Finally, Node 3 fuses the data of the other nodes with its own data and transmits the final fused data to the base station.. Sensor nodes that are far away from the base station will con
Trang 1Energy-Aware Optimization Model in Chain-Based Routing
Nguyen Thanh Tung
Published online: 26 March 2014
# Springer Science+Business Media New York 2014
Abstract Sensor networks are deployed in numerous military
and civil applications, such as remote target detection, weather
monitoring, weather forecast, natural resource exploration and
disaster management Despite having many potential
applica-tions, wireless sensor networks still face a number of
chal-lenges due to their particular characteristics that other wireless
networks, like cellular networks or mobile ad hoc networks do
not have The most difficult challenge of the design of wireless
sensor networks is the limited energy resource of the battery of
the sensors This limited resource restricts the operational time
that wireless sensor networks can function in their
applica-tions Routing protocols play a major part in the energy
efficiency of wireless sensor networks because data
commu-nication dissipates most of the energy resource of the
net-works The above discussions imply a new family of protocols
called chain-based protocols In the protocols, all sensor nodes
sense and gather data in an energy efficient manner by
cooperating with their closest neighbors The gathering
pro-cess can be done until an elected node calculates the final data
and sends the data to the base station In our works, we have
proposed two methods to optimize the lifetime of chain-based
protocols using Integer Linear Programming (ILP)
formula-tions Also, a method to determine the bounds of the lifetime
for any energy-efficient routing protocol is presented Finally,
simulation results verify the work in this chapter Furthermore,
previous researches assume that the base station position is
randomly placed without optimization In our works, a non
convex optimization model has been developed for solving
the base station location optimization problem
Keywords Sensor Routing Chain based routing Linear programming Non convex optimization
1 Introduction Lindsey et al [5] proposed one type of chain-based protocol called PEGASIS (Power-Efficient Gathering in Sensor Information Systems), which is near optimal for gathering data in sensor networks PEGASIS forms a chain among sensor nodes so that each node will receive data from a close neighboring node and transmit data to another close neighbor Gathered data moves from a sensor node to the nearest neigh-bor, is aggregated with the neighbor’s data, and eventually reaches a determined Cluster-Head (CH) before finally being transmitted to the Base Station (BS) Figure1illustrates the ideas of the PEGASIS protocol In this round of data trans-mission, Node 3 is elected as the CH Node 5 transmits data to Node 4, and Node 4 fuses the data with its own data and transmits the fused data to Node 3 Similarly, Node 1 transmits data to Node 2, and Node 2 transmits the fused data to Node 3 Finally, Node 3 fuses the data of the other nodes with its own data and transmits the final fused data to the base station The data fusion function can be any function e.g minima, maxima and average, depending on the specific applications as discussed in [1–3] Nodes take turns equally to be the CH so that the energy spent by each node is balanced In other words, each node becomes a CH once for every n rounds of data transmission, where n is the number of sensor nodes The authors in [5] showed that building a chain to minimize the energy consumption is similar to the traveling salesman problem [6], which is known to be NP-complete They pro-posed a greedy algorithm starting from the furthest node from the base station until a near optimal chain is built as follows: 1) Add the node furthest from the base station to the chain
N T Tung ( *)
International School, Vietnam National University, 144 Xuan Thuy
Street, Cau Giay District, Ha Noi, Vietnam
e-mail: tungnt@isvnu.vn
DOI 10.1007/s11036-014-0497-8
Trang 22) This node finds a closest node from it that is not already in
the chain (Closest Euclidean distance)
3) Repeat until all nodes are added to the chain
Figure2shows the formation of a chain with five sensor
nodes Node 1 connects to Node 2, Node 2 connects to Node
3, Node 3 connects to Node 4 and Node 4 connects to Node 5
In each round, a sensor node must be selected as the
CH Each sensor node receives data from its down-stream neighbor, fuses with its own data to generate a single packet of the same length, and transmits the fused data to its upstream neighbor on the chain This process is illustrated in Fig 3 below When Node 4 is selected as the CH, Node 3 fuses data with Node 5 Node 2 fuses its data with Node 1 Node 4 fuses its data with Node 2 and Node 3 and transmits the data to the base station
2 Problem formulation
In many applications, the data reporting of all sensor nodes
is critical as in medical applications or in security applica-tions The above PEGASIS protocol tries to ensure that every node can become a CH equally This is not appro-priate for optimum system lifetime Sensor nodes that are far away from the base station will consume more energy than closer nodes to send data to the base station Also, nodes that have too little energy should not become CHs
As an equal selection of CHs will result in a reduced lifetime, a formulation to determine the CH pattern among all sensor nodes is presented below
In the next section, we have proposed two methods to optimize the lifetime using Integer Linear Programming (ILP) formulations [7, 8] The first method is applied for chain-based routing, the second method can be applied for any routing including chain-based routing
2.1 Method 1 Let us define n to be the number of sensor nodes, and xjto be the number of rounds node j becomes a CH In chain-based
N1 N2
N4 N5
N3 BS
: Cluster-head
Fig 1 A reconstructed chain
from PEGASIS method
Fig 2 Greedy algorithm to build a chain by PEGASIS method Fig 3 Data moving from all sensor nodes to the CH node
Trang 3routing, only one CH is selected each round Therefore, there
are n possible choices of CHs The problem for the selection
of the CHs is formulated as follows:
Maximize :X
j¼1
n
xj
Subject to :
X
j¼1
n
cijxj≤Ei:∀i∈ 1…n½
xj∈Zþ:∀j∈ 1…n½
ð1Þ
where cjis the energy usage of Node i to send a unit of data in
a round, when Node j becomes CH and Eito be the initial
energy storage of Node i
The above Linear Programming problem tries to
maxi-mize the total number of rounds of transmitting data by all
sensor nodes under the battery-constraint of all sensor
nodes The energy coefficients cj of each non CH node
include the energy dissipation for the node to receive data
from its downstream neighbor and to send the fused data to
its upstream neighbor in the chain The energy coefficients
of each CH node in the formula include the energy
dissi-pation for the node to receive data from its downstream
neighbors and to send the fused data to the base station The
diagram in Fig.4shows that when Node 4 becomes a CH, c4
includes the energy dissipation to receive data from Node 1
and to send the fused data to Node 4 c4includes the energy
dissipation to receive data from Node 3 and Node 2 and to
send the fused data to the base station
2.2 Method 2
The problem of finding the optimal routing to achieve the
maximum network lifetime in a sensor network was studied as
a constrained linear program optimization in [12–15] and [16] In this work, the authors find the maximum lifetime that could be achieved by any routing cost or balancing scheme for optimizing average flows between nodes Similar to work in [12–15] and [16], we model the routing problem as below:
A set of Ns sensors is deployed in a region in order to monitor some physical phenomenon The complete set of sensors that has been deployed can be referred as S={s1……sN} Sensor i generates traffic at a rate of Q bps All of the data that is generated must eventually reach a single data sink, labeled s0 Let qi,jbe traffic on the link (i,j) during the time T Each node i has the initial battery energy of Ei, and the amount of energy consumed in transmitting a packet across link L(i,j)is eli,j
Maximize : T
Subject to : X
j¼1
N
qj;i þ QT ¼X
j¼0
N
qi; j:∀i∈ 1…N½ X
i¼1
n
qi; jeli; j<¼ Ei:∀i∈ 1…n½ X
i¼1
n
qi;0¼ Qn
qi; j>¼ 0 : ∀i; j∈ 1…n½
ð2Þ
3 A new heuristic solution Problem formulation (1) and (2) can be solved by Linear Programming solvers These solvers are not always available and it is not easy to build these solvers inside sensors There-fore, a heuristic RE_chain algorithm is proposed In the RE_chain algorithm, the CH positions are reallocated among the sensor nodes so that the minimum residual energy of all sensor nodes is maximized The heuristic algorithm (RE_chain) is given as below:
RE_chain:
In every round of data transmission to the base station, select a sensor node as a leader for the chain in order to maximize the minimum residual energy of all sensor nodes after sending data for the round
Given:
N the number of sensor nodes indexed from 1 to N
s A current CH solution f(s) The minimum residual energy of all nodes with solution s
S Best solution so far Fig 4 Energy consumption coefficients of every sensor depends on the
position of the CH
Trang 4RE_chain algorithm:
For (s from 1 to N)
δ ¼ f sð Þ−f sð Þ0
Ifδ>0 then s0=s
Result S0is the CH solution obtained from the RE_chain
algorithm
4 Simulation results
To evaluate the performance of RE_chain and compare the
performance with that of PEGASIS and LEACH protocol [1],
a number of simulators in Visual C++ were developed The
comparison between the system lifetime from Problem
for-mulation (1) and that of RE_chain is also performed In the
first set of simulations, the performance of RE_chain is
com-pared to the solution given by Formulation (1) In the
simula-tions, 100 random 100-node sensor networks are generated
Each node begins with 1 J of energy The network settings for
the simulations in this section are given below The energy
model was used in [1,3,5,9–11,16]
Network size (100m×100m)
Base station (50m,300m)
Data message size: 4000 bits
Broadcast message: 200 bits
Energy message: 20 bits
Position of sensor nodes: Uniform placed in the area
Energy model: E elec =50 ∗10 −9 J, ε fs =10 ∗10 −12 J/bit/m 2 and
ε mp =0.0013 ∗10 −12 J/bit/m 4
Figure5shows the ratio of the number of rounds of RE_chain
and the Linear Programming solution of Formulation (1) From
the simulation result, it can be said that RE_chain performs
within 1 % of the Linear Programming solution
It is also of interest to compare the performance of
RE_chain, PEGASIS, and LEACH on the network
topolo-gies On average, LEACH, PEGASIS, and RE_chain perform
602, 890, and 1,305 rounds respectively (Fig.6; Table1)
5 Determination of bounds for the lifetime
from any routing algorithm
The authors in [5] proposed a method to determine the upper
bounds of the chain-based routing system lifetime In each
round, every node must transmit its packet and some node must receive it As the total transmission energy of a message
is calculated by:
Et¼ kEelecþ εampkdn And the reception energy is calculated by:
Er¼ kEelec
where Eelecis the energy dissipation of the electronic circuitry
to encode or decode a bit, k is message size, εamp is the amplifier constant and d is the distance between the transmit-ter and the receiver On average, each non-CH node spends two times the energy for electronics and some additional energy sending data to its neighbor depending on how far the node transmits As a result, the total energy consumption
of any chain built will be at least two times the energy of the electronics multiplied by the number of sensor nodes There-fore, in the bounded solution, the authors set the energy usage
of non CH nodes to two times the energy usage for electronics
Ratio between the number of rounds of RE_chain
and RE_with ILP
0.988 0.99 0.992 0.994 0.996 0.998 1 1.002
Network topology
Fig 5 Ratio of the number of rounds between RE_chain and ILP model
Fig 6 Number of rounds over 100 random 100-node networks
Trang 5The solutions of the bound Table1method are the solutions of
the ILP formulation (1) with the following coefficients:
Maximize : X
j ¼1
n
xj
Subject to :
X
j ¼1
n
cijxj≤Ei:∀i∈ 1…n½
xj∈Zþ:∀j∈ 1…n½
ð3Þ
If (Node i is a non CH) then
cij¼ 2kEelec:∀i; j∈ 1…n½ ; i≠j
else
cij¼ 2kEelecþ εmpkd4to BS; i ¼ j
where dto_BSis the distance from Node i to the base station
The discussion above is true for the minimum energy
consumption of any chain but is not always true for the
maximum lifetime problem In other words, a smaller total
of energy coefficients in Formulation (3) do not always
pro-vide a better optimum We show that by an example below:
Consider two ILP problems
Example 1:
Maximize : x1þ x2
Subject to : 1x1þ 1:1x2≤6:1
1:2x1þ 1:3x2≤6:5
x1; x2∈Zþ
The sum of coefficients of constraint functions is: 1+1.1+
1.2+1.3=4.6
The optimum objective for the example is 5
Example 2:
Maximize x1þ x2
Subject to : 1x1þ 2:8x2≤6:1
0:5x1þ 0:5x2≤6:5
x1; x2∈Zþ
The sum of coefficients of constraint functions is: 1+2.8+ 0.5+0.5=4.8 The optimum objective for the example is 6 The two simple examples show that smaller sum of the coefficients of the ILP problem does not necessarily mean that the better objective solution can be obtained In other words, for the chain-based routing problem, minimizing the total energy dissipation for gathering data does not always guaran-tee an optimum solution
6 Determination of absolute upper bounds for the lifetime
of any routing problem The bounds calculated by the method in (3) are called the minimum energy bounds As discussed in the two ILP exam-ples above, the bounds cannot be proven to be the upper bounds of the system lifetime given by any chain-based routing In the section, a new method to determine the abso-lute upper bounds of the system lifetime given by any routing protocol is presented
On any routing protocol, any sensor must send data once in each round, and at least a sensor node must deliver data to the base station Let us consider Formulation (1), in which the energy coefficients are determined by:
Maximize : X
j¼1
n
xj
Subject to :
X
j¼1
n
cijxj≤Ei:∀i∈ 1…n½
xj∈Zþ:∀j∈ 1…n½
ð4Þ
If (Node i is a non CH) then
cij¼ kEelec:∀i; j∈ 1…n½ ; i≠j else
cij¼ 2kEelecþ εmpkd4to BS; i ¼ j
Table 1 Results for Fig 6
90 % confidence interval
of the sample means
(876, 904) (1276, 1335) (592, 613)
Trang 6where dto_BSis the distance from Node i to the base station.
Let O be the optimum solution of the ILP problem (4)
Then O is the upper bound for the lifetime that can be
achieved by any routing method
Proof Theorem 1 is stated and proved below to simplify the
process:
Theorem 1 Consider two ILP problems with the same
objec-tive function and the same variables, if the set of coefficients of
ILP problem 2 is smaller than the set of coefficients of ILP
problem 1 respectively for all of these coefficients, then the
optimal solution of Problem 2 is higher than that of Problem 1
6.1 Consider two ILP problems
Problem 1
j ¼1
n
xj
Subject to :
X
j¼1
n
cijxj≤Ei:∀i∈ 1…m½
xj∈Zþ:∀j∈ 1…n½
ð5Þ
Problem 2
j ¼1
n
xj
Subject to :
X
j¼1
n
c0ijxj≤Ei:∀i∈ 1…m½
xj∈Zþ:∀j∈ 1…n½
ð6Þ
Definition O1is the optimal solution of Problem (5) O2is the
optimal solution of Problem (6)
If c′j≤cj,∀i∈[1…m],∀j∈[1…n], then O2≥O1
Using the result from Theorem 1, the energy coefficient c′j
from any constructing algorithm:
c′ ≥c,∀i,j∈[1…n] of Formulation (4)
Therefore, any feasible solution O' obtained by any routing algorithm will satisfy:
O0≤O
As a result, O from Formulation (4) is the upper bound of any possible feasible solution (End of proof)
7 Optimization of the Base station location Previous researches in [1,3,4,10–16] assume that S the base station position is randomly placed without optimization Actually, the location needs to be optimized In order to minimize the complexities of the problem, the wireless radio energy dissipation model is not used yet A very simple energy usage model is given below
Assume that the energy to transmit a unit of data is propor-tional to the square of the distance to a destination, and there is
no energy spent at the destination
E Sð Þ ¼ d2; E Dð Þ ¼ 0; for α > 0
, where S denotes a source node, D denotes a destination node, E(S) is the energy usage of node and d is the distance from S
to D The Linear Programming model (2) becomes:
Subject to :X
j ¼1
N
qj;iþ QT ¼X
j ¼0
N
qi; j:∀i∈ 1…N½ ð7bÞ
X
j ¼1
N
qi; j i ; j2þqi;0hðxi−XÞ2þ yð i−YÞ2i
<¼ Ei:∀i∈ 1…N½ X
i ¼1
n
qi;0¼ Qn
This problem is difficult due to Constraints (7c), that are non convex Finding efficiently a solution of Problem (7) is a challenge We propose a solution approach based on DC (Difference of Convex) Programming and DCA (DC Algo-rithm) They are introduced by Pham Dinh in 1985 and have been extensively developed by Le Thi and Pham Dinh since
1994 [17–28]
In the literature, several work in non convex optimization have been developed for solving the optimization problems Several approximations have been proposed including
Proof Since c′j
i≤cj
i∀i∈[1…m],∀j∈[1…n] and O1is the op-timal solution of Problem 1, then O1is a feasible solution of
Problem 2 because O1satisfy all constraints of (5) Since is
the optimal solution of Problem 2, O2≥ O1 (End of proof)
Trang 7Concave exponential approximation and logarithmic
approxi-mation of Weston, piecewise concave approxiapproxi-mation [25–27]
A common point of these approximations is that the
resulting optimization problems are all DC programs and
one can investigate DCA, an efficient method in nonconvex
programming framework for solving them
Thanks to a new result concerning with exact penalty
tech-niques in DC programming [23], we first reformulate Problem
(10) as a DC program then apply DCA to the resulting problem
Despite its local character, DCA with a good initial point quite
often converges to global solutions in practice Now, consider
the left hand side of the difficult constraints (7c) Let
fið Þ ¼z X
j ¼1
N
qi; j i; j2þqi;0hðxi−XÞ2þ yð i−YÞ2i
<¼ Ei:∀i∈ 1…N½
It can be decomposed as follows:
fið Þ ¼z ρ
2
z 2− ρ
2
z 2−f zð Þ
!
fið Þ ¼ gz ið Þ−hz ið Þz
Where g zð Þ ¼ρ2jzj2 is convex and h zð Þ ¼ ρ2jzj2−f zð Þ is
also convex with a sufficiently large numberρ Constraints
(7c) are thus rewritten as a DC constraints
By denoting K¼ z ¼ q; T; X ; Yð Þ : ∑
j¼1
N
qj;iþ QT ¼ (
∑
j ¼0
N
qi; j: ∀i∈ 1…N½
Problem (7) becomes:
Or
Subject to : z; tð Þ∈K ta; tbN
ð9bÞ
Where ta≤miniminz∈Kg(z) and tb≤maximaxz∈Kh(z) Problem (9) is written as:
Subject to : z; t; sð Þ∈K tatbN
tiþ si−hið Þ ¼ 0 : ∀i∈ 1…Nz ½ ð10dÞ
Whereβ=maximax{h(z)−ti} Using penalty techniques (see [23]), Problem (10) is equiv-alent to:
Min :−T þX
i ¼1
N
riðtiþ si−hið ÞzÞ ð11aÞ
Subject to : z; t; sð Þ∈K ta; tbN
Where riis sufficiently large
Problem (11) has the convex feasible set while whose objective function is concave, which is easily transformed to
a DC function There are many ways to decompose this function We can choose and test DCA with different DC decomposition ways (possibly use a similar way as did for f(x) in (10c)) Thus, we already transformed the origin prob-lem to a DC program All we have to do now is to use DCA
8 Conclusion This paper has focused on a new family of routing protocols for sensor networks: based routing protocols In chain-based routing, nodes form a chain connecting all nodes in the
Trang 8network Data are gathered from all sensor nodes and move
along the chain toward an elected sensor The role of the
elected node is rotated between all sensor nodes to increase
the network lifetime Chain-based routing exploits the data
aggregation capability of sensor networks at maximum When
data are gathered from all sensor nodes, the data are
aggregat-ed with the data from their neighbors into a single message
The process is repeated until a single message is collected at
the elected sensor node
The previous chain-based routing (PEGASIS) selects
the CH nodes uniformly among all sensor nodes It is
demonstrated in this chapter that the selection is a bad
practice to ensure a good lifetime Depending on the
energy usage of each sensor to send data to its neighbors
and to the base station, the sensor nodes should be elected
as a leader differently The paper has then proposed a
method to optimize the selection of the CH among all
sensor nodes using Linear Programming formulations As
it is not always practical to do the Linear Programming
formulation, a simple heuristic method called RE_chain is
proposed to calculate the selection Simulations showed
that RE_chain performs very closely to the Linear
Pro-gramming formulation The performance of RE_chain
was then compared to that of LEACH, PEGASIS This
was shown that RE_chain improves the system lifetime
significantly than that of PEGASIS Also, it was observed
that RE_chain performs about 3 times better than
LEACH
Although the actual optimal lifetime for chain-based
methods is unknown, two methods were proposed to
compute the upper bounds for the lifetime of any routing
method (including chain-based routing and cluster-based
routing) The first method is called “minimum energy
bound” and the second one is called “absolute bound”
It was proved that the absolute bounds are the upper
bound for any routing method
Furthermore, previous researches assume that the base
station position is randomly placed without optimization In
our works, a non convex optimization model has been
devel-oped for solving the base station location optimization
problem
References
1 Heinzelman WB, Chandrakasan AP, Balakrishnan H (2000)
Energy-efficient communication protocol for wireless microsensor networks,
33rd Hawaii International Conference Systems Sciences, Jan 2000
2 Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless
sensor networks: a survey IEEE Wirel Commun 11:6 –28
3 Tung NT (2009) Energy-efficient routing algorithms in wireless
sensor networks: PhD thesis, Monash University, Australia July 2009
4 Heinzelman WB, Chandrakasan AP (2002) An application specific protocol architecture for wireless microsensor networks IEEE Trans Wirel Commun 1(4):660 –670
5 Lindsey S, Raghavendra C (2002) Power-efficient gathering in sen-sor information systems IEEE Aerospace Conference, 2002
6 (2013) Traveling sale problem http://en.wikipedia.org/wiki/ Travelling_salesman_problem
7 (2013) GLPK programming http://www.gnu.org/software/glpk/
8 (2013) Linear Programming http://en.wikipedia.org/wiki/Linear_ programming , 2013
9 Tung NT, Vinh PC (2012) The energy-aware operational time of wireless Ad-hoc sensor networks, ACM/Springer Mobile Networks and Applications (MONET) Journal, Volumn 17, August, 2012, DOI: 10.1007/s11036-012-0403-1
10 Tung NT (2012) The power-save protocol of wireless ad-hoc sensor networks: Mediterranean Journal of Computers and Networks, Volumn 4, October, 2012 ISSN: 1744 –2397
11 Tung NT (2012) Heuristic energy-efficient routing solutions to ex-tend the lifetime of wireless Ad-Hoc Sensor Networks: Springer, LNCS 7197, p 487–497, 2012, ISBN: 978-3-642-28489-2
12 Paschalidis ICh, Wu R (2012) Robust maximum lifetime routing and energy allocation in wireless sensor networks, Int J Distrib Sensor Networks Volume 2012, Article ID 523787, 14 pagesdoi: 10.1155/ 2012/523787
13 Chang JH, Tassiulas L (2004) Maximum lifetime routingin wireless sensor networks IEEE/ACM Trans Networking 12(4):609–619
14 Giridhar A, Kumar PR (2005) Maximizing the functional lifetime of sensor networks, in Proceedings of the 4th International Symposium
on Information Processing in Sensor Networks (IPSN’05), pp 5–12, April 2005
15 Nama H, Mandayam N (2005) Sensor networks over information fields: optimal energy and node distributions, in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’05), vol 3, 1842–1847, March 2005
16 Nguyen TT, Nguyen VD (2013) Optimizing the operating time of wireless sensor network, EURASIP J Wireless Commun Netwo ISSN: 1687–1499, DOI: 10.1186/1687-1499-2012-348 (SCIE)
17 An LTH, Tao PD (2009) Minimum sum-of-squares clustering by DC programming and DCA, in advanced intelligent computing technol-ogy & applications, lecture notes in artificial intelligence (LNAI), Springer Verlag 2009, 14 pages
18 Tao PD, Nam NC, An LTH (2009) DC programming and DCA for globally solving the value-at-risk, computational management sci-ence (4)
19 An LTH, Moeini M, Tao PD (2009), Portfolio selection under down-side risk measures and cardinality constraints based on DC program-ming and DCA, Computational Management Science, Issue 4
20 Le Thi HA, Pham Dinh T, Huynh VN (2011) Exact penalty tech-niques in DC programming J Global Optim, 1 –27, doi: 10.1007/ s10898-011-9765-3
21 (2011) Recent advances on modelling and optimization techniques for intelligent computing in industrial engineering and systems man-agement organized by H.A Le Thi, T Pham Dinh, D.T Pham in 4th International Conference on Industrial Engineering and Systems Management, IESM 2011, May 25 –27, 2011, Metz, France
22 (2011) Nonconvex programming —local and global approaches” or-ganized by H.A Le Thi, 12e congrès annuel de la Sociéte française de Recherche Opérationnelle et d ’Aide à la Décision ROADEF 2011, St Etienne 2 –4 mars 2011
23 Thi HA Le, Dinh TP, Van NH, Exact penalty and error bound in DC programming, to appear in J Global Optim
24 (2012) Stream DC Programming and DCA: Theory, algorithms and applications —local and global approaches” organized by H.A Le Thi, T Pham Dinh in EURO Conference 2012 in Vilnius, OR creating competitive advantage, 25th European Conference on Operational Research, Vilinus (Lithuania), July 2012
Trang 925 Le Thi HA, Le Hoai M, Van Nguyen V, Pham Dinh T (2008) A DC
Programming approach for feature selection in support vector
ma-chines learning J Adv Data Anal Classif 2(3):259 –278, CrossRef
26 Le Thi HA, Van Nguyen V, Ouchani S (2008) Gene selection for
cancer classification using DCA In: Tang C, Ling CX, Zhou X,
Cercone NJ, Li X (eds.) ADMA 2008 LNCS (LNAI), vol 5139,
pp 62 –72 Springer, Heidelberg (2008)CrossRef
27 Weston J, Elisseeff A, Scholkopf B, Tipping M (2003) Use of the Zero-Norm with linear models and Kernel methods J Mach Learn Res 3:1439 –1461
28 Thi HAL, Nguyen QT, Phan KT, Dinh TP (2013) DC Programming and DCA based cross-layer, optimization in Multi-hop TDMA net-works, The 5th Asian Conference on Intelligent Information and Database Systems, LNCS 7803, p.398-408 March 2013, Malaysia
... networks: based routing protocols In chain- based routing, nodes form a chain connecting all nodes in the Trang 8network... upper bounds for the lifetime of any routing
method (including chain- based routing and cluster -based
routing) The first method is called “minimum energy
bound” and the second... programming J Global Optim, –27, doi: 10.1007/ s10898-011-9765-3
21 (2011) Recent advances on modelling and optimization techniques for intelligent computing in industrial engineering