{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:16:25Z","timestamp":1772025385968,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T00:00:00Z","timestamp":1516665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T00:00:00Z","timestamp":1516665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"General project of research on philosophy and social science of colleges and universities in Jiangsu","award":["2016SJD760060"],"award-info":[{"award-number":["2016SJD760060"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5248-x","type":"journal-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T12:15:21Z","timestamp":1516709721000},"page":"1949-1962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RETRACTED ARTICLE: Research on the Method of Music Content Analysis Based on Fuzzy Classification"],"prefix":"10.1007","volume":"102","author":[{"given":"Zhen","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiangyu","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,23]]},"reference":[{"issue":"1","key":"5248_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1186\/s12904-016-0122-7","volume":"15","author":"P Preissler","year":"2016","unstructured":"Preissler, P., Kordovan, S., Ullrich, A., et al. (2016). Favored subjects and psychosocial needs in music therapy in terminally ill cancer patients: A content analysis. BMC Palliative Care, 15(1), 48.","journal-title":"BMC Palliative Care"},{"issue":"2","key":"5248_CR2","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/14613808.2014.886675","volume":"17","author":"WL Brooks","year":"2015","unstructured":"Brooks, W. L. (2015). Music in infant-directed digital video discs: A content analysis. Music Education Research, 17(2), 141\u2013161.","journal-title":"Music Education Research"},{"issue":"1","key":"5248_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TAFFC.2015.2396531","volume":"6","author":"Y Baveye","year":"2015","unstructured":"Baveye, Y., Dellandrea, E., Chamaret, C., et al. (2015). Liris-accede: A video database for affective content analysis. IEEE Transactions on Affective Computing, 6(1), 43\u201355.","journal-title":"IEEE Transactions on Affective Computing"},{"issue":"1","key":"5248_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1177\/135945751402800102","volume":"28","author":"G Tsiris","year":"2014","unstructured":"Tsiris, G., Spiro, N., Pavlicevic, M., et al. (2014). What does the past tell us? A content analysis of the first quarter-century of the British Journal of Music Therapy. British Journal of Music Therapy, 28(1), 4\u201324.","journal-title":"British Journal of Music Therapy"},{"issue":"8","key":"5248_CR5","doi-asserted-by":"publisher","first-page":"3196","DOI":"10.1016\/j.eswa.2012.12.033","volume":"40","author":"P Melin","year":"2013","unstructured":"Melin, P., Olivas, F., Castillo, O., et al. (2013). Optimal design of fuzzy classification systems using PSO with dynamic parameter adaptation through fuzzy logic. Expert Systems with Applications, 40(8), 3196\u20133206.","journal-title":"Expert Systems with Applications"},{"issue":"5","key":"5248_CR6","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TSG.2014.2314738","volume":"5","author":"YH Lin","year":"2014","unstructured":"Lin, Y. H., & Tsai, M. S. (2014). Non-intrusive load monitoring by novel neuro-fuzzy classification considering uncertainties. IEEE Transactions on Smart Grid, 5(5), 2376\u20132384.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"1","key":"5248_CR7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1186\/1471-2202-14-56","volume":"14","author":"A Karagiannis","year":"2013","unstructured":"Karagiannis, A., Cauli, B., Battaglia, D., et al. (2013). Beyond the frontiers of neuronal types: fuzzy classification of interneurons. BMC neuroscience, 14(1), 56.","journal-title":"BMC neuroscience"},{"issue":"2","key":"5248_CR8","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/TII.2015.2399698","volume":"11","author":"F Luo","year":"2015","unstructured":"Luo, F., Dong, Z., Chen, G., et al. (2015). Advanced pattern discovery-based fuzzy classification method for power system dynamic security assessment. IEEE Transactions on Industrial Informatics, 11(2), 416\u2013426.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"5248_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.artmed.2013.12.006","volume":"60","author":"F Jim\u00e9nez","year":"2014","unstructured":"Jim\u00e9nez, F., S\u00e1nchez, G., Ju\u00e1rez, J. M., et al. (2014). Multi-objective evolutionary algorithms for fuzzy classification in survival prediction. Artificial Intelligence in Medicine, 60(3), 197\u2013219.","journal-title":"Artificial Intelligence in Medicine"},{"issue":"2","key":"5248_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1517\/17425255.2015.979786","volume":"11","author":"DJ Mastropietro","year":"2015","unstructured":"Mastropietro, D. J., & Omidian, H. (2015). Abuse-deterrent formulations: Part 1-development of a formulation-based classification system. Expert opinion on drug metabolism & toxicology, 11(2), 193\u2013204.","journal-title":"Expert opinion on drug metabolism & toxicology"},{"issue":"2","key":"5248_CR11","first-page":"17","volume":"9","author":"KN Sowmya","year":"2015","unstructured":"Sowmya, K. N., & Chennamma, H. R. (2015). A survey on video forgery detection. International Journal of Computer Engineering and Applications, 9(2), 17\u201327.","journal-title":"International Journal of Computer Engineering and Applications"},{"issue":"9","key":"5248_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ins.2015.08.040","volume":"328","author":"R Rigoni","year":"2016","unstructured":"Rigoni, R., Freitas, P. G., Farias, M. C., et al. (2016). Detecting tampering in audio-visual content using QIM watermarking. Information Sciences, 328(9), 127\u2013143.","journal-title":"Information Sciences"},{"issue":"3","key":"5248_CR13","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.1007\/s11277-016-3705-y","volume":"95","author":"S Xiao","year":"2017","unstructured":"Xiao, S., & Xu, Z. (2017). Reliable and energy efficient communication algorithm in hierarchical wireless sensor networks. Wireless Personal Communications, 95(3), 1891\u20131909.","journal-title":"Wireless Personal Communications"}],"updated-by":[{"DOI":"10.1007\/s11277-022-10135-z","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T00:00:00Z","timestamp":1670889600000},"record-id":"42529"},{"DOI":"10.1007\/s11277-022-10135-z","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T00:00:00Z","timestamp":1670889600000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-018-5248-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5248-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5248-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T14:18:45Z","timestamp":1673273925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-018-5248-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,23]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5248"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5248-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,23]]},"assertion":[{"value":"23 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-022-10135-z","URL":"https:\/\/doi.org\/10.1007\/s11277-022-10135-z","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}