{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T14:08:15Z","timestamp":1772028495582,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T00:00:00Z","timestamp":1591920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T00:00:00Z","timestamp":1591920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10772-020-09722-x","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T14:02:54Z","timestamp":1591970574000},"page":"57-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["RETRACTED ARTICLE: Speech-assisted intelligent software architecture based on deep game neural network"],"prefix":"10.1007","volume":"24","author":[{"given":"Yue","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"9722_CR1","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.chb.2013.06.018","volume":"30","author":"HR Abachi","year":"2014","unstructured":"Abachi, H. R., & Muhammad, G. (2014). The impact of m-learning technology on students and educators. Computers in Human Behavior,30, 491\u2013496.","journal-title":"Computers in Human Behavior"},{"key":"9722_CR2","volume-title":"Machine translation: An introductory guide","author":"D Amold","year":"1994","unstructured":"Amold, D., Balkan, L., Humphreys, R., Meijer, S., & Sadler, L. (1994). Machine translation: An introductory guide. Manchester and Oxford: NCC Blackwell."},{"key":"9722_CR3","unstructured":"Atwell, E., Herron, D., Howarth, P., Morton, R., & Wick, H. (1999). Pronunciation training: Requirements and solutions, interactive spoken language education (ISLE). European Commission Project LE4 2 8353"},{"issue":"8","key":"9722_CR4","first-page":"2239","volume":"2015","author":"Q Bartsey","year":"2015","unstructured":"Bartsey, Q., Hao, H., & Xianhui, W. (2015). Uyghur speech recognition based on deep neural network. Computer Engineering and Design,2015(8), 2239\u20132244.","journal-title":"Computer Engineering and Design"},{"key":"9722_CR5","first-page":"2","volume-title":"Language and communication","author":"M Canale","year":"1983","unstructured":"Canale, M. (1983). From communicative competence to communicative language pedagogy. In J. C. Richards & R. W. Schmidt (Eds.), Language and communication (pp. 2\u201327). London: Longman."},{"issue":"14","key":"9722_CR6","doi-asserted-by":"publisher","first-page":"18601","DOI":"10.1007\/s11042-017-5299-0","volume":"77","author":"Q Chen","year":"2018","unstructured":"Chen, Q., Zhang, G., Yang, X., Li, S., Li, Y., & Wang, H. H. (2018). Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimedia Tools and Applications,77(14), 18601\u201318624.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9722_CR7","first-page":"61","volume":"2","author":"DM Chun","year":"1998","unstructured":"Chun, D. M. (1998). Signal analysis software for teaching discourse intonation. Language Learning & Technology,2(1), 61\u201377.","journal-title":"Language Learning & Technology"},{"issue":"19","key":"9722_CR8","first-page":"276","volume":"33","author":"S Daming","year":"2007","unstructured":"Daming, S., Hongfei, L., & Zhihao, Y. (2007). Web noise removal method based on web frame and rules. Computer Engineering,33(19), 276\u2013278.","journal-title":"Computer Engineering"},{"key":"9722_CR9","volume-title":"Implementation of deep neural network in Chinese speech recognition system FD 1","author":"Z Deliang","year":"2015","unstructured":"Deliang, Z. (2015). Implementation of deep neural network in Chinese speech recognition system FD 1. Beijing: Beijing Jiaotong University."},{"issue":"1","key":"9722_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.jksuci.2013.10.008","volume":"26","author":"S G\u00f3mez","year":"2014","unstructured":"G\u00f3mez, S., Zervas, P., Sampson, D. G., & Fabregat, R. (2014). Context-aware adaptive and personalized mobile learning delivery supported by UoLmP. Journal of King Saud University-Computer and Information Sciences.,26(1), 47\u201361.","journal-title":"Journal of King Saud University-Computer and Information Sciences."},{"issue":"5","key":"9722_CR11","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub, A., Al-Juaid, N., & Khan, E. (2019). Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications,78(5), 5591\u20135619.","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"9722_CR12","first-page":"1799","volume":"50","author":"Y Kai","year":"2013","unstructured":"Kai, Y., Lei, J., Yuqiang, C., et al. (2013). Yesterday, today and tomorrow of deep learning. Computer Research and Development,50(9), 1799\u20131804.","journal-title":"Computer Research and Development"},{"issue":"1","key":"9722_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1186\/s13638-017-0900-9","volume":"2017","author":"S Kim","year":"2017","unstructured":"Kim, S. (2017). Fog radio access network system control scheme based on the embedded game model. EURASIP Journal on Wireless Communications and Networking.,2017(1), 113.","journal-title":"EURASIP Journal on Wireless Communications and Networking."},{"issue":"2","key":"9722_CR14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10772-019-09596-8","volume":"22","author":"P Kurada","year":"2019","unstructured":"Kurada, P., Maruvada, S., & Sanagapallea, K. R. (2019). Speech bandwidth extension using transform-domain data hiding. International Journal of Speech Technology,22(2), 305\u2013312.","journal-title":"International Journal of Speech Technology"},{"key":"9722_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1186\/s13662-015-0439-1","volume":"1","author":"N Li","year":"2015","unstructured":"Li, N., & Yu, Z. (2015). Recursive stochastic linear-quadratic optimal control and nonzero-sum differential game problems with random jumps. Advances in Difference Equations,1, 144.","journal-title":"Advances in Difference Equations"},{"issue":"21","key":"9722_CR16","doi-asserted-by":"publisher","first-page":"30081","DOI":"10.1007\/s11042-018-6922-4","volume":"78","author":"C Lin","year":"2019","unstructured":"Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., et al. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications,78(21), 30081\u201330096.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9722_CR17","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10772-019-09593-x","volume":"22","author":"P Mittal","year":"2019","unstructured":"Mittal, P., & Singh, N. (2019). Development and analysis of Punjabi ASR system for mobile phones under different acoustic models. International Journal of Speech Technology,22(1), 219\u2013230.","journal-title":"International Journal of Speech Technology"},{"issue":"122","key":"9722_CR18","first-page":"1","volume":"20","author":"DS Pavlichin","year":"2019","unstructured":"Pavlichin, D. S., Jiao, J., & Weissman, T. (2019). Approximate profile maximum likelihood. Journal of Machine Learning Research,20(122), 1\u201355.","journal-title":"Journal of Machine Learning Research"},{"key":"9722_CR19","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1121\/1.1906875","volume":"24","author":"GE Peterson","year":"1952","unstructured":"Peterson, G. E., & Barney, H. L. (1952). Control methods used in a study of the vowels. Journal of the Acoustical Society of America,24, 175\u2013184.","journal-title":"Journal of the Acoustical Society of America"},{"key":"9722_CR20","unstructured":"Qi, L., Yang, D. (2014). Design of curriculum assistant teaching system. Computer Disc Software and Application. 01."},{"issue":"5","key":"9722_CR21","doi-asserted-by":"publisher","first-page":"3359","DOI":"10.1007\/s11042-019-07931-4","volume":"79","author":"J Schneider","year":"2020","unstructured":"Schneider, J., Schaal, S., & Schlieder, C. (2020). Integrating simulation tasks into an outdoor location-based game flow. Multimedia Tools and Applications,79(5), 3359\u20133385.","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"9722_CR22","doi-asserted-by":"publisher","first-page":"9217","DOI":"10.1007\/s11042-018-6388-4","volume":"78","author":"AF Vilas","year":"2019","unstructured":"Vilas, A. F., Redondo, R. P. D., Crockett, K., Owda, M., & Evans, L. (2019). Twitter permeability to financial events: an experiment towards a model for sensing irregularities. Multimedia Tools and Applications,78(7), 9217\u20139245.","journal-title":"Multimedia Tools and Applications"},{"key":"9722_CR23","first-page":"1282","volume":"08","author":"L Weibing","year":"2007","unstructured":"Weibing, L., & Xianjia, W. (2007). Evolutionary game research based on PSO neural network. System Engineering and Electronic Technology,08, 1282\u20131284.","journal-title":"System Engineering and Electronic Technology"},{"issue":"1","key":"9722_CR24","first-page":"99","volume":"28","author":"L Yanqiang","year":"2011","unstructured":"Yanqiang, L., Rushun, S., & Yongcai, M. (2011). Game model of attack and defense based on RBF neural network. Computer Application and Software,28(1), 99\u2013101.","journal-title":"Computer Application and Software"},{"key":"9722_CR25","volume-title":"Design and implementation of teaching effect evaluation support system in network teaching environment","author":"H Yaxiao","year":"2013","unstructured":"Yaxiao, H. (2013). Design and implementation of teaching effect evaluation support system in network teaching environment. Beijing: Beijing University of technology."},{"key":"9722_CR26","first-page":"e5522","volume":"9","author":"S Yingying","year":"2019","unstructured":"Yingying, S., Lianjuan, H., Jianan, W., & Huimin, W. (2019). Quantum-behaved RS-PSO-LSSVM method for quality prediction in parts production processes. Concurrency and Computation-Practice & Experience,9, e5522.","journal-title":"Concurrency and Computation-Practice & Experience"},{"key":"9722_CR27","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.patrec.2017.09.018","volume":"115","author":"M Zareapoor","year":"2018","unstructured":"Zareapoor, M., Shamsolmoali, P., Jain, D. K., Wang, H., & Yang, J. (2018). Kernelized support vector machine with deep learning: An efficient approach for extreme multiclass dataset. Pattern Recognition Letters,115, 4\u201313.","journal-title":"Pattern Recognition Letters"},{"key":"9722_CR28","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.ijleo.2017.11.190","volume":"157","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Wang, H., Huang, W., & You, Z. (2018). Plant diseased leaf segmentation and recognition by fusion of superpixel, K-means and PHOG. Optik,157, 866\u2013872.","journal-title":"Optik"},{"issue":"1","key":"9722_CR29","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10772-018-09573-7","volume":"22","author":"T Zia","year":"2019","unstructured":"Zia, T., & Zahid, U. (2019). Long short-term memory recurrent neural network architectures for Urdu acoustic modeling. International Journal of Speech Technology,22(1), 21\u201330.","journal-title":"International Journal of Speech Technology"},{"key":"9722_CR30","volume-title":"Design and implementation of Web-based auxiliary teaching system","author":"W ZuoPung","year":"2007","unstructured":"ZuoPung, W. (2007). Design and implementation of Web-based auxiliary teaching system. Shenyang: Shenyang University of Technology."}],"updated-by":[{"DOI":"10.1007\/s10772-022-10014-9","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T00:00:00Z","timestamp":1669939200000},"record-id":"43579"},{"DOI":"10.1007\/s10772-022-10014-9","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T00:00:00Z","timestamp":1669939200000}}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09722-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-020-09722-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-020-09722-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T12:10:00Z","timestamp":1670933400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-020-09722-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,12]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9722"],"URL":"https:\/\/doi.org\/10.1007\/s10772-020-09722-x","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,12]]},"assertion":[{"value":"28 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10772-022-10014-9","URL":"https:\/\/doi.org\/10.1007\/s10772-022-10014-9","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}