{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T13:18:53Z","timestamp":1722950333089},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s00500-019-03789-8","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T21:46:21Z","timestamp":1548366381000},"page":"2789-2798","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A hybrid genetic artificial neural network (G-ANN) algorithm for optimization of energy component in a wireless mesh network toward green computing"],"prefix":"10.1007","volume":"23","author":[{"given":"B.","family":"Prakash","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Jayashri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T. S.","family":"Karthik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"3789_CR2","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/72.286889","volume":"4","author":"M Ali","year":"1993","unstructured":"Ali M, Kamoun F (1993) Neural networks for shortest path computation and routing in computer networks. IEEE Trans Neural Netw 4:941\u2013953","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"3789_CR3","first-page":"416","volume":"5","author":"M Bheemalingaiah","year":"2009","unstructured":"Bheemalingaiah M, Naidu MM, Rao DS, Varaprasad G (2009) Energy aware node disjoint multipath routing in mobile ad-hoc network. J Theor Appl Inf Technol 5(4):416\u2013419","journal-title":"J Theor Appl Inf Technol"},{"key":"3789_CR4","doi-asserted-by":"publisher","first-page":"6869","DOI":"10.3390\/s90906869","volume":"9","author":"C Buratti","year":"2009","unstructured":"Buratti C, Conti A, Dardari D, Verdone R (2009) An overview on wireless sensor networks technology and evolution. Sensors 9:6869\u20136896","journal-title":"Sensors"},{"key":"3789_CR5","unstructured":"Cardei M, Cheng MX, Cheng X, Du D-Z (2002) Connected domination in ad hoc wireless networks. In: Proceedings of the sixth international conference on computer science and informatics"},{"key":"3789_CR6","volume-title":"Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks","author":"B Chen","year":"2002","unstructured":"Chen B, Jamieson K, Balakrishnan H, Morris R (2002) Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Kluwer Academic Publishers, Dordrecht"},{"key":"3789_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cie.2016.08.028","volume":"101","author":"RM Curry","year":"2016","unstructured":"Curry RM, Smith JC (2016) A survey of optimization algorithms for wireless sensor network lifetime maximization. J Comput Ind Eng 101:145\u2013166","journal-title":"J Comput Ind Eng"},{"issue":"11","key":"3789_CR8","first-page":"1","volume":"96","author":"MR Girgis","year":"2014","unstructured":"Girgis MR, Mahmoud TM, Abdullatif BA, Rabie A (2014) Solving the wireless mesh network design problem using genetic algorithm and simulated annealing optimization methods. Int J Comput Appl 96(11):1\u201310","journal-title":"Int J Comput Appl"},{"issue":"2","key":"3789_CR9","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.jnca.2010.03.026","volume":"34","author":"RL Gomes","year":"2011","unstructured":"Gomes RL, Junior WM, Cerqueira E, Abelem AJ (2011) Using fuzzy link cost and dynamic choice of link quality metrics to achieve QoS and QoE in wireless mesh networks. J Netw Comput Appl 34(2):506\u2013516","journal-title":"J Netw Comput Appl"},{"key":"3789_CR10","doi-asserted-by":"crossref","unstructured":"He B, Xie B, Agrawal DP (2007) Optimizing the internet gateway deployment in a wireless mesh network. In: Mobile adhoc and sensor systems, pp 1\u20139","DOI":"10.1109\/MOBHOC.2007.4428603"},{"key":"3789_CR11","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1016\/j.camwa.2008.10.037","volume":"57","author":"J Jie","year":"2009","unstructured":"Jie J, Chen J, Chang G, Wen Y, Song J (2009) Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius. Comput Math Appl 57:1767\u20131775","journal-title":"Comput Math Appl"},{"issue":"4","key":"3789_CR12","doi-asserted-by":"publisher","first-page":"5603","DOI":"10.1007\/s11277-017-4436-4","volume":"96","author":"P Jyothirmai","year":"2017","unstructured":"Jyothirmai P, Raj JS, Smys S (2017) Secured self organizing network architecture in wireless personal networks. Wirel Pers Commun 96(4):5603\u20135620","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"3789_CR13","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/s11276-012-0438-z","volume":"18","author":"D Karaboga","year":"2012","unstructured":"Karaboga D, Okdem S, Ozturk C (2012) Cluster based wireless sensor network routing using artificial bee colony algorithm. Wirel Netw 18(7):847\u2013860","journal-title":"Wirel Netw"},{"issue":"11","key":"3789_CR14","doi-asserted-by":"publisher","first-page":"1984","DOI":"10.1109\/JSAC.2006.881637","volume":"24","author":"CE Koksal","year":"2006","unstructured":"Koksal CE, Balakrishnan H (2006) Quality-aware routing metrics for time-varying wireless mesh networks. IEEE J Sel Areas Commun 24(11):1984\u20131994","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"3789_CR15","first-page":"45","volume":"2","author":"N Kumar","year":"2010","unstructured":"Kumar N, Kumar M, Patel RB (2010) Coverage and connectivity aware neural network based energy efficient routing in wireless sensor networks. J Appl Graph Theory Wirel Ad Hoc Netw Sens Netw 2(1):45\u201360","journal-title":"J Appl Graph Theory Wirel Ad Hoc Netw Sens Netw"},{"issue":"3","key":"3789_CR16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11277-006-9149-z","volume":"41","author":"L Liu","year":"2007","unstructured":"Liu L, Feng G (2007) Simulated annealing based multi-constrained QoS routing in mobile ad hoc networks. Wirel Pers Commun 41(3):393\u2013405","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"3789_CR17","first-page":"428","volume":"29","author":"A More","year":"2017","unstructured":"More A, Raisinghani V (2017) A survey on energy efficient coverage protocols in wireless sensor networks. J Comput Inf Sci 29(4):428\u2013448","journal-title":"J Comput Inf Sci"},{"key":"3789_CR18","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-81-322-0487-9_60","volume":"130","author":"R Narendran","year":"2012","unstructured":"Narendran R, Mala C (2012) Optimization of QoS parameters for channel allocation in cellular networks using soft computing techniques. Adv Intell Soft Comput 130:621\u2013631","journal-title":"Adv Intell Soft Comput"},{"key":"3789_CR19","unstructured":"Praveena A, Smys S (2016) Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 2016 10th International conference on intelligent systems and control (ISCO). IEEE, pp 1\u20136"},{"issue":"2","key":"3789_CR20","first-page":"13","volume":"3","author":"R Pries","year":"2010","unstructured":"Pries R, Staehle D, Staehle B, Tran-Gia P (2010) On optimization of wireless mesh networks using genetic algorithms. Int J Adv Internet Technol 3(2):13\u201328","journal-title":"Int J Adv Internet Technol"},{"key":"3789_CR21","first-page":"45","volume":"1","author":"S Sharma","year":"2014","unstructured":"Sharma S, Kumar S, Singh B (2014) Hybrid intelligent routing in wireless mesh networks: soft computing based approaches. Int J Intell Syst Appl 1:45\u201357","journal-title":"Int J Intell Syst Appl"},{"key":"3789_CR22","doi-asserted-by":"crossref","unstructured":"Smys S, Bala GJ, Raj JS (2010) Self-organizing hierarchical structure for wireless networks. In: 2010 International conference on advances in computer engineering (ACE). IEEE, pp 268\u2013270","DOI":"10.1109\/ACE.2010.11"},{"key":"3789_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11036-011-0316-4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang X, Vasilakos AV, Chen M, Liu Y, Kwon TT (2012) A survey of green mobile networks: opportunities and challenges. Mob Netw Appl 17:4\u201320","journal-title":"Mob Netw Appl"},{"key":"3789_CR24","unstructured":"Yie W, Heidemann J, Estrin D (2002) An energy-efficient MAC protocol for wireless sensor networks. In: Proceedings of the 21st annual joint conference of the IEEE computer and communications societies (INFOCOM), New York, USA, pp 1567\u20131576"},{"key":"3789_CR25","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.comnet.2013.08.021","volume":"58","author":"M Younis","year":"2014","unstructured":"Younis M, Senturk IF, Akkaya K, Lee S, Senel F (2014) Topology management techniques for tolerating node failures in wireless sensor networks: a survey. Comput Netw 58:254\u2013283","journal-title":"Comput Netw"},{"key":"3789_CR26","doi-asserted-by":"publisher","first-page":"675","DOI":"10.3390\/jsan2040675","volume":"2","author":"N Zhu","year":"2013","unstructured":"Zhu N, O\u2019Connor I (2013) iMASKO: a genetic algorithm based optimization framework for wireless sensor networks. J Sens Actuator Netw 2:675\u2013699","journal-title":"J Sens Actuator Netw"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03789-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03789-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03789-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T00:14:08Z","timestamp":1579824848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03789-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["3789"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03789-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,24]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}