2012
DOI: 10.1016/j.asoc.2011.05.036
|View full text |Cite
|
Sign up to set email alerts
|

Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 133 publications
(73 citation statements)
references
References 7 publications
0
69
0
Order By: Relevance
“…There are models for efficient energy consumption in MANETs [5], WAHSNs [10], WSNs [54], and many others. The energy consumption model used in this work is based in [55], this model is also used in [26].…”
Section: Energy Consumptionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are models for efficient energy consumption in MANETs [5], WAHSNs [10], WSNs [54], and many others. The energy consumption model used in this work is based in [55], this model is also used in [26].…”
Section: Energy Consumptionmentioning
confidence: 99%
“…Sensor distribution is one of the fundamental problems in WAHSNs and regularly has been suboptimally solved by heuristic strategies such as genetic algorithms, among several others as shown by [4][5][6][7][8]. It is worth mentioning that sensor distribution with minimum energy connectivity is an NP-complete problem [9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A vector corresponding to an optimal Pareto solution is mentioned as a non-dominated vector. To draw the aim function, a set of all solutions which are non-dominated are used that are called the Pareto forefronts [11,12,13].…”
Section: Multi-objective Optimizationmentioning
confidence: 99%
“…In [31] a cluster-based protocol uses randomized rotation of local CHs to evenly distribute the energy load among sensors in the network. In [32] optimal CH selection is done using multi-objective particle swarm optimization. The above approaches do not consider security of the protocols or techniques that are used for cluster formation.…”
Section: Related Workmentioning
confidence: 99%