{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:17:50Z","timestamp":1777702670513,"version":"3.51.4"},"reference-count":19,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T00:00:00Z","timestamp":1541980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,3,16]]},"abstract":"<jats:p>\n                    This study is to investigate the nonlinearly constrained various signal detector location allocation problems in which the types of detectors and the corresponding numbers and locations can be determined at the same time so as to minimize the maximum detecting failure rate in a specified area. In other words, the objective of the detector location allocation problem is to minimize the maximum failure rate by determining the best possible conjunction of three types of decision variables,\n                    <jats:italic>i.e.<\/jats:italic>\n                    , the type of detector, the numbers of each detector type and where to build up each of them with a limited resources. So, the quality of reliability of event detecting can be assured and consistent. By the way, the signal intensity usually disintegrates proportionally to some power of the distance from the detector. That makes the longer distance far away the detector, the bigger failure rate in detection of the event. The signal detector allocation problem is described as a mixed-integer nonlinear programming model, usually using math programming or heuristic optimization methods for finding the optimal solution or near optimal solution. While using the both methods, the difficulties encountered are the amount of decision variables and the difficulty of not violating the constraints. In this study, a two-phase evolutionary computation approach based on the immune algorithm and particle swarm optimization has been developed for overcoming the difficulties and finding the optimal solutions for the detector allocation problems effectively. Finally, the performance of the proposed methodology has been evaluated with the commercial optimization software. Numerical results illustrate that our approach is with well performance for the constrained detector allocation problems considered in this paper. As reported, solutions acquired by using our approach are as well as or better than those found by using LINGO\n                    <jats:sup>\u00ae<\/jats:sup>\n                    .\n                  <\/jats:p>","DOI":"10.3233\/jifs-169901","type":"journal-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T15:52:55Z","timestamp":1542124375000},"page":"1301-1310","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Using two-phase evolutionary computation approach for nonlinear constrained signal detectors allocation problems"],"prefix":"10.1177","volume":"36","author":[{"given":"Ta-Cheng","family":"Chen","sequence":"first","affiliation":[{"name":"Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan"},{"name":"Department of Information Management, National Formosa University, Yunlin, Taiwan"}]},{"given":"Sheng-Chuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Finance, Asia University, Taichung, Taiwan"}]},{"given":"Chun-Hui","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Formosa University, Yunlin, Taiwan"}]},{"given":"Ke-Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Formosa University, Yunlin, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2018,11,12]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2004.06.002"},{"key":"e_1_3_2_3_2","volume-title":"Artificial Immune Systems: A new Computational Intelligence Approach","author":"de Castro L.N.","year":"2000","unstructured":"L.N.de Castro and J.Timmis, Artificial Immune Systems: A new Computational Intelligence Approach, Springer, New York, 2000."},{"key":"e_1_3_2_4_2","first-page":"36","article-title":"The clonal selection algorithm with engineering applications","volume":"2000","author":"de Castro L.N.","year":"2000","unstructured":"L.N.de Castro and F.J.Von Zuben, The clonal selection algorithm with engineering applications, In Workshop Proceedings of the GECCO 2000 (2000), 36\u201337.","journal-title":"In Workshop Proceedings of the GECCO"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/07408179708966419"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0773-52"},{"key":"e_1_3_2_7_2","volume-title":"Cellular Selection and Regulation in the Immune Response","author":"Jerne N.K.","year":"1974","unstructured":"N.K.Jerne, Clonal selection in lymphocyte network, in: G.M.Edelman, ed., Cellular Selection and Regulation in the Immune Response, Raven Press, New York, 1974."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.077"},{"key":"e_1_3_2_9_2","first-page":"303","article-title":"The particle swarm: Social adaptation of knowledge","author":"Kennedy J.","year":"1997","unstructured":"J.Kennedy, The particle swarm: Social adaptation of knowledge, Proceedings of IEEE International Conference on Evolutionary Computation, 1997, pp. 303\u2013308.","journal-title":"Proceedings of IEEE International Conference on Evolutionary Computation"},{"key":"e_1_3_2_10_2","first-page":"1942","article-title":"Particle swarm optimization","author":"Kennedy J.","year":"1995","unstructured":"J.Kennedy and R.C.Eberhart, Particle swarm optimization, in Proceedings of IEEE International Conference on Neural Networks, Perth, Australia, IV, 1995, pp. 1942\u20131948.","journal-title":"in Proceedings of IEEE International Conference on Neural Networks"},{"key":"e_1_3_2_11_2","first-page":"187","volume":"22","author":"Farmer J.D.","year":"1986","unstructured":"J.D.Farmer, N.H.Packard and A.S.Perelson, The immune system, adaptation, and machine learning, Physica 22 (1986), 187\u2013204.","journal-title":"The immune system, adaptation, and machine learning, Physica"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/61.853014"},{"key":"e_1_3_2_13_2","author":"Love R.F.","year":"1988","unstructured":"R.F.Love, J.G.Morris and G.O.Wesolowsky, Facilities Locaton: Models and Methods, North-Holland, New York, 1988.","journal-title":"Facilities Locaton: Models and Methods"},{"key":"e_1_3_2_14_2","first-page":"225","volume-title":"Continuous location problems, in Facility Location: A Survey of Applications and Methods","author":"Plastria F.","year":"1995","unstructured":"F.Plastria, Continuous location problems, in Facility Location: A Survey of Applications and Methods, Z.Drezner, ed., Springer-Verlag, New York, 1995, pp. 225\u2013262."},{"key":"e_1_3_2_15_2","first-page":"69","article-title":"A modified particle swarm optimizer","author":"Shi Y.","year":"1998","unstructured":"Y.Shi and R.C.Eberhart, A modified particle swarm optimizer, in Proceeding of IEEE Congress on Evolutionary Computation Anchorage, Alaska, 1998, pp. 69\u201373.","journal-title":"in Proceeding of IEEE Congress on Evolutionary Computation Anchorage"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/24.510811"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2014.05.010"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2015.06.025"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169901","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169901","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:36:36Z","timestamp":1777455396000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169901"}},"subtitle":[],"editor":[{"given":"Wen-Hsiang","family":"Hsieh","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,11,12]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,16]]}},"alternative-id":["10.3233\/JIFS-169901"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169901","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,12]]}}}