An Effective Scheduling-Based RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network
An Effective Scheduling-Based RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network
Shanjin Wang,1 Zhonghua Li,2 Chunhui He,2 and Jianming Li2
1School of Electronic Engineering, Dongguan University of Technology, Dongguan, Guangdong 523808, China
2School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, Guangdong 510006, China
Received 21 July 2015; Accepted 20 December 2015
Academic Editor: Nazrul Islam
Copyright © 2016 Shanjin Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Radio frequency identification, that is, RFID, is one of important technologies in Internet of Things. Reader collision does impair the tag identification efficiency of an RFID system. Many developed methods, for example, the scheduling-based series, that are used to avoid RFID reader collision, have been developed. For scheduling-based methods, communication resources, that is, time slots, channels, and power, are optimally assigned to readers. In this case, reader collision avoidance is equivalent to an optimization problem related to resource allocation. However, the existing methods neglect the overlap between the interrogation regions of readers, which reduces the tag identification rate (TIR). To resolve this shortage, this paper attempts to build a reader-to-reader collision avoidance model considering the interrogation region overlaps (R2RCAM-IRO). In addition, an artificial immune network for resource allocation (RA-IRO-aiNet) is designed to optimize the proposed model. For comparison, some comparative numerical simulations are arranged. The simulation results show that the proposed R2RCAM-IRO is an effective model where TIR is improved significantly. And especially in the application of reader-to-reader collision avoidance, the proposed RA-IRO-aiNet outperforms GA, opt-aiNet, and PSO in the total coverage area of readers.
As a wireless automatic identification and data capture technique, RFID (radio frequency identification) is employed to automatically identify the targets. With the main advantages of noncontact and fast reading rate for multiple targets, RFID has been applied widely in logistics, supply chain management, transportation, manufacturing, positioning, and many other fields [1, 2].
For RFID applications with many tags within a large deployment region, multiple or even dense readers are necessary to enhance the identification efficiency. If R2RCP (reader-to-reader collision problem) happens, the identification efficiency of the systems will be reduced inevitably. Therefore, how to solve R2RCP has become one research focus. In general, scheduling-based reader collision avoidance methods are suitable for stationary reader scenarios. In the scheduling-based series, one or more kinds of communication resources, that is, time slots, channels, and power, are allocated to readers to maximize the tag identification efficiency of RFID systems. Further, intelligent algorithms are applied to optimize the utility of RFID systems. In , the reader collision problem is formulated as 0/1 integer programming problem and a simulated annealing algorithm is introduced to solve it. In , time slots are allocated by using color graphing and PSO. A resource allocation-based model is built in  and is optimized by using the genetic algorithm (RA-GA). Such model is improved as a reader-to-reader collision avoidance model (R2RCAM) by . And a well designed artificial immune system is introduced to optimize R2RCAM, which has better performance in solving R2RCP by comparison with RA-GA and a random method (RM). These achievements indicate that intelligent algorithms are effective to deal with the reader collision problems from the viewpoint of resource scheduling. Note that a family of coverage-based methods [7, 8] deal with the reader collision problem by adaptively controlling the communication power of readers and minimizing the overlap between the interrogation region. Inspired by such spirit, it is worth to consider the overlap of the interrogation regions of readers and the resource of power, while R2RCAM without consideration about overlap is not suitable for the practice of RFID applications.
In order to overcome the defects of canonical R2RCAM, this paper proposes an effective R2RCAM considering the interrogation region overlap (R2RCAM-IRO). The proposed R2RCAM-IRO takes into account not only the overlap but also the resource of power and the tag identification capacity of a reader. In addition, a revised artificial immune network (aiNet), namely, RA-IRO-aiNet, is designed to optimize R2RCAM-IRO. The proposed R2RCAM-IRO is expected to improve the tag identification rate with limited communication resources for multiple readers, where the proposed RA-IRO-aiNet is used.
The rest of our paper is arranged as follows. Section 2 reviews related theories and principles including R2RCP, R2RCAM, and the basic artificial immune network. Section 3 proposes R2RCAM-IRO and RA-IRO-aiNet. And Section 4 proves the effectiveness of the proposed model and compares RA-IRO-aiNet with RA-GA , PSO , and opt-aiNet  in the area of effective interrogation region by numerical simulations. And finally, the conclusions are made in Section 5.
2. Reviews of Related Theories and Principles2.1. Reader-to-Reader Collision Problem (R2RCP)
A basic RFID system is composed of some tags, one or more readers, and an application system, as shown in Figure 1. Multiple readers operating within a group become a reader network. When a tag attached to the objects to be identified enters the interrogation region of a reader, it will be powered and activated. Then, the tag sends its corresponding information to the reader. The reader identifies the tag by receiving information and sends the corresponding data to related application system for further processing and storage. And the readers operate according to the commands of the application system.
Figure 1: Schematic description of a basic RFID system.
In multiple-reader scenarios, the backscatter signal of a tag is easily disturbed. This is because the backscatter power is much weaker than the transmitting power of any neighboring interfering reader. As a result, R2RCP will happen and decrease the desired reader’s effective interrogation radius.
Figure 2 shows an example of R2RCP with two readers, where one is a desired reader and the other is an interfering reader . The distance between and is defined as . If only is operating, that is, is not interfered; it can harvest a maximum interrogation radius with the value of . However, if is operating simultaneously with , the interrogation radius of reader will reduce to . Further, strong enough interference from will probably make smaller than which is the distance from the target tag to . Consequently, is not able to detect successfully. To sum up, the radius of the desired reader follows
Figure 2: Reader-to-reader collision problem.
2.2. Canonical Reader-to-Reader Collision Avoidance Model (R2RCAM)
Assume that readers are deployed randomly in a specified region with the area of . channels and slots are available to be allocated for these readers.
For clarification, three variables are defined as in Table 1.
Table 1: Definitions of the variables.
And can be calculated by solvingwhere is the signal-to-interference-plus-noise ratio (SINR) for in the slot, is the desired minimum value of SINR to identify tags, presents the normalized spectrum power, presents reflection coefficient of effective power, represents the gain of transmitting antenna, represents the gain of receiving antenna, is the referenced path loss at 1 m distant from a reader, is the exponent of path loss that is not less than two, and denotes the fading coefficient. The signal fading is ignored due to the line-of-sight distance between readers. In addition, represents the operating power of in the slot. According to EPC global C1G2 , denotes the spectrum mask level and is also a function with the arguments of the channel interval between readers. is the channel number used by in the slot, where . Note that is a 2-value function which equals 1 if is operating at the slot and equals 0 otherwise. Please see  for detailed derivations.
However, must be not more than ; that is,where is the required minimum power for tag operation, means the modulation depth, and is the wavelength of in the slot.
Accordingly, can be determined byIn R2RCAM, the utility of an RFID system is evaluated by the interrogation region area of all the readers which is defined as . To maximize , R2RCAM is formulated as
2.3. Artificial Immune Network (aiNet)
To solve theoretical or engineering problems which can be generalized as optimization problems, for example, R2RCAM, intelligent algorithms are generally employed. aiNet is a main member in artificial immune systems, which is enlightened by biological immune systems to solve real-world problems .
Take the canonical opt-aiNet  as an example to introduce the structure of aiNet. The opt-aiNet uses real number encoding and has five operators, that is, cloning, mutation, selection, suppression, and recruitment. In the cloning phase, opt-aiNet uses the uniform cloning operator, where a fix-number cloning is conducted for each antibody individual, and all the clones except the parent one experience the Gaussian mutation followingThen, only one antibody, whose affinity is the highest among offsprings, is selected to enter the next generation. In (6), is a random variable following Gaussian distribution whose mean is zero and standard deviation is 1, is the control coefficient, is the mutated antibody of , and is the function of normalized affinity in the interval . If the average affinity looks stable, the suppression operator will be triggered. For any two antibodies, if their distance is smaller than a suppression threshold , the one with lower affinity will be removed. Then, a number of antibodies are randomly generated and merged into the antibody population to keep the population diversity. Repeat the above process until it is terminated.
3. The Proposed R2RCAM-IRO Optimized by RA-IRO-aiNet3.1. R2RCAM-IRO3.1.1. Modeling of R2RCAM-IRO
To solve theoretical optimization problem, let us assume that tags are distributed uniformly in the deployment region and the maximum transmitting power of readers is . And the other assumptions are the same as those of R2RCAM.
Taking into account the identification capacity of a reader in a slot, must satisfywhere is the maximum number of tags that can identify in one slot. As a result, we can getAccording to (3) and (8), is determined byTag identification rate (TIR) is a measure of the RFID system performance. TIR is defined as the ratio of the number of identifiable tags to the total number of tags. Because of the assumption that the tags are distributed uniformly, TIR is equal to the ratio of the total interrogation area to the reader deployment region area. That is, In the canonical R2RCAM, is calculated easily by (5). However, there may be an overlap between the interrogation regions of some readers. Thus, the canonical R2RCAM does not meet the practice requirement and decreases TIR of the RFID system. Let represent the interrogation region of the reader . And in the proposed R2RCAM-IRO, the total interrogation region followswhere is the interrogation region of in the slot.
Consequently, R2RCAM-IRO can be formulated as
3.1.2. Analysis of R2RCAM-IRO
Assume that when the maximum TIR is obtained, a reader works in slot ( and ) and the interrogation radii are , respectively. Without loss of generality, it is assumed that . As a result,This indicates that if just works in slot, its interrogation area will not change. Assume that another reader () works in slot (, , , and ) and its interrogation radius in slot is denoted by . If does not work in slot, the theoretical interrogation radius of will increase because its total interference decreases. With the constraints of the maximum reader interrogation radius and the identification capacity, the interrogation radius may be unchanged. Thus, and can be obtained. Thus, the total interrogation region of satisfiesThus, the total area of the interrogation regions of all the readers satisfiesClearly, the total interrogation area of an RFID system when each reader just works in one slot is not less than that when some readers operate in two or more slots. Thus, only one slot can be allocated to each operating reader in R2RCAM-IRO.
3.1.3. Calculation Procedure of
Due to the interrogation region overlap, cannot be calculated directly. Thus, a grid method is employed to compute . Taking Figure 3 as an example, the details of the grid method are depicted as follows.
Figure 3: Graphical representation of the grid method.
Step 1. Determine the region of all the circles shown as the red rectangle with the length of and the width of .
Step 2. Divide the region into ( and ) small rectangles with the area of , where determines the accuracy.
Step 3. Mark those small rectangles whose centers lie in any one of the circles as shown in yellow.
Step 4. Count the number of the marked small rectangles and use the total area of these rectangles as the result of ; that is, .
If the parameter is large, the accuracy will be impaired. However, smaller will result in a significant increase of the computational complexity. So, a preprocessing procedure is necessary to decrease the complexity by reducing the number of the circles and the area of the rectangular region. There are four situations for a single circle, where () it lies in some circle; () it is independent and does not intersect with any other circles; () it intersects with only one circle; or () it intersects with two or more circles. For any circle, if it is in , it can be removed without having an impact on the result. If it is in , its area can be calculated easily. If it is in , its area without the overlap is added to the result. And then, this circle can be removed. It is assumed that a circle with the centric point intersects with the other circle with the centric point at point and point . And then the area of the overlap can be obtained bywhere is , is , and is the distance from the point to the point . For , the grid method is employed.
Taking Figure 4 as an example, the details of the preprocessing procedure are depicted as follows.
Figure 4: Example of the preprocessing procedure.
Step 1. Find the circles in some other circles, such as the one in the red solid box in Figure 4(a). And then remove it.
Step 2. Find the independent circles, such as the two in the red solid box in Figure 4(b). Calculate their area and add it to the result. And then remove them.
Step 3. Find the circles intersected with only one other circle, such as the one in the red solid box in Figure 4(c). Calculate the area without the overlap as shown in green by (16) and add it to the result. And then remove it.
Step 4. If new independent circles or ones intersected with another circle appear, repeat Steps 2 and 3 until any circle intersects with two or more other ones.
Step 5. Separate the rest of the circles into groups, where the intersected circles belong to the same group and circles in different groups do not intersect with each other, as shown in Figure 4(d). And the area of each group is calculated by the grid method.
By improving the main immune operators, artificial immune networks become efficient, adaptive, and suitable for the practical applications. To find the optimal scheme of time slots, channels, and power for an RFID reader network, this subsection designs RA-IRO-aiNet to solve R2RCAM-IRO. The technical details of the proposed algorithm are introduced in the following subsections.
3.2.1. Encoding Format
A hybrid encoding format is used in RA-IRO-aiNet uses. Table 2 presents the encoding format used by the antibody. In Table 2, each antibody includes three segments of the slot, the channel, and the power, where is an integer and denotes the time slot, is an integer and denotes the channel, and is a real number and denotes the power. Note that means that does not operate.
Table 2: Encoding format for the antibody individual.
3.2.2. Affinity Function
To evaluate each antibody individual about the resource scheduling solution, an affinity function is designed according to R2RCAM-IRO presented in Section 2, which is presented as
In the initialization, an antibody population with individuals is constructed randomly. And each antibody must be feasible, where , , and for and .
3.2.4. Cloning Operator
The uniform cloning operator is used, where each antibody is reproduced for a constant multiplier of . The uniform cloning is simple to implement and can remarkably depress the computational consumption. All the cloned offsprings except the parent antibodies will execute the following mutation operator in order to increase the population diversity.
3.2.5. Mutation Operator
Because the proposed RA-IRO-aiNet uses hybrid encoding, a differentiated mutation operator is employed, in which different segments (i.e., the slot, the channel, and the power) of each antibody experience different mutation processes. In detail, the random uniform mutation operator is employed for the slot segment and the channel segment, where a randomly selected bit is changed randomly in its set of feasible solutions. And for the power segment, the used Gaussian mutation operator is given in (6). Note that only one randomly selected segment experiences the mutation for each offspring. The pseudocode of the mutation process is shown in Pseudocode 1.
Pseudocode 1: Pseudocode of the mutation process.
3.2.6. Suppression Operator and Recruitment
The similarity between any two antibodies is evaluated by the measure of hybrid distance (). It is obtained by the sum of the normalized distance of each segment. The corresponding formula is given in (18)where and are the Hamming distance of the slot segment and the channel segment, respectively, is the Euclidean distance of the power segment, and is the maximum Euclidean distance which equals . The higher the hybrid distance is, the better diversity the antibody population has. Thus, in order to keep the diversity of the antibody population, once the hybrid distance of two antibodies is smaller than a threshold , the antibody with lower affinity will be suppressed. The threshold is determined by such defined similarity followingThe desired goal is to adjust the threshold dynamically and to remove those of similar antibodies. After the suppression operator, some new antibodies are randomly produced to keep the antibody population at the number of .
The flowchart of our proposed RA-IRO-aiNet is shown in Figure 5. The left orange box shows the flowchart of opt-aiNet, while the right green box highlights the revised immune operators of RA-IRO-aiNet. In RA-IRO-aiNet, each antibody experiences the uniform cloning operator, the differentiated mutation operator, the hybrid similarity evaluation, the similarity-based suppression operator, and the recruitment in each generation. Repeat the above process until it is terminated.
Figure 5: Flowchart of the proposed RA-IRO-aiNet.
4. Simulations and Results4.1. Environment for Simulation
In the numerical simulations, suppose that readers are randomly deployed in a square area of 100 × 100 m2 and in the multiple-reader scenarios, where readers and tags transmit in the same channels following EPCglobal C1G2 . All parameters in R2RCAM-IRO are listed in Table 3.
Table 3: Parameters in R2RCAM-IRO.
4.2. Simulation Results and Discussion
The effectiveness of the proposed R2RCAM-IRO optimized by the designed RA-IRO-aiNet is discussed in this subsection. And furthermore, the efficiency of the designed RA-IRO-aiNet is examined by comparison with RA-GA , PSO , and opt-aiNet  in the total coverage area of the readers.
For all algorithms in the simulations, the population size is set to 50, the maximum number of generations is set to 1000, and all the numerical simulations are repeated for 50 runs. In the proposed RA-IRO-aiNet, the encoding format has been introduced in Section 3.2.1, the cloned multiplier is 10, the control parameter of mutation is 100, and the suppression parameter is 10%. RA-GA uses hybrid encoding; in other words, the integer encoding is used in both the slot segment and the channel segment, and the 6-bit binary encoding for is used in the power segment. PSO uses real number encoding. And, opt-aiNet also uses real number encoding and has the same cloned copies and control parameters of mutation to the proposed RA-IRO-aiNet. Other parameters of RA-GA, opt-aiNet, and PSO used in the simulations are referred to in [4, 5] and , respectively.
4.2.1. Effectiveness of the Proposed R2RCAM-IRO
Figure 6 shows TIRs from two different models: the proposed R2RCAM-IRO and R2RCAM. Note that the overlap is considered in R2RCAM-IRO but not in R2RCAM. As shown in Figure 6, TIRs grow nonlinearly as the number of readers increases and is less than 24. When more readers are added, R2RCP become more serious, and thus the solution dimension increases more. It heavily degrades the convergence performance of RA-IRO-aiNet. Consequently, TIRs begin to decrease. These two models have similar TIR with less than 10 readers, while TIR of the proposed R2RCAM-IRO is much better than that of R2RCAM. For example, with 20 readers, the proposed R2RCAM-IRO harvests an improvement of 11.9%.
Figure 6: Tag identification rate.
Assume that 10 channels are available for 20 readers, and the maximum power is 1 W. In this case, Figure 7 shows the effect of the number of available time slots on TIR. Seen from Figure 7, when the slot number increases from 3 to 15, TIR increases nonlinearly and is gradually approximate to 38% optimized by the proposed R2RCAM-IRO, while TIR is lower than 36%, if R2RCAM is used.
Figure 7: Effect of the number of available time slots.
Assume that 5 time slots are available for 20 readers, and the maximum power is 1 W. In this case, Figure 8 presents the effect of the number of available channels. In Figure 8, TIRs of the two models are similar when the number available channels is less than 6, while the proposed R2RCAM-IRO shows its superiority obviously with more available channels. In particular, with 20 channels, TIR of the proposed R2RCAM-IRO can reach 33.6%, which improves R2RCAM by 16.7%.
Figure 8: Effect of the number of available channels.
Assume that 5 time slots and 10 channels are available for 20 readers. In this case, Figure 9 describes the effect of the power. As shown in Figure 9, TIR increases when the power becomes greater and is approaching 31% for the proposed R2RCAM-IRO, while it is approaching 29% for R2RCAM. The proposed R2RCAM-IRO improves TIR by 7.9% with the maximum power of 2 W compared with R2RCAM.
Figure 9: Effect of the power.
The results from Figures 6–9 illustrate that R2RCAM-IRO is effective and outperforms R2RCAM, where the overlap is ignored in the tag identification rate with limited resources.
4.2.2. Comparison in the Total Coverage Area of the Readers
Assume that 5 time slots and 10 channels are available for 20 readers, and the maximum power is 1 W. In this case, Figure 10 shows the total coverage area of readers based on the proposed model optimized by RA-GA, opt-aiNet, PSO, and the proposed RA-IRO-aiNet.
Figure 10: Total coverage area.
As shown in Figure 10, these four algorithms perform similarly to some extent in the optimal total coverage area with less than 6 readers. This is because the dimension of the solution is so low that each algorithm can capture the global optima and some desired solution. However, as more readers are added, the dimension of the solution becomes higher, which degrades the convergence performance. And the total coverage area optimized by RA-IRO-aiNet is much better than those obtained by the other algorithms. In particular, with 30 readers, the proposed algorithm has an improvement of 14.69%, 49.15%, and 74.43% compared with RA-GA, opt-aiNet, and PSO, respectively.
Figure 11 gives the graphical representations of interrogation regions with 30 readers for the best solutions optimized by RA-GA, opt-aiNet, PSO, and the proposed RA-IRO-aiNet, respectively.
Figure 11: Graphical representation of the readers’ interrogation regions.
As shown in Figure 11, it is clear that the readers, where the proposed RA-IRO-aiNet is used, have much larger interrogation region than those by the other three algorithms. The proposed RA-IRO-aiNet has 16 operating readers with the average radius of 3.9887 m, while RA-GA has 15 operating readers with the average radius of 3.4899 m, PSO has 14 operating readers with the average radius of 3.6659 m, and opt-aiNet has 15 operating readers with the average radius of 3.0091 m. This indicates that the proposed RA-IRO-aiNet has larger average radius with more operating readers and outperforms the other three algorithms in interrogation regions especially in dense reader scenarios.
In this paper, the problem of RFID reader-to-reader collision is studied. And an enhanced collision avoidance model (i.e., R2RCAM-IRO) related to time slots, channels, and power is formulated. In the proposed model, the overlap between the interrogation regions of readers and the tag identification capacity of readers are considered. This makes R2RCAM-IRO suitable for the practice of RFID applications. In addition, a revised artificial immune network (i.e., RA-IRO-aiNet) is designed to optimize the proposed R2RCAM-IRO. In RA-IRO-aiNet, the hybrid encoding, uniform cloning, differentiated mutation, hybrid distance based similarity evaluation, and similarity-based suppression are helpful to optimize the proposed R2RCAM-IRO. The simulation results show that the proposed R2RCAM-IRO is effective in tag identification rate with limited communication resources and the proposed RA-IRO-aiNet outperforms RA-GA, opt-aiNet, and PSO in the total coverage area of readers.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This work is partially supported by the National Nature Science Foundation of China under Grants nos. 61201087 and 61471122, the Guangdong Natural Science Foundation under Grant no. S201301001182, the Science and Technology Program of Huizhou under Grant nos. 2013B020015006 and 2014B020004025, the Science and Technology Program of Zhaoqing under Grants nos. 2012G027 and 2013C003, and the Science and Technology Program of Guangzhou under Grant no. 2014J4100001.
References S. D. Park and H. Lee, “Self-recognition of vehicle position using UHF passive RFID tags,” IEEE Transactions on Industrial Electronics, vol. 60, no. 1, pp. 226–234, 2013. View at Publisher · View at Google Scholar · View at ScopusG. M. Gaukler, “Item-level RFID in a retail supply chain with stock-out-based substitution,” IEEE Transactions on Industrial Informatics, vol. 7, no. 2, pp. 362–370, 2011. View at Publisher · View at Google Scholar · View at ScopusC.-F. Lin and F. Y.-S. Lin, “A simulated annealing algorithm for RFID reader networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 1671–1674, IEEE, Kowloon, China, March 2007. View at Publisher · View at Google Scholar · View at ScopusT. Chen, Y. S. Yang, and B. Yang, “RFID dense reader network anti-collision PSO model and solving,” in Proceedings of the 3rd International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC '11), vol. 1, pp. 92–96, IEEE, Zhejiang, China, August 2011. View at Publisher · View at Google Scholar · View at ScopusH. Seo and C. Lee, “A new GA-based resource allocation scheme for a reader-to-reader interference problem in RFID systems,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, Cape Town, South Africa, May 2010. View at Publisher · View at Google Scholar · View at ScopusZ. Li and C. He, “Optimal scheduling-based RFID reader-to-reader collision avoidance method using artificial immune system,” Applied Soft Computing Journal, vol. 13, no. 5, pp. 2557–2568, 2013. View at Publisher · View at Google Scholar · View at ScopusW. Alsalih, K. Ali, and H. Hassanein, “A power control technique for anti-collision schemes in RFID systems,” Computer Networks, vol. 57, no. 9, pp. 1991–2003, 2013. View at Publisher · View at Google Scholar · View at ScopusW. Dong and X. Hao, “The optimization control of UHF reader transmit power,” in Proceedings of the 2nd International Conference on Computer Science and Network Technology (ICCSNT '12), pp. 996–1000, IEEE, Changchun, China, December 2012. View at Publisher · View at Google Scholar · View at ScopusL. N. de Castro and J. Timmis, “An artificial immune network for multimodal function optimization,” in Proceedings of the Congress on Evolutionary Computation (CEC '02), vol. 1, pp. 699–704, IEEE, Honolulu, Hawaii, USA, May 2002. View at Publisher · View at Google Scholar · View at Scopus EPCglobal, “EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz–960MHz version 1.0.9,” EPCglobal Standard Specification, 2004. Z. Li, Y. Zhang, and H.-Z. Tan, “IA-AIS: an improved adaptive artificial immune system applied to complex optimization problems,” Applied Soft Computing Journal, vol. 11, no. 8, pp. 4692–4700, 2011. View at Publisher · View at Google Scholar · View at Scopus