{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:49:17Z","timestamp":1767980957486,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Singapore","isbn-type":[{"value":"9789813368347","type":"print"},{"value":"9789813368354","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_10","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"148-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9634-4160","authenticated-orcid":false,"given":"Azmi Shawkat","family":"Abdulbaqi","sequence":"first","affiliation":[]},{"given":"Salwa Mohammed","family":"Nejrs","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9386-4275","authenticated-orcid":false,"given":"Sawsan D.","family":"Mahmood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1211-7137","authenticated-orcid":false,"given":"Ismail Yusuf","family":"Panessai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.ins.2016.09.045","volume":"387","author":"G Hu","year":"2017","unstructured":"Hu, G., Xiao, D., Xiang, T., Bai, S., Zhang, Y.: A compressive sensing based privacy-preserving outsourcing of image storage and identity authentication. Inf. Sci. 387, 132\u2013145 (2017)","journal-title":"Inf. Sci."},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.neucom.2016.07.012","volume":"216","author":"L Feng","year":"2016","unstructured":"Feng, L., Sun, H., Sun, Q., Xia, G.: Compressive sensing via nonlocal low-rank tensor regularization. Neurocomputing 216, 45\u201360 (2016)","journal-title":"Neurocomputing"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.image.2016.05.012","volume":"47","author":"L Feng","year":"2016","unstructured":"Feng, L., Sun, H., Sun, Q., Xia, G.: Image compressive sensing via truncated Schatten- p norm regularization. Sig. Process. Image Commun. 47, 28\u201341 (2016)","journal-title":"Sig. Process. Image Commun."},{"issue":"409410","key":"10_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ins.2017.05.009","volume":"101\u2013120","author":"Y Zhou","year":"2017","unstructured":"Zhou, Y., Zeng, F.: 2D compressive sensing, and multi-feature fusion for effective 3D shape retrieval. Inf. Sci. 101\u2013120(409410), 101\u2013120 (2017)","journal-title":"Inf. Sci."},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"035010","DOI":"10.1088\/2057-1976\/aa6db8","volume":"3","author":"L Shaw","year":"2017","unstructured":"Shaw, L., Routray, A., Sanchay, S.: A robust motifs based artifacts removal technique from EEG. Biomed. Phys. Eng. Exp. 3(3), 035010 (2017)","journal-title":"Biomed. Phys. Eng. Exp."},{"issue":"1","key":"10_CR6","first-page":"8","volume":"5","author":"C Umale","year":"2016","unstructured":"Umale, C., Vaidya, A., Shirude, S., Raut, A.: Feature extraction techniques and classification algorithms for EEG signals to detect human stress \u2013 a review. Int. J. Comput. Appl. Technol. Res. 5(1), 8\u201314 (2016)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"10_CR7","unstructured":"Fira, M.: The EEG signal classification in compressed sensing space. The Twelfth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2017, 23 \u201327 July 2017, Nice, Franta (2017)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Alsenwi, M., Saeed, M., Ismail, T., Mostafa, H., Gibran, S.: Hybrid compression technique with data segmentation for electroencephalography data. In: 29th International Conference on Microelectronics (ICM). IEEE, December 2017","DOI":"10.1109\/ICM.2017.8268880"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Oktavia, N.Y., Wibawa, A.D., Pane, E.S., Purnomo, M.H.: Human emotion classification based on eeg signals using naive bayes method. In: International Seminar on Application for Technology of Information and Communication (2019)","DOI":"10.1109\/ISEMANTIC.2019.8884224"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TAFFC.2017.2712143","volume":"10","author":"W-L Zheng","year":"2017","unstructured":"Zheng, W.-L., Zhu, J.-Y., Lu, B.-L.: Identifying stable patterns over time for emotion recognition from EEG. IEEE Trans. Affect. Comput. 10, 417\u2013429 (2017)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Alsenwi, M., Ismail, T., Mostafa, H.: Performance analysis of hybrid lossy\/lossless compression techniques for EEG data. In: 28th International Conference on Microelectronics (ICM). IEEE, December 2016","DOI":"10.1109\/ICM.2016.7847849"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.compbiomed.2017.05.024","volume":"87","author":"A Fathi","year":"2017","unstructured":"Fathi, A., Hejrati, B., Abdali-Mohammadi, F.: A new near-lossless EEG compression method using ANN-based reconstruction technique. Comput. Biol. Med. 87, 87\u201394 (2017)","journal-title":"Comput. Biol. Med."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2017.2678104","volume":"5","author":"H Xiong","year":"2017","unstructured":"Xiong, H., Tao, J., Yuan, C.: Enabling telecare medical information systems with strong authentication and anonymity. IEEE Access 5, 1\u20131 (2017)","journal-title":"IEEE Access"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"12601","DOI":"10.1109\/ACCESS.2017.2716439","volume":"5","author":"A Ara","year":"2017","unstructured":"Ara, A., Al-Rodhaan, M., Tian, Y., Al-Dhelaan, A.: A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5, 12601\u201312617 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/JBHI.2017.2698498","volume":"22","author":"T Liu","year":"2018","unstructured":"Liu, T., Lin, K., Wu, H.: ECG data encryption then compression using singular value decomposition. IEEE J. Biomed. Health Inf. 22(3), 707\u2013713 (2018)","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab, A., et al.: Secure and robust fragile watermarking scheme for medical images. IEEE Access 6, 10269\u201310278 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","volume":"56","author":"E Luo","year":"2018","unstructured":"Luo, E., Bhuiyan, M., Wang, G., Rahman, M., Wu, J., Atiquzzaman, M.: Privacyprotector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun. Mag. 56(2), 163\u2013168 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AA El-Latif","year":"2018","unstructured":"El-Latif, A.A., Abd-El-Atty, B., Hossain, M., Rahman, M., Alamri, A., Gupta, B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access 6, 21075\u201321083 (2018)","journal-title":"IEEE Access"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"36939","DOI":"10.1109\/ACCESS.2018.2844182","volume":"6","author":"W Yang","year":"2018","unstructured":"Yang, W., et al.: Securing mobile healthcare data: a smart card-based cancelable finger-vein bio-cryptosystem. IEEE Access 6, 36939\u201336947 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","volume":"67","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, M.: The efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire. IEEE Trans. Reliab. 67(3), 1328\u20131339 (2018)","journal-title":"IEEE Trans. Reliab."},{"issue":"5","key":"10_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCE.2018.2835898","volume":"7","author":"B Detta","year":"2018","unstructured":"Detta, B., Pal, P., Bandyopadhyay, S.: An audio transmission of medical reports for visa processing: a solution to the spread of communicable diseases by the immigrant population. IEEE Consum. Electron. Mag. 7(5), 27\u201333 (2018)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"5","key":"10_CR22","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1049\/iet-net.2017.0180","volume":"7","author":"M Boussif","year":"2018","unstructured":"Boussif, M., Aloui, N., Cherif, A.: Secured cloud computing for medical data based on watermarking and encryption. IET Networks 7(5), 294\u2013298 (2018)","journal-title":"IET Networks"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.cmpb.2017.07.007","volume":"149","author":"MA Serhani","year":"2017","unstructured":"Serhani, M.A., El Menshawy, M., Benharref, A., Harous, S., Navaz, A.N.: New algorithms for processing time-series big EEG data within mobile health monitoring systems. Comput. Methods Prog. Biomed. 149, 79\u201394 (2017)","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"9","key":"10_CR24","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.3390\/app8091474","volume":"8","author":"CA Chen","year":"2018","unstructured":"Chen, C.A., Wu, C., Abu, P.A.R., Chen, S.L.: VLSI implementation of an efficient lossless EEG compression design for wireless body area networks. Appl. Sci. 8(9), 1474 (2018)","journal-title":"Appl. Sci."},{"issue":"4","key":"10_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10916-017-0698-3","volume":"41","author":"MA Murillo-Escobar","year":"2017","unstructured":"Murillo-Escobar, M.A., Cardoza-Avenda\u00f1o, L., L\u00f3pez-Guti\u00e9rrez, R.M., Cruz-Hern\u00e1ndez, C.: A double chaotic layer encryption algorithm for clinical signals in telemedicine. J. Med. Syst. 41(4), 59 (2017)","journal-title":"J. Med. Syst."},{"issue":"4","key":"10_CR26","first-page":"3402","volume":"7","author":"AS Abdulbaqi","year":"2018","unstructured":"Abdulbaqi, A.S., Najim, S.A.D.M., Mahdi, R.H.: Robust multichannel EEG signals compression model based on hybridization technique. Int. J. Eng. Tech. 7(4), 3402\u20133405 (2018)","journal-title":"Int. J. Eng. Tech."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.measurement.2017.11.006","volume":"116","author":"S Dhar","year":"2018","unstructured":"Dhar, S., Mukhopadhyay, S.K., Pal, S., Mitra, M.: An efficient data compression and encryption technique for PPG signal. Measurement 116, 533\u2013542 (2018)","journal-title":"Measurement"},{"issue":"2","key":"10_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3027489","volume":"13","author":"R Tan","year":"2017","unstructured":"Tan, R., Chiu, S.Y., Nguyen, H.H., Yau, D.K., Jung, D.: A joint data compression and encryption approach for wireless energy auditing networks. ACM Trans. Sensor Netw. (TOSN) 13(2), 1\u201332 (2017)","journal-title":"ACM Trans. Sensor Netw. (TOSN)"},{"key":"10_CR29","unstructured":"Gupta, S., Banerjee, A.: U.S. Patent No. 9,626,521. Washington, DC: U.S. Patent and Trademark Office (2017)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Abdulbaqi, A.S., Saif, S.A.D.M.N., Falath, F.M.M., Nawar, N.A.I.: A proposed technique based on wavelet transforms for electrocardiogram signal compression. In:\u00a02018 1st Annual International Conference on Information and Sciences (AiCIS),\u00a0pp. 229\u2013234. IEEE, November 2018","DOI":"10.1109\/AiCIS.2018.00049"},{"issue":"3","key":"10_CR31","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4018\/IJDCF.2019070103","volume":"11","author":"SJ Sheela","year":"2019","unstructured":"Sheela, S.J., Suresh, K.V., Tandur, D.: Secured transmission of clinical signals using hyperchaotic DNA confusion and diffusion transform. Int. J. Digit. Crime Forensics (IJDCF) 11(3), 43\u201364 (2019)","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"issue":"05","key":"10_CR32","doi-asserted-by":"publisher","first-page":"1950031","DOI":"10.1142\/S0219691319500310","volume":"17","author":"AN Shinde","year":"2019","unstructured":"Shinde, A.N., Lalbalwar, S.L., Nandgaonkar, A.B.: Modified meta-heuristic-oriented compressed sensing reconstruction algorithm for bio-signals. Int. J. Wavelets Multiresolut. Inf. Process. 17(05), 1950031 (2019)","journal-title":"Int. J. Wavelets Multiresolut. Inf. Process."},{"key":"10_CR33","unstructured":"Prasana, V. P., Murugeswari, G.: Medical signal steganography using curvelet Transform. Int. J. Adv. Res. Comput. Sci. 8(3) (2017)"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/JIOT.2019.2953519","volume":"7","author":"Z Niu","year":"2019","unstructured":"Niu, Z., Zheng, M., Zhang, Y., Wang, T.: A new asymmetrical encryption algorithm based on semitensor compressed sensing in WBANs. IEEE Internet Things J. 7(1), 734\u2013750 (2019)","journal-title":"IEEE Internet Things J."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Akmandor, A.O., Yin, H., Jha, N.K.: Simultaneously ensuring smartness, security, and energy efficiency in Internet-of-Things sensors. In:\u00a0IEEE Custom Integrated Circuits Conference (CICC), pp. 1\u20138. IEEE, April 2018\u200f","DOI":"10.1109\/CICC.2018.8357069"},{"key":"10_CR36","first-page":"101","volume":"11","author":"H Anas","year":"2017","unstructured":"Anas, H., Latif, R., Arioua, M.: Efficient electrocardiogram (ECG) lossy compression scheme for real-time e-Health monitoring. Int. J. Biol. Biomed. Eng. 11, 101\u2013114 (2017)","journal-title":"Int. J. Biol. Biomed. Eng."},{"issue":"2","key":"10_CR37","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.bbe.2018.11.012","volume":"39","author":"A Pandey","year":"2019","unstructured":"Pandey, A., Singh, B., Saini, B.S., Sood, N.: A novel fused coupled chaotic map based confidential data embedding-then-encryption of the electrocardiogram signal. Biocybern. Biomed. Eng. 39(2), 282\u2013300 (2019)","journal-title":"Biocybern. Biomed. Eng."},{"issue":"4","key":"10_CR38","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1109\/JIOT.2019.2951405","volume":"7","author":"S Rajesh","year":"2019","unstructured":"Rajesh, S., Paul, V., Menon, V.G., Jacob, S., Vinod, P.: Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients. IEEE Internet Things J. 7(4), 2531\u20132538 (2019)","journal-title":"IEEE Internet Things J."},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"101596","DOI":"10.1016\/j.bspc.2019.101596","volume":"54","author":"F Abdali-Mohammadi","year":"2019","unstructured":"Abdali-Mohammadi, F.: 12 lead electrocardiography signal compression by a new genetic programming based mathematical modeling algorithm. Biomed. Signal Process. Control 54, 101596 (2019)","journal-title":"Biomed. Signal Process. Control"},{"key":"10_CR40","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-981-13-7399-2_12","volume-title":"Energy Conservation for IoT Devices","author":"A Gupta","year":"2019","unstructured":"Gupta, A., Chakraborty, C., Gupta, B.: Medical information processing using smartphone under IoT framework. In: Mittal, M., Tanwar, S., Agarwal, B., Goyal, L.M. (eds.) Energy Conservation for IoT Devices. SSDC, vol. 206, pp. 283\u2013308. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-7399-2_12"},{"issue":"5","key":"10_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.9781\/ijimai.2018.12.008","volume":"5","author":"LE George","year":"2019","unstructured":"George, L.E., Hadi, H.A.: User identification and verification from a pair of simultaneous EEG channels using transform based features. IJIMAI 5(5), 54\u201362 (2019)","journal-title":"IJIMAI"},{"key":"10_CR42","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-981-13-1708-8_33","volume-title":"Progress in Advanced Computing and Intelligent Engineering","author":"MJ Vidya","year":"2019","unstructured":"Vidya, M.J., Padmaja, K.V.: Appending photoplethysmograph as a security key for encryption of medical images using watermarking. In: Pati, B., Panigrahi, C.R., Misra, S., Pujari, A.K., Bakshi, S. (eds.) Progress in Advanced Computing and Intelligent Engineering. AISC, vol. 713, pp. 359\u2013369. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-1708-8_33"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Mavinkattimath, S.G., Khanai, R., Torse, D.A.: A survey on secured wireless body sensor networks. In: 2019 International Conference on Communication and Signal Processing (ICCSP), pp. 0872\u20130875. IEEE, April 2019","DOI":"10.1109\/ICCSP.2019.8698032"},{"key":"10_CR44","unstructured":"Milev, D.: Processing and Transmission of EEG signals (2020)"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T01:53:28Z","timestamp":1619315608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}