{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:59Z","timestamp":1761581699511,"version":"build-2065373602"},"reference-count":66,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2018,5,12]],"date-time":"2018-05-12T00:00:00Z","timestamp":1526083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>For Industrial Wireless Sensor Networks (IWSNs), sending data with timely style to the stink (or control center, CC) that is monitored by sensor nodes is a challenging issue. However, in order to save energy, wireless sensor networks based on a duty cycle are widely used in the industrial field, which can bring great delay to data transmission. We observe that if the duty cycle of a small number of nodes in the network is set to 1, the sleep delay caused by the duty cycle can be effectively reduced. Thus, in this paper, a novel Portion of Nodes with Larger Duty Cycle (PNLDC) scheme is proposed to reduce delay and optimize energy efficiency for IWSNs. In the PNLDC scheme, a portion of nodes are selected to set their duty cycle to 1, and the proportion of nodes with the duty cycle of 1 is determined according to the energy abundance of the area in which the node is located. The more the residual energy in the region, the greater the proportion of the selected nodes. Because there are a certain proportion of nodes with the duty cycle of 1 in the network, the PNLDC scheme can effectively reduce delay in IWSNs. The performance analysis and experimental results show that the proposed scheme significantly reduces the delay for forwarding data by 8.9~26.4% and delay for detection by 2.1~24.6% without reducing the network lifetime when compared with the fixed duty cycle method. Meanwhile, compared with the dynamic duty cycle strategy, the proposed scheme has certain advantages in terms of energy utilization and delay reduction.<\/jats:p>","DOI":"10.3390\/s18051535","type":"journal-article","created":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T02:57:20Z","timestamp":1526266640000},"page":"1535","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["An Effective Delay Reduction Approach through a Portion of Nodes with a Larger Duty Cycle for Industrial WSNs"],"prefix":"10.3390","volume":"18","author":[{"given":"Minrui","family":"Wu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Yanhui","family":"Wu","sequence":"additional","affiliation":[{"name":"College of computer and information engineering, Hunan University of Commerce, Changsha 410205, China"}]},{"given":"Chuyao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Central South University, Changsha 410075, China"}]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK 74464, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"},{"name":"The State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China"}]},{"given":"Ming","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Stony Brook University, Stony Brook, NY 11794, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,5,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2994150","article-title":"e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems","volume":"12","author":"Bhuiyan","year":"2017","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, Z., Chang, B., Wang, S., Liu, A., Zeng, F., and Luo, G. (2018). Dynamic Compressive Wide-band Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Internet of Things. IEEE Trans. Ind. Inform., 1.","DOI":"10.1109\/TII.2018.2797096"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MNET.2017.1500151","article-title":"QUOIN: Incentive Mechanisms for Crowd Sensing Networks","volume":"32","author":"Ota","year":"2018","journal-title":"IEEE Netw. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Huang, M., Liu, A., Zhao, M., and Wang, T. (2018). Multi Working Sets Alternate Covering Scheme for Continuous Partial Coverage in WSNs. Peer Peer Netw. Appl.","DOI":"10.1007\/s12083-018-0647-z"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9218239","DOI":"10.1155\/2018\/9218239","article-title":"Enhancing Cellular Coverage Quality by Virtual Access Point and Wireless Power Transfer","volume":"2018","author":"Gui","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_6","first-page":"10","article-title":"Understanding graph-based trust evaluation in online social networks: Methodologies and challenges","volume":"49","author":"Jiang","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Xu, Q., Su, Z., Zheng, Q., Luo, M., and Dong, B. (2017). Secure Content Delivery with Edge Nodes to Save Caching Resources for Mobile Users in Green Cities. IEEE Trans. Ind. Inform., 1.","DOI":"10.1109\/TII.2017.2787201"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/JIOT.2016.2560518","article-title":"Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","article-title":"Dependable structural health monitoring using wireless sensor networks","volume":"14","author":"Bhuiyan","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1550147717749745","DOI":"10.1177\/1550147717749745","article-title":"Integrated Collaborative Filtering Recommendation in Social Cyber-Physical Systems","volume":"13","author":"Xu","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_11","unstructured":"Liu, Y., Liu, A., Guo, S., Li, Z., and Choi, Y.J. (2017). Context-aware collect data with energy efficient in Cyber-physical cloud systems. Futur. Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3882","DOI":"10.1109\/ACCESS.2018.2799681","article-title":"A Trust with Abstract Information Verified Routing Scheme for Cyber-physical Network","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2068375","DOI":"10.1155\/2018\/2068375","article-title":"Adaptive transmission power control for reliable data forwarding in sensor based networks","volume":"2018","author":"Teng","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5429546","DOI":"10.1155\/2018\/5429546","article-title":"Construction Low Complexity and Low Delay CDS for Big Data Codes Dissemination","volume":"2018","author":"Liu","year":"2018","journal-title":"Complexity"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","article-title":"Assessment of the Suitability of Fog Computing in the Context of Internet of Things","volume":"6","author":"Sarkar","year":"2018","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_16","unstructured":"(2018, March 02). Internet of Things Market Forecast: Cisco. Available online: http:\/\/postscapes.com\/internet-of-things-market-size."},{"key":"ref_17","unstructured":"Liu, X., Zhao, S., Liu, A., Xiong, N., and Vasilakos, A.V. (2017). Knowledge-aware Proactive Nodes Selection Approach for Energy management in Internet of Things. Futur. Gener. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","article-title":"Fog-based Storage Technology to Fight with Cyber Threat","volume":"83","author":"Wang","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.2017.1600321","article-title":"Exploiting massive D2D collaboration for energy-efficient mobile edge computing","volume":"24","author":"Chen","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/JSYST.2014.2362617","article-title":"On theoretical modeling of sensor cloud: A paradigm shift from wireless sensor network","volume":"11","author":"Misra","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","article-title":"A hybrid cloud approach for secure authorized deduplication","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"\u00c5kerberg, J., Gidlund, M., and Bj\u00f6rkman, M. (2011, January 26\u201329). Future research challenges in wireless sensor and actuator networks targeting industrial automation. Proceedings of the 9th IEEE International Conference on Industrial Informatics (INDIN), Lisbon, Portugal.","DOI":"10.1109\/INDIN.2011.6034912"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"13836","DOI":"10.1109\/ACCESS.2018.2809556","article-title":"A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TNET.2015.2397035","article-title":"Cooperative routing with relay assignment in multiradio multihop wireless networks","volume":"24","author":"Xie","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, A., Xie, M., Xiong, N., Zeng, Z., and Cai, Z. (2018). Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18041216"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Liu, A., and Zhao, S. (2018, January 08). High performance target tracking scheme with low prediction precision requirement in WSNs. Available online: http:\/\/www.inderscience.com \/info\/ingeneral\/forthcoming.php?jcode=ijahuc.","DOI":"10.1504\/IJAHUC.2018.096081"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1109\/TVT.2017.2771805","article-title":"Noise-tolerant Wireless Sensor Networks Localization via Multi-norms Regularized Matrix Completion","volume":"67","author":"Xiao","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., and Pratt, W. (2008, January 22\u201324). WirelessHART: Applying wireless technology in real-time industrial process control. Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, MO, USA.","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref_30","first-page":"5712","article-title":"Electricity Cost Minimization for Delay-tolerant Basestation Powered by Heterogeneous Energy Source","volume":"11","author":"Deng","year":"2017","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"8273","DOI":"10.1109\/ACCESS.2018.2809501","article-title":"QTSAC: A Energy efficient MAC Protocol for Delay Minimized in Wireless Sensor networks","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Y., Xiong, N., Zhang, N., Liu, A., Shen, H., and Huang, C. (2018). Construction of Large-scale Low Cost Deliver Infrastructure using Vehicular Networks. IEEE Access.","DOI":"10.1109\/ACCESS.2018.2825250"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1109\/TPDS.2014.2310484","article-title":"Quality of energy provisioning for wireless power transfer","volume":"26","author":"Dai","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1186\/s13638-017-0998-9","article-title":"Improving cellular downlink throughput by multi-hop relay-assisted outband D2D communications","volume":"2017","author":"Zhou","year":"2017","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"16193","DOI":"10.1109\/ACCESS.2017.2728367","article-title":"Energy-balanced transmission with accurate distances for strip-based wireless sensor networks","volume":"5","author":"Xin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1550147718772532","DOI":"10.1177\/1550147718772532","article-title":"Delay Optimal Opportunistic Pipeline Routing Scheme for Cognitive Radio Sensor Networks","volume":"14","author":"Liu","year":"2018","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","article-title":"Verifiable computation over large database with incremental updates","volume":"65","author":"Chen","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/s12083-016-0529-1","article-title":"Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles","volume":"10","author":"Xie","year":"2017","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Liu, Q., and Liu, A. (2017). On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng.","DOI":"10.1016\/j.compeleceng.2017.03.004"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, G., Zhang, S., and Liu, A. (2017). Big Program Code Dissemination Scheme for Emergency Software-define Wireless Sensor Networks. Peer Peer Netw. Appl., 1\u201322.","DOI":"10.1007\/s12083-017-0565-5"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.pmcj.2017.03.012","article-title":"APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication","volume":"41","author":"Liu","year":"2017","journal-title":"Pervasive Mob. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TMC.2011.279","article-title":"Relay selection for geographical forwarding in sleep-wake cycling wireless sensor networks","volume":"12","author":"Naveen","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2376","DOI":"10.1109\/LCOMM.2017.2739727","article-title":"Node Deployment Based on Extra Path Creation for Wireless Sensor Networks on Mountain Roads","volume":"21","author":"Liu","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_44","first-page":"17","article-title":"Securing Display Path for Security-Sensitive Applications on Mobile Devices","volume":"55","author":"Cui","year":"2018","journal-title":"CMC Comput. Mater. Contin."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/TKDE.2015.2496199","article-title":"Online mode switch algorithms for maintaining data freshness in dynamic cyber-physical systems","volume":"28","author":"Han","year":"2016","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1109\/TC.2012.266","article-title":"Schedulability analysis of deferrablescheduling algorithms for maintainingreal-time data freshness","volume":"63","author":"Han","year":"2014","journal-title":"IEEE Trans. Comput."},{"key":"ref_47","unstructured":"Song, J., Mok, A.K., Chen, D., Nixon, M., Blevins, T., and Wojsznis, W. (2006, January 17\u201319). Improving PID control with unreliable communications. Proceedings of the ISA EXPO Technical Conference, Houston, TX, USA."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/TII.2016.2587842","article-title":"Performance evaluations and measurements of the REALFLOW routing protocol in wireless industrial networks","volume":"13","author":"Yu","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1109\/JSEN.2015.2504948","article-title":"WirArb: A new MAC protocol for time critical industrial wireless sensor network applications","volume":"16","author":"Zheng","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"790131","DOI":"10.1155\/2012\/790131","article-title":"A dynamic traffic-aware duty cycle adjustment MAC protocol for energy conserving in wireless sensor networks","volume":"8","author":"Hsu","year":"2012","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.compeleceng.2016.10.005","article-title":"Achieving Reliable and Secure Services in Cloud Computing Environments","volume":"59","author":"Liu","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"4994","DOI":"10.1109\/TWC.2013.081913.121709","article-title":"Optimal resource allocation for reliable and energy efficient cooperative communications","volume":"12","author":"Xie","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/JSAC.2014.141109","article-title":"Dynamic spectrum access in multi-channel cognitive radio networks","volume":"32","author":"Zhang","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/JSAC.2014.1403004","article-title":"Risk-aware cooperative spectrum access for multi-channel cognitive radio networks","volume":"32","author":"Zhang","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_55","first-page":"23","article-title":"Shortest Path Routing in Solar Powered WSNs Using Soft Computing Techniques","volume":"76","author":"Dhanalakshmi","year":"2017","journal-title":"J. Sci. Ind. Res."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, A., Zhang, J., Zeng, Z., Xiong, N., and Wang, T. (2018). A Security Routing Scheme Using Traceback Approach for Energy Harvesting Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18030751"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","article-title":"Secure distributed deduplication systems with improved reliability","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"14318","DOI":"10.1109\/ACCESS.2018.2796247","article-title":"Multi-hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality","volume":"6","author":"Gui","year":"2018","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.comnet.2017.04.019","article-title":"A novel packet salvaging model to improve the security of opportunistic routing protocols","volume":"122","author":"Salehi","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TNET.2013.2256795","article-title":"On the delay performance of in-network aggregation in lossy wireless sensor networks","volume":"22","author":"Joo","year":"2014","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_61","first-page":"3775","article-title":"FFSC: An energy efficiency communications approach for delay minimizing in internet of things","volume":"4","author":"Liu","year":"2016","journal-title":"IEEE Access"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Guo, Y., Liu, F., Cai, Z., Xiao, N., and Zhao, Z. (2018). Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage. Sensors, 18.","DOI":"10.3390\/s18041189"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Xu, X., Yuan, M., Liu, X., Liu, A., Xiong, N., Cai, Z., and Wang, T. (2018). Cross-layer Optimized Opportunistic Routing Scheme for Loss-and-delay Sensitive WSNs. Sensors, 18.","DOI":"10.3390\/s18051422"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"15787","DOI":"10.1109\/ACCESS.2018.2815039","article-title":"A Services Routing based Caching Scheme for Cloud Assisted CRNs","volume":"6","author":"Huang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_65","first-page":"5","article-title":"Improving the quality of mobile target detection through portion of node with fully duty cycle in WSNs","volume":"31","author":"Hu","year":"2016","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.pmcj.2011.02.004","article-title":"Energy-efficient mobile target detection in wireless sensor networks with random node deployment and partial coverage","volume":"8","author":"Medagliani","year":"2012","journal-title":"Pervasive Mob. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1535\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:04:01Z","timestamp":1760195041000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/5\/1535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,12]]},"references-count":66,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2018,5]]}},"alternative-id":["s18051535"],"URL":"https:\/\/doi.org\/10.3390\/s18051535","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,5,12]]}}}