{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:16Z","timestamp":1761401956598,"version":"build-2065373602"},"reference-count":62,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T00:00:00Z","timestamp":1525305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path, and the count is reduced while the reliability of each hop is the same as the traditional method. After analyzing the energy consumption of the network in detail, the value of optimized transmission power in different areas is given. On the basis of a large number of experimental and theoretical analyses, the results show that the COOR scheme will increase communication reliability by 36.62\u201387.77%, decrease delay by 21.09\u201352.48%, and balance the energy consumption of 86.97% of the nodes in the WSNs.<\/jats:p>","DOI":"10.3390\/s18051422","type":"journal-article","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T03:08:21Z","timestamp":1525403301000},"page":"1422","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs"],"prefix":"10.3390","volume":"18","author":[{"given":"Xin","family":"Xu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Minjiao","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"},{"name":"The State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Northeastern State University, OK 74464, USA, <email>xiongnaixue@gmail.com<\/email>"}]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[{"name":"Department of Network Engineering, School of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, National Huaqiao University, Quanzhou 362000 China"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","article-title":"Dependable structural health monitoring using wireless sensor networks","volume":"14","author":"Bhuiyan","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_2","unstructured":"Liu, X., Zhao, S., Liu, A., Xiong, N., and Vasilakos, A.V. (2017). Knowledge-Aware Proactive Nodes Selection Approach for Energy Management in Internet of Things. Future Gener. Comput. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MNET.2017.1500151","article-title":"Quoin: Incentive Mechanisms for Crowd Sensing Networks","volume":"32","author":"Ota","year":"2018","journal-title":"IEEE Netw. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","article-title":"A hybrid cloud approach for secure authorized deduplication","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_5","first-page":"17","article-title":"Securing Display Path for Security-Sensitive Applications on Mobile Devices","volume":"55","author":"Cui","year":"2018","journal-title":"CMC"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"13836","DOI":"10.1109\/ACCESS.2018.2809556","article-title":"A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6353714","DOI":"10.1155\/2018\/6353714","article-title":"A Quality Utilization Aware based Data Gathering for Vehicular Communication Networks","volume":"2018","author":"Ren","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TNET.2015.2397035","article-title":"Cooperative routing with relay assignment in multiradio multihop wireless networks","volume":"24","author":"Xie","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liu, A., Chen, W., and Liu, X. (2018). Delay Optimal Opportunistic Pipeline Routing Scheme for Cognitive Radio Sensor Networks. Int. J. Distrib. Sens. Netw., 14.","DOI":"10.1177\/1550147718772532"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Liu, A., and Zhao, S. (2017). High performance target tracking scheme with low prediction precision requirement in WSNs. Int. J. Ad Hoc Ubiquitous Comput., Available online: http:\/\/www.inderscience.com \/info\/ingeneral\/forthcoming.php?jcode=ijahuc.","DOI":"10.1504\/IJAHUC.2018.096081"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","article-title":"Fog-based Storage Technology to Fight with Cyber Threat","volume":"83","author":"Wang","year":"2018","journal-title":"Future Gen. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, A., Xie, M., Xiong, N., Zeng, Z., and Cai, Z. (2018). Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18041216"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1109\/TVT.2017.2771805","article-title":"Noise-Tolerant Wireless Sensor Networks Localization via Multi-norms Regularized Matrix Completion","volume":"67","author":"Xiao","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Xu, J., Liu, A., Xiong, N., Wang, T., and Zuo, Z. (2017). Integrated Collaborative Filtering Recommendation in Social Cyber-Physical Systems. Int. J. Distrib. Sens. Netw., 13.","DOI":"10.1177\/1550147717749745"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2994150","article-title":"e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems","volume":"12","author":"Bhuiyan","year":"2017","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5429546","DOI":"10.1155\/2018\/5429546","article-title":"Construction Low Complexity and Low Delay CDS for Big Data Codes Dissemination","volume":"2018","author":"Liu","year":"2018","journal-title":"Complexity"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wu, M., Wu, Y., Liu, X., Ma, M., Liu, A., and Zhao, M. (2018). Learning Based Synchronous Approach from Forwarding Nodes to Reduce the Delay for Industrial Internet of Things. EURASIP J. Wirel. Commun. Netw., 10.","DOI":"10.1186\/s13638-017-1015-z"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Xiong, N., Zhang, N., Liu, A., Shen, H., and Huang, C. (2018). Construction of Large-scale Low Cost Deliver Infrastructure using Vehicular Networks. IEEE Access.","DOI":"10.1109\/ACCESS.2018.2825250"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1109\/TPDS.2014.2310484","article-title":"Quality of energy provisioning for wireless power transfer","volume":"26","author":"Dai","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"9218239","DOI":"10.1155\/2018\/9218239","article-title":"Enhancing Cellular Coverage Quality by Virtual Access Point and Wireless Power Transfer","volume":"2018","author":"Gui","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"16193","DOI":"10.1109\/ACCESS.2017.2728367","article-title":"Energy-balanced transmission with accurate distances for strip-based wireless sensor networks","volume":"5","author":"Xin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.2017.1600321","article-title":"Exploiting massive D2D collaboration for energy-efficient mobile edge computing","volume":"24","author":"Chen","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/JIOT.2016.2560518","article-title":"Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Int. Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Li, Z., Chang, B., Wang, S., Liu, A., Zeng, F., and Luo, G. (2018). Dynamic Compressive Wide-band Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Internet of Things. IEEE Trans. Ind. Inf.","DOI":"10.1109\/TII.2018.2797096"},{"key":"ref_26","unstructured":"Liu, Y., Liu, A., Guo, S., Li, Z., and Choi, Y.J. (2017). Context-aware collect data with energy efficient in Cyber-physical cloud systems. Future Gen. Comput. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"14107","DOI":"10.1109\/ACCESS.2017.2720759","article-title":"Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint","volume":"5","author":"Xu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_28","first-page":"10","article-title":"Understanding graph-based trust evaluation in online social networks: Methodologies and challenges","volume":"49","author":"Jiang","year":"2016","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_29","first-page":"22","article-title":"Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor based Networks","volume":"2018","author":"Teng","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","article-title":"Verifiable computation over large database with incremental updates","volume":"65","author":"Chen","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/s12083-016-0529-1","article-title":"Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles","volume":"10","author":"Xie","year":"2017","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Liu, Q., and Liu, A. (2017). On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng.","DOI":"10.1016\/j.compeleceng.2017.03.004"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3882","DOI":"10.1109\/ACCESS.2018.2799681","article-title":"A Trust with Abstract Information Verified Routing Scheme for Cyber-physical Network","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, G., Zhang, S., and Liu, A. (2017). Big Program Code Dissemination Scheme for Emergency Software-define Wireless Sensor Networks. Peer Peer Netw. Appl., 1\u201322.","DOI":"10.1007\/s12083-017-0565-5"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Tan, J., Liu, A., Zhao, M., Shen, H., and Ma, M. (2018). Cross Layer Design for Reducing Delay and Maximizing Lifetime in Industrial Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw.","DOI":"10.1186\/s13638-018-1057-x"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4994","DOI":"10.1109\/TWC.2013.081913.121709","article-title":"Optimal resource allocation for reliable and energy efficient cooperative communications","volume":"12","author":"Xie","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1007\/s11277-017-4566-8","article-title":"LQEAR: Link Quality and Energy-Aware Routing for Wireless Multimedia Sensor Networks","volume":"97","author":"Aswale","year":"2017","journal-title":"Wirel. Person. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2376","DOI":"10.1109\/LCOMM.2017.2739727","article-title":"Node Deployment Based on Extra Path Creation for Wireless Sensor Networks on Mountain Roads","volume":"21","author":"Liu","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"3531","DOI":"10.1109\/TNET.2017.2750323","article-title":"Safe charging for wireless power transfer","volume":"25","author":"Dai","year":"2017","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gui, J., and Deng, J. (2018). Multi-hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality. IEEE Access.","DOI":"10.1109\/ACCESS.2018.2796247"},{"key":"ref_41","first-page":"14318","article-title":"Multi Working Sets Alternate Covering Scheme for Continuous Partial Coverage in WSNs","volume":"6","author":"Huang","year":"2018","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_42","first-page":"5712","article-title":"Electricity Cost Minimization for Delay-tolerant Basestation Powered by Heterogeneous Energy Source","volume":"11","author":"Deng","year":"2017","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"8273","DOI":"10.1109\/ACCESS.2018.2809501","article-title":"Qtsac: A Energy Efficient MAC Protocol for Delay Minimized in Wireless Sensor Networks","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/JSAC.2014.141109","article-title":"Dynamic spectrum access in multi-channel cognitive radio networks","volume":"32","author":"Zhang","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","article-title":"Secure attribute-based data sharing for resource-limited users in cloud computing","volume":"72","author":"Li","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.adhoc.2017.07.001","article-title":"On the performance of adaptive coding schemes for energy efficient and reliable clustered wireless sensor networks","volume":"64","author":"Arioua","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s11277-014-2164-6","article-title":"Analysis and improvement of send-and-wait automatic repeat-request protocols for wireless sensor networks","volume":"81","author":"Liu","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.adhoc.2017.06.006","article-title":"A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks","volume":"64","author":"Laouid","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/s11390-017-1712-4","article-title":"A light-weight opportunistic forwarding protocol with optimized preamble length for low-duty-cycle wireless sensor networks","volume":"32","author":"Chen","year":"2017","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/JSAC.2017.2679578","article-title":"R-TTWD: Robust device-free through-the-wall detection of moving human with WiFi","volume":"35","author":"Zhu","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/s12083-017-0556-6","article-title":"A Resource Allocation Model Based on Double-sided Combinational Auctions for Transparent Computing","volume":"11","author":"Wang","year":"2018","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TNET.2013.2256795","article-title":"On the delay performance of in-network aggregation in lossy wireless sensor networks","volume":"22","author":"Joo","year":"2014","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Qassim, Y., and Magana, M.E. (2014, January 10\u201312). Error-tolerant non-binary error correction code for low power wireless sensor networks. Proceedings of the International Conference on in Information Networking (ICOIN), Phuket, Thailand.","DOI":"10.1109\/ICOIN.2014.6799477"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Ali, S., Fakoorian, A., and Taheri, H. (2007, January 17\u201319). Optimum Reed-Solomon erasure coding in fault tolerant sensor networks. Proceedings of the 4th International Symposium on in Wireless Communication Systems, Trondheim, Norway.","DOI":"10.1109\/ISWCS.2007.4392291"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","article-title":"Network information flow","volume":"46","author":"Ahlswede","year":"2000","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.compeleceng.2014.04.001","article-title":"Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs","volume":"41","author":"Jiang","year":"2015","journal-title":"Comput. Electr. Eng."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"15787","DOI":"10.1109\/ACCESS.2018.2815039","article-title":"A Services Routing based Caching Scheme for Cloud Assisted CRNs","volume":"6","author":"Huang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, A., Zhang, J., Zeng, Z., Xiong, N., and Wang, T. (2018). A Security Routing Scheme Using Traceback Approach for Energy Harvesting Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18030751"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Guo, Y., Liu, F., Cai, Z., Xiao, N., and Zhao, Z. (2018). Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage. Sensors, 18.","DOI":"10.3390\/s18041189"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"4302425","DOI":"10.1155\/2018\/4302425","article-title":"Data Processing and Text Mining Technologies on Electronic Medical Records: A Review","volume":"2018","author":"Sun","year":"2018","journal-title":"J. Healthc. Eng."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"5084","DOI":"10.1109\/JSEN.2016.2548661","article-title":"Joint optimization of transmission power level and packet size for WSN lifetime maximization","volume":"16","author":"Akbas","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Woo, A., Tong, T., and Culler, D. (2003, January 5\u20137). Taming the Underlying Issues for Reliable Multhop Routing in Sensor Networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA.","DOI":"10.1145\/958491.958494"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1422\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:03:11Z","timestamp":1760194991000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,3]]},"references-count":62,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2018,5]]}},"alternative-id":["s18051422"],"URL":"https:\/\/doi.org\/10.3390\/s18051422","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,5,3]]}}}