{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T23:27:36Z","timestamp":1750980456818},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T00:00:00Z","timestamp":1565395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T00:00:00Z","timestamp":1565395200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00779-019-01267-4","type":"journal-article","created":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T12:02:43Z","timestamp":1565438563000},"page":"287-298","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Logic detection method in network culture communication based on semantic relevance"],"prefix":"10.1007","volume":"24","author":[{"given":"Yu","family":"Ding","sequence":"first","affiliation":[]},{"given":"Nianxing","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,10]]},"reference":[{"issue":"7","key":"1267_CR1","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1002\/mar.20232","volume":"25","author":"DH Lee","year":"2008","unstructured":"Lee DH, Im S, Taylor CR (2008) Voluntary self-disclosure of information on the Internet: a multimethod study of the motivations and consequences of disclosing information on blogs. J Psychol Market 25(7):692\u2013710","journal-title":"J Psychol Market"},{"key":"1267_CR2","doi-asserted-by":"publisher","unstructured":"Bowman SL, Atanasov N, Daniilidis K, Pappas GJ (2017) Probabilistic data association for semantic SLAM. IEEE Internation-al Conference on Robotics & Automation, \n                  https:\/\/doi.org\/10.1109\/ICRA.2017.7989203","DOI":"10.1109\/ICRA.2017.7989203"},{"issue":"1","key":"1267_CR3","first-page":"80","volume":"32","author":"YH Mo","year":"2011","unstructured":"Mo YH, Zhong C, Tang JH (2011) Functional-trust based security data aggregation method in wireless sensor networks. J Chin Comput Syst 32(1):80\u201384","journal-title":"J Chin Comput Syst"},{"issue":"5","key":"1267_CR4","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.3390\/ijms18051029","volume":"18","author":"YB Wang","year":"2017","unstructured":"Wang YB, You ZH, Li X (2017) PCVMZM: using the probabilistic classification vector machines model combined with a Zernike moments descriptor to predict protein-protein interactions from protein sequences. Int J Mol Sci 18(5):1029","journal-title":"Int J Mol Sci"},{"issue":"3","key":"1267_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1108\/09685220310480381","volume":"11","author":"F Heather","year":"2003","unstructured":"Heather F, Doherty NF (2003) The application of information security policies in large UK-based organizations: an exploratory investigation. J Inf Manag Comput Secur 11(3):106\u2013114","journal-title":"J Inf Manag Comput Secur"},{"issue":"10","key":"1267_CR6","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1016\/j.resconrec.2009.11.003","volume":"54","author":"S Unnikrishnan","year":"2010","unstructured":"Unnikrishnan S, Singh A (2010) Resources, conservation and recycling. J Resourc Conserv Recycl 54(10):630\u2013640","journal-title":"J Resourc Conserv Recycl"},{"issue":"10","key":"1267_CR7","first-page":"149","volume":"24","author":"HY Yin","year":"2015","unstructured":"Yin HY, Lefticariu L, Wei JC (2015) Water inrush risk zoning and classification during coal seam mining in the Jiangzhuang coal mine, Shandong province. J China Min Magazine 24(10):149\u2013154","journal-title":"J China Min Magazine"},{"key":"1267_CR8","unstructured":"Chen Y, Zhao D, Lv L, D C (n.d.) A visual attention based convolutional neural network for image classification. Intelligent Control & Automation"},{"issue":"5","key":"1267_CR9","first-page":"1107","volume":"65","author":"W Mark","year":"2015","unstructured":"Mark W, Eric L, Lee AKC (2015) Leveraging anatomical information to improve transfer learning in brain\u2013computer interfaces. J Neural Eng 65(5):1107\u20131116","journal-title":"J Neural Eng"},{"issue":"1","key":"1267_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1136\/amiajnl-2011-000369","volume":"19","author":"F Magrabi","year":"2012","unstructured":"Magrabi F, Ong MS, Runciman W, Enrico C (2012) Using FDA reports to inform a classification for health information technology safety problems. J Am Med Inform Assoc 19(1):45\u201353","journal-title":"J Am Med Inform Assoc"},{"issue":"4","key":"1267_CR11","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.3233\/JIFS-161242","volume":"33","author":"T Thompson","year":"2017","unstructured":"Thompson T, Sowunmi O, Misra S, Fernandez-Sanz L, Crawford B, Soto R (2017) An expert system for the diagnosis of sexually transmitted diseases ESSTD. J Intell Fuzzy Syst 33(4):2007\u20132017","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"1267_CR12","first-page":"14","volume":"40","author":"AK Bardsiri","year":"2018","unstructured":"Bardsiri AK (2018) A new combinatorial framework for software services development effort estimation. Int J Comput Appl 40(1):14\u201324","journal-title":"Int J Comput Appl"},{"issue":"5","key":"1267_CR13","doi-asserted-by":"publisher","first-page":"3153","DOI":"10.3233\/JIFS-169367","volume":"33","author":"W Gao","year":"2017","unstructured":"Gao W, Zhu L, Guo Y, Wang K (2017) Ontology learning algorithm for similarity measuring and ontology mapping using linear programming. J Intell Fuzzy Syst 33(5):3153\u20133163","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"1267_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.ctrv.2013.06.006","volume":"40","author":"SW Lam","year":"2014","unstructured":"Lam SW, Jimenez CR, Boven EL (2014) Breast cancer classification by proteomic technologies: current state of knowledge. J Cancer Treat Rev 40(1):129\u2013138","journal-title":"J Cancer Treat Rev"},{"issue":"1","key":"1267_CR15","first-page":"24","volume":"12","author":"M Rafi","year":"2010","unstructured":"Rafi M, Shaikh MS, Farooq A (2010) Document clustering based on topic maps. J Int Comput Appl 12(1):24\u201328","journal-title":"J Int Comput Appl"},{"issue":"6","key":"1267_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/mis.2016.105","volume":"31","author":"Z Wu","year":"2016","unstructured":"Wu Z, Zhou YD, Shi ZZ, Zhang aCS (2016) Cyborg intelligence: recent progress and future directions. IEEE Intell Syst 31(6):44\u201350. \n                  https:\/\/doi.org\/10.1109\/mis.2016.105","journal-title":"IEEE Intell Syst"},{"issue":"2","key":"1267_CR17","doi-asserted-by":"publisher","first-page":"291","DOI":"10.4064\/cm6959-8-2016","volume":"149","author":"W Gao","year":"2017","unstructured":"Gao W, Wang W (2017) A tight neighborhood union condition on fractional (g, f,n\u2032,m)-critical deleted graphs. Colloq Math-Warsaw 149(2):291\u2013298","journal-title":"Colloq Math-Warsaw"},{"key":"1267_CR18","doi-asserted-by":"crossref","unstructured":"Hentschel R, Leyh C, Petznick A (2018) Current cloud challenges in Germany: the perspective of cloud service providers. J Cloud Comput 7(1)","DOI":"10.1186\/s13677-018-0107-6"},{"issue":"2","key":"1267_CR19","first-page":"193","volume":"41","author":"Q Zhang","year":"2017","unstructured":"Zhang Q, Wang H (Feb. 2017) Speech emotion recognition model based on kernel canonical correlation analysis and support vector machine. J Nanjing Univ Sci Technol 41(2):193\u2013218","journal-title":"J Nanjing Univ Sci Technol"},{"issue":"5","key":"1267_CR20","first-page":"1079","volume":"120","author":"Y Zheng","year":"1993","unstructured":"Zheng Y (1993) Calculation of oxygen isotope fractionation in hydroxyl-bearing silicates. J Earth Planet Sci Lett 120(5):1079\u20131091","journal-title":"J Earth Planet Sci Lett"},{"issue":"1","key":"1267_CR21","first-page":"15","volume":"5","author":"KS Tai","year":"2015","unstructured":"Tai KS, Socher R, Manning CD (2015) Improved semantic representations from tree-structured long short-term memory networks. J Comput Sci 5(1):15\u20131150","journal-title":"J Comput Sci"},{"key":"1267_CR22","doi-asserted-by":"publisher","unstructured":"Maturana D, Scherer S (2015) VoxNet: a 3D convolutional neural network for real-time object recognition. IEEE\/RSJ International Conference on Intelligent Robots & Systems, pp. 922\u2013928. \n                  https:\/\/doi.org\/10.1109\/IROS.2015.7353481","DOI":"10.1109\/IROS.2015.7353481"},{"key":"1267_CR23","unstructured":"Dan CC, Meier U, Gambardella LM, Schmidhuber J (2011) Convolutional neural network committees for handwritten character classification. International Conference on Document Analysis & Recognition, pp. 1135\u20131139"},{"issue":"4\u20135","key":"1267_CR24","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.3934\/dcdss.2019077","volume":"12","author":"C Mi","year":"2019","unstructured":"Mi C, Wang J, Mi W, Huang Y, Zhang Z, Yang Y, Jiang J, Octavian P (2019) Research on regional clustering and two-stage SVM method for container truck recognition. Discrete Contin Dynam Syst 12(4\u20135):1117\u20131133","journal-title":"Discrete Contin Dynam Syst"},{"key":"1267_CR25","doi-asserted-by":"crossref","unstructured":"Moorthy T, Gopalakrishnan S (2017) IO and data management for infrastructure as a service FPGA accelerators. J Cloud Comput 6(1)","DOI":"10.1186\/s13677-017-0089-9"},{"issue":"11","key":"1267_CR26","first-page":"2833","volume":"19","author":"W Jia","year":"2008","unstructured":"Jia W, Peng H (2008) Local and global preserving based semi-supervised dimensionality reduction method. J Softw 19(11):2833\u20132842","journal-title":"J Softw"},{"issue":"1","key":"1267_CR27","first-page":"Dce","volume":"11","author":"S Datta","year":"2010","unstructured":"Datta S, Pihur V, Datta S (2010) An adaptive optimal ensemble classifier via bagging and rank aggregation with applications to high dimensional da-ta. J BMC Bioinformatics 11(1):Dce","journal-title":"J BMC Bioinformatics"},{"issue":"1","key":"1267_CR28","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.asoc.2012.07.029","volume":"13","author":"J Dai","year":"2013","unstructured":"Dai J, Xu Q (Jan. 2013) Attribute selection based on information gain ratio in fuzzy rough set theory with application to tumor classification. J Appl Soft Comput 13(1):211\u2013221","journal-title":"J Appl Soft Comput"},{"issue":"4","key":"1267_CR29","first-page":"71","volume":"2","author":"M Zhang","year":"2010","unstructured":"Zhang M, Lu ZT (2010) Image segmentation based on mutual information. Chin J Comput 2(4):71\u201374","journal-title":"Chin J Comput"},{"issue":"8","key":"1267_CR30","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1002\/per.697","volume":"22","author":"K Schnabel","year":"2008","unstructured":"Schnabel K, Asendorpf JB, Greenwald A (2008) Understanding and using the implicit association test: V. measuring semantic aspects of trait self-concepts. J Euro J Personality 22(8):695\u2013706","journal-title":"J Euro J Personality"},{"issue":"4","key":"1267_CR31","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1016\/j.yebeh.2010.11.010","volume":"20","author":"KK Kim","year":"2011","unstructured":"Kim KK, Karunanayaka P, Privitera MD, Hollandbe SK, Szaflarskiabcd JP (2011) Semantic association investigated with fMRI and independent component analysis. J Epilepsy Behav 20(4):613\u2013622","journal-title":"J Epilepsy Behav"},{"issue":"1","key":"1267_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.21042\/AMNS.2018.1.00001","volume":"3","author":"M Dewasurendra","year":"2018","unstructured":"Dewasurendra M, Vajravelu K (2018) On the method of inverse mapping for solutions of coupled systems of nonlinear differential equations arising in nanofluid flow, heat and mass transfer. Appl Math Nonlinear Sci 3(1):1\u201314","journal-title":"Appl Math Nonlinear Sci"},{"issue":"7","key":"1267_CR33","first-page":"193","volume":"8","author":"L Hubert","year":"2012","unstructured":"Hubert L, Arabie P (2012) Assessing drug target association using semantic linked data. J Plos Comput Biol 8(7):193\u2013218","journal-title":"J Plos Comput Biol"},{"key":"1267_CR34","doi-asserted-by":"crossref","unstructured":"Viswanathan V, Krishnamurthi I (2012) Finding relevant semantic association paths through user-specific intermediate entities. J Human-centric Comput Inform Sci 2(1)","DOI":"10.1186\/2192-1962-2-9"},{"key":"1267_CR35","doi-asserted-by":"crossref","unstructured":"Liu F, Liu Y, Jin D, Jia X, Wang T (2018) Research on workshop-based positioning technology based on internet of things in big data background. Complexity:7875460","DOI":"10.1155\/2018\/7875460"},{"key":"1267_CR36","doi-asserted-by":"publisher","first-page":"63976","DOI":"10.1109\/ACCESS.2018.2877428","volume":"6","author":"A Yang","year":"2018","unstructured":"Yang A, Li S, Ren C, Liu H, Han Y, Liu L (2018) Situational awareness system in the smart campus. IEEE ACCESS 6:63976\u201363986","journal-title":"IEEE ACCESS"},{"key":"1267_CR37","doi-asserted-by":"crossref","unstructured":"Mai J, Fan Y, Shen Y (2009) A neural networks-based clustering collaborative filtering algorithm in E-commerce recommendation system. International Conference on Web Information Systems & Mining, pp. 616\u2013619","DOI":"10.1109\/WISM.2009.129"},{"issue":"4","key":"1267_CR38","first-page":"1","volume":"55","author":"AA Hoseini","year":"2014","unstructured":"Hoseini AA, Zavareh Z, Lundell F, Anderson HI (2014) Rod-like particles matching algorithm based on SOM neural network in dispersed two-phase flow measurements. J Exp Fluids 55(4):1\u201312","journal-title":"J Exp Fluids"},{"issue":"9","key":"1267_CR39","first-page":"52","volume":"35","author":"DQ Tang","year":"2009","unstructured":"Tang DQ, Zhu LI (2009) Research of frequent subgraph mining algorithm. J Comput Eng 35(9):52\u201354","journal-title":"J Comput Eng"},{"issue":"1","key":"1267_CR40","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1613\/jair.2934","volume":"37","author":"PD Turney","year":"2010","unstructured":"Turney PD, Pantel P (2010) From frequency to meaning: vector space models of semantics. J Artif Intell Res 37(1):141\u2013188","journal-title":"J Artif Intell Res"},{"issue":"8","key":"1267_CR41","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s12325-012-0040-x","volume":"29","author":"F Lalibert\u00e9","year":"2012","unstructured":"Lalibert\u00e9 F, Nelson WW, Lefebvre P, Schein JR, Rondeau-Leclaire J, Duh MS (2012) Impact of daily dosing frequency on adherence to chronic medications among nonvalvular atrial fibrillation patients. J Adv Ther 29(8):675\u2013690","journal-title":"J Adv Ther"},{"key":"1267_CR42","doi-asserted-by":"publisher","unstructured":"Tu J, Liu M, Liu H (2018)Skeleton-based human action recognition using spatial temporal 3D convolutional neural networks, Proc. 2018 IEEE International Conference on Multimedia and Expo (ICME), \n                  https:\/\/doi.org\/10.1109\/ICME.2018.8486566","DOI":"10.1109\/ICME.2018.8486566"},{"issue":"3","key":"1267_CR43","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1117\/1.JMI.1.3.034003","volume":"1","author":"H Wang","year":"2014","unstructured":"Wang H, Cruz-Roa A, Basavanhally A, Gilmore H, Shih N (Oct. 2014) Mitosis detection in breast cancer pathology images by combining handcrafted and convolutional neural network features. J Med Imaging 1(3):193\u2013218","journal-title":"J Med Imaging"},{"issue":"1","key":"1267_CR44","doi-asserted-by":"publisher","first-page":"24204","DOI":"10.1109\/ACCESS.2019.2897131","volume":"7","author":"A Yang","year":"2019","unstructured":"Yang A, Yang X, Wu W et al (2019) Research on feature extraction of tumor image based on convolutional neural network. IEEE Access 7(1):24204\u201324213","journal-title":"IEEE Access"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01267-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01267-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01267-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T23:28:47Z","timestamp":1596929327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01267-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,10]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1267"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01267-4","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,10]]},"assertion":[{"value":"28 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}