Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network Article Swipe
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.5120/21071-3745
Wireless sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments.These networks are used in a variety of applications including military, surveillance, industry and health systems.Sensors used in these applications can be susceptible to various types of attacks such as data modification, data insertion and deletion, or even physical capture and sensor node replacement.Therefore, security is a critical issue that must be resolved.This paper presents the transmission of secured image using DWT-SVD image hiding technique.Initially, both the carrier image and the secret image are decomposed according to DWT (Discrete Wavelet Transform) and then the secret image is embedded in singular values of the carrier image by applying SVD (Singular Value Decomposition).An Energy saving greedy algorithm is applied for routing the resultant secured image in the form of packets.Experimental results and performance analysis demonstrate that the proposed scheme can protect the sensitive information without affecting the transmission and usability of the ordinary data.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.5120/21071-3745
- https://doi.org/10.5120/21071-3745
- OA Status
- bronze
- Cited By
- 1
- References
- 16
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2263682939
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2263682939Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5120/21071-3745Digital Object Identifier
- Title
-
Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-06-18Full publication date if available
- Authors
-
Neha Narula, Deepak Sethi, Prasun BhattacharyaList of authors in order
- Landing page
-
https://doi.org/10.5120/21071-3745Publisher landing page
- PDF URL
-
https://doi.org/10.5120/21071-3745Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5120/21071-3745Direct OA link when available
- Concepts
-
Computer science, Transmission (telecommunications), Image (mathematics), Computer network, Wireless sensor network, Artificial intelligence, TelecommunicationsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2016: 1Per-year citation counts (last 5 years)
- References (count)
-
16Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2263682939 |
|---|---|
| doi | https://doi.org/10.5120/21071-3745 |
| ids.doi | https://doi.org/10.5120/21071-3745 |
| ids.mag | 2263682939 |
| ids.openalex | https://openalex.org/W2263682939 |
| fwci | 0.20873662 |
| type | article |
| title | Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network |
| biblio.issue | 6 |
| biblio.volume | 119 |
| biblio.last_page | 18 |
| biblio.first_page | 11 |
| topics[0].id | https://openalex.org/T10388 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9957000017166138 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Advanced Steganography and Watermarking Techniques |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9930999875068665 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T11498 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9922000169754028 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Security in Wireless Sensor Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9084742069244385 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C761482 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6520190238952637 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q118093 |
| concepts[1].display_name | Transmission (telecommunications) |
| concepts[2].id | https://openalex.org/C115961682 |
| concepts[2].level | 2 |
| concepts[2].score | 0.4675430655479431 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[2].display_name | Image (mathematics) |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.46445274353027344 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C24590314 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4436369240283966 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q336038 |
| concepts[4].display_name | Wireless sensor network |
| concepts[5].id | https://openalex.org/C154945302 |
| concepts[5].level | 1 |
| concepts[5].score | 0.35074013471603394 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[5].display_name | Artificial intelligence |
| concepts[6].id | https://openalex.org/C76155785 |
| concepts[6].level | 1 |
| concepts[6].score | 0.32364267110824585 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[6].display_name | Telecommunications |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9084742069244385 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/transmission |
| keywords[1].score | 0.6520190238952637 |
| keywords[1].display_name | Transmission (telecommunications) |
| keywords[2].id | https://openalex.org/keywords/image |
| keywords[2].score | 0.4675430655479431 |
| keywords[2].display_name | Image (mathematics) |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.46445274353027344 |
| keywords[3].display_name | Computer network |
| keywords[4].id | https://openalex.org/keywords/wireless-sensor-network |
| keywords[4].score | 0.4436369240283966 |
| keywords[4].display_name | Wireless sensor network |
| keywords[5].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[5].score | 0.35074013471603394 |
| keywords[5].display_name | Artificial intelligence |
| keywords[6].id | https://openalex.org/keywords/telecommunications |
| keywords[6].score | 0.32364267110824585 |
| keywords[6].display_name | Telecommunications |
| language | en |
| locations[0].id | doi:10.5120/21071-3745 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210206007 |
| locations[0].source.issn | 0975-8887 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0975-8887 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Computer Applications |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.5120/21071-3745 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Computer Applications |
| locations[0].landing_page_url | http://doi.org/10.5120/21071-3745 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5037371592 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Neha Narula |
| authorships[0].countries | IN, KR, YE |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I118692353, https://openalex.org/I88761825 |
| authorships[0].affiliations[0].raw_affiliation_string | University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I72563045 |
| authorships[0].affiliations[1].raw_affiliation_string | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[0].institutions[0].id | https://openalex.org/I72563045 |
| authorships[0].institutions[0].ror | https://ror.org/00kxafy15 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I72563045 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Mody University of Science and Technology |
| authorships[0].institutions[1].id | https://openalex.org/I88761825 |
| authorships[0].institutions[1].ror | https://ror.org/000qzf213 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I88761825 |
| authorships[0].institutions[1].country_code | KR |
| authorships[0].institutions[1].display_name | Korea University of Science and Technology |
| authorships[0].institutions[2].id | https://openalex.org/I118692353 |
| authorships[0].institutions[2].ror | https://ror.org/05bj7sh33 |
| authorships[0].institutions[2].type | education |
| authorships[0].institutions[2].lineage | https://openalex.org/I118692353 |
| authorships[0].institutions[2].country_code | YE |
| authorships[0].institutions[2].display_name | University of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Neha Narula |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan, University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[1].author.id | https://openalex.org/A5085754877 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5545-3408 |
| authorships[1].author.display_name | Deepak Sethi |
| authorships[1].countries | IN, KR, YE |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I72563045 |
| authorships[1].affiliations[0].raw_affiliation_string | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I118692353, https://openalex.org/I88761825 |
| authorships[1].affiliations[1].raw_affiliation_string | University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[1].institutions[0].id | https://openalex.org/I72563045 |
| authorships[1].institutions[0].ror | https://ror.org/00kxafy15 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I72563045 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Mody University of Science and Technology |
| authorships[1].institutions[1].id | https://openalex.org/I88761825 |
| authorships[1].institutions[1].ror | https://ror.org/000qzf213 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I88761825 |
| authorships[1].institutions[1].country_code | KR |
| authorships[1].institutions[1].display_name | Korea University of Science and Technology |
| authorships[1].institutions[2].id | https://openalex.org/I118692353 |
| authorships[1].institutions[2].ror | https://ror.org/05bj7sh33 |
| authorships[1].institutions[2].type | education |
| authorships[1].institutions[2].lineage | https://openalex.org/I118692353 |
| authorships[1].institutions[2].country_code | YE |
| authorships[1].institutions[2].display_name | University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Deepak Sethi |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan, University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[2].author.id | https://openalex.org/A5091129713 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-1982-5227 |
| authorships[2].author.display_name | Prasun Bhattacharya |
| authorships[2].countries | IN, KR, YE |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I72563045 |
| authorships[2].affiliations[0].raw_affiliation_string | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[2].affiliations[1].institution_ids | https://openalex.org/I118692353, https://openalex.org/I88761825 |
| authorships[2].affiliations[1].raw_affiliation_string | University of Science & Technology, Lakshmangarh, Rajasthan |
| authorships[2].institutions[0].id | https://openalex.org/I72563045 |
| authorships[2].institutions[0].ror | https://ror.org/00kxafy15 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I72563045 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Mody University of Science and Technology |
| authorships[2].institutions[1].id | https://openalex.org/I88761825 |
| authorships[2].institutions[1].ror | https://ror.org/000qzf213 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I88761825 |
| authorships[2].institutions[1].country_code | KR |
| authorships[2].institutions[1].display_name | Korea University of Science and Technology |
| authorships[2].institutions[2].id | https://openalex.org/I118692353 |
| authorships[2].institutions[2].ror | https://ror.org/05bj7sh33 |
| authorships[2].institutions[2].type | education |
| authorships[2].institutions[2].lineage | https://openalex.org/I118692353 |
| authorships[2].institutions[2].country_code | YE |
| authorships[2].institutions[2].display_name | University of Science and Technology |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | P.P. Bhattacharya |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Student Mody University of Science & Technology, Lakshmangarh, Rajasthan, University of Science & Technology, Lakshmangarh, Rajasthan |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5120/21071-3745 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10388 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9957000017166138 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Advanced Steganography and Watermarking Techniques |
| related_works | https://openalex.org/W1975451135, https://openalex.org/W2989915292, https://openalex.org/W2890570089, https://openalex.org/W2073793005, https://openalex.org/W3148968234, https://openalex.org/W145760256, https://openalex.org/W2028086369, https://openalex.org/W2141581111, https://openalex.org/W2129477171, https://openalex.org/W2032479448 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2016 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5120/21071-3745 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210206007 |
| best_oa_location.source.issn | 0975-8887 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0975-8887 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Computer Applications |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.5120/21071-3745 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Computer Applications |
| best_oa_location.landing_page_url | http://doi.org/10.5120/21071-3745 |
| primary_location.id | doi:10.5120/21071-3745 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210206007 |
| primary_location.source.issn | 0975-8887 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0975-8887 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Computer Applications |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.5120/21071-3745 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Computer Applications |
| primary_location.landing_page_url | http://doi.org/10.5120/21071-3745 |
| publication_date | 2015-06-18 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W2143761236, https://openalex.org/W2135053460, https://openalex.org/W2077038511, https://openalex.org/W2167036037, https://openalex.org/W2167615713, https://openalex.org/W2103320971, https://openalex.org/W2183080968, https://openalex.org/W2132349848, https://openalex.org/W2136246007, https://openalex.org/W2341365106, https://openalex.org/W1980697662, https://openalex.org/W2322343330, https://openalex.org/W2136069561, https://openalex.org/W4285719527, https://openalex.org/W1515402685, https://openalex.org/W3036628783 |
| referenced_works_count | 16 |
| abstract_inverted_index.a | 20, 61 |
| abstract_inverted_index.as | 44 |
| abstract_inverted_index.be | 36, 66 |
| abstract_inverted_index.by | 110 |
| abstract_inverted_index.in | 13, 19, 32, 103, 128 |
| abstract_inverted_index.is | 60, 101, 120 |
| abstract_inverted_index.of | 6, 22, 41, 72, 106, 131, 153 |
| abstract_inverted_index.or | 51 |
| abstract_inverted_index.to | 38, 91 |
| abstract_inverted_index.DWT | 92 |
| abstract_inverted_index.SVD | 112 |
| abstract_inverted_index.and | 9, 28, 49, 55, 84, 96, 134, 151 |
| abstract_inverted_index.are | 17, 88 |
| abstract_inverted_index.can | 35, 142 |
| abstract_inverted_index.for | 122 |
| abstract_inverted_index.the | 4, 70, 81, 85, 98, 107, 124, 129, 139, 144, 149, 154 |
| abstract_inverted_index.both | 80 |
| abstract_inverted_index.data | 11, 45, 47 |
| abstract_inverted_index.even | 52 |
| abstract_inverted_index.form | 130 |
| abstract_inverted_index.hold | 3 |
| abstract_inverted_index.must | 65 |
| abstract_inverted_index.node | 57 |
| abstract_inverted_index.such | 43 |
| abstract_inverted_index.that | 64, 138 |
| abstract_inverted_index.then | 97 |
| abstract_inverted_index.used | 18, 31 |
| abstract_inverted_index.Value | 114 |
| abstract_inverted_index.data. | 156 |
| abstract_inverted_index.image | 74, 77, 83, 87, 100, 109, 127 |
| abstract_inverted_index.issue | 63 |
| abstract_inverted_index.paper | 68 |
| abstract_inverted_index.these | 33 |
| abstract_inverted_index.types | 40 |
| abstract_inverted_index.using | 75 |
| abstract_inverted_index.Energy | 116 |
| abstract_inverted_index.greedy | 118 |
| abstract_inverted_index.health | 29 |
| abstract_inverted_index.hiding | 78 |
| abstract_inverted_index.saving | 117 |
| abstract_inverted_index.scheme | 141 |
| abstract_inverted_index.secret | 86, 99 |
| abstract_inverted_index.sensor | 1, 56 |
| abstract_inverted_index.values | 105 |
| abstract_inverted_index.DWT-SVD | 76 |
| abstract_inverted_index.Wavelet | 94 |
| abstract_inverted_index.applied | 121 |
| abstract_inverted_index.attacks | 42 |
| abstract_inverted_index.capture | 54 |
| abstract_inverted_index.carrier | 82, 108 |
| abstract_inverted_index.complex | 14 |
| abstract_inverted_index.promise | 5 |
| abstract_inverted_index.protect | 143 |
| abstract_inverted_index.results | 133 |
| abstract_inverted_index.routing | 123 |
| abstract_inverted_index.secured | 73, 126 |
| abstract_inverted_index.variety | 21 |
| abstract_inverted_index.various | 39 |
| abstract_inverted_index.without | 147 |
| abstract_inverted_index.Wireless | 0 |
| abstract_inverted_index.analysis | 136 |
| abstract_inverted_index.applying | 111 |
| abstract_inverted_index.critical | 62 |
| abstract_inverted_index.embedded | 102 |
| abstract_inverted_index.industry | 27 |
| abstract_inverted_index.networks | 2, 16 |
| abstract_inverted_index.ordinary | 155 |
| abstract_inverted_index.physical | 53 |
| abstract_inverted_index.presents | 69 |
| abstract_inverted_index.proposed | 140 |
| abstract_inverted_index.security | 59 |
| abstract_inverted_index.singular | 104 |
| abstract_inverted_index.(Discrete | 93 |
| abstract_inverted_index.(Singular | 113 |
| abstract_inverted_index.according | 90 |
| abstract_inverted_index.affecting | 148 |
| abstract_inverted_index.algorithm | 119 |
| abstract_inverted_index.deletion, | 50 |
| abstract_inverted_index.including | 24 |
| abstract_inverted_index.insertion | 48 |
| abstract_inverted_index.military, | 25 |
| abstract_inverted_index.real-time | 10 |
| abstract_inverted_index.resultant | 125 |
| abstract_inverted_index.sensitive | 145 |
| abstract_inverted_index.usability | 152 |
| abstract_inverted_index.Transform) | 95 |
| abstract_inverted_index.decomposed | 89 |
| abstract_inverted_index.processing | 12 |
| abstract_inverted_index.demonstrate | 137 |
| abstract_inverted_index.information | 146 |
| abstract_inverted_index.large-scale | 8 |
| abstract_inverted_index.performance | 135 |
| abstract_inverted_index.susceptible | 37 |
| abstract_inverted_index.applications | 23, 34 |
| abstract_inverted_index.facilitating | 7 |
| abstract_inverted_index.transmission | 71, 150 |
| abstract_inverted_index.modification, | 46 |
| abstract_inverted_index.resolved.This | 67 |
| abstract_inverted_index.surveillance, | 26 |
| abstract_inverted_index.systems.Sensors | 30 |
| abstract_inverted_index.Decomposition).An | 115 |
| abstract_inverted_index.environments.These | 15 |
| abstract_inverted_index.packets.Experimental | 132 |
| abstract_inverted_index.technique.Initially, | 79 |
| abstract_inverted_index.replacement.Therefore, | 58 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/7 |
| sustainable_development_goals[0].score | 0.8700000047683716 |
| sustainable_development_goals[0].display_name | Affordable and clean energy |
| citation_normalized_percentile.value | 0.62307256 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |