{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:20Z","timestamp":1740141800990,"version":"3.37.3"},"reference-count":29,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61100211","61003307","CNS-0832089","20110490084","2012T50569"],"award-info":[{"award-number":["61100211","61003307","CNS-0832089","20110490084","2012T50569"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61100211","61003307","CNS-0832089","20110490084","2012T50569"],"award-info":[{"award-number":["61100211","61003307","CNS-0832089","20110490084","2012T50569"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["61100211","61003307","CNS-0832089","20110490084","2012T50569"],"award-info":[{"award-number":["61100211","61003307","CNS-0832089","20110490084","2012T50569"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61100211","61003307","CNS-0832089","20110490084","2012T50569"],"award-info":[{"award-number":["61100211","61003307","CNS-0832089","20110490084","2012T50569"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61100211","61003307","CNS-0832089","20110490084","2012T50569"],"award-info":[{"award-number":["61100211","61003307","CNS-0832089","20110490084","2012T50569"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,6,1]]},"abstract":"<jats:p> In wireless networks, wireless sniffers are distributed in a region to monitor the activities of users. It can be applied for fault diagnosis, resource management, and critical path analysis. Due to hardware limitations, wireless sniffers typically can only collect information on one channel at a time. Therefore, it is a key topic to optimize the channel selection for sniffers to maximize the information collected, so as to maximize the Quality of Monitoring (QoM) for wireless networks. In this paper, a Multiple-Quantum-Immune-Clone-Algorithm- (MQICA-) based solution was proposed to achieve the optimal channel allocation. The extensive simulations demonstrate that MQICA outperforms the related algorithms evidently with higher monitoring quality, lower computation complexity, and faster convergence. The practical experiment also shows the feasibility of this algorithm. <\/jats:p>","DOI":"10.1155\/2013\/120527","type":"journal-article","created":{"date-parts":[[2013,6,10]],"date-time":"2013-06-10T21:00:18Z","timestamp":1370898018000},"page":"120527","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimal QoM in Multichannel Wireless Networks Based on MQICA"],"prefix":"10.1177","volume":"9","author":[{"given":"Na","family":"Xia","sequence":"first","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"},{"name":"Engineering Research Center of Safety Critical Industrial Measurement and Control Technology, Ministry of Education of China, Hefei 230009, China"}]},{"given":"Lina","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"}]},{"given":"Chengchun","family":"Ni","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"}]}],"member":"179","published-online":{"date-parts":[[2013,6,10]]},"reference":[{"volume-title":"Radio Resource Management for Wireless Networks","year":"2001","author":"Zander J.","key":"B1-2013-120527"},{"key":"B2-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621969"},{"key":"B3-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2037497"},{"first-page":"70","volume-title":"Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe '04)","author":"Yeo J.","key":"B4-2013-120527"},{"first-page":"13","volume-title":"Proceeding of the Workshop on Wireless Traffic Measurements and Modeling (WiTMeMo '05)","author":"Yeo J.","key":"B5-2013-120527"},{"first-page":"5","volume-title":"Proceedings of the ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis","author":"Rodrig M.","key":"B6-2013-120527"},{"first-page":"39","volume-title":"Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '06)","author":"Cheng Y. C.","key":"B7-2013-120527"},{"issue":"4","key":"B8-2013-120527","first-page":"532","volume":"30","author":"Yang W. G.","year":"2007","journal-title":"Chinese Journal of Computers"},{"first-page":"1","volume-title":"Proceedings of the 29th Conference on Information Communications (INFOCOM '10)","author":"Liu C.","key":"B9-2013-120527"},{"key":"B10-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2009.5371390"},{"key":"B11-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2010.5624520"},{"key":"B12-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497559"},{"key":"B13-2013-120527","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530780"},{"first-page":"1422","volume-title":"Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03)","author":"Kim B. J.","key":"B14-2013-120527"},{"first-page":"72","volume-title":"Proceedings of the International Workshop on Approximation Algorithms for Combinatorial Optimization Problems","author":"Chekuri C.","key":"B15-2013-120527"},{"key":"B16-2013-120527","doi-asserted-by":"publisher","DOI":"10.1145\/1860093.1860109"},{"first-page":"1","volume-title":"Proceedings of IEEE GLOBECOM","author":"Arora P.","key":"B17-2013-120527"},{"key":"B18-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2006.1696348"},{"key":"B19-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2007.382573"},{"key":"B20-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2009.20"},{"key":"B21-2013-120527","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683964"},{"issue":"3","key":"B22-2013-120527","first-page":"723","volume":"39","author":"Du Z. G.","year":"2011","journal-title":"Chinese Journal of Electronics"},{"first-page":"461","volume-title":"Proceedings of the International Conference on Neural Networks and Brain Proceedings (ICNNB '05)","author":"Jiao L.","key":"B28-2013-120527"},{"issue":"2","key":"B29-2013-120527","first-page":"176","volume":"30","author":"Li Y. Y.","year":"2007","journal-title":"Chinese Journal of Computers"},{"key":"B30-2013-120527","unstructured":"de Jong K. A.An analysis of the behavior of a class of genetic adaptive systems [Ph.D. thesis]1975University of Michigan"},{"first-page":"2924","volume-title":"Proceedings of International Conference on Machine Learning and Cybernetics","author":"Yu Y.","key":"B31-2013-120527"},{"issue":"1","key":"B32-2013-120527","first-page":"148","volume":"23","author":"Wang X. Z.","year":"2006","journal-title":"Control Theory and Applications"},{"first-page":"61","volume-title":"Proceedings of the IEEE International Conference on Evolutionary Computation (ICEC '96)","author":"Narayanan A.","key":"B33-2013-120527"},{"volume-title":"The Mathematical Basis of Genetic Algorithm","year":"2000","author":"Zhang W. X.","key":"B34-2013-120527"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/120527","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/120527","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/120527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:02:06Z","timestamp":1621191726000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/120527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,1]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6,1]]}},"alternative-id":["10.1155\/2013\/120527"],"URL":"https:\/\/doi.org\/10.1155\/2013\/120527","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,6,1]]}}}