{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:10:57Z","timestamp":1756897857106,"version":"3.40.5"},"reference-count":24,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,9,28]]},"abstract":"<p>In mobile ad hoc networks (MANETs), the topology differs very often due to mobile nodes (MNs). The flat network organization has high topology maintenance messages overload. To reduce this message overload in MANET, clustering organizations are recommended. Grouping MANET into MNs has the advantage of controlling congestion and easily repairing the topology. When the MANET size is large, clustered MN partitioning is a multiobjective optimization problem. Several evolutionary algorithms such as genetic algorithms (GAs) are used to divide MANET into clusters. GAs suffer from premature convergence. In this article, a clustering algorithm based on a memetic algorithm (MA) is proposed. MA uses local exploration techniques to reduce the likelihood of early convergence. The local search function in MA is to find the optimal local solution before other evolutionary algorithms. The optimal clusters in MANET can be achieved using MA for dynamic load balancing. In this work, the network is considered a graph G (V, E), where V represents MN and E represent the communication links of the neighboring MNs. The aim of this study is to find the cluster headset (CH) as early as possible when needed. High-quality individuals are selected for the new population in the next generation. New individuals are generated using the crossover mechanism on the chromosome once the two parents have been selected. Data are communicated via CHs between other clusters. The proposed technique is compared with existing techniques such as DGAC, MobHiD, and EMPSO. The proposed technique overcomes the state-of-the-art clustering schemes in terms of cluster counting, reaffiliation rate, cluster life, and overload of control messages.<\/p>","DOI":"10.1155\/2020\/2528189","type":"journal-article","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T20:35:15Z","timestamp":1601325315000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Cluster Optimization in Mobile Ad Hoc Networks Based on Memetic Algorithm: memeHoc"],"prefix":"10.1155","volume":"2020","author":[{"given":"Masood","family":"Ahmad","sequence":"first","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"given":"Abdul","family":"Hameed","sequence":"additional","affiliation":[{"name":"Department of Computing and Technology, Iqra University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6167-5253","authenticated-orcid":true,"given":"Fasee","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macau, China"},{"name":"School of Software, Northwestern Polytechnical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3628-0262","authenticated-orcid":true,"given":"Atif","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Islamia College Peshawar, Peshawar 25120, Pakistan"}]},{"given":"Hashem","family":"Alyami","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia"}]},{"given":"M. Irfan","family":"Uddin","sequence":"additional","affiliation":[{"name":"Institute of Computing, Kohat University of Science and Technology, Kohat, Pakistan"}]},{"given":"Abdullah","family":"ALharbi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia"}]},{"given":"Furqan","family":"Aziz","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"1"},{"article-title":"IEEE 802.11 wireless lan medium access control (mac) and physical layer (phy) specifications","year":"2007","author":"IEEE Computer Society","key":"2"},{"key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.74"},{"volume-title":"Ad-Hoc Networking","year":"2001","author":"Perkins","key":"6"},{"author":"Basagni","key":"7","article-title":"A generalized clustering algorithm for peer-to-peer networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.12.013"},{"key":"9","first-page":"93","article-title":"Correlated topology control algorithm for survival network in manets","volume-title":"Lecture Notes in Electrical Engineering","author":"Azni","year":"2016"},{"key":"10","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1201\/9781315183176-4","article-title":"Multi-objective optimization","volume-title":"Decision Sciences: Theory and Practice","author":"Deb","year":"2016"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2015.03.001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2897119"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0920-z"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0320-0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.01.018"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289161"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/1236187"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008193"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1141-4"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.05.036"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.050"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-020-00137-4"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICITBS.2019.00046"},{"issue":"6","key":"24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/1550147717716815","article-title":"Honey bee algorithms based-clustering in mobile ad hoc network","volume":"13","author":"Ahmad","year":"2017","journal-title":"International Journal of Distributed Sensor Networks"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/2528189.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/2528189.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/2528189.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T20:35:27Z","timestamp":1601325327000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/2528189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":24,"alternative-id":["2528189","2528189"],"URL":"https:\/\/doi.org\/10.1155\/2020\/2528189","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"type":"electronic","value":"1099-0526"},{"type":"print","value":"1076-2787"}],"subject":[],"published":{"date-parts":[[2020,9,28]]}}}