{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:56:18Z","timestamp":1743101778909,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819977420"},{"type":"electronic","value":"9789819977437"}],"license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-7743-7_3","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:02:16Z","timestamp":1700902936000},"page":"36-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generalized Properties of\u00a0Generalized Fuzzy Sets GFScom and\u00a0Its Application"],"prefix":"10.1007","author":[{"given":"Shengli","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"issue":"1","key":"3_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1613\/jair.2425","volume":"32","author":"A Analyti","year":"2008","unstructured":"Analyti, A., Antoniou, G., Dam\u00e1sio, C.V., et al.: Extended RDF as a semantic foundation of rule markup languages. J. Artif. Intell. Res. 32(1), 37\u201394 (2008). https:\/\/doi.org\/10.1613\/jair.2425","journal-title":"J. Artif. Intell. Res."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.fss.2021.10.013","volume":"441","author":"H Bustince","year":"2022","unstructured":"Bustince, H., Campi\u00f3n, M., Miguel, L.D., et al.: Strong negations and restricted equivalence functions revisited: an analytical and topological approach. Fuzzy Sets Syst. 441, 110\u2013129 (2022). https:\/\/doi.org\/10.1016\/j.fss.2021.10.013","journal-title":"Fuzzy Sets Syst."},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.fss.2009.09.003","volume":"161","author":"P Cintula","year":"2010","unstructured":"Cintula, P., Klement, E.P., Mesiar, R., et al.: Fuzzy logics with an additional involutive negation. Fuzzy Sets Syst. 161(3), 390\u2013411 (2010). https:\/\/doi.org\/10.1016\/j.fss.2009.09.003","journal-title":"Fuzzy Sets Syst."},{"key":"3_CR4","volume-title":"Interpolation and Approximation","author":"PJ Davis","year":"1963","unstructured":"Davis, P.J.: Interpolation and Approximation. Blaisdell, New York (1963)"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s001530050006","volume":"39","author":"F Esteva","year":"2000","unstructured":"Esteva, F., Godo, L., H\u00e1jek, P., et al.: Residuated fuzzy logics with an involutive negation. Arch. Math. Logic 39(2), 103\u2013124 (2000). https:\/\/doi.org\/10.1007\/s001530050006","journal-title":"Arch. Math. Logic"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.fss.2021.06.009","volume":"441","author":"R Fernandez-Peralta","year":"2022","unstructured":"Fernandez-Peralta, R., Massanet, S., Mesiarov\u00e1-Zem\u00e1nkov\u00e1, A., et al.: A general framework for the characterization of (S, N)-implications with a non-continuous negation based on completions of t-conorms. Fuzzy Sets Syst. 441, 1\u201332 (2022). https:\/\/doi.org\/10.1016\/j.fss.2021.06.009","journal-title":"Fuzzy Sets Syst."},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11671404_9","volume-title":"Formal Concept Analysis","author":"S Ferr\u00e9","year":"2006","unstructured":"Ferr\u00e9, S.: Negation, opposition, and possibility in logical concept analysis. In: Missaoui, R., Schmidt, J. (eds.) ICFCA 2006. LNCS (LNAI), vol. 3874, pp. 130\u2013145. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11671404_9"},{"key":"3_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-5300-3","volume-title":"Metamathematics of Fuzzy Logic","author":"P H\u00e1jek","year":"1998","unstructured":"H\u00e1jek, P.: Metamathematics of Fuzzy Logic. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, L., Bosselut, A., Bhagavatula, C., et al.: \u201cI\u2019m not mad\u201d: Commonsense implications of negation and contradiction (2021). https:\/\/arxiv.org\/abs\/2104.06511","DOI":"10.18653\/v1\/2021.naacl-main.346"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s00354-007-0028-2","volume":"25","author":"K Kaneiwa","year":"2007","unstructured":"Kaneiwa, K.: Description logics with contraries, contradictories, and subcontraries. N. Gener. Comput. 25(4), 443\u2013468 (2007). https:\/\/doi.org\/10.1007\/s00354-007-0028-2","journal-title":"N. Gener. Comput."},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Kassner, N., Sch\u00fctze, H.: Negated and misprimed probes for pretrained language models: birds can talk, but cannot fly. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, pp. 7811\u20137818. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.698","DOI":"10.18653\/v1\/2020.acl-main.698"},{"key":"3_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-9540-7","volume-title":"Triangular Norms","author":"EP Klement","year":"2000","unstructured":"Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Kluwer, Dordrrecht (2000)"},{"key":"3_CR13","volume-title":"Fuzzy Sets and Fuzzy Logic: Theory and Applications","author":"GJ Klir","year":"1995","unstructured":"Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications. Prantice-Hall, Upper Saddle River (1995)"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.fss.2013.05.006","volume":"242","author":"P Murinov\u00e1","year":"2014","unstructured":"Murinov\u00e1, P., Nov\u00e1k, V.: Analysis of generalized square of opposition with intermediate quantifiers. Fuzzy Sets Syst. 242, 89\u2013113 (2014). https:\/\/doi.org\/10.1016\/j.fss.2013.05.006","journal-title":"Fuzzy Sets Syst."},{"issue":"4","key":"3_CR15","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.chaos.2006.07.006","volume":"36","author":"K Nourouzi","year":"2008","unstructured":"Nourouzi, K., Aghajani, A.: Convexity in triangular norm of fuzzy sets. Chaos Solit. Fract. 36(4), 883\u2013889 (2008). https:\/\/doi.org\/10.1016\/j.chaos.2006.07.006","journal-title":"Chaos Solit. Fract."},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/S0165-0114(01)00104-X","volume":"124","author":"V Nov\u00e1k","year":"2001","unstructured":"Nov\u00e1k, V.: Antonyms and linguistic quantifers in fuzzy logic. Fuzzy Sets Syst. 124(3), 335\u2013351 (2001). https:\/\/doi.org\/10.1016\/S0165-0114(01)00104-X","journal-title":"Fuzzy Sets Syst."},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.fss.2004.03.027","volume":"149","author":"V Nov\u00e1k","year":"2005","unstructured":"Nov\u00e1k, V.: On fuzzy type theory. Fuzzy Sets Syst. 149(2), 235\u2013273 (2005). https:\/\/doi.org\/10.1016\/j.fss.2004.03.027","journal-title":"Fuzzy Sets Syst."},{"issue":"22","key":"3_CR18","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1016\/j.fss.2008.02.023","volume":"159","author":"V Nov\u00e1k","year":"2008","unstructured":"Nov\u00e1k, V.: A comprehensive theory of trichotomous evaluative linguistic expressions. Fuzzy Sets Syst. 159(22), 2939\u20132969 (2008). https:\/\/doi.org\/10.1016\/j.fss.2008.02.023","journal-title":"Fuzzy Sets Syst."},{"issue":"2","key":"3_CR19","first-page":"265","volume":"10","author":"Y Pan","year":"1990","unstructured":"Pan, Y., Wu, W.M.: Medium algebras. J. Math. Res. Exposition 10(2), 265\u2013270 (1990)","journal-title":"J. Math. Res. Exposition"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Pan, Z.H.: Fuzzy set with three kinds of negations in fuzzy knowledge processing. In: Proceedings of The Ninth International Conference on Machine Learning and Cybernatics, Piscataway, USA, vol. 5, pp. 2730\u20132735. IEEE Computer Society Press (2010). https:\/\/doi.org\/10.1109\/ICMLC.2010.5580945","DOI":"10.1109\/ICMLC.2010.5580945"},{"issue":"7","key":"3_CR21","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.3724\/SP.J.1016.2012.01421","volume":"35","author":"ZH Pan","year":"2012","unstructured":"Pan, Z.H.: Three kinds of fuzzy knowledge and their base of set. Chin. J. Comput. 35(7), 1421\u20131428 (2012). https:\/\/doi.org\/10.3724\/SP.J.1016.2012.01421. (in Chinese)","journal-title":"Chin. J. Comput."},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-39482-9_10","volume-title":"Intelligent Computing Theories and Technology","author":"Z Pan","year":"2013","unstructured":"Pan, Z.: Three kinds of negation of fuzzy knowledge and their base of logic. In: Huang, D.-S., Jo, K.-H., Zhou, Y.-Q., Han, K. (eds.) ICIC 2013. LNCS (LNAI), vol. 7996, pp. 83\u201393. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39482-9_10"},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TSMCB.2011.2174151","volume":"42","author":"AH Sonbol","year":"2012","unstructured":"Sonbol, A.H., Fadali, M.S., Jafarzadeh, S.: TSK fuzzy approximators: design and accuracy analysis. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 42(3), 702\u2013712 (2012). https:\/\/doi.org\/10.1109\/TSMCB.2011.2174151","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"issue":"7","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/TFUZZ.2018.2879033","volume":"27","author":"C Torres-Blanc","year":"2019","unstructured":"Torres-Blanc, C., Cubillo, S., Hernndez-Varela, P.: New negations on the membership functions of type-2 fuzzy sets. IEEE Trans. Fuzzy Syst. 27(7), 1397\u20131406 (2019). https:\/\/doi.org\/10.1109\/TFUZZ.2018.2879033","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-24572-8_3","volume-title":"Principles and Practice of Semantic Web Reasoning","author":"G Wagner","year":"2003","unstructured":"Wagner, G.: Web Rules Need Two Kinds of Negation. In: Bry, F., Henze, N., Ma\u0142uszy\u0144ski, J. (eds.) PPSWR 2003. LNCS, vol. 2901, pp. 33\u201350. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24572-8_3"},{"key":"3_CR26","volume-title":"A Course in Fuzzy Systems and Control","author":"LX Wang","year":"1997","unstructured":"Wang, L.X.: A Course in Fuzzy Systems and Control. Prentice Hall PTR, Englewood Cliff (1997)"},{"issue":"1","key":"3_CR27","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/tsmc.2018.2875452","volume":"51","author":"X Luo","year":"2021","unstructured":"Luo, X., Liu, S.G.: A fast non-negative latent factor model based on generalized momentum method. IEEE Trans. Syst. Man Cybern.-Syst. 51(1), 610\u2013620 (2021). https:\/\/doi.org\/10.1109\/tsmc.2018.2875452","journal-title":"IEEE Trans. Syst. Man Cybern.-Syst."},{"issue":"2","key":"3_CR28","first-page":"327","volume":"8","author":"XA Xiao","year":"1988","unstructured":"Xiao, X.A., Zhu, W.J.: Propositional calculus system of medium logic(I). J. Math. Res. Exp. 8(2), 327\u2013331 (1988)","journal-title":"J. Math. Res. Exp."},{"issue":"3","key":"3_CR29","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/0005-1098(94)90130-9","volume":"30","author":"H Ying","year":"1994","unstructured":"Ying, H.: Sufficient conditions on general fuzzy systems as function approximators. Automatica 30(3), 521\u2013525 (1994). https:\/\/doi.org\/10.1016\/0005-1098(94)90130-9","journal-title":"Automatica"},{"issue":"6","key":"3_CR30","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/91.890337","volume":"8","author":"K Zeng","year":"2000","unstructured":"Zeng, K., Zhang, N.Y., Xu, W.L.: A comparative study on sufficient conditions for Takagi-Sugeno fuzzy systems as universal approximators. IEEE Trans. Fuzzy Syst. 8(6), 773\u2013780 (2000). https:\/\/doi.org\/10.1109\/91.890337","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/91.481844","volume":"4","author":"XJ Zeng","year":"1996","unstructured":"Zeng, X.J., Singh, M.G.: Approximation accuracy analysis of fuzzy systems as function approximators. IEEE Trans. Fuzzy Syst. 4(1), 44\u201363 (1996). https:\/\/doi.org\/10.1109\/91.481844","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"4","key":"3_CR32","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3778\/j.issn.1673-9418.1306006","volume":"8","author":"SL Zhang","year":"2014","unstructured":"Zhang, S.L.: Formal deductive system of fuzzy propositional logic with different negations. J. Front. Comput. Sci. Technol. 8(4), 494\u2013505 (2014). https:\/\/doi.org\/10.3778\/j.issn.1673-9418.1306006. (in Chinese)","journal-title":"J. Front. Comput. Sci. Technol."},{"issue":"12","key":"3_CR33","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.11897\/SP.J.1016.2016.02527","volume":"39","author":"SL Zhang","year":"2016","unstructured":"Zhang, S.L., Li, Y.M.: Algebraic representation of negative knowledge and its application to design of fuzzy systems. Chin. J. Comput. 39(12), 2527\u20132546 (2016). https:\/\/doi.org\/10.11897\/SP.J.1016.2016.02527","journal-title":"Chin. J. Comput."},{"issue":"22","key":"3_CR34","doi-asserted-by":"publisher","first-page":"6767","DOI":"10.1007\/s00500-016-2226-7","volume":"21","author":"S Zhang","year":"2016","unstructured":"Zhang, S., Li, Y.: A novel table look-up scheme based on GFScom and its application. Soft. Comput. 21(22), 6767\u20136781 (2016). https:\/\/doi.org\/10.1007\/s00500-016-2226-7","journal-title":"Soft. Comput."},{"issue":"1","key":"3_CR35","first-page":"139","volume":"8","author":"WJ Zhu","year":"1988","unstructured":"Zhu, W.J., Xiao, X.A.: On the Naive mathematical models of medium mathematical system MM. J. Math. Res. Exposition 8(1), 139\u2013151 (1988)","journal-title":"J. Math. Res. Exposition"},{"issue":"4","key":"3_CR36","first-page":"583","volume":"24","author":"WJ Zhu","year":"1988","unstructured":"Zhu, W.J., Xiao, X.A.: Predicate calculus system of medium logic(II). J of Nanjing University 24(4), 583\u2013596 (1988)","journal-title":"J of Nanjing University"},{"issue":"3","key":"3_CR37","first-page":"457","volume":"8","author":"WJ Zhu","year":"1988","unstructured":"Zhu, W.J., Xiao, X.A.: Propositional calculus system of medium logic(II). J. Math. Res. Exposition 8(3), 457\u2013466 (1988)","journal-title":"J. Math. Res. Exposition"},{"issue":"3","key":"3_CR38","first-page":"467","volume":"8","author":"J Zou","year":"1988","unstructured":"Zou, J.: Semantic interpretation of propositional calculus system $$MP^\\ast $$ of medium logic and its soundness and completeness. J. Math. Res. Exposition 8(3), 467\u2013468 (1988). (in Chinese)","journal-title":"J. Math. Res. Exposition"},{"issue":"6","key":"3_CR39","first-page":"448","volume":"34","author":"J Zou","year":"1989","unstructured":"Zou, J.: Semantic interpretation of predicate calculus system of medium logic $$ME^\\ast $$ and its soundness and completeness. Chin. Sci. Bulletin 34(6), 448\u2013451 (1989)","journal-title":"Chin. Sci. Bulletin"}],"container-title":["Communications in Computer and Information Science","Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7743-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:03:45Z","timestamp":1700903025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7743-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"ISBN":["9789819977420","9789819977437"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7743-7_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Shengli Zhang and Jing Chen declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"NCTCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Conference of Theoretical Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nctcs2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.ccf.org.cn\/TCS2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"https:\/\/conf.ccf.org.cn\/TCS2023","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The submission system is belonged to the hosted organization -China Computer Federation. It is free to us.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}