{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T21:33:09Z","timestamp":1762896789367,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10054-w","type":"journal-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T02:03:31Z","timestamp":1604973811000},"page":"9393-9409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An investigation of the usability of image-based CAPTCHAs using PROMETHEE-GAIA method"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1957-566X","authenticated-orcid":false,"given":"Sanela","family":"Arsi\u0107","sequence":"first","affiliation":[]},{"given":"Djordje","family":"Nikolic","sequence":"additional","affiliation":[]},{"given":"Milena","family":"Jevtic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,10]]},"reference":[{"key":"10054_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.comnet.2019.04.018","volume":"157","author":"M Abdel-Basset","year":"2019","unstructured":"Abdel-Basset M (2019) A neutrosophic theory-based security approach for fog and mobile-edge computing. Comput Netw 157:122\u2013132","journal-title":"Comput Netw"},{"issue":"2","key":"10054_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s40092-018-0289-z","volume":"15","author":"L Abdullah","year":"2019","unstructured":"Abdullah L, Chan W, Afshari A (2019) Application of PROMETHEE method for green supplier selection: a comparative result based on preference functions. J Ind Eng Int 15(2):271\u2013285","journal-title":"J Ind Eng Int"},{"issue":"4","key":"10054_CR3","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1504\/IJAMS.2012.049926","volume":"4","author":"SR Agha","year":"2012","unstructured":"Agha SR, Nofal LG, Nassar HA (2012) Multi-criteria governmental crop planning problem based on an integrated AHP-PROMETHEE approach. Int J Appl Manag Sci 4(4):385\u2013406","journal-title":"Int J Appl Manag Sci"},{"issue":"10","key":"10054_CR4","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1002\/mawe.201800088","volume":"50","author":"A Aherwar","year":"2019","unstructured":"Aherwar A, Singh T, Singh A, Patnaik A, Fekete G (2019) Optimum selection of novel developed implant material using hybrid entropy-PROMETHEE approach. Mater Werkst 50(10):1232\u20131241","journal-title":"Mater Werkst"},{"key":"10054_CR5","doi-asserted-by":"publisher","first-page":"101635","DOI":"10.1016\/j.cose.2019.101635","volume":"88","author":"FH Alqahtani","year":"2020","unstructured":"Alqahtani FH, Alsulaiman FA (2020) Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. Comput Secur 88:101635","journal-title":"Comput Secur"},{"key":"10054_CR6","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.cose.2017.08.006","volume":"70","author":"SMRS Beheshti","year":"2017","unstructured":"Beheshti SMRS, Liatsis P, Rajarajan M (2017) A CAPTCHA model based on visual psychophysics: using the brain to distinguish between human users and automated computer bots. Comput Secur 70:596\u2013617","journal-title":"Comput Secur"},{"issue":"1","key":"10054_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.ejor.2009.01.021","volume":"200","author":"M Behzadian","year":"2010","unstructured":"Behzadian M, Kazemzadeh RB, Albadvi A, Aghdasi M (2010) PROMETHEE: a comprehensive literature review on methodologies and applications. Eur J Oper Res 200(1):198\u2013215","journal-title":"Eur J Oper Res"},{"key":"10054_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijhcs.2015.07.002","volume":"84","author":"M Belk","year":"2015","unstructured":"Belk M, Fidas C, Germanakos P, Samaras G (2015) Do human cognitive differences in information processing affect preference and performance of CAPTCHA? Int J Hum Comput Stud 84:1\u201318","journal-title":"Int J Hum Comput Stud"},{"key":"10054_CR9","doi-asserted-by":"crossref","unstructured":"Ben-Abdallah E, Boukadi K, Lloret J, Hammami M (2019) CROSA: context-aware cloud service ranking approach using online reviews based on sentiment analysis. Concurr Comput 1\u201316","DOI":"10.1002\/cpe.5358"},{"issue":"5","key":"10054_CR10","first-page":"856","volume":"8","author":"A Bennani","year":"2017","unstructured":"Bennani A, Bahi L, Amgaad S (2017) Using a combined approach AHP PROMETHEE to make a decision about roads alternative project: a case study. Int J Civ Eng Technol 8(5):856\u2013868","journal-title":"Int J Civ Eng Technol"},{"key":"10054_CR11","doi-asserted-by":"crossref","unstructured":"Brans J, Mareschal B (2005) PROMETHEE methods. Multiple Criteria Decision Analysis: State of the Art Surveys, pp 163\u2013186","DOI":"10.1007\/0-387-23081-5_5"},{"key":"10054_CR12","first-page":"183","volume-title":"Laide a la decision: nature, instruments et perspectives Davenir","author":"JP Brans","year":"1982","unstructured":"Brans JP (1982) Lingenierie de la decision, elaboration dinstruments daide a la decision. Methode PROMETHEE. In: Nadeau R, Landry M (eds) Laide a la decision: nature, instruments et perspectives Davenir. Presses de Universite Laval, Quebec, pp 183\u2013214"},{"key":"10054_CR13","first-page":"477","volume-title":"Operational research \u201884","author":"JP Brans","year":"1984","unstructured":"Brans JP, Mareschal B, Vincke PH (1984) PROMETHEE: a new family of outranking methods in multi-criteria analysis. In: Brans JP (ed) Operational research \u201884. North-Holland, Amsterdam, pp 477\u2013490"},{"key":"10054_CR14","doi-asserted-by":"crossref","unstructured":"Bursztein, E, Moscicki, A, Fabry, C, Bethard, S, Mitchell, JC, Jurafsky, D. (2014). Easy does it: more usable captchas. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, ACM, pp 2637\u201346","DOI":"10.1145\/2556288.2557322"},{"key":"10054_CR15","doi-asserted-by":"crossref","unstructured":"Bursztein E, Bethard S, Fabry C, Mitchell J, Jurafsky D (2010) How good are humans at solving captchas? A large scale evaluation. In: 2010 IEEE symposium on security and privacy, pp 399\u2013413","DOI":"10.1109\/SP.2010.31"},{"key":"10054_CR16","unstructured":"Chandavale AA, Sapkal AM (2015) Systematic approach to measure strength of textbased CAPTCHA. In: 2015 International Conference on Information Processing (ICIP), pp 382\u2013387"},{"issue":"12","key":"10054_CR17","doi-asserted-by":"publisher","first-page":"3129","DOI":"10.1016\/j.patcog.2009.03.013","volume":"42","author":"M Cheriet","year":"2009","unstructured":"Cheriet M, Bunke H, Hu J, Kimura F, Suen CY (2009) New Frontiers in handwriting recognition. Pattern Recogn 42(12):3129\u20133130","journal-title":"Pattern Recogn"},{"key":"10054_CR18","doi-asserted-by":"publisher","first-page":"238","DOI":"10.4236\/ojbm.2016.42025","volume":"4","author":"AV Christian","year":"2016","unstructured":"Christian AV, Zhang Y, Salifou C (2016) Application of PROMETHEE-GAIA method in the entry mode selection process in international market expansion. Open J Bus Manag 4:238\u2013250","journal-title":"Open J Bus Manag"},{"key":"10054_CR19","volume-title":"Degrt de specialisation des hopitaux de Quebec. Technical report","author":"G D\u2019Avignon","year":"1983","unstructured":"D\u2019Avignon G, Turcotte M, Beaudry L, Duperre Y (1983) Degrt de specialisation des hopitaux de Quebec. Technical report. Universite Laval, Quebec"},{"key":"10054_CR20","unstructured":"Dujardin M (1984) Une evaluation multicritere de projets de remediation a l'echec dans I' enseignement secondaire Belge. In XIX Meeting of the European Working Group on Multiple Criteria Decision Aid, Liege, France"},{"key":"10054_CR21","doi-asserted-by":"crossref","unstructured":"Fidas CA, Voyiatzis AG, Avouris NM (2011) On the necessity of user-friendly CAPTCHA. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp 2623\u20132626","DOI":"10.1145\/1978942.1979325"},{"key":"10054_CR22","doi-asserted-by":"crossref","unstructured":"Goswami G, Singh R, Vatsa M, Powell B, Noore A (2012) Face recognition captcha. In: Proceedings of the Fifth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), IEEE, pp 412\u201317","DOI":"10.1109\/BTAS.2012.6374608"},{"issue":"2","key":"10054_CR23","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.aca.2006.04.064","volume":"571","author":"L Herngren","year":"2006","unstructured":"Herngren L, Goonetilleke A, Ayoko GA (2006) Analysis of heavy metals in roaddeposited sediments. Anal Chim Acta 571(2):270\u2013278","journal-title":"Anal Chim Acta"},{"key":"10054_CR24","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/B978-0-12-385510-7.00003-5","volume":"83","author":"JMG Hidalgo","year":"2011","unstructured":"Hidalgo JMG, Alvarez G (2011) Chapter 3 - CAPTCHAs: an artificial intelligence application to web security. Adv Comput 83:109\u2013181","journal-title":"Adv Comput"},{"key":"10054_CR25","doi-asserted-by":"crossref","unstructured":"Karpathy A, Fei-Fei L (2015) Deep visual-semantic alignments for generating image descriptions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 3128\u20133137","DOI":"10.1109\/CVPR.2015.7298932"},{"key":"10054_CR26","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/0169-7439(91)80064-W","volume":"11","author":"HR Keller","year":"1991","unstructured":"Keller HR, Massart DL, Brans JP (1991) Multicriteria decision making: a case study. Chemom Intell Lab Syst 11:175\u2013189","journal-title":"Chemom Intell Lab Syst"},{"key":"10054_CR27","unstructured":"Kluever KA (2008) Evaluating the usability and security of a video CAPTCHA. Rochester Institute of Technology.\u00a0Thesis. Rochester Institute of Technology. Accessed from https:\/\/scholarworks.rit.edu\/theses\/163"},{"key":"10054_CR28","unstructured":"Kluever KA, Zanibbi R (2009) Balancing usability and security in a video CAPTCHA. In: Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, pp 11\u201314"},{"key":"10054_CR29","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-41151-9_5","volume":"413","author":"A Kocmanova","year":"2013","unstructured":"Kocmanova A, Docekalova M, Lunacek J (2013) PROMETHEE-GAIA method as a support of the decision-making process in evaluating technical facilities. IFIP Adv Inf Commun Technol 413:44\u201353","journal-title":"IFIP Adv Inf Commun Technol"},{"key":"10054_CR30","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.ipl.2017.07.009","volume":"128","author":"S Kwon","year":"2017","unstructured":"Kwon S, Cha S (2017) CAPTCHA-based image annotation. Inf Process Lett 128:27\u201331","journal-title":"Inf Process Lett"},{"issue":"2","key":"10054_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.displa.2010.12.004","volume":"32","author":"YL Lee","year":"2011","unstructured":"Lee YL, Hsu CH (2011) Usability study of text-based CAPTCHAs. Displays 32(2):81\u201386","journal-title":"Displays"},{"key":"10054_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.annals.2018.07.003","volume":"73","author":"APF Lopes","year":"2018","unstructured":"Lopes APF, Mu\u00f1oz MM, Alarc\u00f3n-Urbistondo P (2018) Regional tourism competitiveness using the PROMETHEE approach. Ann Tour Res 73:1\u201313","journal-title":"Ann Tour Res"},{"key":"10054_CR33","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/S0377-2217(03)00153-X","volume":"153","author":"C Macharis","year":"2004","unstructured":"Macharis C, Springael J, De Brucker K, Verbeke A (2004) PROMETHEE and AHP: the design of operational synergies in multicriteria analysis. Strengthening PROMETHEE with ideas of AHP. Eur J Oper Res 153:307\u2013317","journal-title":"Eur J Oper Res"},{"issue":"16","key":"10054_CR34","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1177\/154193121005401603","volume":"54","author":"KC Madathil","year":"2010","unstructured":"Madathil KC, Alapatt GF, Greenstein JS (2010) An investigation of the usability of image-based CAPTCHAs. Proc Hum Factors Ergon Soc Ann Meet 54(16):1249\u20131253","journal-title":"Proc Hum Factors Ergon Soc Ann Meet"},{"key":"10054_CR35","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ergon.2018.12.003","volume":"69","author":"KC Madathil","year":"2019","unstructured":"Madathil KC, Greenstein JS, Horan K (2019) Empirical studies to investigate the usability of text-and image-based CAPTCHAs. Int J Ind Ergon 69:200\u2013208","journal-title":"Int J Ind Ergon"},{"key":"10054_CR36","doi-asserted-by":"crossref","unstructured":"Meutzner H, Nguyen V-H, Holz T, Kolossa D (2014) Using automatic speech recognition for attacking acoustic captchas: the tradeoff between usability and security. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, pp 276\u201385","DOI":"10.1145\/2664243.2664262"},{"key":"10054_CR37","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.jenvman.2009.09.019","volume":"91","author":"D Nikoli\u0107","year":"2009","unstructured":"Nikoli\u0107 D, Jovanovi\u0107 I, Mihajlovi\u0107 I, \u017divkovi\u0107 \u017d (2009) Multi-criteria ranking of copper concentrates according to their quality \u2013 an element of environmental management in the vicinity of copper \u2013 smelting complex in Bor, Serbia. J Environ Manag 91:509\u2013515","journal-title":"J Environ Manag"},{"key":"10054_CR38","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.tmp.2019.02.013","volume":"30","author":"M Ostovare","year":"2019","unstructured":"Ostovare M, Shahraki MR (2019) Evaluation of hotel websites using the multicriteria analysis of PROMETHEE and GAIA: evidence from the five-star hotels of Mashhad. Tour Manag Perspect 30:107\u2013116","journal-title":"Tour Manag Perspect"},{"key":"10054_CR39","doi-asserted-by":"crossref","unstructured":"Pashalidis A, Mavrogiannopoulos N, Ferrer X, Bermejo Olaizola B (2012) For human eyes only: security and usability evaluation. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, ACM, pp 129\u201340","DOI":"10.1145\/2381966.2381984"},{"key":"10054_CR40","unstructured":"Penninger S, Meier S, Federrath H (2012) Usability von CAPTCHA-Systemen. In: GI Sicherheit, Darmstadt, 195:199\u2013208"},{"key":"10054_CR41","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.patcog.2018.04.012","volume":"81","author":"R Plamondon","year":"2018","unstructured":"Plamondon R, Pirlo G, Anquetil \u00c9, R\u00e9mi C, Teulings H-L, Nakagawa M (2018) Personal digital bodyguards for e-security, e-learning and e-health: a prospective survey. Pattern Recogn 81:633\u2013659","journal-title":"Pattern Recogn"},{"issue":"4","key":"10054_CR42","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1556\/032.2017.67.4.1","volume":"67","author":"M Radulescu","year":"2017","unstructured":"Radulescu M, Fedajev A, Nikolic D (2017) Ranking of EU national banking systems using multi-criteria analysis in the light of BREXIT. Acta Oeconomica 67(4):473\u2013509","journal-title":"Acta Oeconomica"},{"key":"10054_CR43","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.future.2014.11.004","volume":"55","author":"N Roshanbin","year":"2016","unstructured":"Roshanbin N, Miller J (2016) ADAMAS: interweaving unicode and color to enhance CAPTCHA security. Futur Gener Comput Syst 55:289\u2013310","journal-title":"Futur Gener Comput Syst"},{"key":"10054_CR44","volume-title":"The analytic Hieararchy process","author":"TL Saaty","year":"1980","unstructured":"Saaty TL (1980) The analytic Hieararchy process. McGraw-Hill, New York"},{"key":"10054_CR45","unstructured":"Sauer G, Hochheiser H (2008) Towards a universally usable CAPTCHA. In: Proceedings of the 4th symposium on usable privacy and security, pp 2\u20135"},{"issue":"4","key":"10054_CR46","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/08827508.2014.962135","volume":"36","author":"M Savic","year":"2015","unstructured":"Savic M, Nikolic D, Mihajlovic I, Zivkovic Z, Bojanov B, Djordjevic P (2015) Multi-criteria decision support system for optimal blending process in zinc production. Mineral Process Ext Metall Rev Int J 36(4):267\u2013280","journal-title":"Mineral Process Ext Metall Rev Int J"},{"key":"10054_CR47","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2016.03.007","volume":"60","author":"G Schryen","year":"2016","unstructured":"Schryen G, Wagner G, Schlegel A (2016) Development of two novel face-recognition CAPTCHAs: a security and usability study. Comput Secur 60:95\u2013116","journal-title":"Comput Secur"},{"key":"10054_CR48","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza S, Penn G, Balakrishnan R, Ganjali Y (2013) Seesay and hearsay captcha for mobile interaction. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM, pp 2147\u201356","DOI":"10.1145\/2470654.2481295"},{"issue":"4","key":"10054_CR49","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.patcog.2014.09.006","volume":"48","author":"O Starostenko","year":"2015","unstructured":"Starostenko O, Cruz-Perez C, Uceda-Ponga F, Alarcon-Aquino V (2015) Breaking text-based CAPTCHAs with variable word and character orientation. Pattern Recogn 48(4):1101\u20131112","journal-title":"Pattern Recogn"},{"issue":"12","key":"10054_CR50","doi-asserted-by":"publisher","first-page":"3365","DOI":"10.1016\/j.patcog.2008.12.018","volume":"42","author":"AO Thomas","year":"2009","unstructured":"Thomas AO, Rusu A, Govindaraju V (2009) Synthetic handwritten CAPTCHAs. Pattern Recogn 42(12):3365\u20133373","journal-title":"Pattern Recogn"},{"key":"10054_CR51","doi-asserted-by":"publisher","first-page":"102399","DOI":"10.1016\/j.ijhcs.2020.102399","volume":"138","author":"AK Trukenbrod","year":"2020","unstructured":"Trukenbrod AK, Backhaus N, Thomaschke R (2020) Measuring subjectively experienced time in usability and user experience testing scenarios. Int J Hum Comput Stud 138:102399","journal-title":"Int J Hum Comput Stud"},{"key":"10054_CR52","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1016\/j.wasman.2007.10.002","volume":"28","author":"G Vego","year":"2008","unstructured":"Vego G, Ku\u010dar-Dragi\u010devi\u0107 S, Koprivanac N (2008) Application of multi-criteria decision-making on strategic municipal solid waste management in Dalmatia, Croatia. Waste Manag 28:2192\u20132201","journal-title":"Waste Manag"},{"key":"10054_CR53","doi-asserted-by":"crossref","unstructured":"Vikram S, Fan Y, Gu G (2011) Semage: a new image-based two-factor CAPTCHA. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACM, pp 237\u2013246","DOI":"10.1145\/2076732.2076766"},{"key":"10054_CR54","doi-asserted-by":"crossref","unstructured":"von Ahn LV, Blum M, Hopper NJ, Langford J (2003) CAPTCHA: Using hard AI problems for security. EUROCRYPT'03: Proceedings of the 22nd international conference on theory and applications of cryptographic techniques, pp 294\u2013311. Accessed 13 Jan 2020","DOI":"10.1007\/3-540-39200-9_18"},{"issue":"6","key":"10054_CR55","first-page":"926","volume":"46","author":"JJ Wang","year":"2006","unstructured":"Wang JJ, Wei CM, Yang D (2006) Decision method for vendor selection based on AHP\/PROMETHEE\/GAIA. J Dalian Univ Technol 46(6):926\u2013931","journal-title":"J Dalian Univ Technol"},{"key":"10054_CR56","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2008a) Usability of CAPTCHAs or usability issues in CAPTCHA design. Symposium on usable privacy and security, Pittsburgh","DOI":"10.1145\/1408664.1408671"},{"key":"10054_CR57","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2008b) Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, USA, pp 44\u201352","DOI":"10.1145\/1408664.1408671"},{"key":"10054_CR58","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.procs.2013.05.058","volume":"17","author":"X Yu","year":"2013","unstructured":"Yu X, Xu Z, Ma Y (2013) Prioritized multi-criteria decision making based on the idea of PROMETHEE. Proc Comput Sci 17:449\u2013456","journal-title":"Proc Comput Sci"},{"key":"10054_CR59","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/S1001-0742(06)60032-6","volume":"18","author":"Z Zhi-Hong","year":"2006","unstructured":"Zhi-Hong Z, Yi Y, Jing-nan S (2006) Entropy method for determination of weight of evaluating indicators in fuzzy synthetic evaluation for water quality assessment. J Environ Sci 18:1020\u20131023","journal-title":"J Environ Sci"},{"key":"10054_CR60","unstructured":"Zindani D, Kumar K (2018) Material selection for turbine seal strips using PROMETHEE-GAIA method. Materials Today: Proceedings 5:17533\u201317539"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10054-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10054-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10054-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:48:40Z","timestamp":1614635320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10054-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,10]]},"references-count":60,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10054"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10054-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,10]]},"assertion":[{"value":"29 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}