{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:17:37Z","timestamp":1743074257155,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031440830"},{"type":"electronic","value":"9783031440847"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44084-7_18","type":"book-chapter","created":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:02:09Z","timestamp":1695459729000},"page":"185-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis of Data Backup and Network Consistency in Cluster-Base Wireless Sensor Network Protocols"],"prefix":"10.1007","author":[{"given":"Mujahid","family":"Tabassum","sequence":"first","affiliation":[]},{"given":"Tripti","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Saju","family":"Mohanan","sequence":"additional","affiliation":[]},{"given":"Isah A.","family":"Lawal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"key":"18_CR1","unstructured":"Angelin, T. S., Kiruthika, R.: Hybrid energy-efficient distributed clustering approach for WSN using linear data acquisition algorithm (2019)"},{"key":"18_CR2","first-page":"1","volume":"6","author":"S Aiswariya","year":"2018","unstructured":"Aiswariya, S., Rani, V.J., Suseela, S.: Challenges, technologies and components of wireless sensor networks. Int. J. Eng. Res. Technol. (IJERT) 6, 1\u20135 (2018)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"key":"18_CR3","first-page":"120","volume":"23","author":"GM Borkar","year":"2019","unstructured":"Borkar, G.M., Patil, L.H., Dalgade, D., Hutke, A.: A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain. Comput.: Inform. Syst. 23, 120\u2013135 (2019)","journal-title":"Sustain. Comput.: Inform. Syst."},{"key":"18_CR4","unstructured":"Bhattacharya, M.: A survey on importance of routing protocol in WSN. Journal of Contemporary Issues in Business and Government, vol. 26(02). (2020)"},{"issue":"6","key":"18_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5078","volume":"35","author":"M Choudhary","year":"2022","unstructured":"Choudhary, M., Goyal, N.: A rendezvous point-based data gathering in underwater wireless sensor networks for monitoring applications. Int. J. Commu. Syst. 35(6), e5078 (2022)","journal-title":"Int. J. Commu. Syst."},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.jnca.2019.04.021","volume":"142","author":"F Fanian","year":"2019","unstructured":"Fanian, F., Rafsanjani, M.K.: Cluster-based routing protocols in wireless sensor networks: a survey based on methodology. J. Netw. Comput. Appl. 142, 111\u2013142 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2021.100775","volume":"27","author":"RK Garg","year":"2021","unstructured":"Garg, R.K., Bhola, J., Soni, S.K.: Healthcare monitoring of mountaineers by low power wireless sensor networks. Inform. Med. Unlocked 27, 100775 (2021)","journal-title":"Inform. Med. Unlocked"},{"issue":"10","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.3390\/electronics11101609","volume":"11","author":"S Gnanavel","year":"2022","unstructured":"Gnanavel, S., et al.: Analysis of fault classifiers to detect the faults and node failures in a wireless sensor network. Electronics 11(10), 1609 (2022)","journal-title":"Electronics"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1007\/s12083-019-00806-3","volume":"13","author":"T Gobinath","year":"2020","unstructured":"Gobinath, T., Tamilarasi, A.: RFDCAR: robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. Peer-to-Peer Netw. Appl. 13, 2053\u20132064 (2020)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"5287","DOI":"10.1007\/s12652-020-02007-w","volume":"12","author":"M Hema Kumar","year":"2021","unstructured":"Hema Kumar, M., Mohanraj, V., Suresh, Y., Senthilkumar, J., Nagalalli, G.: Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN. J. Ambient. Intell. Humaniz. Comput. 12, 5287\u20135295 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"1","key":"18_CR11","first-page":"1079","volume":"6","author":"DS Ibrahim","year":"2021","unstructured":"Ibrahim, D.S., Mahdi, A.F., Yas, Q.M.: Challenges and issues for wireless sensor networks: a survey. J. Glob. Sci. Res. 6(1), 1079\u20131097 (2021)","journal-title":"J. Glob. Sci. Res."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/B978-0-12-821247-9.00013-5","volume-title":"Compressive Sensing in Healthcare","author":"K Keerthana","year":"2020","unstructured":"Keerthana, K., Aasha Nandhini, S., Radha, S.: Cyber physical systems for healthcare applications using compressive sensing. In: Compressive Sensing in Healthcare, pp. 145\u2013164. Elsevier (2020). https:\/\/doi.org\/10.1016\/B978-0-12-821247-9.00013-5"},{"key":"18_CR13","unstructured":"Telecomworld: Introduction to Data Communication, Telecomworld. http:\/\/www.telecomworld101.com\/Intro2dcRev2\/page26.html. Accessed 01 June 2022"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3390\/agronomy12010127","volume":"12","author":"A Rehman","year":"2022","unstructured":"Rehman, A., et al.: A revisit of internet of things technologies for monitoring and control strategies in smart agriculture. Agronomy 12(1), 127 (2022)","journal-title":"Agronomy"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Sharma, N., Kaushik, I., Agarwal, V. K., Bhushan, B., Khamparia, A.: Attacks and security measures in wireless sensor network. In: Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and Applications, pp. 237\u2013268. (2021)","DOI":"10.1002\/9781119711629.ch12"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Suma, S., Harsoor, B.: Detection of malicious activity for mobile nodes to avoid congestion in Wireless Sensor Network. In: 2022 IEEE fourth international conference on advances in electronics, computers and communications (ICAECC), pp. 1\u20136. IEEE (2022, January)","DOI":"10.1109\/ICAECC54045.2022.9716673"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"4011","DOI":"10.1007\/s11276-020-02299-y","volume":"26","author":"DK Shende","year":"2020","unstructured":"Shende, D.K., Sonavane, S.S.: CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Netw. 26, 4011\u20134029 (2020)","journal-title":"Wireless Netw."},{"key":"18_CR18","unstructured":"Tabassum, M., Zen, K.: Evaluation and improvement of data availability in WSNs cluster base routing protocol. J. Telecommun., Electron. Comput. Eng. 9(2\u20139), 111\u2013116 (2017)"},{"issue":"5","key":"18_CR19","first-page":"1857","volume":"34","author":"A Vinitha","year":"2022","unstructured":"Vinitha, A., Rukmini, M.S.S.: Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. J. King Saud Univ.-Comput. Inform. Sci. 34(5), 1857\u20131868 (2022)","journal-title":"J. King Saud Univ.-Comput. Inform. Sci."},{"key":"18_CR20","first-page":"1","volume":"2022","author":"X Xu","year":"2022","unstructured":"Xu, X., Tang, J., Xiang, H.: Data transmission reliability analysis of wireless sensor networks for social network optimization. J. Sens. 2022, 1\u201312 (2022)","journal-title":"J. Sens."},{"issue":"9","key":"18_CR21","doi-asserted-by":"publisher","first-page":"155014771987938","DOI":"10.1177\/1550147719879384","volume":"15","author":"F Zhu","year":"2019","unstructured":"Zhu, F., Wei, J.: An energy-efficient unequal clustering routing protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw. 15(9), 1550147719879384 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.1007\/s11277-020-07170-z","volume":"112","author":"Z Ullah","year":"2020","unstructured":"Ullah, Z.: A survey on hybrid, energy efficient and distributed (HEED) based energy efficient clustering protocols for wireless sensor networks. Wireless Pers. Commun. 112(4), 2685\u20132713 (2020)","journal-title":"Wireless Pers. Commun."}],"container-title":["Lecture Notes in Computer Science","Mining Intelligence and Knowledge Exploration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44084-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:04:40Z","timestamp":1695459880000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44084-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031440830","9783031440847"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44084-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mining Intelligence and Knowledge Exploration","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kristiansand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mike2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mike.org.in\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}