{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:33:37Z","timestamp":1725881617823},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811039683"},{"type":"electronic","value":"9789811039690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3969-0_12","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T14:54:59Z","timestamp":1488466499000},"page":"101-109","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Algorithm of LEACH Protocol Based on Node\u2019s Trust Value and Residual Energy"],"prefix":"10.1007","author":[{"given":"Miaoyuan","family":"Huang","sequence":"first","affiliation":[]},{"given":"Enjian","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Xueqin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Khan, W.Z., Saad, N.M, Aalsalem, M.Y.: An overview of evaluation metrics for routing protocols in wireless sensor networks. In: 2012 4th International Conference on Intelligent and Advanced Systems, pp. 588\u2013593 (2012)","DOI":"10.1109\/ICIAS.2012.6306083"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Li, X.H, Hong, S.H., Fang, K.L.: A heuristic routing protocol for wireless sensor networks in home automation. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1\u20138 (2009)","DOI":"10.1109\/WICOM.2009.5304077"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless sensor networks. In: Proceedings of Hawaii International Conference on System Sciences. Hawaii (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. In: SIGMOD Record (2002)","DOI":"10.1145\/601858.601861"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Khan, A.K.: Evaluation of wireless sensor network routing protocols with respect to power efficiency. In: 2013 5th International Conference on Computational Intelligence and Communication Networks, pp. 123\u2013128 (2013)","DOI":"10.1109\/CICN.2013.36"},{"issue":"4","key":"12_CR6","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"W Heinzelman","year":"2002","unstructured":"Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660\u2013670 (2002)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"12_CR7","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., Fahmy, S.: HEED: a hybrid energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 3(4), 660\u2013669 (2004)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"5","key":"12_CR8","first-page":"75","volume":"52","author":"Z Tao","year":"2016","unstructured":"Tao, Z., Jiang, S.F.: Clustering algorithm for wireless sensor networks with mobile cluster heads. Comput. Eng. Appl. 52(5), 75\u201378 (2016)","journal-title":"Comput. Eng. Appl."}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3969-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T11:45:11Z","timestamp":1498391111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3969-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811039683","9789811039690"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3969-0_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}