{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:43:30Z","timestamp":1774129410886,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12652-021-03501-5","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T05:02:50Z","timestamp":1650430970000},"page":"5193-5209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Designing a model for the usability of fog computing on the internet of things"],"prefix":"10.1007","volume":"14","author":[{"given":"Elham","family":"Fazel","sequence":"first","affiliation":[]},{"given":"Ali","family":"Shayan","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Mahmoudi Maymand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,20]]},"reference":[{"issue":"1","key":"3501_CR1","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2017","unstructured":"Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450\u2013465","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"3501_CR2","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/JIOT.2015.2497263","volume":"3","author":"SH Abdelwahab","year":"2015","unstructured":"Abdelwahab SH, Hamdaoui B, Guizani M, Znati T (2015) Replisom: disciplined tiny memory replication for massive iot devices in lte edge cloud. IEEE Internet Things J 3(3):327\u2013338","journal-title":"IEEE Internet Things J"},{"key":"3501_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed E, Rehmani MH (2017) Mobile edge computing: opportunities, solutions, and challenges","DOI":"10.1016\/j.future.2016.09.015"},{"key":"3501_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed M, Bj\u00a8orkman M, Cau\u02c7sevi\u00b4c A, Fotouhi H, Lind\u00b4en M (2015) An overview on the internet of things for health monitoring systems. In International internet of things. Springer summit, pp 429\u2013436","DOI":"10.1007\/978-3-319-47063-4_44"},{"issue":"2","key":"3501_CR5","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.dcan.2017.07.001","volume":"4","author":"Y Ai","year":"2018","unstructured":"Ai Y, Peng M, Zhang K (2018) Edge computing technologies for internet of things: a primer. Digit Commun Netw 4(2):77\u201386","journal-title":"Digit Commun Netw"},{"key":"3501_CR6","first-page":"2","volume":"26","author":"AA Alsaffar","year":"2016","unstructured":"Alsaffar AA, Pham HP, Hong C-S, Huh E-N, Aazam Aazam M (2016) An architecture of iot service delegation and resource allocation based on Collaboration between fog and cloud computing. Mobile Inform Syst 26:2","journal-title":"Mobile Inform Syst"},{"key":"3501_CR7","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jnca.2017.01.012","volume":"82","author":"HR Arkian","year":"2017","unstructured":"Arkian HR, Diyanat A, Pourkhalili A (2017) Mist: fog-based data analytics scheme with cost-efficient resource provisioning for iot crowdsensing applications. J Netw Comput Appl 82:152\u2013165","journal-title":"J Netw Comput Appl"},{"key":"3501_CR8","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.comnet.2017.10.002","volume":"130","author":"K Bilal","year":"2018","unstructured":"Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94\u2013120","journal-title":"Comput Netw"},{"key":"3501_CR9","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, 2012, pp13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"3501_CR10","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, Donato W, Persico V, Pescape A (2016) Integration of cloud computing and internet of things: a survey. Fut Gen Comput Syst 56:684\u2013700","journal-title":"Fut Gen Comput Syst"},{"issue":"5","key":"3501_CR11","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1109\/JIOT.2017.2701408","volume":"4","author":"A Brogi","year":"2017","unstructured":"Brogi A, Forti S (2017) Qos-aware deploysment of iot applications through the fog. IEEE Internet Things J 4(5):1185\u20131192","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3501_CR12","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and iot: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"key":"3501_CR13","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2014","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage publications, London"},{"key":"3501_CR14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/B978-0-12-805395-9.00004-6","volume-title":"Internet of things journal","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principles, architectures, and applications. Internet of things journal. Elsevier, Amsterdam, pp 61\u201375"},{"issue":"10","key":"3501_CR15","doi-asserted-by":"crossref","first-page":"3747","DOI":"10.1007\/s12652-019-01291-5","volume":"10","author":"M Devarajan","year":"2019","unstructured":"Devarajan M, Subramaniyaswamy V, Vijayakumar V, Ravi L (2019) Fog-assisted personalized healthcare-support system for remote patients with diabetes. J Amb Intell Hum Comput 10(10):3747\u20133760","journal-title":"J Amb Intell Hum Comput"},{"key":"3501_CR16","unstructured":"Developers G (2015) Google cloud computing, hosting services & apis"},{"key":"3501_CR17","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2017.09.002","volume":"68","author":"I Farris","year":"2018","unstructured":"Farris I, Orsino A, Militano L, Iera A, Araniti G (2018) Federated iot services leveraging 5g technologies at the edge. Ad Hoc Netw 68:58\u201369","journal-title":"Ad Hoc Netw"},{"key":"3501_CR18","doi-asserted-by":"crossref","unstructured":"Gia TN, Jiang M, Rahmani A-M, Westerlund, Pasi Liljeberg T, Tenhunen H (2015) Fog computing in healthcare internet of things: A case study on ecg feature extraction. In 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE, pp 356\u2013363","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"3501_CR19","first-page":"1376","volume-title":"International conference on intelligent data communication technologies and internet of things","author":"SS Gill","year":"2018","unstructured":"Gill SS, Arya RC, Wander GS, Buyya R (2018) Fog-based smart healthcare as a big data and cloud service for heart patients using iot. International conference on intelligent data communication technologies and internet of things. Springer, Berlin, pp 1376\u20131383"},{"issue":"4","key":"3501_CR20","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11280-012-0188-y","volume":"16","author":"B Guo","year":"2013","unstructured":"Guo B, Zhang D, Yu Z, Liang Y, Wang Z, Zhou X (2013) from the internet of things to embedded intelligence. World Wide Web 16(4):399\u2013420","journal-title":"World Wide Web"},{"issue":"9","key":"3501_CR21","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1002\/spe.2509","volume":"47","author":"H Gupta","year":"2017","unstructured":"Gupta H, Vahid Dastjerdi A, Ghosh SK, Buyya R (2017) Ifogsim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. Softw Pract Exp 47(9):1275\u20131296","journal-title":"Softw Pract Exp"},{"key":"3501_CR22","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342","journal-title":"J Netw Comput Appl"},{"key":"3501_CR23","unstructured":"Jose S (2015) new cisco internet of things (iot) system provides a foundation for the transformation of industries. https:\/\/newsroom.cisco.com\/"},{"issue":"2","key":"3501_CR24","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/JSYST.2015.2469676","volume":"11","author":"N Kaur","year":"2015","unstructured":"Kaur N, Sood SK (2015) An energy-efficient architecture for the internet of things (iot). IEEE Syst J 11(2):796\u2013805","journal-title":"IEEE Syst J"},{"key":"3501_CR25","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.autcon.2017.10.008","volume":"85","author":"P Kochovski","year":"2018","unstructured":"Kochovski P, Stankovski V (2018) Supporting smart construction with dependable edge computing infrastructures and applications. Autom Constr 85:182\u2013192","journal-title":"Autom Constr"},{"key":"3501_CR26","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.comnet.2019.01.022","volume":"151","author":"X Li","year":"2019","unstructured":"Li X, Zhou Z, Guo J, Wang S, Zhang J (2019) Aggregated multi-attribute query processing in edge computing for industrial iot applications. Comput Netw 151:114\u2013123","journal-title":"Comput Netw"},{"issue":"1","key":"3501_CR27","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s11280-017-0461-1","volume":"21","author":"RK Lomotey","year":"2018","unstructured":"Lomotey RK, Pry JC, Chai C (2018) Traceability and visual analytics for the internet-of-things (iot) architecture. World Wide Web 21(1):7\u201332","journal-title":"World Wide Web"},{"issue":"2","key":"3501_CR28","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1007\/s10586-019-02971-9","volume":"23","author":"SA Magid","year":"2020","unstructured":"Magid SA, Petrini F, Dezfouli B (2020) Image classification on iot edge devices: profiling and modeling. Clust Comput 23(2):1025\u20131043","journal-title":"Clust Comput"},{"issue":"1","key":"3501_CR29","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1007\/s10586-017-1559-z","volume":"22","author":"AM Manasrah","year":"2019","unstructured":"Manasrah AM, Gupta B et al (2019) An optimized service broker routing policy based on differential evolution algorithm in fog\/cloud environment. Clust Comput 22(1):1639\u20131653","journal-title":"Clust Comput"},{"issue":"3","key":"3501_CR30","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCE.2017.2684981","volume":"6","author":"A Munir","year":"2017","unstructured":"Munir A, Kansakar P, Khan SU (2017) Ifciot: Integrated fog cloud iot: a novel architectural paradigm for the future internet of things. IEEE Consum Electron Mag 6(3):74\u201382","journal-title":"IEEE Consum Electron Mag"},{"issue":"1","key":"3501_CR31","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20(1):601\u2013628","journal-title":"IEEE Commun Surv Tutor"},{"key":"3501_CR32","doi-asserted-by":"crossref","first-page":"237","DOI":"10.2991\/978-94-91216-05-3_11","volume-title":"Activity recognition in pervasive intelligent environments","author":"G Okeyo","year":"2011","unstructured":"Okeyo G, Chen L, Wang H, Sterritt R (2011) Ontology-based learning framework for activity assistance in an adaptive smart home. Activity recognition in pervasive intelligent environments. Springer, Berlin, pp 237\u2013263"},{"issue":"3","key":"3501_CR33","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MPRV.2020.2997616","volume":"19","author":"I Psychoula","year":"2020","unstructured":"Psychoula I, Chen L, Amft O (2020) Privacy risk awareness in wearables and the internet of things. IEEE Pervasive Comput 19(3):60\u201366","journal-title":"IEEE Pervasive Comput"},{"key":"3501_CR34","doi-asserted-by":"crossref","unstructured":"Psychoula I, Merdivan E, Singh D, Chen L, Chen F, Hanke S, Kropf J, Holzinger A, Geist M (2018) A deep learning approach for privacy preservation in assisted living. In 2018 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops). IEEE, pp 710\u2013715","DOI":"10.1109\/PERCOMW.2018.8480247"},{"key":"3501_CR35","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/ACCESS.2016.2541999","volume":"4","author":"D Puiu","year":"2016","unstructured":"Puiu D, Barnaghi P, Tonjes R, Kumper D, Ali MI, Mileo A, Parreira JX, Fischer M, Kolozali S, Farajidavar N et al (2016) Citypulse: large scale data analytics framework for smart cities. IEEE Access 4:1086\u20131108","journal-title":"IEEE Access"},{"issue":"1","key":"3501_CR36","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10586-018-2848-x","volume":"22","author":"AH Rabie","year":"2019","unstructured":"Rabie AH, Ali SH, Ali HA, Saleh AI (2019) A fog based load forecasting strategy for smart grids using big electrical data. Clust Comput 22(1):241\u2013270","journal-title":"Clust Comput"},{"key":"3501_CR37","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gen Comput Syst 78:680\u2013698","journal-title":"Futur Gen Comput Syst"},{"issue":"5","key":"3501_CR38","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637\u2013646","journal-title":"IEEE Internet Things J"},{"key":"3501_CR39","first-page":"6","volume":"7","author":"M Singh","year":"2016","unstructured":"Singh M, Kaur R (2016) Integration of iot and fog: need of the hour. Int J Adv Res Comput Sci 7:6","journal-title":"Int J Adv Res Comput Sci"},{"issue":"6","key":"3501_CR40","doi-asserted-by":"crossref","first-page":"1601","DOI":"10.1007\/s11280-018-0525-x","volume":"21","author":"SK Sood","year":"2018","unstructured":"Sood SK (2018) Sna based qos and reliability in fog and cloud framework. World Wide Web 21(6):1601\u20131616","journal-title":"World Wide Web"},{"issue":"1","key":"3501_CR41","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic JA (2014) Research directions for the internet of things. IEEE Internet Things J 1(1):3\u20139","journal-title":"IEEE Internet Things J"},{"issue":"17","key":"3501_CR42","doi-asserted-by":"crossref","first-page":"24639","DOI":"10.1007\/s11042-018-7051-9","volume":"78","author":"GL Stavrinides","year":"2019","unstructured":"Stavrinides GL, Karatza HD (2019) A hybrid approach to scheduling real-time iot workflows in fog and cloud environments. Multimed Tools Appl 78(17):24639\u201324655","journal-title":"Multimed Tools Appl"},{"key":"3501_CR43","doi-asserted-by":"crossref","unstructured":"Stojmenovic I, Wen S (2014) the fog computing paradigm: Scenarios and security issues. In 2014 federated conference on computer science and information systems. IEEE, pp 1\u20138","DOI":"10.15439\/2014F503"},{"issue":"6","key":"3501_CR44","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/TITB.2012.2215878","volume":"16","author":"J Synnott","year":"2012","unstructured":"Synnott J, Chen L, Nugent CD, Moore G (2012) Wiipd\u2014objective home assessment of Parkinson\u2019s disease using the nintendo wii remote. IEEE Trans Inf Technol Biomed 16(6):1304\u20131312","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"3501_CR45","doi-asserted-by":"crossref","unstructured":"Synnott J, Chen L, Nugent CD, Moore G (2014) the creation of simulated activity datasets using a graphical intelligent environment simulation tool. In 2014 36th annual international conference of the IEEE engineering in medicine and biology society. IEEE, pp 4143\u20134146","DOI":"10.1109\/EMBC.2014.6944536"},{"key":"3501_CR46","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jss.2017.10.033","volume":"136","author":"S Taherizadeh","year":"2018","unstructured":"Taherizadeh S, Jones AC, Taylor I, Zhao Z, Stankovski V (2018) Monitoring self-adaptive applications within edge computing frameworks: a state-of-the-art review. J Syst Softw 136:19\u201338","journal-title":"J Syst Softw"},{"issue":"6","key":"3501_CR47","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1007\/s11280-014-0319-8","volume":"18","author":"Z Ur Rehman","year":"2015","unstructured":"Ur Rehman Z, Hussain OK, Hussain FK, Chang E, Dillon T (2015) User-side qos forecasting and management of cloud services. World Wide Web 18(6):1677\u20131716","journal-title":"World Wide Web"},{"key":"3501_CR48","doi-asserted-by":"crossref","unstructured":"Varshney P, Simmhan Y (2017) Demystifying fog computing: characterizing architectures, applications and abstractions. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). IEEE, pp 115\u2013124","DOI":"10.1109\/ICFEC.2017.20"},{"key":"3501_CR49","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-319-57639-8_7","volume-title":"Fog computing in the internet of things","author":"K Vatanparvar","year":"2018","unstructured":"Vatanparvar K, Al Faruque MA (2018) Control-as-a-service in cyber-physical energy systems over fog computing. Fog computing in the internet of things. Springer, Berlin, pp 123\u2013144"},{"key":"3501_CR50","first-page":"53","volume":"3","author":"Y Wang","year":"2015","unstructured":"Wang Y, Uehara T, Sasaki R (2015) Fog computing: issues and challenges in security and forensics. In 2015 IEEE 39th annual computer software and applications conference. IEEE 3:53\u201359","journal-title":"IEEE"},{"key":"3501_CR51","first-page":"2","volume":"2","author":"X Yao","year":"2020","unstructured":"Yao X, Farha F, Li R, Psychoula I, Chen L, Ning H (2020) Security and privacy issues of physical objects in the iot: challenges and opportunities. Digit Commun Netw 2:2","journal-title":"Digit Commun Netw"},{"issue":"10","key":"3501_CR52","doi-asserted-by":"crossref","first-page":"3863","DOI":"10.1007\/s12652-019-01253-x","volume":"10","author":"S Yaqoob","year":"2019","unstructured":"Yaqoob S, Ullah A, Akbar M, Imran M, Shoaib M (2019) Congestion avoidance through fog computing in internet of vehicles. J Ambient Intell Humaniz Comput 10(10):3863\u20133877","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"3501_CR53","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/JIOT.2017.2788802","volume":"5","author":"A Yousefpour","year":"2018","unstructured":"Yousefpour A, Ishigaki G, Gour R, Jue JP (2018) on reducing iot service delay via fog offloading. IEEE Internet Things J 5(2):998\u20131010","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"3501_CR54","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","volume":"19","author":"S Yu","year":"2016","unstructured":"Yu S, Liu M, Dou W, Liu X, Zhou S (2016) Networking for big data: a survey. IEEE Commun Surv Tutor 19(1):531\u2013549","journal-title":"IEEE Commun Surv Tutor"},{"key":"3501_CR55","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","volume":"6","author":"W Yu","year":"2017","unstructured":"Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2017) A survey on the edge computing for the internet of things. IEEE Access 6:6900\u20136919","journal-title":"IEEE Access"},{"issue":"3","key":"3501_CR56","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","volume":"44","author":"L Zhang","year":"2014","unstructured":"Zhang L, Afanasyev A, Burke J, Jacobson V, Claffy K, Crowley P, Papadopoulos C, Wang L, Zhang B (2014) Named data networking. ACM SIGCOMM Comput Commun Rev 44(3):66\u201373","journal-title":"ACM SIGCOMM Comput Commun Rev"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03501-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03501-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03501-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T12:04:00Z","timestamp":1684843440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03501-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["3501"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03501-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,20]]},"assertion":[{"value":"3 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}