{"id":"https://openalex.org/W4414493307","doi":"https://doi.org/10.1007/s12083-025-02107-4","title":"An fuzzy fault tree analysis with evidence theory based efficient fault node diagnosis in wireless sensor networks","display_name":"An fuzzy fault tree analysis with evidence theory based efficient fault node diagnosis in wireless sensor networks","publication_year":2025,"publication_date":"2025-09-25","ids":{"openalex":"https://openalex.org/W4414493307","doi":"https://doi.org/10.1007/s12083-025-02107-4"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-025-02107-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02107-4","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073967621","display_name":"Bala Murali Nagarajan","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nagarajan B","raw_affiliation_strings":["School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090303016","display_name":"S. V. N. Santhosh Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santhosh Kumar SVN","raw_affiliation_strings":["School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073967621"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14123639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.8553000092506409},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6498000025749207},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5802000164985657},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.5069000124931335},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.4546999931335449},{"id":"https://openalex.org/keywords/soft-sensor","display_name":"Soft sensor","score":0.4413999915122986},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.42340001463890076},{"id":"https://openalex.org/keywords/mobile-wireless-sensor-network","display_name":"Mobile wireless sensor network","score":0.420199990272522},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.40400001406669617}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.8553000092506409},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6498000025749207},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5802000164985657},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5461000204086304},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.5069000124931335},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4943000078201294},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.4546999931335449},{"id":"https://openalex.org/C115575686","wikidata":"https://www.wikidata.org/wiki/Q18822403","display_name":"Soft sensor","level":3,"score":0.4413999915122986},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.42340001463890076},{"id":"https://openalex.org/C7091991","wikidata":"https://www.wikidata.org/wiki/Q17149548","display_name":"Mobile wireless sensor network","level":5,"score":0.420199990272522},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.40400001406669617},{"id":"https://openalex.org/C10000559","wikidata":"https://www.wikidata.org/wiki/Q4975143","display_name":"Brooks\u2013Iyengar algorithm","level":5,"score":0.40389999747276306},{"id":"https://openalex.org/C107094494","wikidata":"https://www.wikidata.org/wiki/Q428453","display_name":"Fault tree analysis","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.37709999084472656},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.36340001225471497},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3506999909877777},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3499999940395355},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.34529998898506165},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.335099995136261},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C21267803","wikidata":"https://www.wikidata.org/wiki/Q5438159","display_name":"Fault indicator","level":4,"score":0.29829999804496765},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.29789999127388},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.29179999232292175},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2896000146865845},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28060001134872437},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C2775846686","wikidata":"https://www.wikidata.org/wiki/Q643012","display_name":"Condition monitoring","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C176563091","wikidata":"https://www.wikidata.org/wiki/Q669238","display_name":"Intelligent sensor","level":3,"score":0.2565999925136566},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12083-025-02107-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02107-4","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1600834507","https://openalex.org/W2095964425","https://openalex.org/W2117079761","https://openalex.org/W2411967963","https://openalex.org/W2613147492","https://openalex.org/W2766116619","https://openalex.org/W2767507316","https://openalex.org/W2905927941","https://openalex.org/W2950346908","https://openalex.org/W2966990984","https://openalex.org/W3004498436","https://openalex.org/W3100087300","https://openalex.org/W3126107949","https://openalex.org/W3169915074","https://openalex.org/W3191903242","https://openalex.org/W3212683848","https://openalex.org/W4200128743","https://openalex.org/W4224322169","https://openalex.org/W4281996442","https://openalex.org/W4294591967","https://openalex.org/W4295346198","https://openalex.org/W4295926602","https://openalex.org/W4303182758","https://openalex.org/W4317435533","https://openalex.org/W4319300614","https://openalex.org/W4376456833","https://openalex.org/W4382243300","https://openalex.org/W4385552039","https://openalex.org/W4390610500","https://openalex.org/W4391929178","https://openalex.org/W4394885775","https://openalex.org/W4398768939","https://openalex.org/W4402769498"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
