{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:51:38Z","timestamp":1725911498310},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1016\/j.future.2018.05.024","type":"journal-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T01:31:08Z","timestamp":1527125468000},"page":"61-78","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":21,"special_numbering":"C","title":["Evolutionary deployment and local search-based movements of 0th responders in disaster scenarios"],"prefix":"10.1016","volume":"88","author":[{"given":"D.G.","family":"Reina","sequence":"first","affiliation":[]},{"given":"T.","family":"Camp","sequence":"additional","affiliation":[]},{"given":"A.","family":"Munjal","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2612-0388","authenticated-orcid":false,"given":"S.L.","family":"Toral","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2018.05.024_b1","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3166\/jds.16.143-172","article-title":"Supporting group decision making and coordination in urban disasters relief efforts","volume":"16","author":"Ochoa","year":"2007","journal-title":"J. Decis. Sys."},{"key":"10.1016\/j.future.2018.05.024_b2","series-title":"Advanced ICTs for Disaster Management and Threat Detection: Collaborative and Distributed Frameworks","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-61520-987-3","author":"Asimakopoulou","year":"2010","ISBN":"http:\/\/id.crossref.org\/isbn\/9781615209873"},{"key":"10.1016\/j.future.2018.05.024_b3","series-title":"Classification of Emergency Scenarios","author":"Muench","year":"2011"},{"key":"10.1016\/j.future.2018.05.024_b4","series-title":"Lecture Notes in Computer Science, Vol. 8128","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-40588-4_18","article-title":"Security engineering and intelligence informatics","author":"Palmieri","year":"2013"},{"key":"10.1016\/j.future.2018.05.024_b5","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/647037","article-title":"A survey on multihop ad hoc Networks for disaster response scenarios","author":"Reina","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.future.2018.05.024_b6","series-title":"Introduction to Digital Professional Mobile Radio","author":"Ketterling","year":"2004"},{"key":"10.1016\/j.future.2018.05.024_b7","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.asoc.2014.09.041","article-title":"Evolutionary optimization for disaster relief operations: A survey","volume":"27","author":"Zheng","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.future.2018.05.024_b8","series-title":"Proceedings of the Genetic and Evolutionary Computation Conference","first-page":"1721","article-title":"Evolving cooperative strategies for UAV teams","author":"Richards","year":"2005"},{"key":"10.1016\/j.future.2018.05.024_b9","doi-asserted-by":"crossref","first-page":"9543","DOI":"10.1016\/j.eswa.2011.01.141","article-title":"Near optimal citywide WiFi network deployment using a hybrid grouping genetic algorithm","volume":"38","author":"Agust\u00edn-Blas","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.future.2018.05.024_b10","series-title":"Eighth International Conference on Complex. Intelligent and Software Intensive Systems","first-page":"120","article-title":"Node placement in WMNs using WMN-GA system considering uniform and normal distribution of mesh clients","author":"Oda","year":"2014"},{"key":"10.1016\/j.future.2018.05.024_b11","series-title":"Eighth International Conference on Complex. Intelligent and Software Intensive Systems","first-page":"1148","article-title":"Node placement in WMNs sensing WMN-HC system and different movement methods","author":"Chang","year":"2014"},{"key":"10.1016\/j.future.2018.05.024_b12","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.asoc.2012.10.024","article-title":"An evolutionary computation approach for optimizing connectivity in disaster response scenarios","volume":"13","author":"Reina","year":"2013","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.future.2018.05.024_b13","doi-asserted-by":"crossref","unstructured":"N. Chakraborty, K. Sycara, Reconfiguration algorithms for mobile robotic networks, in: IEEE International Conference on Robotics and Automation (ICRA), 2010, pp. 5484\u20135489.","DOI":"10.1109\/ROBOT.2010.5509484"},{"key":"10.1016\/j.future.2018.05.024_b14","doi-asserted-by":"crossref","unstructured":"O. Tekdas, P.A. Plonski, N. Karnad, V. Isler, Maintaining connectivity in environments with obstacles, in: IEEE International Conference on Robotics and Automation (ICRA), 2010, pp. 1952\u20131957.","DOI":"10.1109\/ROBOT.2010.5509479"},{"key":"10.1016\/j.future.2018.05.024_b15","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1016\/j.peva.2009.07.009","article-title":"Modeling mobility in disaster area scenarios","volume":"66","author":"Aschenbruck","year":"2009","journal-title":"Perform. Eval."},{"key":"10.1016\/j.future.2018.05.024_b16","unstructured":"N. Aschenbruck, M. Frank, P. Martini, J. T\u00f6lle, Human mobility in MANET disaster area simulation - a realistic approach, in: 29th Annual IEEE International Conference on Local Computer Network (LCN\u201904), 2004."},{"key":"10.1016\/j.future.2018.05.024_b17","doi-asserted-by":"crossref","unstructured":"Y. Huang, W. He, K. Nahrstedt, W.C. Lee, CORPS: event-driven incident mobility model for first responders, in: IEEE Military Communications Conference (MILCOM 08), 2008, pp. 1\u20137.","DOI":"10.1109\/MILCOM.2008.4753143"},{"key":"10.1016\/j.future.2018.05.024_b18","doi-asserted-by":"crossref","first-page":"91-105","DOI":"10.1016\/j.jnca.2016.12.012","article-title":"Intelligent deployment of UAVs in 5G heterogeneous communication environment for improved coverage","volume":"85","author":"Sharma","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.future.2018.05.024_b19","doi-asserted-by":"crossref","unstructured":"L. Concei\u00e7\u00e3o, M. Curado, Modelling mobility based on human behaviour in disaster areas, in: Proceedings of the 11th International Conference of Wired\/Wireless Internet Communication (WWIC), 2013, pp. 56\u201359.","DOI":"10.1007\/978-3-642-38401-1_5"},{"key":"10.1016\/j.future.2018.05.024_b20","doi-asserted-by":"crossref","unstructured":"M.Y.S. Uddin, D.M. Nicol, T.F. Abdelzaher, R.H. Kravets, A post disaster mobility model for delay tolerant networking, in: Proceedings of the 2009 Winter Simulation Conference, 2009, pp. 2785\u20132796.","DOI":"10.1109\/WSC.2009.5429249"},{"key":"10.1016\/j.future.2018.05.024_b21","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1007\/s12652-015-0282-y","article-title":"Parallel and distributed computing for UAVs trajectory planning","volume":"6","author":"Pascarella","year":"2015","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"10.1016\/j.future.2018.05.024_b22","doi-asserted-by":"crossref","unstructured":"M. Erdelj, O. Saif, E. Natalizio, I. Fantoni, UAVs that fly forever: Uninterrupted structural inspection through automatic UAV replacement. Ad Hoc Netw., https:\/\/doi.org\/10.1016\/j.adhoc.2017.11.012.","DOI":"10.1016\/j.adhoc.2017.11.012"},{"key":"10.1016\/j.future.2018.05.024_b23","doi-asserted-by":"crossref","unstructured":"C. Darwin, The origin of species by means of natural selection: Or, the preservation of favored races in the struggle for life. London. 1859.","DOI":"10.5962\/bhl.title.68064"},{"key":"10.1016\/j.future.2018.05.024_b24","unstructured":"J.T. Alander, On optimal population size of genetic algorithm, in: Proceedings CompEuro 1992. Computer Systems and Software Engineering, 6th Annual European Computer Conference, 1995, pp. 65\u201370."},{"key":"10.1016\/j.future.2018.05.024_b25","unstructured":"http:\/\/deap.gel.ulaval.ca\/doc\/default\/api\/tools.html#operators(last access July 2015)."},{"key":"10.1016\/j.future.2018.05.024_b26","unstructured":"I.P. Gent, T. Walsh, Towards an understanding of hill-climbing procedures for SAT, in: Proceedings of the Eleventh National Conference on Artificial Intelligence (AAAI\u201993), 1993, pp. 28\u201333."},{"key":"10.1016\/j.future.2018.05.024_b27","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1002\/cpe.3472","article-title":"An HLA-based framework for simulation of large-scale critical systems","volume":"28","author":"Ficco","year":"2016","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"10.1016\/j.future.2018.05.024_b28","first-page":"2171","article-title":"DEAP: Evolutionary algorithms made easy","volume":"13","author":"Fortin","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.future.2018.05.024_b29","unstructured":"IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999)."},{"key":"10.1016\/j.future.2018.05.024_b30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.003","article-title":"Deployment strategies in the wireless sensor network: A comprehensive review","volume":"91\u201392","author":"Abdollahzadeh","year":"2016","journal-title":"Comput. Commun."},{"key":"10.1016\/j.future.2018.05.024_b31","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s11063-012-9255-8","article-title":"Using Laplacian eigenmap as heuristic information to solve nonlinear constraints defined on a graph and its application in distributed range-free localization of wireless sensor networks","volume":"37","author":"Li","year":"2013","journal-title":"Neural Process. Lett."},{"key":"10.1016\/j.future.2018.05.024_b32","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.neucom.2013.01.032","article-title":"A dynamic neural network approach for solving nonlinear inequalities Defined on a graph and its application to distributed, routing-free, range-free localization of WSNs","volume":"117","author":"Li","year":"2013","journal-title":"Neurocomputing"},{"key":"10.1016\/j.future.2018.05.024_b33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2512448","article-title":"Bluetooth aided mobile phone localization: A nonlinear neural circuit approach","volume":"13","author":"Li","year":"2014","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"10.1016\/j.future.2018.05.024_b34","series-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO 2010)","first-page":"101","article-title":"Eagle strategy using L\u00e9vy walk and firefly algorithms for stochastic optimization","author":"Yang","year":"2010"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17325372?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17325372?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T15:18:48Z","timestamp":1711984728000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X17325372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":34,"alternative-id":["S0167739X17325372"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2018.05.024","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evolutionary deployment and local search-based movements of 0th responders in disaster scenarios","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2018.05.024","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}