{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:47Z","timestamp":1761401927094,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T00:00:00Z","timestamp":1520985600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1334210"],"award-info":[{"award-number":["U1334210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"China Academy of Railway Sciences Foundation","award":["2016YJ109"],"award-info":[{"award-number":["2016YJ109"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11276-018-1705-4","type":"journal-article","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T01:40:37Z","timestamp":1520991637000},"page":"3103-3113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Opportunistic routing with data fusion for multi-source wireless sensor networks"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4074-7822","authenticated-orcid":false,"given":"Jianyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Xinchun","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Zongyuan","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiankang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,14]]},"reference":[{"issue":"1","key":"1705_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5815\/ijitcs.2014.01.07","volume":"6","author":"MB Banu","year":"2013","unstructured":"Banu, M. B., & Periyasamy, P. (2013). A survey of unipath routing protocols for mobile ad hoc networks. International Journal of Information Technology and Computer Science (IJITCS), 6(1), 57\u201367.","journal-title":"International Journal of Information Technology and Computer Science (IJITCS)"},{"issue":"4","key":"1705_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1090191.1080108","volume":"35","author":"B Sanjit","year":"2005","unstructured":"Sanjit, B., & Robert, M. (2005). ExOR: opportunistic multi-hop routing for wireless networks. ACM Sigcomm Computer Communication Review, 35(4), 133\u2013144.","journal-title":"ACM Sigcomm Computer Communication Review"},{"issue":"2","key":"1705_CR3","first-page":"1","volume":"47","author":"B Azzedine","year":"2014","unstructured":"Azzedine, B., & Amir, D. (2014). Opportunistic routing in wireless networks: Models, algorithms, and classifications. ACM Computing Surveys, 47(2), 1\u201336.","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"1705_CR4","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/COMST.2015.2411335","volume":"17","author":"C Nessrine","year":"2015","unstructured":"Nessrine, C. (2015). A survey on opportunistic routing in wireless communication networks. IEEE Communication Surveys & Tutorials, 17(4), 2214\u20132241.","journal-title":"IEEE Communication Surveys & Tutorials"},{"key":"1705_CR5","doi-asserted-by":"crossref","unstructured":"Lu, M. & Wu, J. (2009). Opportunistic routing algebra and its applications. In Proceedings of the IEEE conference on computer communications (INFOCOM), pp. 2374C2382.","DOI":"10.1109\/INFCOM.2009.5062164"},{"key":"1705_CR6","unstructured":"Zhong, Z. & Nelakuditi, S. (2007). On the efficacy of opportunistic routing, sensor, mesh and ad hoc communications and networks. In Proceeding of IEEE conference on communications society, pp. 441\u2013450."},{"issue":"11","key":"1705_CR7","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/TPDS.2011.70","volume":"22","author":"XF Mao","year":"2011","unstructured":"Mao, X. F., Tang, S. J., Tang, Xu X H, Li, X. Y., & Ma, H. D. (2011). Energy-efficient opportunistic routing in wireless sensor networks. IEEE Transaction on Parallel and Distributed Systems, 22(11), 1934\u20131942.","journal-title":"IEEE Transaction on Parallel and Distributed Systems"},{"key":"1705_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2014.09.007","volume":"55","author":"Y Qin","year":"2015","unstructured":"Qin, Y., Li, L., Zhong, X. X., Yang, Y. Y., & Ye, Y. B. (2015). Opportunistic routing with admission control in wireless ad hoc networks. Computer Communications, 55, 32\u201340.","journal-title":"Computer Communications"},{"issue":"3","key":"1705_CR9","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TPDS.2010.93","volume":"22","author":"H Luo","year":"2011","unstructured":"Luo, H., Tao, H. X., Ma, H. D., & Das, S. K. (2011). Data fusion with desired reliability in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(3), 501\u2013513.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"1705_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MWC.2014.6882291","volume":"21","author":"ZJ Zhang","year":"2014","unstructured":"Zhang, Z. J., Lai, C. F., & Chao, H. C. (2014). A green data transmission mechanism for wireless multimedia sensor networks using information fusion. IEEE Wireless Communication, 21(4), 14\u201319.","journal-title":"IEEE Wireless Communication"},{"issue":"9","key":"1705_CR11","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1109\/TIE.2013.2293710","volume":"61","author":"O Kreibich","year":"2014","unstructured":"Kreibich, O., Neuzil, J., & Smid, R. (2014). Quality-based multiple-sensor fusion in an industrial wireless sensor network for MCM. IEEE Transactions on Industrial Electronics, 61(9), 4903\u20134911.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"1705_CR12","doi-asserted-by":"crossref","unstructured":"Barnett, J. A. (2008). Computational methods for a mathematical theory of evidence. In Proceeding of international joint conference on artificial intelligence, pp. 868\u2013875.","DOI":"10.1007\/978-3-540-44792-4_8"},{"issue":"8","key":"1705_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCOM.2014.6871666","volume":"52","author":"HD Ma","year":"2014","unstructured":"Ma, H. D., Zhao, D., & Yuan, P. Y. (2014). Opportunities in mobile crowd sensing. IEEE Communications Magazine, 52(8), 29\u201335.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"1705_CR14","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TPDS.2014.2308178","volume":"26","author":"D Zhao","year":"2015","unstructured":"Zhao, D., Ma, H. D., Tang, S. J., & Li, X. Y. (2015). COUPON: A cooperative framework for building sensing maps in mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(2), 392\u2013402.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"1705_CR15","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s11276-013-0645-2","volume":"20","author":"J So","year":"2014","unstructured":"So, J., & Byun, H. J. (2014). Opportunistic routing with in-network aggregation for asynchronous duty-cycled wireless sensor networks. Wireless Networks, 20(5), 833\u2013846.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1705-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-018-1705-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1705-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T09:14:20Z","timestamp":1560158060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-018-1705-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,14]]},"references-count":15,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1705"],"URL":"https:\/\/doi.org\/10.1007\/s11276-018-1705-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2018,3,14]]},"assertion":[{"value":"14 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}