{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:09:40Z","timestamp":1769695780758,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01999-6","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T15:20:27Z","timestamp":1749482427000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A hybrid shuffled frog-leaping scheduling algorithm for power management of directional sensor networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Peyman","family":"Mokaripoor","sequence":"first","affiliation":[]},{"given":"Mirsaeid","family":"Hosseini Shirvani","sequence":"additional","affiliation":[]},{"given":"Hamid Reza","family":"Ghaffari","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Noorian Talouki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"issue":"110609","key":"1999_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2023.110609","volume":"146","author":"VR Ekhlas","year":"2023","unstructured":"Ekhlas VR, HosseiniShirvani M, Dana A, Raeisi N (2023) Discrete grey wolf optimization algorithm for solving k-coverage problem in directional sensor networks with network lifetime maximization viewpoint. Appl Soft Comput 146(110609):1\u201325. https:\/\/doi.org\/10.1016\/j.asoc.2023.110609","journal-title":"Appl Soft Comput"},{"issue":"101973","key":"1999_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2019.101973","volume":"94","author":"J Jia","year":"2019","unstructured":"Jia J, Dong C, Hong Y, Guo L, Yu Y (2019) Maximizing full-view target coverage in camera sensor networks. Ad Hoc Netw 94(101973):1\u201310. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101973","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1999_CR3","doi-asserted-by":"publisher","first-page":"3506","DOI":"10.3390\/s140203506","volume":"14","author":"G.H. Florence Yap","year":"2014","unstructured":"Yap G.H. Florence, Yen HH (2014) A Survey on Sensor Coverage and Visual Data Capturing\/Processing\/Transmission in Wireless Visual Sensor Networks. Sensors 14(2):3506\u20133527. https:\/\/doi.org\/10.3390\/s140203506","journal-title":"Sensors"},{"key":"1999_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40747-023-01078-4","volume":"2023","author":"MG Mortazavi","year":"2023","unstructured":"Mortazavi MG, HosseiniShirvani M, Dana A, Fathy M (2023) Sleep-wakeup Scheduling Algorithm for Lifespan Maximization of Directional Sensor Networks: An improved Discrete Cuckoo Search Optimization Algorithm. Compl Intel Syst 2023:1\u201333. https:\/\/doi.org\/10.1007\/s40747-023-01078-4","journal-title":"Compl Intel Syst"},{"issue":"e00720","key":"1999_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sciaf.2021.e00720","volume":"11","author":"F Mazunga","year":"2021","unstructured":"Mazunga F, Nechibvute A (2021) Ultra-low power techniques in energy harvesting wireless sensor networks: Recent advances and issues. Sci African 11(e00720):1\u201314. https:\/\/doi.org\/10.1016\/j.sciaf.2021.e00720","journal-title":"Sci African"},{"key":"1999_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.dcan.2018.11.002","volume":"6","author":"S Kyi","year":"2020","unstructured":"Kyi S, Taparugssanagorn A (2020) Wireless sensing for a solar power system. Digit Commun Netw 6:51\u201357. https:\/\/doi.org\/10.1016\/j.dcan.2018.11.002","journal-title":"Digit Commun Netw"},{"key":"1999_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ejor.2012.01.046","volume":"220","author":"R Cerulli","year":"2012","unstructured":"Cerulli R, De Donato R, Raiconi A (2012) Exact and heuristic methods to maximize network lifetime in wireless sensor networks with adjustable sensing ranges. European J Oper Res 220:58\u201366. https:\/\/doi.org\/10.1016\/j.ejor.2012.01.046","journal-title":"European J Oper Res"},{"key":"1999_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.08.015","volume":"75","author":"H Zannat","year":"2016","unstructured":"Zannat H, Akter T, Tasnim M, Rahman A (2016) The coverage problem in visual sensor networks: A target oriented approach. J Netw Comp Appl 75:1\u201315. https:\/\/doi.org\/10.1016\/j.jnca.2016.08.015","journal-title":"J Netw Comp Appl"},{"key":"1999_CR9","doi-asserted-by":"publisher","unstructured":"H. Mahamadi, S. Salleh, M.N. Razali, \u201cHeuristic methods to maximize network lifetime in directional sensor networks with adjustable sensing ranges,\u201d in journal of network and computer applications, Vol. 46, pp. 26\u201335, 2014. https:\/\/doi.org\/10.1016\/j.jnca.2014.07.038","DOI":"10.1016\/j.jnca.2014.07.038"},{"key":"1999_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361. https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007","journal-title":"Adv Eng Softw"},{"key":"1999_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2018.10.009","volume":"52","author":"A Alibeiki","year":"2019","unstructured":"Alibeiki A, Motameni H, Mohamadi H (2019) A new genetic-based approach for maximizing network lifetime in directional sensor networks with adjustable sensing ranges. Pervasive Mob Comput 52:1\u201312. https:\/\/doi.org\/10.1016\/j.pmcj.2018.10.009","journal-title":"Pervasive Mob Comput"},{"key":"1999_CR12","doi-asserted-by":"publisher","unstructured":"Mortazavi MG, Shirvani MH, Dana A (2022) A Discrete Cuckoo Search Algorithm for Reliability-aware Energy-efficient IoT Applications Multi-service Deployment in Fog Environment. Int Conf Electr Comput Energ Technol (ICECET) Prague, Czech Republic. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICECET55527.2022.9873056","DOI":"10.1109\/ICECET55527.2022.9873056"},{"issue":"4","key":"1999_CR13","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1080\/09720529.2020.1753301","volume":"24","author":"D Arivudainambi","year":"2021","unstructured":"Arivudainambi D, Pavithra R, Kalyani P (2021) Cuckoo search algorithm for target coverage and sensor scheduling with adjustable sensing range in wireless sensor network. J Disc Mathematical Sci Cryptogr 24(4):975\u2013996. https:\/\/doi.org\/10.1080\/09720529.2020.1753301","journal-title":"J Disc Mathematical Sci Cryptogr"},{"key":"1999_CR14","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ins.2017.01.017","volume":"385\u2013386","author":"A Singh","year":"2017","unstructured":"Singh A, Rossi A, Sevaux M (2017) Heuristics for Lifetime Maximization in Camera Sensor Networks. Inf Sci 385\u2013386:475\u2013491. https:\/\/doi.org\/10.1016\/j.ins.2017.01.017","journal-title":"Inf Sci"},{"issue":"3","key":"1999_CR15","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1061\/(ASCE)0733-9496(2003)129:3(210)","volume":"129","author":"MM Eusuff","year":"2003","unstructured":"Eusuff MM, Lansey KE (2003) Optimization of water distribution network design using the shuffled frog leaping algorithm. J Water Resour Plan Manag 129(3):210\u2013225","journal-title":"J Water Resour Plan Manag"},{"issue":"107085","key":"1999_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2021.107085","volume":"102","author":"Y Huang","year":"2021","unstructured":"Huang Y, Shen X-N, You X (2021) A discrete shuffled frog-leaping algorithm based on heuristic information for traveling salesman problem. Appl Soft Comput 102(107085):1\u201321. https:\/\/doi.org\/10.1016\/j.asoc.2021.107085","journal-title":"Appl Soft Comput"},{"issue":"103501","key":"1999_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2020.103501","volume":"90","author":"M HosseiniShirvani","year":"2020","unstructured":"HosseiniShirvani M (2020) A hybrid meta-heuristic algorithm for scientific workflow scheduling in heterogeneous distributed computing systems. Eng Appl Artif Intel 90(103501):1\u201320. https:\/\/doi.org\/10.1016\/j.engappai.2020.103501","journal-title":"Eng Appl Artif Intel"},{"issue":"6","key":"1999_CR18","doi-asserted-by":"publisher","first-page":"5173","DOI":"10.1007\/s00500-023-09201-w","volume":"28","author":"MA NezafatTabalvandani","year":"2024","unstructured":"NezafatTabalvandani MA, HosseiniShirvani M, Motameni H (2024) Reliability-aware web service composition with cost minimization perspective: a multi-objective particle swarm optimization model in multi-cloud scenarios. Soft Comp 28(6):5173\u201396. https:\/\/doi.org\/10.1007\/s00500-023-09201-w","journal-title":"Soft Comp"},{"issue":"1","key":"1999_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"GH Holland","year":"1992","unstructured":"Holland GH (1992) The Genetic Algorithm. Sci Am 267(1):66\u201373","journal-title":"Sci Am"},{"key":"1999_CR20","doi-asserted-by":"publisher","unstructured":"Vikhar PA (2016) \"Evolutionary algorithms: a critical review and its future prospects,\".\u00a02016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC). Jalgaon. pp.\u00a0261\u2013265.\u00a0https:\/\/doi.org\/10.1109\/ICGTSPICC.2016.7955308","DOI":"10.1109\/ICGTSPICC.2016.7955308"},{"key":"1999_CR21","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11277-013-1371-x","volume":"75","author":"H Mohamadi","year":"2014","unstructured":"Mohamadi H, Ismail AS, Salleh S (2014) Solving Target Coverage Problem Using Cover Sets in Wireless Sensor Networks Based on Learning Automata. Wireless Pers Commun 75:447\u2013463. https:\/\/doi.org\/10.1007\/s11277-013-1371-x","journal-title":"Wireless Pers Commun"},{"key":"1999_CR22","doi-asserted-by":"publisher","unstructured":"Esterle L, Lewis PR (2019) Distributed autonomy and trade-offs in online multiobject k-coverage. Comp Intel 1\u201323. https:\/\/doi.org\/10.1111\/coin.12264","DOI":"10.1111\/coin.12264"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01999-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01999-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01999-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:34Z","timestamp":1758986554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01999-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1999"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01999-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"13 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The submitted works are original and have not been published elsewhere in any form or language (partially or in full), nor are they under consideration by another publisher. This manuscript has no plagiarism, fabrication, falsification, or inappropriate manipulation. Also, this article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All the authors agree to publication in Peer-to-Peer Networking and Applications.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"208"}}