{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:56:36Z","timestamp":1772495796914,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:00:00Z","timestamp":1547769600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["15ZR1430000"],"award-info":[{"award-number":["15ZR1430000"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["14ZR1429800"],"award-info":[{"award-number":["14ZR1429800"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Fund of National 12th Five-Year Education Plan","award":["EIA140412"],"award-info":[{"award-number":["EIA140412"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s00500-019-03759-0","type":"journal-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T09:22:21Z","timestamp":1547803341000},"page":"9299-9313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Road network-based region of interest mining and social relationship recommendation"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8705-0099","authenticated-orcid":false,"given":"Rong","family":"Tan","sequence":"first","affiliation":[]},{"given":"Yunpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,18]]},"reference":[{"issue":"12","key":"3759_CR1","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10916-017-0846-9","volume":"41","author":"M Abdel-Basset","year":"2017","unstructured":"Abdel-Basset M, Fakhry AE, El-henawy I, Qiu T, Sangaiah AK (2017) Feature and intensity based medical image registration using particle swarm optimization. J Med Syst 41(12):197","journal-title":"J Med Syst"},{"key":"3759_CR2","doi-asserted-by":"crossref","unstructured":"Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: IEEE international conference on computer science and engineering, pp 1036\u20131042","DOI":"10.1109\/CSE.2009.243"},{"key":"3759_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0594-6","author":"HS Chiang","year":"2018","unstructured":"Chiang HS, Sangaiah AK, Chen MY, Liu JY (2018) A novel artificial bee colony optimization algorithm with SVM for bio-inspired software-defined networking. Int J Parallel Program. \n                    https:\/\/doi.org\/10.1007\/s10766-018-0594-6","journal-title":"Int J Parallel Program"},{"key":"3759_CR4","doi-asserted-by":"crossref","unstructured":"Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: user movement in location-based social networks. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 1082\u20131090","DOI":"10.1145\/2020408.2020579"},{"key":"3759_CR5","doi-asserted-by":"crossref","unstructured":"Cranshaw J, Toch E, Hong J, Kittur A, Sadeh N (2010) Bridging the gap between physical location and online social networks. In: 12th international conference on ubiquitous computing, pp 119\u2013128","DOI":"10.1145\/1864349.1864380"},{"key":"3759_CR6","doi-asserted-by":"crossref","unstructured":"Giannotti F, Nanni M, Pinelli F, Pedreschi D (2007) Trajectory pattern mining. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 330\u2013339","DOI":"10.1145\/1281192.1281230"},{"issue":"4","key":"3759_CR7","first-page":"49","volume":"2","author":"JZ Gu","year":"2009","unstructured":"Gu JZ, He L, Yang J, Lu Z (2009) Location aware mobile cooperation design and system. Int J Signal Process Image Process Pattern Recognit 2(4):49\u201360","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"key":"3759_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0587-5","author":"T Han","year":"2018","unstructured":"Han T, Zeng M, Zhang L, Sangaiah AK (2018) A channel-aware duty cycle optimization for node-to-node communications in the internet of medical things. Int J Parallel Program. \n                    https:\/\/doi.org\/10.1007\/s10766-018-0587-5","journal-title":"Int J Parallel Program"},{"key":"3759_CR9","doi-asserted-by":"crossref","unstructured":"Hightower J, Consolvo S, LaMarca A, Smith I, Hughes J (2005) Learning and recognizing the places we go. In: Proceedings of Ubicomp, pp 159\u2013176","DOI":"10.1007\/11551201_10"},{"key":"3759_CR10","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.compeleceng.2018.03.037","volume":"67","author":"W Jiang","year":"2018","unstructured":"Jiang W, Yang X, Wu W, Liu K, Ahmad A, Sangaiah AK, Jeon G (2018) Medical images fusion by using weighted least squares filter and sparse representation. Comput Electr Eng 67:252\u2013266","journal-title":"Comput Electr Eng"},{"key":"3759_CR11","doi-asserted-by":"crossref","unstructured":"Karki BR, Hamalainen A, Porras J (2008) Social networking on mobile environment. In: Proceedings of ACM\/IFIP\/USENIX middleware conference on companion, pp 93\u201394","DOI":"10.1145\/1462735.1462760"},{"issue":"12","key":"3759_CR12","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JPROC.2011.2169033","volume":"99","author":"N Kayastha","year":"2011","unstructured":"Kayastha N, Niyato D, Wang P, Hossain E (2011) Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc IEEE. 99(12):2130\u20132158","journal-title":"Proc IEEE."},{"issue":"5","key":"3759_CR13","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1007\/s10766-017-0550-x","volume":"46","author":"S Kumar","year":"2017","unstructured":"Kumar S, Singh SK, Abidi AI, Datta D, Sangaiah AK (2017) Group sparse representation approach for recognition of cattle on muzzle point images. Int J Parallel Program 46(5):812\u2013837","journal-title":"Int J Parallel Program"},{"issue":"4","key":"3759_CR14","doi-asserted-by":"publisher","first-page":"5787","DOI":"10.1007\/s11042-014-2408-1","volume":"76","author":"S Liu","year":"2017","unstructured":"Liu S, Fu W, He L, Zhou JT, Ma ZM (2017a) Distribution of primary additional errors in fractal encoding method. Multimed Tools Appl 76(4):5787\u20135802","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"3759_CR15","doi-asserted-by":"publisher","first-page":"1740004","DOI":"10.1142\/S0218348X17400047","volume":"25","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Cheng X (2017b) A novel fast fractal image compression method based on distance clustering in high dimensional sphere surface. Fractals 25(4):1740004","journal-title":"Fractals"},{"issue":"1","key":"3759_CR16","first-page":"147","volume":"31","author":"MQ Lv","year":"2015","unstructured":"Lv MQ, Li YL, Yuan ZM, Wang QH (2015) Route pattern mining from personal trajectory data. J Inf Sci Eng 31(1):147\u2013164","journal-title":"J Inf Sci Eng"},{"issue":"12","key":"3759_CR17","doi-asserted-by":"publisher","first-page":"5530","DOI":"10.1109\/TII.2018.2873492","volume":"14","author":"N Lv","year":"2018","unstructured":"Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on sparse autoencoder for change detection in SAR images. IEEE Trans Ind Inf 14(12):5530\u20135538","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"3759_CR18","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TETCI.2017.2769110","volume":"2","author":"DV Medhane","year":"2018","unstructured":"Medhane DV, Sangaiah AK (2018) PCCA: position confidentiality conserving algorithm for content-protection in e-governance services and applications. IEEE Trans Emerg Top Comput Intell 2(3):194\u2013203","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"3759_CR19","doi-asserted-by":"crossref","unstructured":"Mokbel MF (2007) Privacy in location-based services: start-of-the-art and research directions. In: 8th international conference on mobile data management, p 228","DOI":"10.1109\/MDM.2007.45"},{"key":"3759_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.07.022","author":"AK Sangaiah","year":"2017","unstructured":"Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2017) Towards an efficient risk assessment in software projects\u2014fuzzy reinforcement paradigm. Comput Electr Eng. \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2017.07.022","journal-title":"Comput Electr Eng"},{"key":"3759_CR21","unstructured":"Santos AA, Furtado AA, Alvares LO, Pelekis N, Bogorny V (2015) Inferring relationships from trajectory data. In: Brazilian symposium on geoinformatics, pp 68\u201379"},{"key":"3759_CR22","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"3759_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.004","author":"AH Sodhro","year":"2018","unstructured":"Sodhro AH, Luo Z, Sangaiah AK, Baik SW (2018) Mobile edge computing based QoS optimization in medical healthcare applications. Int J Inf Manag. \n                    https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.08.004","journal-title":"Int J Inf Manag"},{"issue":"5","key":"3759_CR24","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"3759_CR25","doi-asserted-by":"crossref","unstructured":"Tan R, Gu JZ, Chen P, Zhong Z (2013) Link prediction using protected location history. In: International Conference on computational and information sciences, pp 795\u2013798","DOI":"10.1109\/ICCIS.2013.213"},{"key":"3759_CR26","doi-asserted-by":"crossref","unstructured":"Wang D, Pedreschi D, Song C, Giannotti F, Barab\u00e1si AL (2011) Human mobility, social ties, and link prediction. In: ACM SIGKDD conference on knowledge discovery and data mining, pp 1100\u20131108","DOI":"10.1145\/2020408.2020581"},{"key":"3759_CR27","doi-asserted-by":"crossref","unstructured":"Wang YQ, Yan BJ, Yang YJ, Yang LU, Liu LD (2017) Urban area division and function discovery based on trajectory data. In: 2nd international conference on artificial intelligence: techniques and applications, pp 179\u2013182","DOI":"10.12783\/dtcse\/aita2017\/16011"},{"issue":"5","key":"3759_CR28","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00779-011-0419-8","volume":"16","author":"H Yoon","year":"2012","unstructured":"Yoon H, Zheng Y, Xie X, Woo W (2012) Social itinerary recommendation from user-generated digital trails. Pers Ubiquitous Comput 16(5):469\u2013484","journal-title":"Pers Ubiquitous Comput"},{"issue":"1","key":"3759_CR29","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1889681.1889683","volume":"2","author":"Y Zheng","year":"2011","unstructured":"Zheng Y, Xie X (2011) Learning travel recommendations from user-generated GPS traces. ACM Trans Intell Syst Technol 2(1):2","journal-title":"ACM Trans Intell Syst Technol"},{"key":"3759_CR30","doi-asserted-by":"crossref","unstructured":"Zheng Y, Zhang L, Xie X, Ma WY (2009) Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th international conference on World wide web, pp 791\u2013800","DOI":"10.1145\/1526709.1526816"},{"key":"3759_CR31","doi-asserted-by":"crossref","unstructured":"Zheng VW, Zheng Y, Xie X, Yang Q (2010) Collaborative location and activity recommendations with GPS history data. In: Proceedings of the 19th international conference on World wide web, pp 1029\u20131038","DOI":"10.1145\/1772690.1772795"},{"issue":"1","key":"3759_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1921591.1921596","volume":"5","author":"Y Zheng","year":"2011","unstructured":"Zheng Y, Zhang L, Ma Z, Xie X, Ma WY (2011) Recommending friends and locations based on individual location history. ACM Trans Web 5(1):5","journal-title":"ACM Trans Web"},{"key":"3759_CR33","doi-asserted-by":"crossref","unstructured":"Zhou C, Frankowskic D, Ludford P, Shekhar S, Terveen L (2004) Discovering personal gazetteers: an interactive clustering approach. In: Proceedings of the 12th annual ACM international workshop on geographic information systems, pp 266\u2013273","DOI":"10.1145\/1032222.1032261"},{"issue":"3","key":"3759_CR34","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1247715.1247718","volume":"25","author":"C Zhou","year":"2007","unstructured":"Zhou C, Frankowski D, Ludford P, Shekhar S, Terveen L (2007) Discovering personally meaningful places: an interactive clustering approach. ACM Trans Inf Syst 25(3):12","journal-title":"ACM Trans Inf Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03759-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03759-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03759-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T19:10:28Z","timestamp":1579288228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03759-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,18]]},"references-count":34,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["3759"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03759-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,18]]},"assertion":[{"value":"18 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}