Preface |
|
xi | |
Acknowledgments |
|
xv | |
Author Bios |
|
xvii | |
Chapter 1 Introduction |
|
1 | (28) |
|
1.1 Applications Of Node Deployment Problem |
|
|
1 | (8) |
|
|
1 | (2) |
|
1.1.2 Wireless Sensor Networks |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
6 | (1) |
|
1.1.5 Railway Network Design |
|
|
6 | (2) |
|
1.1.6 Distributed Simulation Systems |
|
|
8 | (1) |
|
1.2 Fundamental Issues Of Node Deployment Problem |
|
|
9 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
1.3 Research Progress Of Node Deployment Modeling |
|
|
12 | (8) |
|
|
12 | (3) |
|
1.3.1.1 Candidate Locations |
|
|
12 | (2) |
|
1.3.1.2 Deployment Formation |
|
|
14 | (1) |
|
|
15 | (1) |
|
1.3.3 Objective Functions |
|
|
16 | (4) |
|
1.3.3.1 Node Deployment In Wireless Sensor Networks |
|
|
16 | (1) |
|
1.3.3.2 Node Deployment In Air Defense |
|
|
17 | (3) |
|
1.3.3.3 Other Types Of Optimization Objective |
|
|
20 | (1) |
|
1.4 Research Progress Of Node Deployment Methods |
|
|
20 | (5) |
|
|
21 | (1) |
|
1.4.2 Constraints Handling |
|
|
21 | (1) |
|
1.4.3 Multi-Objective Handling |
|
|
21 | (1) |
|
|
22 | (9) |
|
|
22 | (1) |
|
1.4.4.2 Metaheuristic Algorithm |
|
|
23 | (2) |
|
1.5 Main Issues And Challenges |
|
|
25 | (2) |
|
|
27 | (2) |
Chapter 2 Stochastic Node Deployment For Area Coverage Problem |
|
29 | (16) |
|
|
29 | (2) |
|
|
31 | (4) |
|
|
31 | (1) |
|
2.2.1.1 Binary Detection Model |
|
|
31 | (1) |
|
2.2.1.2 Probabilistic Detection Model |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (4) |
|
|
35 | (3) |
|
2.3.2 Other PSO-Based Algorithm For Area Coverage Problem |
|
|
38 | (1) |
|
2.3.3 Complexity Analysis |
|
|
39 | (1) |
|
2.4 Experiments And Discussion |
|
|
39 | (2) |
|
|
40 | (1) |
|
|
40 | (1) |
|
2.4.3 Analysis Of Results |
|
|
41 | (1) |
|
|
41 | (4) |
Chapter 3 Stochastic Dynamic Node Deployment For Target Coverage Problem |
|
45 | (30) |
|
|
46 | (1) |
|
|
47 | (3) |
|
|
49 | (1) |
|
3.2.2 Scenario-Based Model Reformulation |
|
|
49 | (1) |
|
|
50 | (6) |
|
|
50 | (2) |
|
|
52 | (3) |
|
3.3.2.1 Personal Best Selection |
|
|
52 | (1) |
|
3.3.2.2 Non-Dominated Solutions Maintaining And Global Best Selection |
|
|
53 | (1) |
|
3.3.2.3 Diversity Maintaining |
|
|
53 | (2) |
|
3.3.3 Complexity Analysis |
|
|
55 | (1) |
|
3.4 Experiments And Discussion |
|
|
56 | (18) |
|
|
56 | (1) |
|
3.4.2 Performance Metrics |
|
|
57 | (2) |
|
|
59 | (1) |
|
3.4.4 Analysis Of Results |
|
|
60 | (14) |
|
|
74 | (1) |
Chapter 4 Robust Node Deployment For Cooperative Coverage Problem |
|
75 | (40) |
|
|
76 | (2) |
|
|
78 | (10) |
|
4.2.1 The Deterministic And Uncertain Two-Level Cooperative Set Covering Problem |
|
|
78 | (6) |
|
4.2.1.1 Two-Level Cooperative Set Covering Problem |
|
|
78 | (1) |
|
4.2.1.2 Generalized Uncertain Two-Level Cooperative Set Covering Problem |
|
|
79 | (5) |
|
4.2.2 Modeling The Robust Uncertain Two-Level Cooperative Set Covering Problem |
|
|
84 | (4) |
|
4.2.2.1 Compact Formulation Of The RUTLCSCP |
|
|
87 | (1) |
|
|
88 | (13) |
|
4.3.1 Dealing With Subproblem |
|
|
89 | (3) |
|
4.3.2 Rule-Based Heuristic For RUTLCSCP |
|
|
92 | (4) |
|
4.3.2.1 Processing Procedure |
|
|
94 | (1) |
|
4.3.2.2 Complexity Analysis Of MRBCH-K |
|
|
95 | (1) |
|
4.3.3 Proposed SaDE For RUTLCSCP |
|
|
96 | (5) |
|
|
97 | (1) |
|
4.3.3.2 Constraints Handling |
|
|
97 | (3) |
|
4.3.3.3 Complexity Analysis Of SaDE |
|
|
100 | (1) |
|
4.4 Experiments And Discussion |
|
|
101 | (12) |
|
|
102 | (1) |
|
4.4.2 Analysis Of Results |
|
|
102 | (15) |
|
4.4.2.1 Solving RUTLCSCP-LA-RC Through CPLEX |
|
|
102 | (3) |
|
4.4.2.2 Comparisons Of MRBCH-K With Different K |
|
|
105 | (4) |
|
4.4.2.3 Comparisons Of SaDE And Its Variants |
|
|
109 | (1) |
|
4.4.2.4 Comparisons On RUTLCSCP |
|
|
109 | (4) |
|
|
113 | (2) |
Chapter 5 Fuzzy Node Deployment For Cooperative Coverage Problem |
|
115 | (24) |
|
|
116 | (1) |
|
|
117 | (6) |
|
5.2.1 Fuzzy Conditional Value-At-Risk |
|
|
118 | (1) |
|
|
118 | (3) |
|
5.2.3 Some Properties On CVAR-FTLCNDP |
|
|
121 | (1) |
|
5.2.4 Linear Approximation Of CVAR-FTLCNDP |
|
|
122 | (1) |
|
|
123 | (7) |
|
|
124 | (2) |
|
5.3.2 Improved Decomposition-Based Multi-Objective Evolutionary Algorithms |
|
|
126 | (4) |
|
|
126 | (1) |
|
5.3.2.2 Updating Of Individuals |
|
|
127 | (3) |
|
5.3.2.3 Complexity Analysis |
|
|
130 | (1) |
|
5.4 Experiments And Discussion |
|
|
130 | (6) |
|
5.4.1 Performance Metrics |
|
|
131 | (1) |
|
5.4.2 Analysis Of Results |
|
|
131 | (10) |
|
|
131 | (3) |
|
|
134 | (2) |
|
|
136 | (3) |
Chapter 6 Simulation-Based Evaluation Analysis Of Node Deployment Under Risk Preference |
|
139 | (28) |
|
|
139 | (2) |
|
6.2 Simulation-Based Evaluation Analysis Of Worst-Case CVAR Node Deployment |
|
|
141 | (7) |
|
6.2.1 Uncertain Initial Position Of Penetration Paths |
|
|
142 | (1) |
|
6.2.2 Penetration Paths Under Uncertainty |
|
|
143 | (1) |
|
6.2.3 Scenario-Based Simulation |
|
|
144 | (4) |
|
6.2.4 Evaluation Model With Decision Makers' Risk Preference |
|
|
148 | (1) |
|
6.3 Experiments And Discussion |
|
|
148 | (16) |
|
6.3.1 Case Study 1: Deployment Of Sensor Nodes |
|
|
148 | (5) |
|
6.3.2 Case Study 2: Deployment Of Weapon Nodes |
|
|
153 | (2) |
|
6.3.3 Case Study 3: Cooperative Deployment Of Sensor And Weapon Nodes |
|
|
155 | (9) |
|
|
164 | (3) |
Chapter 7 Overview And Future Directions |
|
167 | (4) |
Bibliography |
|
171 | (18) |
Index |
|
189 | |