{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:21:03Z","timestamp":1770711663471,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s10515-022-00323-3","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T07:02:51Z","timestamp":1646204571000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["UAV surveillance for violence detection and individual identification"],"prefix":"10.1007","volume":"29","author":[{"given":"Anugrah","family":"Srivastava","sequence":"first","affiliation":[]},{"given":"Tapas","family":"Badal","sequence":"additional","affiliation":[]},{"given":"Pawan","family":"Saxena","sequence":"additional","affiliation":[]},{"given":"Ankit","family":"Vidyarthi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2947-9046","authenticated-orcid":false,"given":"Rishav","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,2]]},"reference":[{"key":"323_CR1","unstructured":"Amato, G., Falchi, F., Gennaro, C., Vairo, C.: A comparison of face verification with facial landmarks and deep features. In: proceedings of the 10th international conference on advances in multimedia (MMEDIA 2018) (c), 1\u20136 (2018)"},{"key":"323_CR2","doi-asserted-by":"publisher","first-page":"101180","DOI":"10.1016\/j.techsoc.2019.101180","volume":"59","author":"B Aydin","year":"2019","unstructured":"Aydin, B.: Public acceptance of drones: knowledge, attitudes, and practice. Technol. Soc. 59, 101180 (2019). https:\/\/doi.org\/10.1016\/j.techsoc.2019.101180","journal-title":"Technol. Soc."},{"key":"323_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/s19071676","author":"M Baba","year":"2019","unstructured":"Baba, M., Gui, V., Cernazanu, C., Pescaru, D.: A sensor network approach for violence detection in smart cities using deep learning. Sensors (Switzerland) (2019). https:\/\/doi.org\/10.3390\/s19071676","journal-title":"Sensors (Switzerland)"},{"key":"323_CR4","doi-asserted-by":"publisher","unstructured":"Bermejo Nievas, E., Deniz Suarez, O., Bueno Garc\u00eda, G., Sukthankar, R.: Violence detection in video using computer vision techniques. In: Lecture notes in computer science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6855 LNCS, pp. 332\u2013339 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39","DOI":"10.1007\/978-3-642-23678-5_39"},{"issue":"1","key":"323_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-14026-3","volume":"7","author":"M Bindemann","year":"2017","unstructured":"Bindemann, M., Fysh, M.C., Sage, S.S.K., Douglas, K., Tummon, H.M.: Person identification from aerial footage by a remote-controlled drone. Sci. Rep. 7(1), 1\u201310 (2017). https:\/\/doi.org\/10.1038\/s41598-017-14026-3","journal-title":"Sci. Rep."},{"key":"323_CR6","doi-asserted-by":"publisher","unstructured":"Cao, Z., Simon, T., Wei, S.E., Sheikh, Y.: Realtime multi-person 2D pose estimation using part affinity fields. In: proceedings - 30th IEEE conference on computer vision and pattern recognition, CVPR 2017, vol. 2017-Janua (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.143","DOI":"10.1109\/CVPR.2017.143"},{"key":"323_CR7","doi-asserted-by":"publisher","unstructured":"Cheng, W.H., Chu, W.T., Wu, J.L.: Semantic context detection based on hierarchical audio models. In: proceedings of the 5th ACM SIGMM international workshop on multimedia information retrieval, MIR 2003, pp. 109\u2013115 (2003). https:\/\/doi.org\/10.1145\/973264.973282","DOI":"10.1145\/973264.973282"},{"key":"323_CR8","doi-asserted-by":"publisher","unstructured":"Choi, W., Shahid, K., Savarese, S.: What are they doing?: Collective activity classification using spatio-temporal relationship among people. In: 2009 IEEE 12th international conference on computer vision workshops, ICCV workshops 2009, pp. 1282\u20131289 (2009). https:\/\/doi.org\/10.1109\/ICCVW.2009.5457461","DOI":"10.1109\/ICCVW.2009.5457461"},{"key":"323_CR9","unstructured":"Dandagpl Vishwajit, Hiemanshu Gautam, Akshay Ghavale, Radhika Mahore, Sonewar., P.A.: IRJET- review of violence detection system using deep learning. Int. Res. J. Eng. Technol. (IRJET) (2019)"},{"key":"323_CR10","doi-asserted-by":"crossref","unstructured":"Deeba, F., Ahmed, A., Memon, H., Dharejo, F.A., Ghaffar, A.: LBPH-based enhanced real-time face recognition. Int. J. Adv. Comput. Sci. Appl. 10(5), 274\u2013280 (2019). https:\/\/doi.org\/10.14569\/ijacsa.2019.0100535","DOI":"10.14569\/IJACSA.2019.0100535"},{"key":"323_CR11","doi-asserted-by":"publisher","unstructured":"Deniz, O., Serrano, I., Bueno, G., Kim, T.K.: Fast violence detection in video. In: VISAPP 2014 - proceedings of the 9th international conference on computer vision theory and applications, vol. 2, pp. 478\u2013485 (2014). https:\/\/doi.org\/10.5220\/0004695104780485","DOI":"10.5220\/0004695104780485"},{"key":"323_CR12","doi-asserted-by":"publisher","unstructured":"Ding, C., Fan, S., Zhu, M., Feng, W., Jia, B.: Violence detection in video by using 3D convolutional neural networks. In: Lecture notes in computer science (including Subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 8888, pp. 551\u2013558 (2014). https:\/\/doi.org\/10.1007\/978-3-319-14364-4_53","DOI":"10.1007\/978-3-319-14364-4_53"},{"key":"323_CR13","doi-asserted-by":"publisher","unstructured":"Donahue, J., Hendricks, L.A., Rohrbach, M., Venugopalan, S., Guadarrama, S., Saenko, K., Darrell, T.: Long-term recurrent convolutional networks for visual recognition and description. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 677\u2013691 (2017) arXiv:1411.4389. https:\/\/doi.org\/10.1109\/TPAMI.2016.2599174","DOI":"10.1109\/TPAMI.2016.2599174"},{"issue":"2","key":"323_CR14","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/IJPCC-02-2017-0018","volume":"13","author":"EY Fu","year":"2017","unstructured":"Fu, E.Y., Leong, H.V., Ngai, G., Chan, S.C.F.: Automatic fight detection in surveillance videos. Int. J. Pervasive Comput. Commun. 13(2), 130\u2013156 (2017). https:\/\/doi.org\/10.1108\/IJPCC-02-2017-0018","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"323_CR15","doi-asserted-by":"publisher","unstructured":"Giannakopoulos, T., Kosmopoulos, D., Aristidou, A., Theodoridis, S.: Violence content classification using audio features. In: Lecture notes in computer science (including Subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 3955 LNAI, pp. 502\u2013507 (2006). https:\/\/doi.org\/10.1007\/11752912_55","DOI":"10.1007\/11752912_55"},{"key":"323_CR16","doi-asserted-by":"publisher","unstructured":"Giannakopoulos, T., Pikrakis, A., Theodoridis, S.: A multi-class audio classification method with respect to violent content in movies using Bayesian Networks. In: 2007 IEEE 9Th international workshop on multimedia signal processing, MMSP 2007 - proceedings, pp. 90\u201393 (2007). https:\/\/doi.org\/10.1109\/MMSP.2007.4412825","DOI":"10.1109\/MMSP.2007.4412825"},{"key":"323_CR17","doi-asserted-by":"publisher","unstructured":"Goya, K., Zhang, X., Kitayama, K., Nagayama, I.: A method for automatic detection of crimes for public security by using motion analysis. In: IIH-MSP 2009 - 2009 5th international conference on intelligent information hiding and multimedia signal processing, pp. 736\u2013741 (2009). https:\/\/doi.org\/10.1109\/IIH-MSP.2009.264","DOI":"10.1109\/IIH-MSP.2009.264"},{"key":"323_CR18","doi-asserted-by":"publisher","unstructured":"Ha, S., Choi, S.: Convolutional neural networks for human activity recognition using multiple accelerometer and gyroscope sensors. In: proceedings of the international joint conference on neural networks, vol. 2016-October, pp. 381\u2013388 (2016). https:\/\/doi.org\/10.1109\/IJCNN.2016.7727224","DOI":"10.1109\/IJCNN.2016.7727224"},{"key":"323_CR19","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: proceedings of the IEEE computer society conference on computer vision and pattern recognition, vol. 2016-December, pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"323_CR20","first-page":"2017","volume":"2015","author":"M Jaderberg","year":"2015","unstructured":"Jaderberg, M., Simonyan, K., Zisserman, A., Kavukcuoglu, K.: Spatial transformer networks. Adv. Neural Inf. Process. Syst. 2015, 2017\u20132025 (2015)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"1","key":"323_CR21","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., Xu, W., Yang, M., Yu, K.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013). https:\/\/doi.org\/10.1109\/TPAMI.2012.59","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"323_CR22","doi-asserted-by":"publisher","unstructured":"Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R., Li, F.F.: Large-scale video classification with convolutional neural networks. In: proceedings of the IEEE computer society conference on computer vision and pattern recognition, pp. 1725\u20131732 (2014). https:\/\/doi.org\/10.1109\/CVPR.2014.223","DOI":"10.1109\/CVPR.2014.223"},{"key":"323_CR23","doi-asserted-by":"publisher","unstructured":"Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: proceedings of the IEEE computer society conference on computer vision and pattern recognition, pp. 1867\u20131874 (2014). https:\/\/doi.org\/10.1109\/CVPR.2014.241","DOI":"10.1109\/CVPR.2014.241"},{"key":"323_CR24","doi-asserted-by":"publisher","unstructured":"Kemelmacher-Shlizerman, I., Seitz, S.M., Miller, D., Brossard, E.: The MegaFace benchmark: 1 million faces for recognition at scale. In: proceedings of the IEEE computer society conference on computer vision and pattern recognition 2016-Decem, 4873\u20134882 (2016) arXiv:1512.00596. https:\/\/doi.org\/10.1109\/CVPR.2016.527","DOI":"10.1109\/CVPR.2016.527"},{"key":"323_CR25","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"323_CR26","volume-title":"Self-organization and associative memory","author":"T Kohonen","year":"2012","unstructured":"Kohonen, T.: Self-organization and associative memory, vol. 8. Springer, Berlin (2012)"},{"issue":"2","key":"323_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11263-005-1838-7","volume":"64","author":"I Laptev","year":"2005","unstructured":"Laptev, I., Lindeberg, T.: On space-time interest points. Int. J. Comput. Vision 64(2), 107\u2013123 (2005)","journal-title":"Int. J. Comput. Vision"},{"key":"323_CR28","doi-asserted-by":"publisher","unstructured":"Li, X., Chuah, M.C.: SBGAR: Semantics Based Group Activity Recognition. In: proceedings of the IEEE international conference on computer vision, vol. 2017-Octob, pp. 2895\u20132904 (2017). https:\/\/doi.org\/10.1109\/ICCV.2017.313","DOI":"10.1109\/ICCV.2017.313"},{"issue":"10","key":"323_CR29","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/TPAMI.2008.73","volume":"30","author":"Y Li","year":"2008","unstructured":"Li, Y., Ai, H., Yamashita, T., Lao, S., Kawade, M.: Tracking in low frame rate video: a cascade particle filter with discriminative observers of different life spans. IEEE Trans. Pattern Anal. Mach. Intell. 30(10), 1728\u20131740 (2008). https:\/\/doi.org\/10.1109\/TPAMI.2008.73","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"323_CR30","doi-asserted-by":"publisher","unstructured":"Mumtaz, A., Sargano, A.B., Habib, Z.: Violence detection in surveillance videos with deep network using transfer learning. In: proceedings - 2018 2nd European conference on electrical engineering and computer science, EECS 2018, pp. 558\u2013563 (2018). https:\/\/doi.org\/10.1109\/EECS.2018.00109","DOI":"10.1109\/EECS.2018.00109"},{"key":"323_CR31","first-page":"11","volume":"2017","author":"AJ Naik","year":"2017","unstructured":"Naik, A.J., Gopalakrishna, M.T.: Violence detection in surveillance video-a survey. Int. J. Latest Res. Eng. Technol. (IJLRET) 2017, 11\u201317 (2017)","journal-title":"Int. J. Latest Res. Eng. Technol. (IJLRET)"},{"key":"323_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/s16010115","author":"FJ Ord\u00f3\u00f1ez","year":"2016","unstructured":"Ord\u00f3\u00f1ez, F.J., Roggen, D.: Deep convolutional and LSTM recurrent neural networks for multimodal wearable activity recognition. Sensors (Switzerland) (2016). https:\/\/doi.org\/10.3390\/s16010115","journal-title":"Sensors (Switzerland)"},{"key":"323_CR33","doi-asserted-by":"publisher","DOI":"10.5565\/rev\/elcvia.582","author":"S Penmetsa","year":"2014","unstructured":"Penmetsa, S., Minhuj, F., Singh, A., Omkar, S.N.: Autonomous UAV for suspicious action detection using pictorial human pose estimation and classification. Electron. Lett. Comput. Vision Image Anal. (2014). https:\/\/doi.org\/10.5565\/rev\/elcvia.582","journal-title":"Electron. Lett. Comput. Vision Image Anal."},{"key":"323_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2325871","author":"M Ramanathan","year":"2014","unstructured":"Ramanathan, M., Yau, W.Y., Teoh, E.K.: Human action recognition with video data: research and evaluation challenges. IEEE Trans. Hum. Mach. Syst. (2014). https:\/\/doi.org\/10.1109\/THMS.2014.2325871","journal-title":"IEEE Trans. Hum. Mach. Syst."},{"key":"323_CR35","doi-asserted-by":"publisher","unstructured":"Saypadith, S., Aramvith, S.: Real-time multiple face recognition using deep learning on embedded GPU system. In: 2018 Asia-Pacific signal and information processing association annual summit and conference, APSIPA ASC 2018 - proceedings, pp. 1318\u20131324 (2019). https:\/\/doi.org\/10.23919\/APSIPA.2018.8659751","DOI":"10.23919\/APSIPA.2018.8659751"},{"key":"323_CR36","doi-asserted-by":"publisher","unstructured":"Singh, A., Patil, D., Omkar, S.N.: Eye in the sky: Real-time drone surveillance system (DSS) for violent individuals identification using scatternet hybrid deep learning network. In: IEEE computer society conference on computer vision and pattern recognition workshops, vol. 2018-June, pp. 1710\u20131718 (2018). https:\/\/doi.org\/10.1109\/CVPRW.2018.00214","DOI":"10.1109\/CVPRW.2018.00214"},{"key":"323_CR37","doi-asserted-by":"publisher","unstructured":"Soliman, M.M., Kamal, M.H., Nashed, M.A.E.-M., Mostafa, Y.M., Chawky, B.S., Khattab, D.: Violence recognition from videos using deep learning techniques. (2019). https:\/\/doi.org\/10.1109\/ICICIS46948.2019.9014714","DOI":"10.1109\/ICICIS46948.2019.9014714"},{"key":"323_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-021-01171-2","author":"A Srivastava","year":"2021","unstructured":"Srivastava, A., et al.: Recognizing human violent action using drone surveillance within real-time proximity. J. Real Time Image Process. (2021). https:\/\/doi.org\/10.1007\/s11554-021-01171-2","journal-title":"J. Real Time Image Process."},{"issue":"01","key":"323_CR39","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1142\/s2196888820500013","volume":"07","author":"SA Sumon","year":"2020","unstructured":"Sumon, S.A., Goni, R., Hashem, N.B., Shahria, T., Rahman, R.M.: Violence detection by pretrained modules with different deep learning approaches. Vietnam J. Comput. Sci. 07(01), 19\u201340 (2020). https:\/\/doi.org\/10.1142\/s2196888820500013","journal-title":"Vietnam J. Comput. Sci."},{"key":"323_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/s19112472","author":"FUM Ullah","year":"2019","unstructured":"Ullah, F.U.M., Ullah, A., Muhammad, K., Haq, I.U., Baik, S.W.: Violence detection using spatiotemporal features with 3D convolutional neural network. Sensors (Switzerland) (2019). https:\/\/doi.org\/10.3390\/s19112472","journal-title":"Sensors (Switzerland)"},{"key":"323_CR41","doi-asserted-by":"crossref","unstructured":"van\u00a0der Spoel, E., Rozing, M.P., Houwing-Duistermaat, J.J., Eline Slagboom, P., Beekman, M., de Craen, A.J.M., Westendorp, R.G.J., van Heemst, D.: Siamese neural networks for one-shot image recognition. ICML - deep learning workshop 7(11), 956\u2013963 (2015) arXiv:arXiv:1011.1669v3","DOI":"10.18632\/aging.100841"},{"key":"323_CR42","doi-asserted-by":"publisher","unstructured":"Wang, M., Deng, W.: Deep face recognition: a survey. Neurocomputing 429, 215\u2013244 (2021) arXiv:1804.06655. https:\/\/doi.org\/10.1016\/j.neucom.2020.10.081","DOI":"10.1016\/j.neucom.2020.10.081"},{"key":"323_CR43","doi-asserted-by":"publisher","unstructured":"Wang, L., Xiong, Y., Wang, Z., Qiao, Y., Lin, D., Tang, X., van Gool, L.: Temporal segment networks: towards good practices for deep action recognition. In: Lecture notes in computer science (including Subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 9912 LNCS, pp. 20\u201336 (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_2","DOI":"10.1007\/978-3-319-46484-8_2"},{"key":"323_CR44","doi-asserted-by":"publisher","unstructured":"Wu, B., Ai, H., Huang, C., Lao, S.: Fast rotation invariant multi-View face detection based on real adaboost. In: proceedings - Sixth IEEE international conference on automatic face and gesture recognition, pp. 79\u201384 (2004). https:\/\/doi.org\/10.1300\/J083v43n02_06","DOI":"10.1300\/J083v43n02_06"},{"issue":"4","key":"323_CR45","doi-asserted-by":"publisher","first-page":"047202","DOI":"10.1117\/1.oe.51.4.047202","volume":"51","author":"M Xu","year":"2012","unstructured":"Xu, M.: Robust object detection with real-time fusion of multiview foreground silhouettes. Opt. Eng. 51(4), 047202 (2012). https:\/\/doi.org\/10.1117\/1.oe.51.4.047202","journal-title":"Opt. Eng."},{"key":"323_CR46","doi-asserted-by":"publisher","unstructured":"Zaheer, M.Z., Kim, J.Y., Kim, H.G., Na, S.Y.: A preliminary study on deep-learning based screaming sound detection. In: 2015 5th international conference on IT convergence and security, ICITCS 2015 - proceedings (July) (2015). https:\/\/doi.org\/10.1109\/ICITCS.2015.7292925","DOI":"10.1109\/ICITCS.2015.7292925"},{"key":"323_CR47","doi-asserted-by":"publisher","unstructured":"Zajdel, W., Krijnders, J.D., Andringa, T., Gavrila, D.M.: CASSANDRA: audio-video sensor fusion for aggression detection. In: 2007 IEEE conference on advanced video and signal based surveillance, AVSS 2007 proceedings (2007). https:\/\/doi.org\/10.1109\/AVSS.2007.4425310","DOI":"10.1109\/AVSS.2007.4425310"},{"key":"323_CR48","doi-asserted-by":"publisher","unstructured":"Zhang, B., Wang, L., Wang, Z., Qiao, Y., Wang, H.: Real-Time Action Recognition with Enhanced Motion Vector CNNs. In: proceedings of the IEEE computer society conference on computer vision and pattern recognition, vol. 2016-December, pp. 2718\u20132726 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.297","DOI":"10.1109\/CVPR.2016.297"},{"key":"323_CR49","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/844\/1\/012044","author":"P Zhou","year":"2017","unstructured":"Zhou, P., Ding, Q., Luo, H., Hou, X.: Violent interaction detection in video based on deep learning. J. Phys. Conf. Ser. (2017). https:\/\/doi.org\/10.1088\/1742-6596\/844\/1\/012044","journal-title":"J. Phys. Conf. Ser."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-022-00323-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-022-00323-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-022-00323-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T15:43:02Z","timestamp":1650901382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-022-00323-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,2]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["323"],"URL":"https:\/\/doi.org\/10.1007\/s10515-022-00323-3","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,2]]},"assertion":[{"value":"21 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"28"}}