{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T17:11:01Z","timestamp":1696785061985},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11276-023-03430-5","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T09:01:48Z","timestamp":1689584508000},"page":"3809-3828","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Community detection in network using chronological gorilla troops optimization algorithm with deep learning based weighted convexity"],"prefix":"10.1007","volume":"29","author":[{"given":"Peeyush","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Sundeep","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Chhimwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"issue":"4","key":"3430_CR1","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/TCSS.2018.2879494","volume":"5","author":"K Berahmand","year":"2018","unstructured":"Berahmand, K., Bouyer, A., & Vasighi, M. (2018). Community detection in complex networks by detecting and expanding core nodes through extended local similarity of nodes. IEEE Transactions on Computational Social Systems, 5(4), 1021\u20131033.","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"5","key":"3430_CR2","first-page":"1934","volume":"33","author":"D Zhuang","year":"2019","unstructured":"Zhuang, D., Chang, J. M., & Li, M. (2019). DynaMo: Dynamic community detection by incrementally maximizing modularity. IEEE Transactions on Knowledge and Data Engineering, 33(5), 1934\u20131945.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3430_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jnca.2018.02.011","volume":"108","author":"MA Javed","year":"2018","unstructured":"Javed, M. A., Younis, M. S., Latif, S., Qadir, J., & Baig, A. (2018). Community detection in networks: A multidisciplinary review. Journal of Network and Computer Applications, 108, 87\u2013111.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"3430_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00682-3","volume":"10","author":"SU Rehman","year":"2020","unstructured":"Rehman, S. U., & Asghar, S. (2020). Online social network trend discovery using frequent subgraph mining. Social Network Analysis and Mining, 10(1), 1\u201313.","journal-title":"Social Network Analysis and Mining"},{"issue":"17","key":"3430_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22176566","volume":"22","author":"K Dineva","year":"2022","unstructured":"Dineva, K., & Atanasova, T. (2022). Cloud data-driven intelligent monitoring system for interactive smart farming. Sensors, 22(17), 1\u201326.","journal-title":"Sensors"},{"issue":"2","key":"3430_CR6","first-page":"389","volume":"10","author":"V Venkataramanan","year":"2018","unstructured":"Venkataramanan, V., & Lakshmi, S. (2018). A case study of various wireless network simulation tools. International Journal of Communication Networks and Information Security, 10(2), 389\u2013396.","journal-title":"International Journal of Communication Networks and Information Security"},{"issue":"6","key":"3430_CR7","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TKDE.2019.2957755","volume":"33","author":"Q Xuan","year":"2019","unstructured":"Xuan, Q., Wang, J., Zhao, M., Yuan, J., Fu, C., Ruan, Z., & Chen, G. (2019). Subgraph networks with application to structural feature space expansion. IEEE Transactions on Knowledge and Data Engineering, 33(6), 2776\u20132789.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3430_CR8","doi-asserted-by":"crossref","unstructured":"Jazaeri, S.S., Taghdiri, E. (2022). Distributed edge computing in SDN-IoT network. Journal of Networking and Communication Systems, 5(2).","DOI":"10.46253\/jnacs.v5i2.a3"},{"key":"3430_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2016.09.002","volume":"659","author":"S Fortunato","year":"2016","unstructured":"Fortunato, S., & Hric, D. (2016). Community detection in networks: A user guide. Physics Reports, 659, 1\u201344.","journal-title":"Physics Reports"},{"key":"3430_CR10","doi-asserted-by":"crossref","unstructured":"Berahmand, K., Nasiri, E., Mohammadiani, R.P., Li, Y. (2021). Spectral clustering on protein-protein interaction networks via constructing affinity matrix using attributed graph embedding. Computers in Biology and Medicine, 138(1).","DOI":"10.1016\/j.compbiomed.2021.104933"},{"issue":"18","key":"3430_CR11","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.3390\/math9182294","volume":"9","author":"A Mester","year":"2021","unstructured":"Mester, A., Pop, A., Mursa, B. E. M., Grebl\u0103, H., Dio\u015fan, L., & Chira, C. (2021). Network analysis based on important node selection and community detection. Mathematics, 9(18), 2294.","journal-title":"Mathematics"},{"key":"3430_CR12","doi-asserted-by":"crossref","unstructured":"Sasidhar, K. (2022). Compressed sensing reconstruction approach using self adaptive butterfly optimization algorithm for bio-signals. Journal of Computational Mechanics, Power System and Control, 5(1).","DOI":"10.46253\/jcmps.v5i1.a4"},{"key":"3430_CR13","doi-asserted-by":"crossref","unstructured":"Aravinth J.S. (2022). Adaptive whale algorithm: Big data classification in IoT networks. Journal of Networking and Communication Systems, 5(2).","DOI":"10.46253\/jnacs.v5i2.a4"},{"issue":"6","key":"3430_CR14","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1109\/TKDE.2018.2852958","volume":"31","author":"C Tu","year":"2018","unstructured":"Tu, C., Zeng, X., Wang, H., Zhang, Z., Liu, Z., Sun, M., Zhang, B., & Lin, L. (2018). A unified framework for community detection and network representation learning. IEEE Transactions on Knowledge and Data Engineering, 31(6), 1051\u20131065.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"3430_CR15","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/s10489-019-01541-1","volume":"50","author":"K Guo","year":"2020","unstructured":"Guo, K., He, L., Chen, Y., Guo, W., & Zheng, J. (2020). A local community detection algorithm based on internal force between nodes. Applied Intelligence, 50(2), 328\u2013340.","journal-title":"Applied Intelligence"},{"key":"3430_CR16","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.eswa.2017.10.018","volume":"93","author":"A Zareie","year":"2018","unstructured":"Zareie, A., & Sheikhahmadi, A. (2018). A hierarchical approach for influential node ranking in complex social networks. Expert Systems with Applications, 93, 200\u2013211.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"3430_CR17","doi-asserted-by":"publisher","first-page":"1777","DOI":"10.1016\/j.physa.2011.09.017","volume":"391","author":"D Chen","year":"2012","unstructured":"Chen, D., L\u00fc, L., Shang, M. S., Zhang, Y. C., & Zhou, T. (2012). Identifying influential nodes in complex networks. Physica a: Statistical mechanics and its applications, 391(4), 1777\u20131787.","journal-title":"Physica a: Statistical mechanics and its applications"},{"key":"3430_CR18","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2019.05.059","volume":"135","author":"S Srinivas","year":"2019","unstructured":"Srinivas, S., & Rajendran, C. (2019). Community detection and influential node identification in complex networks using mathematical programming. Expert Systems with Applications, 135, 296\u2013312.","journal-title":"Expert Systems with Applications"},{"key":"3430_CR19","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.future.2019.12.022","volume":"105","author":"T Ma","year":"2020","unstructured":"Ma, T., Liu, Q., Cao, J., Tian, Y., Al-Dhelaan, A., & Al-Rodhaan, M. (2020). LGIEM: Global and local node influence based community detection. Future Generation Computer Systems, 105, 533\u2013546.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"3430_CR20","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TCSS.2019.2912801","volume":"6","author":"J Chen","year":"2019","unstructured":"Chen, J., Chen, L., Chen, Y., Zhao, M., Yu, S., Xuan, Q., & Yang, X. (2019). GA-based Q-attack on community detection. IEEE Transactions on Computational Social Systems, 6(3), 491\u2013503.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"3430_CR21","doi-asserted-by":"publisher","first-page":"8265","DOI":"10.1007\/s12652-020-02561-3","volume":"12","author":"F Jazayeri","year":"2021","unstructured":"Jazayeri, F., Shahidinejad, A., & Ghobaei-Arani, M. (2021). Autonomous computation offloading and auto-scaling the in the mobile fog computing: A deep reinforcement learning-based approach. Journal of Ambient Intelligence and Humanized Computing, 12, 8265\u20138284.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR22","doi-asserted-by":"publisher","first-page":"4579","DOI":"10.1007\/s12652-021-03137-5","volume":"13","author":"TS Alemayehu","year":"2022","unstructured":"Alemayehu, T. S., Kim, J.-H., & Cho, W.-D. (2022). Optimal replacement model for the physical component of safety critical smart-world CPSs. Journal of Ambient Intelligence and Humanized Computing, 13, 4579\u20134590.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR23","doi-asserted-by":"publisher","first-page":"10197","DOI":"10.1007\/s12652-020-02787-1","volume":"12","author":"R Jayavadivel","year":"2021","unstructured":"Jayavadivel, R., & Prabaharan, P. (2021). Investigation on automated surveillance monitoring for human identification and recognition using face and iris biometric. Journal of Ambient Intelligence and Humanized Computing, 12, 10197\u201310208.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR24","doi-asserted-by":"crossref","unstructured":"Srivastava, A.K., Kumar, S., & Zareapoor, M. (2018). Self-organized design of virtual reality simulator for identification and optimization of healthcare software components. Journal of Ambient Intelligence and Humanized Computing.","DOI":"10.1007\/s12652-018-1100-0"},{"key":"3430_CR25","doi-asserted-by":"crossref","unstructured":"Usharani, R., & Shanthini, A. (2021). Neuropathic complications: type II diabetes mellitus and other risky parameters using machine learning algorithms. Journal of Ambient Intelligence and Humanized Computing.","DOI":"10.1007\/s12652-021-02972-w"},{"key":"3430_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Y.-C. (2018). Prediction of engine failure time using principal component analysis, categorical regression tree, and back propagation network. Journal of Ambient Intelligence and Humanized Computing","DOI":"10.1007\/s12652-018-0997-7"},{"key":"3430_CR27","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s12652-013-0182-y","volume":"4","author":"AR Di Fazio","year":"2013","unstructured":"Di Fazio, A. R., Erseghe, T., Ghiani, E., Murroni, M., Siano, P., & Silvestro, F. (2013). Integration of renewable energy sources, energy storage systems, and electrical vehicles with smart power distribution networks. Journal of Ambient Intelligence and Humanized Computing, 4, 663\u2013671.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR28","doi-asserted-by":"publisher","first-page":"10009","DOI":"10.1007\/s12652-020-02752-y","volume":"12","author":"D Elavarasan","year":"2021","unstructured":"Elavarasan, D., & Durai Raj, P. M. (2021). A reinforced random forest model for enhanced crop yield prediction by integrating agrarian parameters. Journal of Ambient Intelligence and Humanized Computing, 12, 10009\u201310022.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"3430_CR29","doi-asserted-by":"publisher","first-page":"3177","DOI":"10.1007\/s12652-020-02476-z","volume":"12","author":"P Dhavakumar","year":"2021","unstructured":"Dhavakumar, P., & Gopalan, N. P. (2021). An efficient parameter optimization of software reliability growth model by using chaotic grey wolf optimization algorithm. Journal of Ambient Intelligence and Humanized Computing, 12(2), 3177\u20133188.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR30","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s12652-021-03372-w","volume":"14","author":"L Abualigah","year":"2023","unstructured":"Abualigah, L., Diabat, A., & Elaziz, M. A. (2023). Improved slime mould algorithm by opposition-based learning and Levy flight distribution for global optimization and advances in real-world engineering problems. Journal of Ambient Intelligence and Humanized Computing, 14, 1163\u20131202.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR31","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s11277-022-09645-7","volume":"125","author":"HA Malhat","year":"2022","unstructured":"Malhat, H. A., Zainud-Deen, A. S., Rihan, M., & Badway, M. M. (2022). Elements failure detection and radiation pattern correction for time-modulated linear antenna arrays using particle swarm optimization. Wireless Personal Communications, 125, 2055\u20132073.","journal-title":"Wireless Personal Communications"},{"key":"3430_CR32","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s11277-017-4540-5","volume":"97","author":"NS Grewal","year":"2017","unstructured":"Grewal, N. S., Rattan, M., & Patterh, M. S. (2017). A non-uniform circular antenna array failure correction using firefly algorithm. Wireless Personal Communications, 97, 845\u2013858.","journal-title":"Wireless Personal Communications"},{"issue":"145","key":"3430_CR33","doi-asserted-by":"publisher","first-page":"20180422","DOI":"10.1098\/rsif.2018.0422","volume":"15","author":"L \u0160ubelj","year":"2018","unstructured":"\u0160ubelj, L. (2018). Convex skeletons of complex networks. Journal of The Royal Society Interface, 15(145), 20180422.","journal-title":"Journal of The Royal Society Interface"},{"issue":"1","key":"3430_CR34","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.joi.2018.11.005","volume":"13","author":"L \u0160ubelj","year":"2019","unstructured":"\u0160ubelj, L., Fiala, D., Ciglari\u010d, T., & Kronegger, L. (2019). Convexity in scientific collaboration networks. Journal of Informetrics, 13(1), 10\u201331.","journal-title":"Journal of Informetrics"},{"key":"3430_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.121084","volume":"527","author":"M Mohammadi","year":"2019","unstructured":"Mohammadi, M., Moradi, P., & Jalili, M. (2019). SCE: Subspace-based core expansion method for community detection in complex networks. Physica A: Statistical Mechanics and its Applications, 527, 121084.","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"3430_CR36","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.socnet.2017.11.004","volume":"54","author":"S Ahajjam","year":"2018","unstructured":"Ahajjam, S., El Haddad, M., & Badir, H. (2018). A new scalable leader-community detection approach for community detection in social networks. Social Networks, 54, 41\u201349.","journal-title":"Social Networks"},{"issue":"9","key":"3430_CR37","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TKDE.2018.2866424","volume":"31","author":"M Lu","year":"2018","unstructured":"Lu, M., Zhang, Z., Qu, Z., & Kang, Y. (2018). LPANNI: Overlapping community detection using label propagation in large-scale complex networks. IEEE Transactions on Knowledge and Data Engineering, 31(9), 1736\u20131749.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"11","key":"3430_CR38","doi-asserted-by":"publisher","first-page":"4889","DOI":"10.1007\/s12652-020-01760-2","volume":"11","author":"HA Beni","year":"2020","unstructured":"Beni, H. A., & Bouyer, A. (2020). TI-SC: Top-k influential nodes selection based on community detection and scoring criteria in social networks. Journal of Ambient Intelligence and Humanized Computing, 11(11), 4889\u20134908.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3430_CR39","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Sun, X., Guo, Y., Li, S., Zhang, Y., & Wang, Y. (2022). An improved gorilla troops optimizer based on lens opposition-based learning and adaptive 13-hill climbing for global optimization. CMES-Computer Modeling in Engineering & Sciences.","DOI":"10.32604\/cmes.2022.019198"},{"issue":"1","key":"3430_CR40","doi-asserted-by":"publisher","first-page":"204","DOI":"10.3390\/s19010204","volume":"19","author":"C Li","year":"2019","unstructured":"Li, C., Wang, Y., Zhang, X., Gao, H., Yang, Y., & Wang, J. (2019). Deep belief network for spectral\u2013spatial classification of hyperspectral remote sensor data. Sensors, 19(1), 204.","journal-title":"Sensors"},{"key":"3430_CR41","unstructured":"Vojt, J. (2016). Deep neural networks and their implementation."},{"key":"3430_CR42","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","volume":"81","author":"B Selvakumar","year":"2019","unstructured":"Selvakumar, B., & Muneeswaran, K. (2019). Firefly algorithm based feature selection for network intrusion detection. Computers and Security, 81, 148\u2013155.","journal-title":"Computers and Security"},{"key":"3430_CR43","unstructured":"Enron email datasets available at \u201chttp:\/\/snap.stanford.edu\/data\/email-Enron.html\u201d, accessed on March 2022."},{"key":"3430_CR44","unstructured":"General Relativity and Quantum Cosmology collaboration network datasets available at \u201chttp:\/\/snap.stanford.edu\/data\/ca-GrQc.html\u201d, accessed on March 2022."},{"key":"3430_CR45","unstructured":"Condense Matter collaboration datasets available at \u201chttp:\/\/snap.stanford.edu\/data\/ca-CondMat.html\u201d, accessed on March 2022."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03430-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03430-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03430-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T09:18:27Z","timestamp":1696670307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03430-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":45,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["3430"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03430-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"19 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}