{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T14:08:17Z","timestamp":1772028497692,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10772-020-09705-y","type":"journal-article","created":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T10:02:28Z","timestamp":1587463348000},"page":"31-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RETRACTED ARTICLE: A data layout method suitable for workflow in a cloud computing environment with speech applications"],"prefix":"10.1007","volume":"24","author":[{"given":"Yi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"YongHao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yali","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,21]]},"reference":[{"key":"9705_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.future.2018.03.014","volume":"86","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Mohamed, M., & Chang, V. (2018). NMCDA: A framework for evaluating cloud computing services. Future Generation Computer Systems, 86, 12\u201329.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"9705_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jmir.2017.10.005","volume":"49","author":"S Crisp","year":"2018","unstructured":"Crisp, S., & Dawdy, K. (2018). Building a magnetic resonance imaging safety culture from the ground up. Journal of Medical Imaging and Radiation Sciences, 49(1), 18\u201322.","journal-title":"Journal of Medical Imaging and Radiation Sciences"},{"key":"9705_CR3","doi-asserted-by":"publisher","first-page":"16068","DOI":"10.1109\/ACCESS.2018.2814827","volume":"6","author":"E Fan","year":"2018","unstructured":"Fan, E., Xie, W., Pei, J., Hu, K., & Li, X. (2018). Neutrosophic hough transform-based track initiation method for multiple target tracking. IEEE Access, 6, 16068\u201316080.","journal-title":"IEEE Access"},{"key":"9705_CR4","doi-asserted-by":"publisher","first-page":"121355","DOI":"10.1016\/j.biortech.2019.121355","volume":"285","author":"C Huang","year":"2019","unstructured":"Huang, C., Lin, W., Lai, C., Li, X., Jin, Y., & Yong, Q. (2019a). Coupling the post-extraction process to remove residual lignin and alter the recalcitrant structures for improving the enzymatic digestibility of acid-pretreated bamboo residues. Bioresource technology, 285, 121355.","journal-title":"Bioresource technology"},{"issue":"1","key":"9705_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1186\/s13068-019-1527-3","volume":"12","author":"C Huang","year":"2019","unstructured":"Huang, C., Wang, X., Liang, C., Jiang, X., Yang, G., Xu, J., et al. (2019b). A sustainable process for procuring biologically active fractions of high-purity xylooligosaccharides and water-soluble lignin from Moso bamboo prehydrolyzate. Biotechnology for Biofuels, 12(1), 189.","journal-title":"Biotechnology for Biofuels"},{"issue":"10","key":"9705_CR6","doi-asserted-by":"publisher","first-page":"6662","DOI":"10.1109\/TIT.2018.2829889","volume":"64","author":"J Jiao","year":"2018","unstructured":"Jiao, J., Venkat, K., & Weissman, T. (2018a). Mutual information, relative entropy and estimation error in semi-martingale channels. IEEE Transactions on Information Theory, 64(10), 6662\u20136671.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9705_CR7","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.patcog.2017.12.002","volume":"76","author":"Z Jiao","year":"2018","unstructured":"Jiao, Z., Gao, X., Wang, Y., Li, J., & Xu, H. (2018b). Deep Convolutional Neural Networks for mental load classification based on EEG data. Pattern Recognition, 76, 582\u2013595.","journal-title":"Pattern Recognition"},{"issue":"3","key":"9705_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2018.8370870","volume":"32","author":"H Li","year":"2018","unstructured":"Li, H., Lu, R., Misic, J., & Mahmoud, M. (2018c). Security and privacy of connected vehicular cloud computing. IEEE Network, 32(3), 4\u20136.","journal-title":"IEEE Network"},{"key":"9705_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018b). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1\u201312.","journal-title":"Computers & Security"},{"issue":"1","key":"9705_CR10","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10586-017-0849-9","volume":"21","author":"P Li","year":"2018","unstructured":"Li, P., Li, J., Huang, Z., Gao, C. Z., Chen, W. B., & Chen, K. (2018a). Privacy-preserving outsourced classification in cloud computing. Cluster Computing, 21(1), 277\u2013286.","journal-title":"Cluster Computing"},{"issue":"3","key":"9705_CR11","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1166\/jmihi.2018.2363","volume":"8","author":"ZH Lu","year":"2018","unstructured":"Lu, Z. H., Zhao, W. L., Ji, L. B., Wen, R., Zhang, Y. S., Wu, J. F., et al. (2018). The histogram analysis of apparent diffusion coefficient maps with standard-or ultrahigh-b value diffusion-weighted MR imaging for differentiating the gleason grade of prostate cancer. Journal of Medical Imaging and Health Informatics, 8(3), 577\u2013582.","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"8","key":"9705_CR12","doi-asserted-by":"publisher","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","volume":"14","author":"K Muhammad","year":"2018","unstructured":"Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., & Baik, S. W. (2018). Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics, 14(8), 3679\u20133689.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"9705_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.jnca.2018.04.018","volume":"115","author":"TH Noor","year":"2018","unstructured":"Noor, T. H., Zeadally, S., Alfazi, A., & Sheng, Q. Z. (2018). Mobile cloud computing: Challenges and future research directions. Journal of Network and Computer Applications, 115, 70\u201385.","journal-title":"Journal of Network and Computer Applications"},{"issue":"24","key":"9705_CR14","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.2174\/1381612825666190709220139","volume":"25","author":"CT Pan","year":"2019","unstructured":"Pan, C. T., Chang, W. H., Kumar, A., Singh, S. P., Kaushik, A. C., Sharma, J., et al. (2019). Nanoparticles-mediated brain imaging and disease prognosis by conventional as well as modern modal imaging techniques: A comparison. Current Pharmaceutical Design, 25(24), 2637\u20132649.","journal-title":"Current Pharmaceutical Design"},{"issue":"122","key":"9705_CR15","first-page":"1","volume":"20","author":"DS Pavlichin","year":"2019","unstructured":"Pavlichin, D. S., Jiao, J., & Weissman, T. (2019). Approximate profile maximum likelihood. Journal of Machine Learning Research, 20(122), 1\u201355.","journal-title":"Journal of Machine Learning Research"},{"key":"9705_CR16","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"AP Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG Data collection\u2013processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357.","journal-title":"Future Generation Computer Systems"},{"key":"9705_CR17","doi-asserted-by":"publisher","first-page":"117634","DOI":"10.1016\/j.jclepro.2019.117634","volume":"237","author":"S Que","year":"2019","unstructured":"Que, S., Awuah-Offei, K., Demirel, A., Wang, L., Demirel, N., & Chen, Y. (2019). Comparative study of factors affecting public acceptance of mining projects: Evidence from USA, China and Turkey. Journal of Cleaner Production, 237, 117634.","journal-title":"Journal of Cleaner Production"},{"issue":"4","key":"9705_CR18","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/JIOT.2018.2838022","volume":"5","author":"H Shah-Mansouri","year":"2018","unstructured":"Shah-Mansouri, H., & Wong, V. W. (2018). Hierarchical fog-cloud computing for IoT systems: A computation offloading game. IEEE Internet of Things Journal, 5(4), 3246\u20133257.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"9705_CR19","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1166\/jmihi.2020.2894","volume":"10","author":"C Shao","year":"2020","unstructured":"Shao, C., Zhang, Q., Song, Y., & Zhu, D. (2020). Smart home healthcare system based on middleware and counter neural network. Journal of Medical Imaging and Health Informatics, 10(5), 1105\u20131112.","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"3","key":"9705_CR20","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications, 78(3), 3457\u20133470.","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"9705_CR21","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1038\/s41591-018-0029-3","volume":"24","author":"DS Ting","year":"2018","unstructured":"Ting, D. S., Liu, Y., Burlina, P., Xu, X., Bressler, N. M., & Wong, T. Y. (2018). AI for medical imaging goes deep. Nature Medicine, 24(5), 539.","journal-title":"Nature Medicine"},{"key":"9705_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.neucom.2017.05.013","volume":"275","author":"N Wang","year":"2018","unstructured":"Wang, N., Gao, X., Tao, D., Yang, H., & Li, X. (2018). Facial feature point detection: A comprehensive survey. Neurocomputing, 275, 50\u201365.","journal-title":"Neurocomputing"},{"issue":"1","key":"9705_CR24","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1007\/s10586-017-1199-3","volume":"22","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Li, J., & Wang, H. H. (2019). Cluster and cloud computing framework for scientific metrology in flow control. Cluster Computing, 22(1), 1189\u20131198.","journal-title":"Cluster Computing"},{"issue":"6","key":"9705_CR23","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265\u20131277.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9705_CR25","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., Ghaoui, L.E., Jordan, M.I. (2019). Theoretically principled trade-off between robustness and accuracy. arXiv preprint arXiv:1901.08573."},{"issue":"6","key":"9705_CR27","doi-asserted-by":"publisher","first-page":"4041","DOI":"10.1007\/s00500-019-04172-3","volume":"24","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Wang, H., & Huang, W. (2020). Palmprint identification combining hierarchical multi-scale complete LBP and weighted SRC. Soft Computing, 24(6), 4041\u20134053.","journal-title":"Soft Computing"},{"key":"9705_CR28","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.ijleo.2017.11.190","volume":"157","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Wang, H., Huang, W., & You, Z. (2018). Plant diseased leaf segmentation and recognition by fusion of superpixel, K-means and PHOG. Optik, 157, 866\u2013872.","journal-title":"Optik"},{"issue":"6","key":"9705_CR29","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1166\/jmihi.2019.2724","volume":"9","author":"G Zhao","year":"2019","unstructured":"Zhao, G., Wu, Y., He, M., Bai, J., Cheng, J., & Lin, Y. (2019). Preprocessing and grading of glioma data acquired from multicenter. Journal of Medical Imaging and Health Informatics, 9(6), 1236\u20131245.","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"1","key":"9705_CR30","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3152397","volume":"51","author":"B Zhou","year":"2018","unstructured":"Zhou, B., & Buyya, R. (2018). Augmentation techniques for mobile cloud computing: A taxonomy, survey, and future directions. ACM Computing Surveys (CSUR), 51(1), 13.","journal-title":"ACM Computing Surveys (CSUR)"}],"updated-by":[{"DOI":"10.1007\/s10772-022-10003-y","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"record-id":"43576"},{"DOI":"10.1007\/s10772-020-09705-y","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000}},{"DOI":"10.1007\/s10772-022-10003-y","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000}}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09705-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-020-09705-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09705-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:06:26Z","timestamp":1772024786000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-020-09705-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9705"],"URL":"https:\/\/doi.org\/10.1007\/s10772-020-09705-y","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"6 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10772-022-10003-y","URL":"https:\/\/doi.org\/10.1007\/s10772-022-10003-y","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}