Fig. 3From: An efficient quality of services based wireless sensor network for anomaly detection using soft computing approachesStep by step representation of Sub-cluster LEACH-LMNN protocolBack to article page