{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:58:57Z","timestamp":1774630737352,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/iwcmc61514.2024.10592530","type":"proceedings-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:18:34Z","timestamp":1721236714000},"page":"1490-1497","source":"Crossref","is-referenced-by-count":11,"title":["Energy performance of Internet of Things (IoT) networks for pipeline monitoring"],"prefix":"10.1109","author":[{"given":"Godlove Suila","family":"Kuaban","sequence":"first","affiliation":[{"name":"Institute of Theoretical and Applied Informatics,Polish Academy of Sciences (IITiS PAN),Gliwice,Poland"}]},{"given":"Tadeusz","family":"Czach\u00f3rski","sequence":"additional","affiliation":[{"name":"Institute of Theoretical and Applied Informatics,Polish Academy of Sciences (IITiS PAN),Gliwice,Poland"}]},{"given":"Erol","family":"Gelenbe","sequence":"additional","affiliation":[{"name":"Institute of Theoretical and Applied Informatics,Polish Academy of Sciences (IITiS PAN),Gliwice,Poland"}]},{"given":"Piotr","family":"Pecka","sequence":"additional","affiliation":[{"name":"Institute of Theoretical and Applied Informatics,Polish Academy of Sciences (IITiS PAN),Gliwice,Poland"}]},{"given":"Valery","family":"Nkemeni","sequence":"additional","affiliation":[{"name":"University of Buea,Laboratory of Electrical Engineering and Computing, Faculty of Engineering and Technology,Cameroon"}]},{"given":"Piotr","family":"Czekalski","sequence":"additional","affiliation":[{"name":"Silesian University of Technology,Faculty of Automatic Control, Electronics, and Informatics,Gliwice,Poland"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","article-title":"A study on water leakage detection in buried plastic pipes using wireless sensor networks","volume":"3","author":"Iyeswariya","year":"2012","journal-title":"Int. J. Sci. Eng. Res"},{"key":"ref2","author":"Okeya","year":"2018","journal-title":"Detection and localisation of pipe bursts in a district metered area using an online hydraulic model"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2752802"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.85919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.envres.2020.110309"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)PS.1949-1204.0000305"},{"key":"ref7","volume-title":"Pipeline leak detection handbook","author":"Henrie","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)PS.1949-1204.0000425"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2018.02.030"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2020.125751"},{"issue":"9","key":"ref11","first-page":"49","article-title":"Design and implementation of pipeline monitoring system using acceleration-based wireless sensor network","volume":"3","author":"Nwalozie","year":"2014","journal-title":"Int. J. Eng. Sci"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/0020294018758526"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.26530\/OAPEN_578133"},{"key":"ref15","volume-title":"Achieving Zero Leakage by 2050: Leak Detection and Location Methods-Acoustic Leak Detection","author":"Brennan","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878862"},{"key":"ref18","first-page":"186","article-title":"Energy packet networks: Ict based energy allocation and storage","volume-title":"International Conference on Green Communications and Networking","author":"Gelenbe"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4108\/icst.simutools.2012.247805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CIEES58940.2023.10378778"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2017.03.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.08.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2011.61"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2016.74"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS56607.2022.00019"},{"key":"ref26","first-page":"61","article-title":"Energy optimization for an unmanned aerial vehicle (e.g drone) during its mission","volume":"1596","author":"Czach\u00f3rski","year":"2022","journal-title":"Security in Computer and Information Sciences. EuroCybersec 2021. Communications in Computer and Information Science"},{"key":"ref27","article-title":"Battery attacks on sensors: Wireless nodes with battery attacks","volume-title":"EuroCybersec 2018: International symposium on computer and information sciences, cybersecurity workshop","author":"Gelenbe"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s23136183"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2667522.2667534"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103241"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/fi15120402"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2016.03.049"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321888"},{"key":"ref34","volume-title":"The Theory of Stochastic Processes","author":"Cox","year":"1965"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/361953.361969"}],"event":{"name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","location":"Ayia Napa, Cyprus","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10592105\/10592309\/10592530.pdf?arnumber=10592530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:03:45Z","timestamp":1747803825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10592530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iwcmc61514.2024.10592530","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}