{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:01:19Z","timestamp":1729677679621,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612168","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:09Z","timestamp":1380638289000},"page":"91-96","source":"Crossref","is-referenced-by-count":1,"title":["LEF-P: Leader election using fuzzy for power efficient gathering in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Manpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Ajay K","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"13","first-page":"363","article-title":"Mamadani's fuzzy inference emathteacher: A tutorial for active learning","volume":"7","author":"sanchez torrubia","year":"2008","journal-title":"WSEAS Transactions on Computers"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35781-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5303808"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v2n4p3"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2034369"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.03.002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.008"},{"key":"10","first-page":"767","article-title":"Improving on leach protocol of wireless sensor networks using fuzzy logic","volume":"7","author":"ran","year":"2010","journal-title":"International Journal of Information and computer Science"},{"key":"7","doi-asserted-by":"crossref","first-page":"755","DOI":"10.24297\/ijct.v4i3.4198","article-title":"Fuzzy-based leader selection for topology controlled pegasis protocol for lifetime enhancement in wireless sensor network","volume":"4","author":"nehra","year":"2013","journal-title":"INTERNATIONAL JOURNAL of COMPUTERS & TECHNOLOGY"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381703"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.07.015"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2011.111"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.27"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612168.pdf?arnumber=6612168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T21:30:15Z","timestamp":1564263015000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612168","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}