2017
DOI: 10.1007/s11036-017-0814-0
|View full text |Cite
|
Sign up to set email alerts
|

A Clonal Selection Algorithm for Energy-Efficient Mobile Agent Itinerary Planning in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 17 publications
0
5
0
1
Order By: Relevance
“…Over the last few years, mobile agent itinerary planning has drawn many researchers' attention in the field of WSNs. Many of these research efforts are towards optimizing and constructing an energy efficient itinerary planning mechanism [6,7,8,9,10,11,12,13]. One of the early work is proposed in [6] in which the authors have developed two heuristic algorithm to calculate the itinerary of the mobile agent namely local closest first (LCF) and global closest first (GCF).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Over the last few years, mobile agent itinerary planning has drawn many researchers' attention in the field of WSNs. Many of these research efforts are towards optimizing and constructing an energy efficient itinerary planning mechanism [6,7,8,9,10,11,12,13]. One of the early work is proposed in [6] in which the authors have developed two heuristic algorithm to calculate the itinerary of the mobile agent namely local closest first (LCF) and global closest first (GCF).…”
Section: Related Workmentioning
confidence: 99%
“…A new immune inspired algorithm, called the Clonal Selection Algorithm for Multi-agent Itinerary Planning (CSA-MIP), is proposed by the authors in [9] to solve the MIP problem in WSNs. The important components of CSA-MIP, including the encoding method, mutation operators, cloning of antibodies, and affinity function.…”
Section: Related Workmentioning
confidence: 99%
“…Many immune inspired algorithms have been proposed and proved to work in various engineering problems [20] [21] [22] [23]. Furthermore, some immune operators, such as hypermutation operation, receptor editing have been demonstrated to help algorithms to escape from a local optimum [24] [25] [26].…”
Section: Introductionmentioning
confidence: 99%
“…Para isso, a proposta revisita o conceito de AMs, que percorrem um itinerário, ou caminho, que inclui nós fontes de um determinado dado de interesse, como definido a priori pelo gateway da rede para a coleta. Diferente de propostas anteriores [Lu et al 2019, Chou and Nakajima 2018, Liu et al 2016, porém, há a coleta oportunista de dados, o que significa que dados podem ser coletados nos nós intermediários, mesmo se estes não forem nós fontes dos dados de interesse, e agregados ao agente. Como o encaminhamento das mensagensé feito por múltiplos saltos, a coleta oportunista pode ser realizada de forma eficiente através do uso do método de otimização discreta Knapsack.…”
Section: Introductionunclassified