{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T03:46:28Z","timestamp":1709264788879},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10586-022-03857-z","type":"journal-article","created":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T10:04:55Z","timestamp":1672135495000},"page":"177-197","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Single-tag and multi-tag RFID data cleaning approach in edge computing"],"prefix":"10.1007","volume":"27","author":[{"given":"Chunlin","family":"Li","sequence":"first","affiliation":[]},{"given":"Kun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xinyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Libin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Youlong","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,27]]},"reference":[{"key":"3857_CR1","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/JRFID.2021.3114104","volume":"6","author":"SR Patre","year":"2022","unstructured":"Patre, S.R.: Passive Chipless RFID sensors: concept to applications\u2014a review. IEEE J. Radio Freq. Identif 6, 64\u201376 (2022). https:\/\/doi.org\/10.1109\/JRFID.2021.3114104","journal-title":"IEEE J. Radio Freq. Identif"},{"key":"3857_CR2","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jpdc.2022.01.020","volume":"163","author":"C Li","year":"2022","unstructured":"Li, C., Zhang, Y., Luo, Y.: Intermediate data placement and cache replacement strategy under Spark platform. J. Parallel Distrib. Comput. 163, 114\u2013135 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"3857_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3224395","author":"C Li","year":"2022","unstructured":"Li, C., Zhang, Y., Luo, Y.: A federated learning-based edge caching approach for mobile edge computing-enabled intelligent connected vehicles. IEEE Trans. Intell. Transp. Syst. (2022). https:\/\/doi.org\/10.1109\/TITS.2022.3224395","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"3857_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, C., Bai, J., Luo, Y., Lv, H., Lv, Z.: Security in IoT-enabled digital twins of maritime transportation systems. In: IEEE Transactions on Intelligent Transportation Systems (2021)","DOI":"10.1109\/TITS.2021.3122566"},{"key":"3857_CR5","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhang, L., Li, C., Bai, J., Lv, H., Lv, Z.: Blockchain-based secure communication of intelligent transportation digital twins system. In: IEEE Transactions on Intelligent Transportation Systems (2022)","DOI":"10.1109\/TITS.2022.3183379"},{"issue":"14","key":"3857_CR6","doi-asserted-by":"publisher","first-page":"11666","DOI":"10.1109\/JIOT.2021.3058640","volume":"8","author":"D Xia","year":"2021","unstructured":"Xia, D., Zheng, L., Chen, L., Liu, W., Sun, D.: DR-TSP: a data repairing framework for time synchronization problems in ERI data. IEEE Internet Things J. 8(14), 11666\u201311677 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3058640","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"3857_CR7","first-page":"175","volume":"18","author":"Y Fei","year":"2021","unstructured":"Fei, Y.: Multi-tag cleaning software for cyclic redundant data stream based on RFID in cloud computing. Int. J. Inf. Commun. Technol. 18(2), 175 (2021)","journal-title":"Int. J. Inf. Commun. Technol."},{"issue":"20","key":"3857_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109083","volume":"212","author":"C Li","year":"2022","unstructured":"Li, C., Zhang, Y., Luo, Y.: Flexible heterogeneous data fusion strategy for object positioning applications in edge computing environment. Comput. Netw. 212(20), 109083 (2022)","journal-title":"Comput. Netw."},{"key":"3857_CR9","unstructured":"Jeffery, S.R., Alonso, G., Franklin, M.J.: Adaptive cleaning for RFID data streams. In: The 32nd International Conference on Very Large Data Bases, VLDB Endowment, pp. 163\u2013174 (2006)."},{"issue":"2","key":"3857_CR10","doi-asserted-by":"publisher","first-page":"3840","DOI":"10.1109\/JIOT.2019.2892000","volume":"6","author":"YL Zhang","year":"2019","unstructured":"Zhang, Y.L., Chen, S.G., Zhou, Y., et al.: Monitoring bodily oscillation with RFID tags. IEEE Internet Things J. 6(2), 3840\u20133854 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"3857_CR11","first-page":"11","volume":"10","author":"H Xu","year":"2017","unstructured":"Xu, H., Shen, W.W., Li, P., et al.: VSMURF: a novel sliding window cleaning algorithm for RFID networks. J. Sens. 10(11), 11\u201317 (2017)","journal-title":"J. Sens."},{"key":"3857_CR12","doi-asserted-by":"publisher","first-page":"111065","DOI":"10.1109\/ACCESS.2019.2933462","volume":"7","author":"FM Deng","year":"2019","unstructured":"Deng, F.M., Zuo, P.Q., Wen, K.Y., et al.: Low delay technology research of transmission line tower monitoring network integrating WSN and RFID. IEEE Access 7, 111065\u2013111073 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"3857_CR13","first-page":"79","volume":"21","author":"S Wang","year":"2022","unstructured":"Wang, S.: RFID data cleaning method in heterogeneous space based on linear probabilistic motion state mode. Int. J. Inf. Commun. Technol. 21(1), 79\u201392 (2022)","journal-title":"Int. J. Inf. Commun. Technol."},{"key":"3857_CR14","doi-asserted-by":"publisher","first-page":"2793","DOI":"10.1007\/s10586-021-03445-7","volume":"25","author":"C Bachechi","year":"2022","unstructured":"Bachechi, C., Rollo, F., Po, L.: Detection and classification of sensor anomalies for simulating urban traffic scenarios. Cluster Comput 25, 2793\u20132817 (2022). https:\/\/doi.org\/10.1007\/s10586-021-03445-7","journal-title":"Cluster Comput"},{"key":"3857_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03472-4","author":"RF Mansour","year":"2021","unstructured":"Mansour, R.F., Abdel-Khalek, S., Hilali-Jaghdam, I., et al.: An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing. Cluster Comput (2021). https:\/\/doi.org\/10.1007\/s10586-021-03472-4","journal-title":"Cluster Comput"},{"key":"3857_CR16","doi-asserted-by":"publisher","first-page":"36207","DOI":"10.1109\/ACCESS.2019.2900739","volume":"7","author":"Z Huang","year":"2019","unstructured":"Huang, Z., Xu, R., Chu, C., et al.: A novel cross layer anti-collision algorithm for slotted ALOHA-based UHF RFID systems. IEEE Access 7, 36207\u201336217 (2019)","journal-title":"IEEE Access"},{"key":"3857_CR17","doi-asserted-by":"crossref","unstructured":"Zahran, E.G., Arafa, A.A., Saleh, H.I., et al.: Enhanced ALOHA-based anti-collision algorithm for efficiency RFID tags identification. In: Novel Intelligent and Leading Emerging Sciences Conference (MILES), pp. 59\u201362 (2019).","DOI":"10.1109\/NILES.2019.8909297"},{"key":"3857_CR18","doi-asserted-by":"publisher","first-page":"45860","DOI":"10.1109\/ACCESS.2018.2863565","volume":"6","author":"B Zhi","year":"2018","unstructured":"Zhi, B., Sainan, W., Yigang, H.: A novel anti-collision algorithm in RFID for Internet of Things. IEEE Access 6, 45860\u201345874 (2018)","journal-title":"IEEE Access"},{"key":"3857_CR19","doi-asserted-by":"crossref","unstructured":"Qin, H., Chen, W., Chen, W., Li, N., Zeng, M., Peng, Y.: A collision-aware mobile tag reading algorithm for RFID-based vehicle localization. In: Computer Networks, vol. 199, p. 108422. (2021)","DOI":"10.1016\/j.comnet.2021.108422"},{"key":"3857_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jpdc.2022.03.001","volume":"166","author":"C Li","year":"2022","unstructured":"Li, C., Zhang, Y., Gao, X., Luo, Y.: Energy-latency tradeoffs for edge caching and dynamic service migration based on DQN in mobile edge computing. J. Parallel Distrib. Comput. 166, 15\u201331 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"3857_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116252","volume":"191","author":"C Li","year":"2022","unstructured":"Li, C., Cai, Q., Youlong, L.: Low-latency edge cooperation caching based on base station cooperation in SDN based MEC. Expert Syst. Appl. 191, 116252 (2022)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"3857_CR22","first-page":"157","volume":"4","author":"Neha RFID Data Dhama Meghna Sharma","year":"2013","unstructured":"Neha RFID Data Dhama Meghna Sharma: An improved algorithm for reducing false and duplicate readings in stream based on an adaptive data cleaning scheme. Int. J. Comput. Trends Technol. 4(4), 157\u2013164 (2013)","journal-title":"Int. J. Comput. Trends Technol."},{"key":"3857_CR23","doi-asserted-by":"publisher","unstructured":"Meng, L., Yu, F.: RFID data cleaning based on adaptive window. In: 2010 2nd International Conference on Future Computer and Communication, 2010, pp. V1\u2013746-V1-749. https:\/\/doi.org\/10.1109\/ICFCC.2010.5497331.","DOI":"10.1109\/ICFCC.2010.5497331"},{"issue":"9","key":"3857_CR24","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1049\/iet-com.2018.5506","volume":"13","author":"HPA Ferreira","year":"2019","unstructured":"Ferreira, H.P.A., Assis, F.M., Serres, A.R.: Novel RFID method for faster convergence of tag estimation on dynamic frame size ALOHA algorithms. IET Commun. 13(9), 1218\u20131224 (2019)","journal-title":"IET Commun."},{"issue":"4","key":"3857_CR25","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/JIOT.2017.2699976","volume":"4","author":"BS Ciftler","year":"2017","unstructured":"Ciftler, B.S., Kadri, A., Guvenc, I.: IoT localization for bistatic passive UHF RFID systems with 3-D radiation pattern. IEEE Internet Things J. 4(4), 905\u2013916 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3857_CR26","unstructured":"Quan, C., Mo, H.S., Lee, D.H., et al.: Method for estimating number of tags in slotted aloha-based RFID system: US 7675103 B2.2010."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03857-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03857-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03857-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T19:24:43Z","timestamp":1709061883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03857-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,27]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["3857"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03857-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,27]]},"assertion":[{"value":"7 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}