{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:08:22Z","timestamp":1776917302813,"version":"3.51.2"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10776-024-00616-2","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:02:18Z","timestamp":1707156138000},"page":"121-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["ESND-FA: An Energy-Efficient Scheduled Based Node Deployment Approach Using Firefly Algorithm for Target Coverage in Wireless Sensor Networks"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6426-8853","authenticated-orcid":false,"given":"Kavita","family":"Jaiswal","sequence":"first","affiliation":[]},{"given":"Veena","family":"Anand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"issue":"4","key":"616_CR1","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11276-018-1792-2","volume":"25","author":"S Harizan","year":"2019","unstructured":"S. Harizan and P. Kuila, Coverage and connectivity aware energy efficient scheduling in target based wireless sensor networks: an improved genetic algorithm based approach, Wireless Networks., Vol. 25, No. 4, pp. 1995\u20132011, 2019.","journal-title":"Wireless Networks."},{"key":"616_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.comcom.2014.05.004","volume":"52","author":"AC Valera","year":"2014","unstructured":"A. C. Valera, W. S. Soh and H. P. Tan, Survey on wakeup scheduling for environmentally-powered wireless sensor networks, Computer Communications, Vol. 52, pp. 21\u201336, 2014.","journal-title":"Computer Communications"},{"issue":"2","key":"616_CR3","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/COMST.2017.2650979","volume":"19","author":"H Yetgin","year":"2017","unstructured":"H. Yetgin, K. T. K. Cheung, M. El-Hajjar and L. H. Hanzo, A survey of network lifetime maximization techniques in wireless sensor networks, IEEE Communications Surveys & Tutorials, Vol. 19, No. 2, pp. 828\u2013854, 2017.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"616_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108167","volume":"165","author":"S Balaji","year":"2020","unstructured":"S. Balaji, M. Anitha, D. Rekha and D. Arivudainambi, Energy efficient target coverage for a wireless sensor network, Measurement, Vol. 165, 108167, 2020.","journal-title":"Measurement"},{"key":"616_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102037","volume":"98","author":"C Luo","year":"2020","unstructured":"C. Luo, Y. Hong, D. Li, Y. Wang, W. Chen and Q. Hu, Maximizing network lifetime using coverage sets scheduling in wireless sensor networks, Ad Hoc Networks, Vol. 98, 102037, 2020.","journal-title":"Ad Hoc Networks"},{"key":"616_CR6","doi-asserted-by":"crossref","unstructured":"C. C. Lai, C. K. Ting and R. S. Ko, \"An effective genetic algorithm to improve wireless sensor network lifetime for large-scale surveillance applications,\" in: IEEE, 2007, pp. 3531\u20133538.","DOI":"10.1109\/CEC.2007.4424930"},{"issue":"3","key":"616_CR7","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11276-005-6615-6","volume":"11","author":"M Cardei","year":"2005","unstructured":"M. Cardei and D. Z. Du, Improving wireless sensor network lifetime through power aware organization, Wireless Networks, Vol. 11, No. 3, pp. 333\u2013340, 2005.","journal-title":"Wireless Networks"},{"issue":"3","key":"616_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1504\/IJSNET.2008.018484","volume":"3","author":"I Cardei","year":"2008","unstructured":"I. Cardei and M. Cardei, Energy-efficient connected-coverage in wireless sensor networks, International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201\u2013210, 2008.","journal-title":"International Journal of Sensor Networks"},{"issue":"5","key":"616_CR9","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1016\/j.jnca.2012.03.004","volume":"35","author":"AM Zungeru","year":"2012","unstructured":"A. M. Zungeru, L. M. Ang and K. P. Seng, Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison, Journal of Network and Computer Applications, Vol. 35, No. 5, pp. 1508\u20131536, 2012.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"616_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1504\/IJSI.2013.055801","volume":"1","author":"XS Yang","year":"2013","unstructured":"X. S. Yang and X. He, Firefly algorithm: recent advances and applications, International Journal of Swarm Intelligence, Vol. 1, No. 1, pp. 36\u201350, 2013.","journal-title":"International Journal of Swarm Intelligence"},{"key":"616_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jpdc.2020.02.010","volume":"142","author":"RM Swarna Priya","year":"2020","unstructured":"R. M. Swarna Priya, S. Bhattacharya, P. K. R. Maddikunta, et al., Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything, Journal of Parallel and Distributed Computing, Vol. 142, pp. 16\u201326, 2020.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"616_CR12","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.jnca.2011.11.016","volume":"35","author":"C Zhu","year":"2012","unstructured":"C. Zhu, C. Zheng, L. Shu and G. Han, A survey on coverage and connectivity issues in wireless sensor networks, Journal of Network and Computer Applications, Vol. 35, pp. 619\u2013632, 2012.","journal-title":"Journal of Network and Computer Applications"},{"key":"616_CR13","doi-asserted-by":"crossref","unstructured":"S. Harizan and P. Kuila, \"Nature-inspired algorithms for k-coverage and m-connectivity problems in wireless sensor networks,\" in: Springer, 2020, pp. 281\u2013301.","DOI":"10.1007\/978-981-13-9574-1_12"},{"issue":"6","key":"616_CR14","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11276-016-1262-7","volume":"23","author":"C Jehan","year":"2017","unstructured":"C. Jehan and D. S. Punithavathani, Potential position node placement approach via oppositional gravitational search for fulfill coverage and connectivity in target based wireless sensor networks, Wireless Networks, Vol. 23, No. 6, pp. 1875\u20131888, 2017.","journal-title":"Wireless Networks"},{"key":"616_CR15","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.compeleceng.2015.11.009","volume":"56","author":"SK Gupta","year":"2016","unstructured":"S. K. Gupta, P. Kuila and P. K. Jana, Genetic algorithm approach for k-coverage and m-connected node placement in target based wireless sensor networks, Computers & Electrical Engineering, Vol. 56, pp. 544\u2013556, 2016.","journal-title":"Computers & Electrical Engineering"},{"key":"616_CR16","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.jnca.2013.07.010","volume":"39","author":"X Liu","year":"2014","unstructured":"X. Liu and D. He, Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks, Journal of Network and Computer Applications, Vol. 39, pp. 310\u2013318, 2014.","journal-title":"Journal of Network and Computer Applications"},{"key":"616_CR17","doi-asserted-by":"crossref","unstructured":"S. Harizan and P. Kuila, A novel NSGA-II for coverage and connectivity aware sensor node scheduling in industrial wireless sensor networks. Digital Signal Processing, p. 102753, 2020.","DOI":"10.1016\/j.dsp.2020.102753"},{"key":"616_CR18","doi-asserted-by":"crossref","unstructured":"A. J. Perez, \"M-SPOT: A hybrid multiobjective evolutionary algorithm for node placement in wireless sensor networks,\" in: IEEE, 2018, pp. 264\u2013269.","DOI":"10.1109\/WAINA.2018.00096"},{"issue":"2","key":"616_CR19","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s11277-012-0885-y","volume":"71","author":"H Mostafaei","year":"2013","unstructured":"H. Mostafaei and M. R. Meybodi, Maximizing lifetime of target coverage in wireless sensor networks using learning automata, Wireless Personal Communications, Vol. 71, No. 2, pp. 1461\u20131477, 2013.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"616_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.3390\/s16010104","volume":"16","author":"J Yu","year":"2016","unstructured":"J. Yu, Y. Chen, L. Ma, B. Huang and X. Cheng, On connected target k-coverage in heterogeneous wireless sensor networks, Sensors, Vol. 16, No. 1, pp. 104, 2016.","journal-title":"Sensors"},{"issue":"06","key":"616_CR21","doi-asserted-by":"publisher","first-page":"1950094","DOI":"10.1142\/S0218126619500944","volume":"28","author":"P Vishal","year":"2019","unstructured":"P. Vishal and A. Ramesh Babu, Firefly algorithm for intelligent context-aware sensor deployment problem in wireless sensor network, Journal of Circuits, Systems and Computers, Vol. 28, No. 06, pp. 1950094, 2019.","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"1","key":"616_CR22","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s40031-020-00516-y","volume":"102","author":"AN Rao","year":"2021","unstructured":"A. N. Rao, R. Naik and N. Devi, On maximizing the coverage and network lifetime in wireless sensor networks through multi-objective metaheuristics, Journal of the Institution of Engineers (India) Series B, Vol. 102, No. 1, pp. 111\u2013122, 2021.","journal-title":"Journal of the Institution of Engineers (India) Series B"},{"issue":"5","key":"616_CR23","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1049\/iet-com.2018.5329","volume":"13","author":"NN Dezfuli","year":"2019","unstructured":"N. N. Dezfuli and H. Barati, Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks, IET Communications, Vol. 13, No. 5, pp. 578\u2013584, 2019.","journal-title":"IET Communications"},{"key":"616_CR24","doi-asserted-by":"crossref","unstructured":"W. Liu, P. Li, Z. Ye and S. Yang, \u201cA node deployment optimization method of wireless sensor network based on firefly algorithm,\u201d in 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2021, pp. 167\u2013170.","DOI":"10.1109\/AICT52120.2021.9628937"},{"key":"616_CR25","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jnca.2016.12.022","volume":"80","author":"H Mostafaei","year":"2017","unstructured":"H. Mostafaei, A. Montieri, V. Persico and A. Pescap\u00e9, A sleep scheduling approach based on learning automata for WSN partial coverage, Journal of Network and Computer Applications, Vol. 80, pp. 67\u201378, 2017.","journal-title":"Journal of Network and Computer Applications"},{"key":"616_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105939","volume":"86","author":"HTT Binh","year":"2020","unstructured":"H. T. T. Binh, N. T. Hanh, N. D. Nghia, N. Dey, et al., Metaheuristics for maximization of obstacles constrained area coverage in heterogeneous wireless sensor networks, Applied Soft Computing, Vol. 86, 105939, 2020.","journal-title":"Applied Soft Computing"},{"issue":"3","key":"616_CR27","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/JSEN.2016.2633409","volume":"17","author":"O Moh\u2019d Alia","year":"2016","unstructured":"O. Moh\u2019d Alia and A. Al-Ajouri, Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm, IEEE Sensors Journal, Vol. 17, No. 3, pp. 882\u2013896, 2016.","journal-title":"IEEE Sensors Journal"},{"key":"616_CR28","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cor.2014.11.002","volume":"59","author":"M Rebai","year":"2015","unstructured":"M. Rebai, H. Snoussi, F. Hnaien, L. Khoukhi, et al., Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks, Computers & Operations Research, Vol. 59, pp. 11\u201321, 2015.","journal-title":"Computers & Operations Research"},{"issue":"1","key":"616_CR29","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TII.2013.2250910","volume":"10","author":"D Zhang","year":"2013","unstructured":"D. Zhang, G. Li, K. Zheng, X. Ming and Z.-H. Pan, An energy-balanced routing method based on forward-aware factor for wireless sensor networks, IEEE Transactions on Industrial Informatics, Vol. 10, No. 1, pp. 766\u2013773, 2013.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"616_CR30","doi-asserted-by":"publisher","first-page":"7313","DOI":"10.1007\/s00500-016-2270-3","volume":"21","author":"D Zhang","year":"2017","unstructured":"D. Zhang, H. Niu and S. Liu, Novel PEECR-based clustering routing approach, Soft Computing, Vol. 21, pp. 7313\u20137323, 2017.","journal-title":"Soft Computing"},{"issue":"5","key":"616_CR31","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1007\/s10489-018-1368-y","volume":"49","author":"D Zhang","year":"2019","unstructured":"D. Zhang, T. Zhang and X. Liu, Novel self-adaptive routing service algorithm for application in vanet, Applied Intelligence, Vol. 49, No. 5, pp. 1866\u20131879, 2019.","journal-title":"Applied Intelligence"},{"issue":"4","key":"616_CR32","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TSC.2014.2370642","volume":"7","author":"D Zhang","year":"2014","unstructured":"D. Zhang, X. Wang, X. Song and D. Zhao, A novel approach to mapped correlation of id for RFID anti-collision, IEEE Transactions on Services Computing, Vol. 7, No. 4, pp. 741\u2013748, 2014.","journal-title":"IEEE Transactions on Services Computing"},{"key":"616_CR33","doi-asserted-by":"crossref","unstructured":"L. Chen, D.-g. Zhang, J. Zhang, T. Zhang, J.-y. Du and H.-r. Fan, An approach of flow compensation incentive based on q-learning strategy for IoT user privacy protection. AEU-International Journal of Electronics and Communications, p. 154172, 2022.","DOI":"10.1016\/j.aeue.2022.154172"},{"issue":"3","key":"616_CR34","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TWC.2019.2897296","volume":"18","author":"J Yang","year":"2019","unstructured":"J. Yang, M. Ding, G. Mao, Z. Lin, D.-G. Zhang and T. H. Luan, Optimal base station antenna down tilt in downlink cellular networks, IEEE Transactions on Wireless Communications, Vol. 18, No. 3, pp. 1779\u20131791, 2019.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"616_CR35","doi-asserted-by":"publisher","first-page":"158-514","DOI":"10.1109\/ACCESS.2019.2950266","volume":"7","author":"D-G Zhang","year":"2019","unstructured":"D.-G. Zhang, P.-Z. Zhao, Y.-Y. Cui, L. Chen, T. Zhang and H. Wu, A new method of mobile ad hoc network routing based on greed forwarding improvement strategy, IEEE Access, Vol. 7, pp. 158-514\u2013158-524, 2019.","journal-title":"IEEE Access"},{"issue":"4","key":"616_CR36","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","volume":"20","author":"D Zhang","year":"2018","unstructured":"D. Zhang, H. Ge, T. Zhang, Y.-Y. Cui, X. Liu and G. Mao, New multi-hop clustering algorithm for vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, Vol. 20, No. 4, pp. 1517\u20131530, 2018.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"2","key":"616_CR37","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TVT.2017.2753772","volume":"67","author":"J Chen","year":"2017","unstructured":"J. Chen, G. Mao, C. Li, W. Liang and D.-G. Zhang, Capacity of cooperative vehicular networks with infrastructure support: Multiuser case, IEEE Transactions on Vehicular Technology, Vol. 67, No. 2, pp. 1546\u20131560, 2017.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"616_CR38","doi-asserted-by":"crossref","unstructured":"D. Zhang, L. Cao, H. Zhu, T. Zhang, J. Du and K. Jiang, Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. Cluster Computing, pp. 1\u201313, 2022.","DOI":"10.1007\/s10586-021-03532-9"},{"key":"616_CR39","doi-asserted-by":"crossref","unstructured":"R. Su, Y. Huang, D.-g. Zhang, G. Xiao and L. Wei, Srdfm: Siamese response deep factorization machine to improve anti-cancer drug recommendation. Briefings in Bioinformatics, 2022.","DOI":"10.1093\/bib\/bbab534"},{"key":"616_CR40","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2021.11.012","volume":"183","author":"D-G Zhang","year":"2022","unstructured":"D.-G. Zhang, C.-H. Ni, J. Zhang, T. Zhang, P. Yang, J.-X. Wang and H.-R. Yan, A novel edge computing architecture based on adaptive stratified sampling, Computer Communications, Vol. 183, pp. 121\u2013135, 2022.","journal-title":"Computer Communications"},{"key":"616_CR41","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.neucom.2020.09.042","volume":"420","author":"T Zhang","year":"2021","unstructured":"T. Zhang, D.-G. Zhang, H.-R. Yan, J.-N. Qiu and J.-X. Gao, A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle, Neurocomputing, Vol. 420, pp. 98\u2013110, 2021.","journal-title":"Neurocomputing"},{"key":"616_CR42","doi-asserted-by":"crossref","unstructured":"M. Kaur, A. Singh, S. Verma, N. Jhanjhi, M. Talib, et al., \"Fanet: Efficient routing in flying ad hoc networks (fanets) using firefly algorithm,\" in: Intelligent Computing and Innovation on Data Science, pp. 483\u2013490, Springer, 2021.","DOI":"10.1007\/978-981-16-3153-5_51"},{"key":"616_CR43","doi-asserted-by":"publisher","first-page":"48-185","DOI":"10.1109\/ACCESS.2021.3060549","volume":"9","author":"S Verma","year":"2021","unstructured":"S. Verma, S. Kaur, D. B. Rawat, C. Xi, L. T. Alex and N. Z. Jhanjhi, Intelligent framework using IoT-based WSNs for wildfire detection, IEEE Access, Vol. 9, pp. 48-185\u201348-196, 2021.","journal-title":"IEEE Access"},{"issue":"4","key":"616_CR44","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1007\/s11276-021-02624-z","volume":"27","author":"D Zhang","year":"2021","unstructured":"D. Zhang, C. Gong, T. Zhang, J. Zhang and M. Piao, A new algorithm of clustering AODV based on edge computing strategy in IOV, Wireless Networks, Vol. 27, No. 4, pp. 2891\u20132908, 2021.","journal-title":"Wireless Networks"},{"key":"616_CR45","doi-asserted-by":"publisher","first-page":"69-058","DOI":"10.1109\/ACCESS.2020.2986078","volume":"8","author":"D-G Zhang","year":"2020","unstructured":"D.-G. Zhang, L. Chen, J. Zhang, J. Chen, T. Zhang, Y.-M. Tang and J.-N. Qiu, A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing, IEEE Access, Vol. 8, pp. 69-058\u2013069-071, 2020.","journal-title":"IEEE Access"},{"issue":"1","key":"616_CR46","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TITS.2018.2889746","volume":"21","author":"J Chen","year":"2019","unstructured":"J. Chen, G. Mao, C. Li and D. Zhang, A topological approach to secure message dissemination in vehicular networks, IEEE Transactions on Intelligent Transportation Systems, Vol. 21, No. 1, pp. 135\u2013148, 2019.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"616_CR47","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.comcom.2020.01.024","volume":"151","author":"S Liu","year":"2020","unstructured":"S. Liu, D. Zhang, X. Liu, T. Zhang and H. Wu, Adaptive repair algorithm for tora routing protocol based on flood control strategy, Computer Communications, Vol. 151, pp. 437\u2013448, 2020.","journal-title":"Computer Communications"},{"key":"616_CR48","volume":"118","author":"Y Cui","year":"2020","unstructured":"Y. Cui, D. Zhang, T. Zhang, L. Chen, M. Piao and H. Zhu, Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices, AEU\u2013International Journal of Electronics and Communications, Vol. 118, 153134, 2020.","journal-title":"AEU\u2013International Journal of Electronics and Communications"},{"issue":"12","key":"616_CR49","doi-asserted-by":"publisher","first-page":"9015","DOI":"10.1007\/s10489-021-02303-8","volume":"51","author":"X Liu","year":"2021","unstructured":"X. Liu, D. Zhang, T. Zhang, Y. Cui, L. Chen and S. Liu, Novel best path selection approach based on hybrid improved a* algorithm and reinforcement learning, Applied Intelligence, Vol. 51, No. 12, pp. 9015\u20139029, 2021.","journal-title":"Applied Intelligence"},{"key":"616_CR50","doi-asserted-by":"crossref","unstructured":"Y.-y. Cui, D.-g. Zhang, T. Zhang, J. Zhang and M. Piao, A novel offloading scheduling method for mobile application in mobile edge computing. Wireless Networks, pp. 1\u201319, 2022.","DOI":"10.1109\/WCNC49053.2021.9417286"},{"key":"616_CR51","volume":"126","author":"D Zhang","year":"2020","unstructured":"D. Zhang, M. Piao, T. Zhang, C. Chen and H. Zhu, New algorithm of multi-strategy channel allocation for edge computing, AEU-International Journal of Electronics and Communications, Vol. 126, 153372, 2020.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"616_CR52","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.asoc.2019.03.053","volume":"80","author":"D-G Zhang","year":"2019","unstructured":"D.-G. Zhang, Y.-Y. Cui and T. Zhang, New quantum-genetic based OLSR protocol (QG-OLSR) for mobile ad hoc network, Applied Soft Computing, Vol. 80, pp. 285\u2013296, 2019.","journal-title":"Applied Soft Computing"},{"key":"616_CR53","doi-asserted-by":"publisher","first-page":"21-343","DOI":"10.1109\/ACCESS.2019.2896699","volume":"7","author":"S Liu","year":"2019","unstructured":"S. Liu, D.-G. Zhang, X.-H. Liu, T. Zhang, J.-X. Gao, Y.-Y. Cui, et al., Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios, IEEE Access, Vol. 7, pp. 21-343\u201321-358, 2019.","journal-title":"IEEE Access"},{"key":"616_CR54","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","volume":"25","author":"D Zhang","year":"2019","unstructured":"D. Zhang, J. Gao, X. Liu, T. Zhang and D. Zhao, Novel approach of distributed & adaptive trust metrics for MANET, Wireless Networks, Vol. 25, pp. 3587\u20133603, 2019.","journal-title":"Wireless Networks"},{"key":"616_CR55","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1109\/TITS.2018.2873137","volume":"20","author":"P Duan","year":"2018","unstructured":"P. Duan, G. Mao, W. Liang and D. Zhang, A unified Spatio-temporal model for short-term traffic flow prediction, IEEE Transactions o Intelligent Transportation Systems, Vol. 20, pp. 3212\u20133223, 2018.","journal-title":"IEEE Transactions o Intelligent Transportation Systems"},{"key":"616_CR56","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1007\/s11036-017-0878-x","volume":"23","author":"D Zhang","year":"2018","unstructured":"D. Zhang, S. Zhou and Y. Tang, A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy, Mobile Networks and Applications, Vol. 23, pp. 828\u2013839, 2018.","journal-title":"Mobile Networks and Applications"},{"key":"616_CR57","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3824","volume":"31","author":"D Zhang","year":"2018","unstructured":"D. Zhang, S. Liu, X. Liu, T. Zhang and Y. Cui, Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO), International Journal Of Communication Systems, Vol. 31, e3824, 2018.","journal-title":"International Journal Of Communication Systems"},{"key":"616_CR58","doi-asserted-by":"publisher","first-page":"126913","DOI":"10.1109\/ACCESS.2019.2939423","volume":"7","author":"X Liu","year":"2019","unstructured":"X. Liu, D. Zhang, H. Yan, Y. Cui and L. Chen, A new algorithm of the best path selection based on machine learning, IEEE Access, Vol. 7, pp. 126913\u2013126928, 2019.","journal-title":"IEEE Access"},{"key":"616_CR59","doi-asserted-by":"publisher","first-page":"82571","DOI":"10.1109\/ACCESS.2019.2921310","volume":"7","author":"T Zhang","year":"2019","unstructured":"T. Zhang, D. Zhang, J. Qiu, X. Zhang, P. Zhao and C. Gong, A kind of novel method of power allocation with limited cross-tier interference for CRN, IEEE Access, Vol. 7, pp. 82571\u201382583, 2019.","journal-title":"IEEE Access"},{"key":"616_CR60","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1007\/s11276-019-02216-y","volume":"26","author":"D Zhang","year":"2020","unstructured":"D. Zhang, H. Wu, P. Zhao, X. Liu, Y. Cui, L. Chen and T. Zhang, New approach of multi-path reliable transmission for marginal wireless sensor network, Wireless Networks, Vol. 26, pp. 1503\u20131517, 2020.","journal-title":"Wireless Networks"},{"key":"616_CR61","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s11036-018-1123-y","volume":"26","author":"D Zhang","year":"2021","unstructured":"D. Zhang, C. Chen, Y. Cui and T. Zhang, New method of energy efficient subcarrier allocation based on evolutionary game theory, Mobile Networks and Applications, Vol. 26, pp. 523\u2013536, 2021.","journal-title":"Mobile Networks and Applications"},{"key":"616_CR62","doi-asserted-by":"publisher","first-page":"4203","DOI":"10.1007\/s10586-022-03635-x","volume":"25","author":"J Zhang","year":"2022","unstructured":"J. Zhang, M. Piao, D. Zhang, T. Zhang and W. Dong, An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G, Cluster Computing, Vol. 25, pp. 4203\u20134219, 2022.","journal-title":"Cluster Computing"},{"key":"616_CR63","doi-asserted-by":"crossref","unstructured":"D. Zhang, J. Wang, J. Zhang, T. Zhang, C. Yang and K. Jiang, A new method of fuzzy multicriteria routing in vehicle ad hoc network. IEEE Transactions on Computational Social Systems, 2022.","DOI":"10.1109\/TCSS.2022.3193739"},{"key":"616_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103012","volume":"138","author":"Z Degan","year":"2023","unstructured":"Z. Degan, W. Shuo, Z. Jie, Z. Haoli, Z. Ting and Z. Xiumei, A content distribution method of internet of vehicles based on edge cache and immune cloning strategy, Ad Hoc Networks, Vol. 138, 103012, 2023.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"616_CR65","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1007\/s10586-021-03235-1","volume":"24","author":"X Liu","year":"2021","unstructured":"X. Liu, D. Zhang, J. Zhang, T. Zhang and H. Zhu, A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm, Cluster Computing, Vol. 24, No. 3, pp. 1901\u20131915, 2021.","journal-title":"Cluster Computing"},{"key":"616_CR66","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s12083-018-0647-z","volume":"12","author":"M Huang","year":"2019","unstructured":"M. Huang, A. Liu, M. Zhao and T. Wang, Multi working sets alternate covering scheme for continuous partial coverage in WSNs, Peer-to-Peer Networking and Applications, Vol. 12, pp. 553\u2013567, 2019.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"616_CR67","first-page":"1","volume":"111","author":"K Jaiswal","year":"2019","unstructured":"K. Jaiswal and V. Anand, EOMR: An energy-efficient optimal multi-path routing protocol to improve QoS in wireless sensor network for IoT applications, Wireless Personal Communications, Vol. 111, pp. 1\u201323, 2019.","journal-title":"Wireless Personal Communications"},{"key":"616_CR68","doi-asserted-by":"crossref","unstructured":"M. R. Pillai and R. B. Jain, \"Application specific node deployment in WSN,\" in: 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN). IEEE, 2018, pp. 168\u2013172.","DOI":"10.1109\/GCWCN.2018.8668617"},{"key":"616_CR69","doi-asserted-by":"crossref","unstructured":"M. S. Ghahroudi, A. Shahrabi and T. Boutaleb, \"A smart self-organizing node deployment algorithm in wireless sensor networks,\" in: 2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 17\u201323. IEEE, 2019.","DOI":"10.23919\/WONS.2019.8795451"},{"issue":"9","key":"616_CR70","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","volume":"91","author":"A Konak","year":"2006","unstructured":"A. Konak, D. W. Coit and A. E. Smith, Multi-objective optimization using genetic algorithms: A tutorial, Reliability Engineering & System Safety, Vol. 91, No. 9, pp. 992\u20131007, 2006.","journal-title":"Reliability Engineering & System Safety"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-024-00616-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10776-024-00616-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-024-00616-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T13:36:40Z","timestamp":1731245800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10776-024-00616-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,5]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s10776-024-00616-2","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,5]]},"assertion":[{"value":"30 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}