{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:02:08Z","timestamp":1776351728107,"version":"3.51.2"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11277-022-09895-5","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T19:02:38Z","timestamp":1656442958000},"page":"2781-2798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Deep Learning Approach to Accurately Predict the \u03ba-Coverage Probability in Wireless Sensor Networks"],"prefix":"10.1007","volume":"127","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6014-2439","authenticated-orcid":false,"given":"Mini","family":"Arora","sequence":"first","affiliation":[]},{"given":"Ashok","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"9895_CR1","doi-asserted-by":"publisher","first-page":"675","DOI":"10.3390\/electronics9040675","volume":"9","author":"K Tarnaris","year":"2020","unstructured":"Tarnaris, K., Preka, I., Kandris, D., & Alexandridis, A. (2020). Coverage and k-coverage optimization in wireless sensor networks using computational intelligence methods: A comparative study. MDPI Electronics, 9, 675.","journal-title":"MDPI Electronics"},{"key":"9895_CR2","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11227-020-03166-5","volume":"76","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi, R., Gupta, B., & Arurag, A. (2020). Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. The Journal of Supercomputing, 76, 7333\u20137373.","journal-title":"The Journal of Supercomputing"},{"key":"9895_CR3","first-page":"1","volume":"3","author":"D Kandris","year":"2020","unstructured":"Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. MDPI, Applied System Innovation, 3, 1\u201324.","journal-title":"MDPI, Applied System Innovation"},{"key":"9895_CR4","doi-asserted-by":"publisher","first-page":"2569","DOI":"10.1007\/s11277-020-07697-1","volume":"115","author":"S Sharma","year":"2020","unstructured":"Sharma, S., & Nagar, J. (2020). Intrusion detection in mobile sensor networks: A case study for different intrusion paths. Wireless Personal Communications, 115, 2569\u20132589.","journal-title":"Wireless Personal Communications"},{"key":"9895_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100376","volume":"40","author":"J Amutha","year":"2021","unstructured":"Amutha, J., Sharma, S., & Sharma, S. K. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review, 40, 100376.","journal-title":"Computer Science Review"},{"key":"9895_CR6","doi-asserted-by":"crossref","unstructured":"Nabi, F., Jamwal, S., Padmanbh, K. (2020). Wireless sensor network in precision farming for forecasting and monitoring of apple disease: a survey. International Journal of Information Technology, Early Access.","DOI":"10.1007\/s41870-020-00418-8"},{"key":"9895_CR7","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1007\/s11277-020-07963-2","volume":"117","author":"J Amutha","year":"2021","unstructured":"Amutha, J., Nagar, J., & Sharma, S. (2021). A distributed border surveillance (DBS) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Personal Communications, 117, 2135\u20132155.","journal-title":"Wireless Personal Communications"},{"key":"9895_CR8","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TVT.2007.905624","volume":"57","author":"TR Tsai","year":"2008","unstructured":"Tsai, T. R. (2008). Sensing coverage for randomly distributed wireless sensor networks in shadowed environments. IEEE Transactions on Vehicular Technology, 57, 556\u2013564.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"9895_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11277-019-06555-z","volume":"109","author":"S Debnath","year":"2019","unstructured":"Debnath, S., & Hossain, A. (2019). Network coverage in interference limited wireless sensor networks. Wireless Personal Communications, 109, 139\u2013153.","journal-title":"Wireless Personal Communications"},{"key":"9895_CR10","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1007\/s11277-019-06776-2","volume":"110","author":"A Katti","year":"2020","unstructured":"Katti, A., & Lobiyal, D. K. (2020). Sensing coverage for wireless sensor networks in shadowed rician fading environments. Wireless Personal Communications, 110, 1109\u20131125.","journal-title":"Wireless Personal Communications"},{"key":"9895_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJSNET.2020.109712","volume":"34","author":"A Sharma","year":"2020","unstructured":"Sharma, A., & Chauhan, S. (2020). Analytic evaluation of non-uniformities for coverage probability computation of randomly deployed wireless sensor network. International Journal of Sensor Networks, 34, 1\u201314.","journal-title":"International Journal of Sensor Networks"},{"key":"9895_CR12","doi-asserted-by":"publisher","first-page":"3686","DOI":"10.1049\/iet-com.2020.0043","volume":"14","author":"J Nagar","year":"2020","unstructured":"Nagar, J., Chaturvedi, S. K., & Soh, S. (2020). Connectivity analysis of finite wireless multihop networks incorporating boundary effects in shadowing environments. IET Communications, 14, 3686\u20133698.","journal-title":"IET Communications"},{"key":"9895_CR13","doi-asserted-by":"publisher","first-page":"2374","DOI":"10.1109\/TWC.2014.022714.131454","volume":"13","author":"HP Gupta","year":"2014","unstructured":"Gupta, H. P., Rao, S. V., & Venkatesh, T. (2014). Critical sensor density for partial coverage under border effects in wireless sensor networks. IEEE Transactions on Wireless Communications, 13, 2374\u20132382.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"9895_CR14","doi-asserted-by":"publisher","first-page":"2436","DOI":"10.1109\/TMC.2016.2636832","volume":"16","author":"HP Gupta","year":"2017","unstructured":"Gupta, H. P., Venkatesh, T., Rao, S. V., Dutta, T., & Iyer, R. R. (2017). Analysis of coverage under border effects in three-dimensional mobile sensor networks. IEEE Transactions on Mobile Computing, 16, 2436\u20132449.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"9895_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1504\/IJES.2018.089432","volume":"10","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Jia, W., & Wang, G. (2018). Area coverage estimation model for directional sensor networks. International Journal of Embedded Systems, 10, 13\u201321.","journal-title":"International Journal of Embedded Systems"},{"key":"9895_CR16","doi-asserted-by":"publisher","first-page":"102466","DOI":"10.1016\/j.jnca.2019.102466","volume":"149","author":"J Nagar","year":"2020","unstructured":"Nagar, J., Chaturvedi, S. K., & Soh, S. (2020). An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. Journal of Network and Computer Applications, 149, 102466.","journal-title":"Journal of Network and Computer Applications"},{"key":"9895_CR17","doi-asserted-by":"publisher","first-page":"208253","DOI":"10.1109\/ACCESS.2020.3038645","volume":"8","author":"A Singh","year":"2020","unstructured":"Singh, A., Kotiyal, V., Sharma, S., Nagar, J., & Lee, C. C. (2020). A machine learning approach to predict the average localisation error with applications to wireless sensor networks. IEEE Access, 8, 208253\u2013208263.","journal-title":"IEEE Access"},{"key":"9895_CR18","doi-asserted-by":"publisher","first-page":"3576","DOI":"10.3390\/s21113576","volume":"21","author":"V Kotiyal","year":"2021","unstructured":"Kotiyal, V., Singh, A., Sharma, S., Nagar, J., & Lee, C. C. (2021). ECS-NL: An enhanced cuckoo search algorithm for node localisation in wireless sensor networks. MDPI, Sensors, 21, 3576.","journal-title":"MDPI, Sensors"},{"key":"9895_CR19","doi-asserted-by":"publisher","first-page":"114603","DOI":"10.1016\/j.eswa.2021.114603","volume":"172","author":"A Singh","year":"2021","unstructured":"Singh, A., Nagar, J., Sharma, S., & Kotiyal, V. (2021). A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems with Applications, 172, 114603.","journal-title":"Expert Systems with Applications"},{"key":"9895_CR20","first-page":"1","volume":"111","author":"J Amutha","year":"2019","unstructured":"Amutha, J., Sharma, S., & Nagar, J. (2019). WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111, 1\u201327.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09895-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09895-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09895-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T09:08:02Z","timestamp":1670576882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09895-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9895"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09895-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"4 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest. All the sources are cited, referred and acknowledged.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}