{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236740,"version":"3.37.0"},"reference-count":22,"publisher":"Academy Publisher","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.9.2482-2489","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T00:36:53Z","timestamp":1412555813000},"source":"Crossref","is-referenced-by-count":1,"title":["Study on the Survival of Wireless Sensor Networks Based on Hierarchical Topology Control Method"],"prefix":"10.4304","volume":"9","author":[{"given":"Hongdong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuli","family":"Song","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,9,7]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-009-1958-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-009-1958-2"},{"issue":"no. 7","key":"ref2","first-page":"130","article-title":"Modified Shuffled Frog-Leaping Algorithm to Solve Traveling Salesman Problem","volume":"30","author":"Xue-hui","year":"2009","unstructured":"[2] Luo Xue-hui, Yang Ye, Li Xia, \"Modified Shuffled Frog-Leaping Algorithm to Solve Traveling Salesman Problem\", Journal on Communications, vol. 30, no. 7, pp. 130-135, 2009.","journal-title":"J Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-007-0210-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-007-0210-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/15732470500254535"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/15732470500254535"},{"issue":"no. 3","key":"ref5","first-page":"327","article-title":"H u Feng, Zhao Li, \"Improved Shuf F Led Frog Leaping Algorithm Based On Molecular Dynamics Simulations","volume":"27","author":"Xiaodan","year":"2012","unstructured":"[5] Zhang Xiaodan, H u Feng, Zhao Li, \"Improved Shuf F Led Frog Leaping Algorithm Based On Molecular Dynamics Simulations\", Journal of Data Acquisition & Processing, vol. 27, no. 3, pp. 327-332, 2012.","journal-title":"Journal of Data Acquisition & Processing"},{"issue":"no. 1","key":"ref6","first-page":"234","article-title":"Improved Shuffled Frog Leaping Algorithm","volume":"32","author":"Yu","year":"2012","unstructured":"[6] Gg Yu, Wang Xueping, Liang Jing, \"Improved Shuffled Frog Leaping Algorithm\", Journal of Computer Applications, vol. 32, no. 1, pp. 234-237, 2012.","journal-title":"Journal of Computer Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2007.06.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2007.06.007"},{"key":"ref8","first-page":"22","volume-title":"Data Mining Techniques for Associations","author":"Aggarwal","year":"2002","unstructured":"[8] C. C. Aggarwal, P. S. Yu. \"Data Mining Techniques for Associations.\" Clustering and Classification. 2002, pp. 22-67."},{"key":"ref9","first-page":"23","volume-title":"Malcolm Shorc and Mark Billingburst","author":"Vajdyanathan","year":"2008","unstructured":"[9] Anu Vajdyanathan. \"Malcolm Shorc and Mark Billingburst.\" Data in Social Network Analysis. 2008, pp. 23-25."},{"issue":"Sep","key":"ref10","first-page":"3","article-title":"Link Analysis in Web Information Retrieval.","author":"Henzinger","year":"2000","unstructured":"[10] Monika Henzinger. \"Link Analysis in Web Information Retrieval.\" IEEE Data Engineering Bulletin. Sep 2000, pp. 3-8.","journal-title":"Q Bull Comput Soc IEEE Tech Comm Data Eng","ISSN":"https:\/\/id.crossref.org\/issn\/1053-1238","issn-type":"print"},{"issue":"no. 8","key":"ref11","first-page":"1505","article-title":"A Leakage-based Precoding Scheme for Downlink multi-user MIMO Channels","volume":"26","author":"Sadek","year":"2008","unstructured":"[11] M. Sadek, A. Tarighat, A. H. Sayed, \"A Leakage-based Precoding Scheme for Downlink multi-user MIMO Channels\", IEEE Transactions on Wireless Communications, vol. 26, no. 8, pp. 1505-1515, 2008.","journal-title":"IEEE Trans Wirel Comm","ISSN":"https:\/\/id.crossref.org\/issn\/1536-1276","issn-type":"print"},{"issue":"no. 9","key":"ref12","first-page":"213","article-title":"\"A Novel Distributed Precoding Scheme Based on THP for Downlink Multi-Cell Multi-User OFDMA Wireless Systems\", IJACT","volume":"5","author":"Yazhou","year":"2011","unstructured":"[12] Zhu Yazhou, Zheng Guoxin, Rui Yun, Li Mingqi, \"A Novel Distributed Precoding Scheme Based on THP for Downlink Multi-Cell Multi-User OFDMA Wireless Systems\", IJACT: International Journal of Advancements in Computing Technology, vol. 5, no. 9, pp. 213-220, 2011.","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol3.issue2.19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol3.issue2.19"},{"key":"ref14","first-page":"432","volume-title":"A digital multisignature scheme using bijective public-key cryptosystems ACM Trans Computer Systems 6(4)","author":"Okamoto","year":"1988","unstructured":"[14] T. Okamoto. A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Computer Systems, 6(4), ACM Press, New York, 1988, pp. 432\u2013441."},{"key":"ref15","article-title":"Accountable-subgroup multisignatures (extended abstract).","volume-title":"Proceedings of CCS","author":"Micali","unstructured":"[16] S. Micali, K. Ohta, and L. Reyzin. Accountable-subgroup multisignatures (extended abstract). In Proceedings of CCS"},{"key":"ref16","first-page":"257","article-title":"Identity-Based Aggregate Signatures.","volume-title":"PKC 2006 LNCS 3958","year":"2006","unstructured":"[18] Craig Gentry and Zulfikar Ramzan. Identity-Based Aggregate Signatures. In PKC 2006, LNCS 3958, Springer, Berlin, 2006, pp. 257\u2013273."},{"key":"ref17","first-page":"416","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps.","volume-title":"Proceedings of Euro-crypt 2003 LNCS 2656","author":"Boneh","year":"2003","unstructured":"[19] D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of Euro-crypt 2003, LNCS 2656, Springer, Berlin, 2003, pp. 416\u2013432."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:07:59Z","timestamp":1738775279000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,7]]},"references-count":22,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2014,9,7]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.9.2482-2489","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,9,7]]}}}