{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:56:55Z","timestamp":1777546615754,"version":"3.51.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Special Funds of Applied Science & Technology Research and Development of Guangdong Province, China","award":["2015B010128015"],"award-info":[{"award-number":["2015B010128015"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-017-5225-9","type":"journal-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T03:58:36Z","timestamp":1515988716000},"page":"1657-1667","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Failure Detection Method of WSN Based on PCA-BDA and Fuzzy Neural Network"],"prefix":"10.1007","volume":"102","author":[{"given":"Bing","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiaoping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liqun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"issue":"4","key":"5225_CR1","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3724\/SP.J.1006.2015.00743","volume":"43","author":"R Hu","year":"2015","unstructured":"Hu, R., Dong, X., & Wang, D. (2015). Defense mechanism against node replication attacks and sybil attacks in wireless sensor networks. Acta Electronica Sinica, 43(4), 743\u2013752.","journal-title":"Acta Electronica Sinica"},{"issue":"8","key":"5225_CR2","first-page":"1829","volume":"40","author":"H Fei","year":"2017","unstructured":"Fei, H., Xiao, F., & Li, G. (2017). An anomaly detection method of wireless sensor network based on multi-modals sata stream. Chinese Journal of Computers, 40(8), 1829\u20131842.","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"5225_CR3","first-page":"173","volume":"51","author":"Y Li","year":"2014","unstructured":"Li, Y., Jia, Z., & Xie, S. (2014). Partial dynamic reconfigurable WSN node with power and area efficiency. Journal of Computer Research and Development, 51(1), 173\u2013179.","journal-title":"Journal of Computer Research and Development"},{"issue":"9","key":"5225_CR4","first-page":"2011","volume":"54","author":"F Chang","year":"2017","unstructured":"Chang, F., Cui, J., & Wang, L. (2017). A traceable and anonymous authentication scheme based on elliptic curve for wireless sensor network. Journal of Computer Research and Development., 54(9), 2011\u20132020.","journal-title":"Journal of Computer Research and Development."},{"issue":"5","key":"5225_CR5","first-page":"1079","volume":"33","author":"G Wang","year":"2012","unstructured":"Wang, G., Zeng, P., & Xiao, J. (2012). Link quality realtime evaluation algorithm oriented to industry wireless sensor network. Journal of Chinese Computer System, 33(5), 1079\u20131082.","journal-title":"Journal of Chinese Computer System"},{"issue":"6","key":"5225_CR6","first-page":"867","volume":"28","author":"Y Chen","year":"2013","unstructured":"Chen, Y., Wu, K., & Li, X. (2013). A kind of outlier mining algorithm based on information entropy. Control and Decision, 28(6), 867\u2013872.","journal-title":"Control and Decision"},{"issue":"8","key":"5225_CR7","first-page":"3429","volume":"60","author":"D He","year":"2013","unstructured":"He, D., Li, R., & Zhu, J. (2013). Plastic bearing fault diagnosis based on a two-step data mining approach. IEEE Transactions on Industrial Electronics, 60(8), 3429\u20133440.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"12","key":"5225_CR8","first-page":"3936","volume":"23","author":"W Zhao","year":"2015","unstructured":"Zhao, W., Zhang, Q., Kuang, C., et al. (2015). Optimal design for diagnosis strategy based on multi-valued test. Computer Measurement & Control, 23(12), 3936\u20133939.","journal-title":"Computer Measurement & Control"},{"issue":"7","key":"5225_CR9","first-page":"232","volume":"40","author":"Q Lu","year":"2013","unstructured":"Lu, Q., & Chu, Y. (2013). Fault data optimization mining algorithm based on theory of prediction decision homomorphism. Computer Science, 40(7), 232\u2013235.","journal-title":"Computer Science"},{"issue":"6","key":"5225_CR10","first-page":"1132","volume":"31","author":"X Qiu","year":"2016","unstructured":"Qiu, X., & Libo, L. (2016). Sequential fault diagnosis with isolation rate requirement using different evolution algorithm. Journal of Data Acquisition and Processing, 31(6), 1132\u20131140.","journal-title":"Journal of Data Acquisition and Processing"},{"issue":"1","key":"5225_CR11","first-page":"128","volume":"34","author":"Y Yang","year":"2017","unstructured":"Yang, Y., & Qiu, W. (2017). Fuzzy session association rule mining algorithm based on time decay model. Application Research of Computers, 34(1), 128\u2013131.","journal-title":"Application Research of Computers"},{"issue":"2","key":"5225_CR12","first-page":"276","volume":"24","author":"L Houyan","year":"2017","unstructured":"Houyan, L. (2017). A fuzzy association rule mining algorithm based on master\u2013slave architecture and GA. Control Engineering of China, 24(2), 276\u2013282.","journal-title":"Control Engineering of China"},{"key":"5225_CR13","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.asoc.2017.04.009","volume":"57","author":"J Chen","year":"2017","unstructured":"Chen, J., Lin, X., Zheng, H., et al. (2017). A novel cluster center fast determination clustering algorithm. Applied Soft Computing, 57, 539\u2013555.","journal-title":"Applied Soft Computing"},{"issue":"2","key":"5225_CR14","first-page":"254","volume":"28","author":"Y Yang","year":"2016","unstructured":"Yang, Y. (2016). Improved K-means dynamic clustering algorithm based on information entropy. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 28(2), 254\u2013259.","journal-title":"Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)"},{"issue":"4","key":"5225_CR15","first-page":"427","volume":"45","author":"H Zheng","year":"2017","unstructured":"Zheng, H., & Chenken, P. (2017). An incremental dynamic clustering method based on the representative points and the density peaks. Journal of ZheJiang University of Technology, 45(4), 427\u2013433.","journal-title":"Journal of ZheJiang University of Technology"},{"issue":"2","key":"5225_CR16","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.automatica.2013.11.038","volume":"50","author":"CE Souza de","year":"2014","unstructured":"de Souza, C. E., & Coutinho, D. (2014). Robust stability and control of uncertain linear discrete-time periodic systems with time-delay. Automatica, 50(2), 431\u2013441.","journal-title":"Automatica"},{"issue":"5","key":"5225_CR17","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1016\/j.ijar.2014.02.005","volume":"55","author":"B Ricks","year":"2014","unstructured":"Ricks, B., & Mengshoel, O. J. (2014). Diagnosis for uncertain dynamic and hybrid domains using Bayesian networks and arithmetic circuits. International Journal of Approximate Reasoning, 55(5), 1207\u20131234.","journal-title":"International Journal of Approximate Reasoning"},{"issue":"8","key":"5225_CR18","first-page":"794","volume":"26","author":"R Hu","year":"2013","unstructured":"Hu, R., Xu, W., & Gan, L. (2013). Incremental sequential learning for fuzzy neural networks. PR&AI, 26(8), 794\u2013800.","journal-title":"PR&AI"},{"issue":"4","key":"5225_CR19","first-page":"975","volume":"39","author":"Y Guo","year":"2011","unstructured":"Guo, Y., & Wang, L. (2011). A hybrid wavelet neural network blind equalization algorithm based on fuzzy controlling. Acta Electronica Sinica, 39(4), 975\u2013980.","journal-title":"Acta Electronica Sinica"},{"issue":"2","key":"5225_CR20","first-page":"133","volume":"30","author":"J Sheng","year":"2013","unstructured":"Sheng, J., Qi, B., Yang, Z., et al. (2013). Access selection algorithm for heterogeneous wireless networks based on rough set and analytic hierarchy process. Computer Application and Software, 30(2), 133\u2013140.","journal-title":"Computer Application and Software"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5225-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5225-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5225-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T20:34:47Z","timestamp":1547498087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5225-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5225"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5225-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"15 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}