{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:48:35Z","timestamp":1747190915960,"version":"3.40.5"},"reference-count":38,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T00:00:00Z","timestamp":1668211200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2022,11,12]]},"abstract":"<jats:p>The Maximum Lifetime Coverage Problem (MLCP) requires heuristic optimization methods due to its complexity. A real-world problem model determines how a solution is represented and the operators applied in these heuristics. Our paper describes adapting a local search scheme and its operators to MLCP optimization. The operators originate from three local search algorithms we proposed earlier: LSHMA, LSCAIA, and LSRFTA. Two steps of the LS scheme\u2019s main loop can be executed in three different ways each. Hence, nine versions of the LS approach can be obtained. In experimental research, we verified their effectiveness. Test cases come from three benchmarks: SCP1, proposed and used in our earlier research on the three LS algorithms mentioned above, and two others found in the literature. The results obtained with SCP1 showed that the algorithm based on the hypergraph model approach (HMA) is the most effective. The remaining results of the other algorithms divide them into two groups: effective ones and weak ones. However, other benchmarks showed that the more redundant the coverage of points of interest (POIs) by sensors, the more effective the perturbation method from the approach inspired by cellular automata (CAIA). The findings expose the strengths and weaknesses of the problem-specific steps applied in the LS algorithms.<\/jats:p>","DOI":"10.1155\/2022\/3745358","type":"journal-article","created":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T17:05:09Z","timestamp":1668272709000},"page":"1-21","source":"Crossref","is-referenced-by-count":0,"title":["Wireless Sensor Network Coverage Optimization: Comparison of Local Search-Based Heuristics"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9009-049X","authenticated-orcid":true,"given":"Krzysztof","family":"Trojanowski","sequence":"first","affiliation":[{"name":"Cardinal Stefan Wyszy\u0144ski University in Warsaw, W\u00f3ycickiego 1\/3, Warsaw 01-938, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5038-1196","authenticated-orcid":true,"given":"Artur","family":"Mikitiuk","sequence":"additional","affiliation":[{"name":"Cardinal Stefan Wyszy\u0144ski University in Warsaw, W\u00f3ycickiego 1\/3, Warsaw 01-938, Poland"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of Wireless Sensor Networks: Theory and Practice","author":"W. Dargie","year":"2010"},{"issue":"2","key":"2","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/COMST.2017.2650979","article-title":"A survey of network lifetime maximization techniques in wireless sensor networks","volume":"19","author":"H. Yetgin","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101994"},{"article-title":"Heuristic optimization of a sensor network lifetime under coverage constraint","author":"K. Trojanowski","key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-67074-4_41"},{"article-title":"Sensor network coverage problem: a hypergraph model approach","author":"K. Trojanowski","key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-67074-4_40"},{"article-title":"Application of local search with perturbation inspired by cellular automata for heuristic optimization of sensor network coverage problem","author":"K. Trojanowski","key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-78054-2_40"},{"key":"7","first-page":"296","article-title":"Simulated annealing application to maximum lifetime coverage problem in wireless sensor networks","volume":"36","author":"A. Tretyakova","year":"2015","journal-title":"Global Conference on Artificial Intelligence GCAI"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1177\/0037549715612579"},{"key":"9","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-981-10-4603-2_25","article-title":"Target coverage heuristics in wireless sensor networks","volume":"562","author":"Manju","year":"2016","journal-title":"Advanced Computing and Communication Technologies Proceedings of the 10th ICACCT"},{"article-title":"Power efficient organization of wireless sensor networks","author":"S. Slijepcevic","key":"10","doi-asserted-by":"crossref","DOI":"10.1109\/ICC.2001.936985"},{"article-title":"Set k-cover algorithms for energy efficient monitoring in wireless sensor networks","author":"Z Abrams","key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/984622.984684"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6615-6"},{"article-title":"Energy-efficient target coverage in wireless sensor networks","author":"M. Cardei","key":"13","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2005.1498475"},{"author":"C.-C. Lai","key":"14","article-title":"An effective genetic algorithm to improve wireless sensor network lifetime for large-scale surveillance applications"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2010.2040182"},{"issue":"3-4","key":"16","article-title":"A new mathematical formulation and a heuristic for the maximum disjoint set covers problem to improve the lifetime of the wireless sensor network","volume":"13","author":"N. Ahn","year":"2011","journal-title":"Ad Hoc and Sensor Wireless Networks"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3390\/s110201888"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.01.046"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2011.2129570"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.01.003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.2298\/csis180103023w"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108167"},{"article-title":"Power efficient monitoring management in sensor networks","author":"P. Berman","key":"23","doi-asserted-by":"crossref","DOI":"10.1109\/WCNC.2004.1311452"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.10.003"},{"author":"K. Deschinkel","key":"25","article-title":"A column generation based heuristic for maximum lifetime coverage in wireless sensor networks"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2011.2105"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1371-x"},{"article-title":"Application of evolutionary algorithms to maximum lifetime coverage problem in wireless sensor networks","author":"A. Tretyakova","key":"28","doi-asserted-by":"crossref","DOI":"10.1109\/IPDPSW.2013.96"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2013.11.001"},{"article-title":"Non disjoint set covers approach for wireless sensor networks lifetime optimization","author":"Y. E. E. Ahmed","key":"30","doi-asserted-by":"crossref","DOI":"10.1109\/IDAACS-SWS.2016.7805781"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.12.031"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.04.001"},{"article-title":"Heuristic and meta-heuristic approaches for energy-efficient coverage-preserving protocols in wireless sensor networks","author":"A. Tretyakova","key":"33","doi-asserted-by":"crossref","DOI":"10.1145\/3132114.3132119"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.09.049"},{"key":"35","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7997-1_72","article-title":"Coverage problems in sensor networks","author":"M. Cardei","year":"2013"},{"volume-title":"Coverage Control In Sensor Networks. Computer Communications and Networks","year":"2010","author":"B. Wang","key":"36"},{"volume-title":"Modeling, Scheduling and Optimization of Wireless Sensor Networks Lifetime","year":"2016","author":"Y. E. E. Ahmed","key":"37"},{"author":"X. Shen","key":"38","article-title":"Evenness evaluation in ad-hoc sensor networks"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3745358.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3745358.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3745358.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T17:05:15Z","timestamp":1668272715000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2022\/3745358\/"}},"subtitle":[],"editor":[{"given":"Jun","family":"He","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,11,12]]},"references-count":38,"alternative-id":["3745358","3745358"],"URL":"https:\/\/doi.org\/10.1155\/2022\/3745358","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"type":"electronic","value":"1687-9732"},{"type":"print","value":"1687-9724"}],"subject":[],"published":{"date-parts":[[2022,11,12]]}}}