{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:18:14Z","timestamp":1756894694167},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_37","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"391-404","source":"Crossref","is-referenced-by-count":6,"title":["Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B"],"prefix":"10.1007","author":[{"given":"Peng","family":"Li","sequence":"first","affiliation":[]},{"given":"Wanyuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"37_CR1","unstructured":"Loscri, V., Marano,S., Morabito, G.: A Two Levels Hierarchy for Low-Energy Adaptative Clustering Hierarchy(TL-LEACH). Proceedings \u201cVTC2005\u201d, Dallas (USA), (2005) 1809-1813"},{"key":"37_CR2","unstructured":"Nan Meng, Jiahong Wang, Eiichiro Kodama, Toyoo Takata: Reducing data leakage possibility resulted from eavesdropping in wireless sensor network. Vol. 3. International Journal of Space-Based and Situated Computing (2013) 55-65"},{"key":"37_CR3","unstructured":"Majid Bahrepour, Nirvana Meratnia, Mannes Poel, Zahra Taghikhaki, Paul J.M. Havinga: Use of wireless sensor networks for distributed event detection in disaster management applications. Vol. 2. International\u00a0Journal\u00a0of\u00a0Space-Based\u00a0and\u00a0Situated\u00a0Computing (2012) 58-69"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Jun Xia, Rui Yun, Kai Yu, Fei Yin, Haifeng Wang, Zhiyong Bu: A coordinated mechanism for multimode user equipment accessing wireless sensor network. Vol. 5. International Journal of Grid and Utility Computing (2014) 1-10","DOI":"10.1504\/IJGUC.2014.058232"},{"key":"37_CR5","unstructured":"Konstantin Mikhaylov, Jouni Tervonen: Energy-efficient routing in wireless sensor networks using power-source type identification. Vol. 2. International\u00a0Journal\u00a0of\u00a0Space-Based\u00a0and\u00a0Situated\u00a0Computing (2012) 253-266"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Li Shancang, Zhang Kewang: Principles and applications of wireless sensor networks. China Machine Press, Beijing (2008) 58~59.","DOI":"10.1007\/978-0-387-49592-7"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Jing Zhang, Ting Yang, Chengli Zhao: Energy-efficient and self-adaptive routing algorithm based on event-driven in wireless sensor network. Vol. 7. International Journal of Grid and Utility Computing (2016) 41-49","DOI":"10.1504\/IJGUC.2016.073776"},{"key":"37_CR8","unstructured":"Chen Xiaojuan, Wang Zhuo, Wu Jie: An improved WSN LEACH routing algorithm. Vol. 26. Sensor Technology (2013) 116-121"},{"key":"37_CR9","unstructured":"Chen Xiaoya, Liu Dundong: Improvement on LEACH protocol base on K-means cluster. Xiamen University (2014)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Yong-zhen Li, Ai-li Zhang, Yu-zhu Liang: Improvement of Leach Protocol for Wireless Sensor Networks. Vol.12. Third International Conference on Instrumentation (2013) 322-326","DOI":"10.1109\/IMCCC.2013.74"},{"key":"37_CR11","unstructured":"Olutayo Boyinbode, Hanh Le, Makoto Takizawa.:A survey on clustering algorithms for wireless sensor networks. Vol. 1. International Journal of Space-Based and Situated Computing (2011) 130-136"},{"key":"37_CR12","unstructured":"An Wenjuan, Hu Zhengming: The research and improvements of Real-time IP traffic identification technology based on clustering algorithm. Beijing University of Posts and Telecommunications (2013)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Mishra T, Panda A.R.: Energy Efficient Coverage and Connectivity with Varying Energy Level in WSN. Vol.12. Computational Intelligence and Networks (CINE), 2015 International Conference on (2015) 86-91","DOI":"10.1109\/CINE.2015.26"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:47:10Z","timestamp":1498355230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_37","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}