{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:05:29Z","timestamp":1649199929916},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s12652-019-01539-0","type":"journal-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T17:03:37Z","timestamp":1573491817000},"page":"3597-3606","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of MAC protocol of wireless sensor network based on random multi-address access and three-probability joint-control"],"prefix":"10.1007","volume":"11","author":[{"given":"Xinchun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Man","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yumin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"issue":"21","key":"1539_CR1","first-page":"200","volume":"38","author":"X Chenghan","year":"2017","unstructured":"Chenghan X, Li P et al (2017) Design of event-triggered state estimator with unknown input in wireless sensor networks. J Commun 38(21):200\u2013206","journal-title":"J Commun"},{"issue":"11","key":"1539_CR2","doi-asserted-by":"publisher","first-page":"11219","DOI":"10.1109\/TVT.2018.2870872","volume":"67","author":"L Dianjie","year":"2018","unstructured":"Dianjie L et al (2018) Trusted device-to-device based heterogeneous cellular networks: a new framework for connectivity optimization. IEEE Trans Veh Technol 67(11):11219\u201311233","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"1539_CR3","first-page":"1","volume":"2015","author":"Y Guicai","year":"2015","unstructured":"Guicai Y et al (2015) Energy efficient cooperative spectrum sensing algorithm in cognitive wireless sensor networks. J Commun 2015(3):1\u201311","journal-title":"J Commun"},{"issue":"2","key":"1539_CR4","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1364\/OE.26.001681","volume":"26","author":"X Han","year":"2018","unstructured":"Han X et al (2018) Ultra-thin and broadband tunable metamaterial graphene absorber, \u201cUltra-thin and Broadband Tunable Metamaterial Graphene Absorber\u201d. Opt Express 26(2):1681\u20131688","journal-title":"Opt Express"},{"issue":"5","key":"1539_CR5","first-page":"1101","volume":"2015","author":"CH Hongju","year":"2018","unstructured":"Hongju CH et al (2018) Minimum-energy broadcast algorithm for wireless sensor networks with unreliable communications. J Softw 2015(5):1101\u20131112","journal-title":"J Softw"},{"issue":"2","key":"1539_CR6","first-page":"51","volume":"2010","author":"D Hongwei","year":"2010","unstructured":"Hongwei D et al (2010) Analysis of a new random muti-access MAC protocol and its energy efficiency for wireless sensor network. J Commun 2010(2):51\u201357","journal-title":"J Commun"},{"issue":"1","key":"1539_CR7","first-page":"161","volume":"2011","author":"T Hongwei","year":"2011","unstructured":"Hongwei T et al (2011) THO-MAC: a low-latency and energy-efficient MAC protocol with two-hop optimization in WSNs. J Natl Univer Defense Technol 2011(1):161\u2013166","journal-title":"J Natl Univer Defense Technol"},{"issue":"9","key":"1539_CR8","first-page":"160","volume":"2014","author":"J Jianping","year":"2014","unstructured":"Jianping J et al (2014) QoS-MAC model of wireless sensor networks for smart distribution power grid data communication. Autom Electric Power Syst 2014(9):160\u2013167","journal-title":"Autom Electric Power Syst"},{"issue":"6","key":"1539_CR9","first-page":"1118","volume":"2015","author":"J Jie","year":"2015","unstructured":"Jie J et al (2015) Energy-Efficient link scheduling combined with routing optimization in wireless sensor network. Acta Electronica Sinica 2015(6):1118\u20131124","journal-title":"Acta Electronica Sinica"},{"issue":"418","key":"1539_CR10","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1016\/j.ins.2017.08.048","volume":"2017","author":"M Kumar","year":"2017","unstructured":"Kumar M et al (2017) Fuzzy theoretic approach to signals and systems: static systems. Inf Sci 2017(418):668\u2013702","journal-title":"Inf Sci"},{"issue":"27","key":"1539_CR11","first-page":"3085","volume":"2016","author":"L Li","year":"2016","unstructured":"Li L et al (2016) Real-time and passive wormhole detection for wireless sensor networks. J Softw 2016(27):3085\u20133103","journal-title":"J Softw"},{"issue":"1","key":"1539_CR12","first-page":"165","volume":"2015","author":"W Qingwen","year":"2015","unstructured":"Qingwen W et al (2015) An adaptive forwarding protocol for underwater wireless sensor networ. J Northwestern Polytech Univ 2015(1):165\u2013170","journal-title":"J Northwestern Polytech Univ"},{"issue":"3","key":"1539_CR13","first-page":"596","volume":"28","author":"ZH Shaojun","year":"2019","unstructured":"Shaojun ZH et al (2019) Application technology of electrochemical sensors based on new nanomaterials. Acta Microscopica 28(3):596\u2013601","journal-title":"Acta Microscopica"},{"key":"1539_CR14","unstructured":"Van DT, Langendoen K (2003) An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc 1st Int\u20191 Conf. on Embedded Networked Sensor Systems (SenSys), Los Angeles, 5\u20137"},{"issue":"40","key":"1539_CR15","first-page":"1779","volume":"8","author":"D Weiyou","year":"2017","unstructured":"Weiyou D et al (2017) Towards a software-defined architecture for wireless sensor networks. Chin J Comput 8(40):1779\u20131797","journal-title":"Chin J Comput"},{"issue":"3","key":"1539_CR16","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.sjbs.2017.01.027","volume":"24","author":"ZH Wenping","year":"2017","unstructured":"Wenping ZH et al (2017) Analytical fuzzy approach to biological data analysis. Saudi J Biol Sci 24(3):563\u2013573","journal-title":"Saudi J Biol Sci"},{"issue":"5","key":"1539_CR17","first-page":"613","volume":"139","author":"X Xiaotao","year":"2018","unstructured":"Xiaotao X et al (2018) Energy conservation strategy for wireless multimedia sensor networks based on visual correlation. J Northeastern Univ (Nat Sci 139(5):613\u2013618","journal-title":"J Northeastern Univ (Nat Sci"},{"issue":"187","key":"1539_CR18","first-page":"586","volume":"20","author":"Xinchun","year":"2011","unstructured":"Xinchun et al (2011) Analysis of multi-access MAC protocol based on probability detection and non-persistent for wireless sensor network. Adv Mater Res 20(187):586\u2013592","journal-title":"Adv Mater Res"},{"issue":"6","key":"1539_CR19","first-page":"1138","volume":"2014","author":"ZH Xuan","year":"2014","unstructured":"Xuan ZH et al (2014) Dynamic multichannel protocol for wireless sensor networks. J Southeast Univ (Natural Science Edition) 2014(6):1138\u20131142","journal-title":"J Southeast Univ (Natural Science Edition)"},{"key":"1539_CR20","first-page":"41","volume":"9","author":"W Yasong","year":"2013","unstructured":"Yasong W et al (2013) Eenergy effiency access strategy: towards hybrid wireless sensor network. J Commun 9:41\u201352","journal-title":"J Commun"},{"key":"1539_CR21","unstructured":"Ye W (2002) An energy-efficient MAC protocol for wireless sensor network. In: Proceedings of the INFOCOM 2002. San Francisco: IEEE Computer Society"},{"issue":"12","key":"1539_CR22","first-page":"2992","volume":"2013","author":"Y Yong","year":"2013","unstructured":"Yong Y et al (2013) Energy-balanced adaptive clustering routing for indoor wireless sensor networks. J Electr Inf Technol 2013(12):2992\u20132998","journal-title":"J Electr Inf Technol"},{"issue":"4","key":"1539_CR23","first-page":"915","volume":"2014","author":"F Yongjian","year":"2014","unstructured":"Yongjian F et al (2014) Provacy-preserving generic approximate query in wireless sensor networks. Chin J Comput 2014(4):915\u2013926","journal-title":"Chin J Comput"},{"issue":"3","key":"1539_CR24","first-page":"1","volume":"37","author":"R Zhiling","year":"2018","unstructured":"Zhiling R et al (2018) Review on application of WSNs. Trans Microsyst Technol 37(3):1\u20132","journal-title":"Trans Microsyst Technol"},{"issue":"6","key":"1539_CR25","doi-asserted-by":"publisher","first-page":"1178-119","DOI":"10.1109\/TKDE.2017.2784430","volume":"30","author":"X Zhou","year":"2018","unstructured":"Zhou X et al (2018) Structure based user identification across social networks. IEEE Trans Knowl Data Eng 30(6):1178-119","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01539-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01539-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01539-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:59:58Z","timestamp":1604969998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01539-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["1539"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01539-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"25 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors confirm that this article content has no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}