lifetime, throughput, best least and highest fitness values etc. Figures 7 and 8 shows the plotting of various nodes and cluster heads. The CH from each cluster can be selected randomly with every iteration and is chosen particularly on runtime. The CH selection is done dynamically and performance is optimized using IChoA on the basis of residue energy on random basis. Also, Figs. 7 and 8 illustrate the plotting of the CH selection is done dynamically and performance is optimized using GA, ALO, SCA, OBCA and Chimp optimization metaheuristics on the basis of available node energy. Here the cluster head among each cluster can be selected in every iteration on the basis of residual energy and distance between the nodes. The coverage is calculated by using distance vector that routes packets in efficient manner. The sensed data by the sensors is transmitted between the source and the destination over the routes formed by coverage

Throughput of network.
Here the throughput of the network is verifying the total number of packets acknowledged at base station in its period. The solutions of the algorithms are reported in Table 7 and graphs illustrated by Fig. 9. In Table 7, we can easily see that the proposed method is able to provide the 98.6261 at F 2 and 97.7061 atF 6 maximum number of packets at base section in its period or lifetime as comparison to others. So it could be concluded that EESCP obtains more packets by proposed method than other clustering protocols.
Average time consumption. In this subsection, we are comparing the total time consumption of the algorithms between all the sensor networks and cluster heads of the network. Experimental results are illustrated in Table 8. And the average time consumption for the data transformation by all algorithms has been plotted by Fig. 10. In this Table 8 and Fig. 10, it can be easily seen that the proposed method has taken least time to transfer the data of the network per round as compared to other methods. So it can be concluded that the IChoA method is able to transfer the data of the network fastly as compared to others. And with the help of this strategy we can transfer the data of the network per round fastly.
Network lifetime. In the literature various methods are applied for measuring the lifetime of a network.
Under this work we are applying the various recent robust optimizers for evaluating the lifetime of the network. Numerical results of all the algorithms on F 2 and F 6 has been illustrated in Table 9. The lifetime graph of a net- www.nature.com/scientificreports/ work is reported by Fig. 11. The results and graphs show that the IChoA method gives the highest lifetime of the network as compared to others. So this strategy could help in increasing the lifetime of the network.
Packet loss. In this subsection, we are measuring the total packet loss during the transfer of data of one source to another source. The results of the table shows that the IChoA is able to transfer the highest data with the least number of packet loss. Experimental results and graphs of algorithms in Table 10 and Fig. 12 shows that the IChoA total packet loss is very less than other methods. Hence it can be concluded that the proposed method is able to give the strong network with least packet loss.
Energy consumption. In this phase, we are measuring the energy consumption of algorithms by all the sensor networks and cluster heads of the network per round. The results of the algorithms are reported in Table 11. And the energy consumption graphs of the algorithms are plotted by Fig. 13. Experimental results and graphs show that the proposed method is consuming the least energy during transfer of the data from one  www.nature.com/scientificreports/ source to another. However, the other methods consume huge energy as compared to the proposed method. So on the basis of the result of Table 11 and Fig. 13 it could be concluded that the proposed method is competent in transferring the data with a least consumption of energy.
Accuracy of outputs. Generally the least mean µ score represents the accuracy of the solutions which are obtained by the algorithms. Results of Tables 7, 8, 9, 10 and 11 give strong evidence that the proposed algorithm is finding the solutions with least average score as comparison than others. So, it could be concluded that the IChoA method is capable of providing the best and accurate solution of the issue of energy constraint.
Stability. The least standard score presents to the convergence speed and stability of the algorithms. Results of tables, shows that the proposed method is finding the best destination for energy constraint issues against the least standard score. Hence on the basis of obtained solutions we can conclude that the IChoA algorithm traps www.nature.com/scientificreports/ the destination fastly with at least time as comparison to others. Additionally, the least standard scores prove the stability of the proposed method for energy constraint issues.
Performance evaluation of IChoA with various existing algorithms. The simulated performance evaluation of the proposed IChoA algorithm for computing analysis of various parameters such as network lifetime, average execution time, packet loss energy consumption and throughput are provided by Table 12.
The performance in percentage is listed in Table 13 for various optimization algorithms in WSN. The result revealed that network lifetime of the proposed IChoA is improved 89% times as compared to existing optimization algorithms GA (18%), ALO (14%), OBCA (62%), Chimp (11%) and SCA (1%).
The proposed IChoA is using CH is selected with the less execution time only of the order of 1% in comparison to the other existing optimization algorithms GA (6%), ALO (9%), OBCA (3%), Chimp (41%) and SCA (64%). Also, the proposed IChoA algorithm consumes less time as compared with other approaches that leads  www.nature.com/scientificreports/ to increase in the network speed which in turn decreases the average computation time. The proposed IChoA provides only 1% times the packet loss that is appreciable for the network data aggregation as compared to existing optimization algorithms GA (5%), ALO (10%), OBCA (2%), Chimp (24%) and SCA (64%). The energy consumption for the proposed IChoA is very less as compared to the other simulated methods and enhances the longevity of the network by consuming only 1% of the energy as compared to the other existing optimization algorithms GA (26%), ALO (34%), OBCA (7%), Chimp (23%) and SCA (24%). The throughput for the proposed IChoA is very high as compared to the other simulated methods and the packets reach the destination node successfully with minimum delay to increase capacity of the network by providing only 89% of the throughput as compared to the other existing optimization algorithms GA (14%), ALO (17%), OBCA (69%), Chimp (17%) and SCA (10%). Summing up, all the efforts show that the IChoA method is able to tackle complex real suites and energy constraint issues. Hence, this strategy could be helpful for resolving the complex issues related to different domains of the different fields.  www.nature.com/scientificreports/  Figure 13. Energy consumption graphs of metaheuristics on functions F 2 and F 6 .

Conclusion
WSNs that proliferate various real world applications which can be serious such as surveillance of military or army battle field, health-care and face the task of restricted energy capacity. To resolve the issues of the energy constraint based on chimp optimizer, namely improved chimp optimizer (IChoA) is developed. This strategy has been introduced by integration of Chimp Optimizer and dimension learning based hunting (DLH). The DLH phase helps the ChoA algorithm for maintaining diversity and also improves the balance between exploitation and exploration.To evaluate the effectiveness of the proposed method, it has been tested on 29-CEC-2017 and issues of energy constraints. Accepting the accurate choice of modification, fitness functions and IChoA operations have controlled longer system operability and extreme data rate with least difficulty. All simulations prove that the robustness and performance of the IChOA is superior to other recent methods in terms of minimum and maximum objective function values, mean, average, energy consumption, loss packets, average time, throughput and network lifetime respectively. In future direction, the enhanced and hybrid optimizers will be introduced for complex energy constraints and engineering applications.

Data availability
The data that support the findings of this study are available from the corresponding author upon reasonable request.