{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:48:20Z","timestamp":1764784100458,"version":"3.41.2"},"reference-count":54,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T00:00:00Z","timestamp":1531353600000},"content-version":"vor","delay-in-days":192,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772554","61572526","61572528"],"award-info":[{"award-number":["61772554","61572526","61572528"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","award":["ICT1800391"],"award-info":[{"award-number":["ICT1800391"]}],"id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>An Adaptive Transmission Range Based Topology Control (ATRTC) scheme is proposed to reduce delay and improve reliability for data collection in delay and loss sensitive wireless sensor network. The core idea of the ATRTC scheme is to extend the transmission range to speed up data collection and improve the reliability of data collection. The main innovations of our work are as follows: (1) an adaptive transmission range adjustment method is proposed to improve data collection reliability and reduce data collection delay. The expansion of the transmission range will allow the data packet to be received by more receivers, thus improving the reliability of data transmission. On the other hand, by extending the transmission range, data packets can be transmitted to the sink with fewer hops. Thereby the delay of data collection is reduced and the reliability of data transmission is improved. Extending the transmission range will consume more energy. Fortunately, we found the imbalanced energy consumption of the network. There is a large amount of energy remains when the network died. ATRTC scheme proposed in this paper can make full use of the residual energy to extend the transmission range of nodes. Because of the expansion of transmission range, nodes in the network form multiple paths for data collection to the sink node. Therefore, the volume of data received and sent by the near\u2010sink nodes is reduced, the energy consumption of the near\u2010sink nodes is reduced, and the network lifetime is increased as well. (2) According to the analysis in this paper, compared with the CTPR scheme, the ATRTC scheme reduces the maximum energy consumption by 9%, increases the network lifetime by 10%, increases the data collection reliability by 7.3%, and reduces the network data collection time by 23%.<\/jats:p>","DOI":"10.1155\/2018\/4172049","type":"journal-article","created":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T23:49:54Z","timestamp":1531439394000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1041-6013","authenticated-orcid":false,"given":"Haojun","family":"Teng","sequence":"first","affiliation":[]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2788-3451","authenticated-orcid":false,"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,7,12]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809556"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0647-z"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.001"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1031-1"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3092831"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720759"},{"key":"e_1_2_10_8_2","article-title":"Secure Content Delivery with Edge Nodes to Save Caching Resources for Mobile Users in Green Cities","author":"Xu Q.","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2013.2257631"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.018"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.029"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.081913.121709"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809501"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2310484"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18030751"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2652464"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18041189"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0565-5"},{"key":"e_1_2_10_19_2","unstructured":"NarayanaswamyS. KawadiaV. SreenivasR. S. andKumarP. R. Power Control in Ad-Hoc Networks: Theory Architecture Proceedings of the Power Control in Ad-Hoc Networks: Theory Architecture 2002 156\u2013162."},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728367"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717749745"},{"key":"e_1_2_10_22_2","first-page":"17","article-title":"Securing Display Path for Security-Sensitive Applications on Mobile Devices","volume":"55","author":"Cui J.","year":"2018","journal-title":"CMC, Computers, Materials & Continua"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718772532"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2797096"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2469655"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815039"},{"key":"e_1_2_10_27_2","article-title":"Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things","author":"Liu X.","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"e_1_2_10_28_2","article-title":"Data Proessing and Text Mining Technologies on Electronic Medical Records: A Review","author":"Sun W.","year":"2018","journal-title":"Journal of Healthcare Engineering"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2570740"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5429546"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799681"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2994150"},{"key":"e_1_2_10_33_2","article-title":"High performance target tracking scheme with low prediction precision requirement in WSNs","author":"Zhao S.","year":"2017","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.036"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.026"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2906151"},{"key":"e_1_2_10_37_2","first-page":"3184","article-title":"Verifiable computation over large database with incremental updates","volume":"65","author":"Chen X.","year":"2016","journal-title":"Institute of Electrical and Electronics Engineers. Transactions on Computers"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.010"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2825250"},{"key":"e_1_2_10_40_2","doi-asserted-by":"crossref","unstructured":"LinS. ZhangJ. ZhouG. GuL. StankovicJ. A. andHeT. ATPC: adaptive transmission power control for wireless sensor networks Proceedings of the Proceeding of the 4th International Conference on Embedded Networked Sensor Systems (SenSys \u203206) November 2006 New York NY USA 223\u2013236 https:\/\/doi.org\/10.1145\/1182807.1182830 2-s2.0-34547468217.","DOI":"10.1145\/1182807.1182830"},{"key":"e_1_2_10_41_2","unstructured":"ZunigaM.andKrishnamachariB. An analysis of unreliability and asymmetry in low-power wireless links Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON \u203204) October 2004 517\u2013526 2-s2.0-20344378689."},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013763825347"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"SunM. T.andLaiT.-H. Location aided broadcast in wireless ad hoc network systems 2 Proceeding of the IEEE Wireless Communications and Networking Conference Record (WCNC \u203202) 2002 597\u2013602.","DOI":"10.1109\/WCNC.2002.993335"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.69"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2256795"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2354398"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18041216"},{"key":"e_1_2_10_48_2","doi-asserted-by":"crossref","unstructured":"IqbalZ.andLeeH. Low-Latency and High-Reliability Cooperative WSN for Indoor Industrial Monitoring Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring) June 2017 Sydney NSW 1\u20136 https:\/\/doi.org\/10.1109\/VTCSpring.2017.8108671.","DOI":"10.1109\/VTCSpring.2017.8108671"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2692246"},{"key":"e_1_2_10_50_2","doi-asserted-by":"crossref","unstructured":"WanC.-Y. CampbellA. T. andKrishnamurthyL. PSFQ: A reliable transport protocol for wireless sensor networks Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications September 2002 USA 1\u201311 2-s2.0-0036980191.","DOI":"10.1145\/570738.570740"},{"key":"e_1_2_10_51_2","doi-asserted-by":"crossref","unstructured":"ParkS. VedanthamR. SivakumarR. andAkyildizI. F. A scalable approach for reliable downstream data delivery in wireless sensor networks Proceedings of the the 5th ACM international symposium May 2004 Roppongi Hills Tokyo Japan https:\/\/doi.org\/10.1145\/989459.989470.","DOI":"10.1145\/989459.989470"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2771805"},{"key":"e_1_2_10_53_2","doi-asserted-by":"crossref","unstructured":"WenH. LinC. RenF. YueY. andHuangX. Retransmission or redundancy: Transmission reliability in wireless sensor networks Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS\u2032 07) October 2007 Italy 2-s2.0-50249104753.","DOI":"10.1109\/MOBHOC.2007.4428620"},{"key":"e_1_2_10_54_2","article-title":"Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks","volume":"2018","author":"Teng H.","year":"2018","journal-title":"Wireless Communications and Mobile Computing"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4172049.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4172049.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/4172049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T05:59:34Z","timestamp":1723010374000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/4172049"}},"subtitle":[],"editor":[{"given":"Sajid","family":"Hussain","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/4172049"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4172049","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-04-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4172049"}}