{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:14Z","timestamp":1740123854626,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Key Research and Development Program of Shaanxi province in 2017","award":["NO.2017GY-085"],"award-info":[{"award-number":["NO.2017GY-085"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["NO.61906086"],"award-info":[{"award-number":["NO.61906086"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11276-019-02217-x","type":"journal-article","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T19:04:30Z","timestamp":1577991870000},"page":"949-963","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An improved intelligent clustering algorithm for irregular wireless network"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7102-1886","authenticated-orcid":false,"given":"Xiang","family":"Hua","sequence":"first","affiliation":[]},{"given":"Zhaoxin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hongjuan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baohua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bingqing","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hongtao","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,2]]},"reference":[{"key":"2217_CR1","doi-asserted-by":"crossref","unstructured":"Singh, K. (2015). WSN leach based protocols: A structural analysis. In 2015 international conference and workshop on computing and communication (IEMCON), IEEE (pp. 1\u20137).","DOI":"10.1109\/IEMCON.2015.7344478"},{"key":"2217_CR2","doi-asserted-by":"crossref","unstructured":"Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences (p. 10). IEEE.","DOI":"10.1109\/HICSS.2000.926982"},{"key":"2217_CR3","doi-asserted-by":"crossref","unstructured":"Cho, C. Y., Lin, C. W., & Wang, J. S. (2008). Reliable grouping GAF algorithm using hexagonal virtual cell structure. In 2008 3rd international conference on sensing technology (pp. 600\u2013603). IEEE.","DOI":"10.1109\/ICSENST.2008.4757176"},{"key":"2217_CR4","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"4","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). Heed: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 4, 366\u2013379.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2217_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, B., Xue, X. q., & Sha, T. t. (2014). A topology control algorithm for ribbon wireless sensor network. In 2014 IEEE workshop on advanced research and technology in industry applications (WARTIA) (pp. 195\u2013198). IEEE.","DOI":"10.1109\/WARTIA.2014.6976230"},{"key":"2217_CR6","doi-asserted-by":"publisher","first-page":"15927","DOI":"10.1109\/ACCESS.2017.2722379","volume":"5","author":"ZH Mir","year":"2017","unstructured":"Mir, Z. H., & Ko, Y. B. (2017). Collaborative topology control for many-to-one communications in wireless sensor networks. IEEE Access, 5, 15927\u201315941.","journal-title":"IEEE Access"},{"issue":"5","key":"2217_CR7","first-page":"2016104","volume":"37","author":"C Cui","year":"2016","unstructured":"Cui, C., Sun, Y., Lu, J., & Jh, H. A. O. (2016). Research on a hexagonal lattice optimal clustering routing algorithm based on hybrid cs for wsn. Journal on Communications, 37(5), 2016104.","journal-title":"Journal on Communications"},{"issue":"4","key":"2217_CR8","first-page":"1","volume":"9","author":"Y Lv","year":"2017","unstructured":"Lv, Y., Jiang, N., Xue, C., & Qiu, K. (2017). Energy-efficient and survivable optical access network based on multilayer-ring structure. IEEE Photonics Journal, 9(4), 1\u201319.","journal-title":"IEEE Photonics Journal"},{"issue":"1","key":"2217_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.compeleceng.2013.10.016","volume":"40","author":"S Serikawa","year":"2014","unstructured":"Serikawa, S., & Lu, H. (2014). Underwater image dehazing using joint trilateral filter. Computers & Electrical Engineering, 40(1), 41\u201350.","journal-title":"Computers & Electrical Engineering"},{"issue":"4","key":"2217_CR10","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/JIOT.2017.2737479","volume":"5","author":"H Lu","year":"2017","unstructured":"Lu, H., Li, Y., Mu, S., Wang, D., Kim, H., & Serikawa, S. (2017). Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet of Things Journal, 5(4), 2315\u20132322.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"2217_CR11","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s11036-017-0932-8","volume":"23","author":"H Lu","year":"2018","unstructured":"Lu, H., Li, Y., Chen, M., Kim, H., & Serikawa, S. (2018a). Brain intelligence: Go beyond artificial intelligence. Mobile Networks and Applications, 23(2), 368\u2013375.","journal-title":"Mobile Networks and Applications"},{"key":"2217_CR12","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.future.2018.01.001","volume":"82","author":"H Lu","year":"2018","unstructured":"Lu, H., Li, Y., Uemura, T., Kim, H., & Serikawa, S. (2018b). Low illumination underwater light field images reconstruction using deep convolutional neural networks. Future Generation Computer Systems, 82, 142\u2013148.","journal-title":"Future Generation Computer Systems"},{"key":"2217_CR13","doi-asserted-by":"crossref","unstructured":"Lu, H., Wang, D., Li, Y., Li, J., Li, X., Kim, H., Serikawa, S., & Humar, I. (2019). Conet: A cognitive ocean network. arXiv preprint arXiv:190106253.","DOI":"10.1109\/MWC.2019.1800325"},{"key":"2217_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2928180","author":"X Xu","year":"2019","unstructured":"Xu, X., Lu, H., Song, J., Yang, Y., Shen, H. T., & Li, X. (2019). Ternary adversarial networks with self-supervision for zero-shot cross-modal retrieval. IEEE Transactions on Cybernetics. https:\/\/doi.org\/10.1109\/TCYB.2019.2928180.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"2217_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MNET.2019.1800339","volume":"33","author":"H Lu","year":"2019","unstructured":"Lu, H., Liu, Q., Tian, D., Li, Y., Kim, H., & Serikawa, S. (2019a). The cognitive internet of vehicles for autonomous driving. IEEE Network, 33(3), 65\u201373.","journal-title":"IEEE Network"},{"key":"2217_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.asoc.2016.02.019","volume":"43","author":"S Gajjar","year":"2016","unstructured":"Gajjar, S., Sarkar, M., & Dasgupta, K. (2016). Famacrow: Fuzzy and ant colony optimization based combined mac, routing, and unequal clustering cross-layer protocol for wireless sensor networks. Applied Soft Computing, 43, 235\u2013247.","journal-title":"Applied Soft Computing"},{"key":"2217_CR17","doi-asserted-by":"crossref","unstructured":"Garg, N., & Saxena, S. (2018). Cluster head selection using genetic algorithm in hierarchical clustered sensor network. In 2018 second international conference on intelligent computing and control systems (ICICCS) (pp. 511\u2013515). IEEE.","DOI":"10.1109\/ICCONS.2018.8662914"},{"key":"2217_CR18","doi-asserted-by":"crossref","unstructured":"Chang-Ri, L., Yun, Z., Xin-hua, Z., & Zi-bo, Z. (2010). A clustering algorithm based on cell combination for wireless sensor networks. In 2010 second international workshop on education technology and computer science (vol. 2, pp. 74\u201377). IEEE.","DOI":"10.1109\/ETCS.2010.231"},{"issue":"1","key":"2217_CR19","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3923\/itj.2014.42.50","volume":"13","author":"H Li","year":"2014","unstructured":"Li, H., Xiong, Q., Shi, W., Chen, H., Du, M., & Ran, Y. (2014). Mechanism of immune system based clustering topology control algorithm in wireless sensor networks. Information Technology Journal, 13(1), 42\u201350.","journal-title":"Information Technology Journal"},{"issue":"2","key":"2217_CR20","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s11280-018-0541-x","volume":"22","author":"X Xu","year":"2019","unstructured":"Xu, X., He, L., Lu, H., Gao, L., & Ji, Y. (2019a). Deep adversarial metric learning for cross-modal retrieval. World Wide Web, 22(2), 657\u2013672.","journal-title":"World Wide Web"},{"issue":"5","key":"2217_CR21","doi-asserted-by":"publisher","first-page":"2494","DOI":"10.1109\/TIP.2017.2676345","volume":"26","author":"X Xu","year":"2017","unstructured":"Xu, X., Shen, F., Yang, Y., Shen, H. T., & Li, X. (2017). Learning discriminative binary codes for large-scale cross-modal retrieval. IEEE Transactions on Image Processing, 26(5), 2494\u20132507.","journal-title":"IEEE Transactions on Image Processing"},{"key":"2217_CR22","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2015.11.133","volume":"213","author":"X Xu","year":"2016","unstructured":"Xu, X., He, L., Shimada, A., & Taniguchi Ri, Lu H. (2016). Learning unified binary codes for cross-modal retrieval via latent semantic hashing. Neurocomputing, 213, 191\u2013203.","journal-title":"Neurocomputing"},{"key":"2217_CR23","doi-asserted-by":"crossref","unstructured":"Tiwari, T., Roy NR. (2015). Modified deec: A varying power level based clustering technique for WSNs. In 2015 international conference on computer and computational sciences (ICCCS) (pp. 170\u2013176). IEEE.","DOI":"10.1109\/ICCACS.2015.7361344"},{"key":"2217_CR24","doi-asserted-by":"crossref","unstructured":"Shaji, M., Ajith S. (2015). Distributed energy efficient heterogeneous clustering in wireless sensor network. In 2015 fifth international conference on advances in computing and communications (ICACC) (pp. 130\u2013134). IEEE.","DOI":"10.1109\/ICACC.2015.104"},{"issue":"3","key":"2217_CR25","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1007\/s11276-015-1045-6","volume":"22","author":"Abas kele-Turgut","year":"2016","unstructured":"kele-Turgut, Abas, & Hafif, O. G. (2016). Nodic: A novel distributed clustering routing protocol in wsns by using a time-sharing approach for ch election. Wireless Networks, 22(3), 1023\u20131034.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02217-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-019-02217-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02217-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T06:07:28Z","timestamp":1645164448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-019-02217-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2217"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-02217-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"2 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}