{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:01:20Z","timestamp":1759536080265,"version":"build-2065373602"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20656-x","type":"journal-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T03:20:25Z","timestamp":1744773625000},"page":"42593-42626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a smarter education system: an investigation into ML and DL for information retrieval"],"prefix":"10.1007","volume":"84","author":[{"given":"Subhabrata","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Satyajit","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"issue":"1","key":"20656_CR1","first-page":"5023011","volume":"20232","author":"G Tsaramirsis","year":"2022","unstructured":"Tsaramirsis G, Kantaros A, Al-Darraji I, Piromalis D, Apostolopoulos C, Pavlopoulou A, Alrammal M et al (2022) A modern approach towards an industry 4.0 model: From driving technologies to management. J Sensors 20232(1):5023011","journal-title":"J Sensors"},{"key":"20656_CR2","doi-asserted-by":"publisher","first-page":"134746","DOI":"10.1016\/j.jclepro.2022.134746","volume":"379","author":"D Xin","year":"2022","unstructured":"Xin D, Ahmad M, Khattak SI (2022) Impact of innovation in climate change mitigation technologies related to chemical industry on carbon dioxide emissions in the United States. J Cleaner Prod 379:134746","journal-title":"J Cleaner Prod"},{"key":"20656_CR3","doi-asserted-by":"crossref","unstructured":"Kulkarni Vinayak N, Gaitonde VN, Kotturshettar BB (2022) Product lifecycle management (PLM): A key enabler in implementation of industry 4.0. Handbook of smart materials, technologies, and devices: applications of industry 4.0, 349","DOI":"10.1007\/978-3-030-84205-5_14"},{"issue":"16","key":"20656_CR4","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1080\/09537287.2021.1882690","volume":"33","author":"P Helo","year":"2022","unstructured":"Helo P, Hao Y (2022) Artificial intelligence in operations management and supply chain management: an exploratory case study. Prod Plan Control 33(16):1573\u20131590","journal-title":"Prod Plan Control"},{"key":"20656_CR5","first-page":"102383","volume":"60","author":"C Collins","year":"2021","unstructured":"Collins C, Dennehy D, Conboy K, Mikalef P (2021) Artificial intelligence in information systems research: a systematic literature review and research agenda. Int J Inf Manage 60:102383","journal-title":"Int J Inf Manage"},{"key":"20656_CR6","doi-asserted-by":"publisher","unstructured":"Mishra S, Tyagi AK (2022) The role of machine learning techniques in internet of things-based cloud applications. Artificial intelligence-based internet of things systems, 105-135. https:\/\/doi.org\/10.1007\/978-3-030-87059-1_4.","DOI":"10.1007\/978-3-030-87059-1_4"},{"key":"20656_CR7","doi-asserted-by":"crossref","unstructured":"Ezer N, Bruni S, Cai Y, Hepenstal SJ, Miller CA, Schmorrow DD (2019) Trust engineering for human-AI teams. In Proceedings of the human factors and ergonomics society annual meeting\u00a0(Vol. 63, No. 1, pp. 322-326). Sage CA: Los Angeles, CA: SAGE Publications","DOI":"10.1177\/1071181319631264"},{"key":"20656_CR8","doi-asserted-by":"crossref","unstructured":"Pramod A, Naicker HS, Tyagi AK (2021) Machine learning and deep learning: open issues and future research directions for the next 10 years. Computational analysis and deep learning for medical care: principles, methods, and applications, 463-490","DOI":"10.1002\/9781119785750.ch18"},{"issue":"5","key":"20656_CR9","doi-asserted-by":"publisher","first-page":"e295","DOI":"10.1002\/spy2.295","volume":"6","author":"IH Sarker","year":"2023","unstructured":"Sarker IH (2023) Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: a comprehensive overview. Sec Privacy 6(5):e295","journal-title":"Sec Privacy"},{"key":"20656_CR10","doi-asserted-by":"publisher","unstructured":"Yablonsky, S. (2022). AI-Driven innovation: towards a conceptual framework. In artificial intelligence and innovation management (pp. 97-116). https:\/\/doi.org\/10.1142\/9781800611337_0006","DOI":"10.1142\/9781800611337_0006"},{"key":"20656_CR11","doi-asserted-by":"publisher","unstructured":"Usmani UA, Happonen A, Watada J (2022) Enhancing artificial intelligence control mechanisms: current practices, real life applications and future views. In proceedings of the future technologies conference\u00a0(pp. 287-306). Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-031-18461-1_19","DOI":"10.1007\/978-3-031-18461-1_19"},{"key":"20656_CR12","doi-asserted-by":"crossref","unstructured":"Akinsola JET, Adeagbo MA, Oladapo KA, Akinsehinde SA, Onipede FO (2022) Artificial intelligence emergence in disruptive technology. In Computational intelligence and data sciences\u00a0(pp. 63-90). CRC Press.","DOI":"10.1201\/9781003224068-4"},{"key":"20656_CR13","doi-asserted-by":"crossref","unstructured":"Shukla P, Aluvalu R, Gite S, Maheswari U (Eds.) (2023) Computer vision: applications of visual AI and image processing\u00a0(Vol. 15). Walter de Gruyter GmbH & Co KG","DOI":"10.1515\/9783110756722"},{"issue":"9","key":"20656_CR14","doi-asserted-by":"publisher","first-page":"6493","DOI":"10.1002\/int.22852","volume":"37","author":"I Ahmed","year":"2022","unstructured":"Ahmed I, Zhang Y, Jeon G, Lin W, Khosravi MR, Qi L (2022) A blockchain-and artificial intelligence-enabled smart IoT framework for sustainable city. Int J Intell Syst 37(9):6493\u20136507","journal-title":"Int J Intell Syst"},{"issue":"3","key":"20656_CR15","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/s42979-021-00592-x","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Machine learning: algorithms, real-world applications and research directions. SN Comp Sci 2(3):160","journal-title":"SN Comp Sci"},{"issue":"4","key":"20656_CR16","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/JAS.2020.1003114","volume":"7","author":"M Ghahramani","year":"2020","unstructured":"Ghahramani M, Qiao Y, Zhou MC, O\u2019Hagan A, Sweeney J (2020) AI-based modeling and data-driven evaluation for smart manufacturing processes. IEEE\/CAA J Automatica Sinica 7(4):1026\u20131037","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"20656_CR17","first-page":"101021","volume":"29","author":"C Li","year":"2022","unstructured":"Li C, Chen Y, Shang Y (2022) A review of industrial big data for decision making in intelligent manufacturing. Eng Sci Technol Int J 29:101021","journal-title":"Eng Sci Technol Int J"},{"issue":"1","key":"20656_CR18","first-page":"232","volume":"17","author":"B \u015alusarczyk","year":"2018","unstructured":"\u015alusarczyk B (2018) Industry 4.0\u2013are we ready? Pol J Manage Stud 17(1):232\u2013248","journal-title":"Pol J Manage Stud"},{"issue":"3","key":"20656_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00592-x","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Machine learning: algorithms, real-world applications and research directions. SN Comput Sci 2(3):1\u201321","journal-title":"SN Comput Sci"},{"issue":"6","key":"20656_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00815-1","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput Sci 2(6):1\u201320","journal-title":"SN Comput Sci"},{"key":"20656_CR21","first-page":"21","volume":"20","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Comput Sci 20:21","journal-title":"SN Comput Sci"},{"key":"20656_CR22","first-page":"21","volume":"20","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 20:21","journal-title":"SN Comput Sci"},{"key":"20656_CR23","first-page":"1","volume":"20","author":"IH Sarker","year":"2019","unstructured":"Sarker IH, Colman A, Han J, Khan AI, Abushark YB, Salah K (2019) Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model. Mob Netw Appl 20:1\u201311","journal-title":"Mob Netw Appl"},{"issue":"5","key":"20656_CR24","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12(5):754","journal-title":"Symmetry"},{"issue":"3","key":"20656_CR25","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1093\/comjnl\/bxx082","volume":"61","author":"IH Sarker","year":"2018","unstructured":"Sarker IH, Colman A, Kabir MA, Han J (2018) Individualized time-series segmentation for mining mobile phone user behavior. Comput J 61(3):349\u2013368","journal-title":"Comput J"},{"key":"20656_CR26","first-page":"2762","volume":"10","author":"H Sarker Iqbal","year":"2020","unstructured":"Sarker Iqbal H, Kayes ASM (2020) Abc-ruleminer: user behavioral rule-based machine learning method for context-aware intelligent services. J NetwComput Appl 10:2762","journal-title":"J NetwComput Appl"},{"key":"20656_CR27","first-page":"20","volume":"20","author":"J Blumenstock","year":"2020","unstructured":"Blumenstock J (2020) Machine learning can help get covid-19 aid to those who need it most. Nature 20:20","journal-title":"Nature"},{"key":"20656_CR28","first-page":"393","volume":"100","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Cyberlearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 100:393","journal-title":"Internet Things"},{"issue":"1","key":"20656_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. J Big Data 7(1):1\u201329","journal-title":"J Big Data"},{"key":"20656_CR30","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.future.2020.01.031","volume":"106","author":"S Saharan","year":"2020","unstructured":"Saharan S, Kumar N, Bawa S (2020) An efficient smart parking pricing system for smart city environment: a machine-learning based approach. Future GenerComput Syst 106:622\u2013640","journal-title":"Future GenerComput Syst"},{"issue":"4","key":"20656_CR31","first-page":"2709","volume":"53","author":"A Da\u2019u","year":"2020","unstructured":"Da\u2019u A, Salim N (2020) Recommendation system based on deep learning methods: a systematic review and new directions. ArtifIntell Rev 53(4):2709\u201348","journal-title":"ArtifIntell Rev"},{"key":"20656_CR32","doi-asserted-by":"publisher","first-page":"106912","DOI":"10.1016\/j.asoc.2020.106912","volume":"98","author":"MF Aslan","year":"2021","unstructured":"Aslan MF, Unlersen MF, Sabanci K, Durdu A (2021) Cnn-based transfer learning-bilstm network: a novel approach for covid-19 infection detection. Appl Soft Comput 98:106912","journal-title":"Appl Soft Comput"},{"key":"20656_CR33","doi-asserted-by":"publisher","first-page":"100412","DOI":"10.1016\/j.imu.2020.100412","volume":"20","author":"MZ Islam","year":"2020","unstructured":"Islam MZ, Islam MM, Asraf A (2020) A combined deep cnn-lstm network for the detection of novel coronavirus (covid-19) using x-ray images. Inform Med Unlocked 20:100412","journal-title":"Inform Med Unlocked"},{"key":"20656_CR34","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2018.04.092","volume":"460","author":"J-Y Kim","year":"2018","unstructured":"Kim J-Y, Seok-Jun B, Cho S-B (2018) Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf Sci 460:83\u2013102","journal-title":"Inf Sci"},{"key":"20656_CR35","first-page":"1","volume":"2","author":"J Anuradha","year":"2021","unstructured":"Anuradha J et al (2021) Big data based stock trend prediction using deep cnn with reinforcement-lstm model. Int J SystAssurEng Manage 2:1\u201311","journal-title":"Int J SystAssurEng Manage"},{"issue":"8","key":"20656_CR36","first-page":"3035","volume":"10","author":"W Wang","year":"2019","unstructured":"Wang W, Zhao M, Wang J (2019) Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J Ambient IntellHumanizComput 10(8):3035\u20133043","journal-title":"J Ambient IntellHumanizComput"},{"key":"20656_CR37","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.matpr.2020.05.450","volume":"34","author":"M Dhyani","year":"2021","unstructured":"Dhyani M, Kumar R (2021) An intelligent chatbot using deep learning with bidirectional rnn and attention model. Mater Today Proc 34:817\u2013824","journal-title":"Mater Today Proc"},{"key":"20656_CR38","first-page":"19","volume":"20","author":"B Ramzan","year":"2019","unstructured":"Ramzan B, Bajwa IS, Jamil N, Amin RU, Ramzan S, Mirza F, Sarwar N (2019) An intelligent data analysis for recommendation systems using machine learning. SciProgramm 20:19","journal-title":"SciProgramm"},{"key":"20656_CR39","doi-asserted-by":"publisher","unstructured":"Alazab A, Bevinakoppa S, Khraisat A (2018) Maximising competitive advantage on E-business websites: A data mining approach. In\u00a02018 IEEE conference on big data and analytics (ICBDA)\u00a0(pp. 111-116). IEEE, Langkawi, Malaysia, 21-22 November 2018. https:\/\/doi.org\/10.1109\/ICBDAA.2018.8629649","DOI":"10.1109\/ICBDAA.2018.8629649"},{"key":"20656_CR40","doi-asserted-by":"publisher","first-page":"19089","DOI":"10.1109\/ACCESS.2020.2966760","volume":"8","author":"N Afzaliseresht","year":"2020","unstructured":"Afzaliseresht N, Miao Y, Michalska S, Liu Q, Wang H (2020) From logs to stories: human-centred data mining for cyber threat intelligence. IEEE Access 8:19089\u201319099","journal-title":"IEEE Access"},{"key":"20656_CR41","doi-asserted-by":"crossref","unstructured":"Poort J, Shoeibi Omrani P, Vecchia AL, Visser G, Janzen M, Koenes J (2020) An automated diagnostic analytics workflow for the detection of production events-application to mature gas fields. In Abu Dhabi International Petroleum Exhibition and Conference\u00a0(p. D011S018R001). SPE","DOI":"10.2118\/202765-MS"},{"key":"20656_CR42","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.eswa.2018.02.022","volume":"102","author":"S Srinivas","year":"2018","unstructured":"Srinivas S, Ravindran AR (2018) Optimizing outpatient appointment system using machine learning algorithms and scheduling rules: a prescriptive analytics framework. Expert Syst Appl 102:245\u2013261","journal-title":"Expert Syst Appl"},{"key":"20656_CR43","volume-title":"Context-aware machine learning and mobile data analytics: automated rule-based services with intelligent decision-making","author":"IH Sarker","year":"2022","unstructured":"Sarker IH, Colman A, Han J, Watters P (2022) Context-aware machine learning and mobile data analytics: automated rule-based services with intelligent decision-making. Springer, Berlin"},{"issue":"1","key":"20656_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0211-6","volume":"6","author":"IH Sarker","year":"2019","unstructured":"Sarker IH, Colman A, Han J (2019) Recencyminer: mining recency-based personalized behavior from contextual smartphone data. J Big Data 6(1):1\u201321","journal-title":"J Big Data"},{"key":"20656_CR45","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.eswa.2018.07.010","volume":"113","author":"A Borah","year":"2018","unstructured":"Borah A, Nath B (2018) Identifying risk factors for adverse diseases using dynamic rare association rule mining. Expert Syst Appl 113:233\u2013263","journal-title":"Expert Syst Appl"},{"issue":"3","key":"20656_CR46","doi-asserted-by":"publisher","first-page":"6991","DOI":"10.1007\/s10586-018-2053-y","volume":"22","author":"J Bhavithra","year":"2019","unstructured":"Bhavithra J, Saradha A (2019) Personalized web page recommendation using case-based clustering and weighted association rule mining. Cluster Comput 22(3):6991\u20137002","journal-title":"Cluster Comput"},{"key":"20656_CR47","doi-asserted-by":"publisher","first-page":"105125","DOI":"10.1016\/j.ssci.2020.105125","volume":"135","author":"X Ruihua","year":"2021","unstructured":"Ruihua X, Luo F (2021) Risk prediction and early warning for air traffic controllers\u2019 unsafe acts using association rule mining and random forest. Saf Sci 135:105125","journal-title":"Saf Sci"},{"key":"20656_CR48","doi-asserted-by":"publisher","first-page":"119902","DOI":"10.1016\/j.jclepro.2019.119902","volume":"252","author":"RS Krishnan","year":"2020","unstructured":"Krishnan RS, Julie EG, Robinson YH, Raja S, Kumar R, Thong PH et al (2020) Fuzzy logic based smart irrigation system using internet of things. J Clean Prod 252:119902","journal-title":"J Clean Prod"},{"key":"20656_CR49","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.eswa.2017.09.013","volume":"92","author":"AH Hamamoto","year":"2018","unstructured":"Hamamoto AH, Carvalho LF, Sampaio LDH, Abr\u00e3o T, Proen\u00e7a ML Jr (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390\u2013402","journal-title":"Expert Syst Appl"},{"issue":"4","key":"20656_CR50","first-page":"4343","volume":"38","author":"X Kang","year":"2020","unstructured":"Kang X, Porter CS, Bohemia E (2020) Using the fuzzy weighted association rule mining approach to develop a customer satisfaction product form. J Intell Fuzzy Syst 38(4):4343\u20134357","journal-title":"J Intell Fuzzy Syst"},{"key":"20656_CR51","first-page":"1","volume":"20","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Hoque MM, Uddin MK, Alsanoosy T (2020) Mobile data science and intelligent apps: concepts, AI-based modeling and research directions. Mobile Netw Appl 20:1\u201319","journal-title":"Mobile Netw Appl"},{"key":"20656_CR52","doi-asserted-by":"crossref","unstructured":"Chukkapalli SSL, Aziz SB, Alotaibi N, Mittal S, Gupta M, Abdelsalam M (2021) Ontology driven ai and access control systems for smart fisheries. In\u00a0Proceedings of the 2021 ACM workshop on secure and trustworthy cyber-physical systems\u00a0(pp. 59-68)","DOI":"10.1145\/3445969.3450429"},{"issue":"15","key":"20656_CR53","doi-asserted-by":"publisher","first-page":"e4554","DOI":"10.1002\/dac.4554","volume":"33","author":"GM Kiran","year":"2020","unstructured":"Kiran GM, Nalini N (2020) Enhanced security-aware technique and ontology data access control in cloud computing. Int J Commun Syst 33(15):e4554","journal-title":"Int J Commun Syst"},{"issue":"6","key":"20656_CR54","doi-asserted-by":"publisher","first-page":"103334","DOI":"10.1016\/j.im.2020.103334","volume":"57","author":"R Syed","year":"2020","unstructured":"Syed R (2020) Cybersecurity vulnerability management: a conceptual ontology and cyber intelligence alert system. Inform Manage 57(6):103334","journal-title":"Inform Manage"},{"issue":"04","key":"20656_CR55","first-page":"315","volume":"9","author":"AM Talib","year":"2018","unstructured":"Talib AM, Alomary FO, Alwadi HF, Albusayli RR et al (2018) Ontology-based cyber security policy implementation in Saudi Arabia. J InfSecur 9(04):315","journal-title":"J InfSecur"},{"issue":"10","key":"20656_CR56","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.3390\/sym13101975","volume":"13","author":"IH Sarker","year":"2021","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F (2021) Mobile expert system: exploring context-aware machine learning rules for personalized decision-making in mobile applications. Symmetry 13(10):1975","journal-title":"Symmetry"},{"key":"20656_CR57","first-page":"42","volume":"94","author":"J-B Lamy","year":"2019","unstructured":"Lamy J-B, Sekar B, Guezennec G, Bouaud J, S\u00e9roussi B (2019) Explainable artificial intelligence for breast cancer: a visual case-based reasoning approach. ArtifIntell Med 94:42\u201353","journal-title":"ArtifIntell Med"},{"issue":"3","key":"20656_CR58","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3390\/s18030865","volume":"18","author":"A Gonz\u00e1lez-Briones","year":"2018","unstructured":"Gonz\u00e1lez-Briones A, Prieto J, De La Prieta F, Herrera-Viedma E, Corchado JM (2018) Energy optimization using a case-based reasoning strategy. Sensors 18(3):865","journal-title":"Sensors"},{"key":"20656_CR59","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.asoc.2018.11.017","volume":"75","author":"MR Khosravani","year":"2019","unstructured":"Khosravani MR, Nasiri S, Weinberg K (2019) Application of case-based reasoning in a fault detection system on production of drippers. Appl Soft Comput 75:227\u2013232","journal-title":"Appl Soft Comput"},{"key":"20656_CR60","doi-asserted-by":"publisher","first-page":"106180","DOI":"10.1016\/j.asoc.2020.106180","volume":"90","author":"DC Corrales","year":"2020","unstructured":"Corrales DC, Ledezma A, Corrales JC (2020) A case-based reasoning system for recommendation of data cleaning algorithms in classification and regression tasks. Appl Soft Comput 90:106180","journal-title":"Appl Soft Comput"},{"key":"20656_CR61","doi-asserted-by":"publisher","first-page":"14630","DOI":"10.1109\/ACCESS.2019.2963702","volume":"8","author":"HT Phan","year":"2020","unstructured":"Phan HT, Tran VC, Nguyen NT, Hwang D (2020) Improving the performance of sentiment analysis of tweets containing fuzzy sentiment using the feature ensemble model. IEEE Access 8:14630\u201314641","journal-title":"IEEE Access"},{"issue":"23","key":"20656_CR62","doi-asserted-by":"publisher","first-page":"e5909","DOI":"10.1002\/cpe.5909","volume":"33","author":"A Onan","year":"2021","unstructured":"Onan A (2021) Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks. Concurr Comput Pract Exp 33(23):e5909","journal-title":"Concurr Comput Pract Exp"},{"key":"20656_CR63","doi-asserted-by":"crossref","unstructured":"Subramaniyaswamy V, Logesh R, Abejith M, Umasankar S, Umamakeswari A (2020) Sentiment analysis of tweets for estimating criticality and security of events. In improving the safety and efficiency of emergency services: emerging tools and technologies for first responders\u00a0(pp. 293-319). IGI global","DOI":"10.4018\/978-1-7998-2535-7.ch013"},{"issue":"1","key":"20656_CR64","first-page":"7068349","volume":"2018","author":"A Voulodimos","year":"2018","unstructured":"Voulodimos A, Doulamis N, Doulamis A, Protopapadakis E (2018) Deep learning for computer vision: a brief review. Comput Intell Neurosci 2018(1):7068349","journal-title":"Comput Intell Neurosci"},{"issue":"4","key":"20656_CR65","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/JBHI.2021.3094311","volume":"26","author":"R Elakkiya","year":"2021","unstructured":"Elakkiya R, Subramaniyaswamy V, Vijayakumar V, Mahanti A (2021) Cervical cancer diagnostics healthcare system using hybrid object detection adversarial networks. IEEE J Biomed Health Inform 26(4):1464\u20131471","journal-title":"IEEE J Biomed Health Inform"},{"key":"20656_CR66","doi-asserted-by":"publisher","first-page":"114966","DOI":"10.1109\/ACCESS.2019.2936320","volume":"7","author":"F Harrou","year":"2019","unstructured":"Harrou F, Zerrouki N, Sun Y, Houacine A (2019) An integrated vision-based approach for efficient human fall detection in a home environment. IEEE Access 7:114966\u2013114974","journal-title":"IEEE Access"},{"key":"20656_CR67","doi-asserted-by":"publisher","first-page":"32767","DOI":"10.1109\/ACCESS.2020.2973856","volume":"8","author":"M Pan","year":"2020","unstructured":"Pan M, Liu Y, Jiayi Cao Yu, Li CL, Chen C-H (2020) Visual recognition based on deep learning for navigation mark classification. IEEE Access 8:32767\u201375","journal-title":"IEEE Access"},{"issue":"2","key":"20656_CR68","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1177\/0165551519828627","volume":"46","author":"M Emadi","year":"2020","unstructured":"Emadi M, Rahgozar M (2020) Twitter sentiment analysis using fuzzy integral classifier fusion. J Inf Sci 46(2):226\u2013242","journal-title":"J Inf Sci"},{"issue":"10","key":"20656_CR69","doi-asserted-by":"publisher","first-page":"10248","DOI":"10.1109\/TIE.2020.3026285","volume":"68","author":"B Gu","year":"2020","unstructured":"Gu B, Ge R, Chen Y, Luo L, Coatrieux G (2020) Automatic and robust object detection in x-ray baggage inspection using deep convolutional neural networks. IEEE Trans Ind Electron 68(10):10248\u201310257","journal-title":"IEEE Trans Ind Electron"},{"issue":"13","key":"20656_CR70","doi-asserted-by":"publisher","first-page":"3570","DOI":"10.3390\/su11133570","volume":"11","author":"W Hong","year":"2019","unstructured":"Hong W, Zheng C, Wu L, Pu X (2019) Analyzing the relationship between consumer satisfaction and fresh e-commerce logistics service using text mining techniques. Sustainability 11(13):3570","journal-title":"Sustainability"},{"key":"20656_CR71","unstructured":"Russell S, Norvig P (2021) Artificial intelligence: a modern approach, global edition 4th. Foundations 19, 23"},{"key":"20656_CR72","first-page":"100156","volume":"6","author":"JO Onah","year":"2021","unstructured":"Onah JO, Abdullahi M, Hassan IH, Al-Ghusham A et al (2021) Genetic algorithm based feature selection and na\u00efve bayes for anomaly detection in fog computing environment. Mach Learn Appl 6:100156","journal-title":"Mach Learn Appl"},{"key":"20656_CR73","doi-asserted-by":"publisher","unstructured":"Fatima A, Maurya R, Dutta MK, Burget R, Masek J (2019) Android malware detection using genetic algorithm based optimized feature selection and machine learning. In 2019 42nd International conference on telecommunications and signal processing (TSP)\u00a0(pp. 220-223). IEEE, Budapest, Hungary, 01-03 July 2019. https:\/\/doi.org\/10.1109\/TSP.2019.8769039","DOI":"10.1109\/TSP.2019.8769039"},{"key":"20656_CR74","doi-asserted-by":"publisher","first-page":"93998","DOI":"10.1109\/ACCESS.2019.2928364","volume":"7","author":"THS Li","year":"2019","unstructured":"Li THS, Kuo PH, Tsai TN, Luan PC (2019) Cnn and lstm based facial expression analysis model for a humanoid robot. IEEE Access 7:93998\u201394011","journal-title":"IEEE Access"},{"key":"20656_CR75","doi-asserted-by":"publisher","unstructured":"Ale L, Sheta A, Li L, Wang Y, Zhang N (2019) Deep learning based plant disease detection for smart agriculture. In 2019 IEEE Globecom Workshops (GC Wkshps)\u00a0(pp. 1-6). IEEE, Waikoloa, HI, USA, 09-13 December 2019. https:\/\/doi.org\/10.1109\/GCWkshps45667.2019.9024439","DOI":"10.1109\/GCWkshps45667.2019.9024439"},{"issue":"3","key":"20656_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3412842","volume":"21","author":"F Piccialli","year":"2021","unstructured":"Piccialli F, Giampaolo F, Prezioso E, Crisci D, Cuomo S (2021) Predictive analytics for smart parking: a deep learning approach in forecasting of iot data. ACM Trans Internet Technol 21(3):1\u201321","journal-title":"ACM Trans Internet Technol"},{"key":"20656_CR77","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-54419-9_4","volume-title":"Modernizing academic teaching and research in business and economics","author":"M Hamed","year":"2017","unstructured":"Hamed M, Mahmoud T, G\u00f3mez JM, Kfouri G (2017) Using data mining and business intelligence to develop decision support systems in Arabic higher education institutions. Modernizing academic teaching and research in business and economics. Springer, Berlin, pp 71\u201384"},{"key":"20656_CR78","doi-asserted-by":"crossref","unstructured":"Shukla P, Aluvalu R, Gite S, Maheswari U (Eds.) (2023) Computer vision: applications of visual AI and image processing\u00a0(Vol. 15). Walter de Gruyter GmbH & Co KG","DOI":"10.1515\/9783110756722"},{"issue":"9","key":"20656_CR79","doi-asserted-by":"publisher","first-page":"6493","DOI":"10.1002\/int.22852","volume":"37","author":"I Ahmed","year":"2022","unstructured":"Ahmed I, Zhang Y, Jeon G, Lin W, Khosravi MR, Qi L (2022) A blockchain-and artificial intelligence-enabled smart IoT framework for sustainable city. Int J Intell Syst 37(9):6493\u20136507","journal-title":"Int J Intell Syst"},{"key":"20656_CR80","doi-asserted-by":"publisher","unstructured":"Hodonu-Wusu JO (2024) The rise of artificial intelligence in libraries: the ethical and equitable methodologies, and prospects for empowering library users. AI and Ethics 1\u201311. https:\/\/doi.org\/10.1007\/s43681-024-00432-7","DOI":"10.1007\/s43681-024-00432-7"},{"key":"20656_CR81","doi-asserted-by":"publisher","unstructured":"Li J, Hai Y, Yin S (2024) A survey of artificial intelligence for industrial detection. Annals Data Sci 1\u201329. https:\/\/doi.org\/10.1007\/s40745-024-00545-0","DOI":"10.1007\/s40745-024-00545-0"},{"issue":"2","key":"20656_CR82","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s42979-022-01043-x","volume":"3","author":"IH Sarker","year":"2022","unstructured":"Sarker IH (2022) AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comp Sci 3(2):158","journal-title":"SN Comp Sci"},{"issue":"1","key":"20656_CR83","doi-asserted-by":"publisher","first-page":"88891","DOI":"10.5500\/wjt.v14.i1.88891","volume":"14","author":"G Chongo","year":"2024","unstructured":"Chongo G, Soldera J (2024) Use of machine learning models for the prognostication of liver transplantation: a systematic review. World J Trans 14(1):88891. https:\/\/doi.org\/10.5500\/wjt.v14.i1.88891","journal-title":"World J Trans"},{"key":"20656_CR84","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cogsys.2018.04.011","volume":"53","author":"V Bevilacqua","year":"2019","unstructured":"Bevilacqua V, Brunetti A, Guerriero A, Trotta GF, Telegrafo M, Moschetta M (2019) A performance comparison between shallow and deeper neural networks supervised classification of tomosynthesis breast lesions images. Cogn Syst Res 53:3\u201319","journal-title":"Cogn Syst Res"},{"issue":"2","key":"20656_CR85","doi-asserted-by":"publisher","first-page":"117","DOI":"10.33258\/birex.v3i2.1810","volume":"3","author":"J Jaja","year":"2021","unstructured":"Jaja J, Priatna N, Ardan TS (2021) Implementation of Data mining technique for performance of WFH and WFO agents using the K-means method case study study of PT. Infomedia telkom consumer profiling services. Budapest Int Res Exact Sci (BirEx) J 3(2):117\u2013125","journal-title":"Budapest Int Res Exact Sci (BirEx) J"},{"issue":"21","key":"20656_CR86","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.3390\/electronics10212725","volume":"10","author":"E Elbouchikhi","year":"2021","unstructured":"Elbouchikhi E, Zia MF, Benbouzid M, El Hani S (2021) Overview of signal processing and machine learning for smart grid condition monitoring. Electronics 10(21):2725","journal-title":"Electronics"},{"key":"20656_CR87","unstructured":"Fernandes-Salvador JA, Oanta GA, Olivert-Amado A, Goienetxea I, Ibaibarriaga L, Aranda M, Cuende de Francisco E et al (2022) Research for PECH Committee: Artificial Intelligence and the fisheries sector. European Parliament, Policy Department for Structural and Cohesion Policies"},{"key":"20656_CR88","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.trc.2013.02.014","volume":"31","author":"A Bouhana","year":"2013","unstructured":"Bouhana A, Fekih A, Abed M, Chabchoub H (2013) An integrated case-based reasoning approach for personalized itinerary search in multimodal transportation systems. Trans Res Part C: Emerging Technol 31:30\u201350","journal-title":"Trans Res Part C: Emerging Technol"},{"key":"20656_CR89","doi-asserted-by":"publisher","unstructured":"Ranjini AC, Sudhakar K, Krishna JSV, Jasmine V, Motamarri N (2022) Scientific understanding of learning through deep learning algorithms.\u00a0International J Early Childhood Special Educ 14(7). https:\/\/doi.org\/10.48047\/INTJECSE\/V14I7.151","DOI":"10.48047\/INTJECSE\/V14I7.151"},{"key":"20656_CR90","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.engappai.2017.07.027","volume":"65","author":"Pu Li","year":"2017","unstructured":"Li Pu, Xiao B, Ma W, Jiang Y, Zhang Z (2017) A graph-based semantic relatedness assessment method combining wikipedia features. Eng Appl Artif Intell 65:268\u2013281","journal-title":"Eng Appl Artif Intell"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20656-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20656-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20656-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:03:48Z","timestamp":1759449828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20656-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,16]]},"references-count":90,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20656"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20656-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,4,16]]},"assertion":[{"value":"17 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"Dear editorI have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}