{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:24Z","timestamp":1740181584163,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s42979-021-00654-0","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T15:02:27Z","timestamp":1620486147000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Transferable Belief Model for Failure Prediction in Wireless Sensor Networks"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0728-8655","authenticated-orcid":false,"given":"Hugues Marie","family":"Kamdjou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elie","family":"Tagne Fute","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adnen","family":"El Amraoui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Armand","family":"Nzeukou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"654_CR1","first-page":"13","volume":"7","author":"Elie T Fute","year":"2016","unstructured":"Fute Elie T, Bomgni Alain B, Kamdjou Hugues M. An approach to data compression and aggregation in wireless sensor networks. Int J Comput Sci Telecommun. 2016;7:13\u20139.","journal-title":"Int J Comput Sci Telecommun"},{"key":"654_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24018\/ejece.2019.3.5.121","volume":"3","author":"E Tagne","year":"2019","unstructured":"Tagne E, Kamdjou H, Bomgni A, Nzeukou A. An efficient data compression approach based on entropic coding for network devices with limited resources. Eur J Electric Eng Comput Sci. 2019;3:1\u20137. https:\/\/doi.org\/10.24018\/ejece.2019.3.5.121.","journal-title":"Eur J Electric Eng Comput Sci"},{"key":"654_CR3","unstructured":"Li Y, Parker LE. A spatial-temporal imputation technique for classification with missing data in a wireless sensor network. In: 2008 IEEE\/RSJ International Conference on intelligent robots and systems, 2008; p. 3272\u2013279."},{"key":"654_CR4","doi-asserted-by":"crossref","unstructured":"Huynh VN. Discounting and combination scheme in evidence theory for dealing with conflict in information fusion. In: International Conference on modeling decisions for artificial intelligence; Springer: Berlin\/Heidelberg, Germany, 2009; p. 217\u201330.","DOI":"10.1007\/978-3-642-04820-3_20"},{"key":"654_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-1737-3_9","volume-title":"Handbook of defeasible reasoning and uncertainty management systems","author":"A Cano","year":"2000","unstructured":"Cano A, Moral S. Algorithms for imprecise probabilities. In: Kohlas J, Moral S, editors. Handbook of defeasible reasoning and uncertainty management systems, vol. 5. Dordrecht: Springer; 2000. https:\/\/doi.org\/10.1007\/978-94-017-1737-3_9."},{"key":"654_CR6","doi-asserted-by":"crossref","unstructured":"Kong L, Xia M, Liu X Y, Wu MY, Liu X. Data loss and reconstruction in sensor networks. In: 2013 Proceedings IEEE INFOCOM, 2013; p. 1654\u2013662.","DOI":"10.1109\/INFCOM.2013.6566962"},{"key":"654_CR7","doi-asserted-by":"publisher","first-page":"101900","DOI":"10.1016\/j.adhoc.2019.101900","volume":"93","author":"Fu Xiuwen","year":"2019","unstructured":"Xiuwen Fu, Yao Haiqing, Yang Yongsheng. Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Netw. 2019;93:101900. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101900.","journal-title":"Ad Hoc Netw"},{"key":"654_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.swevo.2013.05.004","volume":"13","author":"A Mahapatro","year":"2013","unstructured":"Mahapatro A, Khilar PM. Detection and diagnosis of node failure in wireless sensor networks: a multiobjective optimization approach. Swarm Evol Comput. 2013;13:74\u201384. https:\/\/doi.org\/10.1016\/j.swevo.2013.05.004.","journal-title":"Swarm Evol Comput"},{"key":"654_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2018.09.007","volume":"132","author":"Wu Huafeng","year":"2018","unstructured":"Huafeng Wu, Xian Jiangfeng, Wang Jun, Khandge Siddhi, Mohapatra Prasant. Missing data recovery using reconstruction in ocean wireless sensor networks. Comput Commun. 2018;132:1\u20139. https:\/\/doi.org\/10.1016\/j.comcom.2018.09.007.","journal-title":"Comput Commun"},{"issue":"3","key":"654_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2996356","volume":"49","author":"GM Dias","year":"2016","unstructured":"Dias GM, Bellalta B, Oechsner S. A survey about prediction-based data reduction in wireless sensor networks. ACM Comput Surveys (CSUR). 2016;49(3):35. https:\/\/doi.org\/10.1145\/2996356.","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"654_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/jsan9020025","volume":"9","author":"M Matusowsky","year":"2020","unstructured":"Matusowsky M, Ramotsoela DT, Abu-Mahfouz AM. Data imputation in wireless sensor networks using a machine learning-based virtual sensor. J Sens Actuator Netw. 2020;9:2. https:\/\/doi.org\/10.3390\/jsan9020025.","journal-title":"J Sens Actuator Netw"},{"key":"654_CR12","doi-asserted-by":"publisher","unstructured":"Avinash R A et al. Data prediction in wireless sensor networks using Kalman filter. In: 2015 International Conference on Smart Sensors and Systems (IC-SSS), Bangalore, India, 2015; p. 1-4, https:\/\/doi.org\/10.1109\/SMARTSENS.2015.7873603..","DOI":"10.1109\/SMARTSENS.2015.7873603."},{"key":"654_CR13","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.jclinepi.2004.11.029","volume":"59","author":"Marc H Gorelick","year":"2006","unstructured":"Gorelick Marc H. Bias arising from missing data in predictive models. J Clin Epidemiol. 2006;59:1115\u201323. https:\/\/doi.org\/10.1016\/j.jclinepi.2004.11.029.","journal-title":"J Clin Epidemiol"},{"issue":"2","key":"654_CR14","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijar.2011.06.005","volume":"53","author":"D Mercier","year":"2012","unstructured":"Mercier D, Lefevre E, Delmotte F. Belief functions contextual discounting and canonical decompositions. Int J Approx Reason. 2012;53(2):146\u201358.","journal-title":"Int J Approx Reason"},{"key":"654_CR15","doi-asserted-by":"publisher","first-page":"2800","DOI":"10.1080\/00207543.2017.1405166","volume":"56","author":"Z He","year":"2018","unstructured":"He Z, Jiang W. A new belief Markov chain model and its application in inventory prediction. Int J Prod Res. 2018;56:2800\u201317. https:\/\/doi.org\/10.1080\/00207543.2017.1405166.","journal-title":"Int J Prod Res"},{"key":"654_CR16","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1002\/int.21999","volume":"33","author":"Xinyang Deng","year":"2018","unstructured":"Deng Xinyang. Analyzing the monotonicity of belief interval based uncertainty measures in belief function theory. Int J Intell Syst. 2018;33:1869\u201379. https:\/\/doi.org\/10.1002\/int.21999.","journal-title":"Int J Intell Syst"},{"key":"654_CR17","doi-asserted-by":"publisher","first-page":"329","DOI":"10.15837\/ijccc.2019.3.3589","volume":"3","author":"Yukun Dong","year":"2019","unstructured":"Dong Yukun, Zhang Jiantao, Li Zhen, Yong Hu, Deng Yong. Combination of evidential sensor reports with distance function and belief entropy in fault diagnosis. Int J Comput Commun Control. 2019;3:329\u201343. https:\/\/doi.org\/10.15837\/ijccc.2019.3.3589.","journal-title":"Int J Comput Commun Control"},{"key":"654_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.knosys.2016.05.043","volume":"106","author":"T Denoeux","year":"2016","unstructured":"Denoeux T, Sriboonchitta S, Kanjanatarakul O. Evidential clustering of large dissimilarity data. Knowl-Based Syst. 2016;106:179\u201395.","journal-title":"Knowl-Based Syst"},{"key":"654_CR19","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10479-017-2609-x","volume":"256","author":"VN Huynh","year":"2017","unstructured":"Huynh VN. Recent advances of uncertainty management in knowledge modelling and decision making. Ann Oper Res. 2017;256:199\u2013202.","journal-title":"Ann Oper Res"},{"key":"654_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1002\/(SICI)1098-111X(199802\/03)13:2\/3<127::AID-INT3>3.0.CO;2-1","volume":"13","author":"P Smets","year":"1998","unstructured":"Smets P. Application of the transferable belief model to diagnostic problems. Int J Intell Syst. 1998;13:127\u201358.","journal-title":"Int J Intell Syst"},{"key":"654_CR21","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.physa.2018.05.067","volume":"508","author":"L Yin","year":"2018","unstructured":"Yin L, Deng Y. Toward uncertainty of weighted networks: an entropy-based model. Phys A. 2018;508:176\u201386. https:\/\/doi.org\/10.1016\/j.physa.2018.05.067.","journal-title":"Phys A"},{"issue":"C","key":"654_CR22","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.chaos.2018.04.033","volume":"117","author":"M Li","year":"2018","unstructured":"Li M, Qi Z, Deng Y. Evidential identification of influential nodes in network of networks. Chaos Solitons Fractals. 2018;117(C):283\u201396. https:\/\/doi.org\/10.1016\/j.chaos.2018.04.033.","journal-title":"Chaos Solitons Fractals"},{"key":"654_CR23","doi-asserted-by":"publisher","first-page":"8207","DOI":"10.1007\/s00500-018-3455-8","volume":"23","author":"W Zhang","year":"2019","unstructured":"Zhang W, Deng Y. Combining conflicting evidence using the DEMATEL method. Soft Comput. 2019;23:8207\u201316. https:\/\/doi.org\/10.1007\/s00500-018-3455-8.","journal-title":"Soft Comput"},{"key":"654_CR24","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TSMCA.2004.826266","volume":"34","author":"F Delmotte","year":"2004","unstructured":"Delmotte F, Smets P. Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans Syst Man Cybern Part A Syst Hum. 2004;34:457\u201371.","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Hum"},{"key":"654_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jval.2020.08.420","author":"K Chan","year":"2020","unstructured":"Chan K, Jansen D, Ayers J, Cope S. PCN283 extending multivariate network meta-analysis of survival function parameters to fractional polynomials. Value Health. 2020. https:\/\/doi.org\/10.1016\/j.jval.2020.08.420.","journal-title":"Value Health"},{"key":"654_CR26","doi-asserted-by":"publisher","first-page":"12210","DOI":"10.1007\/978-3-030-50309-3_29","volume-title":"HCI for cybersecurity, privacy and trust. HCII 2020. Lecture notes in computer science","author":"H Koelmann","year":"2020","unstructured":"Koelmann H. Perspectives on information technology artefacts in trust-related interactions. In: HCI for cybersecurity, privacy and trust. HCII 2020. Lecture notes in computer science. Cham: Springer; 2020. p. 12210. https:\/\/doi.org\/10.1007\/978-3-030-50309-3_29."},{"key":"654_CR27","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/TSMCB.2006.877795","volume":"36","author":"T Denoeux","year":"2006","unstructured":"Denoeux T, Smets P. Classification using belief functions: relationship between case-based and model-based approaches. IEEE Trans Syst Man Cybern B Cybern. 2006;36:1395\u2013405.","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"654_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ijar.2005.04.001","volume":"40","author":"Philippe Smets","year":"2005","unstructured":"Smets Philippe. Belief functions on real numbers. Int J Approx Reason. 2005;40:181\u2013223.","journal-title":"Int J Approx Reason"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00654-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00654-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00654-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T20:21:31Z","timestamp":1624738891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00654-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["654"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00654-0","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"19 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"269"}}