{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:21:22Z","timestamp":1769696482119,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00521-023-08736-1","type":"journal-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T17:01:42Z","timestamp":1686762102000},"page":"18933-18947","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A robust DNN model for text-independent speaker identification using non-speaker embeddings in diverse data conditions"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3596-0736","authenticated-orcid":false,"given":"Nirupam","family":"Shome","sequence":"first","affiliation":[]},{"given":"Banala","family":"Saritha","sequence":"additional","affiliation":[]},{"given":"Richik","family":"Kashyap","sequence":"additional","affiliation":[]},{"given":"Rabul Hussain","family":"Laskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"8736_CR1","volume-title":"Fundamentals of speech recognition","author":"L Rabiner","year":"1993","unstructured":"Rabiner L (1993) Fundamentals of speech recognition. Englewood Cliffs, Fundamentals of Speech Recognition"},{"key":"8736_CR2","first-page":"518","volume":"8","author":"SV Ault","year":"2018","unstructured":"Ault SV, Perez RJ, Kimble CA, Wang J (2018) On speech recognition algorithms. Int J Mach Learn Comput 8:518\u2013523","journal-title":"Int J Mach Learn Comput"},{"key":"8736_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen T, Li H (2010) An overview of text-independent speaker recognition: From features to supervectors. Speech Commun 52:12\u201340","journal-title":"Speech Commun"},{"key":"8736_CR4","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.eswa.2017.08.015","volume":"90","author":"SS Tirumala","year":"2017","unstructured":"Tirumala SS, Shahamiri SR, Garhwal AS, Wang R (2017) Speaker identification features extraction methods: a systematic review. Expert Syst Appl 90:250\u2013271","journal-title":"Expert Syst Appl"},{"key":"8736_CR5","doi-asserted-by":"crossref","unstructured":"H\u00e9bert M (2008) Text-dependent speaker recognition. In: Springer handbook of speech processing. Springer, Berlin pp 743\u2013762","DOI":"10.1007\/978-3-540-49127-9_37"},{"key":"8736_CR6","unstructured":"Singh N, Agrawal A, Khan PR et al (2018) Principle and applications of speaker recognition security system. no June"},{"key":"8736_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4255","volume":"30","author":"J Liu","year":"2018","unstructured":"Liu J, Leu F, Lin G, Susanto H (2018) An MFCC-based text-independent speaker identification system for access control. Concurr Comput Pract Exp 30:e4255","journal-title":"Concurr Comput Pract Exp"},{"key":"8736_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1049\/iet-bmt.2017.0065","volume":"7","author":"A Poddar","year":"2018","unstructured":"Poddar A, Sahidullah M, Saha G (2018) Speaker verification with short utterances: a review of challenges, trends and opportunities. IET Biomet 7:91\u2013101","journal-title":"IET Biomet"},{"key":"8736_CR9","doi-asserted-by":"publisher","first-page":"143","DOI":"10.18178\/ijmlc.2019.9.2.778","volume":"9","author":"S Bunrit","year":"2019","unstructured":"Bunrit S, Inkian T, Kerdprasop N, Kerdprasop K (2019) Text-independent speaker identification using deep learning model of convolution neural network. Int J Mach Learn Comput 9:143\u2013148. https:\/\/doi.org\/10.18178\/ijmlc.2019.9.2.778","journal-title":"Int J Mach Learn Comput"},{"key":"8736_CR10","unstructured":"Sainath TN, Simko G, San Martin MCP, Candil RZ (2019) Voice activity detection U.S. Patent No. 10,229,700. Washington, DC: U.S. Patent and Trademark Office"},{"key":"8736_CR11","doi-asserted-by":"crossref","unstructured":"Hoshen Y, Weiss RJ, Wilson KW (2015) Speech acoustic modeling from raw multichannel waveforms. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 4624\u20134628","DOI":"10.1109\/ICASSP.2015.7178847"},{"key":"8736_CR12","doi-asserted-by":"crossref","unstructured":"Dinkel H, Chen N, Qian Y, Yu K (2017) End-to-end spoofing detection with raw waveform CLDNNS. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 4860\u20134864","DOI":"10.1109\/ICASSP.2017.7953080"},{"key":"8736_CR13","first-page":"23","volume":"8","author":"J-W Jung","year":"2018","unstructured":"Jung J-W, Heo H-S, Yang I-H et al (2018) Avoiding speaker overfitting in end-to-end dnns using raw waveform for text-independent speaker verification. Extraction 8:23\u201324","journal-title":"Extraction"},{"key":"8736_CR14","doi-asserted-by":"crossref","unstructured":"Muckenhirn H, Doss MM-, Marcell S (2018) Towards directly modeling raw speech signal for speaker verification using CNNs. In: 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 4884\u20134888","DOI":"10.1109\/ICASSP.2018.8462165"},{"key":"8736_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"8736_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735\u20131780","journal-title":"Neural Comput"},{"key":"8736_CR17","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10462-004-0751-8","volume":"22","author":"X Zhu","year":"2004","unstructured":"Zhu X, Wu X (2004) Class noise vs. attribute noise: a quantitative study. Artif Intell Rev 22:177\u2013210","journal-title":"Artif Intell Rev"},{"key":"8736_CR18","doi-asserted-by":"crossref","unstructured":"Ravanelli M, Bengio Y (2018) Speaker recognition from raw waveform with sincnet. In: 2018 IEEE Spoken language technology workshop (SLT). IEEE, pp 1021\u20131028","DOI":"10.1109\/SLT.2018.8639585"},{"key":"8736_CR19","doi-asserted-by":"crossref","unstructured":"Panayotov V, Chen G, Povey D, Khudanpur S (2015) Librispeech: an ASR corpus based on public domain audio books. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 5206\u20135210","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"8736_CR20","unstructured":"Varga A (1992) The NOISEX-92 study on the effect of additive noise on automatic speech recognition. ICAL Report, DRA Speech Research Unit"},{"key":"8736_CR21","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1007\/s10772-018-9557-y","volume":"21","author":"A Milton","year":"2018","unstructured":"Milton A, Monsely KA (2018) Tamil and English speech database for heartbeat estimation. Int J Speech Technol 21:967\u2013973","journal-title":"Int J Speech Technol"},{"key":"8736_CR22","doi-asserted-by":"crossref","unstructured":"Sreenu G, Girija PN, Prasad MN, Nagamani M (2004) A human machine speaker dependent speech interactive system. In: Proceedings of the IEEE INDICON 2004. First India annual conference, 2004. IEEE, pp 349\u2013351","DOI":"10.1109\/INDICO.2004.1497769"},{"key":"8736_CR23","doi-asserted-by":"crossref","unstructured":"Zhu W, Pelecanos J (2019) A Bayesian attention neural network layer for speaker recognition. In: ICASSP 2019\u20132019 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 6241\u20136245","DOI":"10.1109\/ICASSP.2019.8682953"},{"key":"8736_CR24","doi-asserted-by":"crossref","unstructured":"Shuai G, Renkai C, Tuo H et al (2019) A convenient and extensible offline Chinese speech recognition system based on convolutional CTC networks. In: 2019 Chinese control conference (CCC). IEEE, pp 7606\u20137611","DOI":"10.23919\/ChiCC.2019.8865580"},{"key":"8736_CR25","doi-asserted-by":"crossref","unstructured":"Yadav S, Rai A (2020) Frequency and temporal convolutional attention for text-independent speaker recognition. In: ICASSP 2020\u20132020 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 6794\u20136798","DOI":"10.1109\/ICASSP40776.2020.9054440"},{"key":"8736_CR26","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yu M, Li N, et al (2019) Seq2seq attentional siamese neural networks for text-dependent speaker verification. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 6131\u20136135","DOI":"10.1109\/ICASSP.2019.8682676"},{"key":"8736_CR27","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1109\/TASLP.2020.2998870","volume":"28","author":"L Huang","year":"2020","unstructured":"Huang L, Pun C-M (2020) Audio replay spoof attack detection by joint segment-based linear filter bank feature extraction and attention-enhanced Densenet-Bilstm network. IEEE\/ACM Trans Audio Speech Lang Process 28:1813\u20131825","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"8736_CR28","doi-asserted-by":"crossref","unstructured":"Cao G, Tang Y, Sheng J, Cao W (2019) Emotion recognition from children speech signals using attention based time series deep learning. In: 2019 IEEE international conference on bioinformatics and biomedicine (BIBM). IEEE, pp 1296\u20131300","DOI":"10.1109\/BIBM47256.2019.8982992"},{"key":"8736_CR29","doi-asserted-by":"crossref","unstructured":"Zhou T, Zhao Y, Li J et al (2019) CNN with phonetic attention for text-independent speaker verification. In: 2019 IEEE automatic speech recognition and understanding workshop (ASRU). IEEE, pp 718\u2013725","DOI":"10.1109\/ASRU46091.2019.9003826"},{"key":"8736_CR30","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.forsciint.2016.03.044","volume":"263","author":"GS Morrison","year":"2016","unstructured":"Morrison GS, Sahito FH, Jardine G et al (2016) INTERPOL survey of the use of speaker identification by law enforcement agencies. Forensic Sci Int 263:92\u2013100","journal-title":"Forensic Sci Int"},{"key":"8736_CR31","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MSP.2008.931100","volume":"26","author":"JP Campbell","year":"2009","unstructured":"Campbell JP, Shen W, Campbell WM et al (2009) Forensic speaker recognition. IEEE Signal Process Mag 26:95\u2013103","journal-title":"IEEE Signal Process Mag"},{"key":"8736_CR32","doi-asserted-by":"crossref","unstructured":"Naik J, Doddington G (1987) Evaluation of a high performance speaker verification system for access Control. In: ICASSP\u201987. IEEE international conference on acoustics, speech, and signal processing. IEEE, pp 2392\u20132395","DOI":"10.1109\/ICASSP.1987.1169922"},{"key":"8736_CR33","unstructured":"Gomar MG (2015) System and method for speaker recognition on mobile devices, U.S. Patent No. 9,042,867. Washington, DC: U.S. Patent and Trademark Office"},{"key":"8736_CR34","unstructured":"Hunt AK, Schalk TB (1996) Simultaneous voice recognition and verification to allow access to telephone network services,U.S. Patent No. 5,499,288. Washington, DC: U.S. Patent and Trademark Office"},{"key":"8736_CR35","unstructured":"Arons BM (1994) Interactively skimming recorded speech, Doctoral dissertation, Massachusetts Institute of Technology"},{"key":"8736_CR36","first-page":"21","volume":"30","author":"C Schmandt","year":"1984","unstructured":"Schmandt C, Arons B (1984) A conversational telephone messaging system. IEEE Trans Consum Electron 30:21\u201324","journal-title":"IEEE Trans Consum Electron"},{"key":"8736_CR37","doi-asserted-by":"publisher","first-page":"3027","DOI":"10.1016\/j.patcog.2007.02.016","volume":"40","author":"M Faundez-Zanuy","year":"2007","unstructured":"Faundez-Zanuy M, Hagm\u00fcller M, Kubin G (2007) Speaker identification security improvement by means of speech watermarking. Pattern Recogn 40:3027\u20133034","journal-title":"Pattern Recogn"},{"key":"8736_CR38","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1016\/j.procs.2017.12.112","volume":"125","author":"A Maurya","year":"2018","unstructured":"Maurya A, Kumar D, Agarwal RK (2018) Speaker recognition for Hindi speech signal using MFCC-GMM approach. Procedia Computer Science 125:880\u2013887","journal-title":"Procedia Computer Science"},{"key":"8736_CR39","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Gaussian mixture models. Digital Signal process 10:19\u201341","journal-title":"Digital Signal process"},{"key":"8736_CR40","first-page":"357","volume":"11","author":"W-C Chen","year":"2008","unstructured":"Chen W-C, Hsieh C-T, Hsu C-H (2008) Robust speaker identification system based on two-stage vector quantization. Tamkang J Sci Eng 11:357\u2013366","journal-title":"Tamkang J Sci Eng"},{"key":"8736_CR41","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/LSP.2005.860538","volume":"13","author":"KSR Murty","year":"2005","unstructured":"Murty KSR, Yegnanarayana B (2005) Combining evidence from residual phase and MFCC features for speaker recognition. IEEE Signal Process Lett 13:52\u201355","journal-title":"IEEE Signal Process Lett"},{"key":"8736_CR42","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s00521-016-2501-7","volume":"29","author":"H Ali","year":"2018","unstructured":"Ali H, Tran SN, Benetos E, d\u2019AvilaGarcez AS (2018) Speaker recognition with hybrid features from a deep belief network. Neural Comput Appl 29:13\u201319","journal-title":"Neural Comput Appl"},{"key":"8736_CR43","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10772-016-9385-x","volume":"20","author":"M Soleymanpour","year":"2017","unstructured":"Soleymanpour M, Marvi H (2017) Text-independent speaker identification based on selection of the most similar feature vectors. Int J Speech Technol 20:99\u2013108","journal-title":"Int J Speech Technol"},{"key":"8736_CR44","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/720834","author":"S Fong","year":"2013","unstructured":"Fong S, Lan K, Wong R (2013) Classifying human voices by using hybrid SFX time-series preprocessing and ensemble feature selection. BioMed Res Int. https:\/\/doi.org\/10.1155\/2013\/720834","journal-title":"BioMed Res Int"},{"key":"8736_CR45","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1007\/s11277-016-3530-3","volume":"91","author":"S Selva Nidhyananthan","year":"2016","unstructured":"Selva Nidhyananthan S, Shantha Selva Kumari R, SenthurSelvi T (2016) Noise robust speaker identification using RASTA\u2013MFCC feature with quadrilateral filter bank structure. Wireless Pers Commun 91:1321\u20131333","journal-title":"Wireless Pers Commun"},{"key":"8736_CR46","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0158520","volume":"11","author":"MA Islam","year":"2016","unstructured":"Islam MA, Jassim WA, Cheok NS, Zilany MSA (2016) A robust speaker identification system using the responses from a model of the auditory periphery. PLoS ONE 11:e0158520","journal-title":"PLoS ONE"},{"key":"8736_CR47","doi-asserted-by":"publisher","first-page":"32187","DOI":"10.1109\/ACCESS.2020.2973541","volume":"8","author":"R Jahangir","year":"2020","unstructured":"Jahangir R, Teh YW, Memon NA et al (2020) Text-independent speaker identification through feature fusion and deep neural network. IEEE Access 8:32187\u201332202","journal-title":"IEEE Access"},{"key":"8736_CR48","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, Cambridge"},{"key":"8736_CR49","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1109\/TASLP.2018.2831456","volume":"26","author":"C Zhang","year":"2018","unstructured":"Zhang C, Koishida K, Hansen JHL (2018) Text-independent speaker verification based on triplet convolutional neural network embeddings. IEEE\/ACM Trans Audio Speech Lang Process 26:1633\u20131644","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"8736_CR50","doi-asserted-by":"crossref","unstructured":"Seki H, Yamamoto K, Nakagawa S (2017) A deep neural network integrated with filterbank learning for speech recognition. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 5480\u20135484","DOI":"10.1109\/ICASSP.2017.7953204"},{"key":"8736_CR51","doi-asserted-by":"crossref","unstructured":"Sainath T, Weiss RJ, Wilson K et al (2015) Learning the speech front-end with raw waveform CLDNNs, Published in Interspeech 2015","DOI":"10.21437\/Interspeech.2015-1"},{"key":"8736_CR52","doi-asserted-by":"crossref","unstructured":"Trigeorgis G, Ringeval F, Brueckner R et al (2016) Adieu features? end-to-end speech emotion recognition using a deep convolutional recurrent network. In: 2016 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 5200\u20135204","DOI":"10.1109\/ICASSP.2016.7472669"},{"key":"8736_CR53","doi-asserted-by":"publisher","unstructured":"Jung JW, Heo HS, Yang IH et al (2018) A complete end-to-end speaker verification system using deep neural networks: from raw signals to verification result. In: ICASSP, IEEE international conference on acoustics, speech and signal processing - proceedings 2018-April, pp 5349\u20135353. https:\/\/doi.org\/10.1109\/ICASSP.2018.8462575","DOI":"10.1109\/ICASSP.2018.8462575"},{"key":"8736_CR54","doi-asserted-by":"crossref","unstructured":"Saritha B, Shome N, Laskar RH, Choudhury M (2022) Enhancement in speaker recognition using SincNet through optimal window and frame shift. In: 2022 2nd international conference on intelligent technologies (CONIT). IEEE, pp 1\u20136","DOI":"10.1109\/CONIT55038.2022.9848231"},{"key":"8736_CR55","doi-asserted-by":"crossref","unstructured":"Verbaeten S, Assche A Van (2003) Ensemble methods for noise elimination in classification problems. In: International workshop on multiple classifier systems. Springer, pp 317\u2013325","DOI":"10.1007\/3-540-44938-8_32"},{"key":"8736_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-018-9537-2","author":"N Shome","year":"2019","unstructured":"Shome N, Laskar RH, Das D (2019) Reference free speech quality estimation for diverse data condition. Int J Speech Technol. https:\/\/doi.org\/10.1007\/s10772-018-9537-2","journal-title":"Int J Speech Technol"},{"key":"8736_CR57","doi-asserted-by":"publisher","first-page":"1586","DOI":"10.1109\/PROC.1979.11540","volume":"67","author":"JS Lim","year":"1979","unstructured":"Lim JS, Oppenheim AV (1979) Enhancement and bandwidth compression of noisy speech. Proc IEEE 67:1586\u20131604","journal-title":"Proc IEEE"},{"key":"8736_CR58","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/S1007-0214(05)70048-1","volume":"10","author":"Z Wu","year":"2005","unstructured":"Wu Z, Cao Z (2005) Improved MFCC-based feature for robust speaker identification. Tsinghua Sci Technol 10:158\u2013161","journal-title":"Tsinghua Sci Technol"},{"key":"8736_CR59","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press, Cambridge"},{"key":"8736_CR60","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/69.404034","volume":"7","author":"RY Wang","year":"1995","unstructured":"Wang RY, Storey VC, Firth C (1995) A framework for analysis of data quality, researrch. IEEE Trans Knowl Data Eng 7:623\u2013640","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"8736_CR61","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10462-004-0751-8","volume":"22","author":"W Zhu","year":"2004","unstructured":"Zhu W, Zhu X, Wu X (2004) Class noise vs attribute noise: a quantitative study. Artif Intell Rev 22:177\u2013210","journal-title":"Artif Intell Rev"},{"key":"8736_CR62","doi-asserted-by":"crossref","unstructured":"Shome N, Laskar RH, Kashyap R, Bandyopadhyay S (2020) A robust technique for end point detection under practical environment. In: International conference on machine learning, image processing, network security and data sciences. Springer, Berlin, pp 131\u2013144","DOI":"10.1007\/978-981-15-6318-8_12"},{"key":"8736_CR63","doi-asserted-by":"crossref","unstructured":"Nirupam Shome RHL and RK (2022) Effect of end point detection on fixed phrase speaker verification. In: Emerging electronics and automation (E2A) 2021. Spinger, NIT, Silchar","DOI":"10.1007\/978-981-19-4300-3_30"},{"key":"8736_CR64","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08736-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08736-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08736-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T15:18:51Z","timestamp":1692026331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08736-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":64,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["8736"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08736-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"2 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared no potential conflicts of interest with respect to the research, authorship, and\/or publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}