{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:56:57Z","timestamp":1774540617309,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/ascc.2013.6606157","type":"proceedings-article","created":{"date-parts":[[2013,9,27]],"date-time":"2013-09-27T20:08:02Z","timestamp":1380312482000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Locating WiFi access points in indoor environments using non-monotonic signal propagation model"],"prefix":"10.1109","author":[{"given":"Saeed","family":"Varzandian","sequence":"first","affiliation":[]},{"given":"Hasan","family":"Zakeri","sequence":"additional","affiliation":[]},{"given":"Sadjaad","family":"Ozgoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","author":"cox","year":"2001","journal-title":"Multidimensional Scaling Second Edition"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2011.33"},{"key":"14","first-page":"1","article-title":"Unsupervised locating ofwifi access points using smartphones","author":"koo","year":"2012","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C Applications and Reviews"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197488"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/753206"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2093516"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.183"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/nem.683"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/0471738646"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/0471722839"},{"key":"4","article-title":"Wi-fi localization using rssi fingerprinting","author":"quan","year":"2010","journal-title":"Computer Engineering"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/sat.984"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/EMS.2011.60"}],"event":{"name":"2013 9th Asian Control Conference (ASCC)","location":"Istanbul, Turkey","start":{"date-parts":[[2013,6,23]]},"end":{"date-parts":[[2013,6,26]]}},"container-title":["2013 9th Asian Control Conference (ASCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589047\/6605987\/06606157.pdf?arnumber=6606157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:15:57Z","timestamp":1490224557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ascc.2013.6606157","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}