{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:33:01Z","timestamp":1729654381014,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346718","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"page":"422-427","source":"Crossref","is-referenced-by-count":0,"title":["Stochastic model for lifetime improvement of wireless sensor node"],"prefix":"10.1109","author":[{"given":"Anuradha","family":"Pughat","sequence":"first","affiliation":[]},{"given":"Vidushi","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/8811-3128"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5121\/ijassn.2012.2202"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5505976"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-015-0021-6"},{"key":"ref14","article-title":"Idleness is not sloth","author":"golding","year":"1995","journal-title":"Proceedings of the Winter USENIX Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972387"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2011.39035"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3473","DOI":"10.3390\/s130303473","article-title":"Evaluating the Power Consumption of Wireless Sensor Network Applications Using Models","volume":"13","author":"d\u00e2maso","year":"2013","journal-title":"SENSORS"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/43.931003","article-title":"Event-Driven Power Management","volume":"20","author":"\u0161imuni?","year":"2001","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/54.914626"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/43.766730"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127846"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5772\/56436"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2012.6261244"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/TPDS.2012.105","article-title":"Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks","volume":"24","author":"yun","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311455"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.208"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.46"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2011.6034854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464423"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346718.pdf?arnumber=7346718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T01:10:34Z","timestamp":1498266634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346718","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}