{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:16:45Z","timestamp":1758475005343,"version":"3.37.3"},"reference-count":25,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61064614","[2012] 38"],"award-info":[{"award-number":["61064614","[2012] 38"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005329","name":"Guizhou Natural Science Foundation","doi-asserted-by":"crossref","award":["61064614","[2012] 38"],"award-info":[{"award-number":["61064614","[2012] 38"]}],"id":[{"id":"10.13039\/501100005329","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,9,1]]},"abstract":"<jats:p> It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition. Comparing three types of the hole detection methods, it is seen that the connectivity-based methods are used to detect coal mine collapse better than other methods. By establishing a 2D model of the collapse hole in coal mine, a class of algorithms for detecting the collapse hole in coal mine is described. Based on log-normal shadowing channel model, the accuracy of detecting the collapse hole in coal mine using Fisher information is analyzed. Numerical calculation shows that connectivity-based localization schemes are better to detect collapse hole of coal mine. <\/jats:p>","DOI":"10.1155\/2013\/306496","type":"journal-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T01:26:05Z","timestamp":1380072365000},"page":"306496","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Fisher Information of Mine Collapse Hole Detection Based on Sensor Nodes Connectivity"],"prefix":"10.1177","volume":"9","author":[{"given":"Shengbo","family":"Hu","sequence":"first","affiliation":[{"name":"Institute of Intelligent Information Processing, Guizhou Normal University, Guiyang 550001, China"},{"name":"Center for RFID and WSN Engineering, Department of Education, Guiyang, Guizhou 550001, China"}]},{"given":"Heng","family":"Shu","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Information Processing, Guizhou Normal University, Guiyang 550001, China"},{"name":"Center for RFID and WSN Engineering, Department of Education, Guiyang, Guizhou 550001, China"}]},{"given":"Xiaowei","family":"Song","sequence":"additional","affiliation":[{"name":"Institute of Intelligent Information Processing, Guizhou Normal University, Guiyang 550001, China"},{"name":"Center for RFID and WSN Engineering, Department of Education, Guiyang, Guizhou 550001, China"}]}],"member":"179","published-online":{"date-parts":[[2013,9,24]]},"reference":[{"key":"B1-2013-306496","doi-asserted-by":"publisher","DOI":"10.1145\/1498915.1498916"},{"issue":"2","key":"B2-2013-306496","first-page":"31","volume":"12","author":"Kavi K.","year":"2010","journal-title":"International Journal of Wireless and Mobile Networks"},{"first-page":"332","volume-title":"Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN \u203205)","author":"Bajwa W. U.","key":"B3-2013-306496"},{"first-page":"122","volume-title":"Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM \u203206)","author":"Wang Y.","key":"B4-2013-306496"},{"key":"B5-2013-306496","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-4471-y"},{"key":"B6-2013-306496","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2007.4284126"},{"volume-title":"Proceedings of 17th Canadian Conference on Computational Geometry","author":"Fekete S. P.","key":"B7-2013-306496"},{"volume-title":"Proceedings of 1st International Workshop on Algorithmic Aspects of Wireless Sensor Networks","author":"Fekete S. P.","key":"B8-2013-306496"},{"first-page":"377","volume-title":"Proceedings of the 22nd ACM Annual Symposium on Computational Geometry (SCG \u203206)","author":"Funke S.","key":"B9-2013-306496"},{"key":"B10-2013-306496","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.11"},{"volume-title":"Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MobiCom \u203206)","author":"Wang Y.","key":"B11-2013-306496"},{"key":"B12-2013-306496","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161104"},{"issue":"2","key":"B13-2013-306496","first-page":"213","volume":"9","author":"Babaie1 S.","year":"2012","journal-title":"International Journal of Computer Science"},{"issue":"1","key":"B14-2013-306496","first-page":"1","volume":"6","author":"Huang C. F.","year":"2005","journal-title":"Journal of Internet Technology"},{"first-page":"333","volume-title":"Proceedings of 2nd International Workshop (IPSN \u203203)","author":"Nagpal R.","key":"B15-2013-306496"},{"issue":"5","key":"B16-2013-306496","first-page":"946","volume":"33","author":"Sun J. P.","year":"2008","journal-title":"Journal of the China Coal Society"},{"issue":"6","key":"B17-2013-306496","first-page":"652","volume":"32","author":"Yang W.","year":"2007","journal-title":"Journal of the China Coal Society"},{"key":"B18-2013-306496","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2010.V2.229"},{"key":"B19-2013-306496","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(72)90045-2"},{"volume-title":"Wireless Communication: Principles and Practice","year":"1996","author":"Rappaport T.","key":"B20-2013-306496"},{"key":"B21-2013-306496","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2007.060662"},{"key":"B22-2013-306496","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292867"},{"first-page":"571","volume-title":"Proceedings of the 50th IEEE VTS Vehicular Technology Conference","author":"Sohrabi K.","key":"B23-2013-306496"},{"key":"B24-2013-306496","doi-asserted-by":"publisher","DOI":"10.1109\/78.875460"},{"first-page":"20","volume-title":"Proceedings of the 2nd ACM International Workshop on Wireless Sensor Networks and Applications (WSNA \u203203)","author":"Patwari N.","key":"B25-2013-306496"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/306496","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/306496","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/306496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:26:57Z","timestamp":1621196817000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/306496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,1]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9,1]]}},"alternative-id":["10.1155\/2013\/306496"],"URL":"https:\/\/doi.org\/10.1155\/2013\/306496","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,9,1]]}}}