{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:38Z","timestamp":1726037558197},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_21","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:03:25Z","timestamp":1563433405000},"page":"219-227","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Advanced Spatial Reutilization for Finding Ideal Path in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"A.","family":"Basi Reddy","sequence":"first","affiliation":[]},{"given":"P.","family":"Liyaz","sequence":"additional","affiliation":[]},{"given":"B.","family":"Surendra Reddy","sequence":"additional","affiliation":[]},{"given":"K.","family":"Manoj Kumar","sequence":"additional","affiliation":[]},{"given":"K.","family":"Sathish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"issue":"22","key":"21_CR1","first-page":"16269","volume":"9","author":"SJ Shabu","year":"2014","unstructured":"Shabu, S.J., Kumar, M.: \u201cK\u201d preserving user\u2019s privacy in personalized search. Int. J. Appl. Eng. Res. (IJAER) 9(22), 16269\u201316276 (2014)","journal-title":"Int. J. Appl. Eng. Res. (IJAER)"},{"issue":"16","key":"21_CR2","first-page":"36358","volume":"10","author":"KM Kumar","year":"2015","unstructured":"Kumar, K.M., Vikram, M.: Disclosure of user\u2019s profile in personalized search for enhanced privacy. Int. J. Appl. Eng. Res. (IJAER) 10(16), 36358\u201336363 (2015)","journal-title":"Int. J. Appl. Eng. Res. (IJAER)"},{"key":"21_CR3","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-63673-3_26","volume-title":"Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1","author":"H Kandala","year":"2018","unstructured":"Kandala, H., Tripathy, B.K., Manoj Kumar, K.: A framework to collect and visualize user\u2019s browser history for better user experience and personalized recommendations. In: Satapathy, S.C., Joshi, A. (eds.) ICTIS 2017. SIST, vol. 83, pp. 218\u2013224. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-63673-3_26"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Yuvaraju, B.V., Venkiteela, L., Kumar, K.M.: A presumptuous encephalon electronic brain computing in gaming gadgets. In: 2018 International Conference on Soft-Computing and Network Security (ICSNS), Coimbatore, India, pp. 1\u20136 (2018)","DOI":"10.1109\/ICSNS.2018.8573662"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, K.M., Kandala, H., Reddy, N.S.: Synthesizing and imitating handwriting using deep recurrent neural networks and mixture density networks. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bangalore, pp. 1\u20136 (2018)","DOI":"10.1109\/ICCCNT.2018.8493843"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Devi, K.J., Moulika, G.B., Sravanthi, K., Kumar, K.M.: Prediction of medicines using LVQ methodology. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, pp. 388\u2013391 (2017)","DOI":"10.1109\/ICECDS.2017.8390162"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Bhavana, G., Kumar, K.M.: Cardiac disease monitoring based on ZigBee technology. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, pp. 392\u2013395 (2017)","DOI":"10.1109\/ICECDS.2017.8390173"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Razvi, S.A., Neelima, S., Prathyusha, C., Yuvasree, G., Ganga, C., Kumar, K.M.: Implementation of graphical passwords in internet banking for enhanced security. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, pp. 35\u201341 (2017)","DOI":"10.1109\/ICCONS.2017.8250743"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Kumar, K.M., Tejasree, S., Swarnalatha, S.: Effective implementation of data segregation &; extraction using big data in E - health insurance as a service. In: 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, pp. 1\u20135 (2016)","DOI":"10.1109\/ICACCS.2016.7586323"},{"issue":"6","key":"21_CR10","first-page":"1592","volume":"7","author":"R Praveen Kumar","year":"2016","unstructured":"Praveen Kumar, R., Manoj Kumar, K., Tejasree, S., Aswini, R.: Review on cost effective and dynamic security provision strategy of staging data items in cloud. Res. J. Pharm. Biol. Chem. Sci. (RJPBCS) 7(6), 1592\u20131597 (2016). ISSN: 0975-8585","journal-title":"Res. J. Pharm. Biol. Chem. Sci. (RJPBCS)"},{"issue":"31","key":"21_CR11","first-page":"1","volume":"9","author":"PK Rajendran","year":"2016","unstructured":"Rajendran, P.K., Asbern, A., Manoj Kumar, K., Rajesh, M., Abhilash, R.: Implementation and analysis of MapReduce on biomedical big data. Indian J. Sci. Technol. (IJST) 9(31), 1\u20136 (2016). ISSN\/E-ISSN: 0974-6846\/0974-5645","journal-title":"Indian J. Sci. Technol. (IJST)"},{"key":"21_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-981-10-2471-9_56","volume-title":"Proceedings of the First International Conference on Computational Intelligence and Informatics","author":"S Kilaru","year":"2017","unstructured":"Kilaru, S., Lakshmanachari, S., Kishore, P.K., Surendra, B., Vishnuvardhan, T.: An efficient probability of detection model for wireless sensor networks. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 585\u2013593. Springer, Singapore (2017). \n                    https:\/\/doi.org\/10.1007\/978-981-10-2471-9_56"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.G.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of 4th Annual ACM\/IEEE International Conference Mobile Computing Network, pp. 85\u201397 (1998)","DOI":"10.1145\/288235.288256"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Chachulski, S., Jennings, M., Katti, S., Katabi, D.: Trading structure for randomness in wireless opportunistic routing. In: Proceedings of SIGCOMM Conference Applications, Technologies, Architectures and Protocols Computer Communications, pp. 169\u2013180 (2007)","DOI":"10.1145\/1282427.1282400"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Johnson, C.D.B., Maltz, D.A.: Dynamic source routing in adhoc wireless networks. Mobile Comput. vol. 353, pp. 153\u2013181 (1992)","DOI":"10.1007\/978-0-585-29603-6_5"},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"Charles E. Perkins","year":"1994","unstructured":"Perkins, C.E., Bhagwat, P.: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. In: Proceedings of Conference Communication Architecture, Protocols Applications, pp. 234\u2013244 (1994)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Laufer, R.P., Dubois-Ferriere, H., Kleinrock, L.: Multirate anypath routing in wireless mesh networks. In: Proceedings of INFOCOM, pp. 37\u201345 (2009)","DOI":"10.1109\/INFCOM.2009.5061904"},{"key":"21_CR18","unstructured":"Lin, Y., Li, B., Liang, B.: CodeOR: opportunistic routing in wireless mesh networks with segmented network coding. In: Proceedings of IEEE International Conference Network Protocols, pp. 13\u201322 (2008)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Kim, T.S., Hou, J.C., Lim, H.: Improving spatial reuse through tuning transmits power, carrier sense threshold, and data rate in multihop wireless networks. In: Proceedings of 12th Annual International Conference Mobile Computing Networking, pp. 366\u2013377 (2006)","DOI":"10.1145\/1161089.1161131"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multihop wireless mesh networks. In: Proceedings of 10th Annual Internatioanl Conference on Mobile Computing and Networking, pp. 114\u2013128 (2004)","DOI":"10.1145\/1023720.1023732"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:11:42Z","timestamp":1563433902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}