{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:23:15Z","timestamp":1772065395402,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T00:00:00Z","timestamp":1523836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T00:00:00Z","timestamp":1523836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-018-5951-3","type":"journal-article","created":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T06:59:03Z","timestamp":1523861943000},"page":"26997-27012","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["RETRACTED ARTICLE: Performance analysis of pre-cancerous mammographic image\n            enhancement feature using non-subsampled shearlet transform"],"prefix":"10.1007","volume":"80","author":[{"given":"T. V.","family":"Padmavathy","sequence":"first","affiliation":[]},{"given":"M. N.","family":"Vimalkumar","sequence":"additional","affiliation":[]},{"given":"Sivakumar","family":"Nagarajan","sequence":"additional","affiliation":[]},{"given":"Gokul Chandra","family":"Babu","sequence":"additional","affiliation":[]},{"given":"P.","family":"Parthasarathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,16]]},"reference":[{"issue":"1","key":"5951_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.7763\/IJCTE.2015.V7.927","volume":"7","author":"AA AbuBaker","year":"2015","unstructured":"AbuBaker AA (2015) Automatic microcalcification detection\n                    usingwavelettransform. Int J Comput Theory Eng 7(1):40\u201345","journal-title":"Int J Comput Theory Eng"},{"key":"5951_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.procs.2015.04.071","volume":"50","author":"EV Balan","year":"2015","unstructured":"Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based\n                    intrusion detection systems in MANET. Procedia Comput Sci\n                    50:109\u2013114","journal-title":"Procedia Comput Sci"},{"key":"5951_CR3","doi-asserted-by":"crossref","unstructured":"Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse\n                    and anomaly detection techniques for wireless networks. In: Communications and\n                    Signal Processing (ICCSP), 2015 International Conference on. IEEE, pp\n                    0185\u20130189","DOI":"10.1109\/ICCSP.2015.7322846"},{"key":"5951_CR4","doi-asserted-by":"crossref","unstructured":"Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual\n                    authentication scheme for IoT application. Indian J Sci Technol\n                    8(26)","DOI":"10.17485\/ijst\/2015\/v8i26\/80996"},{"key":"5951_CR5","doi-asserted-by":"crossref","unstructured":"Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015)\n                    Detection of DDoS attack using optimized hop count filtering technique. Indian J\n                    Sci Technol 8(26)","DOI":"10.17485\/ijst\/2015\/v8i1\/83981"},{"key":"5951_CR6","doi-asserted-by":"crossref","unstructured":"Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015)\n                    Preservation of privacy in data mining by using PCA based perturbation\n                    technique. In: Smart technologies and management for computing, communication,\n                    controls, energy and materials (ICSTM), 2015 International Conference on. IEEE,\n                    pp 202\u2013206","DOI":"10.1109\/ICSTM.2015.7225414"},{"key":"5951_CR7","doi-asserted-by":"crossref","unstructured":"Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things\n                    architecture with machine learning algorithm for early detection of heart\n                    diseases. Comput Electr Eng","DOI":"10.1016\/j.compeleceng.2017.09.001"},{"key":"5951_CR8","doi-asserted-by":"crossref","unstructured":"Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel\n                    T (2017) Intelligent face recognition and navigation system using neural\n                    learning for smart security in internet of things. Clust\n                    Comput:1\u201312","DOI":"10.1007\/s10586-017-1323-4"},{"issue":"8","key":"5951_CR9","first-page":"1","volume":"28","author":"D Lopez","year":"2017","unstructured":"Lopez D, Manogaran G, Jagan J (2017) Modelling the H1N1 influenza\n                    using mathematical and neural network approaches. Biomed Res\n                    28(8):1\u20135","journal-title":"Biomed Res"},{"key":"5951_CR10","doi-asserted-by":"crossref","unstructured":"Manogaran CTG, Priyan M (2017) Centralized fog computing security\n                    platform for IoT and cloud in healthcare system. Exploring the convergence of\n                    big data and the internet of things, pp 141","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"key":"5951_CR11","doi-asserted-by":"crossref","unstructured":"Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R,\n                    Thota C (2017) A new architecture of internet of things and big data ecosystem\n                    for secured smart healthcare monitoring and alerting system. Futur Gener Comput\n                    Syst","DOI":"10.1016\/j.future.2017.10.045"},{"issue":"4","key":"5951_CR12","doi-asserted-by":"publisher","first-page":"4379","DOI":"10.1007\/s11042-017-5515-y","volume":"77","author":"G Manogaran","year":"2018","unstructured":"Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation\n                    system for heart disease diagnosis based on multiple kernel learning with\n                    adaptive neuro-fuzzy inference system. Multimedia Tools and Applications\n                    77(4):4379\u20134399","journal-title":"Multimedia Tools and Applications"},{"key":"5951_CR13","doi-asserted-by":"crossref","unstructured":"Priyan MK, Devi GU (2017) Energy efficient node selection algorithm\n                    based on node performance index and random waypoint mobility model in internet\n                    of vehicles. Clust Comput:1\u201315","DOI":"10.1007\/s10586-017-0998-x"},{"key":"5951_CR14","doi-asserted-by":"crossref","unstructured":"Priyan MK, Nath CG, Balan EV, Prabha KR, Jeyanthi R (2015) Desktop\n                    phishing attack detection and elimination using TSO program. In Smart\n                    Technologies and Management for Computing, Communication, Controls, Energy and\n                    Materials (ICSTM), 2015 International Conference on. IEEE, pp\n                    198\u2013201","DOI":"10.1109\/ICSTM.2015.7225413"},{"key":"5951_CR15","unstructured":"Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N\n                    Secure disintegration protocol for privacy preserving cloud storage. Wirel Pers\n                    Commun:1\u201317"},{"key":"5951_CR16","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017)\n                    Wearable sensor devices for early detection of Alzheimer disease using dynamic\n                    time warping algorithm. Clust Comput:1\u201310","DOI":"10.1007\/s10586-017-0977-2"},{"key":"5951_CR17","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK, Bala\u015f VE, Barna C (2017)\n                    Visual analysis of geospatial habitat suitability model based on inverse\n                    distance weighting with paired comparison analysis. Multimedia Tools and\n                    Applications:1\u201321","DOI":"10.1007\/s11042-017-4768-9"},{"key":"5951_CR18","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK (2017) A big data\n                    classification approach using LDA with an enhanced SVM method for ECG signals in\n                    cloud computing. Multimedia Tools and Applications:1\u201321","DOI":"10.1007\/s11042-017-5318-1"}],"updated-by":[{"DOI":"10.1007\/s11042-021-11211-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000}},{"DOI":"10.1007\/s11042-024-19539-4","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:00:00Z","timestamp":1717459200000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5951-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-018-5951-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5951-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T06:07:30Z","timestamp":1717481250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-018-5951-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,16]]},"references-count":18,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["5951"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5951-3","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-021-11211-5","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,16]]},"assertion":[{"value":"26 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-021-11211-5","URL":"https:\/\/doi.org\/10.1007\/s11042-021-11211-5","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2024","order":9,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":10,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":11,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-19539-4","URL":"https:\/\/doi.org\/10.1007\/s11042-024-19539-4","order":12,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}