{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:54:33Z","timestamp":1773964473860,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Henan Science and Technology Research Project: Research on Intelligent Family Health Service System Based on Mobile Internet Technology","award":["172102210118"],"award-info":[{"award-number":["172102210118"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08097-9","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T20:04:16Z","timestamp":1611086656000},"page":"141-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Symmetric Algorithm for Detection of Coverage Hole in Wireless Sensor Network"],"prefix":"10.1007","volume":"127","author":[{"given":"Feifei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"issue":"4","key":"8097_CR1","first-page":"1","volume":"32","author":"LM Wang","year":"2016","unstructured":"Wang, L. M., Li, F. & Qin, Y. (2016). An overlay hole repair method for wireless sensor networks based on mobile nodes. Journal of Communications, 32(4), 1\u20138.","journal-title":"Journal of Communications"},{"issue":"9","key":"8097_CR2","first-page":"1253","volume":"33","author":"XM Dong","year":"2016","unstructured":"Dong, X. M. & Yang, J. (2016). A wormhole attack detection algorithm in wireless sensor networks. Journal of Northeast University (Natural Science Edition), 33(9), 1253\u20131256.","journal-title":"Journal of Northeast University (Natural Science Edition)"},{"issue":"1","key":"8097_CR3","first-page":"59","volume":"28","author":"XW Wang","year":"2017","unstructured":"Wang, X. W. & Lu, K. (2017). Coverage hole detection based on geometric method in wireless sensor networks. Journal of Hubei University of Automotive Technology, 28(1), 59\u201362.","journal-title":"Journal of Hubei University of Automotive Technology"},{"issue":"8","key":"8097_CR4","first-page":"141","volume":"33","author":"R Han","year":"2016","unstructured":"Han, R., Zhang, S. K. & Chen, P. F. (2016). Random walk based covering hole repair for wireless sensor networks. Computer Applications and Software, 33(8), 141\u2013145.","journal-title":"Computer Applications and Software"},{"issue":"12","key":"8097_CR5","first-page":"1948","volume":"30","author":"XW Yu","year":"2017","unstructured":"Yu, X. W., Zhang, F., Zhou, L. X. et al. (2017). Hierarchical data fusion of event-driven and trust-allocation weighting in WSN. Journal of Transducer Technology, 30(12), 1948\u20131953.","journal-title":"Journal of Transducer Technology"},{"issue":"7","key":"8097_CR6","first-page":"103","volume":"2","author":"TH Huang","year":"2016","unstructured":"Huang, T. H., Yi, K., Wang, Y. L. et al. (2016). Firefly algorithm optimization neural network wireless sensor network data fusion. Instrumentation Technology and Sensors, 2(7), 103\u2013107.","journal-title":"Instrumentation Technology and Sensors"},{"issue":"1","key":"8097_CR7","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1103\/PhysRevLett.119.016101","volume":"119","author":"J Lin","year":"2017","unstructured":"Lin, J., Zuluaga, S., Yu, P. et al. (2017). A novel PD2Se3 two-dimensional phase driven by interlayer fusion in layered PDSe2. Physical Review Letters, 119(1), 1700\u20131701.","journal-title":"Physical Review Letters"},{"issue":"4","key":"8097_CR8","first-page":"43","volume":"38","author":"H Yang","year":"2017","unstructured":"Yang, H. (2017). Blind area detection in wireless sensor networks based on improved distributed algorithm. Neijiang Science and Technology, 38(4), 43\u201343.","journal-title":"Neijiang Science and Technology"},{"issue":"1","key":"8097_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.4064\/cm6713-8-2016","volume":"147","author":"W Gao","year":"2017","unstructured":"Gao, W. & Wang, W. (2017). New isolated toughness condition for fractional (G, F, N) - critical graph. Colloquium Mathematicum, 147(1), 55\u201365.","journal-title":"Colloquium Mathematicum"},{"issue":"1","key":"8097_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/1206212X.2017.1395103","volume":"40","author":"AK Bardsiri","year":"2018","unstructured":"Bardsiri, A. K. (2018). A new combinatorial framework for software services development effort estimation. International Journal of Computers and Applications, 40(1), 14\u201324.","journal-title":"International Journal of Computers and Applications"},{"issue":"4","key":"8097_CR11","first-page":"120","volume":"27","author":"ZW Zhu","year":"2017","unstructured":"Zhu, Z. W., Wang, J., Wang, L. et al. (2017). Detection and localization of wormhole attacks in wireless sensor networks. Computer Technology and Development, 27(4), 120\u2013125.","journal-title":"Computer Technology and Development"},{"issue":"2","key":"8097_CR12","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1049\/iet-cvi.2015.0146","volume":"10","author":"NA Azis","year":"2016","unstructured":"Azis, N. A., Jeong, Y. S., Choi, H. J. et al. (2016). Weighted averaging fusion for multi-view skeletal data and its application in action recognition. IET Computer Vision, 10(2), 134\u2013142.","journal-title":"IET Computer Vision"},{"key":"8097_CR13","doi-asserted-by":"crossref","unstructured":"Hirano, M., Tsuzuki, N., Ikeda, S. et al. (2018) Logdrive: A proactive data collection and analysis framework for time-traveling forensic investigation in iaas cloud environments. Journal of Cloud Computing,7(1).","DOI":"10.1186\/s13677-018-0119-2"},{"issue":"3","key":"8097_CR14","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.3233\/JIFS-162231","volume":"33","author":"K Kalirajan","year":"2017","unstructured":"Kalirajan, K., Sudha, M. (2017). Moving object detection using median-based scale invariant local ternary pattern for video surveillance system. Journal of Intelligent and Fuzzy Systems, 33(3), 1933\u20131943.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"issue":"7","key":"8097_CR15","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1049\/iet-smt.2016.0524","volume":"11","author":"XH Wu","year":"2017","unstructured":"Wu, X. H., Song, S. M. (2017). Covariance Intersection-Based Fusion Algorithm for Asynchronous Multirate Multisensor System with Cross-Correlation. IET Science Measurement & Technology, 11(7), 878\u2013885.","journal-title":"IET Science Measurement & Technology"},{"issue":"1","key":"8097_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIM.2018.8278808","volume":"21","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Zhong, M., Yao, H. et al. (2018). Internet of things for smart ports: technologies and challenges. IEEE Instrumentation & Measurement Magazine, 21(1), 34\u201343.","journal-title":"IEEE Instrumentation & Measurement Magazine"},{"issue":"1","key":"8097_CR17","doi-asserted-by":"publisher","first-page":"173","DOI":"10.21042\/AMNS.2017.1.00014","volume":"2","author":"V Lokesha","year":"2017","unstructured":"Lokesha, V., Deepika, T., Ranjini, P. S., et al. (2017). Operations of nanostructures via Sdd, Abc4 and Ga5 Indices. Applied Mathematics & Nonlinear Sciences, 2(1), 173\u2013180.","journal-title":"Applied Mathematics & Nonlinear Sciences"},{"issue":"10","key":"8097_CR18","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1049\/iet-ipr.2016.0661","volume":"11","author":"X Li","year":"2017","unstructured":"Li, X., Wang, L., Wang, J. et al. (2017). Multi-focus image fusion algorithm based on multilevel morphological component analysis and support vector machine. Iet Image Processing, 11(10), 919\u2013926.","journal-title":"Iet Image Processing"},{"issue":"1","key":"8097_CR19","first-page":"178","volume":"16","author":"DS Rong","year":"2018","unstructured":"Rong, D. S., Hu, J. S., Zhao, J. J. et al. (2018). Based on data fusion Iga-Rgrnn low-rank coal methane production prediction model. Journal of Power Supply, 16(1), 178\u2013184.","journal-title":"Journal of Power Supply"},{"issue":"5","key":"8097_CR20","first-page":"1110","volume":"40","author":"XF Tan","year":"2016","unstructured":"Tan, X. F., Xuan, T. T. & Zhang, P. C. (2016). Non-intrusive load identification and classification based on data flow. Chinese Journal of Power Sources, 40(5), 1110\u20131112.","journal-title":"Chinese Journal of Power Sources"},{"issue":"2","key":"8097_CR21","first-page":"128","volume":"12","author":"XL Zhou","year":"2017","unstructured":"Zhou, X. L. & Zhang, H. (2017). Research on periodic bit data analysis model based on time characteristics. Journal of China Academy of Electronics and Information Technology, 12(2), 128\u2013131.","journal-title":"Journal of China Academy of Electronics and Information Technology"},{"key":"8097_CR22","first-page":"28","volume":"9","author":"Y Zhu","year":"2017","unstructured":"Zhu, Y. (2017). Data fusion algorithm for wireless sensor networks based on deep learning. Automation & Instrumentation, 9, 28\u201329.","journal-title":"Automation & Instrumentation"},{"key":"8097_CR23","doi-asserted-by":"crossref","unstructured":"Udendhran, R., Balamurgan, M. Suresh, A., and Varatharajan R. (2020) Enhancing image processing architecture using deep learning for embedded vision systems. Microprocessors and Microsystems.","DOI":"10.1016\/j.micpro.2020.103094"},{"key":"8097_CR24","doi-asserted-by":"crossref","unstructured":"R.Geetha, Dr.S.Sivasubramanian, Dr.M.Kaliappan, S.Vimal, and Dr.A.Suresh (2019) Cervical cancer identification with synthetic minority oversampling technique and PCA Analysis using Random Forest Classifier. Journal of Medical Systems.","DOI":"10.1007\/s10916-019-1402-6"},{"key":"8097_CR25","unstructured":"U.Ramani, R.Nithya, M.Thilagaraj, S.Sathiesh Kumar (2020) Genetic Algorithm Based Three Input DC Source Using Hybrid Power System. Journal of Green Engineering Vol 10, No 7, pp 4227\u20134243."},{"key":"8097_CR26","unstructured":"R.Krishna Kumar, S.Diwakaran, M.Thilagaraj (2020) Reactive Power Control of Modern Type High Effective Phase Grid-Tied Photovoltaic Network Inverter. Journal of Green Engineering, Vol 10, No 9, pp 4874\u20134884, 2020."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08097-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08097-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08097-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T13:15:53Z","timestamp":1671023753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08097-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8097"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08097-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"10 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}