{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:46:27Z","timestamp":1740159987716,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s13198-021-01611-z","type":"journal-article","created":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:03:36Z","timestamp":1643501016000},"page":"1964-1975","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Visual modeling of surface structure geometric features of mechanical parts based on boundary data mining and wireless computing"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2416-3069","authenticated-orcid":false,"given":"Feng","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,30]]},"reference":[{"issue":"2","key":"1611_CR1","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s10694-016-0594-2","volume":"53","author":"EK Asimakopoulou","year":"2017","unstructured":"Asimakopoulou EK, Kolaitis DI, Founti MA (2017) Assessment of fire engineering design correlations used to describe the geometry and thermal characteristics of externally venting flames. Fire Technol 53(2):709\u2013739","journal-title":"Fire Technol"},{"key":"1611_CR2","doi-asserted-by":"crossref","unstructured":"Chen K, Shen G, Jie S, Jiang B, Bose SK, 2019. Availability-guaranteed slice provisioning in wireless-optical broadband access networks supporting mobile edge computing. In: international IFIP conference on optical network design and modeling. Springer, Cham, pp. 70\u201381","DOI":"10.1007\/978-3-030-38085-4_7"},{"issue":"5","key":"1611_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337065","volume":"52","author":"HN Dai","year":"2019","unstructured":"Dai HN, Wong RCW, Wang H, Zheng Z, Vasilakos AV (2019) Big data analytics for large-scale wireless networks: challenges and opportunities. ACM Comput Surv (CSUR) 52(5):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1611_CR4","doi-asserted-by":"crossref","unstructured":"Dong J, Fei X, Soatto S (2017). Visual-inertial-semantic scene representation for 3d object detection. In: IEEE conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2017.380"},{"issue":"2","key":"1611_CR5","first-page":"e1395","volume":"11","author":"A Dridi","year":"2021","unstructured":"Dridi A, Gaber MM, Azad RM, Bhogal J (2021) Scholarly data mining: a systematic review of its applications. Wiley Interdiscip Rev: Data Min Know Discov 11(2):e1395","journal-title":"Wiley Interdiscip Rev: Data Min Know Discov"},{"key":"1611_CR6","doi-asserted-by":"crossref","unstructured":"Finn C, Levine S (2017). Deep visual foresight for planning robot motion. In Robotics and automation (ICRA), 2017 IEEE international conference on IEEE, pp. 2786\u20132793.","DOI":"10.1109\/ICRA.2017.7989324"},{"issue":"3","key":"1611_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MWC.2019.1800407","volume":"26","author":"K Gai","year":"2019","unstructured":"Gai K, Xu K, Lu Z, Qiu M, Zhu L (2019) Fusion of cognitive wireless networks and edge computing. IEEE Wirel Commun 26(3):69\u201375","journal-title":"IEEE Wirel Commun"},{"key":"1611_CR8","doi-asserted-by":"crossref","unstructured":"Gima K, Oma R, Nakamura S, Enokido T, Takizawa M 2019 Parallel data transmission protocols in the mobile fog computing model. In: International conference on broadband and wireless computing, communication and applications, Springer, Cham, 99. 494\u2013503","DOI":"10.1007\/978-3-030-33506-9_44"},{"key":"1611_CR9","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.aap.2016.11.002","volume":"99","author":"Q Guo","year":"2017","unstructured":"Guo Q, Xu P, Pei X, Wong SC, Yao D (2017) The effect of road network patterns on pedestrian safety: a zone-based Bayesian spatial modeling approach. Accid Anal Prev 99:114\u2013124","journal-title":"Accid Anal Prev"},{"key":"1611_CR10","doi-asserted-by":"crossref","unstructured":"Ha S, Zhang J, Simeone O, Kang J 2019 Wireless map-reduce distributed computing with full-duplex radios and imperfect CSI. In: 2019 IEEE 20th international workshop on signal processing advances in wireless communications (SPAWC), IEEE, pp. 1\u20135","DOI":"10.1109\/SPAWC.2019.8815393"},{"issue":"11","key":"1611_CR11","doi-asserted-by":"publisher","first-page":"4361","DOI":"10.1007\/s12652-018-1113-8","volume":"10","author":"R Halloush","year":"2019","unstructured":"Halloush R, Liu H (2019) Modeling and performance evaluation of jamming-tolerant wireless systems. J Ambient Intell Humaniz Comput 10(11):4361\u20134375","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"1611_CR12","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1080\/14680629.2017.1279072","volume":"19","author":"J Hu","year":"2018","unstructured":"Hu J, Liu P, Wang D, Oeser M (2018) Influence of aggregates\u2019 spatial characteristics on air-voids in asphalt mixture. Road Mater Pavement Design 19(4):837\u2013855","journal-title":"Road Mater Pavement Design"},{"key":"1611_CR13","doi-asserted-by":"crossref","unstructured":"Kuila P, Jana PK 2020 Evolutionary computing approaches for clustering and routing in wireless sensor networks. In: Sensor technology: concepts, methodologies, tools, and applications (pp. 125\u2013146). IGI Global, pp 125\u2013146","DOI":"10.4018\/978-1-7998-2454-1.ch006"},{"key":"1611_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.01.020","volume":"131","author":"C Li","year":"2019","unstructured":"Li C, Tang J, Luo Y (2019) Dynamic multi-user computation offloading for wireless powered mobile edge computing. J Netw Comput Appl 131:1\u201315","journal-title":"J Netw Comput Appl"},{"key":"1611_CR15","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.compstruct.2016.10.123","volume":"160","author":"SA Lurie","year":"2017","unstructured":"Lurie SA, Solyaev YO, Volkov-Bogorodskiy DB, Bouznik VM, Koshurina AA (2017) Design of the corrugated-core sandwich panel for the arctic rescue vehicle. Compos Struct 160:1007\u20131019","journal-title":"Compos Struct"},{"key":"1611_CR16","doi-asserted-by":"publisher","unstructured":"Ma Y, Hua Z (2021) Deep mining of communication information association based on discrete Fourier transform. J Ambient Intell Human Comput https:\/\/doi.org\/10.1007\/s12652-020-02816-z","DOI":"10.1007\/s12652-020-02816-z"},{"issue":"6","key":"1611_CR17","doi-asserted-by":"publisher","first-page":"6047","DOI":"10.1007\/s12652-020-02169-7","volume":"12","author":"M Mathapati","year":"2021","unstructured":"Mathapati M, Senthil Kumaran T, Muruganandham A, Mathivanan M (2021) Secure routing scheme with multi-dimensional trust evaluation for wireless sensor network. J Ambient Intell Human CompuT 12(6):6047\u20136055","journal-title":"J Ambient Intell Human CompuT"},{"issue":"7","key":"1611_CR18","doi-asserted-by":"publisher","first-page":"2890","DOI":"10.1021\/acs.jproteome.0c00082","volume":"19","author":"A Mohamed","year":"2020","unstructured":"Mohamed A, Molendijk J, Hill MM (2020) lipidr: a software tool for data mining and analysis of lipidomics datasets. J Proteome Res 19(7):2890\u20132897","journal-title":"J Proteome Res"},{"issue":"1","key":"1611_CR19","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11277-015-2794-3","volume":"86","author":"S-T Park","year":"2016","unstructured":"Park S-T, Kim Y-R, Jeong S-P, Hong C-I, Kang T-G (2016) A case study on effective technique of distributed data storage for big data processing in the wireless internet environment. Wireless Pers Commun 86(1):239\u2013253","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"1611_CR20","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1007\/s11277-019-06371-5","volume":"107","author":"ZA Polgar","year":"2019","unstructured":"Polgar ZA, Suta Z (2019) Computing coding solutions for opportunistic network coding used in wireless mesh networks. Wireless Pers Commun 107(4):2019","journal-title":"Wireless Pers Commun"},{"issue":"6","key":"1611_CR21","doi-asserted-by":"publisher","first-page":"2431","DOI":"10.1109\/JSTARS.2017.2711061","volume":"10","author":"Y Ren","year":"2017","unstructured":"Ren Y, Guo H, Liu G, Ye H (2017) Simulation study of geometric characteristics and coverage for moon-based earth observation in the electro-optical region. IEEE J Sel Topics Appl Earth Obs Remote Sens 10(6):2431\u20132440","journal-title":"IEEE J Sel Topics Appl Earth Obs Remote Sens"},{"key":"1611_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-017-3955-3","volume":"93","author":"S Rhyu","year":"2017","unstructured":"Rhyu S, SangYeob Oh (2017) ICT-based wireless personal computing. Wireless Pers Commun 93:1\u20135","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"1611_CR23","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1080\/02626667.2019.1703186","volume":"65","author":"SQ Salih","year":"2020","unstructured":"Salih SQ, Sharafati A, Khosravi K, Faris H, Kisi O, Tao H, Ali M, Yaseen ZM (2020) River suspended sediment load prediction based on river discharge information: application of newly developed data mining models. Hydrol Sci J 65(4):624\u2013637","journal-title":"Hydrol Sci J"},{"key":"1611_CR24","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.buildenv.2016.10.015","volume":"112","author":"L Santos","year":"2017","unstructured":"Santos L, Schleicher S, Caldas L (2017) Automation of CAD models to BEM models for performance based goal-oriented design methods. Build Environ 112:144\u2013158","journal-title":"Build Environ"},{"issue":"4","key":"1611_CR25","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1007\/s11277-016-3377-7","volume":"94","author":"N Saravanaselvam","year":"2017","unstructured":"Saravanaselvam N, Devipriya C, Janakiraman S (2017) Soft computing based fine tuning and clock synchronization in wireless sensor networks. Wireless Pers Commun 94(4):2229\u20132237","journal-title":"Wireless Pers Commun"},{"issue":"02","key":"1611_CR26","first-page":"96","volume":"3","author":"S Smys","year":"2021","unstructured":"Smys S, Bashar Abul, Haoxiang Wang (2021) Taxonomy classification and comparison of routing protocol based on energy efficient rate. J ISMAC 3(02):96\u2013110","journal-title":"J ISMAC"},{"issue":"02","key":"1611_CR27","first-page":"101","volume":"2","author":"V Suma","year":"2020","unstructured":"Suma V, Hills SM (2020) Data mining based prediction of demand in Indian market for refurbished electronics. J Soft Comput Paradig (JSCP) 2(02):101\u2013110","journal-title":"J Soft Comput Paradig (JSCP)"},{"key":"1611_CR28","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s12652-012-0132-0","volume":"4","author":"F Tang","year":"2013","unstructured":"Tang F, Hsu H-H, Barolli L (2013) Special issue on broadband and wireless computing, communication and applications. J Ambient Intell Human Comput 4:283\u2013284","journal-title":"J Ambient Intell Human Comput"},{"key":"1611_CR29","doi-asserted-by":"crossref","unstructured":"Upenik E, Ebrahimi T (2017). A simple method to obtain visual attention data in head mounted virtual reality. In: Multimedia & expo workshops (ICMEW), 2017 IEEE international conference on, IEEE, pp. 73\u201378","DOI":"10.1109\/ICMEW.2017.8026231"},{"key":"1611_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08088-w","author":"T Vaiyapuri","year":"2021","unstructured":"Vaiyapuri T, Parvathy VS, Manikandan V, Krishnaraj N, Gupta D, Shankar K (2021) A novel hybrid optimization for cluster-based routing protocol in information-centric wireless sensor networks for IoT based mobile edge computing. Wireless Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08088-w","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"1611_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11277-011-0284-9","volume":"58","author":"S Vassilaras","year":"2011","unstructured":"Vassilaras S, Yovanof GS (2011) Wireless going in the cloud: A promising concept or just marketing hype? Wireless Pers Commun 58(1):5\u201316","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"1611_CR32","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s41074-017-0034-3","volume":"9","author":"K Wang","year":"2017","unstructured":"Wang K, Dunn E, Rodriguez M, Frahm JM (2017) Efficient video collection association using geometry-aware Bag-of-Iconics representations. IPSJ Trans Comput Vis Appl 9(1):23","journal-title":"IPSJ Trans Comput Vis Appl"},{"key":"1611_CR33","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1007\/s12652-018-0752-0","volume":"10","author":"Z Xu","year":"2019","unstructured":"Xu Z, Liu Y, Yen NY (2019) Special issue on the intelligent sensing on mobile computing and wireless communications. J Ambient Intell Human Comput 10:1679\u20131680","journal-title":"J Ambient Intell Human Comput"},{"key":"1611_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01750-4","author":"J Zhang","year":"2020","unstructured":"Zhang J, Chen M, Enhua H, Linhai W (2020) Data mining model for food safety incidents based on structural analysis and semantic similarity. J Ambien Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-01750-4","journal-title":"J Ambien Intell Human Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01611-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01611-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01611-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T14:31:27Z","timestamp":1658845887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01611-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,30]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1611"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01611-z","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2022,1,30]]},"assertion":[{"value":"7 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest and all ethical issues including human or animal participation has been done. No such consent is applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable as no such study has been done, the dataset used for implementation is publicly available (online). Related reference to the same has been added in the research paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}