2019
DOI: 10.1016/j.ins.2019.02.059
|View full text |Cite
|
Sign up to set email alerts
|

An efficient genetic algorithm for maximizing area coverage in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(55 citation statements)
references
References 15 publications
0
55
0
Order By: Relevance
“…Similarly, PSO and FFA have been applied in model identification of MRE devices [33,48]. Among existing methods, the GA is the most commonly used due to its benefits of easy coding and fast convergence [49,50]. Accordingly, in this study, it is selected to solve the optimization problem for model parameter identification of the MRE device.…”
Section: Modeling Results and Discussionmentioning
confidence: 99%
“…Similarly, PSO and FFA have been applied in model identification of MRE devices [33,48]. Among existing methods, the GA is the most commonly used due to its benefits of easy coding and fast convergence [49,50]. Accordingly, in this study, it is selected to solve the optimization problem for model parameter identification of the MRE device.…”
Section: Modeling Results and Discussionmentioning
confidence: 99%
“…In KDD Cup 99 data set, there are 41 features that represent the variables used in a computer network [12]. The process of analyzing these all variables is time consuming and requires a large-scale computational steps.…”
Section: Separate Data Set Into Training and Testing Data Setmentioning
confidence: 99%
“…In this paper, intrusion detection technique based on metaheuristic approach known as Genetic Algorithm was developed in order to be applied in a computer network. The method will identify and calculate the differences between the behaviour of the unauthorized connection and normal connection using a proposed fitness (objective) function [12,13]. The proposed technique was executed in two phases; training and testing.…”
Section: Introductionmentioning
confidence: 99%
“…This study primarily focuses on developing a system that can detect the occurrence of unauthorized activity in a computer network and from the intrusion connections detected the type of the attack will be identified. These detection and identification processes were mainly modelled based on metaheuristic approach which is Genetic Algorithm (GA) [5][6]. This algorithm alone is a powerful method in optimization area.…”
Section: Introductionmentioning
confidence: 99%