{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:58Z","timestamp":1740123538503,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004733","name":"university of macau","doi-asserted-by":"crossref","award":["MYRG2019-00136-FST","MYRG2018-00246-FST"],"award-info":[{"award-number":["MYRG2019-00136-FST","MYRG2018-00246-FST"]}],"id":[{"id":"10.13039\/501100004733","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04276-4","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T08:03:31Z","timestamp":1642061011000},"page":"8774-8809","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An image classification approach for hole detection in wireless sensor networks"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3459-1385","authenticated-orcid":false,"given":"Se-Hang","family":"Cheong","sequence":"first","affiliation":[]},{"given":"Kim-Hou","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Yain-Whar","family":"Si","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"4276_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi AZ, Islam N, Shaikh ZA et al (2014) A review of wireless sensors and networks\u2019 applications in agriculture. Comput Stand Interfaces 36(2):263\u2013270","DOI":"10.1016\/j.csi.2011.03.004"},{"issue":"2","key":"4276_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1072989.1072992","volume":"9","author":"N Ahmed","year":"2005","unstructured":"Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE Mobile Comput Commun Rev 9(2):4\u201318","journal-title":"ACM SIGMOBILE Mobile Comput Commun Rev"},{"key":"4276_CR3","doi-asserted-by":"crossref","unstructured":"Ahn J, Park J, Park D, Paek J, Ko J (2018) Convolutional neural network-based classification system design with compressed wireless sensor network images. PloS one 13(5)","DOI":"10.1371\/journal.pone.0196251"},{"key":"4276_CR4","doi-asserted-by":"crossref","unstructured":"Al\u00a0Qundus J, Dabbour K, Gupta S, Meissonier R, Paschke A (2020) Wireless sensor network for ai-based flood disaster detection. Annals of Operations Research 1\u201323","DOI":"10.1007\/s10479-020-03754-x"},{"key":"4276_CR5","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.procs.2016.03.089","volume":"79","author":"P Antil","year":"2016","unstructured":"Antil P, Malik A, Kumar S (2016) Neighbor adjacency based hole detection protocol for wireless sensor networks. Procedia Comput Sci 79:866\u2013874","journal-title":"Procedia Comput Sci"},{"key":"4276_CR6","doi-asserted-by":"publisher","first-page":"105461","DOI":"10.1016\/j.compag.2020.105461","volume":"174","author":"ME Bayrakdar","year":"2020","unstructured":"Bayrakdar ME (2020) Enhancing sensor network sustainability with fuzzy logic based node placement approach for agricultural monitoring. Comput Electron Agric 174:105461","journal-title":"Comput Electron Agric"},{"key":"4276_CR7","doi-asserted-by":"crossref","unstructured":"Bi K, Tu K, Gu N, Dong WL, Liu X (2006) Topological hole detection in sensor networks with cooperative neighbors. In: 2006 International Conference on Systems and Networks Communications (ICSNC\u201906), pp. 31\u201331. IEEE","DOI":"10.1109\/ICSNC.2006.71"},{"issue":"1","key":"4276_CR8","first-page":"1","volume":"13","author":"SH Cheong","year":"2016","unstructured":"Cheong SH, Si YW (2016) Accelerating the kamada-kawai algorithm for boundary detection in a mobile ad hoc network. ACM Trans Sensor Netw (TOSN) 13(1):1\u201329","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"1","key":"4276_CR9","first-page":"1","volume":"14","author":"SH Cheong","year":"2017","unstructured":"Cheong SH, Si YW (2017) Boundary node detection and unfolding of complex non-convex ad hoc networks. ACM Trans Sensor Netw (TOSN) 14(1):1\u201334","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"1","key":"4276_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1177\/1473871618821740","volume":"19","author":"SH Cheong","year":"2020","unstructured":"Cheong SH, Si YW (2020) Force-directed algorithms for schematic drawings and placement: a survey. Inf Vis 19(1):65\u201391","journal-title":"Inf Vis"},{"key":"4276_CR11","doi-asserted-by":"crossref","unstructured":"Das S, DebBarma MK (2018) Hole detection in wireless sensor network: A review. In: Recent Findings in Intelligent Computing Techniques, pp. 87\u201396. Springer","DOI":"10.1007\/978-981-10-8636-6_10"},{"key":"4276_CR12","doi-asserted-by":"crossref","unstructured":"Das S, Debbarma MK (2021) A comparative study on coverage-hole detection improvement with inner empty circle over delaunay triangulation method in wireless sensor networks. In: Communication Software and Networks, pp. 553\u2013561. Springer","DOI":"10.1007\/978-981-15-5397-4_56"},{"issue":"4","key":"4276_CR13","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1145\/234535.234538","volume":"15","author":"R Davidson","year":"1996","unstructured":"Davidson R, Harel D (1996) Drawing graphs nicely using simulated annealing. ACM Trans Gr (TOG) 15(4):301\u2013331","journal-title":"ACM Trans Gr (TOG)"},{"issue":"1","key":"4276_CR14","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/BF01594945","volume":"50","author":"A Dekkers","year":"1991","unstructured":"Dekkers A, Aarts E (1991) Global optimization and simulated annealing. Math Progr 50(1):367\u2013393","journal-title":"Math Progr"},{"key":"4276_CR15","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) Imagenet: A large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp. 248\u2013255. Ieee","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2","key":"4276_CR16","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11036-006-4471-y","volume":"11","author":"Q Fang","year":"2006","unstructured":"Fang Q, Gao J, Guibas LJ (2006) Locating and bypassing holes in sensor networks. Mobile Netw Appli 11(2):187\u2013200","journal-title":"Mobile Netw Appli"},{"issue":"11","key":"4276_CR17","first-page":"1129","volume":"21","author":"TM Fruchterman","year":"1991","unstructured":"Fruchterman TM, Reingold EM (1991) Graph drawing by force-directed placement. Softw: Pract Exp 21(11):1129\u20131164","journal-title":"Softw: Pract Exp"},{"key":"4276_CR18","doi-asserted-by":"crossref","unstructured":"Funke S (2005) Topological hole detection in wireless sensor networks and its applications. In: Proceedings of the 2005 joint workshop on Foundations of mobile computing, pp. 44\u201353","DOI":"10.1145\/1080810.1080819"},{"key":"4276_CR19","doi-asserted-by":"publisher","first-page":"102082","DOI":"10.1016\/j.adhoc.2020.102082","volume":"101","author":"F Hajjej","year":"2020","unstructured":"Hajjej F, Hamdi M, Ejbali R, Zaied M (2020) A distributed coverage hole recovery approach based on reinforcement learning for wireless sensor networks. Ad Hoc Netw 101:102082","journal-title":"Ad Hoc Netw"},{"key":"4276_CR20","doi-asserted-by":"crossref","unstructured":"Jacomy M, Venturini T, Heymann S, Bastian M (2014) Forceatlas2, a continuous graph layout algorithm for handy network visualization designed for the gephi software. PloS one 9(6)","DOI":"10.1371\/journal.pone.0098679"},{"key":"4276_CR21","first-page":"100428","volume":"30","author":"B Khalifa","year":"2021","unstructured":"Khalifa B, Al Aghbari Z, Khedr AM (2021) A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustain Comput: Infor Syst 30:100428","journal-title":"Sustain Comput: Infor Syst"},{"issue":"4598","key":"4276_CR22","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671\u2013680","journal-title":"Science"},{"key":"4276_CR23","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097\u20131105","journal-title":"Adv Neural Inf Process Syst"},{"key":"4276_CR24","doi-asserted-by":"crossref","unstructured":"Lai YH, Cheong SH, Zhang H, Si YW (2021) Coverage hole detection in wsn with force-directed algorithm and transfer learning. Appl Intell pp. 1\u201322","DOI":"10.1007\/s10489-021-02714-7"},{"issue":"5","key":"4276_CR25","doi-asserted-by":"publisher","first-page":"2486","DOI":"10.1109\/TGRS.2016.2645610","volume":"55","author":"Y Long","year":"2017","unstructured":"Long Y, Gong Y, Xiao Z, Liu Q (2017) Accurate object localization in remote sensing images based on convolutional neural networks. IEEE Trans Geosci Remote Sens 55(5):2486\u20132498","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"4276_CR26","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2018.12.024","volume":"95","author":"J Lu","year":"2019","unstructured":"Lu J, Feng L, Yang J, Hassan MM, Alelaiwi A, Humar I (2019) Artificial agent: the fusion of artificial intelligence and a mobile agent for energy-efficient traffic control in wireless sensor networks. Futur Gener Comput Syst 95:45\u201351","journal-title":"Futur Gener Comput Syst"},{"key":"4276_CR27","doi-asserted-by":"publisher","first-page":"102694","DOI":"10.1016\/j.adhoc.2021.102694","volume":"123","author":"C Luo","year":"2021","unstructured":"Luo C, Wang B, Cao Y, Xin G, He C, Ma L (2021) A hybrid coverage control for enhancing uwsn localizability using ibso-vfa. Ad Hoc Netw 123:102694","journal-title":"Ad Hoc Netw"},{"key":"4276_CR28","doi-asserted-by":"crossref","unstructured":"Maturana D, Scherer S (2015) Voxnet: A 3d convolutional neural network for real-time object recognition. In: 2015 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp 922\u2013928. IEEE","DOI":"10.1109\/IROS.2015.7353481"},{"key":"4276_CR29","doi-asserted-by":"crossref","unstructured":"Meena N, Singh B (2020) Analysis of coverage hole problem in wireless sensor networks. In: Smart Systems and IoT: Innovations in Computing, pp. 187\u2013196. Springer","DOI":"10.1007\/978-981-13-8406-6_19"},{"key":"4276_CR30","first-page":"100377","volume":"25","author":"M Naghibi","year":"2020","unstructured":"Naghibi M, Barati H (2020) Egrpm: energy efficient geographic routing protocol based on mobile sink in wireless sensor networks. Sustain Comput: Infor Syst 25:100377","journal-title":"Sustain Comput: Infor Syst"},{"issue":"2","key":"4276_CR31","doi-asserted-by":"publisher","first-page":"453","DOI":"10.7155\/jgaa.00154","volume":"11","author":"A Noack","year":"2007","unstructured":"Noack A (2007) Energy models for graph clustering. J Graph Algorithms Appl 11(2):453\u2013480","journal-title":"J Graph Algorithms Appl"},{"key":"4276_CR32","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.cose.2017.06.009","volume":"70","author":"A Oracevic","year":"2017","unstructured":"Oracevic A, Akbas S, Ozdemir S (2017) Secure and reliable object tracking in wireless sensor networks. Comput Secur 70:307\u2013318","journal-title":"Comput Secur"},{"key":"4276_CR33","unstructured":"Patterson J, Gibson A (2017) Deep learning: A practitioner\u2019s approach. O\u2019Reilly Media, Inc"},{"issue":"6","key":"4276_CR34","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1007\/s12083-020-00945-y","volume":"13","author":"A Prasanth","year":"2020","unstructured":"Prasanth A, Jayachitra S (2020) A novel multi-objective optimization strategy for enhancing quality of service in iot-enabled wsn applications. Peer-to-Peer Netw Appl 13(6):1905\u20131920","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4276_CR35","doi-asserted-by":"crossref","unstructured":"Priyadarshi R, Gupta B, Anurag A (2020) Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues. The Journal of Supercomputing pp 1\u201341","DOI":"10.1007\/s11227-020-03166-5"},{"issue":"1","key":"4276_CR36","first-page":"40","volume":"21","author":"S Ramazani","year":"2016","unstructured":"Ramazani S, Kanno J, Selmic RR, Brust MR (2016) Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks. Int J Sens Netw 21(1):40\u201352","journal-title":"Int J Sens Netw"},{"key":"4276_CR37","unstructured":"Redmon J, Farhadi A (2018) Yolov3: An incremental improvement. arXiv"},{"issue":"4","key":"4276_CR38","doi-asserted-by":"publisher","first-page":"2291","DOI":"10.1007\/s11277-018-6040-7","volume":"106","author":"Au Rehman","year":"2019","unstructured":"Rehman Au, Rehman SU, Raheem H (2019) Sinkhole attacks in wireless sensor networks: a survey. Wirel Pers Commun 106(4):2291\u20132313","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"4276_CR39","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11277-014-2094-3","volume":"80","author":"A Sangwan","year":"2015","unstructured":"Sangwan A, Singh RP (2015) Survey on coverage problems in wireless sensor networks. Wirel Pers Commun 80(4):1475\u20131500","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"4276_CR40","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TPDS.2013.137","volume":"25","author":"MR Senouci","year":"2013","unstructured":"Senouci MR, Mellouk A, Assnoune K (2013) Localized movement-assisted sensordeployment algorithm for holedetection and healing. IEEE Trans Parallel Distrib Syst 25(5):1267\u20131277","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4276_CR41","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.compeleceng.2017.01.005","volume":"60","author":"C Tong","year":"2017","unstructured":"Tong C, Li J, Zhu F (2017) A convolutional neural network based method for event classification in event-driven multi-sensor network. Comput Electr Eng 60:90\u201399","journal-title":"Comput Electr Eng"},{"key":"4276_CR42","doi-asserted-by":"crossref","unstructured":"Tossa F, Abdou W, Ezin EC, Gouton P (2020) Improving coverage area in sensor deployment using genetic algorithm. In: International Conference on Computational Science, pp 398\u2013408. Springer","DOI":"10.1007\/978-3-030-50426-7_30"},{"issue":"2","key":"4276_CR43","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s11036-019-01301-y","volume":"25","author":"F Yan","year":"2020","unstructured":"Yan F, Ma W, Shen F, Xia W, Shen L (2020) Connectivity based k-coverage hole detection in wireless sensor networks. Mobile Netw Appl 25(2):783\u2013793","journal-title":"Mobile Netw Appl"},{"key":"4276_CR44","doi-asserted-by":"crossref","unstructured":"Yang J (2021) An ellipse-guided routing algorithm in wireless sensor networks. Digital Commun Netw","DOI":"10.1016\/j.dcan.2021.08.005"},{"key":"4276_CR45","doi-asserted-by":"publisher","first-page":"18665","DOI":"10.1109\/ACCESS.2017.2754269","volume":"5","author":"L Yi","year":"2017","unstructured":"Yi L, Deng X, Wang M, Ding D, Wang Y (2017) Localized confident information coverage hole detection in internet of things for radioactive pollution monitoring. IEEE Access 5:18665\u201318674","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04276-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04276-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04276-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T14:14:38Z","timestamp":1648822478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04276-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4276"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04276-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,1,13]]},"assertion":[{"value":"21 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}