{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T09:11:35Z","timestamp":1717837895509},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T00:00:00Z","timestamp":1441929600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The general project of liaoning province department of education","award":["L2012088"],"award-info":[{"award-number":["L2012088"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11276-015-1053-6","type":"journal-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T12:09:13Z","timestamp":1441973353000},"page":"1739-1750","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Research on routing protocol facing to signal conflicting in link quality guaranteed WSN"],"prefix":"10.1007","volume":"22","author":[{"given":"Jian","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Hai","sequence":"additional","affiliation":[]},{"given":"Bi","family":"Yuan-Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,11]]},"reference":[{"key":"1053_CR1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J, Mukherjee, B, & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292\u20132330.","journal-title":"Computer Networks"},{"issue":"12","key":"1053_CR2","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1109\/JPROC.2013.2257631","volume":"101","author":"M Li","year":"2013","unstructured":"Li, M., et al. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538\u20132557.","journal-title":"Proceedings of the IEEE"},{"key":"1053_CR3","unstructured":"Yanjun, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS, pp. 182\u2013190."},{"issue":"3","key":"1053_CR4","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TNET.2014.2306592","volume":"23","author":"Y Yanjun","year":"2015","unstructured":"Yanjun, Y., et al. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE\/ACM Transactions on Networking, 23(3), 810\u2013823.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"1053_CR5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/MCOM.2013.6553686","volume":"51","author":"K Han","year":"2013","unstructured":"Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107\u2013113.","journal-title":"IEEE Communications Magazine"},{"issue":"6","key":"1053_CR6","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., et al. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91\u201398.","journal-title":"Wireless Communications, IEEE"},{"key":"1053_CR7","volume-title":"Delay tolerant networks: Protocols and applications","author":"A Vasilakos","year":"2012","unstructured":"Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"10","key":"1053_CR8","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1109\/TMC.2011.190","volume":"11","author":"Y Xiao","year":"2012","unstructured":"Xiao, Y., et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538\u20131554.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"1053_CR9","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"key":"1053_CR10","doi-asserted-by":"crossref","unstructured":"Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In SECON, pp. 46\u201354.","DOI":"10.1109\/SAHCN.2011.5984932"},{"key":"1053_CR11","doi-asserted-by":"crossref","unstructured":"Chilamkurti, N., et al. (2009). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors.","DOI":"10.1155\/2009\/134165"},{"issue":"5","key":"1053_CR12","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.adhoc.2011.02.004","volume":"10","author":"H Cheng","year":"2012","unstructured":"Cheng, H., et al. (2012). Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Networks, 10(5), 760\u2013773.","journal-title":"Ad Hoc Networks"},{"issue":"6","key":"1053_CR13","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1109\/TSMCC.2012.2196996","volume":"42","author":"S Sengupta","year":"2012","unstructured":"Sengupta, S., et al. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C, 42(6), 1093\u20131102.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C"},{"issue":"6","key":"1053_CR14","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.comcom.2010.10.003","volume":"34","author":"G Wei","year":"2011","unstructured":"Wei, G., et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Computer Communications, 34(6), 793\u2013802.","journal-title":"Computer Communications"},{"issue":"2","key":"1053_CR15","first-page":"171","volume":"16","author":"M Chen","year":"2011","unstructured":"Chen, M., et al. (2011). Body area networks: A survey. MONET, 16(2), 171\u2013193.","journal-title":"MONET"},{"key":"1053_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2345257","author":"X-Y Liu","year":"2014","unstructured":"Liu, X.-Y., et al. (2014). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel & Distributed Systems. doi: 10.1109\/TPDS.2014.2345257 .","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"issue":"1","key":"1053_CR17","first-page":"4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang, X., et al. (2012). A survey of green mobile networks: opportunities and challenges. MONET, 17(1), 4\u201320.","journal-title":"MONET"},{"issue":"1","key":"1053_CR18","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92\u2013109.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1053_CR19","unstructured":"Li, P., et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, pp. 100\u2013108."},{"issue":"3","key":"1053_CR20","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TNSM.2014.2346080","volume":"11","author":"Y Song","year":"2014","unstructured":"Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417\u2013430.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"1053_CR21","first-page":"819","volume":"64","author":"L Liu","year":"2015","unstructured":"Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819\u2013832.","journal-title":"IEEE Transactions on Computers"},{"issue":"11\u201312","key":"1053_CR22","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"Y-S Yen","year":"2011","unstructured":"Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11\u201312), 2238\u20132250.","journal-title":"Mathematical and Computer Modelling"},{"issue":"7","key":"1053_CR23","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","volume":"4","author":"Y Liu","year":"2010","unstructured":"Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810\u2013816.","journal-title":"IET Communications"},{"issue":"9","key":"1053_CR24","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"Busch, C., et al. (2012). Approximating congestion\u00a0+\u00a0dilation in networks via \u201cquality of routing\u201d games. IEEE Transactions on Computers, 61(9), 1270\u20131283.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"1053_CR25","first-page":"45","volume":"11","author":"X Xu","year":"2015","unstructured":"Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45\u201360.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"12","key":"1053_CR26","doi-asserted-by":"crossref","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264\u20133273.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1053_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417543","author":"T Meng","year":"2015","unstructured":"Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC,. doi: 10.1109\/TC.2015.2417543 .","journal-title":"IEEE TMC"},{"issue":"4","key":"1053_CR28","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405\u2013406.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"2","key":"1053_CR29","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/49.824804","volume":"18","author":"IE Kassotakis","year":"2000","unstructured":"Kassotakis, I. E., Markaki, M. E., & Vasilakos, A. V. (2000). A hybrid genetic approach for channel reuse in multiple access telecommunication networks. IEEE Journal on Selected Areas in Communications, 18(2), 234\u2013243.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"1053_CR30","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PBF Duarte","year":"2012","unstructured":"Duarte, P. B. F., Fadlullah, Z Md., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119\u2013127.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"1053_CR31","doi-asserted-by":"crossref","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172\u20133186.","journal-title":"Proceedings of the IEEE"},{"issue":"7","key":"1053_CR32","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1109\/JSAC.2012.120807","volume":"30","author":"T Jiang","year":"2012","unstructured":"Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215\u20131224.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1053_CR33","doi-asserted-by":"crossref","unstructured":"Marwaha, S., et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. In Evolutionary Computation, 2004. CEC2004. Congress on 2, 1964\u20131971, 2004.","DOI":"10.1109\/CEC.2004.1331137"},{"issue":"3","key":"1053_CR34","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/TSMCC.2003.817354","volume":"33","author":"A Vasilakos","year":"2003","unstructured":"Vasilakos, A., et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 33(3), 297\u2013312.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"1053_CR35","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., et al. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120\u2013134.","journal-title":"Journal of Network and Computer Applications"},{"issue":"8","key":"1053_CR36","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., et al. (2014). Security of the Internet of Things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501.","journal-title":"Wireless Networks"},{"issue":"4","key":"1053_CR37","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TNET.2009.2039492","volume":"18","author":"ZMd Fadlullah","year":"2010","unstructured":"Fadlullah, Z Md, et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE\/ACM Transactions on Networking (TON), 18(4), 1234\u20131247.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"1053_CR38","doi-asserted-by":"crossref","unstructured":"Reza Rahimi, M., et al. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In IEEE\/ACM UCC 2012, pp. 83\u201390.","DOI":"10.1109\/UCC.2012.25"},{"issue":"3","key":"1053_CR39","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/10798587.2015.1015782","volume":"21","author":"YQ Jiang","year":"2015","unstructured":"Jiang, Y. Q., Li, T., Zhang, M., et al. (2015). WSN-based control system of Co-2 concentration in greenhouse. Intelligent Automation and Soft Computing, 21(3), 285\u2013294.","journal-title":"Intelligent Automation and Soft Computing"},{"issue":"8","key":"1053_CR40","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akylidiz","year":"2002","unstructured":"Akylidiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Personality Communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE Personality Communications Magazine"},{"issue":"4","key":"1053_CR41","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless micro sensor networks. IEEE Transactions on Wireless Communications, 1(4), 660\u2013670.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2B","key":"1053_CR42","first-page":"153","volume":"35","author":"T AL-khdour","year":"2010","unstructured":"AL-khdour, T., & Baroudi, U. (2010). An energy-efficient distributed schedule-based communication protocol for wireless sensor networks. Arabian Journal for Science and Engineering, 35(2B), 153\u2013168.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"3","key":"1053_CR43","first-page":"901","volume":"9","author":"PS Perumal","year":"2015","unstructured":"Perumal, P. S., Uthariaraj, V. R., & Christo, V. R. E. (2015). WSN lifetime analysis: Intelligent UAV and arc selection algorithm for energy conservation in isolated wireless sensor networks. KSII Transactions on Internet and Information Systems, 9(3), 901\u2013920.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"3","key":"1053_CR44","doi-asserted-by":"crossref","first-page":"4781","DOI":"10.3390\/s150304781","volume":"15","author":"R Badia-Melis","year":"2015","unstructured":"Badia-Melis, R., Ruiz-Garcia, L., & Garcia-hierro, J. (2015). Refrigerated fruit storage monitoring combining two different wireless sensing technologies: RFID and WSN. Sensors, 15(3), 4781\u20134795.","journal-title":"Sensors"},{"key":"1053_CR45","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.adhoc.2014.06.004","volume":"23","author":"SM Dima","year":"2014","unstructured":"Dima, S. M., Panagiotou, C., & Tsitsipis, D. (2014). Performance evaluation of a WSN system for distributed event detection using fuzzy logic. Ad Hoc Networks, 23, 87\u2013108.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"1053_CR46","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s11235-013-9761-7","volume":"57","author":"A Busson","year":"2014","unstructured":"Busson, A., & Chelius, G. (2014). Capacity and interference modeling of CSMA\/CA networks using SSI point processes. Telecommunication Systems, 57(1), 25\u201339.","journal-title":"Telecommunication Systems"},{"issue":"10","key":"1053_CR47","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TMC.2006.150","volume":"5","author":"R Bai","year":"2006","unstructured":"Bai, R., & Singhal, M. (2006). DOA: DSR over AODV routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 5(10), 1403\u20131416.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"9","key":"1053_CR48","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1080\/00207217.2013.828190","volume":"101","author":"J Jain","year":"2014","unstructured":"Jain, J., Gupta, R., & Bandhopadhyay, T. K. (2014). Scalability enhancement of AODV using local link repairing. International Journal of Electronics, 101(9), 1230\u20131243.","journal-title":"International Journal of Electronics"},{"issue":"1","key":"1053_CR49","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/s11277-015-2411-5","volume":"83","author":"A Yadav","year":"2015","unstructured":"Yadav, A., Singh, Y. N., & Singh, R. R. (2015). Improving routing performance in AODV with link prediction in mobile adhoc network. Wireless Personal Communications, 83(1), 603\u2013618.","journal-title":"Wireless Personal Communications"},{"key":"1053_CR50","doi-asserted-by":"crossref","unstructured":"Liu, T., Liu, K. (2007). Improvements on DSDV in mobile ad hoc networks. In Proceedings of 3rd international conference on wireless communications, networking and mobile computing (WiCOM 2007), Shanghai, China, pp. 1637\u20131640.","DOI":"10.1109\/WICOM.2007.412"},{"key":"1053_CR51","unstructured":"Xie, P., Cui, J.-H., & Lao, L. (2005). VBF: Vector-based forwarding protocol for underwater sensor networks. In Proceedings of IFIP (Networking\u201906), Coimbra, Portugal, May 2006. A longer version is available as UCONN CSE Technical Report: UbiNet-TR05-03, February 2005."},{"issue":"1","key":"1053_CR52","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.jmaa.2015.02.039","volume":"430","author":"BK Das","year":"2015","unstructured":"Das, B. K., & Lindsay, J. M. (2015). Quantum random walk approximation in banach algebra. Journal of Mathematical Analysis and Applications, 430(1), 465\u2013482.","journal-title":"Journal of Mathematical Analysis and Applications"},{"issue":"4","key":"1053_CR53","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s11464-015-0481-z","volume":"10","author":"F Gao","year":"2015","unstructured":"Gao, F. (2015). Laws of iterated logarithm for transient random walks in random environments. Frontiers of Mathematics in China, 10(4), 857\u2013874.","journal-title":"Frontiers of Mathematics in China"},{"issue":"7","key":"1053_CR54","doi-asserted-by":"crossref","first-page":"4099","DOI":"10.1109\/TIT.2015.2428253","volume":"61","author":"L Devroye","year":"2015","unstructured":"Devroye, L., Lugosi, G., & Neu, G. (2015). Random-walk perturbations for online combinatorial optimization. IEEE Transactions on Information Theory, 61(7), 4099\u20134106.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1053_CR55","doi-asserted-by":"crossref","unstructured":"Naimi, S., Busson, A., & Veque, V. (2014). Anticipation of ETX metric to manage mobility in ad hoc wireless networks. In 13th international conference on ad-hoc networks and wireless. Benidorm, Spain, 2014, 8487:29\u201342.","DOI":"10.1007\/978-3-319-07425-2_3"},{"key":"1053_CR56","doi-asserted-by":"crossref","first-page":"219","DOI":"10.4028\/www.scientific.net\/AMM.473.219","volume":"473","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Jin, Z. G., & Su, Y. S. (2014). Simulator-to-emulator: analysis and design of experiment platform for underwater sensor networks. Applied Mechanics and Materials, 473, 219\u2013225.","journal-title":"Applied Mechanics and Materials"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1053-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-015-1053-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1053-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T07:16:44Z","timestamp":1567149404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-015-1053-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,11]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["1053"],"URL":"https:\/\/doi.org\/10.1007\/s11276-015-1053-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,11]]}}}