{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T00:57:43Z","timestamp":1648947463772},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T00:00:00Z","timestamp":1179187200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s00500-007-0180-0","type":"journal-article","created":{"date-parts":[[2007,5,14]],"date-time":"2007-05-14T12:25:18Z","timestamp":1179145518000},"page":"425-434","source":"Crossref","is-referenced-by-count":1,"title":["Probability versus possibility and their application to actuator sensor networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Aly I.","family":"El-Osery","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,5,15]]},"reference":[{"issue":"2","key":"180_CR1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar PR (2000) The capacity of wireless networks. IEEE Trans Inf Theory 46(2):388\u2013404","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"180_CR2","first-page":"523","volume":"43","author":"IF Akyidiz","year":"2005","unstructured":"Akyidiz IF, Wang X (2005) A survey on wireless mesh networks. IEEE Commun Mag 43(9):523\u2013530","journal-title":"IEEE Commun Mag"},{"key":"180_CR3","unstructured":"Narayanaswamy S, Kawadia V, Sreenivas RS, Kumar PR (2002) Power control in ad-hoc networks: theory, architecture, algorithm and implementation of COMPOW protocol. In: European wireless conference"},{"key":"180_CR4","unstructured":"Ramanathan R, Rsales-Hain R (2002) Topology control of multihop wireless networks using transmit power adjustment. In: INFOCOMM, pp 404\u2013413"},{"key":"180_CR5","doi-asserted-by":"crossref","unstructured":"Singh S, Woo M, Raghavendra CS (1998) Power aware routing in mobile ad hoc networks. In: Proceedings of ACM MOBICOM, pp 181\u2013190","DOI":"10.1145\/288235.288286"},{"key":"180_CR6","doi-asserted-by":"crossref","unstructured":"Subbarao MW (1999) Dynamic power-conscious routing for MANETS: an initial approach. In: IEEE vehicular technology conference, pp 1232\u20131237","DOI":"10.1109\/VETECF.1999.798633"},{"key":"180_CR7","doi-asserted-by":"crossref","unstructured":"Li Q, Aslam J, Rus D (2001) Online power-aware routing in wireless ad-hoc networks. In: Proceedings of the 7th annual international conference on mobile computing and networking, pp 97\u2013107","DOI":"10.1145\/381677.381687"},{"key":"180_CR8","doi-asserted-by":"crossref","unstructured":"Xu Y, Heidemann JS, Estrin D (2001) Geography-informed energy conservation for ad hoc routing. In: Proceedings of ACM MOBICOMM, pp 70\u201384","DOI":"10.1145\/381677.381685"},{"key":"180_CR9","doi-asserted-by":"crossref","unstructured":"Chan B, Jamieson K, Balakrishnan H (2001) Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. In: Proceedings of ACM MOBICOMM, pp 85\u201396","DOI":"10.1145\/381677.381686"},{"key":"180_CR10","first-page":"1424","volume":"2","author":"TJ Kwon","year":"1999","unstructured":"Kwon TJ, Gerla M (1999) Clustering with power control. IEEE MILCOM 2:1424\u20131428","journal-title":"IEEE MILCOM"},{"key":"180_CR11","doi-asserted-by":"crossref","unstructured":"Agarwal S, Krishnamurthy S, Katz RH, Dao SK (2001) Distributed power control in ad-hoc wireless networks. In: PIMRC01","DOI":"10.1109\/PIMRC.2001.965296"},{"key":"180_CR12","doi-asserted-by":"crossref","unstructured":"Pursley MB, Russell HB, Wysocarski JS (2000) Energy-efficient transmission and routing protocols for wireless multiple-hop networks and spread-spectrum radios. In: EUROCOMM, pp 1\u20135","DOI":"10.1109\/EURCOM.2000.874759"},{"key":"180_CR13","doi-asserted-by":"crossref","unstructured":"Jung E-S, Vaidya NH (2002) A power control MAC protocol for ad-hoc networks. In: Proceedings of ACM MobiCom conference, pp 36\u201347","DOI":"10.1145\/570645.570651"},{"key":"180_CR14","unstructured":"Karn P (1990) MACA\u2014a new channel access method for packet radio. In: Proceedings of the 91st ARRL computer networking conference, pp 134\u2013140"},{"key":"180_CR15","unstructured":"Kawadia V, Kumar PR (2003) Power control and clustering in ad hoc networks. In: INFOCOM"},{"key":"180_CR16","doi-asserted-by":"crossref","unstructured":"Monks J, Bharghavan V, Hwu W-M (2001) A power controlled multiple access protocol for wireless packet networks. In: Proceedings of the IEEE INFOCOM conference, pp 219\u2013228","DOI":"10.1109\/INFCOM.2001.916704"},{"key":"180_CR17","doi-asserted-by":"crossref","unstructured":"Muqattash A, Krunz M (2003) Power controlled dual channel (PCDC) medium access protocol for wireless ad hoc networks. In: Proceedings of IEEE INFOCOM conference, pp 470\u2013480","DOI":"10.1109\/INFCOM.2003.1208698"},{"issue":"9","key":"180_CR18","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/49.872953","volume":"18","author":"S-L Wu","year":"2000","unstructured":"Wu S-L, Tseng Y-C, Sheu J-P (2000) Intelligent medium access for mobile ad hoc networks with busy tones and power control. IEEE J Selected Areas Commun 18(9):1647\u20131657","journal-title":"IEEE J Selected Areas Commun"},{"key":"180_CR19","doi-asserted-by":"crossref","unstructured":"Muqattash A, Krunz M (2004) POWMAC: a single-channel power-control protocol for throughput enhancement in wireless ad hoc networks. In: Proceedings of ACM MobiHoc","DOI":"10.1109\/JSAC.2005.845422"},{"key":"180_CR20","unstructured":"Meddour D, Mathieu B, Carlinet T, Gourhant Y (2003) Requirements and enabling architecture for ad-hoc networks application scenarios. In: MADNET"},{"key":"180_CR21","unstructured":"Poznyak AS, Najim K (1997) Learning automata and stochastic optimization. Lecture notes in control and information sciences, vol 225. Springer, Heidelberg"},{"key":"180_CR22","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8:338\u2013353","journal-title":"Inf Control"},{"key":"180_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"LA Zadeh","year":"1978","unstructured":"Zadeh LA (1978) Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst 1:3\u201328","journal-title":"Fuzzy Sets Syst"},{"key":"180_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.fss.2003.10.011","volume":"144","author":"D Dubois","year":"2004","unstructured":"Dubois D, Prade H (2004) Possibilistic logic: a retrospective and prospective view. Fuzzy Sets Syst 144:3\u201323","journal-title":"Fuzzy Sets Syst"},{"key":"180_CR25","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/0165-0114(96)00066-8","volume":"84","author":"D Dubois","year":"1996","unstructured":"Dubois D, Prade H (1996) What are fuzzy rules and how to use them. Fuzzy Sets Syst 84:169\u2013189","journal-title":"Fuzzy Sets Syst"},{"key":"180_CR26","doi-asserted-by":"crossref","unstructured":"Bosc P, Prade H (1996) An introduction to the fuzzy set and possibility theory-based treatment of flexible queries and uncertain or imprecise databases. In: Uncertainty management in information systems, no 285\u2013324. Kluwer, Boston","DOI":"10.1007\/978-1-4615-6245-0_10"},{"key":"180_CR27","unstructured":"Simulator NS. http:\/\/www.isi.edu\/nsnam\/ns\/. 2.28"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-007-0180-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-007-0180-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-007-0180-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:39:51Z","timestamp":1559093991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-007-0180-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5,15]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["180"],"URL":"https:\/\/doi.org\/10.1007\/s00500-007-0180-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,5,15]]}}}