{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:22:35Z","timestamp":1755217355287,"version":"3.43.0"},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Wireless Sensor Networks (WSNs) are having a dramatic impact on the way surrounding environment is being monitored. In this article, many underlying design issues of WSNs have been summarized, starting from the coverage and the connectivity. As batteries provide energy to sensor nodes, effective ways of power conservation are considered. Advantages of placing sensors in a regular pattern have also been discussed and various tradeoffs for many possible ways of secured communication in a WSN are summarized. Challenges in deploying WSN for monitoring CO emission are briefly covered. Finally, the use of sensors is illustrated in automatically generating music based on dancers\u2019 movements.<\/jats:p>","DOI":"10.2478\/s13537-011-0007-z","type":"journal-article","created":{"date-parts":[[2011,3,24]],"date-time":"2011-03-24T11:25:25Z","timestamp":1300965925000},"page":"2-18","source":"Crossref","is-referenced-by-count":5,"title":["Designing Wireless Sensor Networks: from theory to applications"],"prefix":"10.2478","volume":"1","author":[{"given":"Dharma","family":"Agrawal","sequence":"first","affiliation":[{"name":"Center for Distributed and Mobile Computing, School of Computing Sciences and Informatics, University of Cincinnati, Cincinnati, OH, 45221-0030, USA"}]}],"member":"374","published-online":{"date-parts":[[2011,3,25]]},"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.2478\/s13537-011-0007-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.2478\/s13537-011-0007-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.2478\/s13537-011-0007-z\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.2478\/s13537-011-0007-z\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:38:38Z","timestamp":1754397518000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.2478\/s13537-011-0007-z\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,1]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2011,3,25]]},"published-print":{"date-parts":[[2011,3,1]]}},"alternative-id":["10.2478\/s13537-011-0007-z"],"URL":"https:\/\/doi.org\/10.2478\/s13537-011-0007-z","relation":{},"ISSN":["2299-1093"],"issn-type":[{"type":"electronic","value":"2299-1093"}],"subject":[],"published":{"date-parts":[[2011,3,1]]}}}