{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T16:24:32Z","timestamp":1769358272536,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T00:00:00Z","timestamp":1629590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T00:00:00Z","timestamp":1629590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11277-021-08935-w","type":"journal-article","created":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T10:02:38Z","timestamp":1629626558000},"page":"963-979","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Meta-Heuristic Based Approach with Modified Mutation Operation For Heterogeneous Networks"],"prefix":"10.1007","volume":"122","author":[{"family":"Manju","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,8,22]]},"reference":[{"issue":"1","key":"8935_CR1","first-page":"41","volume":"20","author":"PS Mehra","year":"2019","unstructured":"Mehra, P. S., Doja, M. N., & Alam, B. (2019). Enhanced clustering algorithm based on fuzzy logic (E-CAFL) for WSN. Scalable Computing: Practice and Experience, 20(1), 41\u201354.","journal-title":"Scalable Computing: Practice and Experience"},{"issue":"4","key":"8935_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1504\/IJAACS.2017.10009671","volume":"10","author":"S Mahfoudh","year":"2017","unstructured":"Mahfoudh, S., Minet, P., Laouiti, A., & Khoufi, I. (2017). Survey of deployment algorithms in wireless sensor networks: Coverage and connectivity issues and challenges. International Journal of Autonomous and Adaptive Communications Systems, 10(4), 341.","journal-title":"International Journal of Autonomous and Adaptive Communications Systems"},{"issue":"6","key":"8935_CR3","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1049\/iet-wss.2015.0094","volume":"6","author":"Manju","year":"2016","unstructured":"Manju, S. Chand, & B. Kumar. (2016). Maximizingnetworklifetimefortargetcoverage problem in wireless sensor networks. IET Wireless Sensor System, 6 (6), 192\u2013197.","journal-title":"IET Wireless Sensor System"},{"issue":"5","key":"8935_CR4","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-wss.2015.0017","volume":"6","author":"S Singh","year":"2016","unstructured":"Singh, S., Chand, S., Kumar, R., Kumar, B., & Malik, A. (2016). NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wireless Sensor System, 6(5), 151\u2013157.","journal-title":"IET Wireless Sensor System"},{"key":"8935_CR5","doi-asserted-by":"crossref","unstructured":"Manju, Samayveer Singh, Sandeep Kumar, Anand Nayyar, Fadi Al-Turjman, & Leonardo Mostarda. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315\u201374325.","DOI":"10.1109\/ACCESS.2020.2986493"},{"issue":"3","key":"8935_CR6","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s41870-017-0071-2","volume":"11","author":"PS Mehra","year":"2019","unstructured":"Mehra, P. S., Doja, M. N., & Alam, B. (2019). Zonal based approach for clustering in heterogeneous WSN. International Journal of Information Technology, 11(3), 507\u2013515.","journal-title":"International Journal of Information Technology"},{"issue":"4","key":"8935_CR7","first-page":"480","volume":"13","author":"R \u00d6zd\u00e4g","year":"2019","unstructured":"\u00d6zd\u00e4g, R. (2018). Optimization of target Q-Coverage problem for QoS requirement in wireless sensor networks. Journal of Computing, 13 (4), 480\u2013489.","journal-title":"Journal of Computing"},{"key":"8935_CR8","doi-asserted-by":"crossref","unstructured":"Cardei, M., Thai, M. T., Li, Y., & Wu, W. (2005). Energy-efficient target coverage in wireless sensor networks. In Proceedings of IEEE 24th Annual Joint Conference on Computer Communcation Societies, pp. 1976\u20131984.","DOI":"10.1109\/INFCOM.2005.1498475"},{"key":"8935_CR9","doi-asserted-by":"crossref","unstructured":"Chaudhary,M., & Pujari, A. K. (2009). Q-Coverage Problem in Wireless Sensor Networks. In International Conference on Distributed Computing and Networking ICDCN in (Lecture Notes in Computer Science), vol. 5408. Berlin, Springer-Verlag, pp. 325\u2013330.","DOI":"10.1007\/978-3-540-92295-7_39"},{"key":"8935_CR10","doi-asserted-by":"crossref","unstructured":"Singh, D., Kumar, B., & Singh, S.\u00a0(2020). Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network.\u00a0Wireless PersCommunication **.","DOI":"10.1007\/s11277-020-07385-0"},{"key":"8935_CR11","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/JSEN.2016.2633409","volume":"17","author":"OM Alia","year":"2017","unstructured":"Alia, O. M., & Al-Ajouri, A. (2017). Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm. IEEE Sensors Journal, 17, 882\u2013896.","journal-title":"IEEE Sensors Journal"},{"key":"8935_CR12","doi-asserted-by":"crossref","unstructured":"Deepti Singh, Bijendra Kumar,\u00a0Samayveer Singh\u00a0& Satish Chand (2019). SMAC-AS: MAC based secure authentication scheme for wireless sensor network. Wireless Personal Communications, 107, 1289\u20131308","DOI":"10.1007\/s11277-019-06336-8"},{"key":"8935_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2015.08.018","volume":"58","author":"F Carrabs","year":"2015","unstructured":"Carrabs, F., Cerulli, R., D\u2019Ambrosio, C., & Raiconi, A. (2015). A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints. Journal of Network and Computer Applications, 58, 12\u201322.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"8935_CR14","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1049\/iet-wss.2017.0067","volume":"8","author":"Manju","year":"2018","unstructured":"Manju, Chand, S., & Kumar, B. (2018). Geneticalgorithm-basedmeta-heuristic for target coverage problem. IET Wireless Sensor System, 8 (4), 170\u2013175.","journal-title":"IET Wireless Sensor System"},{"key":"8935_CR15","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.compeleceng.2015.11.009","volume":"56","author":"SK Gupta","year":"2016","unstructured":"Gupta, S. K., Kuila, P., & Jana, P. K. (2016). Genetic algorithm approach for K coverage and M-connected node placement in target based wireless sensor networks. Computers & Electrical Engineering., 56, 544\u2013556.","journal-title":"Computers & Electrical Engineering."},{"key":"8935_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2017.03.009","volume":"88","author":"S Kebir","year":"2017","unstructured":"Kebir, S., Borne, I., & Meslati, D. (2017). A genetic algorithm-based approach for automated refactoring of component-based software. Information and Software Technology, 88, 17\u201336.","journal-title":"Information and Software Technology"},{"key":"8935_CR17","doi-asserted-by":"crossref","unstructured":"Raiconi, A., & Gentili, M. (2011). Exact and metaheuristic approaches to extend lifetime and maintain connectivity in wireless sensors networks Lecture notes in computer science\u2019 (Vol. 6701, pp. 607\u2013619). Springer.","DOI":"10.1007\/978-3-642-21527-8_68"},{"key":"8935_CR18","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11276-018-1792-2","volume":"25","author":"S Harizan","year":"2019","unstructured":"Harizan, S., & Kuila, P. (2019). Coverage and connectivity aware energy efficient scheduling in target based wireless sensor networks: An improved genetic algorithm based approach. Wireless Networks, 25, 1995\u20132011.","journal-title":"Wireless Networks"},{"issue":"10","key":"8935_CR19","doi-asserted-by":"publisher","first-page":"2430","DOI":"10.1109\/TMC.2018.2872576","volume":"18","author":"P Zhou","year":"2019","unstructured":"Zhou, P., Wang, C., & Yang, Y. (2019). Static and mobile target\u2013Coverage in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing, 18(10), 2430\u20132445.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"8935_CR20","doi-asserted-by":"crossref","unstructured":"Samayveer Singh (2019). A proficient node deployment mechanism using adjustable sensing range in wireless sensor networks. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, pp. 1\u20139.","DOI":"10.1007\/s40998-018-0143-8"},{"key":"8935_CR21","unstructured":"Deepti Singh, Samayveer Singh, Bijendra Kumar, & Satish Chand. (2019). A Secure IoT based mutual authentication for Wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI), IGI Global.**"},{"issue":"9","key":"8935_CR22","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","volume":"91","author":"A Konak","year":"2006","unstructured":"Konak, A., Coit, D. W., & Smith, A. E. (2006). Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering & System Safety, 91(9), 992\u20131007.","journal-title":"Reliability Engineering & System Safety"},{"key":"8935_CR23","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.jnca.2013.07.010","volume":"39","author":"X Liu","year":"2014","unstructured":"Liu, X., & He, D. (2014). Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks. Journal of Network and Computer Applications, 39, 310\u2013318.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"8935_CR24","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1016\/j.jnca.2011.05.002","volume":"35","author":"G Moro","year":"2012","unstructured":"Moro, G., & Monti, G. (2012). W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. Journal of Network and Computer Applications, 35(4), 1218\u20131234.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"8935_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TII.2016.2603845","volume":"13","author":"C Yang","year":"2017","unstructured":"Yang, C., & Chin, K.-W. (2017). On nodes placement in energy harvesting wireless sensor networks for coverage and connectivity. IEEE Transactions on Industrial Informatics, 13(1), 27\u201336.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"8935_CR26","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/LCOMM.2013.111513.132436","volume":"18","author":"C Yang","year":"2014","unstructured":"Yang, C., & Chin, K.-W. (2014). Novel algorithms for complete targets coverage in energy harvesting wireless sensor networks. IEEE Communications Letters, 18(1), 118\u2013121.","journal-title":"IEEE Communications Letters"},{"key":"8935_CR27","doi-asserted-by":"crossref","unstructured":"Sunil Kr. Jha, & Egbe Michael Eyong. (2018). An energy optimization in wireless sensor networks by using genetic algorithm. Telecommunication System, 67 , 113\u2013121.","DOI":"10.1007\/s11235-017-0324-1"},{"issue":"4","key":"8935_CR28","doi-asserted-by":"publisher","first-page":"2419","DOI":"10.1007\/s11235-011-9564-7","volume":"54","author":"G Han","year":"2013","unstructured":"Han, G., Xu, H., Duong, T. Q., Jiang, J., & Hara, T. (2013). Localization algorithms of wireless sensor networks: A survey. Telecommunication Systems, 54(4), 2419\u20132436.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"8935_CR29","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1155\/2014\/268284","volume":"10","author":"L Catarinucci","year":"2014","unstructured":"Catarinucci, L., Colella, R., Del Fiore, G., Mainetti, L., Mighali, V., & Patrono, L. (2014). A cross-layer approach to minimize the energy consumption in wireless sensor networks. International Journal of Distributed Sensor Networks, 10(1), 268\u2013284.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"8935_CR30","doi-asserted-by":"crossref","unstructured":"Shareef, A., & Zhu, Y. (2010). Energy modeling of wireless sensor nodes based on Petri nets. In Proceedings of ICPP, 2010, pp. 101\u2013110.","DOI":"10.1109\/ICPP.2010.19"},{"issue":"1","key":"8935_CR31","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11235-015-0092-8","volume":"61","author":"G Abdul-Salaam","year":"2016","unstructured":"Abdul-Salaam, G., Abdullah, A. H., Anisi, M. H., Gani, A., & Alelaiwi, A. (2016). A comparative analysis of energy conservation approaches in hybrid wireless sensor networks data collection protocols. Telecommunication Systems, 61(1), 159\u2013179.","journal-title":"Telecommunication Systems"},{"key":"8935_CR32","doi-asserted-by":"crossref","unstructured":"Du, W., Mieyeville, F., & Navarro, D. (2010). Modeling energy consumption of wireless sensor networks by system. In Proceedings of ICSNC, 2010, pp. 94\u201398.","DOI":"10.1109\/ICSNC.2010.20"},{"key":"8935_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.adhoc.2014.01.003","volume":"17","author":"ME Keskin","year":"2014","unstructured":"Keskin, M. E., Alt\u0131nel, \u02d9I. K., Aras, N., & Ersoy, C. (2014). Wireless sensor network lifetime maximization by optimal sensor deployment, activity scheduling, data routing and sink mobility. Ad Hoc Networks, 17, 18\u201336.","journal-title":"Ad Hoc Networks"},{"issue":"11","key":"8935_CR34","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1109\/TMC.2011.210","volume":"11","author":"S He","year":"2012","unstructured":"He, S., Chen, J., Yau, D. K., & Sun, Y. (2012). Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Transactions on Mobile Computing, 11(11), 1678\u20131691.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"9","key":"8935_CR35","doi-asserted-by":"publisher","first-page":"1783","DOI":"10.1109\/TPDS.2012.263","volume":"24","author":"H Liu","year":"2013","unstructured":"Liu, H., Chu, X., Leung, Y. W., & Du, R. (2013). Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1783\u20131796.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"8935_CR36","first-page":"16","volume":"6","author":"N Manju","year":"2016","unstructured":"Manju, N., Chand. s. & Kumar B. (2016). Improved-coverage preserving clustering protocol in wireless sensor networks. International Journal of Engineering and Technology Innovation, 6(1), 16\u201329.","journal-title":"International Journal of Engineering and Technology Innovation"},{"issue":"4","key":"8935_CR37","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660\u2013670.","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08935-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08935-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08935-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T09:09:49Z","timestamp":1640768989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08935-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,22]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["8935"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08935-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,22]]},"assertion":[{"value":"9 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}