{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:07Z","timestamp":1772119867208,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY23F010002"],"award-info":[{"award-number":["LY23F010002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11277-024-11143-x","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T01:01:31Z","timestamp":1715821291000},"page":"2255-2280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Novel WSN Coverage Optimization Strategy Via Monarch Butterfly Algorithm and Particle Swarm Optimization"],"prefix":"10.1007","volume":"135","author":[{"given":"Yinggao","family":"Yue","sequence":"first","affiliation":[]},{"given":"Li","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1898-3677","authenticated-orcid":false,"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,16]]},"reference":[{"issue":"2","key":"11143_CR1","doi-asserted-by":"publisher","first-page":"100342","DOI":"10.1016\/j.cosrev.2020.100342","volume":"39","author":"A Singh","year":"2021","unstructured":"Singh, A., Sharma, S., & Singh, J. (2021). Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Computer Science Review, 39(2), 100342.","journal-title":"Computer Science Review"},{"key":"11143_CR2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4735687","author":"Y Yue","year":"2022","unstructured":"Yue, Y., Cao, L., & Zhang, Y. (2022). A data collection method of mobile wireless sensor networks based on improved dragonfly algorithm. Computational Intelligence and Neuroscience. https:\/\/doi.org\/10.1155\/2022\/4735687","journal-title":"Computational Intelligence and Neuroscience"},{"issue":"3","key":"11143_CR3","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1007\/s11277-021-08335-0","volume":"119","author":"PS Khot","year":"2021","unstructured":"Khot, P. S., & Naik, U. (2021). Particle-water wave optimization for secure routing in wireless sensor network using cluster head selection. Wireless Personal Communications, 119(3), 2405\u20132429.","journal-title":"Wireless Personal Communications"},{"key":"11143_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4489436","author":"Y Bai","year":"2022","unstructured":"Bai, Y., Cao, L., Wang, S., Yue, Y., et al. (2022). Data collection strategy based on OSELM and gray wolf optimization algorithm for wireless sensor networks. Computational Intelligence and Neuroscience. https:\/\/doi.org\/10.1155\/2022\/4489436","journal-title":"Computational Intelligence and Neuroscience"},{"key":"11143_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10435-1","author":"Y Yue","year":"2023","unstructured":"Yue, Y., Cao, L., Lu, D., et al. (2023). Review and empirical analysis of sparrow search algorithm. Artificial Intelligence Review. https:\/\/doi.org\/10.1007\/s10462-023-10435-1","journal-title":"Artificial Intelligence Review"},{"issue":"5","key":"11143_CR6","doi-asserted-by":"publisher","first-page":"155014772110181","DOI":"10.1177\/15501477211018140","volume":"17","author":"Y Yue","year":"2021","unstructured":"Yue, Y., You, H., Wang, S., et al. (2021). Improved whale optimization algorithm and its application in heterogeneous wireless sensor networks. International Journal of Distributed Sensor Networks, 17(5), 15501477211018140.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"2","key":"11143_CR7","first-page":"231","volume":"8","author":"L Cao","year":"2023","unstructured":"Cao Li, Wang Z, Wang Z, Wang X, Yinggao Yue. (2024).An Energy-Saving and Efficient Deployment Strategy for Heterogeneous Wireless Sensor Networks Based on Improved Seagull Optimization Algorithm. Biomimetics. 2023; 8(2):231","journal-title":"&lt;div class=\"NodiCopyInline\"&gt;Biomimetics&lt;\/div&gt;"},{"issue":"11","key":"11143_CR8","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1080\/0305215X.2016.1145015","volume":"48","author":"AK Idrees","year":"2016","unstructured":"Idrees, A. K., Deschinkel, K., & Salomon, M. (2016). Perimeter-based coverage optimization to improve lifetime in wireless sensor networks. Engineering Optimization, 48(11), 1951\u20131972.","journal-title":"Engineering Optimization"},{"issue":"4","key":"11143_CR9","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1007\/s11277-017-3974-0","volume":"94","author":"MA Benatia","year":"2017","unstructured":"Benatia, M. A., Sahnoun, M., & Baudry, D. (2017). Multi-objective WSN deployment using genetic algorithms under cost, coverage, and connectivity constraints. Wireless Personal Communications, 94(4), 2739\u20132768.","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"11143_CR10","doi-asserted-by":"publisher","first-page":"180590","DOI":"10.1109\/ACCESS.2019.2959949","volume":"7","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Xie, H., & He, D. (2019). Wireless sensor network deployment optimization based on two flower pollination algorithms. IEEE Access, 7(12), 180590\u2013180608.","journal-title":"IEEE Access"},{"issue":"3","key":"11143_CR11","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/s11276-016-1361-5","volume":"24","author":"M Krishnan","year":"2018","unstructured":"Krishnan, M., Rajagopal, V., & Rathinasamy, S. (2018). Performance evaluation of sensor deployment using optimization techniques and scheduling approach for K-coverage in WSNs. Wireless Networks, 24(3), 683\u2013693.","journal-title":"Wireless Networks"},{"issue":"7","key":"11143_CR12","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ins.2019.02.059","volume":"488","author":"NT Hanh","year":"2019","unstructured":"Hanh, N. T., Binh, H. T. T., & Hoai, N. X. (2019). An efficient genetic algorithm for maximizing area coverage in wireless sensor networks. Information Sciences, 488(7), 58\u201375.","journal-title":"Information Sciences"},{"issue":"4","key":"11143_CR13","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11276-018-1792-2","volume":"25","author":"S Harizan","year":"2019","unstructured":"Harizan, S., & Kuila, P. (2019). Coverage and connectivity aware energy efficient scheduling in target based wireless sensor networks: An improved genetic algorithm based approach. Wireless Networks, 25(4), 1995\u20132011.","journal-title":"Wireless Networks"},{"issue":"1","key":"11143_CR14","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1007\/s10586-017-1586-9","volume":"22","author":"J Wang","year":"2019","unstructured":"Wang, J., Ju, C., & Kim, H. (2019). A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. Cluster Computing, 22(1), 1787\u20131795.","journal-title":"Cluster Computing"},{"issue":"2","key":"11143_CR15","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jnca.2015.09.013","volume":"64","author":"HA Hashim","year":"2016","unstructured":"Hashim, H. A., Ayinde, B. O., & Abido, M. A. (2016). Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm. Journal of Network and Computer Applications, 64(2), 239\u2013248.","journal-title":"Journal of Network and Computer Applications"},{"issue":"10","key":"11143_CR16","doi-asserted-by":"publisher","first-page":"147","DOI":"10.3390\/a11100147","volume":"11","author":"H Yin","year":"2018","unstructured":"Yin, H., Zhang, Y., & He, X. (2018). WSN nodes placement optimization based on a weighted centroid artificial fish swarm algorithm. Algorithms, 11(10), 147\u2013157.","journal-title":"Algorithms"},{"issue":"9","key":"11143_CR17","doi-asserted-by":"publisher","first-page":"42864","DOI":"10.1109\/ACCESS.2020.2970208","volume":"8","author":"Y Feng","year":"2020","unstructured":"Feng, Y., Zhao, S., & Liu, H. (2020). Analysis of network coverage optimization based on feedback K-means clustering and artificial fish swarm algorithm. IEEE Access, 8(9), 42864\u201342876.","journal-title":"IEEE Access"},{"issue":"1","key":"11143_CR18","first-page":"1","volume":"6","author":"P Natarajan","year":"2020","unstructured":"Natarajan, P., & Parthiban, L. (2020). k-coverage m-connected node placement using shuffled frog leaping: Nelder-Mead algorithm in WSN. Journal of Ambient Intelligence and Humanized Computing, 6(1), 1\u201316.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"11143_CR19","doi-asserted-by":"publisher","first-page":"569","DOI":"10.2298\/CSIS180103023W","volume":"15","author":"L Wang","year":"2018","unstructured":"Wang, L., Wu, W., & Qi, J. (2018). Wireless sensor network coverage optimization based on whale group algorithm. Computer Science and Information Systems, 15(3), 569\u2013583.","journal-title":"Computer Science and Information Systems"},{"issue":"7","key":"11143_CR20","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s00521-015-1923-y","volume":"31","author":"GG Wang","year":"2019","unstructured":"Wang, G. G., Deb, S., & Cui, Z. (2019). Monarch butterfly optimization. Neural computing and applications, 31(7), 1995\u20132014.","journal-title":"Neural computing and applications"},{"issue":"2","key":"11143_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s12293-016-0211-4","volume":"10","author":"Y Feng","year":"2018","unstructured":"Feng, Y., Yang, J., & Wu, C. (2018). Solving 0\u20131 knapsack problems by chaotic monarch butterfly optimization algorithm with Gaussian mutation. Memetic Computing, 10(2), 135\u2013150.","journal-title":"Memetic Computing"},{"issue":"10","key":"11143_CR22","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1007\/s00521-017-2903-1","volume":"30","author":"Y Feng","year":"2018","unstructured":"Feng, Y., Wang, G. G., & Li, W. (2018). Multi-strategy monarch butterfly optimization algorithm for discounted 0\u20131 knapsack problem. Neural Computing and Applications, 30(10), 3019\u20133036.","journal-title":"Neural Computing and Applications"},{"issue":"3","key":"11143_CR23","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3390\/a10030107","volume":"10","author":"S Chen","year":"2017","unstructured":"Chen, S., Chen, R., & Gao, J. (2017). A monarch butterfly optimization for the dynamic vehicle routing problem. Algorithms, 10(3), 107\u2013118.","journal-title":"Algorithms"},{"issue":"4","key":"11143_CR24","first-page":"445","volume":"48","author":"H Faris","year":"2017","unstructured":"Faris, H., Aljarah, I., & Mirjalili, S. (2017). Improved monarch butterfly optimization for unconstrained global search and neural network training. Applied Intelligence, 48(4), 445\u2013464.","journal-title":"Applied Intelligence"},{"issue":"4","key":"11143_CR25","first-page":"114418","volume":"168","author":"Y Feng","year":"2020","unstructured":"Feng, Y., Deb, S., Wang, G. G., et al. (2020). Monarch butterfly optimization: A comprehensive review. Expert Systems with Applications, 168(4), 114418.","journal-title":"Expert Systems with Applications"},{"key":"11143_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05210-0","author":"M Alweshah","year":"2020","unstructured":"Alweshah, M., Al Khalaileh, S., Gupta, B. B., et al. (2020). The monarch butterfly optimization algorithm for solving feature selection problems. Neural Computing and Applications. https:\/\/doi.org\/10.1007\/s00521-020-05210-0","journal-title":"Neural Computing and Applications"},{"issue":"35","key":"11143_CR27","doi-asserted-by":"publisher","first-page":"17882","DOI":"10.1016\/j.ijhydene.2020.04.256","volume":"45","author":"S Bao","year":"2020","unstructured":"Bao, S., Ebadi, A., Toughani, M., et al. (2020). A new method for optimal parameters identification of a PEMFC using an improved version of Monarch Butterfly Optimization Algorithm. International Journal of Hydrogen Energy, 45(35), 17882\u201317892.","journal-title":"International Journal of Hydrogen Energy"},{"issue":"4","key":"11143_CR28","doi-asserted-by":"publisher","first-page":"114418","DOI":"10.1016\/j.eswa.2020.114418","volume":"168","author":"Y Feng","year":"2021","unstructured":"Feng, Y., Deb, S., Wang, G. G., et al. (2021). Monarch butterfly optimization: A comprehensive review. Expert Systems with Applications, 168(4), 114418.","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"11143_CR29","doi-asserted-by":"publisher","first-page":"4058","DOI":"10.1007\/s10489-020-01981-0","volume":"51","author":"M Alweshah","year":"2021","unstructured":"Alweshah, M. (2021). Solving feature selection problems by combining mutation and crossover operations with the monarch butterfly optimization algorithm. Applied Intelligence, 51(6), 4058\u20134081.","journal-title":"Applied Intelligence"},{"issue":"2","key":"11143_CR30","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3390\/biomimetics8020165","volume":"8","author":"Y Bai","year":"2023","unstructured":"Bai, Y., Cao, L., Chen, B., Chen, Y., & Yue, Y. (2023). A novel topology optimization protocol based on an improved crow search algorithm for the perception layer of the internet of things. Biomimetics, 8(2), 165.","journal-title":"Biomimetics"},{"issue":"1","key":"11143_CR31","first-page":"1-20","volume":"14","author":"S WANG","year":"2023","unstructured":"Wang S, Cao L, Chen Y, et al. (2024). Gorilla optimization algorithm combining sine cosine and cauchy variations and its engineering applications[J]. Scientific Reports,\u00a0 14(1): 1-20.","journal-title":"&lt;div class=\"NodiCopyInline\"&gt;Scientific Reports&lt;\/div&gt;"},{"issue":"2","key":"11143_CR32","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/biomimetics8020186","volume":"8","author":"L Cao","year":"2023","unstructured":"Cao, L., Chen, H., Chen, Y., Yue, Y., & Zhang, X. (2023). Bio-inspired swarm intelligence optimization algorithm-aided hybrid TDOA\/AOA-based localization. Biomimetics, 8(2), 186.","journal-title":"Biomimetics"},{"issue":"5","key":"11143_CR33","first-page":"270","volume":"9","author":"S Jiang","year":"2024","unstructured":"Jiang S, Yue Y, Chen C, et al. (2024).A Multi-Objective Optimization Problem Solving Method Based on Improved Golden Jackal Optimization Algorithm and Its Application[J]. Biomimetics,\u00a0 9(5): 270.","journal-title":"&lt;div class=\"NodiCopyInline\"&gt;Biomimetics&lt;\/div&gt;"},{"issue":"2","key":"11143_CR34","doi-asserted-by":"publisher","first-page":"235","DOI":"10.3390\/biomimetics8020235","volume":"8","author":"M Xu","year":"2023","unstructured":"Xu, M., Cao, L., Lu, D., Hu, Z., & Yue, Y. (2023). Application of swarm intelligence optimization algorithms in image processing: A comprehensive review of analysis, synthesis, and optimization. Biomimetics, 8(2), 235.","journal-title":"Biomimetics"},{"key":"11143_CR35","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s00500-016-2474-6","volume":"22","author":"D Wang","year":"2018","unstructured":"Wang, D., Tan, D., & Liu, L. (2018). Particle swarm optimization algorithm: An overview. Soft Computing, 22, 387\u2013408.","journal-title":"Soft Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11143-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11143-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11143-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T05:35:44Z","timestamp":1717133744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11143-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["11143"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11143-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1589865\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"18 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}