2010
DOI: 10.1109/tevc.2010.2040182
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Genetic Algorithm Using a Forward Encoding Scheme for Lifetime Maximization of Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
90
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 117 publications
(90 citation statements)
references
References 42 publications
0
90
0
Order By: Relevance
“…A redundant rate represents the density of sensors deployed in the target area. The redundant rate in the 2D ideal plane model is computed as (6) according to [39], where area(Γ) is the area of Γ and N is the number of sensors.…”
Section: Critical Parametersmentioning
confidence: 99%
See 2 more Smart Citations
“…A redundant rate represents the density of sensors deployed in the target area. The redundant rate in the 2D ideal plane model is computed as (6) according to [39], where area(Γ) is the area of Γ and N is the number of sensors.…”
Section: Critical Parametersmentioning
confidence: 99%
“…Lai et al [38] propose a GA for maximum disjoint set covers (GAMDSC), which applies a scattering operator to the EA offspring to keep critical sensors from joining the same cover set. Hu et al [39] propose a schedule transition hybridized genetic algorithm (STHGA), which adopts a forward encoding scheme for chromosomes and utilizes redundancy information via designing a series of transition operations. Ant-colony optimization for maximizing the number of connected cover (ACO-MNCC) is proposed in [40], which maximizes the lifetime of heterogeneous WSNs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…They are not sensed or covered by any nodes [18]. The irregularity of the blind zones is analyzed by using the mobile nodes.…”
Section: B Coverage Optimization Strategy Based On Mobile Nodesmentioning
confidence: 99%
“…Death of central point is the end of the system. In contrast to it, decentralized architecture needs powerful autonomous entities on one hand, and [44], fault detection [45], self-con�guration [46] Arti�cial immune network [34] Immune system [47] Misbehavior detection [48], image pattern recognition [49] Genetic algorithm [35] Natural evolution system Dynamic shortest path routing [50], lifetime maximization [51] Cellular automata [29] Life Life like/ game of life Large network simulations [52], area coverage scheme [53] Rendering (computer graphics) [30] Patterns of animal skins, birds feathers, mollusk shells, and bacterial colonies [54] Range-free localization [55] Fractal geometry Clouds, river networks, snow�akes, cauli�ower or broccoli, and systems of blood vessels and pulmonary vessels, ocean waves Antenna designing [56] Communication networks and protocols Epidemiology Cross-layer communication protocol [57,58] [61], target tracking [62] then it also re�ects the behavior of adaptation (�exible to changing environment), self-assembly (unit to be one), selforganizing (interaction for the one), and self-regulation, (keeping the process tunably smooth) [25] as in WSN due to the distributed knowledge, distributed control and scalable properties on the other hand. Although the architecture is application dependent, decentralized system has variety of advantages over the centralized system.…”
Section: � �Rom �Eal To �Rti��ialmentioning
confidence: 99%