A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network Article Swipe
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.4108/icst.mobimedia.2015.259030
In wireless sensor network, the processing ability of the sensor nodes is poor. And the security situational element acquisition is also a serious problem. Thus, this paper proposes a hierarchical framework of security situational elements acquisition mechanism. In this framework, support vector machine hyper sphere multi class algorithm is introduced as basic classifier. The method of attribute reduction uses non negative matrix factorization algorithm. The fuzzy classification algorithm used to initialize non negative matrix factorization, in order to avoid the local optimal which is caused by non negative matrix factorization random initialization. In the sink node classification rules and attribute reduction rules are formed by learning. The classification analyses respectively focus on the cluster head and sink node, which can reduce the requirement of the sensor node properties. Attribute reduction before the data transmission, which reduces communication consumption data transmission, improves the performance of classifiers. By simulation analysis, the scheme has preferably accuracy in the situation elements acquisiton, and smaller communication overhead in the process of information transmission.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.4108/icst.mobimedia.2015.259030
- http://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030
- OA Status
- gold
- References
- 5
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2296588934
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2296588934Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.4108/icst.mobimedia.2015.259030Digital Object Identifier
- Title
-
A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-01-01Full publication date if available
- Authors
-
Fangwei Li, Yan Wang, Jiang Zhu, Xinyue ZhangList of authors in order
- Landing page
-
https://doi.org/10.4108/icst.mobimedia.2015.259030Publisher landing page
- PDF URL
-
https://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030Direct OA link when available
- Concepts
-
Wireless sensor network, Computer science, Mechanism (biology), Key distribution in wireless sensor networks, Situation awareness, Computer network, Element (criminal law), Wireless, Situation analysis, Wireless network, Computer security, Distributed computing, Telecommunications, Engineering, Business, Epistemology, Aerospace engineering, Philosophy, Law, Marketing, Political scienceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
5Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2296588934 |
|---|---|
| doi | https://doi.org/10.4108/icst.mobimedia.2015.259030 |
| ids.doi | https://doi.org/10.4108/icst.mobimedia.2015.259030 |
| ids.mag | 2296588934 |
| ids.openalex | https://openalex.org/W2296588934 |
| fwci | 0.0 |
| type | article |
| title | A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10080 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9225999712944031 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Energy Efficient Wireless Sensor Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C24590314 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8113653063774109 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q336038 |
| concepts[0].display_name | Wireless sensor network |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.665657639503479 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C89611455 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6148911714553833 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q6804646 |
| concepts[2].display_name | Mechanism (biology) |
| concepts[3].id | https://openalex.org/C41971633 |
| concepts[3].level | 4 |
| concepts[3].score | 0.612946093082428 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q6398155 |
| concepts[3].display_name | Key distribution in wireless sensor networks |
| concepts[4].id | https://openalex.org/C145804949 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5173510909080505 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q478123 |
| concepts[4].display_name | Situation awareness |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.4937528073787689 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C200288055 |
| concepts[6].level | 2 |
| concepts[6].score | 0.46167895197868347 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2621792 |
| concepts[6].display_name | Element (criminal law) |
| concepts[7].id | https://openalex.org/C555944384 |
| concepts[7].level | 2 |
| concepts[7].score | 0.45728203654289246 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[7].display_name | Wireless |
| concepts[8].id | https://openalex.org/C14911803 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4493020176887512 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q7532148 |
| concepts[8].display_name | Situation analysis |
| concepts[9].id | https://openalex.org/C108037233 |
| concepts[9].level | 3 |
| concepts[9].score | 0.43115609884262085 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11375 |
| concepts[9].display_name | Wireless network |
| concepts[10].id | https://openalex.org/C38652104 |
| concepts[10].level | 1 |
| concepts[10].score | 0.3733120560646057 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[10].display_name | Computer security |
| concepts[11].id | https://openalex.org/C120314980 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3331880569458008 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[11].display_name | Distributed computing |
| concepts[12].id | https://openalex.org/C76155785 |
| concepts[12].level | 1 |
| concepts[12].score | 0.19798529148101807 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[12].display_name | Telecommunications |
| concepts[13].id | https://openalex.org/C127413603 |
| concepts[13].level | 0 |
| concepts[13].score | 0.157674640417099 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[13].display_name | Engineering |
| concepts[14].id | https://openalex.org/C144133560 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[14].display_name | Business |
| concepts[15].id | https://openalex.org/C111472728 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q9471 |
| concepts[15].display_name | Epistemology |
| concepts[16].id | https://openalex.org/C146978453 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q3798668 |
| concepts[16].display_name | Aerospace engineering |
| concepts[17].id | https://openalex.org/C138885662 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q5891 |
| concepts[17].display_name | Philosophy |
| concepts[18].id | https://openalex.org/C199539241 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[18].display_name | Law |
| concepts[19].id | https://openalex.org/C162853370 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q39809 |
| concepts[19].display_name | Marketing |
| concepts[20].id | https://openalex.org/C17744445 |
| concepts[20].level | 0 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[20].display_name | Political science |
| keywords[0].id | https://openalex.org/keywords/wireless-sensor-network |
| keywords[0].score | 0.8113653063774109 |
| keywords[0].display_name | Wireless sensor network |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.665657639503479 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/mechanism |
| keywords[2].score | 0.6148911714553833 |
| keywords[2].display_name | Mechanism (biology) |
| keywords[3].id | https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks |
| keywords[3].score | 0.612946093082428 |
| keywords[3].display_name | Key distribution in wireless sensor networks |
| keywords[4].id | https://openalex.org/keywords/situation-awareness |
| keywords[4].score | 0.5173510909080505 |
| keywords[4].display_name | Situation awareness |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.4937528073787689 |
| keywords[5].display_name | Computer network |
| keywords[6].id | https://openalex.org/keywords/element |
| keywords[6].score | 0.46167895197868347 |
| keywords[6].display_name | Element (criminal law) |
| keywords[7].id | https://openalex.org/keywords/wireless |
| keywords[7].score | 0.45728203654289246 |
| keywords[7].display_name | Wireless |
| keywords[8].id | https://openalex.org/keywords/situation-analysis |
| keywords[8].score | 0.4493020176887512 |
| keywords[8].display_name | Situation analysis |
| keywords[9].id | https://openalex.org/keywords/wireless-network |
| keywords[9].score | 0.43115609884262085 |
| keywords[9].display_name | Wireless network |
| keywords[10].id | https://openalex.org/keywords/computer-security |
| keywords[10].score | 0.3733120560646057 |
| keywords[10].display_name | Computer security |
| keywords[11].id | https://openalex.org/keywords/distributed-computing |
| keywords[11].score | 0.3331880569458008 |
| keywords[11].display_name | Distributed computing |
| keywords[12].id | https://openalex.org/keywords/telecommunications |
| keywords[12].score | 0.19798529148101807 |
| keywords[12].display_name | Telecommunications |
| keywords[13].id | https://openalex.org/keywords/engineering |
| keywords[13].score | 0.157674640417099 |
| keywords[13].display_name | Engineering |
| language | en |
| locations[0].id | doi:10.4108/icst.mobimedia.2015.259030 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | http://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the 8th International Conference on Mobile Multimedia Communications |
| locations[0].landing_page_url | https://doi.org/10.4108/icst.mobimedia.2015.259030 |
| locations[1].id | pmh:oai:doaj.org/article:4fd0de0f224d4ebd8cf07687c49a0651 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | EAI Endorsed Transactions on Security and Safety, Vol 2, Iss 6, Pp 1-4 (2015) |
| locations[1].landing_page_url | https://doaj.org/article/4fd0de0f224d4ebd8cf07687c49a0651 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5102002293 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Fangwei Li |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I10535382 |
| authorships[0].affiliations[0].raw_affiliation_string | Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[0].institutions[0].id | https://openalex.org/I10535382 |
| authorships[0].institutions[0].ror | https://ror.org/03dgaqz26 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I10535382 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Chongqing University of Posts and Telecommunications |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Li Fangwei |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[1].author.id | https://openalex.org/A5100696617 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-6777-9803 |
| authorships[1].author.display_name | Yan Wang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I10535382 |
| authorships[1].affiliations[0].raw_affiliation_string | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[1].institutions[0].id | https://openalex.org/I10535382 |
| authorships[1].institutions[0].ror | https://ror.org/03dgaqz26 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I10535382 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Chongqing University of Posts and Telecommunications |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wang Yan |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[2].author.id | https://openalex.org/A5100694509 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-4726-2206 |
| authorships[2].author.display_name | Jiang Zhu |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I10535382 |
| authorships[2].affiliations[0].raw_affiliation_string | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[2].institutions[0].id | https://openalex.org/I10535382 |
| authorships[2].institutions[0].ror | https://ror.org/03dgaqz26 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I10535382 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Chongqing University of Posts and Telecommunications |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Zhu Jiang |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[3].author.id | https://openalex.org/A5100319962 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-4243-083X |
| authorships[3].author.display_name | Xinyue Zhang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I10535382 |
| authorships[3].affiliations[0].raw_affiliation_string | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| authorships[3].institutions[0].id | https://openalex.org/I10535382 |
| authorships[3].institutions[0].ror | https://ror.org/03dgaqz26 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I10535382 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Chongqing University of Posts and Telecommunications |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Zhang Xinyue |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10080 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9225999712944031 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Energy Efficient Wireless Sensor Networks |
| related_works | https://openalex.org/W95064529, https://openalex.org/W2031258546, https://openalex.org/W2148519335, https://openalex.org/W2371032752, https://openalex.org/W2160951215, https://openalex.org/W1601997479, https://openalex.org/W2143767096, https://openalex.org/W2909923498, https://openalex.org/W4382644910, https://openalex.org/W2322913552 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.4108/icst.mobimedia.2015.259030 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | http://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the 8th International Conference on Mobile Multimedia Communications |
| best_oa_location.landing_page_url | https://doi.org/10.4108/icst.mobimedia.2015.259030 |
| primary_location.id | doi:10.4108/icst.mobimedia.2015.259030 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | http://eudl.eu/pdf/10.4108/icst.mobimedia.2015.259030 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the 8th International Conference on Mobile Multimedia Communications |
| primary_location.landing_page_url | https://doi.org/10.4108/icst.mobimedia.2015.259030 |
| publication_date | 2015-01-01 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W3163925244, https://openalex.org/W2364720493, https://openalex.org/W2165012164, https://openalex.org/W1988251340, https://openalex.org/W2003780581 |
| referenced_works_count | 5 |
| abstract_inverted_index.a | 21, 28 |
| abstract_inverted_index.By | 145 |
| abstract_inverted_index.In | 0, 37, 92 |
| abstract_inverted_index.as | 50 |
| abstract_inverted_index.by | 85, 104 |
| abstract_inverted_index.in | 75, 153, 162 |
| abstract_inverted_index.is | 11, 19, 48, 83 |
| abstract_inverted_index.of | 7, 31, 55, 123, 143, 165 |
| abstract_inverted_index.on | 111 |
| abstract_inverted_index.to | 69, 77 |
| abstract_inverted_index.And | 13 |
| abstract_inverted_index.The | 53, 64, 106 |
| abstract_inverted_index.and | 98, 115, 158 |
| abstract_inverted_index.are | 102 |
| abstract_inverted_index.can | 119 |
| abstract_inverted_index.has | 150 |
| abstract_inverted_index.non | 59, 71, 86 |
| abstract_inverted_index.the | 4, 8, 14, 79, 93, 112, 121, 124, 131, 141, 148, 154, 163 |
| abstract_inverted_index.also | 20 |
| abstract_inverted_index.data | 132, 138 |
| abstract_inverted_index.head | 114 |
| abstract_inverted_index.node | 95, 126 |
| abstract_inverted_index.sink | 94, 116 |
| abstract_inverted_index.this | 25, 38 |
| abstract_inverted_index.used | 68 |
| abstract_inverted_index.uses | 58 |
| abstract_inverted_index.Thus, | 24 |
| abstract_inverted_index.avoid | 78 |
| abstract_inverted_index.basic | 51 |
| abstract_inverted_index.class | 46 |
| abstract_inverted_index.focus | 110 |
| abstract_inverted_index.fuzzy | 65 |
| abstract_inverted_index.hyper | 43 |
| abstract_inverted_index.local | 80 |
| abstract_inverted_index.multi | 45 |
| abstract_inverted_index.node, | 117 |
| abstract_inverted_index.nodes | 10 |
| abstract_inverted_index.order | 76 |
| abstract_inverted_index.paper | 26 |
| abstract_inverted_index.poor. | 12 |
| abstract_inverted_index.rules | 97, 101 |
| abstract_inverted_index.which | 82, 118, 134 |
| abstract_inverted_index.before | 130 |
| abstract_inverted_index.caused | 84 |
| abstract_inverted_index.formed | 103 |
| abstract_inverted_index.matrix | 61, 73, 88 |
| abstract_inverted_index.method | 54 |
| abstract_inverted_index.random | 90 |
| abstract_inverted_index.reduce | 120 |
| abstract_inverted_index.scheme | 149 |
| abstract_inverted_index.sensor | 2, 9, 125 |
| abstract_inverted_index.sphere | 44 |
| abstract_inverted_index.vector | 41 |
| abstract_inverted_index.ability | 6 |
| abstract_inverted_index.cluster | 113 |
| abstract_inverted_index.element | 17 |
| abstract_inverted_index.machine | 42 |
| abstract_inverted_index.optimal | 81 |
| abstract_inverted_index.process | 164 |
| abstract_inverted_index.reduces | 135 |
| abstract_inverted_index.serious | 22 |
| abstract_inverted_index.smaller | 159 |
| abstract_inverted_index.support | 40 |
| abstract_inverted_index.accuracy | 152 |
| abstract_inverted_index.analyses | 108 |
| abstract_inverted_index.elements | 34, 156 |
| abstract_inverted_index.improves | 140 |
| abstract_inverted_index.negative | 60, 72, 87 |
| abstract_inverted_index.network, | 3 |
| abstract_inverted_index.overhead | 161 |
| abstract_inverted_index.problem. | 23 |
| abstract_inverted_index.proposes | 27 |
| abstract_inverted_index.security | 15, 32 |
| abstract_inverted_index.wireless | 1 |
| abstract_inverted_index.Attribute | 128 |
| abstract_inverted_index.algorithm | 47, 67 |
| abstract_inverted_index.analysis, | 147 |
| abstract_inverted_index.attribute | 56, 99 |
| abstract_inverted_index.framework | 30 |
| abstract_inverted_index.learning. | 105 |
| abstract_inverted_index.reduction | 57, 100, 129 |
| abstract_inverted_index.situation | 155 |
| abstract_inverted_index.algorithm. | 63 |
| abstract_inverted_index.framework, | 39 |
| abstract_inverted_index.initialize | 70 |
| abstract_inverted_index.introduced | 49 |
| abstract_inverted_index.mechanism. | 36 |
| abstract_inverted_index.preferably | 151 |
| abstract_inverted_index.processing | 5 |
| abstract_inverted_index.simulation | 146 |
| abstract_inverted_index.acquisition | 18, 35 |
| abstract_inverted_index.acquisiton, | 157 |
| abstract_inverted_index.classifier. | 52 |
| abstract_inverted_index.consumption | 137 |
| abstract_inverted_index.information | 166 |
| abstract_inverted_index.performance | 142 |
| abstract_inverted_index.properties. | 127 |
| abstract_inverted_index.requirement | 122 |
| abstract_inverted_index.situational | 16, 33 |
| abstract_inverted_index.classifiers. | 144 |
| abstract_inverted_index.hierarchical | 29 |
| abstract_inverted_index.respectively | 109 |
| abstract_inverted_index.communication | 136, 160 |
| abstract_inverted_index.factorization | 62, 89 |
| abstract_inverted_index.transmission, | 133, 139 |
| abstract_inverted_index.transmission. | 167 |
| abstract_inverted_index.classification | 66, 96, 107 |
| abstract_inverted_index.factorization, | 74 |
| abstract_inverted_index.initialization. | 91 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/1 |
| sustainable_development_goals[0].score | 0.47999998927116394 |
| sustainable_development_goals[0].display_name | No poverty |
| citation_normalized_percentile.value | 0.16948906 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |