{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T17:44:27Z","timestamp":1749145467383,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058849"},{"type":"electronic","value":"9783319058856"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05885-6_3","type":"book-chapter","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T15:08:12Z","timestamp":1396364892000},"page":"47-62","source":"Crossref","is-referenced-by-count":15,"title":["Impact of Some Biometric Modalities on Forensic Science"],"prefix":"10.1007","author":[{"given":"Ali Ismail","family":"Awad","sequence":"first","affiliation":[]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Yan, Y., Osadciw, L.A.: Bridging biometrics and forensics. In: Proceedings of SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp. 68190Q\u201368190Q\u20138 (February 2008)","DOI":"10.1117\/12.766810"},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology\u00a014(1), 4\u201320 (2004)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics, 1st edn. Springer (2011)","DOI":"10.1007\/978-0-387-77326-1_1"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1016\/j.future.2012.02.003","volume":"29","author":"R. Giot","year":"2013","unstructured":"Giot, R., El-Abed, M., Rosenberger, C.: Fast computation of the performance evaluation of biometric systems: Application to multibiometrics. Future Generation Computer Systems\u00a029(3), 788\u2013799 (2013), Special Section: Recent Developments in High Performance Computing and Security","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1812","DOI":"10.1109\/TIFS.2012.2215324","volume":"7","author":"I. Odinaka","year":"2012","unstructured":"Odinaka, I., Lai, P.H., Kaplan, A.D., O\u2019Sullivan, J.A., Sirevaag, E.J., Rohrbaugh, J.W.: ECG biometric recognition: A comparative analysis. IEEE Transactions on Information Forensics and Security\u00a07(6), 1812\u20131824 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Schouten, B., Jacobs, B.: Biometrics and their use in e-passports. Image and Vision Computing\u00a027(3), 305\u2013312 (2009), Special Issue on Multimodal Biometrics","DOI":"10.1016\/j.imavis.2008.05.008"},{"key":"3_CR7","unstructured":"Nixon, M.S., Bouchrika, I., Arbab-Zavar, B., Carter, J.N.: On use of biometrics in forensics: Gait and ear. In: European Signal Processing Conference (August 2010)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Spaun, N.A.: Forensic biometrics from images and video at the federal bureau of investigation. In: First IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2007), pp. 1\u20133 (2007)","DOI":"10.1109\/BTAS.2007.4401932"},{"issue":"3-4","key":"3_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12193-009-0020-x","volume":"2","author":"G. Goudelis","year":"2008","unstructured":"Goudelis, G., Tefas, A., Pitas, I.: Emerging biometric modalities: A survey. Journal on Multimodal User Interfaces\u00a02(3-4), 217\u2013235 (2008)","journal-title":"Journal on Multimodal User Interfaces"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, 2nd edn. Springer (2009)","DOI":"10.1007\/978-1-84882-254-2"},{"key":"3_CR11","unstructured":"International Biometric Group: Biometrics market and industry report 2009-2014 (March 2008), \n                    http:\/\/www.biometricgroup.com"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1355-0306(06)71600-8","volume":"46","author":"D. Meuwly","year":"2006","unstructured":"Meuwly, D.: Forensic individualisation from biometric data. Science & Justice\u00a046(4), 205\u2013213 (2006)","journal-title":"Science & Justice"},{"key":"3_CR13","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-30567-2_19","volume-title":"Networked Digital Technologies","author":"S. Egawa","year":"2012","unstructured":"Egawa, S., Awad, A.I., Baba, K.: Evaluation of acceleration algorithm for biometric identification. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol.\u00a0294, pp. 231\u2013242. Springer, Heidelberg (2012)"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N.K. Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal\u00a040(3), 614\u2013634 (2001)","journal-title":"IBM Systems Journal"},{"issue":"5","key":"3_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.cviu.2013.01.003","volume":"117","author":"Y. Lee","year":"2013","unstructured":"Lee, Y., Filliben, J.J., Micheals, R.J., Phillips, P.J.: Sensitivity analysis for biometric systems: A methodology based on orthogonal experiment designs. Computer Vision and Image Understanding\u00a0117(5), 532\u2013550 (2013)","journal-title":"Computer Vision and Image Understanding"},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/S1001-8042(06)60020-1","volume":"17","author":"Y. Li","year":"2006","unstructured":"Li, Y.: Biometric technology overview. Nuclear Science and Techniques\u00a017(2), 97\u2013105 (2006)","journal-title":"Nuclear Science and Techniques"},{"key":"3_CR17","unstructured":"Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society, 2nd edn. Springer (2005)"},{"issue":"12","key":"3_CR18","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1016\/j.sigpro.2003.08.001","volume":"83","author":"R.D. Luis-Garcia","year":"2003","unstructured":"Luis-Garcia, R.D., Alberola-Lopez, C., Aghzout, O., Ruiz-Alzola, J.: Biometric identification systems. Signal Processing\u00a083(12), 2539\u20132557 (2003)","journal-title":"Signal Processing"},{"key":"3_CR19","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-40597-6_12","volume-title":"Advances in Security of Information and Communication Networks","author":"A.I. Awad","year":"2013","unstructured":"Awad, A.I., Hassanien, A.E., Zawbaa, H.M.: A cattle identification approach using live captured muzzle print images. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol.\u00a0381, pp. 143\u2013152. Springer, Heidelberg (2013)"},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A.K. Jain","year":"2006","unstructured":"Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security\u00a01(2), 125\u2013143 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"3_CR21","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"D. Toledano","year":"2006","unstructured":"Toledano, D., Fernandezpozo, R., Hernandeztrapote, A., Hernandezgomez, L.: Usability evaluation of multi-modal biometric verification systems. Interacting with Computers\u00a018(5), 1101\u20131122 (2006)","journal-title":"Interacting with Computers"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1016\/j.patcog.2012.09.016","volume":"46","author":"S. Islam","year":"2013","unstructured":"Islam, S., Davies, R., Bennamoun, M., Owens, R., Mian, A.: Multibiometric human recognition using 3D ear and face features. Pattern Recognition\u00a046(3), 613\u2013627 (2013)","journal-title":"Pattern Recognition"},{"issue":"1","key":"3_CR23","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MPRV.2012.54","volume":"12","author":"P. Tresadern","year":"2013","unstructured":"Tresadern, P., Cootes, T.F., Poh, N., Matejka, P., Hadid, A., Levy, C., McCool, C., Marcel, S.: Mobile biometrics: Combined face and voice verification for a mobile platform. IEEE Pervasive Computing\u00a012(1), 79\u201387 (2013)","journal-title":"IEEE Pervasive Computing"},{"issue":"0","key":"3_CR24","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.neucom.2011.12.044","volume":"100","author":"K. Yang","year":"2013","unstructured":"Yang, K., Du, E.Y., Zhou, Z.: Consent biometrics. Neurocomputing\u00a0100(0), 153\u2013162 (2013)","journal-title":"Neurocomputing"},{"issue":"11","key":"3_CR25","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"A.K. Jain","year":"2012","unstructured":"Jain, A.K., Nandakumar, K.: Biometric authentication: System security and user privacy. Computer\u00a045(11), 87\u201392 (2012)","journal-title":"Computer"},{"key":"3_CR26","unstructured":"Lee, H., Gaensslen, R.: Advances in Fingerprint Technology, 2nd edn. CRC Series in Forensic and Police Science. Taylor & Francis (2010)"},{"issue":"1","key":"3_CR27","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/s10044-003-0201-2","volume":"7","author":"N. Yager","year":"2004","unstructured":"Yager, N., Amin, A.: Fingerprint verification based on minutiae features: a review. Pattern Analysis & Applications\u00a07(1), 94\u2013113 (2004)","journal-title":"Pattern Analysis & Applications"},{"issue":"3","key":"3_CR28","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.imavis.2007.01.005","volume":"27","author":"D. Maltoni","year":"2009","unstructured":"Maltoni, D., Cappelli, R.: Advances in fingerprint modeling. Image and Vision Computing\u00a027(3), 258\u2013268 (2009)","journal-title":"Image and Vision Computing"},{"issue":"1","key":"3_CR29","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10044-004-0204-7","volume":"7","author":"N. Yager","year":"2004","unstructured":"Yager, N., Amin, A.: Fingerprint classification: a review. Pattern Analysis & Applications\u00a07(1), 77\u201393 (2004)","journal-title":"Pattern Analysis & Applications"},{"key":"3_CR30","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-22170-5_11","volume-title":"Software Engineering and Computer Systems","author":"A.I. Awad","year":"2011","unstructured":"Awad, A.I., Baba, K.: Fingerprint singularity detection: A comparative study. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds.) ICSECS 2011, Part I. CCIS, vol.\u00a0179, pp. 122\u2013132. Springer, Heidelberg (2011)"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-47917-1_7","volume-title":"Biometric Authentication","author":"R.M. Bolle","year":"2002","unstructured":"Bolle, R.M., Senior, A.W., Ratha, N.K., Pankanti, S.: Fingerprint minutiae: A constructive definition. In: Tistarelli, M., Bigun, J., Jain, A.K. (eds.) ECCV 2002. LNCS, vol.\u00a02359, pp. 58\u201366. Springer, Heidelberg (2002)"},{"issue":"5","key":"3_CR32","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1016\/j.eswa.2012.09.018","volume":"40","author":"A. Mu\u00f1oz-Brise\u00f1o","year":"2013","unstructured":"Mu\u00f1oz-Brise\u00f1o, A., Alonso, A.G., Palancar, J.H.: Fingerprint indexing with bad quality areas. Expert Systems with Applications\u00a040(5), 1839\u20131846 (2013)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TPAMI.2007.250596","volume":"29","author":"A.K. Jain","year":"2007","unstructured":"Jain, A.K., Chen, Y., Demirkus, M.: Pores and ridges: High-Resolution fingerprint matching using level 3 features. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a029(1), 15\u201327 (2007)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"3_CR34","first-page":"58","volume":"26","author":"E. Wynters","year":"2011","unstructured":"Wynters, E.: Parallel processing on NVIDIA graphics processing units using CUDA. Journal of Computing Sciences in Colleges\u00a026(3), 58\u201366 (2011)","journal-title":"Journal of Computing Sciences in Colleges"},{"issue":"3","key":"3_CR35","first-page":"279","volume":"37","author":"A.I. Awad","year":"2013","unstructured":"Awad, A.I.: Fingerprint local invariant feature extraction on GPU with CUDA. Informatica (Slovenia)\u00a037(3), 279\u2013284 (2013)","journal-title":"Informatica (Slovenia)"},{"key":"3_CR36","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/978-3-642-35326-0_52","volume-title":"Advanced Machine Learning Technologies and Applications","author":"A.I. Awad","year":"2012","unstructured":"Awad, A.I.: Machine learning techniques for fingerprint identification: A short review. In: Hassanien, A.E., Salem, A.-B.M., Ramadan, R., Kim, T.-h. (eds.) AMLTA 2012. CCIS, vol.\u00a0322, pp. 524\u2013531. Springer, Heidelberg (2012)"},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/S1355-0306(04)71682-2","volume":"44","author":"C. Peacock","year":"2004","unstructured":"Peacock, C., Goode, A., Brett, A.: Automatic forensic face recognition from digital images. Science & Justice\u00a044(1), 29\u201334 (2004)","journal-title":"Science & Justice"},{"issue":"10","key":"3_CR38","doi-asserted-by":"publisher","first-page":"2634","DOI":"10.1016\/j.patcog.2013.03.010","volume":"46","author":"M. Bereta","year":"2013","unstructured":"Bereta, M., Karczmarek, P., Pedrycz, W., Reformat, M.: Local descriptors in application to the aging problem in face recognition. Pattern Recognition\u00a046(10), 2634\u20132646 (2013)","journal-title":"Pattern Recognition"},{"key":"3_CR39","unstructured":"Jain, A.K., Li, S.Z.: Handbook of Face Recognition. Springer-Verlag New York, Inc., Secaucus (2005)"},{"issue":"3","key":"3_CR40","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TIFS.2010.2049842","volume":"5","author":"U. Park","year":"2010","unstructured":"Park, U., Jain, A.K.: Face matching and retrieval using soft biometrics. IEEE Transactions on Information Forensics and Security\u00a05(3), 406\u2013415 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Soukup, D., Bajla, I.: Robust object recognition under partial occlusions using NMF. In: Computational Intelligence and Neuroscience, vol.\u00a02008, 14 pages. Hindawi Publishing Corporation, ID 857453 (2008)","DOI":"10.1155\/2008\/857453"},{"issue":"26","key":"3_CR42","first-page":"429","volume":"93","author":"D.J. Gabor","year":"1946","unstructured":"Gabor, D.J.: Theory of communication. IEE\u00a093(26), 429\u2013457 (1946)","journal-title":"IEE"},{"issue":"11","key":"3_CR43","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J. Daugman","year":"1993","unstructured":"Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.ins.2012.09.021","volume":"221","author":"W.K. Chen","year":"2013","unstructured":"Chen, W.K., Lee, J.C., Han, W.Y., Shih, C.K., Chang, K.C.: Iris recognition based on bidimensional empirical mode decomposition and fractal dimension. Information Sciences\u00a0221, 439\u2013451 (2013)","journal-title":"Information Sciences"},{"issue":"3","key":"3_CR45","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/TIFS.2008.924606","volume":"3","author":"C. Belcher","year":"2008","unstructured":"Belcher, C., Du, Y.: A selective feature information approach for iris image-quality measure. IEEE Transactions on Information Forensics and Security\u00a03(3), 572\u2013577 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"3_CR46","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIM.2007.915437","volume":"57","author":"X. He","year":"2008","unstructured":"He, X., Yan, J., Chen, G., Shi, P.: Contactless autofeedback iris capture design. IEEE Transactions on Instrumentation and Measurement\u00a057(7), 1369\u20131375 (2008)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"1","key":"3_CR47","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.patcog.2011.07.019","volume":"45","author":"D. Rankin","year":"2012","unstructured":"Rankin, D., Scotney, B., Morrow, P., Pierscionek, B.: Iris recognition failure over time: The effects of texture. Pattern Recognition\u00a045(1), 145\u2013150 (2012)","journal-title":"Pattern Recognition"},{"issue":"2","key":"3_CR48","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.patcog.2012.08.005","volume":"46","author":"J. Daugman","year":"2013","unstructured":"Daugman, J., Downing, C.: No change over time is shown in Rankin et al. iris recognition failure over time: The effects of texture. Pattern Recognition\u00a046(2), 609\u2013610 (2013)","journal-title":"Pattern Recognition"},{"issue":"2","key":"3_CR49","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.patcog.2012.08.008","volume":"46","author":"D. Rankin","year":"2013","unstructured":"Rankin, D., Scotney, B., Morrow, P., Pierscionek, B.: Iris recognition\u2014the need to recognise the iris as a dynamic biological system: Response to Daugman and Downing. Pattern Recognition\u00a046(2), 611\u2013612 (2013)","journal-title":"Pattern Recognition"},{"issue":"1","key":"3_CR50","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.compbiomed.2012.10.005","volume":"43","author":"M. Juhola","year":"2013","unstructured":"Juhola, M., Zhang, Y., Rasku, J.: Biometric verification of a subject through eye movements. Computers in Biology and Medicine\u00a043(1), 42\u201350 (2013)","journal-title":"Computers in Biology and Medicine"},{"key":"3_CR51","unstructured":"Srihari, S.N., Huang, C., Srinivasan, H., Shah, V.: Biometric and forensic aspects of digital document processing. In: Chaudhuri, B.B. (ed.) Digital Document Processing. Springer (2005)"},{"issue":"2-3","key":"3_CR52","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.forsciint.2004.11.007","volume":"155","author":"J. Gonzalez-Rodriguez","year":"2005","unstructured":"Gonzalez-Rodriguez, J., Fierrez-Aguilar, J., Ramos-Castro, D., Ortega-Garcia, J.: Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems. Forensic Science International\u00a0155(2-3), 126\u2013140 (2005)","journal-title":"Forensic Science International"},{"key":"3_CR53","first-page":"126","volume-title":"33rd WIC Symposium on Information Theory in the Benelux","author":"T. Ali","year":"2012","unstructured":"Ali, T., Spreeuwers, L., Veldhuis, R.: A review of calibration methods for biometric systems in forensic applications. In: 33rd WIC Symposium on Information Theory in the Benelux, pp. 126\u2013133. WIC, The Netherlands (2012)"},{"key":"3_CR54","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer (2006)"},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Theodoridis, S., Pikrakis, A., Koutroumbas, K., Cavouras, D.: Introduction to Pattern Recognition: A Matlab Approach. Academic Press (2010)","DOI":"10.1016\/B978-1-59749-272-0.50003-7"}],"container-title":["Studies in Computational Intelligence","Computational Intelligence in Digital Forensics: Forensic Investigation and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05885-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T03:09:00Z","timestamp":1676862540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05885-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058849","9783319058856"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05885-6_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014]]}}}