{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:13:31Z","timestamp":1753888411056,"version":"3.41.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"vor","delay-in-days":221,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Basic Scientific Research Project of Zhejiang Construction Vocational and Technical College of China","award":["Z201910","FG2019115","LGF18F030005"],"award-info":[{"award-number":["Z201910","FG2019115","LGF18F030005"]}]},{"name":"Visiting Engineer School\u2014Enterprise Cooperation Project of Colleges and Universities Zhejiang Province of China","award":["Z201910","FG2019115","LGF18F030005"],"award-info":[{"award-number":["Z201910","FG2019115","LGF18F030005"]}]},{"name":"Zhejiang Province Public Welfare Project of China","award":["Z201910","FG2019115","LGF18F030005"],"award-info":[{"award-number":["Z201910","FG2019115","LGF18F030005"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Wireless sensor network (WSN) is communicating method with each other without the assistance of communication cable. The circular environment is an important application scenario in WSN. As a core technology, routing algorithm is the brain of WSN monitoring system. In this paper, we propose a new routing algorithm named Equal Area Partition Based Energy Efficient Multipath Algorithm (EAPEEM), which tries to exploit sector equal area model in node deployment, data transfer, and route maintenance. Existing algorithms, as compared to our existing models, do not fully match with routing and nodes. One attractive feature of our protocol is its balanced network transmission capacity and improved node energy utilization, which can reduce the possibility of system damage. Simulations show that EAPEEM can retain at least 28.6% of batteries and expand stability by more than 43%.<\/jats:p>","DOI":"10.1155\/2021\/7280558","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T03:51:35Z","timestamp":1628653895000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Equal Area Partition\u2010Based Energy Efficient Routing Algorithm for Circular WSN"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2096-3149","authenticated-orcid":false,"given":"Hu","family":"Liqin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6498-5537","authenticated-orcid":false,"given":"Wang","family":"Sanyou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1357-7848","authenticated-orcid":false,"given":"Ma","family":"Fujun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4809-9444","authenticated-orcid":false,"given":"Zhang","family":"Shubo","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,10]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13246-014-0315-4"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3004852"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3085820"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800249"},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","unstructured":"SuJ. ChenY. ShengZ. andSunL. Bit query based M-ary tree protocol for RFID tags identification GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017 Singapore 1\u20137 https:\/\/doi.org\/10.1109\/GLOCOM.2017.8253932 2-s2.0-85046426989.","DOI":"10.1109\/GLOCOM.2017.8253932"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00915-4"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3004118"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3024076"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2968438"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2952126"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2015EBP3475"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2969634"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1665-8"},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11276-020-02435-8","article-title":"Energy optimized micro genetic algorithm based LEACH protocol for WSN","volume":"27","author":"Radhika M.","year":"2021","journal-title":"Wireless Networks"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.05.024"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666082"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.022"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s17092027"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1689-0"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8946576"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4440"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2962129"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2144588"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911455"},{"key":"e_1_2_9_26_2","first-page":"2294","article-title":"Idle slots skipped mechanism based tag identification algorithm with enhanced collision detection","volume":"14","author":"Su J.","year":"2020","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.06.022"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7280558.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7280558.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7280558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:41:27Z","timestamp":1723030887000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7280558"}},"subtitle":[],"editor":[{"given":"Jian","family":"Su","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7280558"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7280558","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7280558"}}