{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:31:11Z","timestamp":1730248271083,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10225782","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T13:26:12Z","timestamp":1693315572000},"page":"613-619","source":"Crossref","is-referenced-by-count":0,"title":["Integrated Boolean Sensing and Event Radius Model on Data Aggregation in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Adawy","sequence":"first","affiliation":[{"name":"The World Islamic Sciences and Education University,Department of Information System and Networks,Jordan"}]},{"given":"Omar","family":"Almomani","sequence":"additional","affiliation":[{"name":"The World Islamic Sciences and Education University,Department of Information System and Networks,Jordan"}]},{"given":"Muhannad","family":"Tahboush","sequence":"additional","affiliation":[{"name":"The World Islamic Sciences and Education University,Department of Information System and Networks,Jordan"}]},{"given":"Ahmad","family":"Althunibat","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Department of Software Engineering,Amman,Jordan,11733"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.15849\/IJASCA.230720.18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15849\/IJASCA.230720.12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11213571"},{"key":"ref14","first-page":"1","article-title":"Data redundancy reduction in wireless sensor network","volume":"10","author":"adawy","year":"2018","journal-title":"J Telecommun Electron Comput Eng"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.367"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.75"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8121513"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s22155675"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2103380.2103417"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2015.7469596"},{"key":"ref18","first-page":"303","article-title":"Smart remote sensing network for early warning of disaster risks","author":"gupta","year":"2022","journal-title":"Nanotechnology-Based Smart Remote Sensing Networks for Disaster Prevention"},{"key":"ref51","first-page":"1","author":"hossain","year":"2014","journal-title":"Sensing and Link Model for Wireless Sensor Network Coverage and Connectivity Analysis"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1035242"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5220\/0006581900850090"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.19"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1201\/9780203323687.ch28"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1046\/j.1570-7458.2002.00982.x"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.77"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200628"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958496"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.123"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2017.11.096"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.283821"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s120607350"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s20082311"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.53"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.905624"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2008.4798455"},{"key":"ref34","first-page":"705","article-title":"Redundancy and Its Applications in Wireless Sensor Networks: A Survey","volume":"8","author":"curiac","year":"2009","journal-title":"WSEAS Trans Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978?1-4419-7997-172"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11599463"},{"key":"ref31","first-page":"1","article-title":"Modelling Data-Centric Routing in Wireless Sensor Networks","author":"krishnamachari","year":"2002","journal-title":"IEEE INFOCOM"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/su141912417"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2900325"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NetCoM.2009.12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.06.05"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102660"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/mahss.2004.1392188"},{"journal-title":"A proposed framework for Botnet Spam-email Filtering using Neucube","year":"2017","author":"alauthman","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.244"},{"key":"ref26","article-title":"An efficient design of RPL objective function for routing in internet of things using fuzzy logic","volume":"10","author":"saaidah","year":"2019","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2002.1030829"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.016113"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i6.pp6461-6471"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3407"},{"key":"ref28","first-page":"98","article-title":"An investigation of digital forensics for shamoon attack behaviour in FOG computing and threat intelligence for incident response","volume":"15","author":"almaiah","year":"2020","journal-title":"J Theor Appl Inf Technol"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v2n4p89"},{"key":"ref29","first-page":"106","article-title":"Avoidance of Data Redundancy In Wireless Sensor Network","volume":"3","author":"amala","year":"2017","journal-title":"Int J Innov Res Sci Eng"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10225782.pdf?arnumber=10225782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:43:27Z","timestamp":1695044607000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10225782","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}