{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:33Z","timestamp":1740140553275,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T00:00:00Z","timestamp":1576454400000},"content-version":"vor","delay-in-days":15,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Unmanned aerial vehicles (UAVs) in wireless communication have received significant interests recently due to its low cost and flexibility in providing wireless connectivity in areas without infrastructure coverage. In this paper, we optimize the location of UAVs to maximize their coverage areas. We propose a modified artificial bee colony (MABC) incorporating bee number reallocation and a new search equation. In the proposed algorithm, a greater number of bees in the population are assigned to execute local searches near food sources to enhance solution accuracy, and the bees are guided by elite vectors to enable the algorithm to rapidly converge to a potentially globally optimal position. The deployment of UAVs is thus obtained. The experimental results show that the proposed algorithm achieves great improvements over the traditional algorithm.<\/jats:p>","DOI":"10.1186\/s13638-019-1593-z","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T14:02:48Z","timestamp":1576504968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A modified algorithm for computation issues in UAV-enabled wireless communications"],"prefix":"10.1186","volume":"2019","author":[{"given":"Bing","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xiaojian","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6548-3002","authenticated-orcid":false,"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"issue":"5","key":"1593_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2016.7470933","volume":"54","author":"Y. Zeng","year":"2016","unstructured":"Y. Zeng, R. Zhang, T. J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun. Mag.54(5), 36\u201342 (2016).","journal-title":"IEEE Commun. Mag."},{"key":"1593_CR2","doi-asserted-by":"publisher","unstructured":"F. Cheng, G. Guan, N. Zhao, F. R. Yu, Y. Chen, J. Tang, H. Sari, in Proc. ICNC\u201918. Caching UAV assisted secure transmission in small-cell networks, (2018), pp. 1\u20136. https:\/\/doi.org\/10.1109\/iccnc.2018.8390316.","DOI":"10.1109\/iccnc.2018.8390316"},{"issue":"1","key":"1593_CR3","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/LSP.2015.2504559","volume":"23","author":"C. Li","year":"2016","unstructured":"C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Adaptive overhearing in two-way multi-antenna relay channels. IEEE Signal Process. Lett.23(1), 117\u2013120 (2016).","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"1593_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MWC.2015.7143331","volume":"22","author":"H. Zhang","year":"2015","unstructured":"H. Zhang, C. Jiang, J. Cheng, V. C. M. Leung, Cooperative interference mitigation and handover management for heterogeneous cloud small cell networks. IEEE Wirel. Commun.22(3), 92\u201399 (2015).","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"1593_CR5","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1109\/TWC.2017.2688328","volume":"16","author":"Y. Zeng","year":"2017","unstructured":"Y. Zeng, R. Zhang, Energy-efficient UAV communication with trajectory optimization. IEEE Trans. Wirel. Commun.16(6), 3747\u20133760 (2017).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"1593_CR6","doi-asserted-by":"publisher","first-page":"3796","DOI":"10.1109\/TVT.2015.2441879","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Multiuser overhearing for cooperative two-way multiantenna relays. IEEE Trans. Veh. Technol.65(5), 3796\u20133802 (2016).","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1593_CR7","doi-asserted-by":"publisher","unstructured":"W. Wu, F. Zhou, P. Li, P. Deng, B. Wang, V. C. M. Leung, in 2019 IEEE International Conference on Communications (ICC). Energy-efficient secure NOMA-enabled mobile edge computing networks, (2019). to appear. https:\/\/doi.org\/10.1109\/icc.2019.8761823.","DOI":"10.1109\/icc.2019.8761823"},{"issue":"5","key":"1593_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/JSAC.2012.120614","volume":"30","author":"F. Jiang","year":"2012","unstructured":"F. Jiang, A. L. Swindlehurst, Optimization of UAV heading for the ground-to-air uplink. IEEE J. Sel. Areas Commun.30(5), 993\u20131005 (2012).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"1593_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2018.1700431","volume":"56","author":"Haichao Wang","year":"2018","unstructured":"H. Wang, G. Ding, F. Gao, J. Chen, J. Wang, L. Wang, Power control in UAV-supported ultra dense networks: communications, caching, and energy transfer. IEEE Commun. Mag. (2018). to appear. https:\/\/doi.org\/10.1109\/mcom.2018.1700431.","journal-title":"IEEE Communications Magazine"},{"issue":"8","key":"1593_CR10","doi-asserted-by":"publisher","first-page":"1652","DOI":"10.1109\/TSMC.2019.2899366","volume":"49","author":"C. Jie","year":"2019","unstructured":"C. Jie, Z. Bu, Y. Wang, H. Yang, J. Jiang, H. Li, Detecting prosumer-community group in smart grids from the multiagent perspective. IEEE Trans. Syst. Man Cybern. Syst.49(8), 1652\u20131664 (2019).","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"3","key":"1593_CR11","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/LCOMM.2016.2633248","volume":"21","author":"J. Lyu","year":"2017","unstructured":"J. Lyu, Y. Zeng, R. Zhang, T. J. Lim, Placement optimization of UAV-mounted mobile base stations. IEEE Commun. Lett.21(3), 604\u2013607 (2017).","journal-title":"IEEE Commun. Lett."},{"key":"1593_CR12","doi-asserted-by":"publisher","unstructured":"Z. Bu, J. Li, C. Zhang, J. Cao, A. Li, Y. Shi, Graph K-means based on leader identification, dyname game, and opinion dynamics. IEEE Trans. Knowl. Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2019.2903712.","DOI":"10.1109\/TKDE.2019.2903712"},{"issue":"8","key":"1593_CR13","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/LCOMM.2016.2578312","volume":"20","author":"M. Mozaffari","year":"2016","unstructured":"M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. IEEE Commun. Lett.20(8), 1647\u20131650 (2016).","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"1593_CR14","first-page":"531","volume":"61","author":"C. Li","year":"2014","unstructured":"C. Li, F. Sun, J. M. Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst. 61(7), 531\u2013535 (2014).","journal-title":"IEEE Trans. Circ. Syst."},{"issue":"8","key":"1593_CR15","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1109\/TSMC.2019.2895060","volume":"49","author":"J. Liu","year":"2019","unstructured":"J. Liu, Y. Gu, L. Zha, Y. Liu, J. Cao, Event-triggered H-infinity load frequency control for multi-area power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst.49(8), 1665\u20131678 (2019).","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"11","key":"1593_CR16","doi-asserted-by":"publisher","first-page":"10055","DOI":"10.1109\/TVT.2017.2744982","volume":"66","author":"Wei Wu","year":"2017","unstructured":"W. Wu, B. Wang, Y. Zeng, H. Zhang, Z. Yang, Z. Deng. Robust secure beamforming for wireless powered full-duplex systems with self-energy recycling, (2017). to be published in. https:\/\/doi.org\/10.1109\/tvt.2017.2744982.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"1593_CR17","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1109\/TCSI.2019.2930572","volume":"66","author":"Jinliang Liu","year":"2019","unstructured":"J. Liu, M. Yang, E. Tian, J. Cao, S. Fei, Event-based security controller design for state-dependent uncertain systems under hybrid-attacks and its application to electronic circuits. IEEE Trans. Circ. Syst. I Regular Pap. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/TCSI.2019.2930572.","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"1","key":"1593_CR18","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TVT.2015.2389826","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, S. Zhang, P. Liu, F. Sun, J. M. Cioffi, L. Yang, Overhearing protocol design exploiting inter-cell interference in cooperative green networks. IEEE Trans. Veh. Technol.65(1), 441\u2013446 (2016).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"1593_CR19","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1109\/LCOMM.2015.2451179","volume":"19","author":"W. Wu","year":"2015","unstructured":"W. Wu, N. Wang, Efficient transmission solutions for MIMO wiretap channels with SWIPT. IEEE Commun. Lett.19(9), 1548\u20131551 (2015).","journal-title":"IEEE Commun. Lett."},{"issue":"8","key":"1593_CR20","doi-asserted-by":"publisher","first-page":"6765","DOI":"10.1109\/TVT.2015.2472456","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, L. Yang, Spectral-efficient cellular communications with coexistent one- and two-hop transmissions. IEEE Trans, Veh. Technol.65(8), 6765\u20136772 (2016).","journal-title":"IEEE Trans, Veh. Technol."},{"key":"1593_CR21","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.ins.2014.12.043","volume":"300","author":"M. S. Kiran","year":"2015","unstructured":"M. S. Kiran, H. Hakli, M. Gunduz, et al., Artificial bee colony algorithm with variable search strategy for continuous optimization. Inform. Sci.300:, 140\u2013157 (2015).","journal-title":"Inform. Sci."},{"key":"1593_CR22","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.asoc.2015.12.046","volume":"41","author":"X. Li","year":"2016","unstructured":"X. Li, G. Yang, Artificial bee colony algorithm with memory. App. Soft. Comput.41:, 362\u2013372 (2016).","journal-title":"App. Soft. Comput."},{"key":"1593_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.knosys.2016.05.052","volume":"107","author":"Y. Shi","year":"2016","unstructured":"Y. Shi, C. M. Pun, H. Hu, et al., An improved artificial bee colony and its application. Knowl. Syst.107:, 14\u201331 (2016).","journal-title":"Knowl. Syst."},{"issue":"2","key":"1593_CR24","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1063\/1.4823159","volume":"7","author":"K. Binder","year":"1993","unstructured":"K. Binder, D. Heermann, L. Roelofs, et al., Monte carlo simulation in statistical physics. Comput. Phys.7(2), 156\u2013157 (1993).","journal-title":"Comput. Phys."},{"issue":"2","key":"1593_CR25","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1103\/PhysRevLett.58.86","volume":"58","author":"R. H. Swendsen","year":"1987","unstructured":"R. H. Swendsen, J. S. Wang, Nonuniversal critical dynamics in monte carlo simulations. Phys. Rev. Lett.58(2), 86 (1987).","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1593_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/0304-405X(77)90005-8","volume":"4","author":"P. P. Boyle","year":"1977","unstructured":"P. P. Boyle, Options: a monte carlo approach. J. Finan. Econ.4(3), 323\u2013338 (1977).","journal-title":"J. Finan. Econ."},{"issue":"2","key":"1593_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/4235.771163","volume":"3","author":"X. Yao","year":"1999","unstructured":"X. Yao, Y. Liu, G. Lin, Evolutionary programming made faster. IEEE Trans. Evol. Comput.3(2), 82\u2013102 (1999).","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"1593_CR28","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s10898-004-9972-2","volume":"31","author":"M. M. Ali","year":"2005","unstructured":"M. M. Ali, C. Khompatraporn, Z. B. Zabinsky, A numerical evaluation of several stochastic algorithms on selected continuous global optimization test problems. J. Global. Optim.31(4), 635\u2013672 (2005).","journal-title":"J. Global. Optim."},{"key":"1593_CR29","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ins.2013.07.005","volume":"250","author":"H. Gao","year":"2013","unstructured":"H. Gao, S. Kwong, J. Yang, et al., Particle swarm optimization based on intermediate disturbance strategy algorithm and its application in multi-threshold image segmentation. Inform. Sci.250:, 82\u2013112 (2013).","journal-title":"Inform. Sci."},{"issue":"8","key":"1593_CR30","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1002\/sim.6026","volume":"33","author":"P. Wu","year":"2014","unstructured":"P. Wu, Y. Han, T. Chen, et al., Causal inference for Mann-Whitney-Wilcoxon rank sum and other nonparametric statistics. Stat. Med.33(8), 1261\u20131271 (2014).","journal-title":"Stat. Med."},{"issue":"3","key":"1593_CR31","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1080\/00949655.2013.825721","volume":"85","author":"L. De Capitani","year":"2015","unstructured":"L. De Capitani, D. De Martini, Reproducibility probability estimation and testing for the Wilcoxon rank-sum test. J. Stat. Comput. Simul.85(3), 468\u2013493 (2015).","journal-title":"J. Stat. Comput. Simul."},{"issue":"4","key":"1593_CR32","first-page":"309","volume":"5","author":"R. C. Blair","year":"1980","unstructured":"R. C. Blair, J. J. Higgins, A comparison of the power of Wilcoxon\u2019s rank-sum statistic to that of Student\u2019s t statistic under various nonnormal distributions. J. Educ. Behav. Stat.5(4), 309\u2013335 (1980).","journal-title":"J. Educ. Behav. Stat."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1593-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1593-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1593-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:10:31Z","timestamp":1607991031000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1593-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1593"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1593-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"17 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"269"}}