{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:15:32Z","timestamp":1759331732053,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T00:00:00Z","timestamp":1712102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T00:00:00Z","timestamp":1712102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972199, 62372230, 61931011","61972199, 62372230, 61931011","61972199, 62372230, 61931011"],"award-info":[{"award-number":["61972199, 62372230, 61931011","61972199, 62372230, 61931011","61972199, 62372230, 61931011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11227-024-06064-2","type":"journal-article","created":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T11:02:01Z","timestamp":1712142121000},"page":"15464-15484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimal UAV deployment with star topology in area coverage problems"],"prefix":"10.1007","volume":"80","author":[{"given":"Xiaojun","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xiaowei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"unstructured":"DJI: https:\/\/www.dji.com\/ (2023)","key":"6064_CR1"},{"unstructured":"OLSR: Optimized link state routing protocol. http:\/\/www.olsr.org\/mediawiki\/index.php (2022)","key":"6064_CR2"},{"doi-asserted-by":"crossref","unstructured":"Singh K, Verma AK (2015) Applying OLSR routing in FANETs. In: IEEE International Conference on Advanced Communication, Control and Computing Technologies (ICACCCT)","key":"6064_CR3","DOI":"10.1109\/ICACCCT.2014.7019290"},{"issue":"2","key":"6064_CR4","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1109\/COMST.2020.2982452","volume":"22","author":"D Shumeye Lakew","year":"2020","unstructured":"Shumeye Lakew D, Saad U, Dao NN, Na W, Cho S (2020) Routing in flying ad hoc networks: a comprehensive survey. IEEE Commun Surv Tutor 22(2):1071\u20131120","journal-title":"IEEE Commun Surv Tutor"},{"doi-asserted-by":"crossref","unstructured":"Shehzad MK, Ali Hassan S, Luque-Nieto MA, Poncela J, Jung H (2020) Energy efficient placement of UAVs in wireless backhaul networks. In: ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom)","key":"6064_CR5","DOI":"10.1145\/3414045.3415936"},{"issue":"12","key":"6064_CR6","doi-asserted-by":"publisher","first-page":"9904","DOI":"10.1109\/JIOT.2022.3161080","volume":"9","author":"X Zhu","year":"2022","unstructured":"Zhu X, Wang Y, Xu L (2022) Minimizing the maximum length of flight paths for uavs providing location service to ground targets. IEEE Internet Things J 9(12):9904\u20139917","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"6064_CR7","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/CC.2018.8485481","volume":"15","author":"L Ruan","year":"2018","unstructured":"Ruan L, Wang J, Chen J, Xu Y, Yang Y, Jiang H, Zhang Y, Xu Y (2018) Energy-efficient multi-UAV coverage deployment in UAV networks: a game-theoretic framework. China Commun 15(10):194\u2013209","journal-title":"China Commun"},{"issue":"9","key":"6064_CR8","doi-asserted-by":"publisher","first-page":"4531","DOI":"10.1109\/TWC.2019.2926279","volume":"18","author":"Z Wang","year":"2019","unstructured":"Wang Z, Duan L, Zhang R (2019) Adaptive deployment for UAV-aided communication networks. IEEE Trans Wireless Commun 18(9):4531\u20134543","journal-title":"IEEE Trans Wireless Commun"},{"issue":"5","key":"6064_CR9","doi-asserted-by":"publisher","first-page":"3605","DOI":"10.1109\/JIOT.2020.3023010","volume":"8","author":"I Valiulahi","year":"2021","unstructured":"Valiulahi I, Masouros C (2021) Multi-UAV deployment for throughput maximization in the presence of co-channel interference. IEEE Internet Things J 8(5):3605\u20133618","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"6064_CR10","doi-asserted-by":"publisher","first-page":"2473","DOI":"10.1109\/TCOMM.2021.3049387","volume":"69","author":"C Zhang","year":"2021","unstructured":"Zhang C, Zhang L, Zhu L, Zhang T, Xiao Z, Xia XG (2021) 3d deployment of multiple UAV-mounted base stations for UAV communications. IEEE Trans Commun 69(4):2473\u20132488","journal-title":"IEEE Trans Commun"},{"issue":"9","key":"6064_CR11","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/JSAC.2018.2864376","volume":"36","author":"H Zhao","year":"2018","unstructured":"Zhao H, Wang H, Wu W, Wei J (2018) Deployment algorithms for UAV airborne networks toward on-demand coverage. IEEE J Sel Areas Commun 36(9):2015\u20132031","journal-title":"IEEE J Sel Areas Commun"},{"key":"6064_CR12","first-page":"1","volume":"3","author":"H Sami","year":"2023","unstructured":"Sami H, Saado R, Saoudi AE, Mourad A, Otrok H, Bentahar J (2023) Opportunistic UAV deployment for intelligent on-demand IOV service management. IEEE Trans Netw Service Manag 3:1\u20131","journal-title":"IEEE Trans Netw Service Manag"},{"doi-asserted-by":"crossref","unstructured":"Zhang S, Zhang H, Di B, Song L (2018) Resource allocation and trajectory design for cellular UAV-to-X communication networks in 5G. In: IEEE Global Communications Conference (GLOBECOM)","key":"6064_CR13","DOI":"10.1109\/GLOCOM.2018.8647671"},{"issue":"19","key":"6064_CR14","doi-asserted-by":"publisher","first-page":"19346","DOI":"10.1109\/JIOT.2022.3165278","volume":"9","author":"B Fei","year":"2022","unstructured":"Fei B, Bao W, Zhu X, Liu D, Men T, Xiao Z (2022) Autonomous cooperative search model for multi-UAV with limited communication network. IEEE Internet Things J 9(19):19346\u201319361","journal-title":"IEEE Internet Things J"},{"doi-asserted-by":"crossref","unstructured":"Lim JW, Ko YB (2021) Q-learning based stepwise routing protocol for multi-UAV networks. In: International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","key":"6064_CR15","DOI":"10.1109\/ICAIIC51459.2021.9415265"},{"doi-asserted-by":"crossref","unstructured":"Peng J, Gao H, Liu L., Wu Y, Xu X (2020) FNTAR: a future network topology-aware routing protocol in UAV networks. In: IEEE Wireless Communications and Networking Conference (WCNC)","key":"6064_CR16","DOI":"10.1109\/WCNC45663.2020.9120842"},{"key":"6064_CR17","doi-asserted-by":"publisher","first-page":"26971","DOI":"10.1109\/ACCESS.2018.2833632","volume":"6","author":"A Tripathi","year":"2018","unstructured":"Tripathi A, Gupta HP, Dutta T, Mishra R, Shukla KK, Jit S (2018) Coverage and connectivity in WSNs: a survey. Research issues and challenges. IEEE Access 6:26971\u201326992","journal-title":"IEEE Access"},{"issue":"4","key":"6064_CR18","first-page":"1446","volume":"33","author":"X Zhu","year":"2021","unstructured":"Zhu X, Tang S (2021) A branch-and-bound algorithm for building optimal data gathering tree in wireless sensor networks. INFORMS J Comput 33(4):1446\u20131460","journal-title":"INFORMS J Comput"},{"issue":"6","key":"6064_CR19","doi-asserted-by":"publisher","first-page":"1964","DOI":"10.1109\/TNET.2012.2199515","volume":"20","author":"Z Yun","year":"2012","unstructured":"Yun Z, Bai X, Xuan D, Jia W, Zhao W (2012) Pattern mutation in wireless sensor deployment. IEEE\/ACM Trans Netw 20(6):1964\u20131977","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"6064_CR20","doi-asserted-by":"publisher","first-page":"40:1","DOI":"10.1145\/3561303","volume":"19","author":"X Zhu","year":"2023","unstructured":"Zhu X, Han Z, Tang S, Xu L, Dong C (2023) Deploying the minimum number of rechargeable uavs for a quarantine barrier. ACM Trans Sens Netw 19(2):40:1-40:28","journal-title":"ACM Trans Sens Netw"},{"issue":"5","key":"6064_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.001.2100861","volume":"60","author":"PQ Viet","year":"2022","unstructured":"Viet PQ, Romero D (2022) Aerial base station placement: a tutorial introduction. IEEE Commun Mag 60(5):44\u201349","journal-title":"IEEE Commun Mag"},{"doi-asserted-by":"crossref","unstructured":"Bai X, Kumar S, Xuan D, Yun Z, Lai TH (2006) Deploying wireless sensors to achieve both coverage and connectivity. In: International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)","key":"6064_CR22","DOI":"10.1145\/1132905.1132921"},{"doi-asserted-by":"crossref","unstructured":"Iyengar R, Kar K, Banerjee S (2005) Low-coordination topologies for redundancy in sensor networks. In: International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)","key":"6064_CR23","DOI":"10.1145\/1062689.1062732"},{"issue":"5","key":"6064_CR24","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TPDS.2007.70770","volume":"19","author":"X Wu","year":"2008","unstructured":"Wu X, Chen G, Das SK (2008) Avoiding energy holes in wireless sensor networks with nonuniform node distribution. IEEE Trans Parallel Distrib Syst 19(5):710\u2013720","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Li Q (2013) Howies: a holistic approach to zigbee assisted wifi energy savings in mobile devices. In: IEEE International Conference on Computer Communications (INFOCOM)","key":"6064_CR25","DOI":"10.1109\/INFCOM.2013.6566930"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06064-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T11:26:44Z","timestamp":1719314804000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06064-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,3]]},"references-count":25,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["6064"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06064-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2024,4,3]]},"assertion":[{"value":"11 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}