{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:14:11Z","timestamp":1774127651536,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T00:00:00Z","timestamp":1522627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s12559-018-9543-3","type":"journal-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T02:01:02Z","timestamp":1522634462000},"page":"864-873","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":159,"title":["A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2037-8348","authenticated-orcid":false,"given":"Mufti","family":"Mahmud","sequence":"first","affiliation":[]},{"given":"M. Shamim","family":"Kaiser","sequence":"additional","affiliation":[]},{"given":"M. Mostafizur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"M. Arifur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Antesar","family":"Shabut","sequence":"additional","affiliation":[]},{"given":"Shamim","family":"Al-Mamun","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,2]]},"reference":[{"issue":"6","key":"9543_CR1","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TNNLS.2018.2790388","volume":"29","author":"Mufti Mahmud","year":"2018","unstructured":"Mahmud M, Kaiser MS, Hussain A, Vassanelli S. 2018. Applications of deep learning and reinforcement learning to Biological Data. IEEE Trans Neural Netw Learn Syst. 2018. https:\/\/doi.org\/10.1109\/TNNLS.2018.2790388 [Epub ahead of print].","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"9","key":"9543_CR2","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1038\/nrg2857","volume":"11","author":"EE Schadt","year":"2010","unstructured":"Schadt EE, Linderman MD, Sorenson J, Lee L, Nolan GP. Computational solutions to large-scale data management and analysis. Nat Rev Genet 2010;11(9):647\u2013657.","journal-title":"Nat Rev Genet"},{"issue":"2","key":"9543_CR3","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1002\/cpe.3281","volume":"27","author":"S Shahand","year":"2015","unstructured":"Shahand S, Benabdelkader A, Jaghoori MM, Mourabit Ma, Huguet J, Caan MWA, et al. A data-centric neuroscience gateway: design, implementation, and experiences. Concurr Computat: Pract Exper 2015; 27(2):489\u2013506.","journal-title":"Concurr Computat: Pract Exper"},{"key":"9543_CR4","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1038\/541559a","volume":"541","author":"E Landhuis","year":"2017","unstructured":"Landhuis E. Neuroscience: Big brain, big data. Nature. 2017;541:559\u2013561.","journal-title":"Nature."},{"issue":"1","key":"9543_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.2217\/bmm.10.121","volume":"5","author":"V Sakkalis","year":"2011","unstructured":"Sakkalis V. Applied strategies towards EEG\/MEG biomarker identification in clinical and cognitive research. Biomark Med 2011;5(1):93\u2013105.","journal-title":"Biomark Med"},{"issue":"6","key":"9543_CR6","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1038\/nrneurol.2016.51","volume":"12","author":"CT McMillan","year":"2016","unstructured":"McMillan CT. Neurodegenerative disease: MRI biomarkers \u2014 a precision medicine tool in neurology? Nat Rev Neurol 2016;12(6):323\u2013324.","journal-title":"Nat Rev Neurol"},{"issue":"3","key":"9543_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s40708-015-0019-x","volume":"2","author":"S Liu","year":"2015","unstructured":"Liu S, Cai W, Liu S, Zhang F, Fulham M, Feng D, et al. Multimodal neuroimaging computing: a review of the applications in neuropsychiatric disorders. Brain Inf 2015;2(3):167\u2013180.","journal-title":"Brain Inf"},{"key":"9543_CR8","doi-asserted-by":"publisher","first-page":"e2880","DOI":"10.7717\/peerj.2880","volume":"5","author":"R Al-jawahiri","year":"2017","unstructured":"Al-jawahiri R, Milne E. Resources available for autism research in the big data era: a systematic review. Peer J 2017;5:e2880.","journal-title":"Peer J"},{"issue":"5","key":"9543_CR9","first-page":"6","volume":"14","author":"AL Young","year":"2014","unstructured":"Young AL, Oxtoby NP, Schott JM, Alexander DC. Data-driven models of neurodegenerative disease. Adv Clin Neurosci Rehabil 2014;14(5):6\u20139.","journal-title":"Adv Clin Neurosci Rehabil"},{"issue":"6","key":"9543_CR10","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1016\/j.neuron.2014.08.045","volume":"83","author":"R Burns","year":"2014","unstructured":"Burns R, Vogelstein J, Szalay A. From cosmos to connectomes: the evolution of data-intensive science. Neuron 2014;83(6):1249\u20131252.","journal-title":"Neuron"},{"key":"9543_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.3389\/fninf.2014.00026","volume":"8","author":"M Mahmud","year":"2014","unstructured":"Mahmud M, Pulizzi R, Vasilaki E, Giugliano M. QSpike tools: a generic framework for parallel batch preprocessing of extracellular neuronal signals recorded by substrate microelectrode arrays. Front Neuroinform 2014; 8: 26. https:\/\/doi.org\/10.3389\/fninf.2014.00026 .","journal-title":"Front Neuroinform"},{"key":"9543_CR12","doi-asserted-by":"publisher","first-page":"248","DOI":"10.3389\/fnins.2016.00248","volume":"10","author":"M Mahmud","year":"2016","unstructured":"Mahmud M, Vassanelli S. Processing and analysis of multichannel extracellular neuronal signals: State-of-the-art and challenges. Front Neurosci 2016;10:248. https:\/\/doi.org\/10.3389\/fnins.2016.00248 .","journal-title":"Front Neurosci"},{"issue":"3","key":"9543_CR13","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.neuron.2016.10.033","volume":"92","author":"Neuro Cloud Consortium","year":"2016","unstructured":"Neuro Cloud Consortium. To the cloud! a grassroots proposal to accelerate brain science discovery. Neuron 2016; 92(3):622\u2013 627.","journal-title":"Neuron"},{"issue":"5","key":"9543_CR14","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s12559-016-9431-7","volume":"8","author":"B Luo","year":"2016","unstructured":"Luo B, Hussain A, Mahmud M, Tang J. Advances in brain-inspired cognitive systems. Cogn Comput 2016;8(5):795\u2013796.","journal-title":"Cogn Comput"},{"key":"9543_CR15","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Ullah Khan S. The rise of \u201cbig data\u201d on cloud computing: Review and open research issues. Inf Syst 2015;47:98\u2013115.","journal-title":"Inf Syst"},{"issue":"6","key":"9543_CR16","doi-asserted-by":"publisher","first-page":"397","DOI":"10.5405\/jmbe.923","volume":"32","author":"M Mahmud","year":"2012","unstructured":"Mahmud M, Travalin D, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. An automated classification method for single sweep local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. J Med Biol Eng 2012;32(6):397\u2013404.","journal-title":"J Med Biol Eng"},{"issue":"1","key":"9543_CR17","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jneumeth.2012.03.009","volume":"207","author":"M Mahmud","year":"2012","unstructured":"Mahmud M, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. SigMate: A Matlab-based automated tool for extracellular neuronal signal processing and analysis. J Neurosci Methods 2012;207(1):97\u2013112.","journal-title":"J Neurosci Methods"},{"issue":"5","key":"9543_CR18","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1007\/s12559-016-9399-3","volume":"8","author":"M Mahmud","year":"2016","unstructured":"Mahmud M, Cecchetto C, Vassanelli S. An automated method for characterization of evoked single-trial local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. Cogn Comput 2016;8(5): 935\u2013945.","journal-title":"Cogn Comput"},{"issue":"Sl-1","key":"9543_CR19","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1515\/bmt-2012-4412","volume":"57","author":"M Mahmud","year":"2012","unstructured":"Mahmud M, Rahman MM, Travalin D, Raif P, Hussain A. Service oriented architecture based web application model for collaborative biomedical signal analysis. Biomed Eng-Biomed Tech 2012;57(Sl-1):780\u2013783. https:\/\/doi.org\/10.1515\/bmt-2012-4412 .","journal-title":"Biomed Eng-Biomed Tech"},{"issue":"1","key":"9543_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88\u201395.","journal-title":"IEEE Syst J"},{"issue":"5","key":"9543_CR21","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1007\/s12559-016-9391-y","volume":"8","author":"A Ullah","year":"2016","unstructured":"Ullah A, Li J, Hussain A, Yang E. Towards a biologically inspired soft switching approach for cloud resource provisioning. Cogn Comput 2016;8(5):992\u20131005.","journal-title":"Cogn Comput"},{"issue":"10","key":"9543_CR22","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1109\/TMC.2014.2374154","volume":"14","author":"AM Shabut","year":"2015","unstructured":"Shabut AM, Dahal KP, Bista SK, Awan IU. Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 2015;14(10):2101\u20132115.","journal-title":"IEEE Trans Mob Comput"},{"key":"9543_CR23","doi-asserted-by":"crossref","unstructured":"Shabut AM, Dahal K. Social factors for data sparsity problem of trust models in MANETs. Proceedings of the ICNC; 2017. p. 876\u2013880.","DOI":"10.1109\/ICCNC.2017.7876247"},{"key":"9543_CR24","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.2298\/CSIS110303056C","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen D, Chang G, Sun D, Li J, Jia J, Wang X. TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 2011;8:1207\u20131228.","journal-title":"Comput Sci Inf Syst"},{"key":"9543_CR25","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1016\/j.procs.2013.06.165","volume":"19","author":"H Marzi","year":"2013","unstructured":"Marzi H, Li M. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput Sci 2013;19:1159\u20131166.","journal-title":"Procedia Comput Sci"},{"issue":"Part B","key":"9543_CR26","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"Y Ben Saied","year":"2013","unstructured":"Ben Saied Y, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput Secur 2013;39(Part B):351\u2013365.","journal-title":"Comput Secur"},{"key":"9543_CR27","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.future.2014.06.006","volume":"49","author":"G Dolera Tormo","year":"2015","unstructured":"Dolera Tormo G, Gomez Marmol F, Martinez Perez G. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Future Gener Comput Syst 2015;49:113\u2013124.","journal-title":"Future Gener Comput Syst"},{"key":"9543_CR28","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","volume":"59","author":"W Fang","year":"2016","unstructured":"Fang W, Zhang C, Shi Z, Zhao Q, Shan L. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks. J Netw Comput Appl 2016;59:88\u201394.","journal-title":"J Netw Comput Appl"},{"key":"9543_CR29","doi-asserted-by":"crossref","unstructured":"Ruan Y, Durresi A, Alfantoukh L. Trust management framework for internet of things. Proceedings of the AINA; 2016. p. 1013\u20131019.","DOI":"10.1109\/AINA.2016.136"},{"key":"9543_CR30","doi-asserted-by":"crossref","unstructured":"Chen IR, Guo J, Bao F, Cho JH. Integrated social and quality of service trust management of mobile groups in ad hoc networks. Proceedings of the ICICS; 2013. p. 1\u20135.","DOI":"10.1109\/ICICS.2013.6782950"},{"issue":"1","key":"9543_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88\u201395.","journal-title":"IEEE Syst J"},{"issue":"5","key":"9543_CR32","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1007\/s12559-016-9398-4","volume":"8","author":"MS Kaiser","year":"2016","unstructured":"Kaiser MS, Chowdhury ZI, Mamun SA, Hussain A, Mahmud M. A neuro-fuzzy control system based on feature extraction of surface electromyogram signal for solar-powered wheelchair. Cogn Comput 2016;8(5): 946\u2013954.","journal-title":"Cogn Comput"},{"key":"9543_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan Z, Zhang P, Vasilakos AV. A survey on trust management for Internet of Things. J Netw Comput Appl 2014;42:120\u2013134.","journal-title":"J Netw Comput Appl"},{"key":"9543_CR34","doi-asserted-by":"crossref","unstructured":"Afsana F, Jahan N, Sunny FA, Kaiser MS, Mamun SA. Trust and energy aware Cluster modeling and spectrum handoff for cognitive radio ad-hoc network. Proceedings of the ICEEICT; 2015. p. 1\u20136.","DOI":"10.1109\/ICEEICT.2015.7307489"},{"issue":"2","key":"9543_CR35","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1080\/00223980109603687","volume":"135","author":"ZX Zhang","year":"2001","unstructured":"Zhang ZX. The effects of frequency of social interaction and relationship closeness on reward allocation. J Psychol 2001;135(2):154\u2013164.","journal-title":"J Psychol"},{"issue":"2","key":"9543_CR36","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decis Support Syst 2007;43(2):618\u2013644.","journal-title":"Decis Support Syst"},{"issue":"1","key":"9543_CR37","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1504\/IJBG.2015.066098","volume":"14","author":"B Cherry","year":"2014","unstructured":"Cherry B. Entrepreneur as trust-builder: interaction frequency and relationship duration as moderators of the factors of perceived trustworthiness. Int J Bus Glob 2014;14(1):97\u2013121.","journal-title":"Int J Bus Glob"},{"issue":"5","key":"9543_CR38","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TMC.2008.161","volume":"8","author":"EM Daly","year":"2009","unstructured":"Daly EM, Haahr M. Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Trans Mob Comput 2009;8(5):606\u2013621.","journal-title":"IEEE Trans Mob Comput"},{"key":"9543_CR39","doi-asserted-by":"crossref","unstructured":"Momani M, Takruri M, Al-Hmouz R. Risk assessment algorithm in wireless sensor networks using beta distribution. CoRR 2014. arXiv: 1410.3041 .","DOI":"10.5121\/ijcnc.2014.6511"},{"key":"9543_CR40","doi-asserted-by":"crossref","unstructured":"Liu Y, Chitawa US, Guo G, Wang X, Tan Z, Wang S. A Reputation Model for Aggregating Ratings Based on Beta Distribution Function. Proceedings of the ICCSE; 2017. p. 77\u201381.","DOI":"10.1145\/3126973.3126992"},{"key":"9543_CR41","unstructured":"Josang A, Ismail R. The beta reputation system. Proceedings of the BLED; 2002. p. 324\u2013337."},{"issue":"1","key":"9543_CR42","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"SMC-15","author":"T Takagi","year":"1985","unstructured":"Takagi T, Sugeno M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man, Cybern 1985;SMC-15(1):116\u2013132.","journal-title":"IEEE Trans Syst Man, Cybern"},{"issue":"3","key":"9543_CR43","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TLT.2011.36","volume":"5","author":"A Al-Hmouz","year":"2012","unstructured":"Al-Hmouz A, Shen J, Al-Hmouz R, Yan J. Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning. IEEE Trans Learn Technol 2012;5(3):226\u2013237.","journal-title":"IEEE Trans Learn Technol"},{"key":"9543_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71760-9","volume-title":"Introduction to network simulator, Vol 2","author":"T Issariyakul","year":"2009","unstructured":"Issariyakul T, Hossain E. Introduction to network simulator, Vol 2. Boston: Springer; 2009."},{"issue":"3","key":"9543_CR45","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.jart.2015.07.003","volume":"13","author":"S Gopinath","year":"2015","unstructured":"Gopinath S, Nagarajan N. Energy based reliable multicast routing protocol for packet forwarding in MANET. J Appl Res Technol 2015;13(3):374\u2013381.","journal-title":"J Appl Res Technol"},{"key":"9543_CR46","doi-asserted-by":"crossref","unstructured":"Kaur R, Sharma N. Dynamic node recovery for improved throughput in MANET. Proceedings of the NGCT; 2015. p. 325\u2013330.","DOI":"10.1109\/NGCT.2015.7375135"},{"key":"9543_CR47","doi-asserted-by":"crossref","unstructured":"Gupta NK, Pandey K. Trust based Ad-hoc on Demand Routing protocol for MANET. Proceedings of the IC3; 2013. p. 225\u2013231.","DOI":"10.1109\/IC3.2013.6612195"},{"key":"9543_CR48","doi-asserted-by":"crossref","unstructured":"Talreja R, Sathish S, Nenwani K. Trust Variable Factor : A trust based method to detect misbehaving nodes in MANET. Proceedings of the ICEEOT; 2016. p. 3238\u20133241.","DOI":"10.1109\/ICEEOT.2016.7755302"},{"issue":"1","key":"9543_CR49","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1186\/s40064-016-2667-6","volume":"5","author":"G Dhananjayan","year":"2016","unstructured":"Dhananjayan G, Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springer Plus 2016;5 (1):995.","journal-title":"Springer Plus"},{"issue":"3","key":"9543_CR50","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eij.2014.08.001","volume":"15","author":"S Ghosh","year":"2014","unstructured":"Ghosh S, Biswas S, Sarkar D, Sarkar PP. A novel Neuro-fuzzy classification technique for data mining. Egypt Inform J 2014;15(3):129\u2013147.","journal-title":"Egypt Inform J"},{"key":"9543_CR51","first-page":"461","volume-title":"Communications in Computer and Information Science","author":"Qiong Gu","year":"2009","unstructured":"Gu Q, Zhu L, Cai Z. Computational Intelligence and Intelligent Systems. Evaluation measures of the classification performance of imbalanced data sets. Berlin: Springer; 2009. p. 461\u2013471."},{"issue":"2","key":"9543_CR52","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.12.013","volume":"197","author":"TR Andel","year":"2008","unstructured":"Andel TR, Yasinsac A. Adaptive threat modeling for secure Ad Hoc routing protocols. Electron Notes Theor Comput Sci 2008;197(2):3\u201314.","journal-title":"Electron Notes Theor Comput Sci"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12559-018-9543-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-018-9543-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-018-9543-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:59:30Z","timestamp":1719928770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12559-018-9543-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,2]]},"references-count":52,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["9543"],"URL":"https:\/\/doi.org\/10.1007\/s12559-018-9543-3","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,2]]},"assertion":[{"value":"29 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"As this article does not contain any studies with human participants or animals performed by any of the authors, the informed consent in not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}