{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T08:58:57Z","timestamp":1726477137895},"reference-count":80,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T00:00:00Z","timestamp":1660780800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1016\/j.eswa.2022.118627","type":"journal-article","created":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T23:28:17Z","timestamp":1661642897000},"page":"118627","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Online distributed evolutionary optimization of Time Division Multiple Access protocols"],"prefix":"10.1016","volume":"211","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1379-3778","authenticated-orcid":false,"given":"Anil","family":"Yaman","sequence":"first","affiliation":[]},{"given":"Tim","family":"van der Lee","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9723-1830","authenticated-orcid":false,"given":"Giovanni","family":"Iacca","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2022.118627_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115079","article-title":"RUN beyond the metaphor: an efficient optimization algorithm based on Runge Kutta method","volume":"181","author":"Ahmadianfar","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2022.118627_b2","series-title":"SIGCOMM conference","first-page":"206","article-title":"The evolution of layered protocol stacks leads to an hourglass-shaped architecture","author":"Akhshabi","year":"2011"},{"issue":"6","key":"10.1016\/j.eswa.2022.118627_b3","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.1007\/s11390-012-1293-1","article-title":"Synthesizing distributed protocol specifications from a UML state machine modeled service specification","volume":"27","author":"Al Dallal","year":"2012","journal-title":"Journal of Computer Science and Technology"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1002\/ett.2785","article-title":"STEM-net: an evolutionary network architecture for smart and sustainable cities","volume":"25","author":"Aloi","year":"2014","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.1016\/j.eswa.2022.118627_b5","series-title":"International conference on mobile adhoc and sensor systems","first-page":"1","article-title":"Embedding evolution in epidemic-style forwarding","author":"Alouf","year":"2007"},{"issue":"18","key":"10.1016\/j.eswa.2022.118627_b6","doi-asserted-by":"crossref","first-page":"3402","DOI":"10.1016\/j.comnet.2010.06.015","article-title":"Fitting genetic algorithms to distributed on-line evolution of network protocols","volume":"54","author":"Alouf","year":"2010","journal-title":"Computer Networks"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b7","doi-asserted-by":"crossref","first-page":"1996","DOI":"10.1109\/COMST.2014.2320099","article-title":"Machine learning in wireless sensor networks: Algorithms, strategies, and applications","volume":"16","author":"Alsheikh","year":"2014","journal-title":"Communications Surveys & Tutorials"},{"key":"10.1016\/j.eswa.2022.118627_b8","series-title":"DARPA information survivability conference and exposition. Vol. 1","first-page":"149","article-title":"The horus and ensemble projects: Accomplishments and limitations","author":"Birman","year":"2000"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/JSAC.2010.100102","article-title":"The autonomic network architecture (ANA)","volume":"28","author":"Bouabene","year":"2009","journal-title":"Journal on Selected Areas in Communications"},{"key":"10.1016\/j.eswa.2022.118627_b10","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3389\/frobt.2018.00012","article-title":"Embodied evolution in collective robotics: A review","volume":"5","author":"Bredeche","year":"2018","journal-title":"Frontiers in Robotics and AI"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b11","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/13873954.2011.601425","article-title":"Environment-driven distributed evolutionary adaptation in a population of autonomous robotic agents","volume":"18","author":"Bredeche","year":"2012","journal-title":"Mathematical and Computer Modelling of Dynamical Systems"},{"key":"10.1016\/j.eswa.2022.118627_b12","series-title":"The collected works of J. Richard B\u00fcchi","first-page":"525","article-title":"Solving sequential conditions by finite-state strategies","author":"B\u00fcchi","year":"1990"},{"issue":"2","key":"10.1016\/j.eswa.2022.118627_b13","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"Jan","key":"10.1016\/j.eswa.2022.118627_b14","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Dems\u0308ar","year":"2006","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1341431.1341436","article-title":"What would darwin think about clean-slate architectures?","volume":"38","author":"Dovrolis","year":"2008","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.eswa.2022.118627_b16","series-title":"Symbiotic multi-robot organisms: reliability, adaptability, evolution","first-page":"361","article-title":"Embodied, on-line, on-board evolution for autonomous robotics","author":"Eiben","year":"2010"},{"key":"10.1016\/j.eswa.2022.118627_b17","first-page":"863","article-title":"A method and a genetic algorithm for deriving protocols for distributed applications with minimum communication cost","author":"El-fakih","year":"1999","journal-title":"Journal of Physics A - Mathematical General"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b18","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s11276-009-0183-0","article-title":"TDMA scheduling algorithms for wireless sensor networks","volume":"16","author":"Ergen","year":"2010","journal-title":"Wireless Networks"},{"year":"2017","series-title":"Synthesis in distributed environments","author":"Finkbeiner","key":"10.1016\/j.eswa.2022.118627_b19"},{"key":"10.1016\/j.eswa.2022.118627_b20","series-title":"Emerging communications for wireless sensor networks","article-title":"Machine learning across the WSN layers","author":"F\u00f6rster","year":"2011"},{"key":"10.1016\/j.eswa.2022.118627_b21","doi-asserted-by":"crossref","DOI":"10.1142\/S0218001420590429","article-title":"Optimizing routing path selection method particle swarm optimization","author":"Guo","year":"2020","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"6","key":"10.1016\/j.eswa.2022.118627_b22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0098466","article-title":"Combining environment-driven adaptation and task-driven optimisation in evolutionary robotics","volume":"9","author":"Haasdijk","year":"2014","journal-title":"PLoS One"},{"key":"10.1016\/j.eswa.2022.118627_b23","series-title":"Global communications conference","first-page":"1","article-title":"Feasibility of evolutionary design for multi-access MAC protocols","author":"Hajiaghajani","year":"2015"},{"key":"10.1016\/j.eswa.2022.118627_b24","series-title":"International conference on computer communication and networks","first-page":"1","article-title":"MAC protocol design using evolvable state-machines","author":"Hajiaghajani","year":"2015"},{"issue":"5","key":"10.1016\/j.eswa.2022.118627_b25","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MWC.2019.1800447","article-title":"Model-driven deep learning for physical layer communications","volume":"26","author":"He","year":"2019","journal-title":"Wireless Communications"},{"key":"10.1016\/j.eswa.2022.118627_b26","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","article-title":"Harris hawks optimization: Algorithm and applications","volume":"97","author":"Heidari","year":"2019","journal-title":"Future Generation Computer Systems"},{"year":"2006","series-title":"Ad-hoc networks: fundamental properties and network topologies","author":"Hekmat","key":"10.1016\/j.eswa.2022.118627_b27"},{"year":"1991","series-title":"Design and validation of computer protocols. Vol. 512","author":"Holzmann","key":"10.1016\/j.eswa.2022.118627_b28"},{"issue":"5","key":"10.1016\/j.eswa.2022.118627_b29","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/32.588521","article-title":"The model checker SPIN","volume":"23","author":"Holzmann","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b30","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/32.67579","article-title":"The x-kernel: An architecture for implementing network protocols","volume":"17","author":"Hutchinson","year":"1991","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"10.1016\/j.eswa.2022.118627_b31","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1007\/s00500-013-1091-x","article-title":"Distributed optimization in wireless sensor networks: an island-model framework","volume":"17","author":"Iacca","year":"2013","journal-title":"Soft Computing"},{"key":"10.1016\/j.eswa.2022.118627_b32","series-title":"International conference on self-adaptive and self-organizing systems","first-page":"34","article-title":"Practical online network stack evolution","author":"Imai","year":"2010"},{"key":"10.1016\/j.eswa.2022.118627_b33","series-title":"European conference on genetic programming","first-page":"96","article-title":"Genetic programming in wireless sensor networks","author":"Johnson","year":"2005"},{"key":"10.1016\/j.eswa.2022.118627_b34","doi-asserted-by":"crossref","unstructured":"Kalmbach,\u00a0P., Zerwas,\u00a0J., Babarczi,\u00a0P., Blenk,\u00a0A., Kellerer,\u00a0W., & Schmid,\u00a0S. (2018). Empowering self-driving networks. In Afternoon workshop on self-driving networks (pp. 8\u201314).","DOI":"10.1145\/3229584.3229587"},{"key":"10.1016\/j.eswa.2022.118627_b35","doi-asserted-by":"crossref","unstructured":"Keller,\u00a0A., Hossmann,\u00a0T., May,\u00a0M., Bouabene,\u00a0G., Jelger,\u00a0C., & Tschudin,\u00a0C. (2008). A system architecture for evolving protocol stacks. In International conference on computer communications and networks (pp. 1\u20137).","DOI":"10.1109\/ICCCN.2008.ECP.44"},{"year":"2015","series-title":"Flexibility of networks: a new measure for network design space analysis?","author":"Kellerer","key":"10.1016\/j.eswa.2022.118627_b36"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b37","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/JPROC.2019.2895553","article-title":"Adaptable and data-driven softwarized networks: Review, opportunities, and challenges","volume":"107","author":"Kellerer","year":"2019","journal-title":"Proceedings of the IEEE"},{"issue":"4598","key":"10.1016\/j.eswa.2022.118627_b38","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"issue":"1","key":"10.1016\/j.eswa.2022.118627_b39","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/SURV.2011.040310.00002","article-title":"Computational intelligence in wireless sensor networks: A survey","volume":"13","author":"Kulkarni","year":"2010","journal-title":"Communications Surveys & Tutorials"},{"issue":"3","key":"10.1016\/j.eswa.2022.118627_b40","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.1007\/s11277-016-3938-9","article-title":"Tree TDMA MAC algorithm using time and frequency slot allocations in tree-based WSNs","volume":"95","author":"Lee","year":"2017","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3399805","article-title":"Distributed reliable and energy-efficient scheduling for LR-WPANs","volume":"16","author":"Lee","year":"2020","journal-title":"ACM Transactions on Sensor Networks"},{"key":"10.1016\/j.eswa.2022.118627_b42","series-title":"Vehicular technology conference. Vol. 3","first-page":"1261","article-title":"Enhancing IEEE802.11 DCF using genetic programming","author":"Lewis","year":"2006"},{"key":"10.1016\/j.eswa.2022.118627_b43","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.future.2020.03.055","article-title":"Slime mould algorithm: A new method for stochastic optimization","volume":"111","author":"Li","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2022.118627_b44","doi-asserted-by":"crossref","unstructured":"Miorandi,\u00a0D., & Yamamoto,\u00a0L. (2008). Evolutionary and embryogenic approaches to autonomic systems. In International conference on performance evaluation methodologies and tools (pp. 1\u201312).","DOI":"10.4108\/ICST.VALUETOOLS2008.4514"},{"issue":"5","key":"10.1016\/j.eswa.2022.118627_b45","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TSMCC.2010.2090141","article-title":"Biologically inspired network systems: A review and future prospects","volume":"41","author":"Nakano","year":"2010","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"10.1016\/j.eswa.2022.118627_b46","series-title":"International joint conference on neural networks. Vol. 2","first-page":"1825","article-title":"Reinforcement learning for adaptive routing","author":"Peshkin","year":"2002"},{"issue":"3","key":"10.1016\/j.eswa.2022.118627_b47","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3233\/ICA-160522","article-title":"Real-time optimization of dynamic problems through distributed embodied evolution","volume":"23","author":"Prieto","year":"2016","journal-title":"Integrated Computer-Aided Engineering"},{"key":"10.1016\/j.eswa.2022.118627_b48","doi-asserted-by":"crossref","unstructured":"Roohitavaf,\u00a0M., Zhu,\u00a0L., Kulkarni,\u00a0S., & Biswas,\u00a0S. (2018). Synthesizing customized network protocols using genetic programming. In Genetic and evolutionary computation conference companion (pp. 1616\u20131623).","DOI":"10.1145\/3205651.3208272"},{"issue":"5","key":"10.1016\/j.eswa.2022.118627_b49","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/242896.242900","article-title":"Synthesis of communications protocols: an annotated bibliography","volume":"26","author":"Saleh","year":"1996","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.eswa.2022.118627_b50","series-title":"Workshops on real-world applications of evolutionary computation","first-page":"235","article-title":"Protocol construction using genetic search techniques","author":"Sharples","year":"2000"},{"key":"10.1016\/j.eswa.2022.118627_b51","series-title":"Dynamics on and of complex networks","first-page":"23","article-title":"Emergence and evolution of hierarchical structure in complex systems","author":"Siyari","year":"2017"},{"year":"2017","series-title":"A deep-reinforcement learning approach for software-defined networking routing optimization","author":"Stampa","key":"10.1016\/j.eswa.2022.118627_b52"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b53","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/JSAC.2010.100508","article-title":"Dynamic conjectures in random access networks using bio-inspired learning","volume":"28","author":"Su","year":"2010","journal-title":"Journal on Selected Areas in Communications"},{"key":"10.1016\/j.eswa.2022.118627_b54","doi-asserted-by":"crossref","DOI":"10.1002\/ett.3912","article-title":"An extensible frame structure for time division multiple access medium access control in vehicular ad-hoc networks","author":"Sun","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.1016\/j.eswa.2022.118627_b55","unstructured":"Tao,\u00a0N., Baxter,\u00a0J., & Weaver,\u00a0L. (2001). A multi-agent, policy-gradient approach to network routing. In International conference on machine learning."},{"year":"2017","series-title":"Derivation of network reprogramming protocol with Z3","author":"Tekken-Valapil","key":"10.1016\/j.eswa.2022.118627_b56"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b57","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCI.2017.2742868","article-title":"PlatEMO: A MATLAB platform for evolutionary multi-objective optimization","volume":"12","author":"Tian","year":"2017","journal-title":"IEEE Computational Intelligence Magazine"},{"issue":"9","key":"10.1016\/j.eswa.2022.118627_b58","doi-asserted-by":"crossref","first-page":"5880","DOI":"10.1109\/TSMC.2019.2956288","article-title":"A multistage evolutionary algorithm for better diversity preservation in multiobjective optimization","volume":"51","author":"Tian","year":"2019","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"issue":"4","key":"10.1016\/j.eswa.2022.118627_b59","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1515\/PIKO.2005.206","article-title":"Self-evolving network software","volume":"28","author":"Tschudin","year":"2005","journal-title":"Praxis Der Informationsverarbeitung Und Kommunikation"},{"key":"10.1016\/j.eswa.2022.118627_b60","series-title":"International conference on information processing in sensor networks","first-page":"13","article-title":"Distributed genetic evolution in WSN","author":"Valencia","year":"2010"},{"key":"10.1016\/j.eswa.2022.118627_b61","series-title":"International conference on evolvable systems","first-page":"422","article-title":"Using genetic programming to generate protocol adaptors for interprocess communication","author":"Van Belle","year":"2003"},{"key":"10.1016\/j.eswa.2022.118627_b62","unstructured":"Vardi,\u00a0M. Y. (2018). The Siren Song of Temporal Synthesis. In International conference on concurrency theory."},{"issue":"10","key":"10.1016\/j.eswa.2022.118627_b63","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.3390\/s22103733","article-title":"Energy efficient consensus approach of blockchain for IoT networks with edge computing","volume":"22","author":"Wadhwa","year":"2022","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.eswa.2022.118627_b64","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s00521-015-1923-y","article-title":"Monarch butterfly optimization","volume":"31","author":"Wang","year":"2019","journal-title":"Neural Computing and Applications"},{"issue":"2","key":"10.1016\/j.eswa.2022.118627_b65","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1109\/TCYB.2017.2780274","article-title":"Improving metaheuristic algorithms with information feedback models","volume":"49","author":"Wang","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.eswa.2022.118627_b66","series-title":"International conference on adaptive and natural computing algorithms","first-page":"167","article-title":"Genetic programming for proactive aggregation protocols","author":"Weise","year":"2007"},{"issue":"2","key":"10.1016\/j.eswa.2022.118627_b67","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TEVC.2011.2112666","article-title":"Evolving distributed algorithms with genetic programming","volume":"16","author":"Weise","year":"2011","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.eswa.2022.118627_b68","series-title":"European conference on genetic programming","first-page":"254","article-title":"Evolving proactive aggregation protocols","author":"Weise","year":"2008"},{"key":"10.1016\/j.eswa.2022.118627_b69","series-title":"Open architectures and network programming","first-page":"117","article-title":"ANTS: A toolkit for building and dynamically deploying network protocols","author":"Wetherall","year":"1998"},{"key":"10.1016\/j.eswa.2022.118627_b70","series-title":"Breakthroughs in statistics","first-page":"196","article-title":"Individual comparisons by ranking methods","author":"Wilcoxon","year":"1992"},{"key":"10.1016\/j.eswa.2022.118627_b71","series-title":"Advances in neural information processing systems","first-page":"952","article-title":"Using collective intelligence to route internet traffic","author":"Wolpert","year":"1999"},{"issue":"8","key":"10.1016\/j.eswa.2022.118627_b72","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1109\/TII.2021.3117976","article-title":"Heuristic optimization of multipulse rectifier for reduced energy consumption","volume":"18","author":"Wo\u017aniak","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"8","key":"10.1016\/j.eswa.2022.118627_b73","doi-asserted-by":"crossref","first-page":"5583","DOI":"10.1109\/TII.2020.3021689","article-title":"Recurrent neural network model for IoT and networking malware threat detection","volume":"17","author":"Wo\u017aniak","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"year":"2016","series-title":"Bio-inspired computing and networking","author":"Xiao","key":"10.1016\/j.eswa.2022.118627_b74"},{"key":"10.1016\/j.eswa.2022.118627_b75","series-title":"Workshop on bio-inspired models of network, information and computing systems","first-page":"159","article-title":"Self-replicating and self-modifying programs in fraglets","author":"Yamamoto","year":"2007"},{"key":"10.1016\/j.eswa.2022.118627_b76","series-title":"International workshop on self-managed systems and services","first-page":"34","article-title":"Genetic evolution of protocol implementations and configurations","author":"Yamamoto","year":"2005"},{"key":"10.1016\/j.eswa.2022.118627_b77","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106993","article-title":"Distributed embodied evolution over networks","volume":"101","author":"Yaman","year":"2021","journal-title":"Applied Soft Computing"},{"key":"10.1016\/j.eswa.2022.118627_b78","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.114864","article-title":"Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts","volume":"177","author":"Yang","year":"2021","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"10.1016\/j.eswa.2022.118627_b79","doi-asserted-by":"crossref","first-page":"153","DOI":"10.6109\/jicce.2013.11.3.153","article-title":"A hierarchical time division multiple access medium access control protocol for clustered underwater acoustic networks","volume":"11","author":"Yun","year":"2013","journal-title":"Journal of Information and Communication Convergence Engineering"},{"issue":"8","key":"10.1016\/j.eswa.2022.118627_b80","doi-asserted-by":"crossref","first-page":"2801","DOI":"10.18494\/SAM.2020.2796","article-title":"Optimized routing model of sensor nodes in internet of things network","volume":"32","author":"Zhang","year":"2020","journal-title":"Sensors and Materials"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095741742201675X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095741742201675X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T20:50:43Z","timestamp":1701809443000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S095741742201675X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":80,"alternative-id":["S095741742201675X"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2022.118627","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Online distributed evolutionary optimization of Time Division Multiple Access protocols","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2022.118627","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"118627"}}