{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T18:30:33Z","timestamp":1726425033267},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41571417 and U1604145"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of the United States","award":["CNS-1253424 and ECCS-1202225"]},{"name":"Science and Technology Foundation of Henan Province of China","award":["152102210048"]},{"name":"Foundation and Frontier Project of Henan Province of China","award":["162300410196"]},{"name":"Natural Science Foundation of Educational Committee of Henan Province of China","award":["14A413015"]},{"name":"the Research Foundation of Henan University","award":["xxjc20140006"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s00521-017-2993-9","type":"journal-article","created":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T12:45:36Z","timestamp":1492519536000},"page":"219-237","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":228,"title":["A novel image encryption scheme based on DNA sequence operations and chaotic systems"],"prefix":"10.1007","volume":"31","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xianxing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"issue":"9","key":"2993_CR1","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"YC Zhou","year":"2015","unstructured":"Zhou YC, Hua ZY, Pun CM, Philip Chen CL (2015) Cascade chaotic system with applications. IEEE T Cybernetics 45(9):2001\u20132012","journal-title":"IEEE T Cybernetics"},{"key":"2993_CR2","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang YS (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151\u20131166","journal-title":"Nonlinear Dyn"},{"key":"2993_CR3","doi-asserted-by":"publisher","unstructured":"Wen W Y, Zhang Y S, Fang Y M, Fang Z J 2016. Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput & Applic; Doi: 10.1007\/s00521\u2013016\u20132490-6","DOI":"10.1007\/s00521-016-2490-6"},{"key":"2993_CR4","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349-350","author":"XJ Wu","year":"2016","unstructured":"Wu XJ, Wang DW, Kurths J, Kan HB (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137\u2013153","journal-title":"Inf Sci"},{"key":"2993_CR5","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","volume":"80","author":"XJ Tong","year":"2015","unstructured":"Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493\u20131508","journal-title":"Nonlinear Dyn"},{"key":"2993_CR6","first-page":"144","volume":"41","author":"SEI Assad","year":"2016","unstructured":"Assad SEI, Farajallah M (2016) A new chaos-based image encryption system. Signal Process: Image 41:144\u2013157","journal-title":"Signal Process: Image"},{"key":"2993_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"YQ Zhang","year":"2015","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","journal-title":"Appl Soft Comput"},{"key":"2993_CR8","first-page":"1","volume":"3","author":"A-V Diaconu","year":"2015","unstructured":"Diaconu A-V (2015) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 3:1\u201314","journal-title":"Inf Sci"},{"key":"2993_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.sigpro.2015.06.007","volume":"117","author":"H-I Hsiao","year":"2015","unstructured":"Hsiao H-I, Lee J (2015) Color image encryption using chaotic nonlinear adaptive filter. Signal Process 117:281\u2013309","journal-title":"Signal Process"},{"key":"2993_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Laser Eng 78:17\u201325","journal-title":"Opt Laser Eng"},{"key":"2993_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"NR Zhou","year":"2016","unstructured":"Zhou NR, Pan SM, Chen S, Zhou ZH (2016) Image compression-encryption based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"2993_CR12","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1002\/sec.1458","volume":"9","author":"GD Ye","year":"2016","unstructured":"Ye GD, Huang XL (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9:2015\u20132023","journal-title":"Secur Commun Netw"},{"key":"2993_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"2993_CR14","first-page":"6","volume":"52","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yang K, Chen YR, Liu XX (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process: Image 52:6\u201319","journal-title":"Signal Process: Image"},{"issue":"2","key":"2993_CR15","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78(2):1311\u20131320","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"2993_CR16","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"CQ Li","year":"2011","unstructured":"Li CQ, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949\u2013954","journal-title":"Signal Process"},{"key":"2993_CR17","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, Cokal C, Yildiz OT, Biyikiglu T (2010) Cryptanalysis of Fridrich\u2019s chaotic image encryption. Int J Bifurc Chaos 20:1405\u20131413","journal-title":"Int J Bifurc Chaos"},{"key":"2993_CR18","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69:1091\u20131096","journal-title":"Nonlinear Dyn"},{"key":"2993_CR19","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","volume":"70","author":"C Li","year":"2012","unstructured":"Li C, Zhang Y, Ou R, Wong KW (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70:2383\u20132388","journal-title":"Nonlinear Dyn"},{"key":"2993_CR20","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1016\/j.ijleo.2016.03.018","volume":"127","author":"F Ozkaynak","year":"2016","unstructured":"Ozkaynak F, Ozer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik 127:5190\u20135192","journal-title":"Optik"},{"key":"2993_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"CQ Li","year":"2016","unstructured":"Li CQ (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210","journal-title":"Signal Process"},{"key":"2993_CR22","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"Y Eric Xie","year":"2017","unstructured":"Eric Xie Y, Li CQ, Yu SM, L\u00fc JH (2017) On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"2993_CR23","first-page":"151","volume":"39","author":"R Bechikh","year":"2015","unstructured":"Bechikh R, Hermassi H, Abd EI-Latif AA, Rhouma R, Belghith S (2015) Breaking an image encryption scheme based on spatiotemporal chaotic system. Signal Process: Image 39:151\u2013158","journal-title":"Signal Process: Image"},{"key":"2993_CR24","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1007\/s11071-013-0924-6","volume":"73","author":"CQ Li","year":"2013","unstructured":"Li CQ, Liu YS, Xie T, Michael Chen ZQ (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn 73:2083\u20132089","journal-title":"Nonlinear Dyn"},{"key":"2993_CR25","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"CT Celland","year":"1999","unstructured":"Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533\u2013534","journal-title":"Nature"},{"key":"2993_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71:33\u201341","journal-title":"Opt Laser Eng"},{"key":"2993_CR27","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","volume":"12","author":"M Babaei","year":"2013","unstructured":"Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12:101\u2013107","journal-title":"Nat Comput"},{"key":"2993_CR28","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124:3596\u20133600","journal-title":"Optik"},{"key":"2993_CR29","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"2993_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"2993_CR31","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"2993_CR32","doi-asserted-by":"crossref","unstructured":"Ozkaynak F, Ozer A, Yavuz S 2013. Security analysis of an image encryption algorithm based on chaos and DNA encoding. In: Signal processing and communications applications conference (SIU), pp.1\u20134","DOI":"10.1109\/SIU.2013.6531597"},{"key":"2993_CR33","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Lasers Eng 60:111\u2013115","journal-title":"Opt Lasers Eng"},{"key":"2993_CR34","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11042-013-1533-6","volume":"72","author":"H Hermassi","year":"2014","unstructured":"Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl 72:2211\u20132224","journal-title":"Multimed Tools Appl"},{"key":"2993_CR35","doi-asserted-by":"crossref","unstructured":"Zhang Q, Guo L, Wei X 2010. Image encryption using DNA addition combining with chaotic maps. Math Comput Model. (11\u201312): 2028\u20132035","DOI":"10.1016\/j.mcm.2010.06.005"},{"key":"2993_CR36","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"2993_CR37","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei XP (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028\u20132035","journal-title":"Math Comput Model"},{"key":"2993_CR38","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","volume":"82","author":"YQ Zhang","year":"2016","unstructured":"Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95\u2013103","journal-title":"Opt Lasers Eng"},{"key":"2993_CR39","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU-Int J Electron C 68:186\u2013192","journal-title":"AEU-Int J Electron C"},{"key":"2993_CR40","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Abdurahman K (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"2993_CR41","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"2993_CR42","doi-asserted-by":"publisher","first-page":"769108","DOI":"10.1155\/2013\/769108","volume":"2013","author":"A-C Dascalescu","year":"2013","unstructured":"Dascalescu A-C, Boriga RE, Diaconu A-V (2013) Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator. Math Probl Eng 2013:769108","journal-title":"Math Probl Eng"},{"issue":"4356","key":"2993_CR43","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"key":"2993_CR44","first-page":"902","volume":"29","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process: Image 29:902\u2013913","journal-title":"Signal Process: Image"},{"key":"2993_CR45","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"2993_CR46","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"2993_CR47","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"issue":"1\u20132","key":"2993_CR48","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1\u20132):345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"2993_CR49","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Cao WJ, Philip CCL (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207","journal-title":"Signal Process"},{"key":"2993_CR50","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou YC, George S, Sos A, Noonan Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"issue":"1","key":"2993_CR51","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyper-chaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"8","key":"2993_CR52","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G \u00c0lvarez","year":"2006","unstructured":"\u00c0lvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16(8):2129\u20132151","journal-title":"Int J Bifur Chaos"},{"issue":"3","key":"2993_CR53","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cnsns.2013.07.016","volume":"19","author":"JAE Fouda","year":"2014","unstructured":"Fouda JAE, Effa JY, Sabat M (2014) Ali. A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578\u2013588","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1\u20132","key":"2993_CR54","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75(1\u20132):319\u2013330","journal-title":"Nonlinear Dyn"},{"key":"2993_CR55","doi-asserted-by":"publisher","unstructured":"Chai X L, Yang K, Gan Z H 2016. A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl doi: 10.1007\/s11042\u2013016-3585-x","DOI":"10.1007\/s11042-016-3585-x"},{"key":"2993_CR56","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"XL Chai","year":"2017","unstructured":"Chai XL (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159\u20131175","journal-title":"Multimed Tools Appl"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-2993-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2993-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2993-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T16:37:45Z","timestamp":1719160665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-2993-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["2993"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-2993-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}