{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:49:42Z","timestamp":1753357782678,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031087530"},{"type":"electronic","value":"9783031087547"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08754-7_13","type":"book-chapter","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T07:06:09Z","timestamp":1655795169000},"page":"96-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hypothetical Agent-Based Model Inspired by\u00a0the\u00a0Abstraction of\u00a0Solitary Behavior in\u00a0Tigers and\u00a0Its Employment as\u00a0a\u00a0Chain Code for\u00a0Compression"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5584-9034","authenticated-orcid":false,"given":"Khaldoon","family":"Dhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6947-0519","authenticated-orcid":false,"given":"Christopher","family":"Cruzen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,15]]},"reference":[{"key":"13_CR1","unstructured":"Bons, J., Kegel, A.: On the digital processing and transmission of handwriting and sketching. In: Proceedings of EUROCON, vol. 77, pp. 880\u2013890 (1977)"},{"key":"13_CR2","unstructured":"Dhou, K.: Toward a better understanding of viewers\u2019 perceptions of tag clouds: relative size judgment. Ph.D. thesis, University of North Carolina at Charlotte (2013)"},{"issue":"6","key":"13_CR3","doi-asserted-by":"publisher","first-page":"9308","DOI":"10.1109\/JIOT.2019.2912984","volume":"6","author":"K Dhou","year":"2019","unstructured":"Dhou, K., Cruzen, C.: An innovative chain coding technique for compression based on the concept of biological reproduction: an agent-based modeling approach. IEEE Internet Things J. 6(6), 9308\u20139315 (2019)","journal-title":"IEEE Internet Things J."},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Dhou, K.: A novel agent-based modeling approach for image coding and lossless compression based on the Wolf-Sheep predation model. In: Shi, Y., et al. (eds.) ICCS 2018. LNCS, vol. 10861, pp. 117\u2013128. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93701-4_9","DOI":"10.1007\/978-3-319-93701-4_9"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.asoc.2019.03.024","volume":"79","author":"K Dhou","year":"2019","unstructured":"Dhou, K.: An innovative design of a hybrid chain coding algorithm for bi-level image compression using an agent-based modeling approach. Appl. Soft Comput. 79, 94\u2013110 (2019). https:\/\/doi.org\/10.1016\/j.asoc.2019.03.024","journal-title":"Appl. Soft Comput."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.future.2019.08.021","volume":"102","author":"K Dhou","year":"2020","unstructured":"Dhou, K.: A new chain coding mechanism for compression stimulated by a virtual environment of a predator-prey ecosystem. Future Gen. Comput. Syst. 102, 650\u2013669 (2020)","journal-title":"Future Gen. Comput. Syst."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Dhou, K., Cruzen, C.: A new chain code for bi-level image compression using an agent-based model of echo location in dolphins. In: The 6th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (2020), In Press","DOI":"10.1109\/DependSys51298.2020.00021"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Dhou, K., Cruzen, C.: A highly efficient chain code for compression using an agent-based modeling simulation of territories in biological beavers. Future Gen. Comput. Syst. 118, 1\u201313 (2021). https:\/\/doi.org\/10.1016\/j.future.2020.12.016","DOI":"10.1016\/j.future.2020.12.016"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Dhou, K., Cruzen, C.: An innovative employment of the NetLogo AIDS model in developing a new chain code for compression. In: Paszynski, M., Kranzlm\u00fcller, D., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds.) ICCS 2021. LNCS, vol. 12742, pp. 17\u201325. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77961-0_2","DOI":"10.1007\/978-3-030-77961-0_2"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Dhou, K., Cruzen, C.: A creative chain coding technique for bi-level image compression inspired by the netlogo hiv agent-based modeling simulation. J. Comput. Sci. 61, 101613 (2022). https:\/\/doi.org\/10.1016\/j.jocs.2022.101613","DOI":"10.1016\/j.jocs.2022.101613"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jvlc.2017.11.009","volume":"44","author":"K Dhou","year":"2018","unstructured":"Dhou, K., Hadzikadic, M., Faust, M.: Typeface size and weight and word location influence on relative size judgments in tag clouds. J. Visual Lang. Comput. 44, 97\u2013105 (2018)","journal-title":"J. Visual Lang. Comput."},{"key":"13_CR12","unstructured":"Dhou, K.K., Kosara, R., Hadzikadic, M., Faust, M.: Size judgment and comparison in tag clouds. In: IEEE Visualization Poster Proceedings (2013)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TEC.1961.5219197","volume":"2","author":"H Freeman","year":"1961","unstructured":"Freeman, H.: On the encoding of arbitrary geometric configurations. IRE Trans. Electron. Comput. 2, 260\u2013268 (1961)","journal-title":"IRE Trans. Electron. Comput."},{"issue":"7","key":"13_CR14","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/76.735380","volume":"8","author":"PG Howard","year":"1998","unstructured":"Howard, P.G., Kossentini, F., Martins, B., Forchhammer, S., Rucklidge, W.J.: The emerging JBIG2 standard. IEEE Trans. Circuits Syst. Video Technol. 8(7), 838\u2013848 (1998)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"13_CR15","unstructured":"Hwang, Y.T., Wang, Y.C., Wang, S.S.: An efficient shape coding scheme and its codec design. In: Signal Processing Systems, 2001 IEEE Workshop on, pp. 225\u2013232. IEEE (2001)"},{"key":"13_CR16","unstructured":"ISO CCITT Recommend. T.4: Standardization of group 3 facsimile apparatus for document transmission (1980)"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.patcog.2004.08.017","volume":"38","author":"YK Liu","year":"2005","unstructured":"Liu, Y.K., \u017dalik, B.: An efficient chain code with Huffman coding. Pattern Recogn. 38(4), 553\u2013557 (2005)","journal-title":"Pattern Recogn."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Mouring, M., Dhou, K., Hadzikadic, M.: A novel algorithm for bi-level image coding and lossless compression based on virtual ant colonies. In: 3rd International Conference on Complexity, Future Information Systems and Risk, pp. 72\u201378. Set\u00fabal, Portugal (2018)","DOI":"10.5220\/0006688400720078"},{"key":"13_CR19","unstructured":"Recommendation T6. Facsimile Coding Schemes and Coding Control Functions for Group 4 Facsimile Apparatus. International Telecommunication Union, Geneva (1988)"},{"key":"13_CR20","unstructured":"Standards\/International Electrotechnical Commission, I.O., et al.: Progressive bilevel image compression. International Standard 11544 (1993)"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Sunquist, M.: What is a tiger? ecology and behavior. In: Tilson, R., Nyhus, P.J. (eds.) Tigers of the World (Second Edition). Noyes Series in Animal Behavior, Ecology, Conservation, and Management, pp. 19\u201333, William Andrew Publishing, Boston, 2nd edn (2010). https:\/\/doi.org\/10.1016\/B978-0-8155-1570-8.00002-5, http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780815515708000025","DOI":"10.1016\/B978-0-8155-1570-8.00002-5"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Szokalski, M.S., Litchfield, C.A., Foster, W.K.: Enrichment for captive tigers (panthera tigris): current knowledge and future directions. Appl. Anim. Behav. Sci. 139(1), 1 \u2013 9 (2012). https:\/\/doi.org\/10.1016\/j.applanim.2012.02.021, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0168159112000718","DOI":"10.1016\/j.applanim.2012.02.021"},{"key":"13_CR23","unstructured":"Zahir, S., Dhou, K.: A new chain coding based method for binary image compression and reconstruction. In: Picture Coding Symposium, pp. 1321\u20131324 (2007)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, L.: A new highly efficient algorithm for lossless binary image compression. ProQuest (2007)","DOI":"10.1109\/CCECE.2006.277530"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08754-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T07:28:41Z","timestamp":1655796521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08754-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031087530","9783031087547"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08754-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"474","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"175","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}