{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:08:42Z","timestamp":1768446522326,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12083-021-01177-4","type":"journal-article","created":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T07:02:38Z","timestamp":1622098958000},"page":"2209-2223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system"],"prefix":"10.1007","volume":"14","author":[{"given":"Ramaprabha","family":"Jayaram","sequence":"first","affiliation":[]},{"given":"S.","family":"Prabakaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,27]]},"reference":[{"key":"1177_CR1","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dcan.2017.07.001","volume":"4","author":"Y Ai","year":"2018","unstructured":"Ai Y, Peng M, Zhang K (2018) Edge computing technologies for internet of things: a primer. Digital Communications and Networks 4:77\u201386. https:\/\/doi.org\/10.1016\/j.dcan.2017.07.001","journal-title":"Digital Communications and Networks"},{"key":"1177_CR2","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s11277-020-07251-z","volume":"113","author":"R Geetha","year":"2020","unstructured":"Geetha R, Suntheya AK, Umarani Srikanth G (2020) Cloud integrated IoT enabled sensor network security: research issues and solutions. Wirel Pers Commun 113:747\u2013771. https:\/\/doi.org\/10.1007\/s11277-020-07251-z","journal-title":"Wirel Pers Commun"},{"issue":"5s","key":"1177_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3126501","volume":"16","author":"I Azimi","year":"2017","unstructured":"Iman Azimi, Arman Anzanpour, Amir M. Rahmani, Tapio Pahikkala, Marco Levorato, Pasi Liljeberg And Nikil Dutt, \"HiCH: hierarchical fog-assisted computing architecture for healthcare IoT\", ACM Trans Embed Comput Syst, Vol. 16, No. 5s, 2017, Article 174, pp. 1\u201322. https:\/\/doi.org\/10.1145\/3126501","journal-title":"ACM Trans Embed Comput Syst"},{"key":"1177_CR4","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.3390\/s18124307","volume":"18","author":"S Oueida","year":"2018","unstructured":"Oueida S, Kotb Y, Aloqaily M, Jararweh Y, Baker T (2018) An edge computing based smart healthcare framework for resource management. Sensors 18:4307. https:\/\/doi.org\/10.3390\/s18124307","journal-title":"Sensors"},{"key":"1177_CR5","doi-asserted-by":"publisher","unstructured":"Tshiamo Sigwele, Yim Fun Hu, Muhammad Ali, Jiachen Hou, Misfa Susanto and Helmy Fitriawan (2018) An intelligent edge computing based semantic gateway for healthcare systems interoperability and collaboration. IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, pp. 370\u2013376, https:\/\/doi.org\/10.1109\/FiCloud.2018.00060","DOI":"10.1109\/FiCloud.2018.00060"},{"key":"1177_CR6","doi-asserted-by":"publisher","first-page":"2861","DOI":"10.1007\/s10586-020-03051-z","volume":"23","author":"R Shrivastava","year":"2020","unstructured":"Shrivastava R, Pandey M (2020) Real time fall detection in fog computing scenario. Clust Comput 23:2861\u20132870. https:\/\/doi.org\/10.1007\/s10586-020-03051-z","journal-title":"Clust Comput"},{"key":"1177_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.future.2013.09.011","volume":"35","author":"D Thilakanathan","year":"2014","unstructured":"Thilakanathan D, Chen S, Nepal S, Calvo R, Alem L (2014) A platform for secure monitoring and sharing of generic health data in the Cloud. Futur Gener Comput Syst 35:102\u2013113. https:\/\/doi.org\/10.1016\/j.future.2013.09.011","journal-title":"Futur Gener Comput Syst"},{"key":"1177_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.jss.2015.08.041","volume":"110","author":"RW AamirHussain","year":"2015","unstructured":"AamirHussain RW, da Silva AL, Nadher M, Mudhish M (2015) Health and emergency-care platform for the elderly and disabled people in the Smart City. J Syst Softw 110:253\u2013263. https:\/\/doi.org\/10.1016\/j.jss.2015.08.041","journal-title":"J Syst Softw"},{"key":"1177_CR9","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ins.2019.01.051","volume":"527","author":"S Mang","year":"2019","unstructured":"Mang S, Zhou B, Fu A, Yu Y, Zhang G (2019) PRTA: a proxy re-encryption based trusted authorization scheme for nodes on CloudIoT. Inf Sci 527:533\u2013547. https:\/\/doi.org\/10.1016\/j.ins.2019.01.051","journal-title":"Inf Sci"},{"key":"1177_CR10","doi-asserted-by":"publisher","unstructured":"Luca Cerina, Sara Notargiacomo, Matteo Greco, Marco Domenico Santambrogio (2017) A fog-computing architecture for preventive healthcare and assisted living in smart ambients. IEEE 3rd International Forum on Research and Technologies for Society and Industry, Modena, pp. 1\u20136. https:\/\/doi.org\/10.1109\/RTSI.2017.8065939","DOI":"10.1109\/RTSI.2017.8065939"},{"key":"1177_CR11","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.adhoc.2014.07.028","volume":"25","author":"I Komnios","year":"2015","unstructured":"Komnios I, Tsapeli F, Gorinsky S (2015) Cost-effective multi-mode offloading with peer-assisted communications. Ad Hoc Netw 25:370\u2013382. https:\/\/doi.org\/10.1016\/j.adhoc.2014.07.028","journal-title":"Ad Hoc Netw"},{"key":"1177_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2019.02.001","volume":"94","author":"W Tang","year":"2019","unstructured":"Tang W, Zhao X, Rafique W, Qi L, Dou W, Ni Q (2019) An offloading method using decentralized P2P-enabled mobile edge servers in edge computing. J Syst Archit 94:1\u201313. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.001","journal-title":"J Syst Archit"},{"key":"1177_CR13","doi-asserted-by":"publisher","unstructured":"Houssemeddine Mazouzi, Nadjib Achir, Khaled Boussetta, \"DM2-ECOP: an efficient computation offloading policy for multi-user multi-cloudlet mobile edge computing environment\", ACM Trans Internet Technol, vol. 19, no. 2, Article 24, 2019, pp. 1\u201324. https:\/\/doi.org\/10.1145\/3241666","DOI":"10.1145\/3241666"},{"key":"1177_CR14","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.future.2019.01.014","volume":"96","author":"H Yan","year":"2019","unstructured":"Yan H, Zhang X, Chen H, Zhou Y, Bao W, Yang LT (2019) DEED: dynamic energy-efficient data offloading for IoT applications under unstable channel conditions. Futur Gener Comput Syst 96:425\u2013437. https:\/\/doi.org\/10.1016\/j.future.2019.01.014","journal-title":"Futur Gener Comput Syst"},{"key":"1177_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.pmcj.2013.10.005","volume":"10","author":"KK Rachuri","year":"2014","unstructured":"Rachuri KK, Efstratiou C, Leontiadis I, Mascolo C, Rentfrow PJ (2014) Smartphone sensing offloading for efficiently supporting social sensing applications. Pervasive and Mobile Computing 10:3\u201321. https:\/\/doi.org\/10.1016\/j.pmcj.2013.10.005","journal-title":"Pervasive and Mobile Computing"},{"key":"1177_CR16","doi-asserted-by":"publisher","unstructured":"Changsheng You and Kaibin Huang (2018) Energy-efficient peer-to-peer computation offloading based on non-causal CPU-state information. IEEE International Conference on Communications Workshops, Kansas City, MO, USA. https:\/\/doi.org\/10.1109\/ICCW.2018.8403705","DOI":"10.1109\/ICCW.2018.8403705"},{"key":"1177_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.comnet.2014.06.020","volume":"74","author":"CM Sarathchandr Magurawalage","year":"2014","unstructured":"Sarathchandr Magurawalage CM, Yang K, Hu L, Zhang J (2014) Energy-efficient and network-aware offloading algorithm for mobile cloud computing. Comput Netw 74:22\u201323. https:\/\/doi.org\/10.1016\/j.comnet.2014.06.020","journal-title":"Comput Netw"},{"key":"1177_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.comnet.2019.05.016","volume":"160","author":"A Rahman","year":"2019","unstructured":"Rahman A, Jin J, Rahman A, Cricenti A, Afrin M, Dong Y-n (2019) Energy-efficient optimal task offloading in cloud networked multi-robot systems. Comput Netw 160:11\u201332. https:\/\/doi.org\/10.1016\/j.comnet.2019.05.016","journal-title":"Comput Netw"},{"key":"1177_CR19","doi-asserted-by":"publisher","unstructured":"Yunzheng Tao, Changsheng You, Ping Zhang and Kaibin Huang (2018) Stochastic control of computation offloading to a dynamic helper, IEEE international conference on communications workshops, Kansas City, MO, USA. https:\/\/doi.org\/10.1109\/ICCW.2018.8403703","DOI":"10.1109\/ICCW.2018.8403703"},{"key":"1177_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2017.06.002","volume":"64","author":"L Chunlin","year":"2017","unstructured":"Chunlin L, Zhu L, Luo Y (2017) Location-aware interest-related micro-cloud topology construction and bacteria foraging-based offloading strategy. Ad Hoc Netw 64:1\u201321. https:\/\/doi.org\/10.1016\/j.adhoc.2017.06.002","journal-title":"Ad Hoc Netw"},{"key":"1177_CR21","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jpdc.2019.02.003","volume":"128","author":"F Zhang","year":"2019","unstructured":"Zhang F, Ge J, Wong C, Li C, Chen X, Zhang S, Luo B, He Z, Chang V (2019) Online learning offloading framework for heterogeneous mobile edge computing system. J Parallel Distributed Comput 128:167\u2013183. https:\/\/doi.org\/10.1016\/j.jpdc.2019.02.003","journal-title":"J Parallel Distributed Comput"},{"issue":"6","key":"1177_CR22","doi-asserted-by":"publisher","first-page":"Article 60","DOI":"10.1145\/3317572","volume":"10","author":"Z Ning","year":"2019","unstructured":"Ning Z, Dong P, Wang X, Rodrigues JJPC (2019) Deep reinforcement learning for vehicular edge computing: an intelligent offloading system. ACM Trans Intell Syst Technol 10(6):Article 60. https:\/\/doi.org\/10.1145\/3317572","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"8","key":"1177_CR23","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1109\/JPROC.2019.2922285","volume":"107","author":"L Lin","year":"2019","unstructured":"Lin L, Liao X, Jin H, Li P (2019) Computation offloading towards edge computing. Proc IEEE 107(8):1584\u20131607. https:\/\/doi.org\/10.1109\/JPROC.2019.2922285","journal-title":"Proc IEEE"},{"key":"1177_CR24","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1007\/s11276-019-02121-4","volume":"26","author":"A Hussain","year":"2020","unstructured":"Hussain A, Manikanthan SV, Padmapriya T, Nagalingam M (2020) Genetic algorithm based adaptive offloading for improving IoT device communication efficiency. Wirel Netw 26:2329\u20132338. https:\/\/doi.org\/10.1007\/s11276-019-02121-4","journal-title":"Wirel Netw"},{"issue":"4","key":"1177_CR25","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/TCC.2017.2713776","volume":"7","author":"H Haridas","year":"2019","unstructured":"Haridas H, Kailasam S, Dharanipragada J (2019) Cloudy knapsack algorithm for offloading tasks from large scale distributed applications. IEEE Trans Cloud Comput 7(4):949\u2013963. https:\/\/doi.org\/10.1109\/TCC.2017.2713776","journal-title":"IEEE Trans Cloud Comput"},{"key":"1177_CR26","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.adhoc.2018.07.019","volume":"81","author":"L Pescosolido","year":"2018","unstructured":"Pescosolido L, Conti M, Passarella A (2018) On the impact of the physical layer model on the performance of D2D-offloading in vehicular environments. Ad Hoc Netw 81:197\u2013210. https:\/\/doi.org\/10.1016\/j.adhoc.2018.07.019","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"1177_CR27","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/LCOMM.2014.2347272","volume":"18","author":"C Wang","year":"2014","unstructured":"Wang C, Li Y, Jin D (2014) Mobility-assisted opportunistic computation offloading. IEEE Commun Lett 18(10):1779\u20131782. https:\/\/doi.org\/10.1109\/LCOMM.2014.2347272","journal-title":"IEEE Commun Lett"},{"key":"1177_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-017-1095-0","volume":"22","author":"J Zhang","year":"2018","unstructured":"Zhang J, Zhou Z, Li S, Gan L, Zhang X, Qi L, Xu X, Dou W (2018) Hybrid computation offloading for smart home automation in mobile cloud computing. Pers Ubiquit Comput 22:121\u2013134. https:\/\/doi.org\/10.1007\/s00779-017-1095-0","journal-title":"Pers Ubiquit Comput"},{"key":"1177_CR29","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.pmcj.2016.09.014","volume":"36","author":"H Flores","year":"2017","unstructured":"Flores H, Sharma R, Ferreira D, Kostakos V, Manner J, Tarkoma S, Pan H, Li Y (2017) Social-aware hybrid mobile offloading. Pervasive and Mobile Computing 36:25\u201343. https:\/\/doi.org\/10.1016\/j.pmcj.2016.09.014","journal-title":"Pervasive and Mobile Computing"},{"key":"1177_CR30","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jcss.2017.03.001","volume":"90","author":"A Alabdulatif","year":"2017","unstructured":"Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with a lightweight homomorphic approach. J Comput Syst Sci 90:28\u201345. https:\/\/doi.org\/10.1016\/j.jcss.2017.03.001","journal-title":"J Comput Syst Sci"},{"key":"1177_CR31","doi-asserted-by":"publisher","unstructured":"Ma M, He D, Fan S, Feng D (2020) Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. 50:Article 102429. https:\/\/doi.org\/10.1016\/j.jisa.2019.102429","DOI":"10.1016\/j.jisa.2019.102429"},{"key":"1177_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2020.03.004","volume":"142","author":"Z Wang","year":"2020","unstructured":"Wang Z, Luo N, Pan Z (2020) GuardHealth: Blockchain empowered secure data management and Graph Convolutional Network enabled anomaly detection in smart healthcare. Journal of Parallel and Distributed Computing 142:1\u201312. https:\/\/doi.org\/10.1016\/j.jpdc.2020.03.004","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1177_CR33","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jpdc.2019.10.008","volume":"137","author":"A Alabdulatifa","year":"2020","unstructured":"Alabdulatifa A, Khalilb I, Yi X (2020) Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing 137:192\u2013204. https:\/\/doi.org\/10.1016\/j.jpdc.2019.10.008","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1177_CR34","doi-asserted-by":"publisher","first-page":"Article 102502","DOI":"10.1016\/j.jisa.2020.102502","volume":"52","author":"Z Ali","year":"2020","unstructured":"Ali Z, Ghani A, Khan I, Chaudhry SA, Hafizul Islam SK, Giri D (2020) A robust authentication and access control protocol for securing wireless healthcare sensor networks. J Inform Secur Appl 52:Article 102502. https:\/\/doi.org\/10.1016\/j.jisa.2020.102502","journal-title":"J Inform Secur Appl"},{"key":"1177_CR35","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.eswa.2012.07.014","volume":"40","author":"H-L Chen","year":"2013","unstructured":"Chen H-L, Huang C-C, Yu X-G, Xu X, Sun X, Wang G, Wang S-J (2013) An efficient diagnosis system for detection of Parkinson\u2019s disease using fuzzy k-nearest neighbor approach. Expert Syst Appl 40:263\u2013271. https:\/\/doi.org\/10.1016\/j.eswa.2012.07.014","journal-title":"Expert Syst Appl"},{"key":"1177_CR36","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1007\/s10916-011-9815-x","volume":"36","author":"D-Y Liu","year":"2012","unstructured":"Liu D-Y, Chen H-L, Yang B, Lv X-E, Li L-N, Liu J (2012) Design of an enhanced fuzzy k-nearest neighbor classifier based computer aided diagnostic system for thyroid disease. J Med Syst 36:3243\u20133254. https:\/\/doi.org\/10.1007\/s10916-011-9815-x","journal-title":"J Med Syst"},{"key":"1177_CR37","doi-asserted-by":"publisher","first-page":"2857","DOI":"10.1007\/s13369-013-0934-1","volume":"39","author":"K Srinivas","year":"2014","unstructured":"Srinivas K, Raghavendra Rao G, Govardhan A (2014) Rough-fuzzy classifier: a system to predict the heart disease by blending two different set theories. Arab J Sci Eng 39:2857\u20132868. https:\/\/doi.org\/10.1007\/s13369-013-0934-1","journal-title":"Arab J Sci Eng"},{"key":"1177_CR38","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.ins.2019.01.026","volume":"482","author":"Z Geng","year":"2019","unstructured":"Geng Z, Meng Q, Bai J, Chen J, Han Y, Wei Q, Ouyang Z (2019) A model-free Bayesian classifier. Inf Sci 482:171\u2013188. https:\/\/doi.org\/10.1016\/j.ins.2019.01.026","journal-title":"Inf Sci"},{"key":"1177_CR39","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2017.03.015","volume":"126","author":"D Mena","year":"2017","unstructured":"Mena D, Quevedo JR, Montanes E, del Coz JJ (2017) A heuristic in A* for inference in nonlinear. Probabilistic Classifier Chains 126:78\u201390. https:\/\/doi.org\/10.1016\/j.knosys.2017.03.015","journal-title":"Probabilistic Classifier Chains"},{"key":"1177_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.patrec.2017.01.022","volume":"89","author":"A Akbarnejad","year":"2017","unstructured":"Akbarnejad A, Baghshah MS (2017) A probabilistic multi-label classifier with missing and noisy labels handling capability. Pattern Recognition Letters 89:18\u201324. https:\/\/doi.org\/10.1016\/j.patrec.2017.01.022","journal-title":"Pattern Recognition Letters"},{"key":"1177_CR41","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.knosys.2008.06.005","volume":"22","author":"P Luukka","year":"2009","unstructured":"Luukka P (2009) Similarity classifier using similarities based on modified probabilistic equivalence relations. Knowl-Based Syst 22:57\u201362. https:\/\/doi.org\/10.1016\/j.knosys.2008.06.005","journal-title":"Knowl-Based Syst"},{"key":"1177_CR42","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.neucom.2018.07.102","volume":"396","author":"J de la Torre","year":"2020","unstructured":"de la Torre J, Valls A, Puig D (2020) A deep learning interpretable classifier for diabetic retinopathy disease grading. Neurocomputing 396:465\u2013476. https:\/\/doi.org\/10.1016\/j.neucom.2018.07.102","journal-title":"Neurocomputing"},{"key":"1177_CR43","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s10729-019-09498-w","volume":"23","author":"M Supriya","year":"2019","unstructured":"Supriya M, Deepa AJ (2019) A novel approach for breast cancer prediction using optimized ANN classifier based on big data environment. Health Care Management Science 23:414\u2013426. https:\/\/doi.org\/10.1007\/s10729-019-09498-w","journal-title":"Health Care Management Science"},{"key":"1177_CR44","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.comcom.2016.03.010","volume":"89","author":"LY Mano","year":"2016","unstructured":"Mano LY et al (2016) Exploiting IoT technologies for enhancing health smart homes through patient identification and emotion recognition. Comput Commun 89:178\u2013190. https:\/\/doi.org\/10.1016\/j.comcom.2016.03.010","journal-title":"Comput Commun"},{"key":"1177_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/214841","volume":"2014","author":"Y Sun","year":"2014","unstructured":"Sun Y, Wen Q, Zhang Y, Li W (2014, Article ID 214841) Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks. Computational and Mathematical Methods in Medicine 2014:1\u20139. https:\/\/doi.org\/10.1155\/2014\/214841","journal-title":"Computational and Mathematical Methods in Medicine"},{"key":"1177_CR46","doi-asserted-by":"publisher","unstructured":"Guo W, Shao J, Lu R, Liu Y, Ghorbani AA (2018) A privacy-preserving online medical prediagnosis scheme for cloud environment. 6:48946\u201348957. https:\/\/doi.org\/10.1109\/ACCESS.2018.2866971","DOI":"10.1109\/ACCESS.2018.2866971"},{"key":"1177_CR47","first-page":"1","volume":"6","author":"MA Little","year":"2007","unstructured":"Little MA, McSharry PE, Roberts SJ, Costello DAE, Moroz IM (2007) Exploiting nonlinear recurrence and fractal scaling properties for voice disorder detection. Bio Medical Engineering 6:1\u201319","journal-title":"Bio Medical Engineering"},{"key":"1177_CR48","unstructured":"Oxford Parkinson's Disease Detection Dataset (2008) Parkinsons Data Set, UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/datasets\/parkinsons."}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01177-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01177-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01177-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:28:50Z","timestamp":1624706930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01177-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1177"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01177-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,27]]},"assertion":[{"value":"25 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}