- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 172783, 12 pages
Differential Evolution for Lifetime Maximization of Heterogeneous Wireless Sensor Networks
1College of Information and Technology, DongHua University, Shanghai 201620, China
2Institute of Information and Technology, Henan University of Traditional Chinese Medicine, Zhengzhou 450003, China
3Office of Putuo District, Ganquan Road Subdistrict, Shanghai 200065, China
Received 9 January 2013; Revised 1 February 2013; Accepted 12 February 2013
Academic Editor: Yang Tang
Copyright © 2013 Yulong Xu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Maximizing the lifetime of wireless sensor networks (WSNs) is a hot and significant issue. However, using differential evolution (DE) to research this problem has not appeared so far. This paper proposes a DE-based approach that can maximize the lifetime of WSN through finding the largest number of disjoint sets of sensors, with every set being able to completely cover the target. Different from other methods in the literature, firstly we introduce a common method to generate test data set and then propose an algorithm using differential evolution to solve disjoint set covers (DEDSC) problems. The proposed algorithm includes a recombining operation, which performs after initialization and guarantees at least one critical target’s sensor is divided into different disjoint sets. Moreover, the fitness computation in DEDSC contains both the number of complete cover subsets and the coverage percent of incomplete cover subsets. Applications for sensing a number of target points, named point-coverage, have been used for evaluating the effectiveness of algorithm. Results show that the proposed algorithm DEDSC is promising and simple; its performance outperforms or is similar to other existing excellent approaches in both optimization speed and solution quality.
The past two decades have witnessed the boom of wireless sensor networks (WSNs) and their applications, such as battlefield surveillance, environment supervision, traffic control, animal tracking, and home applications [1–5]. A key technology for various applications that involve long-term and low-cost monitoring, in other words, the fundamental criterion for evaluating a WSN, is the network lifetime , which is defined as the period that the network satisfies the application requirements. Since most devices of WSNs are powered by nonrenewable batteries, studies for prolonging the network lifetime have become one of the most significant and challenging issues in WSNs. Thus, how to maximize the network’s lifetime is a critical research topic in WSNs.
Various methods have been proposed for prolonging the lifetime of WSNs focusing on the issues of data processing , routing [8–11], device placement , topology management , and device control [14–16]. In a WSN where devices are densely deployed, a subset of the devices can already address the coverage and connectivity issues. Since it has been proven that the network connectivity of active sensors in complete coverage is guaranteed by having the communication range of each sensor at least twice of its sensing range [17, 18], thus, only the sensing coverage problem is researched in this paper.
In a WSN, coverage problem is an important issue, which determines how well an area of interest is monitored or tracked by sensors, and the device control approach that schedules the devices’ sleep/wakeup activities has shown to be promising [19, 20]. In general, random deployment is performed to place the sensors (dropping from a plane) to the target area. And a sensor generally has two operation modes, active mode and sleep mode . When in active mode, a sensor can carry out its full operations, such as sensing, computation, and communication. To maintain those operations, sensors need to consume a relatively large amount of energy. In contrast, a sensor in a sleep mode uses only a small amount of energy and can be awoken in a scheduled working interval for full operations. When a subset of sensors in the area can already cover the target area completely, the other sensors can be scheduled to be in the sleep mode to save energy; thus, if the number of subset is maxed, the lifetime of WSN is prolonged. In other words, maximizing the number of completely cover subset is a more direct way to maximize the network lifetime . Note that the target includes point target and area target; so the coverage problem is divided into point-coverage and area-coverage, respectively. Because the point target is the most common phenomenon in practical application, in this paper, the point-coverage problem is considered to maximize the lifetime of WSN by maximizing the number of completely cover subsets.
The problem of finding the maximum number of complete cover subsets is difficult because each subset must fulfill complete coverage to the target area, and the WSN can satisfy the surveillance task with only one subset of sensors active at any time. This problem in a WSN is called the disjoint set covers problem or the SET -cover problem, which has been proven to be nondeterministic polynomial complete (NPC) complex problem . In , a maximum cover using mixed integer programming (MC-MIP) algorithm is proposed to find the maximum number of complete cover subsets. In , Slijepcevic and Potkonjak proposed a greedy algorithm, which is named the most constrained minimally constraining covering (MCMCC) heuristic to completely cover the target area. In , Lai et al. firstly introduce gene algorithm to solve the point-coverage problems for WSN by finding the maximum number of complete cover subsets, termed GAMDSC. Recently, a novel hybrid genetic algorithm using a forward encoding scheme (STHGA) was proposed by Hu et al.  for lifetime maximization of WSN, which adopts a forward encoding scheme for chromosomes and sensor schedule transition operations.
Besides, from other perspectives to research wireless sensor networks such as evolutionary algorithm (EA) [26, 27] are promising direction. Furthermore, using other gene algorithms to research this problem is worth considering. Among the popular gene algorithms and their application in the recent years [28–31], differential evolution (DE) algorithm [32, 33] appears to be a competent candidate. Due to its original definition by Storn and Price , the DE algorithm and it’s variant are perceived as a reliable and versatile population-based heuristic optimization technique, which exhibits remarkable performance in a wide variety of application problems [35–40].
In this paper, a DE-based algorithm is presented for aiming at solving disjoint set covers problems for maximizing the WSN lifetime. The proposed algorithm, termed the differential evolution for solving disjoint set covers (DEDSC) problems, comprises the following features. Firstly, before running of DEDSC, test data set is produced by a common generation method, which includes the targets and sensors coverage information and the upper bound of disjoint set covers number (). And then, at initialization of DEDSC, the population is generated randomly; in each chromosome the value of gene is a random integer between [1, ]. After that, a recombination operation is performed to guarantee at least one critical target’s sensor is divided into different disjoint subsets. Fourthly, there are just two parameters in DEDSC, and the mutation strategy of DEDSC is “DE/best/1” differential evolution; the round number style is ceiling. Lastly, the fitness computation in our proposed algorithm considers both the number of complete cover subset and the coverage percent of incomplete cover subset. In general, these distinct features of DEDSC make it simple and effective to implement.
The rest of this paper is organized as follows: Section 2 defines the problem addressed in this paper. Section 3 describes the implementation of the proposed algorithm in detail and includes the encoding method of chromosomes, the design of the fitness function, the recombining operation, the crossover operation, and mutation operations. Experimental results and discussions are presented in Section 4. Finally, Section 5 draws a conclusion and provides guidelines for future research.
2. Disjoint Set Covers Problem
In this section, the problem of finding the maximum number of disjoint set covers in WSN is defined. And then we introduce a method for estimating an upper bound of the number of disjoint set covers.
2.1. Problem Definition
Suppose that, in an area, there are have a set of targets , and then randomly deploy a set of sensors in this area to monitor the targets. All of the sensors have sleep mode and active mode: in the active mode sensors can sense information of target, and assume sensors have the same sensing region, but in sleep mode they cannot sense due to saving energy. A target is said to be covered by a sensor if it lies within the sensing region of the sensor. In order to prolong the lifetime of WSN, we need find the maximum number of disjoint sensor covers. The problem can be solved via transformation to the DSC problem , which is defined that to find the maximum number of disjoint complete cover sets, and the corresponding cover set is satisfied [24, 25].
Every cover is a subset of , where the is the upper bound of disjoint set covers number . Namely, , and each can complete coverage to all of the targets. Beyond that, for every of belongs to at least one member of , and for any two different covers and , = . Take Figure 1 as an example; there are five sensors S1, S2, S3, S4, and S5 and four targets t1, t2, t3, and t4; every sensor has the same circular sensing region. Note that in the real applications, sensing region of a sensor can be an irregular shape .
2.2. Upper Bound of Disjoint Set Covers Number
In WSNs, the maximum number of disjoint set covers cannot exceed the maximum number of full cover subsets that satisfy the coverage constraint. Thus, the maximum number of full cover subsets () can be used as the upper limit of the number of disjoint set covers. It has been proven that finding the maximum number of full cover subsets is an NPC problem [21, 42], but we can compute the upper bound of the number of full cover subsets with the following method in test data sets.
When all the deployed sensors are active, all the targets are covered. For each target, it can be covered by at least one sensor. The targets which are covered by the minimum number of sensors is named critical targets, and their corresponding sensors are named critical sensors. It is worth noting that in the WSNs there maybe exists one or many critical targets, and each critical target has its own corresponding critical sensors. In the literature , the authors proposed term critical sensors which is just a special case; namely, there is just one critical target in WSNs. The number of sensors covering a critical target can be estimated by the upper bound of the number of full cover subsets [23, 25]. Therefore, the minimum number of sensors covered, which is denoted by , can be used as the upper bound of .
Take the case in Figures 1 and 2 as an example; for these targets, the covered sets by sensors are , , and . According to above analysis, there are three critical targets (, , and ), and each critical target is covered by 2 sensors; thus the upper of the is 2 ().
3. Differential Evolution for Maximizing the Disjoint Set Covers Problems
In this section, we will describe the DEDSC approach for maximizing the number of disjoint set covers problems in point-coverage targets WSN. Firstly, the test set generation algorithm is given. Then the implementation of the proposed DEDSC is presented step by step, including the initialization, the evaluation of the population, the recombination operations, and the crossover, mutation, and selection operations. For easy understanding, the notations used in this paper are shown uniform in Table 1.
3.1. The Test Data Set Generation Algorithm
According to the application of WSN in the real-world, sensors and targets are randomly deployed in the specific area. Thus the test data set needs to be randomly generated by algorithm; however, in all of the above literature [23–25], the test data set generation algorithm is not introduced. Therefore, a general test data set generation algorithm is given in this subsection. The pseudocode of this algorithm is shown in Pseudocode 1. Note that the code is described by Matlab language, and the bold words are inner functions or keywords in Matlab. For example, the cell is the cell structure type.
The test data set is obtained after running this algorithm, which contains the sensing information of every sensor (Scell), the information of every target covered (Tcell), the matrix of all critical targets and their corresponding critical sensors (Critial Target Matrix), and the upper limit of the number of disjoint set covers ().
3.2. The Representation of Chromosomes
It is known that to find disjoint covers is that each sensor randomly joins a group among prescribed groups. A group forms a cover if it can cover all targets. Based on this idea, we use integer representation to encode a grouping combination of sensors. The value of a gene indicates the index of the subset that the sensor joins , and thus the sensors with the same index number form a disjoint cover set.
For example, suppose a chromosome is = (2, 1, 2, 3, 1, 3, 2, and 1). It means that there are eight sensors and set 1, set 2, and set 3 three disjoint subsets in WSN. The set 1 contains sensor , , and , set 2 contains sensor , , and , and set 3 contains , . If each of the above three sets can completely cover all targets, it means that the number of disjoint set cover is 3. In application, the sensors with the gene value 1 are scheduled to be activated at first, the other sensors will be kept in a sleep mode until the second set of sensors is activated, and the sensors in set 3 are activated in the last scheduling.
3.3. Initialization and Recombination
According to the representation of chromosomes, we randomly generate an integer between 1 and as each gene value (subset number) in the initialization. The sensors with same gene value mean they form a subset. Take Figure 1 as an example, there are five sensors, and ; therefore after initialization a chromosome maybe is = (2, 1, 1, 1, 2), each gene value is random, and sensors , , and form subset 1; sensors , form subset 2.
After initialization a recombination operation is performed, which guarantees at least one critical target’s sensor is divided into different disjoint sets (subsets). Note that the recombination operation is different from the scattering in paper ; in this literature the authors assume there is only one critical target and scatter the corresponding sensors into different subsets. However, there maybe exist many critical targets in WSNs, and it is very difficult to scatter all of corresponding sensors into different subsets, this is likely an NP problem. Thus, our recombination operation considers every chromosome, randomly chooses a critical target, and recombines different gene values to their corresponding sensors. Take the chromosome as an example; after initialization the chromosome = (2, 1, 1, 1, and 2); then doing recombination operation, according to above analysis in Section 2.2, there are three critical targets , , and , which , , and . Thus randomly choose one critical target from , , and , suppose the target is chosen, and its corresponding sensors are scatted into different subset; one case is = 2, = 1. Namely, the chromosome became = (2, 1, 2, 1, 2); it is obvious that after recombination the has better fitness. The pseudocode of recombination is given in Pseudocode 2. It needs to explain that the code is described by Matlab language, and the bold words are inner functions or keywords in Matlab.
3.4. Objective Function
The objective fitness function of a chromosome in the population is defined as follow: where () is the number of disjoint complete cover sets and is the average coverage percentage of incomplete cover subset.
Actually, it is not difficult to calculate the average coverage percentage of incomplete cover subset in the point-coverage problem. Assume in a chromosome, the number of disjoint complete cover is , and then the number of incomplete cover subset is . For the th incomplete cover, if it can cover targets, then the average coverage of th incomplete cove subset is .
3.5. Differential Evolution for DSC Problem
Combined with the above analysis, this subsection introduces the detail of using differential evolution to solve DSC problem. Differential evolution  is a novel evolutionary algorithm, which has the following different mutation strategies which are frequently used in the literature:(1)“DE/rand/1” (2) “DE/best/1” (3)“DE/current-to-best/1” where the indices , , and are distinct integers uniformly chosen from the set , () is a difference vector to mutate the corresponding parent , is the best vector at the current generation , and is the mutation factor which usually ranges on the interval (0, 1). In classic DE, is a fixed parameter used to generate all mutation vectors at all generations, while in many adaptive DE algorithms each individual is associated with its own mutation factor .
Following the mutation stage, a binomial crossover operator is implemented to enhance diversity of the population. In crossover operation, the target vector is connected with its corresponding mutant vector by using binomial crossover to generate a trial vector . The aforementioned scheme can be outlined in
The is a uniformly distributed random number with the range , different for each . denotes a user-defined parameter, called crossover probability, which determines how similar the trial vector will be with respect to the mutant vector. indicates a randomly selected integer which ensures at least one dimension of the trial vector will differ from its associated target vector . It has been proven that large values of improve variation and hence accelerate convergence speed, while small values promote exploitation.
Finally in selection operation, the selection operator is a one-to-one spawning strategy. In selection, the target vector competes against the trial vector according to their fitness values, and the better one will be selected to enter the next generation:
For using DE to solve the disjoint set cover problem systemically and concisely, we provide the flow chart and the pseudocode of basic DEDSE in Figure 3 and Pseudocode 3, respectively. Figure 3 contains all operation modules, and Pseudocode 3 shows the corresponding pseudocode.
From Figure 3 and Pseudocode 3, we summarize that the distinct features of DEDSC are as follows. Firstly, test data set is produced by generation algorithm before running DEDSC, and the overall ideal of DEDSC is differential evolution algorithm. Second is initialization, the population is generated randomly, and thus the value of genes in chromosome is a random integer between 1 and . After that, a recombination operation is performed to guarantee at least one critical target’s sensor is divided into different disjoint subsets.
Fourthly, there are just two parameters in DEDSC, and the mutation strategy of DEDSC is “DE/best/1” differential evolution; the round numbers style is ceiling. In addition, the fitness computation in our proposed algorithm considers not only the number of complete cover sets but also the coverage percent of incomplete cover sets. Lastly, termination condition of DEDSC is that the best fitness in current population equals or the generation of evolution greater than .
3.6. Runtime Complexity Analysis of DEDSC Algorithm
Runtimecomplexity analysis of the population-based stochastic search techniques, like DE, GA, and so forth, is a critical issue by its own right. In this section, we examine the computational complexity of the proposed DEDSC algorithm, which can be estimated based on the number of calculations of metrics and reproduction that are required.
Assuming NP is the number of individuals, namely, size of population, and is the dimension of problem; the serial DE model needs time algorithm for upgrading population and computing values and fitness object function. Hence, if the algorithm is terminated after a fixed number of generations , the overall runtime is .
In DEDSC, besides the fundamental operations for two parts of vectors, we have to take into account both of them. In our DEDSC, a recombination operation after initialization is proposed, which just performsone time in every time run. For each chromosome in NP, the best and the worst run complexity is and , respectively. Thus, the average complexity of recombination is . Therefore, the time complexity of DEDSC is .
The above formula reveals the proposed DEDSC is slightly higher than original algorithm on runtime complexity.
4. Simulation Experiment and Analysis
In this section, a series of experiments are performed to evaluate the performance of DEDSC. Since the proposed approach is for maximizing the number of disjoint sets cover in point-average WSNs, the state-of-the-art algorithms, that is, GAMDSC  and STHGA , are used for comparison.
4.1. Parameter and Test Environment Setting
It needs to explain that, if not specially stated, the experiments for DEDSC use the same parameters settings as the population size ; the rate of mutation and crossover are initialized and , respectively, in which value of and are empirical values. And in DEDSC, the mutation strategy is DE/best/1, the maximum number of evolution generation function evaluations (FES) is , and if the number of disjoint complete cover sets reaches , the algorithm also terminates. These parameters influence the performance of DEDSC, which will be analyzed in Sections 4.3 and 4.4.
Parameter settings of GAMDSC and STHGA can be referred in [24, 25]. For DEDSC and other referred algorithms, each case is tested 100 times independently, the sensors are deployed in a 50 × 50 rectangle area, and the coordinates of sensors’ locations are randomly generated as float-point values in . All cases are run by a computer with a Core I3 2.8 GHz CPU. We use the proposed generated test data set algorithm to obtain the test cases 1–7 and show the details of these test cases in Table 2.
4.2. Overall Test for DEDSC and Referred Algorithm
In this subsection, the overall test for DEDSC and comparison of referred optimization algorithms are provided in Table 3. The best result among those methods is shown by Boldface in the table. The “ok%” indicates the percent to find in 100 runs, “Best” is the best result in algorithm, “Mean” indicates the mean value of 100 runs, and the “avgE” denotes the average of evolution generation when finding .
From Table 3, it can be observed that the proposed DEDSC is significant improvement rather than GAMDSC in cases 1-2 and 4–7; in case 3 they have equal performance. Moreover, the proposed DEDSC algorithm almost has the same performance as the STHGA, and it can reach a hundred percent to find in all cases except for case 6. However, the result shows that our proposed DEDSC need the least evolution generation to find in cases 1–5 and case 7, which implies the DEDSC has the most fast convergence rate.
In order to analyze the performance of DEDSC detailed, the average optimization curves of DEDSC in cases 1 and 6 are provided in Figures 4 and 5, respectively. From Figures 4 and 5 we can conclude that DEDSC finds the best result much faster than other two methods which benefit from differential evolution and the comprehensive evaluation of fitness; due to the recombination operation, DEDSC has the best initial population. In general, the traditional intelligence method, that is, Genetic Algorithm, has better initial population than STHGA, that is because the GA randomly generates group number, but STHGA generates index increase by degrees. It is can be seen from Figures 4 and 5 STHGA has the least number of complete cover sets in initialization; the performance of STHGA, stable progressive increase, and it easily finds global optima because of the forward encoding scheme. DEDSC has better convergence rate and initial population than STHGA. However, in the later stage of evolution it may fall into the local optimal solution. That is, the reason for our proposed DEDSC is not better than STHGA in case 6.
4.3. Test for the Method of Round Numbers
In this subsection, the different way of round numbers and mutation are tested. The used test data is cases 1 to 7 are shown in Table 2.
After mutation operation, the value of gene maybe is float type, but the index of subset is integer type; therefore, it needs to do round number operation for population. There are there popular ways for round number operation, ceiling, floor, and round. In order to find which method is more suitable for DEDSC, all of three ways are tested and compared in Table 4.
Table 4 reports the experimental results of the three methods for round numbers in 100 independent runs. And these tests are used in mutation strategy “DE/rand/1”; parameter value are F = 0.5, = 0.3. The best result among those methods is indicated by Boldface in the table. The results show that different round number methods have different performances. Specifically, with ceiling methods the performance and convergence rate of DEDSC is better than other methods in all cases especially in cases 5 and 6; thus as a conclusion, the ceiling round number methods are applied suitably in our DEDSC algorithm.
4.4. Test for Mutation Strategy and ,
There are many mutation strategies in DE, such as “DE/rand/1,” “DE/best/1,” and “DE/current-to-best/1.” Meanwhile there are two important parameters and in DE. Therefore, finding the suitable mutation strategy and , are significant to the performance of DEDSC. In this subsection, we apply many popular mutations and , for testing DEDSC. The used test data sets are cases 1 to 7, and each test averaged over 100 independent runs with FES, and the used round numbers method is ceiling.
Here, we provide an overall performance comparison between these tests in Tables 5, 6, and 7. The better result among those is indicated by Boldface in the table. Storn and Price in  have indicated that a reasonable value for is usually between 0.4 and 1, and a good initial choice of was 0.5. The parameter controls how many parameters in expectation are changed in a population member. Feoktistov and Janaqi  claimed that a plausible choice of the crossover rate is between [0.3, 0.9]. Recently, the authors in  state that should lie in (0, 0.2) when the function is separable, while in (0.9, 1) when the function’s parameters are dependent. For the disjoint set covers problem it likely belongs to separable function; so we apply and as comparison, respectively, and provide the detail results in Tables 5–7.
From Tables 5–7, it can be seen that the “DE/best/1” strategy with and provides the best performance on cases 1–7. To be specific, considering the values of and in each mutation strategy, it is observed that using and the results are better than that using and . In especially the cases 1, 5, and 6, the performance of using the former parameter combinations significantly improves.
On the other hand, consider the mutation strategy with different values of and . Tables 5–7 show that only using “DE/best/1” strategy can reach 100 percent success rates to find in case 5. And in case 6 the performance of using “DE/best/1” strategy is 87, which is the best in the three mutation strategies.
4.5. Test for DE Variants with Self-Adaptive Parameters
In this subsection, we study the effect of DE’s variants which with self-adaptive parameter control strategy.
Inspired by “jDE”  we humbly employ the self-adaptive scheme to update parameters for solving the DSC problem, which can self-update to and among perform. Moreover, various mutation strategies are tested, and the comparison results are provided in Table 8.
In this subsection test, we not only apply the idea of self-adaptive in “jDE” to update and , but also test some variants of “jDE,” such that the various mutation strategies in “jDE” are tested. Note that in original “jDE,” the initialized , , and the mutation strategy is “DE/rand/1.” Therefore in this subsection test, and are used in all “jDE” and their variants, but different mutation strategies are applied in different variants.
Table 8 shows that in the case 5, DEDSC outperforms “jDE” and its variants significantly, only DEDSC can attain 100 percent success rate to find . In case 1, both DEDSC and “jDE/best/1” can achieve 100% success rate; the “jDE/current-to-best/1” and original “jDE” only reach 84% and 94%, respectively. This means that the original “jDE” maybe is not very suitable for this problem, and the mutation strategy “/best/1” is better than others. Consider case 6, all of those algorithms cannot reach 100% success rate, original “jDE” shows the best performance, and our proposed DEDSC ranks second. It implies that our algorithm maybe lost in local optimum and needs more suitable control parameters to improve its performance.
As a conclusion, DEDSC is the best among the three algorithms in comparison to cases 1, 5, and 6. However, because the performance of DEDSC is not better than STHGA in case 6, we intend to study more suitable parameters in the future work.
Considering maximizing the lifetime of wireless sensor networks, our paper here proposes using differential evolution to solve this optimization problem, in which algorithm is termed DEDSC.
In DEDSC, there are just two parameters, mutate factor rate and crossover rate . The major features of DEDSC are recombination operation and fitness computation, and the former guarantees at least one critical target’s sensor is divided into different disjoint sets. This is a very important operation; especially there are many critical targets in test data set. Our method for computing fitness not only considers the number of complete cover subset, but also contains the cover percent of those incomplete cover subsets. To verify the DEDSC’s effectiveness, an extensive performance comparison has been conducted over 7 commonly used test cases.
The experimental results suggested that its overall performance was better than GAMDSC and almost same as STHGA. Considering on the convergence rate, DEDSC needs the least evolution generations to find among the above algorithms. Moreover, a scalability study test was carried out using the different parameters and mutation strategies for DEDSC. In addition, for updating the parameter self-adaptive we tentatively combine “jDE” with DEDSC for comparing, and three “jDE” mutation strategies are tested. From the above results we obtain that the DEDSC with “DE/best/1” mutation strategy and F = 0.5, = 0.3 have promising performance to maximize the lifetime of WSN.
However, using other self-adaptive parameter schemes, such as “JADE” , to improve the performance of DEDSC is a future direction for the algorithm.
Furthermore, there are many evolutionary algorithms such as ant colony optimization (ACO) have been applied to research the problem of WSN. Therefore, our further research work is possible to study ACO [21, 26] for improving the performance of our method. Some possible experimental research is now under our investigation in algorithm design and test.
Y. Xu and J. Fang contributed equally to this work.
This paper was supported by the Key Creative Project of Shanghai Education Community (13ZZ050) and the Key Foundation Project of Shanghai (12JC1400400). The authors are grateful to the Editor-in-Chief, Associate Editor, and anonymous reviewers for their constructive suggestions that helped to improve the content as well as the quality of the paper.
- T. D. Raty, “Survey on contemporary remote surveillance systems for public safety,” IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 40, no. 5, pp. 493–515, 2010.
- I. F. Akyildiz, T. Melodia, and K. R. Chowdury, “Wireless multimedia sensor networks: a survey,” IEEE Wireless Communications, vol. 14, no. 6, pp. 32–39, 2007.
- M. Younis and K. Akkaya, “Strategies and techniques for node place-ment in wireless sensor networks: a survey,” Ad Hoc Networks, vol. 6, no. 4, pp. 621–655, 2008.
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002.
- J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008.
- I. Dietrich and F. Dressler, “On the lifetime of wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 5, no. 1, article 5, 2009.
- F. Marcelloni and M. Vecchio, “A simple algorithm for data compression in wireless sensor networks,” IEEE Communications Letters, vol. 12, no. 6, pp. 411–413, 2008.
- S. Yang, H. Cheng, and F. Wang, “Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks,” IEEE Transactions on Systems, Man and Cybernetics Part C, vol. 40, no. 1, pp. 52–63, 2010.
- S. Okdem and D. Karaboga, “Routing in wireless sensor networks using an Ant Colony optimization (ACO) router chip,” Sensors, vol. 9, no. 2, pp. 909–921, 2009.
- F. Ge, Y. Wang, Q. Wang, and J. Wang, “Energy efficient broadcasting based on ant colony optimization in wireless sensor networks,” in Proceedings of the 3rd International Conference on Natural Computation ( ICNC '07), pp. 129–133, Haiko, China, 2007.
- A. Acharya, A. Seetharam, A. Bhattacharyya, and M. K. Naskar, “Balanc-ing energy dissipation in data gathering wireless sensor networks using ant colony optimization,” in Proceedings of the International Conference on Distributed Computing and Networking (ICDCN '09), pp. 437–443, Hyderabad, India, 2009.
- C.-Y. Chang, J.-P. Sheu, Y.-C. Chen, and S.-W. Chang, “An obstacle-free and power-efficient deployment algorithm for wireless sensor networks,” IEEE Transactions on Systems, Man, and Cybernetics Part A, vol. 39, no. 4, pp. 795–806, 2009.
- H. Chen, C. K. Tse, and J. Feng, “Impact of topology on performance and energy efficiency in wireless sensor networks for source extraction,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 886–897, 2009.
- Y. Liang, J. Cao, L. Zhang, R. Wang, and Q. Pan, “A biologically inspired sensor wakeup control method for wireless sensor networks,” IEEE Transactions on Systems, Man and Cybernetics Part C, vol. 40, no. 5, pp. 525–538, 2010.
- R. Tharmarasa, T. Kirubarajan, and M. L. Hernandez, “Large-scale op-timal sensor array management for multi-target tracking,” IEEE Transactions Systems, Man, and Cybernetics, Part C, vol. 37, no. 5, pp. 803–814, 2007.
- R. Tharmarasa, T. Kirubarajan, J. Peng, and T. Lang, “Optimization-based dynamic sensor management for distributed multitarget tracking,” IEEE Transactions on Systems, Man and Cybernetics Part C, vol. 39, no. 5, pp. 534–546, 2009.
- D. Tian and N. D. Georganas, “Connectivity maintenance and coverage preservation in wireless sensor networks,” Ad Hoc Networks, vol. 3, no. 6, pp. 744–761, 2005.
- H. Zhang and J. C. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Ad Hoc and Sensor Wireless Networks, vol. 1, no. 1-2, pp. 89–124, 2005.
- T. R. Park, K. J. Park, and M. J. Lee, “Design and analysis of asynchronous wakeup for wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 11, pp. 5530–5541, 2009.
- G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, “Energy conservation in wireless sensor net works: a survey,” Ad Hoc Networks, vol. 7, no. 3, pp. 537–568, 2009.
- Y. Lin, J. Zhang, S. H. Chung, and Y. Li, “An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks,” IEEE Transactions on Systems, Man, and Cybernetics Part C, vol. 42, no. 3, pp. 408–420, 2012.
- M. Cardei and D. Z. Zhang, “Improving wireless sensor network lifetimethrough power aware organization,” Wireless Networks, vol. 11, no. 3, pp. 333–340, 2005.
- S. Slijepcevic and M. Potkonjak, “Power efficient organization of wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '01), vol. 2, pp. 472–476, Helsinki, Finland, 2001.
- C. C. Lai, C. K. Ting, and R. S. Ko, “An effective genetic algorithm to improve wireless sensor network lifetime for large-scale surveillance applications,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '07), pp. 3531–3538, 2007.
- X. M. Hu, J. Zhang, Y. Yu et al., “Hybrid genetic algorithm using a forward encoding scheme for lifetime maximization of wireless sensor networks,” IEEE Transactions on Evolutionary Computation, vol. 14, no. 5, pp. 766–781, 2010.
- Y. P. Zhong, P. W. Huang, and B. Wang, “Maximum lifetime routing based on ant colony algorithm for wireless sensor networks,” in Proceedings of the IET Conference on Wireless, Mobile and Sensor Networks, pp. 789–792, Shanghai, China, 2007.
- Q. Zhao and M. Gurusamy, “Lifetime maximization for connected target coverage in wireless sensor net works,” IEEE/ACM Transactions on Networking, vol. 16, no. 6, pp. 1378–1391, 2008.
- Y. Tang, Z. Wang, and J. A. Fang, “Controller design for synchronization of an array of delayed neural networks using a controllable probabilistic PSO,” Information Sciences, vol. 181, no. 20, pp. 4715–4732, 2011.
- M. Dorigo and L. M. Gambardella, “Ant colony system: a cooperativelearning approach to the traveling salesman problem,” IEEE Transactions on Evolutionary Computation, vol. 1, no. 1, pp. 53–66, 1997.
- Y. Tang, Z. Wang, and J. Fang, “Feekback learning particle swarm optimization,” Applied Soft Computing, vol. 11, pp. 4713–4725, 2011.
- Y. Tang and H. J. Gao, “Distributed synchronization in networks of agent systems with nonlinearities and random switchings,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 43, no. 1, pp. 358–370, 2013.
- S. Das and P. N. Suganthan, “Differential evolution: a survey of the state-of-the-art,” IEEE Transactions on Evolutionary Computation, vol. 15, no. 1, pp. 4–31, 2011.
- W. Zhu, J. A. Fang, Y. Tang, W. B. Zhang, and Wei Du, “Digital IIR filters design using differential evolution algorithm with a controllable probabilistic population size,” PLoS ONE, vol. 7, no. 7, Article ID e40549, 2012.
- R. Storn and K. Price, “Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces,” Journal of Global Optimization, vol. 11, no. 4, pp. 341–359, 1997.
- Y. Tang, Z. Wang, H. Gao, S. Swift, and J. Kurths, “A constrained evolutionary computation method for detecting controlling regions of cortical networks,” IEEE Transactions on Computational Biology and Bioinformatics, vol. 9, pp. 1569–1581, 2012.
- W. Zhu, Y. Tang, J. A. Fang, and W. B. Zhang, “Adaptive population tuning scheme for differential evolution,” Information Sciences, vol. 223, pp. 164–191, 2013.
- W. Zhu, J. A. Fang, Y. Tang, W. B. Zhang, and Y. L. Xu, “Identification of fractional-order systems via a switching differential evolution subject to noise perturbations,” Physics Letters A, vol. 376, pp. 3113–3120, 2012.
- Y. Tang, H. J. Gao, J. Kurths, and J. A. Fang, “Evolutionary pinning control and its application in uav coordination,” IEEE Transactions on Industrial Informatics, vol. 8, pp. 828–838, 2012.
- J. Brest, S. Greiner, B. Boskovic, et al., “Self-adapting control parameters in differential evolution: a comparative study on numerical benchmark problems,” IEEE Transactions on Evolutionary Computation, vol. 10, no. 6, pp. 646–657, 2006.
- J. Zhang and A. C. Sanderson, “JADE: adaptive differential evolution with optional external archive,” IEEE Transactions on Evolutionary Computation, vol. 13, no. 5, pp. 945–958, 2009.
- Q. Cao, T. Yan, J. Stankovic, and T. Abdelzaher, “Analysis of target detection performance for wireless sensor networks,” in Proceedings of the 1st IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '05), pp. 276–292, July 2005.
- A. Boukerche, X. Fei, and R. B. Araujo, “An optimal coverage-preserving scheme for wireless sensor networks based on local information exchange,” Computer Communications, vol. 30, no. 14-15, pp. 2708–2720, 2007.
- V. Feoktistov and S. Janaqi, “Generalization of the strategies in differential evolution,” in Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04), p. 165, April 2004.
- J. Ronkkonen, S. Kukkonen, and K. V. Price, “Real parameter optimiza-tion with differential evolution,” in Proceedings of the IEEE Congress on Evolutionary Computation, vol. 1, pp. 506–513, 2005.