{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:18:00Z","timestamp":1753273080522},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,5,21]],"date-time":"2016-05-21T00:00:00Z","timestamp":1463788800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s12083-016-0464-1","type":"journal-article","created":{"date-parts":[[2016,5,22]],"date-time":"2016-05-22T17:58:55Z","timestamp":1463939935000},"page":"1285-1298","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fault diagnosis of body sensor networks using hidden Markov model"],"prefix":"10.1007","volume":"10","author":[{"given":"Haibin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jiajia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"issue":"3","key":"464_CR1","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TC.2004.1261832","volume":"53","author":"B Krishnamachari","year":"2004","unstructured":"Krishnamachari B, Iyengar S (2004) Distributed Bayesian algorithms for fault-tolerant event region dectection in wireless sensor networks. IEEE Trans Comput 53 (3):241\u2013 250","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"464_CR2","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TC.2006.13","volume":"55","author":"X Luo","year":"2006","unstructured":"Luo X, Dong M, Huang Y (2006) On distributed fault-tolerant detection in wireless sensor networks. IEEE Trans Comput 55(1):58\u201370","journal-title":"IEEE Trans Comput"},{"issue":"8","key":"464_CR3","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TKDE.2007.1067","volume":"19","author":"W Wu","year":"2007","unstructured":"Wu W, Cheng X, Ding M, Xing K, Liu F, Deng P (2007) Localized outlying and boundary data detection in sensor networks. IEEE Trans Knowl Data Eng 19 (8):1145\u2013 1157","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"464_CR4","doi-asserted-by":"crossref","unstructured":"Annichini A, Asarin E, Bouajjani A (2000) Symbolic techniques for parametric reasoning about counter and clock systems. CAV2000, LNCS 1855. Springer","DOI":"10.1007\/10722167_32"},{"key":"464_CR5","doi-asserted-by":"crossref","unstructured":"Branch J, Szymanski B, Giannella C, Wolff R (2006) In-network outlier detection in wireless sensor networks. In: Proc. IEEE ICDCS","DOI":"10.1109\/ICDCS.2006.49"},{"key":"464_CR6","doi-asserted-by":"crossref","unstructured":"Zhang M K, Shi S, Gao H, Li J (2007) Unsupervised outlier detection in sensor networks using aggregation tree. In: Proc. ADMA","DOI":"10.1007\/978-3-540-73871-8_16"},{"key":"464_CR7","doi-asserted-by":"crossref","unstructured":"Kim D-J, Prabhakaran B (2011) Motion fault detection and isolation in body sensor networks. In: Proceeding of IEEE international conference on pervasive computing and communications (PerCom), pp 147\u2013155","DOI":"10.1109\/PERCOM.2011.5767579"},{"issue":"6","key":"464_CR8","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.pmcj.2011.09.006","volume":"7","author":"D-J Kim","year":"2011","unstructured":"Kim D-J, Prabhakaran B (2011) Motion fault detection and isolation in body sensor networks. Perv Mobil Comput 7(6):727\u2013745","journal-title":"Perv Mobil Comput"},{"key":"464_CR9","first-page":"252","volume":"5","author":"A Mahapatro","year":"2012","unstructured":"Mahapatro A, Khilar PM (2012) Fault diagnosis in body sensor networks. Int J Comput Inf Syst Indus Manag Applications 5:252\u2013259","journal-title":"Int J Comput Inf Syst Indus Manag Applications"},{"issue":"4","key":"464_CR10","doi-asserted-by":"crossref","first-page":"272","DOI":"10.5626\/JCSE.2013.7.4.272","volume":"7","author":"O Salem","year":"2013","unstructured":"Salem O, Liu Y, Mehaoua A (2013) Anomaly detection in medical wireless sensor networks. J Comput Sci Eng 7(4):272\u2013284","journal-title":"J Comput Sci Eng"},{"key":"464_CR11","first-page":"4373","volume":"2013","author":"O Salem","year":"2013","unstructured":"Salem O, Guerassimov A, Mehaoua A, Marcus A, Furht B (2013) Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. IEEE ICC 2013:4373\u2013 4378","journal-title":"IEEE ICC"},{"issue":"18","key":"464_CR12","first-page":"1","volume":"16","author":"Y Kamozaki","year":"2007","unstructured":"Kamozaki Y, Sawayama T (2007) Heart pulse monitoring system by air pressure and ultrasonic sensor systems. Syst Syst Eng 16(18):1\u20135","journal-title":"Syst Syst Eng"},{"key":"464_CR13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-45351-2_9","volume":"2034","author":"H Anai","year":"2001","unstructured":"Anai H, Weispfnening V (2001) Reach set computation using real quantifier elimination. Hybrid systems: Computation and contro. Lect Note Comput Sci 2034:63\u201376","journal-title":"Lect Note Comput Sci"},{"issue":"2","key":"464_CR14","first-page":"1","volume":"5","author":"R Robergs","year":"2002","unstructured":"Robergs R, Landwehr R (2002) The surprising history of the hrmax = 220-age equation. J Exer Physiol 5(2):1\u201310","journal-title":"J Exer Physiol"},{"issue":"2","key":"464_CR15","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"R Lawrence","year":"1989","unstructured":"Lawrence R, Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013285","journal-title":"Proc IEEE"},{"issue":"4","key":"464_CR16","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/5326.897073","volume":"30","author":"J Ying","year":"2000","unstructured":"Ying J, Kirubarajan T, Pattipati KR (2000) A hidden Markov model-based algorithm for fault diagnosis with partial and imperfect tests. IEEE Trans Syst Man Cybern 30(4):463\u2013473","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"3","key":"464_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1754414.1754419","volume":"6","author":"A Sharma","year":"2010","unstructured":"Sharma A, Golubchik L, Govindan R (2010) Sensor faults: Detection methods and prevalence in real-world datasets. ACM Trans Sensor Netw 6(3):1\u201334","journal-title":"ACM Trans Sensor Netw"},{"key":"464_CR18","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: Proc. IEEE ICCS","DOI":"10.1109\/ICCS.2006.301508"},{"key":"464_CR19","doi-asserted-by":"crossref","unstructured":"Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. ACM Spec Int Group Manag Data:77\u201382","DOI":"10.1145\/959060.959074"},{"key":"464_CR20","doi-asserted-by":"crossref","unstructured":"Chen MF (1992) From Markov chains to non-equibrium partical systems. World Scientific Singapore","DOI":"10.1142\/1389"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0464-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0464-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0464-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0464-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T11:52:41Z","timestamp":1567943561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0464-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,21]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["464"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0464-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,21]]}}}