{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T01:21:39Z","timestamp":1720315299772},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["309147\/2016-6"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","doi-asserted-by":"publisher","award":["E-26\/202.824\/2015","E-26\/203.11\/2017","E-26\/210.365\/2018"],"id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1016\/j.eswa.2021.116045","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T01:16:27Z","timestamp":1634606187000},"page":"116045","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["POSIMNET-R: An immunologic resilient approach to position routers in Industrial Wireless Sensor Networks"],"prefix":"10.1016","volume":"188","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5281-1313","authenticated-orcid":false,"given":"Carlos Augusto Ribeiro","family":"Soares","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6921-7756","authenticated-orcid":false,"given":"Rodrigo","family":"de Souza Couto","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2018-6386","authenticated-orcid":false,"given":"Alexandre","family":"Sztajnberg","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6580-5668","authenticated-orcid":false,"given":"Jorge Lu\u00eds Machado","family":"do Amaral","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2021.116045_b1","series-title":"Broadcast range of WirelessHART transmitters","author":"Abbott","year":"2014"},{"key":"10.1016\/j.eswa.2021.116045_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.003","article-title":"Deployment strategies in the wireless sensor network: A comprehensive review","volume":"91\u201392","author":"Abdollahzadeh","year":"2016","journal-title":"Computer Communications"},{"key":"10.1016\/j.eswa.2021.116045_b3","series-title":"Wireless sensor networks (Vol. 4)","author":"Akyildiz","year":"2010"},{"key":"10.1016\/j.eswa.2021.116045_b4","series-title":"2006 IEEE intl conf on evolutionary computation","first-page":"2966","article-title":"An immune fault detection system for analog circuits with automatic detector generation","author":"Amaral","year":"2006"},{"issue":"2","key":"10.1016\/j.eswa.2021.116045_b5","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1002\/net.3230130210","article-title":"Calculating bounds on reachability and connectedness in stochastic networks","volume":"13","author":"Ball","year":"1983","journal-title":"Networks - An International Journal"},{"issue":"04","key":"10.1016\/j.eswa.2021.116045_b6","doi-asserted-by":"crossref","first-page":"273","DOI":"10.4236\/cn.2013.54034","article-title":"Genetic algorithm based node deployment in hybrid wireless sensor networks","volume":"5","author":"Banimelhem","year":"2013","journal-title":"Communications and Network"},{"key":"10.1016\/j.eswa.2021.116045_b7","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.engappai.2015.08.006","article-title":"Fault detection, diagnosis and recovery using artificial immune systems: A review","volume":"46","author":"Bayar","year":"2015","journal-title":"Engnieering Applications of Artificial Intelligence"},{"key":"10.1016\/j.eswa.2021.116045_b8","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.adhoc.2018.07.003","article-title":"Connectivity and coverage based protocols for wireless sensor networks","volume":"80","author":"Boukerche","year":"2018","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.eswa.2021.116045_b9","series-title":"The clonal selection theory of acquired immunity","author":"Burnet","year":"1959"},{"key":"10.1016\/j.eswa.2021.116045_b10","series-title":"Proceedings of the 16th international conference on enterprise information systems - Volume 3: ICEIS","first-page":"415","article-title":"Router nodes positioning for wireless networks using artificial immune systems","author":"Coelho","year":"2014"},{"key":"10.1016\/j.eswa.2021.116045_b11","series-title":"Artficial immune systems and their applications","author":"DasGupta","year":"1998"},{"key":"10.1016\/j.eswa.2021.116045_b12","series-title":"Artificial immune systems: A new computational intelligence approach","author":"De\u00a0Castro","year":"2002"},{"issue":"6","key":"10.1016\/j.eswa.2021.116045_b13","first-page":"793","article-title":"Sur la sphere vide","author":"Delaunay","year":"1934","journal-title":"Bulletin of the Academy of Science of the U.S.S.R. Classe des Science Mathematics et Nature"},{"key":"10.1016\/j.eswa.2021.116045_b14","series-title":"AMS wireless SNAP-ON\u2122 application","author":"Emerson.com","year":"2017"},{"key":"10.1016\/j.eswa.2021.116045_b15","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.jisa.2017.06.007","article-title":"Applications of artificial immune systems to computer security: A survey","volume":"35","author":"Fernandes","year":"2017","journal-title":"Journal of Information Security and Applications"},{"issue":"9","key":"10.1016\/j.eswa.2021.116045_b16","doi-asserted-by":"crossref","first-page":"1322","DOI":"10.1016\/j.mejo.2008.08.012","article-title":"Wired and wireless sensor networks for industrial applications","volume":"40","author":"Flammini","year":"2009","journal-title":"Microelectronics Journal"},{"issue":"Vol 16, No 1","key":"10.1016\/j.eswa.2021.116045_b17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1137\/0116001","article-title":"Steiner minimal trees","author":"Gilbert","year":"1968","journal-title":"SIAM Journal of Applied Mathematics"},{"key":"10.1016\/j.eswa.2021.116045_b18","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.eswa.2017.12.011","article-title":"An efficient genetic algorithm for large-scale planning of dense and robust industrial wireless networks","volume":"96","author":"Gong","year":"2018","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2021.116045_b19","series-title":"Smart agricultural services using deep learning, big data, and IoT","first-page":"113","article-title":"Internet of things and the role of wireless sensor networks in IoT","author":"Gupta","year":"2021"},{"key":"10.1016\/j.eswa.2021.116045_b20","doi-asserted-by":"crossref","unstructured":"Howard, A., Matari\u0107, M. J., & Sukhatme, G. S. (2002). Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. In 6th intl symp on distributed autonomous robotics systems. Fukuoka, Japan. (pp. 25\u201327).","DOI":"10.1007\/978-4-431-65941-9_30"},{"issue":"1","key":"10.1016\/j.eswa.2021.116045_b21","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/JSEN.2019.2940186","article-title":"Accurate empirical path-loss model based on particle swarm optimization for wireless sensor networks in smart agriculture","volume":"20","author":"Jawad","year":"2019","journal-title":"IEEE Sensors Journal"},{"key":"10.1016\/j.eswa.2021.116045_b22","first-page":"373","article-title":"Towards a network theory of the immune system","volume":"125","author":"Jerne","year":"1974","journal-title":"Annual of Immunology"},{"key":"10.1016\/j.eswa.2021.116045_b23","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/4652801","article-title":"Multiobjective optimization algorithms for wireless sensor networks","volume":"2020","author":"Kandris","year":"2020","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"11","key":"10.1016\/j.eswa.2021.116045_b24","first-page":"1141","article-title":"SFO: A toolbox for submodular function optimization","author":"Krause","year":"2010","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"10.1016\/j.eswa.2021.116045_b25","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/s11276-019-02171-8","article-title":"Adaptive cluster-based relay-node placement for disjoint wireless sensor networks","volume":"26","author":"Kumar","year":"2020","journal-title":"Wireless Networks"},{"key":"10.1016\/j.eswa.2021.116045_b26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.inffus.2018.09.013","article-title":"Machine learning algorithms for wireless sensor networks: A survey","volume":"49","author":"Kumar","year":"2019","journal-title":"Information Fusion"},{"key":"10.1016\/j.eswa.2021.116045_b27","series-title":"2019 international conference on power electronics, control and automation","first-page":"1","article-title":"Machine learning based energy efficient wireless sensor network","author":"Lata","year":"2019"},{"issue":"1","key":"10.1016\/j.eswa.2021.116045_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1496-z","article-title":"A spanning tree construction algorithm for industrial wireless sensor networks based on quantum artificial bee colony","volume":"2019","author":"Li","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"5","key":"10.1016\/j.eswa.2021.116045_b29","first-page":"711","article-title":"A hybrid evolutionary immune algorithm for multiobjective optimization problems","volume":"20","author":"Lin","year":"2016","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.eswa.2021.116045_b30","series-title":"Resilience","author":"Merriam-Webster","year":"2018"},{"issue":"2","key":"10.1016\/j.eswa.2021.116045_b31","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/TMC.2008.95","article-title":"Using local geometry for tunable topology control in sensor networks","volume":"8","author":"Poduri","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10.1016\/j.eswa.2021.116045_b32","series-title":"Advances in communication, signal processing, VLSI, and embedded systems","first-page":"161","article-title":"Energy-efficient communication using data aggregation and data compression techniques in wireless sensor networks: A survey","author":"Pushpalatha","year":"2020"},{"issue":"9","key":"10.1016\/j.eswa.2021.116045_b33","doi-asserted-by":"crossref","first-page":"2056","DOI":"10.1109\/TCYB.2015.2461651","article-title":"Constrained multiobjective optimization algorithm based on immune system model","volume":"46","author":"Qian","year":"2016","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.eswa.2021.116045_b34","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.comnet.2014.03.027","article-title":"Energy efficiency in wireless sensor networks: A top-down survey","volume":"67","author":"Rault","year":"2014","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2021.116045_b35","series-title":"International conference on innovative computing and communications","first-page":"571","article-title":"Analysis of data aggregation techniques in WSN","author":"Roy","year":"2020"},{"key":"10.1016\/j.eswa.2021.116045_b36","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-981-15-2125-6_10","article-title":"A comprehensive survey of intelligent-based hierarchical routing protocols for wireless sensor networks","author":"Sabor","year":"2020","journal-title":"Nature inspired computing for wireless sensor networks"},{"issue":"1","key":"10.1016\/j.eswa.2021.116045_b37","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TEVC.2016.2623770","article-title":"On the performance degradation of dominance-based evolutionary algorithms in many-objective optimization","volume":"22","author":"Santos","year":"2018","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"12","key":"10.1016\/j.eswa.2021.116045_b38","doi-asserted-by":"crossref","first-page":"4407","DOI":"10.1007\/s00500-018-3096-y","article-title":"An electromagnetism-like mechanism algorithm for the router node placement in wireless mesh networks","volume":"23","author":"Sayad","year":"2019","journal-title":"Soft Computing"},{"key":"10.1016\/j.eswa.2021.116045_b39","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.jnca.2014.03.012","article-title":"Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks","volume":"42","author":"Shamshirband","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.eswa.2021.116045_b40","series-title":"Handbook on computational intelligence: Volume 2: Evolutionary computation, hybrid systems, and applications","first-page":"547","article-title":"A survey of recent works in artificial immune systems","author":"Silva","year":"2016"},{"key":"10.1016\/j.eswa.2021.116045_b41","series-title":"Advances in enginnering research (Vol. 19)","first-page":"171","article-title":"A review of wireless industrial automation standards: Main features, open issues and new trends","author":"Soares","year":"2018"},{"issue":"8","key":"10.1016\/j.eswa.2021.116045_b42","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1016\/j.comnet.2010.03.005","article-title":"Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines","volume":"54","author":"Sterbenz","year":"2010","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2021.116045_b43","series-title":"What is the maximum wirelessHART range?","author":"Support","year":"2010"},{"key":"10.1016\/j.eswa.2021.116045_b44","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.comnet.2019.01.024","article-title":"Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT","volume":"151","author":"Thangaramya","year":"2019","journal-title":"Computer Networks"},{"issue":"8","key":"10.1016\/j.eswa.2021.116045_b45","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1016\/j.micpro.2015.07.003","article-title":"Metaheuristics for the deployment problem of WSN: A review","volume":"39","author":"Tsai","year":"2015","journal-title":"Microprocessors and Microsystems"},{"key":"10.1016\/j.eswa.2021.116045_b46","series-title":"2014 intl conf on contemporary computing and informatics","first-page":"634","article-title":"Wireless requirements and challenges in industry 4.0","author":"Varghese","year":"2014"},{"key":"10.1016\/j.eswa.2021.116045_b47","series-title":"System engineering guidelines. IEC 62591 WirelessHART","author":"WSEGSupport@Emerson.com","year":"2016"},{"key":"10.1016\/j.eswa.2021.116045_b48","doi-asserted-by":"crossref","first-page":"41588","DOI":"10.1109\/ACCESS.2020.2973670","article-title":"A survey of multiobjective evolutionary algorithms based on decomposition: Variants, challenges and future directions","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2021.116045_b49","article-title":"A survey of artificial immune system based intrusion detection","volume":"2014","author":"Yang","year":"2014","journal-title":"The Scientific World Journal"},{"issue":"2","key":"10.1016\/j.eswa.2021.116045_b50","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/COMST.2017.2650979","article-title":"A survey of network lifetime maximization techniques in wireless sensor networks","volume":"19","author":"Yetgin","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"10.1016\/j.eswa.2021.116045_b51","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1109\/TCYB.2013.2250955","article-title":"An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks","volume":"43","author":"Yoon","year":"2013","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.1016\/j.eswa.2021.116045_b52","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.comnet.2013.08.021","article-title":"Topology management techniques for tolerating node failures in wireless sensor networks: A survey","volume":"58","author":"Younis","year":"2014","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2021.116045_b53","series-title":"(ICC\u201907) IEEE international conference on communications","first-page":"3805","article-title":"Intelligent gateways placement for reduced data latency in wireless sensor networks","author":"Youssef","year":"2007"},{"issue":"4","key":"10.1016\/j.eswa.2021.116045_b54","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3390\/fi11040094","article-title":"A review of machine learning and IoT in smart transportation","volume":"11","author":"Zantalis","year":"2019","journal-title":"Future Internet"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417421013889?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417421013889?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,3,12]],"date-time":"2023-03-12T04:27:30Z","timestamp":1678595250000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417421013889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":54,"alternative-id":["S0957417421013889"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2021.116045","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"POSIMNET-R: An immunologic resilient approach to position routers in Industrial Wireless Sensor Networks","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2021.116045","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"116045"}}