{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:13:16Z","timestamp":1740157996998,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006280","name":"Ministerio de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["RTC-2017-6157-6"],"award-info":[{"award-number":["RTC-2017-6157-6"]}],"id":[{"id":"10.13039\/501100006280","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s12652-020-01942-y","type":"journal-article","created":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T13:03:42Z","timestamp":1586955822000},"page":"4583-4592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Profile generation system using artificial intelligence for information recovery and analysis"],"prefix":"10.1007","volume":"11","author":[{"given":"Pablo","family":"Chamoso","sequence":"first","affiliation":[]},{"given":"\u00c1lvaro","family":"Bartolom\u00e9","sequence":"additional","affiliation":[]},{"given":"David","family":"Garc\u00eda-Retuerta","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Prieto","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"De La Prieta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,15]]},"reference":[{"key":"1942_CR1","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.compeleceng.2016.04.002","volume":"54","author":"N Ali","year":"2016","unstructured":"Ali N, Bajwa KB, Sablatnig R, Mehmood Z (2016) Image retrieval by addition of spatial information based on histograms of triangular regions. Comput Electr Eng 54:539\u2013550","journal-title":"Comput Electr Eng"},{"key":"1942_CR2","first-page":"1","volume":"49","author":"S Ali","year":"2017","unstructured":"Ali S, Rauf A, Islam N, Farman H, Khan S (2017) User profiling: a privacy issue in online public network. Sindh Univ Res J (Sci Ser) 49:1","journal-title":"Sindh Univ Res J (Sci Ser)"},{"key":"1942_CR3","unstructured":"Allahyari M, Pouriyeh S, Assefi M, Safaei S, Trippe ED, Gutierrez JB, Kochut K (2017) A brief survey of text mining: classification, clustering and extraction techniques. arXiv:170702919 (arXiv preprint)"},{"key":"1942_CR4","volume-title":"Openface: a general-purpose face recognition library with mobile applications","author":"B Amos","year":"2016","unstructured":"Amos B, Ludwiczuk B, Satyanarayanan M et al (2016) Openface: a general-purpose face recognition library with mobile applications. CMU School of Computer Science, Pittsburgh"},{"key":"1942_CR5","doi-asserted-by":"crossref","unstructured":"Bahrami M, Singhal M, Zhuang Z (2015) A cloud-based web crawler architecture. In: 2015 18th international conference on intelligence in next generation networks, IEEE, pp 216\u2013223","DOI":"10.1109\/ICIN.2015.7073834"},{"key":"1942_CR6","doi-asserted-by":"crossref","unstructured":"Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C (2010) Abusing social networks for automated user profiling. In: International workshop on recent advances in intrusion detection, Springer, pp 422\u2013441","DOI":"10.1007\/978-3-642-15512-3_22"},{"issue":"1","key":"1942_CR7","first-page":"133","volume":"1","author":"L Barbosa","year":"2010","unstructured":"Barbosa L, Freire J (2010) Siphoning hidden-web data through keyword-based interfaces. J Inf Data Manag 1(1):133","journal-title":"J Inf Data Manag"},{"key":"1942_CR8","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Computer vision and pattern recognition, 2005. CVPR 2005. IEEE computer society conference on, IEEE, vol\u00a01, pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"1942_CR9","doi-asserted-by":"crossref","unstructured":"Dang NC, De\u00a0la Prieta F, Corchado JM, Moreno MN (2016) Framework for retrieving relevant contents related to fashion from online social network data. In: International conference on practical applications of agents and multi-agent systems, Springer, pp 335\u2013347","DOI":"10.1007\/978-3-319-40159-1_28"},{"key":"1942_CR10","doi-asserted-by":"crossref","unstructured":"Davoodi E, Afsharchi M, Kianmehr K (2012) A social network-based approach to expert recommendation system. In: International conference on hybrid artificial intelligence systems, Springer, pp 91\u2013102","DOI":"10.1007\/978-3-642-28942-2_9"},{"key":"1942_CR11","doi-asserted-by":"publisher","DOI":"10.4324\/9781315747453","volume-title":"Innovation and entrepreneurship","author":"P Drucker","year":"2014","unstructured":"Drucker P (2014) Innovation and entrepreneurship. Routledge, London"},{"key":"1942_CR12","doi-asserted-by":"crossref","unstructured":"Falahrastegar M, Haddadi H, Uhlig S, Mortier R (2016) Tracking personal identifiers across the web. In: International conference on passive and active network measurement, Springer, pp 30\u201341","DOI":"10.1007\/978-3-319-30505-9_3"},{"issue":"39","key":"1942_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jefas.2015.07.001","volume":"20","author":"D Jayaram","year":"2015","unstructured":"Jayaram D, Manrai AK, Manrai LA (2015) Effective use of marketing technology in eastern europe: web analytics, social media, customer analytics, digital campaigns and mobile applications. J Econ Financ Admin Sci 20(39):118\u2013132","journal-title":"J Econ Financ Admin Sci"},{"key":"1942_CR14","doi-asserted-by":"crossref","unstructured":"Jose B, Abraham S (2017) Exploring the merits of nosql: a study based on mongodb. In: 2017 international conference on networks and advances in computational technologies (NetACT), IEEE, pp 266\u2013271","DOI":"10.1109\/NETACT.2017.8076778"},{"issue":"4","key":"1942_CR15","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1504\/IJSNM.2017.091807","volume":"2","author":"M Kandias","year":"2017","unstructured":"Kandias M, Mitrou L, Stavrou V, Gritzalis D (2017) Profiling online social networks users: an omniopticon tool. IJSNM 2(4):293\u2013313","journal-title":"IJSNM"},{"issue":"6","key":"1942_CR16","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1007\/s12652-017-0491-7","volume":"9","author":"DP Karidi","year":"2018","unstructured":"Karidi DP, Stavrakas Y, Vassiliou Y (2018) Tweet and followee personalized recommendations based on knowledge graphs. J Ambient Intell Humaniz Comput 9(6):2035\u20132049","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"1942_CR17","first-page":"81","volume":"10","author":"MM Kasar","year":"2016","unstructured":"Kasar MM, Bhattacharyya D, Kim T (2016) Face recognition using neural network: a review. Int J Secur Appl 10(3):81\u2013100","journal-title":"Int J Secur Appl"},{"key":"1942_CR18","doi-asserted-by":"crossref","unstructured":"Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1867\u20131874","DOI":"10.1109\/CVPR.2014.241"},{"issue":"12","key":"1942_CR19","first-page":"1104","volume":"4","author":"MBT Liyew","year":"2017","unstructured":"Liyew MBT (2017) Applying a deep learning convolutional neural network (CNN) approach for building a face recognition system: a review. J Emerg Technol Innov Res 4(12):1104\u20131110","journal-title":"J Emerg Technol Innov Res"},{"key":"1942_CR20","unstructured":"Marx M (2014) The extension and customization of maltego data mining environment into anti-phishing system. South Africa"},{"issue":"6","key":"1942_CR21","doi-asserted-by":"publisher","first-page":"57","DOI":"10.9781\/ijimai.2016.369","volume":"3","author":"A Moreno","year":"2016","unstructured":"Moreno A, Redondo T (2016) Text analytics: the convergence of big data and artificial intelligence. IJIMAI 3(6):57\u201364","journal-title":"IJIMAI"},{"key":"1942_CR22","unstructured":"Mori K, Matsugu M, Suzuki T (2005) Face recognition using SVM fed with intermediate output of CNN for face detection. In: MVA, pp 410\u2013413"},{"key":"1942_CR23","first-page":"1","volume":"20","author":"THT Nguyen","year":"2019","unstructured":"Nguyen THT, Dinh DT, Sriboonchitta S, Huynh VN (2019) A method for k-means-like clustering of categorical data. J Ambient Intell Human Comput 20:1\u201311","journal-title":"J Ambient Intell Human Comput"},{"issue":"3","key":"1942_CR24","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1561\/1500000017","volume":"4","author":"C Olston","year":"2010","unstructured":"Olston C, Najork M et al (2010) Web crawling. Found Trends Inf 4(3):175\u2013246","journal-title":"Found Trends Inf"},{"key":"1942_CR25","first-page":"9","volume":"3","author":"KK Perisetla","year":"2012","unstructured":"Perisetla KK (2012) Mutual exclusion principle for multithreaded web crawlers. Edit Preface 3:9","journal-title":"Edit Preface"},{"key":"1942_CR26","volume-title":"Python text processing with NLTK 2.0 cookbook","author":"J Perkins","year":"2010","unstructured":"Perkins J (2010) Python text processing with NLTK 2.0 cookbook. Packt Publishing Ltd, Birmingham"},{"key":"1942_CR27","first-page":"133","volume":"242","author":"J Ramos","year":"2003","unstructured":"Ramos J (2003) Using tf-idf to determine word relevance in document queries. Proc First Instr Conf Mach Learn 242:133\u2013142","journal-title":"Proc First Instr Conf Mach Learn"},{"key":"1942_CR28","doi-asserted-by":"crossref","unstructured":"Rivas A, Mart\u00edn L, Sitt\u00f3n I, Chamoso P, Mart\u00edn-Limorti JJ, Prieto J, Gonz\u00e1lez-Briones A (2018) Semantic analysis system for industry 4.0. In: International conference on knowledge management in organizations, Springer, pp 537\u2013548","DOI":"10.1007\/978-3-319-95204-8_45"},{"key":"1942_CR29","unstructured":"Roy D, Ganguly D, Mitra M, Jones GJ (2016) Representing documents and queries as sets of word embedded vectors for information retrieval. arXiv:160607869 (arXiv preprint)"},{"key":"1942_CR30","first-page":"20","volume":"20","author":"JH Shah","year":"2017","unstructured":"Shah JH, Sharif M, Yasmin M, Fernandes SL (2017) Facial expressions classification and false label reduction using LDA and threefold SVM. Pattern Recogn Lett 20:20","journal-title":"Pattern Recogn Lett"},{"key":"1942_CR31","doi-asserted-by":"crossref","unstructured":"Singh VK, Tiwari N, Garg S (2011) Document clustering using k-means, heuristic k-means and fuzzy c-means. In: Computational intelligence and communication networks (CICN), 2011 international conference on, IEEE, pp 297\u2013301","DOI":"10.1109\/CICN.2011.62"},{"key":"1942_CR32","volume-title":"Advances in kernel methods: support vector learning","author":"R Soentpiet","year":"1999","unstructured":"Soentpiet R et al (1999) Advances in kernel methods: support vector learning. MIT Press, London"},{"issue":"2","key":"1942_CR33","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, Acquisti A, B\u00f6hme R, Hui KL (2015) The challenges of personal data markets and privacy. Electron Mark 25(2):161\u2013167","journal-title":"Electron Mark"},{"key":"1942_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-017-0779-6","volume":"20","author":"S Sun","year":"2017","unstructured":"Sun S, Gong J, Zomaya AY, Wu A (2017) A distributed incremental information acquisition model for large-scale text data. Cluster Comput 20:1\u201312","journal-title":"Cluster Comput"},{"issue":"1","key":"1942_CR35","first-page":"77","volume":"10","author":"G Vasanthakumar","year":"2016","unstructured":"Vasanthakumar G, Shenoy PD, Venugopal K (2016) Ptib: profiling top influential blogger in online social networks. Int J Inf Process 10(1):77\u201391","journal-title":"Int J Inf Process"},{"key":"1942_CR36","first-page":"1","volume":"20","author":"P VenkateswarLal","year":"2019","unstructured":"VenkateswarLal P, Nitta GR, Prasad A (2019) Ensemble of texture and shape descriptors using support vector machine classification for face recognition. J Ambient Intelli Human Comput 20:1\u20138","journal-title":"J Ambient Intelli Human Comput"},{"key":"1942_CR37","first-page":"1","volume":"20","author":"X Zhao","year":"2019","unstructured":"Zhao X, Zhang W, He W, Huang C (2019) Research on customer purchase behaviors in online take-out platforms based on semantic fuzziness and deep web crawler. J Ambient Intell Human Comput 20:1\u201315","journal-title":"J Ambient Intell Human Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01942-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-01942-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01942-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T08:21:23Z","timestamp":1618474883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-01942-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":37,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["1942"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-01942-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"21 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}