{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:55Z","timestamp":1773615775307,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"3","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.3103\/s0146411621030068","type":"journal-article","created":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T07:03:14Z","timestamp":1626678194000},"page":"277-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Life Cycle of the Underwater Wireless Sensor Network"],"prefix":"10.3103","volume":"55","author":[{"given":"Jun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ni","family":"Wang","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,7,19]]},"reference":[{"key":"7352_CR1","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/TKDE.2015.2411594","volume":"27","author":"U. Raza","year":"2015","unstructured":"Raza, U., Camerra, A., Murphy, A.L., Palpanas, T., and Picco, G.P., Practical data prediction for real-world wireless sensor networks, IEEE Trans. Knowl. Data Eng., 2015, vol. 27, no. 8, pp. 2231\u20132244.","journal-title":"IEEE Trans. Knowl. Data Eng"},{"key":"7352_CR2","first-page":"2498","volume":"37","author":"Jixin Li","year":"2016","unstructured":"Li Jixin, Zhang Yayun, Huang Fuchuan, et al., Data prediction algorithm based on Markov chain in wireless sensor network, Minicomput. Syst., 2016, vol. 37, no. 11, pp. 2498\u20132503.","journal-title":"Minicomput. Syst."},{"key":"7352_CR3","unstructured":"Zhang Kai, Data Fusion and Processing Technology of Wireless Sensor Network Based on Privacy Protection, Nanjing Univ. Posts Telecommun., 2018."},{"key":"7352_CR4","unstructured":"Chang Tieyuan, Liu Weina, Zhang Yan, and Li Huiya, LEACH protocol based on cluster head distance and energy optimization, J. Hebei Univ. (Nat. Sci. Ed.), 2019, vol. 39, no. 02, pp. 194\u2013200."},{"key":"7352_CR5","volume-title":"Event Recognition and Evolution of Underwater Sensor Network Based on Data Prediction","author":"Fang Wei","year":"2018","unstructured":"Fang Wei, Event Recognition and Evolution of Underwater Sensor Network Based on Data Prediction, Beijing: China Univ. Geosci., 2018."},{"key":"7352_CR6","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1016\/j.comcom.2010.10.003","volume":"34","author":"G. Wei","year":"2011","unstructured":"Wei, G., Ling, Y., Guo, B., et al., Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter, Comput. Commun., 2011, vol. 34, no. 6, pp. 793\u2013802.","journal-title":"Comput. Commun."},{"key":"7352_CR7","first-page":"1846","volume":"28","author":"Lingjiao Wang","year":"2015","unstructured":"Wang Lingjiao, Peng Zhiqiang, Li Zhetao, Guo Hua, and Zhong Yiqun, Optimization of cluster head selection strategy for NPCHs-LEACH protocol based on weight, J. Sens. Technol., 2015, vol. 28, no. 12, pp. 1846\u20131852.","journal-title":"J. Sens. Technol."},{"key":"7352_CR8","first-page":"98","volume":"51","author":"Wenhui Liang","year":"2015","unstructured":"Liang Wenhui, Dong Qiang, He Ming, Chen Qiuli, and Ding Chenlu, AUVs based healing algorithm for underwater mobile wireless sensor networks, Comput. Eng. Appl., 2015, vol. 51, no. 19, pp. 98\u2013102.","journal-title":"Comput. Eng. Appl."},{"key":"7352_CR9","first-page":"82","volume":"36","author":"He Ming","year":"2015","unstructured":"He Ming, Liang Wenhui, Chen Qiuli, Chen Xiliang, and Chen Jian, Topology optimization of underwater mobile wireless sensor network based on topology reconstruction, J. Commun., 2015, vol. 36, no. 06, pp. 82\u201391.","journal-title":"J. Commun."},{"key":"7352_CR10","first-page":"1761","volume":"28","author":"He Ming","year":"2013","unstructured":"He Ming, Liang Wenhui, Chen Guohua, and Chen Qiuli, Underwater mobile wireless sensor network topology, Control Decis. Making, 2013, vol. 28, no. 12, pp. 1761\u20131770.","journal-title":"Control Decis. Making"},{"key":"7352_CR11","first-page":"251","volume":"30","author":"He Ming","year":"2015","unstructured":"He Ming, Liang Wenhui, Chen Qiuli, Chen Xiliang, and Wang Lihui, Topology healing and optimization of underwater mobile wireless sensor networks, Control Decis. Making, 2015, vol. 30, no. 02, pp. 251\u2013255.","journal-title":"Control Decis. Making"},{"key":"7352_CR12","first-page":"1101","volume":"40","author":"Pengfei Diao","year":"2018","unstructured":"Diao Pengfei and Wang Yanjiao, Coverage keeping clustering algorithm for underwater wireless sensor networks based on node sleep, J. Electron. Inf., 2018, vol. 40, no. 05, pp. 1101\u20131107.","journal-title":"J. Electron. Inf."},{"key":"7352_CR13","first-page":"270","volume":"4","author":"Cece Cao","year":"2018","unstructured":"Cao Cece, Ji Qianqian, Song Jiao, Zhang Shujing, and Chen Jiaxing, Security research in underwater wireless sensor networks, Inf. Secur. Res., 2018, vol. 4, no. 03, pp. 270\u2013275.","journal-title":"Inf. Secur. Res."},{"key":"7352_CR14","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1109\/TKDE.2011.224","volume":"24","author":"C.C. Hung","year":"2012","unstructured":"Hung, C.C., Energy-aware set-covering approaches for approximate data collection in wireless sensor networks, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 11, pp. 1993\u20132007.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7352_CR15","doi-asserted-by":"publisher","first-page":"14458","DOI":"10.3390\/s150614458","volume":"15","author":"U. Amara","year":"2015","unstructured":"Amara, U., Nadeem, J., Ashfaq, A., et al., DEADS: Depth and energy aware dominating set based algorithm for cooperative routing along with sink mobility in underwater WSNs, Sensors, 2015, vol. 15, no. 6, pp. 14458\u201314486.","journal-title":"Sensors"},{"key":"7352_CR16","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1109\/TIE.2014.2362731","volume":"62","author":"G. Han","year":"2015","unstructured":"Han, G., Zhang, C., Shu, L., et al., Impacts of deployment strategies on localization performance in underwater acoustic sensor networks, IEEE Trans. Ind. Electron., 2015, vol. 62, no. 3, pp. 1725\u20131733.","journal-title":"IEEE Trans. Ind. Electron."},{"key":"7352_CR17","unstructured":"Lu Zhao, Research on Data Prediction Technology Based on Spatiotemporal Correlation in Wireless Sensor Networks, Hebei Univ. Eng., 2016."},{"key":"7352_CR18","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/TII.2017.2669967","volume":"13","author":"Z. Zhou","year":"2017","unstructured":"Zhou, Z., Fang, W., Niu, J., et al., Energy-efficient event determination in underwater WSNs leveraging practical data prediction, IEEE Trans. Ind. Inf., 2017, vol. 13, no. 3, pp. 1238\u20131248.","journal-title":"IEEE Trans. Ind. Inf."},{"key":"7352_CR19","doi-asserted-by":"crossref","unstructured":"Basagni, S., Boloni, L., Gjanci, P., et al., Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014.","DOI":"10.1109\/INFOCOM.2014.6848028"},{"key":"7352_CR20","series-title":"Real-time data analytics in sensor networks","volume-title":"Managing and Mining Sensor Data","author":"T. Palpanas","year":"2012","unstructured":"Palpanas, T., Real-time data analytics in sensor networks, in Managing and Mining Sensor Data, Aggarwal, C., Ed., New York: Springer, 2012."},{"key":"7352_CR21","first-page":"1","volume":"16","author":"N. Li","year":"2016","unstructured":"Li, N., Martinez, J.-F., Chaus, J.M.M., and Eckert, M., A survey on underwater acoustic sensor network routing protocols, Sensors, 2016, vol. 16, no. 3, pp. 1\u201328.","journal-title":"Sensors"},{"key":"7352_CR22","doi-asserted-by":"publisher","first-page":"1908","DOI":"10.1016\/j.jnca.2011.06.009","volume":"34","author":"M. Ayaz","year":"2011","unstructured":"Ayaz, M., Baig, I., Abdullah, A., and Faye, I., A survey on routing techniques in underwater wireless sensor networks, J. Network Comput. Appl., 2011, vol. 34, pp. 1908\u20131927.","journal-title":"J. Network Comput. Appl"},{"key":"7352_CR23","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TII.2015.2396007","volume":"11","author":"K. Derr","year":"2015","unstructured":"Derr, K. and Manic, M., Wireless sensor networks\u2014node localization for various industry problems, IEEE Trans. Ind. Inf., 2015, vol. 11, no. 3, pp. 752\u2013762.","journal-title":"IEEE Trans. Ind. Inf"},{"key":"7352_CR24","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.3390\/s120201827","volume":"12","author":"Seokhoon Yoon","year":"2012","unstructured":"Seokhoon Yoon, Abul K. Azad, Hoon Oh, et al., AURP: An AUV-aided underwater routing protocol for underwater acoustic sensor networks, Sensors, 2012, vol. 12, pp. 1827\u20131845.","journal-title":"Sensors"},{"key":"7352_CR25","first-page":"217","volume":"46","author":"Xiaoxiang Song","year":"2019","unstructured":"Song Xiaoxiang, Guo Yan, Li Ning, et al., Prediction algorithm of time series missing data based on compressed perception, Comput. Sci., 2019, vol. 46, no. 7, pp. 217\u2013223.","journal-title":"Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621030068.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621030068","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621030068.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:25Z","timestamp":1773612265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621030068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["7352"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621030068","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]},"assertion":[{"value":"17 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICTS OF INTEREST"}}]}}