{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:18:42Z","timestamp":1742995122507,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750770"},{"type":"electronic","value":"9783030750787"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75078-7_31","type":"book-chapter","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:06:00Z","timestamp":1619773560000},"page":"298-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Survey on Data Science Techniques for Predicting Software Defects"],"prefix":"10.1007","author":[{"given":"Farah","family":"Atif","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Luiz J. P.","family":"Ara\u00fajo","sequence":"additional","affiliation":[]},{"given":"Utih","family":"Amartiwi","sequence":"additional","affiliation":[]},{"given":"Barakat J.","family":"Akinsanya","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Mazzara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","unstructured":"Ieee standard glossary of software engineering terminology: IEEE Std 610(12\u20131990), 1\u201384 (1990). https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064","DOI":"10.1109\/IEEESTD.1990.101064"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Gupta, S., Aggarwal, R., Maheshwari, S., Goel, L., Gupta, S.: Substantiation of software defect prediction using statistical learning: an empirical study. In: 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/IoT-SIU.2019.8777507"},{"key":"31_CR3","unstructured":"Akinsanya, B., Ara\u00fajo, L.J., Charikova, M., Gimaeva, S., Grichshenko, A., Khan, A., Mazzara, M., Shilintsev, D., et\u00a0al.: Machine learning and value generation in software development: a survey. In: Proceeding of International Conference on Software Testing, Machine Learning and Complex Process Analysis (TMPA-2019) (2019)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Alsawalqah, H., Faris, H., Aljarah, I., Alnemer, L., Alhindawi, N.: Hybrid smote-ensemble approach for software defect prediction. In: Computer Science On-line Conference, pp. 355\u2013366. Springer (2017)","DOI":"10.1007\/978-3-319-57141-6_39"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Ayon, S.I.: Neural network based software defect prediction using genetic algorithm and particle swarm optimization. In: 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), pp.\u00a01\u20134. IEEE (2019)","DOI":"10.1109\/ICASERT.2019.8934642"},{"issue":"10","key":"31_CR6","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/32.544352","volume":"22","author":"VR Basili","year":"1996","unstructured":"Basili, V.R., Briand, L.C., Melo, W.L.: A validation of object-oriented design metrics as quality indicators. IEEE Trans. Software Eng. 22(10), 751\u2013761 (1996)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"31_CR7","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11219-016-9353-3","volume":"26","author":"D Bowes","year":"2018","unstructured":"Bowes, D., Hall, T., Petri\u0107, J.: Software defect prediction: do different classifiers find the same defects? Software Qual. J. 26(2), 525\u2013552 (2018)","journal-title":"Software Qual. J."},{"key":"31_CR8","unstructured":"Burnstein, I.: Practical software testing: a process-oriented approach. Springer (2006)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Dam, H.K., Pham, T., Ng, S.W., Tran, T., Grundy, J., Ghose, A., Kim, T., Kim, C.J.: A deep tree-based model for software defect prediction. arXiv preprint arXiv:1802.00921 (2018)","DOI":"10.1109\/MSR.2019.00017"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2018.2881961","volume":"47","author":"HK Dam","year":"2018","unstructured":"Dam, H.K., Tran, T., Pham, T.T.M., Ng, S.W., Grundy, J., Ghose, A.: Automatic feature learning for predicting vulnerable software components. IEEE Trans. Softw. Eng. 47, 67\u201385 (2018)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"31_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.jss.2007.07.040","volume":"81","author":"KO Elish","year":"2008","unstructured":"Elish, K.O., Elish, M.O.: Predicting defect-prone software modules using support vector machines. J. Syst. Softw. 81(5), 649\u2013660 (2008)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"31_CR12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/S0164-1212(97)00063-0","volume":"38","author":"WM Evanco","year":"1997","unstructured":"Evanco, W.M.: Poisson analyses of defects for small software components. J. Syst. Softw. 38(1), 27\u201335 (1997)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.infsof.2006.09.001","volume":"49","author":"N Fenton","year":"2007","unstructured":"Fenton, N., Neil, M., Marsh, W., Hearty, P., Marquez, D., Krause, P., Mishra, R.: Predicting software defects in varying development lifecycles using Bayesian nets. Inf. Softw. Technol. 49(1), 32\u201343 (2007)","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"31_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jss.2012.06.025","volume":"86","author":"I Fronza","year":"2013","unstructured":"Fronza, I., Sillitti, A., Succi, G., Terho, M., Vlasenko, J.: Failure prediction based on log files using random indexing and support vector machines. J. Syst. Softw. 86(1), 2\u201311 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"31_CR15","first-page":"54","volume":"3","author":"M Gayathri","year":"2014","unstructured":"Gayathri, M., Sudha, A.: Software defect prediction system using multilayer perceptron neural network with data mining. Int. J. Recent Technol. Eng. 3(2), 54\u201359 (2014)","journal-title":"Int. J. Recent Technol. Eng."},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Ghotra, B., McIntosh, S., Hassan, A.E.: Revisiting the impact of classification techniques on the performance of defect prediction models. In: Proceedings of the 37th International Conference on Software Engineering-Volume 1, pp. 789\u2013800. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.91"},{"key":"31_CR17","volume-title":"Software Inspections","author":"T Gilb","year":"1993","unstructured":"Gilb, T., Graham, D.: Software Inspections. Addison-Wesley, Reading (1993)"},{"issue":"2","key":"31_CR18","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.jss.2007.05.035","volume":"81","author":"I Gondra","year":"2008","unstructured":"Gondra, I.: Applying machine learning to software fault-proneness prediction. J. Syst. Softw. 81(2), 186\u2013195 (2008)","journal-title":"J. Syst. Softw."},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Gray, D., Bowes, D., Davey, N., Sun, Y., Christianson, B.: Using the support vector machine as a classification method for software defect prediction with static code metrics. In: International Conference on Engineering Applications of Neural Networks, pp. 223\u2013234. Springer (2009)","DOI":"10.1007\/978-3-642-03969-0_21"},{"key":"31_CR20","unstructured":"Guo, L., Ma, Y., Cukic, B., Singh, H.: Robust prediction of fault-proneness by random forests. In: 15th International Symposium on Software Reliability Engineering, pp. 417\u2013428. IEEE (2004)"},{"issue":"10","key":"31_CR21","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TSE.2005.112","volume":"31","author":"T Gyimothy","year":"2005","unstructured":"Gyimothy, T., Ferenc, R., Siket, I.: Empirical validation of object-oriented metrics on open source software for fault prediction. IEEE Trans. Software Eng. 31(10), 897\u2013910 (2005)","journal-title":"IEEE Trans. Software Eng."},{"key":"31_CR22","unstructured":"Hasanpour, A., Farzi, P., Tehrani, A., Akbari, R.: Software defect prediction based on deep learning models: Performance study. arXiv preprint arXiv:2004.02589 (2020)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Holschuh, T., Pauser, M., Herzig, K., Zimmermann, T., Premraj, R., Zeller, A.: Predicting defects in sap java code: an experience report. In: 2009 31st International Conference on Software Engineering-Companion Volume, pp. 172\u2013181. IEEE (2009)","DOI":"10.1109\/ICSE-COMPANION.2009.5070975"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Huang, F., Strigini, L.: Predicting software defects based on cognitive error theories. In: 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 134\u2013135. IEEE (2018)","DOI":"10.1109\/ISSREW.2018.00-16"},{"key":"31_CR25","unstructured":"Humphrey, W.S.: A discipline for software engineering. Pearson Education India (1995)"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Igual, L., Segu\u00ed, S.: Introduction to data science. In: Introduction to Data Science, pp.\u00a01\u20134. Springer (2017)","DOI":"10.1007\/978-3-319-50017-1_1"},{"issue":"23","key":"31_CR27","first-page":"18","volume":"117","author":"SG Jacob","year":"2015","unstructured":"Jacob, S.G., et al.: Improved random forest algorithm for software defect prediction through data mining techniques. Int. J. Comput. Appl. 117(23), 18\u201322 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR28","doi-asserted-by":"publisher","unstructured":"Janes, A., Scotto, M., Pedrycz, W., Russo, B., Stefanovic, M., Succi, G.: Identification of defect-prone classes in telecommunication software systems using design metrics. Information sciences 176(24), 3711\u20133734 (2006). https:\/\/doi.org\/10.1016\/j.ins.2005.12.002","DOI":"10.1016\/j.ins.2005.12.002"},{"issue":"1","key":"31_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1587\/transinf.2018EDP7177","volume":"102","author":"H Ji","year":"2019","unstructured":"Ji, H., Huang, S., Lv, X., Wu, Y., Feng, Y.: Empirical studies of a kernel density estimation based Naive Bayes method for software defect prediction. IEICE Trans. Inf. Syst. 102(1), 75\u201384 (2019)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"6","key":"31_CR30","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2012","unstructured":"Kamei, Y., Shihab, E., Adams, B., Hassan, A.E., Mockus, A., Sinha, A., Ubayashi, N.: A large-scale empirical study of just-in-time quality assurance. IEEE Trans. Software Eng. 39(6), 757\u2013773 (2012)","journal-title":"IEEE Trans. Software Eng."},{"issue":"11\u201312","key":"31_CR31","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.infsof.2007.02.015","volume":"49","author":"VB Kampenes","year":"2007","unstructured":"Kampenes, V.B., Dyb\u00e5, T., Hannay, J.E., Sj\u00f8berg, D.I.: A systematic review of effect size in software engineering experiments. Inf. Softw. Technol. 49(11\u201312), 1073\u20131086 (2007)","journal-title":"Inf. Softw. Technol."},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Laitenberger, O.: Studying the effects of code inspection and structural testing on software quality. In: Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No. 98TB100257), pp. 237\u2013246. IEEE (1998)","DOI":"10.1109\/ISSRE.1998.730887"},{"issue":"1","key":"31_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0164-1212(99)00073-4","volume":"50","author":"O Laitenberger","year":"2000","unstructured":"Laitenberger, O., DeBaud, J.M.: An encompassing life cycle centric survey of software inspection. J. Syst. Softw. 50(1), 5\u201331 (2000)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"31_CR34","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann, S., Baesens, B., Mues, C., Pietsch, S.: Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Trans. Software Eng. 34(4), 485\u2013496 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"31_CR35","doi-asserted-by":"crossref","unstructured":"Li, J., He, P., Zhu, J., Lyu, M.R.: Software defect prediction via convolutional neural network. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 318\u2013328. IEEE (2017)","DOI":"10.1109\/QRS.2017.42"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Li, L., Lessmann, S., Baesens, B.: Evaluating software defect prediction performance: an updated benchmarking study. arXiv preprint arXiv:1901.01726 (2019)","DOI":"10.2139\/ssrn.3312070"},{"key":"31_CR37","volume-title":"Software Performance and Scalability: A Quantitative Approach","author":"HH Liu","year":"2011","unstructured":"Liu, H.H.: Software Performance and Scalability: A Quantitative Approach, vol. 7. Wiley, New York (2011)"},{"issue":"3","key":"31_CR38","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11219-014-9241-7","volume":"23","author":"L Madeyski","year":"2015","unstructured":"Madeyski, L., Jureczko, M.: Which process metrics can significantly improve defect prediction models? an empirical study. Software Qual. J. 23(3), 393\u2013422 (2015)","journal-title":"Software Qual. J."},{"key":"31_CR39","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.asoc.2014.03.032","volume":"21","author":"R Malhotra","year":"2014","unstructured":"Malhotra, R.: Comparative analysis of statistical and machine learning methods for predicting faulty modules. Appl. Soft Comput. 21, 286\u2013297 (2014)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"31_CR40","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3745\/JIPS.2012.8.2.241","volume":"8","author":"R Malhotra","year":"2012","unstructured":"Malhotra, R., Jain, A.: Fault prediction using statistical and machine learning methods for improving software quality. J. Inf. Process. Syst. 8(2), 241\u2013262 (2012)","journal-title":"J. Inf. Process. Syst."},{"issue":"3","key":"31_CR41","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s13198-011-0048-7","volume":"1","author":"R Malhotra","year":"2010","unstructured":"Malhotra, R., Kaur, A., Singh, Y.: Empirical validation of object-oriented metrics for predicting fault proneness at different severity levels using support vector machines. Int. J. Syst. Assur. Eng. Manag. 1(3), 269\u2013281 (2010)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"3","key":"31_CR42","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TSE.2008.71","volume":"35","author":"MV M\u00e4ntyl\u00e4","year":"2008","unstructured":"M\u00e4ntyl\u00e4, M.V., Lassenius, C.: What types of defects are really discovered in code reviews? IEEE Trans. Software Eng. 35(3), 430\u2013448 (2008)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"31_CR43","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSECP.2004.1281254","volume":"2","author":"G McGraw","year":"2004","unstructured":"McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80\u201383 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"31_CR44","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10664-012-9218-8","volume":"19","author":"A Okutan","year":"2014","unstructured":"Okutan, A., Y\u0131ld\u0131z, O.T.: Software defect prediction using Bayesian networks. Empir. Softw. Eng. 19(1), 154\u2013181 (2014)","journal-title":"Empir. Softw. Eng."},{"key":"31_CR45","doi-asserted-by":"crossref","unstructured":"Panichella, A., Oliveto, R., De\u00a0Lucia, A.: Cross-project defect prediction models: L\u2019union fait la force. In: 2014 Software Evolution Week-IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp. 164\u2013173. IEEE (2014)","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"31_CR46","unstructured":"Pobere\u017cnik, \u0141.: A method for selecting environments for software compatibility testing. In: 2013 Federated Conference on Computer Science and Information Systems, pp. 1355\u20131360. IEEE (2013)"},{"key":"31_CR47","volume-title":"Software Engineering: A Practitioner\u2019s Approach","author":"RS Pressman","year":"2005","unstructured":"Pressman, R.S.: Software Engineering: A Practitioner\u2019s Approach. Palgrave Macmillan, London (2005)"},{"issue":"3","key":"31_CR48","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MS.2006.89","volume":"23","author":"P Runeson","year":"2006","unstructured":"Runeson, P., Andersson, C., Thelin, T., Andrews, A., Berling, T.: What do we know about defect detection methods? [software testing]. IEEE Softw. 23(3), 82\u201390 (2006)","journal-title":"IEEE Softw."},{"issue":"4","key":"31_CR49","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1023\/A:1009728205264","volume":"3","author":"P Runeson","year":"1998","unstructured":"Runeson, P., Wohlin, C.: An experimental evaluation of an experience-based capture-recapture method in software code inspections. Empir. Softw. Eng. 3(4), 381\u2013406 (1998)","journal-title":"Empir. Softw. Eng."},{"issue":"9","key":"31_CR50","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd, M., Song, Q., Sun, Z., Mair, C.: Data quality: some comments on the NASA software defect datasets. IEEE Trans. Software Eng. 39(9), 1208\u20131215 (2013)","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"31_CR51","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11219-009-9079-6","volume":"18","author":"Y Singh","year":"2010","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Empirical validation of object-oriented metrics for predicting fault proneness models. Software Qual. J. 18(1), 3 (2010)","journal-title":"Software Qual. J."},{"key":"31_CR52","first-page":"2","volume":"21","author":"M Sullivan","year":"1991","unstructured":"Sullivan, M., Chillarege, R.: Software defects and their impact on system availability: a study of field failures in operating systems. FTCS 21, 2\u20139 (1991)","journal-title":"FTCS"},{"issue":"5","key":"31_CR53","first-page":"41","volume":"9","author":"M Thapaliyal","year":"2010","unstructured":"Thapaliyal, M., Verma, G.: Software defects and object oriented metrics-an empirical analysis. Int. J. Comput. Appl. 9(5), 41\u201344 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"31_CR54","volume-title":"Peer Reviews in Software: A Practical Guide","author":"KE Wiegers","year":"2002","unstructured":"Wiegers, K.E.: Peer Reviews in Software: A Practical Guide. Addison-Wesley, Boston (2002)"},{"key":"31_CR55","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.infsof.2017.03.007","volume":"87","author":"X Yang","year":"2017","unstructured":"Yang, X., Lo, D., Xia, X., Sun, J.: TLEL: a two-layer ensemble learning approach for just-in-time defect prediction. Inf. Softw. Technol. 87, 206\u2013220 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"31_CR56","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., Zhang, Y., Sun, J.: Deep learning for just-in-time defect prediction. In: 2015 IEEE International Conference on Software Quality, Reliability and Security, pp. 17\u201326. IEEE (2015)","DOI":"10.1109\/QRS.2015.14"},{"issue":"10","key":"31_CR57","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TSE.2006.102","volume":"32","author":"Y Zhou","year":"2006","unstructured":"Zhou, Y., Leung, H.: Empirical analysis of object-oriented design metrics for predicting high and low severity faults. IEEE Trans. Software Eng. 32(10), 771\u2013789 (2006)","journal-title":"IEEE Trans. Software Eng."},{"key":"31_CR58","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Nagappan, N.: Predicting defects using network analysis on dependency graphs. In: 2008 ACM\/IEEE 30th International Conference on Software Engineering. pp. 531\u2013540. IEEE (2008)","DOI":"10.1145\/1368088.1368161"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75078-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T01:05:14Z","timestamp":1672016714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75078-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750770","9783030750787"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75078-7_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}