{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:16:26Z","timestamp":1730211386572,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/csndsp.2014.6923810","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:13:31Z","timestamp":1414008811000},"page":"122-127","source":"Crossref","is-referenced-by-count":4,"title":["Activity-aware clustering algorithm for wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Morteza M.","family":"Zanjireh","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Larijani","sequence":"additional","affiliation":[]},{"given":"Wasiu O.","family":"Popoola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0438-z"},{"key":"17","first-page":"255","article-title":"Cluster-head election using fuzzy logic for wireless sensor networks. in Communication Networks and Services Research Conference, 2005","author":"gupta","year":"2005","journal-title":"Proceedings of the 3rd Annual"},{"key":"18","first-page":"767","article-title":"Improving on leach protocol of wireless sensor networks using fuzzy logic","volume":"7","author":"ran","year":"2010","journal-title":"International Journal of Information and computer Science"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2010.22018"},{"key":"16","first-page":"147","article-title":"The adaptive cluster head selection in wireless sensor networks. in Semantic Computing and Applications, 2008","author":"nam","year":"2008","journal-title":"IWSCA '08 IEEE International Workshop on"},{"key":"13","first-page":"295","article-title":"Algorithms for node clustering in wireless sensor networks: A survey. in Information and Automation for Sustainability, 2008","author":"kumarawadu","year":"2008","journal-title":"ICIAFS 2008 4th International Conference on"},{"key":"14","first-page":"59","article-title":"A cluster-based approach to provide energyefficient in wsn","volume":"12","author":"silva","year":"2013","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2282774"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7262-5_36"},{"key":"21","first-page":"68","article-title":"Analytical modelling of anch clustering algorithm for wsns","author":"zanjireh","year":"2014","journal-title":"ICN 2014 the Thirteenth International Conference on Networks"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MWCN.2002.1045790"},{"journal-title":"Sep A stable election protocol for clustered heterogeneous wireless sensor networks","year":"2004","author":"smaragdakis","key":"25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2461381.2461396"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6201215"},{"key":"10","first-page":"399","article-title":"A comparative analysis of energy-efficient routing protocols in wireless sensor networks","author":"narendra","year":"2014","journal-title":"Emerging Research in Electronics Computer Science and Technology Volume 248 of Lecture Notes in Electrical Engineering"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"7","first-page":"1","article-title":"Energyefficient communication protocol for wireless microsensor networks. in System Sciences, 2000","author":"heinzelman","year":"2000","journal-title":"Proceedings of the 33rd Annual Hawaii International Conference on"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.031912.112484"},{"key":"5","first-page":"879","article-title":"Virtual enterprise security: Importance, challenges, and solutions","volume":"4","author":"zanjireh","year":"2007","journal-title":"WSEAS Transactions on Information Science and Applications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2704"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.242"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5120\/9368-3824"}],"event":{"name":"2014 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP)","start":{"date-parts":[[2014,7,23]]},"location":"Manchester, UK","end":{"date-parts":[[2014,7,25]]}},"container-title":["2014 9th International Symposium on Communication Systems, Networks &amp; Digital Sign (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6913114\/6923783\/06923810.pdf?arnumber=6923810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:04:12Z","timestamp":1490303052000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6923810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/csndsp.2014.6923810","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}