{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:06:09Z","timestamp":1775873169811,"version":"3.50.1"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1016\/j.comcom.2021.04.025","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T12:16:44Z","timestamp":1620044204000},"page":"190-206","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["On a multisensor knowledge fusion heuristic for the Internet of Things"],"prefix":"10.1016","volume":"176","author":[{"given":"Gabriel","family":"Martins","sequence":"first","affiliation":[]},{"given":"Sergio Guedes","family":"de Souza","sequence":"additional","affiliation":[]},{"given":"Igor Le\u00e3o dos","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Luci","family":"Pirmez","sequence":"additional","affiliation":[]},{"given":"Claudio M.","family":"de Farias","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2021.04.025_b1","author":"Recommendation","year":"2012","journal-title":"ITU-T, Geneva"},{"issue":"3","key":"10.1016\/j.comcom.2021.04.025_b2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1267070.1267073","article-title":"Information fusion for wireless sensor networks: Methods, models, and classifications","volume":"39","author":"Nakamura","year":"2007","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.comcom.2021.04.025_b3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.inffus.2011.08.001","article-title":"Multisensor data fusion: A review of the state-of-the-art","volume":"14","author":"Khaleghi","year":"2013","journal-title":"Inf. Fusion"},{"issue":"3","key":"10.1016\/j.comcom.2021.04.025_b4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/ijkm.2013070102","article-title":"A revised knowledge pyramid","volume":"9","author":"Jennex","year":"2013","journal-title":"Int. J. Knowl. Manag. (IJKM)"},{"issue":"1","key":"10.1016\/j.comcom.2021.04.025_b5","first-page":"3","article-title":"From data to wisdom","volume":"16","author":"Ackoff","year":"1989","journal-title":"J. Appl. Syst. Anal."},{"key":"10.1016\/j.comcom.2021.04.025_b6","series-title":"Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks","first-page":"92","article-title":"Athena: A knowledge fusion algorithm for the internet of things","author":"Martins","year":"2018"},{"key":"10.1016\/j.comcom.2021.04.025_b7","series-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"601","article-title":"Knowledge vault: A web-scale approach to probabilistic knowledge fusion","author":"Dong","year":"2014"},{"key":"10.1016\/j.comcom.2021.04.025_b8","series-title":"Proceedings of the 2017 ACM on Conference on Information and Knowledge Management","first-page":"2299","article-title":"Knowledge graph embedding with triple context","author":"Shi","year":"2017"},{"key":"10.1016\/j.comcom.2021.04.025_b9","series-title":"Sutton and Andrew G. Barto, \u201cReinforcement Learning: An Introduction\u201d","author":"Richard","year":"1998"},{"key":"10.1016\/j.comcom.2021.04.025_b10","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.inffus.2013.10.010","article-title":"Patterns for context-based knowledge fusion in decision support systems","volume":"21","author":"Smirnov","year":"2015","journal-title":"Inf. Fusion"},{"issue":"10","key":"10.1016\/j.comcom.2021.04.025_b11","doi-asserted-by":"crossref","first-page":"881","DOI":"10.14778\/2732951.2732962","article-title":"From data fusion to knowledge fusion","volume":"7","author":"Dong","year":"2014","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"10.1016\/j.comcom.2021.04.025_b12","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s11063-017-9712-5","article-title":"Knowledge fusion in feedforward artificial neural networks","volume":"48","author":"Akhlaghi","year":"2018","journal-title":"Neural Process. Lett."},{"issue":"01n02","key":"10.1016\/j.comcom.2021.04.025_b13","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1142\/S0218843001000308","article-title":"KRAFT: An agent architecture for knowledge fusion","volume":"10","author":"Preece","year":"2001","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"10.1016\/j.comcom.2021.04.025_b14","series-title":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems, ISADS","first-page":"1","article-title":"Practical aspects of the use of a knowledge fusion toolkit in safety applications","author":"Kriegel","year":"2013"},{"key":"10.1016\/j.comcom.2021.04.025_b15","series-title":"Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data","first-page":"433","article-title":"Fusing data with correlations","author":"Pochampally","year":"2014"},{"key":"10.1016\/j.comcom.2021.04.025_b16","series-title":"Confronting Context Effects in Intelligence Analysis: How Can Mathematics Help","author":"Devlin","year":"2005"},{"issue":"2","key":"10.1016\/j.comcom.2021.04.025_b17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1017\/S0269888916000011","article-title":"Scientific knowledge engineering: a conceptual delineation and overview of the state of the art","volume":"31","author":"Dos\u00a0Santos","year":"2016","journal-title":"Knowl. Eng. Rev."},{"issue":"9","key":"10.1016\/j.comcom.2021.04.025_b18","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.3390\/s16091501","article-title":"Semantic framework of internet of things for smart cities: Case studies","volume":"16","author":"Zhang","year":"2016","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.comcom.2021.04.025_b19","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1109\/JIOT.2017.2712560","article-title":"Semisupervised deep reinforcement learning in support of IoT and smart city services","volume":"5","author":"Mohammadi","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2021.04.025_b20","series-title":"Probability and statistics","author":"DeGroot","year":"2012"},{"key":"10.1016\/j.comcom.2021.04.025_b21","series-title":"A Framework for Developing Smart Space Applications Using Shared Sensor Networks","author":"de\u00a0Farias","year":"2014"},{"key":"10.1016\/j.comcom.2021.04.025_b22","series-title":"2016 19th International Conference on Information Fusion, FUSION","first-page":"59","article-title":"Hephaestus: A multisensor data fusion algorithm for multiple applications on wireless sensor networks","author":"Aquino","year":"2016"},{"key":"10.1016\/j.comcom.2021.04.025_b23","series-title":"37th Annual IEEE Conference on Local Computer Networks","first-page":"188","article-title":"Information fusion techniques applied to shared sensor and actuator networks","author":"de\u00a0Farias","year":"2012"},{"key":"10.1016\/j.comcom.2021.04.025_b24","series-title":"Smart Grid: Fundamentals of Design and Analysis, vol. 63","author":"Momoh","year":"2012"},{"key":"10.1016\/j.comcom.2021.04.025_b25","series-title":"2015 International Wireless Communications and Mobile Computing Conference, IWCMC","first-page":"763","article-title":"Ensuring energy efficiency of power quality applications in smart grids through a framework based on wireless sensor and actuator networks","author":"Santos","year":"2015"},{"key":"10.1016\/j.comcom.2021.04.025_b26","series-title":"2011 IEEE PES 12th International Conference on Transmission and Distribution Construction, Operation and Live-Line Maintenance, ESMO","first-page":"1","article-title":"On-line monitoring of OHL conductor temperature; live-line installation","author":"Gal","year":"2011"},{"issue":"4","key":"10.1016\/j.comcom.2021.04.025_b27","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1109\/TPWRD.2011.2145394","article-title":"Probabilistic modeling and simulation of transmission line temperatures under fluctuating power flows","volume":"26","author":"Schlapfer","year":"2011","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.comcom.2021.04.025_b28","series-title":"29th Annual IEEE International Conference on Local Computer Networks","first-page":"455","article-title":"Contiki-a lightweight and flexible operating system for tiny networked sensors","author":"Dunkels","year":"2004"},{"key":"10.1016\/j.comcom.2021.04.025_b29","series-title":"A Sensor Network Simulator for the Contiki OS","author":"\u00d6sterlind","year":"2006"},{"key":"10.1016\/j.comcom.2021.04.025_b30","series-title":"Powertrace: Network-Level Power Profiling for Low-Power Wireless Networks","author":"Dunkels","year":"2011"},{"key":"10.1016\/j.comcom.2021.04.025_b31","series-title":"2011 Proceedings IEEE INFOCOM","first-page":"1323","article-title":"Multiple task scheduling for low-duty-cycled wireless sensor networks","author":"Xiong","year":"2011"},{"key":"10.1016\/j.comcom.2021.04.025_b32","series-title":"Information Fusion (FUSION), 2014 17th International Conference on","first-page":"1","article-title":"Multisensor data fusion in shared sensor and actuator networks","author":"Farias","year":"2014"},{"key":"10.1016\/j.comcom.2021.04.025_b33","series-title":"5725-1: 1994, Accuracy (Trueness and Precision) of Measurement Methods and Results-Part 1: General Principles and Definitions","author":"ISO","year":"1994"},{"issue":"1","key":"10.1016\/j.comcom.2021.04.025_b34","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s00769-014-1093-0","article-title":"Trueness, precision and accuracy: a critical overview of the concepts as well as proposals for revision","volume":"20","author":"Prenesti","year":"2015","journal-title":"Accredit. Qual. Assur."},{"key":"10.1016\/j.comcom.2021.04.025_b35","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.inffus.2012.02.002","article-title":"A localized algorithm for structural health monitoring using wireless sensor networks","volume":"15","author":"Dos\u00a0Santos","year":"2014","journal-title":"Inf. Fusion"},{"issue":"247","key":"10.1016\/j.comcom.2021.04.025_b36","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1080\/01621459.1949.10483310","article-title":"The Monte Carlo method","volume":"44","author":"Metropolis","year":"1949","journal-title":"J. Amer. Statist. Assoc."},{"key":"10.1016\/j.comcom.2021.04.025_b37","series-title":"Platform, Z1 Datasheet","author":"Zolertia","year":"2010"},{"issue":"7","key":"10.1016\/j.comcom.2021.04.025_b38","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1080\/002075400188690","article-title":"Strategic, tactical and operational decisions in multi-national logistics networks: a review and discussion of modelling issues","volume":"38","author":"Schmidt","year":"2000","journal-title":"Int. J. Prod. Res."},{"key":"10.1016\/j.comcom.2021.04.025_b39","series-title":"Reinforcement Learning Based ALOHA for Multi-Hop Wireless Sensor Networks with Informed Receiving","author":"Chu","year":"2012"},{"key":"10.1016\/j.comcom.2021.04.025_b40","series-title":"2012 International Symposium on Wireless Communication Systems, ISWCS","first-page":"511","article-title":"ALOHA And q-learning based medium access control for wireless sensor networks","author":"Chu","year":"2012"},{"key":"10.1016\/j.comcom.2021.04.025_b41","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.engappai.2015.08.004","article-title":"Application of reinforcement learning to medium access control for wireless sensor networks","volume":"46","author":"Chu","year":"2015","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.comcom.2021.04.025_b42","first-page":"3","article-title":"Reinforcement learning","volume":"12","author":"Wiering","year":"2012","journal-title":"Adapt. Learn. Optim."},{"issue":"6","key":"10.1016\/j.comcom.2021.04.025_b43","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1109\/TNNLS.2017.2773458","article-title":"Optimal and autonomous control using reinforcement learning: A survey","volume":"29","author":"Kiumarsi","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.comcom.2021.04.025_b44","series-title":"2014 IEEE International Conference on Communications Workshops, ICC","first-page":"871","article-title":"Energy-aware task scheduling in wireless sensor networks based on cooperative reinforcement learning","author":"Khan","year":"2014"},{"issue":"1","key":"10.1016\/j.comcom.2021.04.025_b45","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s13638-015-0515-y","article-title":"Resource-aware task scheduling by an adversarial bandit solver method in wireless sensor networks","volume":"2016","author":"Khan","year":"2016","journal-title":"EURASIP J. Wireless Commun. Networking"},{"key":"10.1016\/j.comcom.2021.04.025_b46","series-title":"On the Virtualization and Resource Allocation in the Cloud of Sensors","author":"Santos","year":"2017"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421001699?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421001699?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:34:23Z","timestamp":1758843263000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366421001699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":46,"alternative-id":["S0140366421001699"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2021.04.025","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On a multisensor knowledge fusion heuristic for the Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2021.04.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}