{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T06:36:42Z","timestamp":1649140602782},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T00:00:00Z","timestamp":1542067200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11036-018-1172-2","type":"journal-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T05:41:26Z","timestamp":1542087686000},"page":"160-162","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms"],"prefix":"10.1007","volume":"24","author":[{"given":"Cheonshik","family":"Kim","sequence":"first","affiliation":[]},{"given":"Byung-Gyu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,13]]},"reference":[{"key":"1172_CR1","doi-asserted-by":"publisher","unstructured":"Kim H, Yang G, Jung H, Lee SH, Ahn JJ (2018) An intelligent product recommendation model to reflect the recent purchasing patterns of customers, Mobile Netw Appl, pp 1\u20138. \n                    https:\/\/doi.org\/10.1007\/s11036-017-0986-7","DOI":"10.1007\/s11036-017-0986-7"},{"key":"1172_CR2","doi-asserted-by":"publisher","unstructured":"Ye H, Dong K, Gu T, Huang Z (2018) SMinder: Detect a left-behind phone using sensor-based context awareness, Mobile Netw Appl, pp 1\u201313. \n                    https:\/\/doi.org\/10.1007\/s11036-017-0987-6","DOI":"10.1007\/s11036-017-0987-6"},{"key":"1172_CR3","doi-asserted-by":"publisher","unstructured":"Kim D, Shin D, Shin D, Kim YH Attack detection application with attack tree for mobile system using log analysis, Mobile Netw Appl, pp 1\u20139. \n                    https:\/\/doi.org\/10.1007\/s11036-018-1012-4","DOI":"10.1007\/s11036-018-1012-4"},{"key":"1172_CR4","doi-asserted-by":"publisher","unstructured":"Vegesna VVR, Gurugubelli K, Vuppala AK (2018) Application of Emotion Recognition and Modification for Emotional Telugu Speech Recognition, Mobile Netw Appl, pp 1\u20139. \n                    https:\/\/doi.org\/10.1007\/s11036-018-1052-9","DOI":"10.1007\/s11036-018-1052-9"},{"key":"1172_CR5","doi-asserted-by":"publisher","unstructured":"Chatterji S (2018) Recommending the best merchant from previous transactions, Mobile Netw Appl, pp 1\u20136. \n                    https:\/\/doi.org\/10.1007\/s11036-018-1053-8","DOI":"10.1007\/s11036-018-1053-8"},{"key":"1172_CR6","doi-asserted-by":"publisher","unstructured":"Lee JH, Hong GS, Lee YW, Kim CK, Park N, Kim BG (2018) Design of efficient key video frame protection scheme for multimedia internet of things (IoT) in converged 5G network, Mobile Netw Appl, pp 1\u201313. \n                    https:\/\/doi.org\/10.1007\/s11036-018-1107-y","DOI":"10.1007\/s11036-018-1107-y"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1172-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1172-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1172-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T17:47:09Z","timestamp":1576518429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1172-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,13]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["1172"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1172-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,13]]},"assertion":[{"value":"13 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}