{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T01:40:08Z","timestamp":1750902008136,"version":"3.41.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100017170","name":"Thailand Science Research and Innovation","doi-asserted-by":"crossref","award":["IRN61 W0006"],"award-info":[{"award-number":["IRN61 W0006"]}],"id":[{"id":"10.13039\/501100017170","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004704","name":"National Research Council of Thailand","doi-asserted-by":"crossref","award":["IRN61 W0006"],"award-info":[{"award-number":["IRN61 W0006"]}],"id":[{"id":"10.13039\/501100004704","id-type":"DOI","asserted-by":"crossref"}]},{"name":"College of Computing, Khon Kaen University"},{"DOI":"10.13039\/501100004071","name":"Khon Kaen University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004071","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04108-9","type":"journal-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T12:59:43Z","timestamp":1750856383000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Soft Computing-Based Adaptive Energy Replenishment Via Mobile Charging in Wireless Sensor Networks with Fuzzy Logic and Genetic Algorithms"],"prefix":"10.1007","volume":"6","author":[{"given":"Chatchai","family":"Punriboon","sequence":"first","affiliation":[]},{"given":"Nutthanon","family":"Leelathakul","sequence":"additional","affiliation":[]},{"given":"Phet","family":"Aimtongkham","sequence":"additional","affiliation":[]},{"given":"Pakarat","family":"Musikawan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1026-191X","authenticated-orcid":false,"given":"Chakchai","family":"So-In","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,25]]},"reference":[{"key":"4108_CR1","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jnca.2016.02.003","volume":"64","author":"AU Rahman","year":"2016","unstructured":"Rahman AU, Alharby A, Hasbullah H, Almuzaini K. Corona based deployment strategies in wireless sensor network: a survey. J Netw Comput Appl. 2016;64:176\u201393. https:\/\/doi.org\/10.1016\/j.jnca.2016.02.003.","journal-title":"J Netw Comput Appl"},{"key":"4108_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TNET.2009.2024941","volume":"18","author":"JL Bredin","year":"2010","unstructured":"Bredin JL, Demaine ED, Hajiaghayi MT, Rus D. Deploying sensor networks with guaranteed fault tolerance. IEEE\/ACM Trans Netw. 2010;18:216\u201328. https:\/\/doi.org\/10.1109\/TNET.2009.2024941.","journal-title":"IEEE\/ACM Trans Netw"},{"key":"4108_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38:393\u2013422. https:\/\/doi.org\/10.1016\/S1389-1286(01)00302-4.","journal-title":"Comput Netw"},{"key":"4108_CR4","doi-asserted-by":"publisher","unstructured":"Diamond SM, Ceruti MG. Application of wireless sensor network to military information integration. In: IEEE International Conference of Industrial Informatics, vol. 1. Institute of Electrical and Electronics Engineers Inc., 2007. p. 317\u201322. https:\/\/doi.org\/10.1109\/INDIN.2007.4384776.","DOI":"10.1109\/INDIN.2007.4384776"},{"key":"4108_CR5","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1080\/15501320902768625","volume":"5","author":"I Bekmezci","year":"2009","unstructured":"Bekmezci I, Alag\u00f6z F. Energy efficient, delay sensitive, fault tolerant wireless sensor network for military monitoring. Int J Distrib Sens Netw. 2009;5:729\u201347. https:\/\/doi.org\/10.1080\/15501320902768625.","journal-title":"Int J Distrib Sens Netw"},{"key":"4108_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925497","author":"H Li","year":"2017","unstructured":"Li H, Ao C, Xu Y, Tian J, Yamashita K. Relay node position optimization in complex environment. IEEE Wirel Commun Netw Conf WCNC. 2017. https:\/\/doi.org\/10.1109\/WCNC.2017.7925497.","journal-title":"IEEE Wirel Commun Netw Conf WCNC"},{"key":"4108_CR7","doi-asserted-by":"publisher","first-page":"2899","DOI":"10.3390\/s110302899","volume":"11","author":"Y Zeng","year":"2011","unstructured":"Zeng Y, Sreenan CJ, Sitanayah L, Xiong N, Park JH, Zheng G. An emergency-adaptive routing scheme for wireless sensor networks for building fire hazard monitoring. Sensors. 2011;11:2899\u2013919. https:\/\/doi.org\/10.3390\/s110302899.","journal-title":"Sensors"},{"key":"4108_CR8","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/978-981-15-5558-9_65","volume":"672","author":"HD Ahlawat","year":"2020","unstructured":"Ahlawat HD, Chauhan RP. Forest fire detection based on wireless sensor network. Lect Notes Electr Eng. 2020;672:751\u201365. https:\/\/doi.org\/10.1007\/978-981-15-5558-9_65.","journal-title":"Lect Notes Electr Eng"},{"key":"4108_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00542-023-05578-8","volume":"30","author":"R Karim","year":"2024","unstructured":"Karim R, Zahedi M, De D, Das A. MKFF: mid-point K-means based clustering in wireless sensor network for forest fire prediction. Microsyst Technol. 2024;30:469\u201380. https:\/\/doi.org\/10.1007\/s00542-023-05578-8.","journal-title":"Microsyst Technol"},{"key":"4108_CR10","doi-asserted-by":"publisher","unstructured":"Bhattacharya S, M.a S, Poonguzhali P, Vasudevan RM, Lokeshwar S, Vaibhav M, et al. Experimental Analysis of WSN based Solution for Early Forest Fire Detection. 2021 IEEE Int Conf Internet Things Intell Syst IoTaIS 2021. 2021. p. 136\u201341. https:\/\/doi.org\/10.1109\/IOTAIS53735.2021.9628482.","DOI":"10.1109\/IOTAIS53735.2021.9628482"},{"key":"4108_CR11","doi-asserted-by":"publisher","unstructured":"Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J. Wireless sensor networks for habitat monitoring. Association for Computing Machinery (ACM); 2002. p. 88\u201397. https:\/\/doi.org\/10.1145\/570738.570751.","DOI":"10.1145\/570738.570751"},{"key":"4108_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/drones7110674","volume":"7","author":"J Virtue","year":"2023","unstructured":"Virtue J, Turner D, Williams G, Zeliadt S, Walshaw H, Lucieer A. Burrow-nesting seabird survey using UAV-mounted thermal sensor and count automation. Drones. 2023;7:4. https:\/\/doi.org\/10.3390\/drones7110674.","journal-title":"Drones"},{"key":"4108_CR13","doi-asserted-by":"publisher","unstructured":"Shinde D, Siddiqui N. IOT Based Environment change Monitoring Controlling in Greenhouse using WSN. In: 2018 International Conferece Information, Communication Engineering Technology ICICET 2018. Institute of Electrical and Electronics Engineers Inc.; 2018. p. 1\u20135. https:\/\/doi.org\/10.1109\/ICICET.2018.8533808.","DOI":"10.1109\/ICICET.2018.8533808"},{"key":"4108_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s42452-019-0227-8","volume":"1","author":"H Ibrahim","year":"2019","unstructured":"Ibrahim H, Mostafa N, Halawa H, Elsalamouny M, Daoud R, Amer H, et al. A layered IoT architecture for greenhouse monitoring and remote control. SN Appl Sci. 2019;1:223. https:\/\/doi.org\/10.1007\/s42452-019-0227-8.","journal-title":"SN Appl Sci"},{"key":"4108_CR15","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s42853-020-00075-6","volume":"45","author":"A Bhujel","year":"2020","unstructured":"Bhujel A, Basak JK, Khan F, Arulmozhi E, Jaihuni M, Sihalath T, et al. Sensor systems for greenhouse microclimate monitoring and control: a review. J Biosyst Eng. 2020;45:341\u201361. https:\/\/doi.org\/10.1007\/s42853-020-00075-6.","journal-title":"J Biosyst Eng"},{"key":"4108_CR16","doi-asserted-by":"publisher","unstructured":"Rao M, Kamila NK, Kumar KV. Underwater wireless sensor network for tracking ships approaching harbor. In: 2016 International Conference on Signal Processing and Communication Power Embeded System SCOPES 2016 - Proc. 2017. p. 1872\u20136. https:\/\/doi.org\/10.1109\/SCOPES.2016.7955771.","DOI":"10.1109\/SCOPES.2016.7955771"},{"key":"4108_CR17","doi-asserted-by":"publisher","unstructured":"Alkandari A, Alnasheet M, Alabduljader Y, Moein SM. Water monitoring system using Wireless Sensor Network (WSN): Case study of Kuwait beaches. In: 2012 2nd International Conference on Digital Information Processing Communication ICDIPC 2012. 2012. p. 10\u20135. https:\/\/doi.org\/10.1109\/ICDIPC.2012.6257270.","DOI":"10.1109\/ICDIPC.2012.6257270"},{"key":"4108_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1080\/15501320500201276","volume":"2","author":"J Lian","year":"2006","unstructured":"Lian J, Naik K, Agnew GB. Data capacity improvement of wireless sensor networks using non-uniform sensor distribution. Int J Distrib Sens Netw. 2006;2:121\u201345. https:\/\/doi.org\/10.1080\/15501320500201276.","journal-title":"Int J Distrib Sens Netw"},{"key":"4108_CR19","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1405","volume":"9","author":"M Dobrojevic","year":"2023","unstructured":"Dobrojevic M, Zivkovic M, Chhabra A, Sani NS, Bacanin N, Mohd AM. Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach. PeerJ Comput Sci. 2023;9: e1405. https:\/\/doi.org\/10.7717\/peerj-cs.1405.","journal-title":"PeerJ Comput Sci"},{"key":"4108_CR20","doi-asserted-by":"publisher","DOI":"10.7717\/PEERJ-CS.956\/SUPP-2","volume":"8","author":"M Zivkovic","year":"2022","unstructured":"Zivkovic M, Tair M, Venkatachalam K, Bacanin N, Hub\u00e1lovsk\u00fd \u0160, Trojovsk\u00fd P. Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification. PeerJ Comput Sci. 2022;8: e956. https:\/\/doi.org\/10.7717\/PEERJ-CS.956\/SUPP-2.","journal-title":"PeerJ Comput Sci"},{"key":"4108_CR21","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.210870","author":"O Ali","year":"2022","unstructured":"Ali O, Ishak MK, Ooi CA, Bhatti MKL. Battery characterization for wireless sensor network applications to investigate the effect of load on surface temperatures. R Soc Open Sci. 2022. https:\/\/doi.org\/10.1098\/rsos.210870.","journal-title":"R Soc Open Sci"},{"key":"4108_CR22","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.asoc.2015.07.008","volume":"36","author":"Y Hu","year":"2015","unstructured":"Hu Y, Liu K, Zhang X, Su L, Ngai EWT, Liu M. Application of evolutionary computation for rule discovery in stock algorithmic trading: a literature review. Appl Soft Comput J. 2015;36:534\u201351. https:\/\/doi.org\/10.1016\/j.asoc.2015.07.008.","journal-title":"Appl Soft Comput J"},{"key":"4108_CR23","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.ieri.2012.09.011","volume":"3","author":"F Chen","year":"2012","unstructured":"Chen F, Guo L, Chen C. A survey on energy management in the wireless sensor networks. IERI Procedia. 2012;3:60\u20136. https:\/\/doi.org\/10.1016\/j.ieri.2012.09.011.","journal-title":"IERI Procedia"},{"key":"4108_CR24","doi-asserted-by":"publisher","first-page":"1784","DOI":"10.1016\/j.jnca.2010.12.010","volume":"34","author":"R Kosar","year":"2011","unstructured":"Kosar R, Bojaxhiu I, Onur E, Ersoy C. Lifetime extension for surveillance wireless sensor networks with intelligent redeployment. J Netw Comput Appl. 2011;34:1784\u201393. https:\/\/doi.org\/10.1016\/j.jnca.2010.12.010.","journal-title":"J Netw Comput Appl"},{"key":"4108_CR25","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/electronics11152282","volume":"11","author":"TM Behera","year":"2022","unstructured":"Behera TM, Samal UC, Mohapatra SK, Khan MS, Appasani B, Bizon N, et al. Energy-efficient routing protocols for wireless sensor networks: architectures, strategies, and performance. Electronics. 2022;11:4. https:\/\/doi.org\/10.3390\/electronics11152282.","journal-title":"Electronics"},{"key":"4108_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/en13113024","author":"C Del-Valle-Soto","year":"2020","unstructured":"Del-Valle-Soto C, Vel\u00e1zquez R, Valdivia LJ, Giannoccaro NI, Visconti P. An energy model using sleeping algorithms for wireless sensor networks under proactive and reactive protocols: a performance evaluation. Energies. 2020. https:\/\/doi.org\/10.3390\/en13113024.","journal-title":"Energies"},{"key":"4108_CR27","doi-asserted-by":"publisher","DOI":"10.3390\/s16030418","author":"C Carrascal","year":"2016","unstructured":"Carrascal C, Demirkol I, Paradells J. On-demand sensor node wake-up using solar panels and visible light communication. Sensors. 2016. https:\/\/doi.org\/10.3390\/s16030418.","journal-title":"Sensors"},{"key":"4108_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/s19133017","author":"X Liu","year":"2019","unstructured":"Liu X, Wu J. A method for energy balance and data transmission optimal routing in wireless sensor networks. Sensors. 2019. https:\/\/doi.org\/10.3390\/s19133017.","journal-title":"Sensors"},{"key":"4108_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100765","volume":"22","author":"AMK Abdulzahra","year":"2023","unstructured":"Abdulzahra AMK, Al-Qurabat AKM, Abdulzahra SA. Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods. Internet of Things (Netherlands). 2023;22: 100765. https:\/\/doi.org\/10.1016\/j.iot.2023.100765.","journal-title":"Internet of Things (Netherlands)"},{"key":"4108_CR30","doi-asserted-by":"publisher","unstructured":"Gokula Krishnan V, Venkateswara Rao P, Divya V. An Energy Efficient Routing Protocol based on SMO Optimization in WSN. In: 6th International Conference of Communication and Electronic Systemt ICCES 2021. 2021. p. 1040\u20137. https:\/\/doi.org\/10.1109\/ICCES51350.2021.9489163.","DOI":"10.1109\/ICCES51350.2021.9489163"},{"key":"4108_CR31","doi-asserted-by":"publisher","first-page":"96002","DOI":"10.1109\/ACCESS.2021.3094541","volume":"9","author":"C Punriboon","year":"2021","unstructured":"Punriboon C, So-In C, Aimtongkham P, Leelathakul N. Fuzzy logic-based path planning for data gathering mobile sinks in WSNs. IEEE Access. 2021;9:96002\u201320. https:\/\/doi.org\/10.1109\/ACCESS.2021.3094541.","journal-title":"IEEE Access"},{"key":"4108_CR32","doi-asserted-by":"publisher","unstructured":"Punriboon C, Aimtongkham P, Leelathakul N, So-In C. A heuristic-based efficient path planning scheme for data gathering WSNs using mobile sinks. In: ICSEC 2021 - 25th Int. Comput. Sci. Eng. Conf. 2021. p. 87\u201392. https:\/\/doi.org\/10.1109\/ICSEC53205.2021.9684598.","DOI":"10.1109\/ICSEC53205.2021.9684598"},{"key":"4108_CR33","doi-asserted-by":"publisher","unstructured":"He L, Zhuang Y, Pan J, Xu J. Evaluating on-demand data collection with mobile elements in wireless sensor networks. In: IEEE Vehicular Technology Conference 2010. p. 1\u20135. https:\/\/doi.org\/10.1109\/VETECF.2010.5594515.","DOI":"10.1109\/VETECF.2010.5594515"},{"key":"4108_CR34","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1109\/TMC.2014.2368557","volume":"14","author":"L He","year":"2015","unstructured":"He L, Kong L, Gu Y, Pan J, Zhu T. Evaluating the on-demand mobile charging in wireless sensor networks. IEEE Trans Mob Comput. 2015;14:1861\u201375. https:\/\/doi.org\/10.1109\/TMC.2014.2368557.","journal-title":"IEEE Trans Mob Comput"},{"key":"4108_CR35","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-981-33-6393-9_27","volume-title":"Trends wireless communication information security Singapore","author":"S Gupta","year":"2021","unstructured":"Gupta S, Akhtar MAK. A review of wireless charging in WSN. In: Chakraborty M, Jha RK, Balas VE, Sur SN, Kandar D, editors. Trends wireless communication information security Singapore. Springer Singapore; 2021. p. 261\u201371."},{"key":"4108_CR36","doi-asserted-by":"publisher","first-page":"10131","DOI":"10.1109\/JSEN.2019.2928169","volume":"19","author":"Y Feng","year":"2019","unstructured":"Feng Y, Guo L, Fu X, Liu N. Efficient mobile energy replenishment scheme based on hybrid mode for wireless rechargeable sensor networks. IEEE Sens J. 2019;19:10131\u201343. https:\/\/doi.org\/10.1109\/JSEN.2019.2928169.","journal-title":"IEEE Sens J"},{"key":"4108_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101074","volume":"59","author":"A Tomar","year":"2019","unstructured":"Tomar A, Muduli L, Jana PK. An efficient scheduling scheme for on-demand mobile charging in wireless rechargeable sensor networks. Pervasive Mob Comput. 2019;59: 101074. https:\/\/doi.org\/10.1016\/j.pmcj.2019.101074.","journal-title":"Pervasive Mob Comput"},{"key":"4108_CR38","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.comcom.2020.01.037","volume":"152","author":"C Zhao","year":"2020","unstructured":"Zhao C, Zhang H, Chen F, Chen S, Wu C, Wang T. Spatiotemporal charging scheduling in wireless rechargeable sensor networks. Comput Commun. 2020;152:155\u201370. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.037.","journal-title":"Comput Commun"},{"key":"4108_CR39","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/JSYST.2020.2968628","volume":"15","author":"K Wang","year":"2021","unstructured":"Wang K, Wang L, Obaidat MS, Lin C, Alam M. Extending network lifetime for wireless rechargeable sensor network systems through partial charge. IEEE Syst J. 2021;15:1307\u201317. https:\/\/doi.org\/10.1109\/JSYST.2020.2968628.","journal-title":"IEEE Syst J"},{"key":"4108_CR40","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.comcom.2023.03.022","volume":"204","author":"R Das","year":"2023","unstructured":"Das R, Dash D. Joint on-demand data gathering and recharging by multiple mobile vehicles in delay sensitive WRSN using variable length GA. Comput Commun. 2023;204:130\u201346. https:\/\/doi.org\/10.1016\/j.comcom.2023.03.022.","journal-title":"Comput Commun"},{"key":"4108_CR41","doi-asserted-by":"publisher","first-page":"93731","DOI":"10.1109\/ACCESS.2022.3203410","volume":"10","author":"Y Jia","year":"2022","unstructured":"Jia Y, Jiahao W, Zeyu J, Ruizhao P. Multimobile charger charging strategy based on dual partitioning model for wireless rechargeable sensor networks. IEEE Access. 2022;10:93731\u201344. https:\/\/doi.org\/10.1109\/ACCESS.2022.3203410.","journal-title":"IEEE Access"},{"key":"4108_CR42","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.eswa.2019.02.018","volume":"126","author":"P Hilletofth","year":"2019","unstructured":"Hilletofth P, Sequeira M, Adlemo A. Three novel fuzzy logic concepts applied to reshoring decision-making. Expert Syst Appl. 2019;126:133\u201343. https:\/\/doi.org\/10.1016\/j.eswa.2019.02.018.","journal-title":"Expert Syst Appl"},{"key":"4108_CR43","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/41.538609","volume":"43","author":"KF Man","year":"1996","unstructured":"Man KF, Tang KS, Kwong S. Genetic algorithms: concepts and applications. IEEE Trans Ind Electron. 1996;43:519\u201334. https:\/\/doi.org\/10.1109\/41.538609.","journal-title":"IEEE Trans Ind Electron"},{"key":"4108_CR44","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/BF02823145","volume":"24","author":"K Deb","year":"1999","unstructured":"Deb K. An introduction to genetic algorithms. Sadhana. 1999;24:293\u2013315. https:\/\/doi.org\/10.1007\/BF02823145.","journal-title":"Sadhana"},{"key":"4108_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110599","volume":"145","author":"F Fanian","year":"2023","unstructured":"Fanian F, Kuchaki RM. Three-stage fuzzy-metaheuristic algorithm for smart cities: scheduling mobile charging and automatic rule tuning in WRSNs. Appl Soft Comput. 2023;145: 110599. https:\/\/doi.org\/10.1016\/j.asoc.2023.110599.","journal-title":"Appl Soft Comput"},{"key":"4108_CR46","doi-asserted-by":"publisher","first-page":"17169","DOI":"10.1109\/JSEN.2024.3381985","volume":"24","author":"T Deng","year":"2024","unstructured":"Deng T, Tang S, Chen Y, Lin F. A hybrid charging scheme for minimizing the number of energy-exhausted nodes in wireless rechargeable sensor networks. IEEE Sens J. 2024;24:17169\u201382. https:\/\/doi.org\/10.1109\/JSEN.2024.3381985.","journal-title":"IEEE Sens J"},{"key":"4108_CR47","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1109\/COMST.2022.3189387","volume":"24","author":"A Kaswan","year":"2022","unstructured":"Kaswan A, Jana PK, Das SK. A survey on mobile charging techniques in wireless rechargeable sensor networks. IEEE Commun Surv Tutor. 2022;24:1750\u201379. https:\/\/doi.org\/10.1109\/COMST.2022.3189387.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4108_CR48","doi-asserted-by":"publisher","unstructured":"Halim NHB, Yaakob NB, Isa ABAM. Congestion control mechanism for Internet-of-Things (IOT) paradigm. In: 2016 3rd International Conference of Electronic Designs ICED 2016. 2017. p. 337\u201341. https:\/\/doi.org\/10.1109\/ICED.2016.7804663.","DOI":"10.1109\/ICED.2016.7804663"},{"key":"4108_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2017.7965620","author":"WM Kempa","year":"2017","unstructured":"Kempa WM. On buffer overflow duration in WSN with a vacation-type power saving mechanism. Int Conf Syst Signals, Image Process. 2017. https:\/\/doi.org\/10.1109\/IWSSIP.2017.7965620.","journal-title":"Int Conf Syst Signals, Image Process"},{"key":"4108_CR50","doi-asserted-by":"publisher","first-page":"3192","DOI":"10.1109\/TWC.2019.2911939","volume":"18","author":"C You","year":"2019","unstructured":"You C, Zhang R. 3D trajectory optimization in Rician fading for UAV-enabled data harvesting. IEEE Trans Wirel Commun. 2019;18:3192\u2013207. https:\/\/doi.org\/10.1109\/TWC.2019.2911939.","journal-title":"IEEE Trans Wirel Commun"},{"key":"4108_CR51","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TCOMM.2023.3327443","volume":"72","author":"S Karimi-Bidhendi","year":"2024","unstructured":"Karimi-Bidhendi S, Jafarkhani H. Outage-aware deployment in heterogeneous rayleigh fading wireless sensor networks. IEEE Trans Commun. 2024;72:1146\u201361. https:\/\/doi.org\/10.1109\/TCOMM.2023.3327443.","journal-title":"IEEE Trans Commun"},{"key":"4108_CR52","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1002\/wcm.736","volume":"10","author":"F Chen","year":"2010","unstructured":"Chen F, Wang N, German R, Dressler F. Simulation study of IEEE 802.15.4 LR-WPAN for industrial applications. Wirel Commun Mob Comput. 2010;10:609\u201321. https:\/\/doi.org\/10.1002\/wcm.736.","journal-title":"Wirel Commun Mob Comput"},{"key":"4108_CR53","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun. 2002;1:660\u201370. https:\/\/doi.org\/10.1109\/TWC.2002.804190.","journal-title":"IEEE Trans Wirel Commun"},{"key":"4108_CR54","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TMC.2011.22","volume":"11","author":"O Durmaz Incel","year":"2012","unstructured":"Durmaz Incel O, Ghosh A, Krishnamachari B, Chintalapudi K. Fast data collection in tree-based wireless sensor networks. IEEE Trans Mob Comput. 2012;11:86\u201399. https:\/\/doi.org\/10.1109\/TMC.2011.22.","journal-title":"IEEE Trans Mob Comput"},{"key":"4108_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani EH, Assilian S. An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud. 1975;7:1\u201313. https:\/\/doi.org\/10.1016\/S0020-7373(75)80002-2.","journal-title":"Int J Man Mach Stud"},{"key":"4108_CR56","doi-asserted-by":"publisher","first-page":"58967","DOI":"10.1109\/ACCESS.2021.3072625","volume":"9","author":"P Aimtongkham","year":"2021","unstructured":"Aimtongkham P, Horkaew P, So-In C. An enhanced CoAP scheme using fuzzy logic with adaptive timeout for IoT congestion control. IEEE Access. 2021;9:58967\u201381. https:\/\/doi.org\/10.1109\/ACCESS.2021.3072625.","journal-title":"IEEE Access"},{"key":"4108_CR57","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5121\/acij.2011.2403","volume":"2","author":"EP Ephzibah","year":"2011","unstructured":"Ephzibah EP. Time complexity analysis of genetic- fuzzy system for disease diagnosis. Adv Comput An Int J. 2011;2:23\u201331. https:\/\/doi.org\/10.5121\/acij.2011.2403.","journal-title":"Adv Comput An Int J"},{"key":"4108_CR58","doi-asserted-by":"publisher","unstructured":"Behera N. Analysis of microarray gene expression data using information theory and stochastic algorithm. In: Srinivasa Rao ASR, Rao CR, editors. Handb. Stat., vol. 43. Elsevier; 2020. p. 349\u201378. https:\/\/doi.org\/10.1016\/bs.host.2020.02.002.","DOI":"10.1016\/bs.host.2020.02.002"},{"key":"4108_CR59","doi-asserted-by":"publisher","first-page":"3464","DOI":"10.1109\/glocom.2004.1379010","volume":"6","author":"J Yang","year":"2004","unstructured":"Yang J, Yifan Z, Ying W, Ping Z. Average rate updating mechanism in proportional fair scheduler for HDR. GLOBECOM - IEEE Glob Telecommun Conf. 2004;6:3464\u20136. https:\/\/doi.org\/10.1109\/glocom.2004.1379010.","journal-title":"GLOBECOM - IEEE Glob Telecommun Conf"},{"key":"4108_CR60","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/TWC.2004.830826","volume":"3","author":"HJ Kushner","year":"2004","unstructured":"Kushner HJ, Whiting PA. Convergence of proportional-fair sharing algorithms under general conditions. IEEE Trans Wirel Commun. 2004;3:1250\u20139. https:\/\/doi.org\/10.1109\/TWC.2004.830826.","journal-title":"IEEE Trans Wirel Commun"},{"key":"4108_CR61","doi-asserted-by":"publisher","unstructured":"Joshi D, Chaudhary A, Bhaskar L. Implementation of Wireless Charging for Electronic Gadgets. In: 2023 14th International Conference of Computer Communication Network Technology ICCCNT 2023. Institute of Electrical and Electronics Engineers Inc.; 2023. p. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10307066.","DOI":"10.1109\/ICCCNT56998.2023.10307066"},{"key":"4108_CR62","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/COMST.2015.2499783","volume":"18","author":"X Lu","year":"2016","unstructured":"Lu X, Wang P, Niyato D, Kim DI, Han Z. Wireless charging technologies: fundamentals, standards, and network applications. IEEE Commun Surv Tutor. 2016;18:1413\u201352. https:\/\/doi.org\/10.1109\/COMST.2015.2499783.","journal-title":"IEEE Commun Surv Tutor"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04108-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04108-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04108-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T01:01:20Z","timestamp":1750899680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04108-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":62,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4108"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04108-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2025,6,25]]},"assertion":[{"value":"17 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"589"}}