{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:41:10Z","timestamp":1649076070246},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T00:00:00Z","timestamp":1550448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11277-019-06152-0","type":"journal-article","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T17:19:14Z","timestamp":1550510354000},"page":"399-404","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cloud Networking Computing"],"prefix":"10.1007","volume":"105","author":[{"given":"Jonghun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hector John T.","family":"Manaligod","sequence":"additional","affiliation":[]},{"given":"Jieun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sunmoon","family":"Jo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,18]]},"reference":[{"key":"6152_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5955-3","author":"YS Jeong","year":"2018","unstructured":"Jeong, Y. S., & Shin, S. S. (2018). Probabilistic approach processing scheme based on BLAST for improving search speed of bioinformatics. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5955-3\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5740-3","author":"JW Kim","year":"2018","unstructured":"Kim, J. W., & Kim, S. K. (2018). Genetic algorithms for solving shortest path problem in maze-type network with precedence constraints. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5740-3\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5959-z","author":"JP Park","year":"2018","unstructured":"Park, J. P., Choo, Y. S., & Lee, J. H. (2018). A hybrid vulnerability analysis tool using a risk evaluation technique. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5959-z\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5947-3","author":"K Lim","year":"2018","unstructured":"Lim, K., Hooshyar, D., Ji, H., Lee, S., & Jo, J. (2018). SmartSenior: Automatic content personalization through semi-supervised learning. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5947-3\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5983-z","author":"JC Kim","year":"2018","unstructured":"Kim, J. C., & Chung, K. (2018). Mining based time-series sleeping pattern analysis for life big-data. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5983-z\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6082-x","author":"SJ Park","year":"2018","unstructured":"Park, S. J., Lim, S. K., & Park, S. M. (2018). High-speed remote power measurement by communication of the maximum and minimum measurement value. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-6082-x\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5949-1","author":"C Yi","year":"2018","unstructured":"Yi, C., Cho, J., & Suh, I. H. (2018). Semantic representation for communication between human and wireless robot. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5949-1\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5943-7","author":"HH Han","year":"2018","unstructured":"Han, H. H., Ryu, S. H., Chae, G. S., & Lee, S. H. (2018). Image retrieval using CBIR including light position analysis. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5943-7\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5970-4","author":"JK Lee","year":"2018","unstructured":"Lee, J. K., Lee, S. W., & Lee, K. H. (2018). An implementation of convergence security solution for overcoming of security vulnerabilities in industrial control communication network. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5970-4\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5742-1","author":"DY Kim","year":"2018","unstructured":"Kim, D. Y., & Kim, S. (2018). Data transmission using K-means clustering in low power wide area networks with mobile edge cloud. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5742-1\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5979-8","author":"K Chung","year":"2018","unstructured":"Chung, K., Yoo, H., Choe, D., & Jung, H. (2018). Blockchain network based topic mining process for cognitive manufacturing. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5979-8\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6083-9","author":"BW Jin","year":"2018","unstructured":"Jin, B. W., Park, J. O., & Mun, H. J. (2018). A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-6083-9\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5972-2","author":"H Ahn","year":"2018","unstructured":"Ahn, H., Lee, J. H., & Cho, H. J. (2018). Research of panoramic image generation using IoT device with camera for cloud computing environment. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5972-2\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5984-y","author":"S Cho","year":"2018","unstructured":"Cho, S., Kim, D., Kim, C., Jeong, K. Y., & Sohn, C. B. (2018). 360-degree video traffic reduction using cloud streaming in mobile. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5984-y\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5978-9","author":"J Kim","year":"2018","unstructured":"Kim, J., Jang, H., Kim, J. T., Pan, H. J., & Park, R. C. (2018). Big-data based real-time interactive growth management system in wireless communications. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5978-9\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5985-x","author":"KM Lee","year":"2018","unstructured":"Lee, K. M., Han, C. S., Nam Jun, J., Lee, J. H., & Lee, S. H. (2018). Batch-free Event sequence pattern mining for communication stream data with instant and persistent events. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5985-x\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"key":"6152_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5722-5","author":"JC Kim","year":"2018","unstructured":"Kim, J. C., & Chung, K. (2018). Associative feature information extraction using text mining from health big data. Wireless Personal Communications. \n                    https:\/\/doi.org\/10.1007\/s11277-018-5722-5\n                    \n                  .","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06152-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06152-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06152-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T15:57:21Z","timestamp":1582041441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06152-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,18]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["6152"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06152-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,18]]},"assertion":[{"value":"18 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}