{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T07:11:02Z","timestamp":1769929862492,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T00:00:00Z","timestamp":1658620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T00:00:00Z","timestamp":1658620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876164"],"award-info":[{"award-number":["61876164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61673331"],"award-info":[{"award-number":["61673331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772178"],"award-info":[{"award-number":["61772178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002767","name":"Hunan Provincial Science and Technology Department","doi-asserted-by":"publisher","award":["17A212"],"award-info":[{"award-number":["17A212"]}],"id":[{"id":"10.13039\/501100002767","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002767","name":"Hunan Provincial Science and Technology Department","doi-asserted-by":"crossref","award":["2018TP1036"],"award-info":[{"award-number":["2018TP1036"]}],"id":[{"id":"10.13039\/501100002767","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s00500-022-07311-5","type":"journal-article","created":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T17:02:15Z","timestamp":1658682135000},"page":"12851-12862","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A reconstruction method for cross-cut shredded documents based on the extreme learning machine algorithm"],"prefix":"10.1007","volume":"26","author":[{"given":"Zhenghui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Juan","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Shengxiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinhua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Dunwei","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Tingrui","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,24]]},"reference":[{"key":"7311_CR1","unstructured":"Biesinger B, Schauer C, Hu B, Raidl GR (2013) Reconstructing cross cut shredded documents with a genetic algorithm with solution archive. In: Extended Abstracts of the 14th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, pp. 226\u2013228"},{"key":"7311_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.eswa.2019.02.039","volume":"127","author":"J Chen","year":"2019","unstructured":"Chen J, Tian M, Qi X, Wang W, Liu Y (2019) A solution to reconstruct cross-cut shredded text documents based on constrained seed k-means algorithm and ant colony algorithm. Exp Syst Appl 127:35\u201346","journal-title":"Exp Syst Appl"},{"key":"7311_CR3","doi-asserted-by":"crossref","unstructured":"Dekel T, Oron S, Rubinstein M, Avidan S, Freeman WT (2015) Best-buddies similarity for robust template matching. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2021\u20132029","DOI":"10.1109\/CVPR.2015.7298813"},{"key":"7311_CR4","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/PGEC.1964.263781","volume":"2","author":"H Freeman","year":"1964","unstructured":"Freeman H, Garder L (1964) Apictorial jigsaw puzzles: the computer solution of a problem in pattern recognition. IEEE Trans Electron Comput 2:118\u2013127","journal-title":"IEEE Trans Electron Comput"},{"key":"7311_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.asoc.2016.03.024","volume":"45","author":"Y-J Gong","year":"2016","unstructured":"Gong Y-J, Ge Y-F, Li J-J, Zhang J, Ip W (2016) A splicing-driven memetic algorithm for reconstructing cross-cut shredded text documents. Appl Soft Comput 45:163\u2013172","journal-title":"Appl Soft Comput"},{"key":"7311_CR6","unstructured":"Heingartner D (2003) Back together again. New York Times 17"},{"key":"7311_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/72.655045","volume":"9","author":"G-B Huang","year":"1998","unstructured":"Huang G-B, Babri HA (1998) Upper bounds on the number of hidden neurons in feedforward networks with arbitrary bounded nonlinear activation functions. IEEE Trans Neural Netw 9:224\u2013229","journal-title":"IEEE Trans Neural Netw"},{"key":"7311_CR8","first-page":"985","volume":"2","author":"G-B Huang","year":"2004","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K et al (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Netw 2:985\u2013990","journal-title":"Neural Netw"},{"key":"7311_CR9","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recognit 38:2270\u20132285","journal-title":"Pattern Recognit"},{"issue":"3","key":"7311_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/2.485891","volume":"29","author":"AK Jain","year":"1996","unstructured":"Jain AK, Mao J, Mohiuddin K (1996) Artificial neural networks: a tutorial. Computer 29(3):31\u201344","journal-title":"Computer"},{"key":"7311_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1111\/j.0963-7214.2004.01501008.x","volume":"15","author":"H Keselman","year":"2004","unstructured":"Keselman H, Othman AR, Wilcox RR, Fradette K (2004) The new and improved two-sample t test. Psychol Sci 15:47\u201351","journal-title":"Psychol Sci"},{"key":"7311_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2021.104877","volume":"156","author":"R Li","year":"2021","unstructured":"Li R, Zhang H, Gao S, Wu Z, Guo C (2021) An improved extreme learning machine algorithm for transient electromagnetic nonlinear inversion. Comput Geosci 156:104877","journal-title":"Comput Geosci"},{"key":"7311_CR13","doi-asserted-by":"publisher","first-page":"3324","DOI":"10.1016\/j.eswa.2011.09.019","volume":"39","author":"H-Y Lin","year":"2012","unstructured":"Lin H-Y, Fan-Chiang W-C (2012) Reconstruction of shredded document based on image feature matching. Exp Syst Appl 39:3324\u20133332","journal-title":"Exp Syst Appl"},{"key":"7311_CR14","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1175\/1520-0493(1988)116<2417:SSBOTM>2.0.CO;2","volume":"116","author":"AH Murphy","year":"1988","unstructured":"Murphy AH (1988) Skill scores based on the mean square error and their relationships to the correlation coefficient. Mon Weather Rev 116:2417\u20132424","journal-title":"Mon Weather Rev"},{"key":"7311_CR15","doi-asserted-by":"crossref","unstructured":"Paikin G, Tal A (2015) Solving multiple square jigsaw puzzles with missing pieces. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4832\u20134839","DOI":"10.1109\/CVPR.2015.7299116"},{"key":"7311_CR16","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1109\/TIFS.2018.2885253","volume":"14","author":"TM Paix\u00e3o","year":"2019","unstructured":"Paix\u00e3o TM, Boeres MC, Freitas CO, Oliveira-Santos T (2019) Exploring character shapes for unsupervised reconstruction of strip-shredded text documents. IEEE Trans Inform Forens Secur 14:1744\u20131754","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"7311_CR17","unstructured":"Prandtstetter M (2009) Hybrid optimization methods for warehouse logistics and the reconstruction of destroyed paper documents"},{"key":"7311_CR18","doi-asserted-by":"crossref","unstructured":"Prandtstetter M, Raidl GR (2008) Combining forces to reconstruct strip shredded text documents. In: International workshop on hybrid metaheuristics, Springer, pp 175\u2013189","DOI":"10.1007\/978-3-540-88439-2_13"},{"key":"7311_CR19","unstructured":"Ranca R (2013) A modular framework for the automatic reconstruction of shredded documents. In: Workshops at the twenty-seventh AAAI conference on artificial intelligence"},{"key":"7311_CR20","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323:533\u2013536","journal-title":"Nature"},{"key":"7311_CR21","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s11235-011-9626-x","volume":"52","author":"A Sleit","year":"2013","unstructured":"Sleit A, Massad Y, Musaddaq M (2013) An alternative clustering approach for reconstructing cross cut shredded text documents. Telecommun Syst 52:1491\u20131501","journal-title":"Telecommun Syst"},{"key":"7311_CR22","doi-asserted-by":"crossref","unstructured":"Ukovich A, Ramponi G, Doulaverakis H, Kompatsiaris Y, Strintzis M (2004) Shredded document reconstruction using mpeg-7 standard descriptors. In: Proceedings of the fourth IEEE international symposium on signal processing and information technology, 2004, pp 334\u2013337. IEEE","DOI":"10.1109\/ISSPIT.2004.1433788"},{"key":"7311_CR23","doi-asserted-by":"crossref","unstructured":"Wang Y, Ji D-C (2014) A two-stage approach for reconstruction of cross-cut shredded text documents. In: 2014 tenth international conference on computational intelligence and security, pp 12\u201316. IEEE","DOI":"10.1109\/CIS.2014.92"},{"key":"7311_CR24","doi-asserted-by":"crossref","unstructured":"Xu H, Zheng J, Zhuang Z, Fan S (2014) A solution to reconstruct cross-cut shredded text documents based on character recognition and genetic algorithm. In: Abstract and applied analysis. Hindawi volume 2014","DOI":"10.1155\/2014\/829602"},{"key":"7311_CR25","first-page":"1","volume":"30","author":"L Zhu","year":"2007","unstructured":"Zhu L, Zhou Z, Hu D (2007) Globally consistent reconstruction of ripped-up documents. IEEE Trans Pattern Anal Mach Intell 30:1\u201313","journal-title":"IEEE Trans Pattern Anal Mach Intell"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07311-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07311-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07311-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T19:37:39Z","timestamp":1727638659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07311-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,24]]},"references-count":25,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["7311"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07311-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,24]]},"assertion":[{"value":"16 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled \u201cA reconstruction method for cross-cut shredded documents based on the extreme learning machine algorithm\u201d.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}