iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S11277-020-07706-3
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T12:33:53Z","timestamp":1722774833161},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T00:00:00Z","timestamp":1597363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T00:00:00Z","timestamp":1597363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11277-020-07706-3","type":"journal-article","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T19:02:46Z","timestamp":1597431766000},"page":"91-103","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Wireless Sensor Network Path Optimization Using Sensor Node Coverage Area Calculation Approach"],"prefix":"10.1007","volume":"116","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3562-3913","authenticated-orcid":false,"given":"Usha Soni","family":"Verma","sequence":"first","affiliation":[]},{"given":"Namit","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"issue":"9","key":"7706_CR1","doi-asserted-by":"publisher","first-page":"5352","DOI":"10.11591\/telkomnika.v11i9.3290","volume":"11","author":"Z Sun","year":"2013","unstructured":"Sun, Z., & Li, Z. (2013). Wireless sensor network path optimization based on hybrid algorithm. Telkomnika, 11(9), 5352\u20135358.","journal-title":"Telkomnika"},{"key":"7706_CR2","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2015.05.043","volume":"52","author":"N Ilyas","year":"2015","unstructured":"Ilyas, N., Akbar, M., Ullah, R., Khalid, M., Arif, A., Hafeez, A., et al. (2015). SEDG: Scalable and efficient data gathering routing protocol for underwater WSNs. Procedia Computer Science, 52, 584\u2013591.","journal-title":"Procedia Computer Science"},{"key":"7706_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.asoc.2014.11.063","volume":"30","author":"SA Sert","year":"2015","unstructured":"Sert, S. A., Bagci, H., & Yazici, A. (2015). MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks. Applied Soft Computing, 30, 151\u2013165.","journal-title":"Applied Soft Computing"},{"key":"7706_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.inffus.2013.05.009","volume":"22","author":"SF Ochoa","year":"2015","unstructured":"Ochoa, S. F., & Santos, R. (2015). Human-centric wireless sensor networks to improve information availability during urban search and rescue activities. Information Fusion, 22, 71\u201384.","journal-title":"Information Fusion"},{"key":"7706_CR5","doi-asserted-by":"crossref","unstructured":"Saeed, A., Ahmadinia, A., Javed, A., & Larijani, H. (2016). Random neural network based intelligent intrusion detection for wireless sensor networks. In The international conference on computational science (Vol. 80, pp. 2372\u20132376).","DOI":"10.1016\/j.procs.2016.05.453"},{"key":"7706_CR6","doi-asserted-by":"publisher","first-page":"13260","DOI":"10.1109\/ACCESS.2017.2723892","volume":"5","author":"W Zhang","year":"2018","unstructured":"Zhang, W., Gong, X., Han, G., & Zhao, Y. (2018). An improved ant colony for path planning in one scenic area with many spots. IEEE Access, 5, 13260\u201313268.","journal-title":"IEEE Access"},{"key":"7706_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03115-0","author":"A Jain","year":"2020","unstructured":"Jain, A., Khari, M., Verd\u00fa, E., Omatsu, S., & Crespo, R. G. (2020). A route selection approach for variable data transmission in wireless sensor networks. Journal of Supercomputing. https:\/\/doi.org\/10.1007\/s10586-020-03115-0.","journal-title":"Journal of Supercomputing"},{"key":"7706_CR8","doi-asserted-by":"crossref","unstructured":"Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2012). Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET. In International conference on computer communication and informatics (ICCCI) (pp. 1\u20135).","DOI":"10.1109\/ICCCI.2012.6158842"},{"key":"7706_CR9","doi-asserted-by":"crossref","unstructured":"Saginbekov, S., & Shakenov, C. (2016). Hybrid simulators for wireless sensor networks. In IEEE conference on wireless sensors (ICWISE) (pp. 59\u201365).","DOI":"10.1109\/ICWISE.2016.8188543"},{"key":"7706_CR10","doi-asserted-by":"crossref","unstructured":"Abu-Mahfouz, A. M., & Hancke, G. P. (2011). ns-2 extension to simulate localization system in wireless sensor networks. In IEEE.","DOI":"10.1109\/AFRCON.2011.6072109"},{"key":"7706_CR11","doi-asserted-by":"publisher","first-page":"23388","DOI":"10.3390\/s141223388","volume":"14","author":"SFD Gennaro","year":"2014","unstructured":"Gennaro, S. F. D., Matese, A., Mancin, M., Primicerio, J., & Palliotti, A. (2014). An open-source and low-cost monitoring system for precision enology. Sensors, 14, 23388\u201323397.","journal-title":"Sensors"},{"key":"7706_CR12","doi-asserted-by":"publisher","first-page":"53576","DOI":"10.1109\/ACCESS.2018.2865909","volume":"6","author":"TA Alghamdi","year":"2018","unstructured":"Alghamdi, T. A. (2018). Secure and energy efficient path optimization technique in wireless sensor networks using DH method. IEEE Access, 6, 53576.","journal-title":"IEEE Access"},{"key":"7706_CR13","doi-asserted-by":"publisher","first-page":"21658","DOI":"10.1109\/ACCESS.2018.2827082","volume":"6","author":"C-M Yu","year":"2018","unstructured":"Yu, C.-M., & Ku, M.-L. (2018). Joint hybrid transmission and adaptive routing for lifetime extension of WSNs. IEEE Access, 6, 21658\u201321666.","journal-title":"IEEE Access"},{"key":"7706_CR14","doi-asserted-by":"publisher","first-page":"15787","DOI":"10.1109\/ACCESS.2018.2815039","volume":"6","author":"M Huang","year":"2018","unstructured":"Huang, M., Liu, Y., Zhang, N., Xiong, N. N., Liu, A., Zeng, Z., et al. (2018). A service routing based caching scheme for cloud CRNs. IEEE Access, 6, 15787\u201315805.","journal-title":"IEEE Access"},{"key":"7706_CR15","doi-asserted-by":"publisher","first-page":"21395","DOI":"10.1109\/ACCESS.2017.2755121","volume":"5","author":"A Naureen","year":"2017","unstructured":"Naureen, A., Zhang, N., & Furber, S. (2017). Identify energy holes in randomly deployed hierarchical wireless sensor networks. IEEE Access, 5, 21395\u201321417.","journal-title":"IEEE Access"},{"key":"7706_CR16","doi-asserted-by":"publisher","first-page":"15927","DOI":"10.1109\/ACCESS.2017.2722379","volume":"5","author":"ZH Mir","year":"2017","unstructured":"Mir, Z. H., & Ko, Y. B. (2017). Collaborative topology control for many to many communication in wireless sensor networks. IEEE Access, 5, 15927\u201315941.","journal-title":"IEEE Access"},{"issue":"1","key":"7706_CR17","first-page":"532","volume":"2","author":"S Ahmed","year":"2011","unstructured":"Ahmed, S., Ramani, A. K., & Zafar, N. A. (2011). Formal verification of route request procedure for AODV routing protocol. International Journal of Advanced Research in Computer Science, 2(1), 532.","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"7706_CR18","unstructured":"Chiyangwa, S., & Kwiatkowska, M. (2003). Modeling ad hoc on-demand distance vector (AODV) protocol with time automata. In Proceedings of third workshop on automated verification of critical systems, 2003."},{"key":"7706_CR19","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.compeleceng.2016.06.017","volume":"56","author":"SV Manisekaran","year":"2016","unstructured":"Manisekaran, S. V., & Venkatesan, R. (2016). An analysis of software-defined routing approach for wireless sensor networks. Computers & Electrical Engineering, 56, 456\u2013467.","journal-title":"Computers & Electrical Engineering"},{"issue":"2","key":"7706_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1002\/rsa.20174","volume":"32","author":"B Gupta","year":"2008","unstructured":"Gupta, B., Iyer, S. K., & Manjunath, D. (2008). Topological properties of the one dimensional exponential random geometric graph. Random Structures & Algorithms, 32(2), 181\u2013204.","journal-title":"Random Structures & Algorithms"},{"key":"7706_CR21","first-page":"400","volume":"4","author":"M Doheir","year":"2014","unstructured":"Doheir, M., Kadhim, A., Fariza, K. A., Samah, A., Hussin, B., & Basari, A. S. H. (2014). Extension of NS2 framework for wireless sensor network. Journal of Computational and Theoretical Nanoscience, 4, 400\u2013407.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"7706_CR22","first-page":"2372","volume":"80","author":"A Saeed","year":"2016","unstructured":"Saeed, A., Ahmadinia, A., Javed, A., & Larijani, H. (2016). Random neural network based intelligent intrusion detection for wireless sensor networks. The International Conference on Computational Science, 80, 2372\u20132376.","journal-title":"The International Conference on Computational Science"},{"key":"7706_CR23","doi-asserted-by":"crossref","unstructured":"Ranasinghe, D. C., Falkner, N. J. G., Chao, P., & Hao, W. (2013). Wireless sensing platform for remote monitoring and control of wine fermentation. In IEEE ISSNIP, 2013 (pp. 503\u2013508).","DOI":"10.1109\/ISSNIP.2013.6529841"},{"key":"7706_CR24","unstructured":"Douik, A., Aly, S. A., Al-Naffouri, T. Y., & Alouini, M.-S. (2017). Cardinality estimation algorithm in large-scale anonymous wireless sensor networks. In International conference on advanced intelligent systems and informatics, 2017 (pp. 1\u201310)."},{"issue":"4","key":"7706_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5121\/jgraphoc.2011.3402","volume":"3","author":"B Baranidharan","year":"2011","unstructured":"Baranidharan, B., & Shanthi, B. (2011). A new graph theory based routing protocol for wireless sensor networks. International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC), 3(4), 15\u201326.","journal-title":"International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC)"},{"key":"7706_CR26","doi-asserted-by":"crossref","unstructured":"Pricop, E., Mihalache, S. F., Paraschiv, N., Fattahi, J., & Zamfir, F. (2016). Considerations regarding security issues impact on systems availability. In IEEE, international conference on electronics, computers and artificial intelligence (ECAI) (pp. 1\u20136).","DOI":"10.1109\/ECAI.2016.7861110"},{"issue":"3","key":"7706_CR27","first-page":"728","volume":"2","author":"PK Maurya","year":"2012","unstructured":"Maurya, P. K., Sharma, G., Sahu, V., Roberts, A., & Srivastava, M. (2012). An overview of AODV routing protocol. International Journal of Modern Engineering Research (IJMER), 2(3), 728\u2013732.","journal-title":"International Journal of Modern Engineering Research (IJMER)"},{"key":"7706_CR28","doi-asserted-by":"crossref","unstructured":"Minakov, I., Passerone, R., Rizzardi, A., & Sicari, (2016). Routing behavior across WSN simulators: The AODV case study. In IEEE world conference on factory communication systems (WFCS).","DOI":"10.1109\/WFCS.2016.7496514"},{"key":"7706_CR29","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.procs.2013.06.035","volume":"19","author":"H Tan","year":"2013","unstructured":"Tan, H., Hao, X., Wang, Y., Lau, F. C. M., & Lv, Y. (2013). An approximate approach for area coverage in wireless sensor networks. Procedia Computer Science, 19, 240\u2013247.","journal-title":"Procedia Computer Science"},{"issue":"4","key":"7706_CR30","first-page":"1","volume":"17","author":"R Elhabyan","year":"2019","unstructured":"Elhabyan, R., Shi, W., & St-Hilaire, M. (2019). Coverage protocols for wireless sensor networks: Review and future directions. Journal of Communications and Networks, 17(4), 1\u201316.","journal-title":"Journal of Communications and Networks"},{"key":"7706_CR31","doi-asserted-by":"publisher","first-page":"11338","DOI":"10.1109\/ACCESS.2018.2889717","volume":"7","author":"T Xie","year":"2019","unstructured":"Xie, T., Zhang, C., Zhang, Z., & Yang, K. (2019). Utilizing active sensor nodes in smart environments for optimal communication coverage. IEEE Access, 7, 11338\u201311348.","journal-title":"IEEE Access"},{"key":"7706_CR32","doi-asserted-by":"publisher","first-page":"6134","DOI":"10.1109\/ACCESS.2017.2676004","volume":"5","author":"N Jan","year":"2017","unstructured":"Jan, N., Javaid, N., Javaid, Q., Alrajeh, N., Alam, M., Khan, Z. A., et al. (2017). A balanced energy consuming and hole alleviating algorithm for wireless sensor networks. IEEE Access, 5, 6134\u20136150.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07706-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07706-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07706-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T23:35:23Z","timestamp":1628897723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07706-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,14]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["7706"],"URL":"http:\/\/dx.doi.org\/10.1007\/s11277-020-07706-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,14]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}