{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:51:44Z","timestamp":1720659104080},"reference-count":22,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1587\/transinf.2019iik0001","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T22:25:46Z","timestamp":1585693546000},"page":"789-795","source":"Crossref","is-referenced-by-count":2,"title":["Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Kedir","family":"MAMO BESHER","sequence":"first","affiliation":[{"name":"FIAD-Universidad Aut\u00f3noma de Baja California, Universidad de Colima"}]},{"given":"Juan-Ivan","family":"NIETO-HIP\u00d3LITO","sequence":"additional","affiliation":[{"name":"FIAD-Universidad Aut\u00f3noma de Baja California, Universidad de Colima"}]},{"given":"Juan de Dios","family":"S\u00c1NCHEZ L\u00d3PEZ","sequence":"additional","affiliation":[{"name":"FIAD-Universidad Aut\u00f3noma de Baja California, Universidad de Colima"}]},{"given":"Mabel","family":"VAZQUEZ-BRISENO","sequence":"additional","affiliation":[{"name":"FIAD-Universidad Aut\u00f3noma de Baja California, Universidad de Colima"}]},{"given":"Raymundo","family":"BUENROSTRO MARISCAL","sequence":"additional","affiliation":[{"name":"FIAD-Universidad Aut\u00f3noma de Baja California, Universidad de Colima"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] F. Verde, A. Scaglione, D. Darsena, and G. Gelli, \u201cAn amplify-and-forward scheme for spectrum sharing in cognitive radio channels,\u201d IEEE, DOI 10.1109\/TWC.2015.2440359, 2015,","DOI":"10.1109\/TWC.2015.2440359"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] I. Jang, S. Yang, H. Yoon, and D. Kim, \u201cEMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks,\u201d IEEE Trans. Wireless Commun., vol.12, no.4, pp.1640-1650, 2013. 10.1109\/twc.2013.022013.120477","DOI":"10.1109\/TWC.2013.022013.120477"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] K. Mamo Besher, J.-I. Nieto-Hipolito, M. Vazquez Briseno, and R. Buenrostro Mariscal, \u201cSenPUI: Solutions for sensing and primary user interference in cognitive radio implementation of a wireless sensor network,\u201d Wireless Commun. and Mobile Computing, Volume 2019, https:\/\/doi.org\/10.1155\/2019\/2405141.","DOI":"10.1155\/2019\/2405141"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] K.M. Besher, J.-I. Nieto-Hip\u00f3lito, J.-D.D. S\u00e1nchez-L\u00f3pez, M.Vazquez-Brieseno, and M.De los \u00c1ngeles Cosio-Leon, \u201cMNH-WSN (Mobile Node Based Handoff for Wireless Sensor Network),\u201d Journal of Engineering Research and, vol.5, no.12, 2016. 10.17577\/ijertv5is120032","DOI":"10.17577\/IJERTV5IS120032"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] L. Lv, J. Chen, and Q. Ni, \u201cCooperative Non-Orthogonal Multiple Access in Cognitive Radio,\u201d IEEE Commun. Lett., vol.20, no.10, pp.2059-2062, 2016. DOI 10.1109\/LCOMM.2016.2596763 10.1109\/lcomm.2016.2596763","DOI":"10.1109\/LCOMM.2016.2596763"},{"key":"6","unstructured":"[6] M. Ma and Y. Yang, \u201cLoaingd balancing in hybrid sensor network with mobile cluster heads,\u201d Qshine 06&apos;, vol.2, no.4, 2012."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] R. Arjona, A. Fumagalli, C. Lee, and K. Vijayasankar, \u201cCooperative Non-Orthogonal Multiple Access in Cognitive Radio,\u201d IEEE, GLOBECOM, 2018. DOI: 10.1109\/GLOCOM.2018.8647618. 10.1109\/GLOCOM.2018.8647618","DOI":"10.1109\/GLOCOM.2018.8647618"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] A. Koubaa, M. Alves, and E. Tovar, \u201cModeling and worst-case dimensioning of cluster-tree wireless sensor networks,\u201d 2006 27th IEEE International Real-Time Systems Symposium (RTSS&apos;06), pp.412-421, 2006. 10.1109\/rtss.2006.29","DOI":"10.1109\/RTSS.2006.29"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] M. Fidler, \u201cAn end-to-end probabilistic network calculus with moment generating functions\u201d 200614th IEEE International Workshop on Quality of Service, pp.261-270, 2006. 10.1109\/iwqos.2006.250477","DOI":"10.1109\/IWQOS.2006.250477"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] A. Burchard, J. Liebeherr, and S.D. Patek, \u201cA min-plus calculus for end-to-end statistical service guarantees,\u201d IEEE Trans. Inf. Theory, vol.52, no.9, pp.4105-4114, 2006. 10.1109\/tit.2006.880019","DOI":"10.1109\/TIT.2006.880019"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, and S.-S. Yeo, \u201cRobust anonymous authentication protocol for health-care applications using wireless medical sensor networks,\u201d Multimedia Syst., vol.21, no.1, pp.49-60, 2015. 10.1007\/s00530-013-0346-9","DOI":"10.1007\/s00530-013-0346-9"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] Y. Cho, S. Lim, and H. Yang, \u201cCollaborative Occupancy Reasoning in Visual Sensor Network for scalable smart video surveillance,\u201d IEEE Trans. Consum. Electron., vol.56, no.3, pp.1997-2003, 2010. 10.1109\/tce.2010.5606357","DOI":"10.1109\/TCE.2010.5606357"},{"key":"13","unstructured":"[13] T. He, et al, \u201cAchieving real-time target tracking using wireless sensor networks,\u201d ACM Trans. Embedded Computing System (TECS), vol.1, no.3, 2007."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, \u201cHabitat monitoring: Application drive for wireless communications technology,\u201d ACM SIGCOMM Computer Communication Review, vol.31, no.2, 2001. 10.1145\/844193.844196","DOI":"10.1145\/844193.844196"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] YL. Cui and J. Yong-feng, \u201cThe Research on End-to-End Delay Upper Bound in Wireless Sensor Network,\u201d 2012 International Conference on Image Analysis and Signal Processing, pp.1-4, 2012. DOI: 10.1109\/IASP.2012.6425063. 10.1109\/iasp.2012.6425063","DOI":"10.1109\/IASP.2012.6425063"},{"key":"16","unstructured":"[16] X. Liang and S. Goddard, \u201cPerformance analysis of the IEEE 802.15.4 based ECG monitoring network,\u201d Proc. 7th IASTED International Conferences Wireless and Optical Communication, vol.1, no.1, pp 99-104, 2007,"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Y. Wang, M.C. Vuran, and S. Goddard, \u201cCross-layer Analysis of the End-to-end Delay Distribution in Wireless Sensor Networks,\u201d 2009 30th IEEE Real-Time Systems Symposium, vol.1, no.1, pp.138-147, 2009. 10.1109\/rtss.2009.27","DOI":"10.1109\/RTSS.2009.27"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] N. Abbas, F. Yu, and U. Majeed, \u201cReliability and End-to-End Delay Evaluation of Outdoor and Indoor Environments for Wireless Multimedia Sensor Networks,\u201d 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), vol.1, no.1, pp.764-768, 2018. 10.1109\/imcec.2018.8469440","DOI":"10.1109\/IMCEC.2018.8469440"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] F. Despaux, Y.-Q. Song, and A. Lahmadi, \u201cCombining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks,\u201d 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, vol.1, no.1, pp.317-322, 2012. 10.1109\/dcoss.2012.31","DOI":"10.1109\/DCOSS.2012.31"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] X. Xu, B. He, W. Yang, X. Zhou, and Y. Cai, \u201cSecure transmission design for cognitive radio networks with Poisson distributed eavesdroppers,\u201d IEEE Trans. Inf. Forensics and Security, vol.11, no.2, 2016.","DOI":"10.1109\/TIFS.2015.2500178"},{"key":"21","unstructured":"[21] L. Kleinrock, Queueing Systems, Theory, vol.1, NewYork, NY, USA, Wiley, 1975."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] S. Balasubramani and Shankar, \u201cReview on MAC layer delay computation methods in wireless networks,\u201d 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp.1-7, 2017. DOI: 10.1109\/ICCPCT.2017.8074392. 10.1109\/iccpct.2017.8074392","DOI":"10.1109\/ICCPCT.2017.8074392"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019IIK0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T03:28:34Z","timestamp":1585970914000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/4\/E103.D_2019IIK0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019iik0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}