{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T00:51:32Z","timestamp":1774140692744,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T00:00:00Z","timestamp":1634774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T00:00:00Z","timestamp":1634774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s12652-021-03538-6","type":"journal-article","created":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T11:02:58Z","timestamp":1634814178000},"page":"6735-6749","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimization of content-centric networking based IoT systems using partitioning-heuristics in-network caching"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7461-5521","authenticated-orcid":false,"given":"Sumit","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rajeev","family":"Tiwari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,10,21]]},"reference":[{"issue":"3","key":"3538_CR1","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1109\/COMST.2015.2392629","volume":"17","author":"EG AbdAllah","year":"2015","unstructured":"AbdAllah EG, Hassanein HS, Zulkernine M (2015) A survey of security attacks in information-centric networking. IEEE Commun Surv Tutor 17(3):1441\u20131454","journal-title":"IEEE Commun Surv Tutor"},{"key":"3538_CR2","doi-asserted-by":"crossref","unstructured":"Adhatarao SS, Arumaithurai M, Fu X (2017) Fogg: A fog computing based gateway to integrate sensor networks to internet. In: 2017 29th International teletraffic congress (ITC 29), IEEE, vol\u00a02, pp 42\u201347","DOI":"10.23919\/ITC.2017.8065709"},{"issue":"6","key":"3538_CR3","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/TNET.2005.861250","volume":"13","author":"D Alderson","year":"2005","unstructured":"Alderson D, Li L, Willinger W, Doyle JC (2005) Understanding internet topology: principles, models, and validation. IEEE ACM Trans Netw 13(6):1205\u20131218","journal-title":"IEEE ACM Trans Netw"},{"key":"3538_CR4","doi-asserted-by":"crossref","unstructured":"Arianfar S, Nikander P, Ott J (2010) On content-centric router design and implications. In: Proceedings of the re-architecting the internet workshop, pp 1\u20136","DOI":"10.1145\/1921233.1921240"},{"issue":"2","key":"3538_CR5","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/JIOT.2018.2873343","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Azam MA, Rehmani MH, Loo J (2018) Recent advances in information-centric networking-based internet of things (ICN-IoT). IEEE Internet Things J 6(2):2128\u20132158","journal-title":"IEEE Internet Things J"},{"issue":"15","key":"3538_CR6","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"3538_CR7","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.05.001","volume":"140","author":"B Banerjee","year":"2018","unstructured":"Banerjee B, Kulkarni A, Seetharam A (2018) Greedy caching: an optimized content placement strategy for information-centric networks. Comput Netw 140:78\u201391","journal-title":"Comput Netw"},{"key":"3538_CR8","doi-asserted-by":"crossref","unstructured":"Bernardini C, Silverston T, Festor O (2013) Mpc: popularity-based caching strategy for content centric networks. In: 2013 IEEE international conference on communications (ICC), IEEE, pp 3619\u20133623","DOI":"10.1109\/ICC.2013.6655114"},{"issue":"16","key":"3538_CR9","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.comnet.2013.07.034","volume":"57","author":"M Conti","year":"2013","unstructured":"Conti M, Gasti P, Teoli M (2013) A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput Netw 57(16):3178\u20133191","journal-title":"Comput Netw"},{"key":"3538_CR10","unstructured":"Dai J, Hu Z, Li B, Liu J, Li B (2012) Collaborative hierarchical caching with dynamic request routing for massive content distribution. In: 2012 Proceedings IEEE INFOCOM, IEEE, pp 2444\u20132452"},{"key":"3538_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.comnet.2018.06.003","volume":"142","author":"A Detti","year":"2018","unstructured":"Detti A, Bracciale L, Loreti P, Rossi G, Melazzi NB (2018) A cluster-based scalable router for information centric networks. Comput Netw 142:24\u201332","journal-title":"Comput Netw"},{"issue":"5","key":"3538_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2677046.2677049","volume":"44","author":"C Ghali","year":"2014","unstructured":"Ghali C, Tsudik G, Uzun E (2014) Network-layer trust in named-data networking. ACM SIGCOMM Comput Commun Rev 44(5):12\u201319","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"9","key":"3538_CR13","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1109\/TIFS.2016.2574307","volume":"11","author":"H Guo","year":"2016","unstructured":"Guo H, Wang X, Chang K, Tian Y (2016) Exploiting path diversity for thwarting pollution attacks in named data networking. IEEE Trans Inf Forensics Secur 11(9):2077\u20132090","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3538_CR14","doi-asserted-by":"crossref","unstructured":"Hasan K, Jeong SH (2018) A cluster-based content management framework for information-centric networking. In: 2018 Tenth international conference on ubiquitous and future networks (ICUFN), IEEE, pp 891\u2013893","DOI":"10.1109\/ICUFN.2018.8436804"},{"issue":"22","key":"3538_CR15","doi-asserted-by":"publisher","first-page":"4730","DOI":"10.3390\/app9224730","volume":"9","author":"K Hasan","year":"2019","unstructured":"Hasan K, Jeong SH (2019) Efficient caching for data-driven IoT applications and fast content delivery with low latency in ICN. Appl Sci 9(22):4730","journal-title":"Appl Sci"},{"key":"3538_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.comcom.2020.05.018","volume":"159","author":"G Jaber","year":"2020","unstructured":"Jaber G, Kacimi R (2020) A collaborative caching strategy for content-centric enabled wireless sensor networks. Comput Commun 159:60\u201370. https:\/\/doi.org\/10.1016\/j.comcom.2020.05.018","journal-title":"Comput Commun"},{"key":"3538_CR17","first-page":"1","volume-title":"Content-centric networking, whitepaper describing future assurable global networks","author":"V Jacobson","year":"2007","unstructured":"Jacobson V, Mosko M, Smetters D, Garcia-Luna-Aceves J (2007) Content-centric networking, whitepaper describing future assurable global networks. Palo Alto Research Center Inc, Palo Alto, pp 1\u20139"},{"key":"3538_CR18","doi-asserted-by":"crossref","unstructured":"Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (2009) Networking named content. In: Proceedings of the 5th international conference on Emerging networking experiments and technologies, pp 1\u201312","DOI":"10.1145\/1658939.1658941"},{"key":"3538_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.comnet.2019.02.002","volume":"153","author":"A Jindal","year":"2019","unstructured":"Jindal A, Aujla GS, Kumar N (2019) Survivor: a blockchain based edge-as-a-service framework for secure energy trading in sdn-enabled vehicle-to-grid environment. Comput Netw 153:36\u201348","journal-title":"Comput Netw"},{"key":"3538_CR20","doi-asserted-by":"publisher","first-page":"106937","DOI":"10.1016\/j.comnet.2019.106937","volume":"165","author":"F Khandaker","year":"2019","unstructured":"Khandaker F, Oteafy S, Hassanein HS, Farahat H (2019) A functional taxonomy of caching schemes: towards guided designs in information-centric networks. Comput Netw 165:106937","journal-title":"Comput Netw"},{"key":"3538_CR21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.future.2014.10.013","volume":"48","author":"N Kumar","year":"2015","unstructured":"Kumar N, Iqbal R, Misra S, Rodrigues JJ (2015) Bayesian coalition game for contention-aware reliable data forwarding in vehicular mobile cloud. Future Gener Comput Syst 48:60\u201372","journal-title":"Future Gener Comput Syst"},{"key":"3538_CR22","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s10586-020-03185-0","volume":"24","author":"S Kumar","year":"2020","unstructured":"Kumar S, Tiwari R (2020a) An efficient content placement scheme based on normalized node degree in content centric networking. Clust Comput 24:1277\u20131291","journal-title":"Clust Comput"},{"key":"3538_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107434","author":"S Kumar","year":"2020","unstructured":"Kumar S, Tiwari R (2020b) Optimized content centric networking for future internet: dynamic popularity window based caching scheme. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2020.107434","journal-title":"Comput Netw"},{"key":"3538_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2020.12.018","author":"S Kumar","year":"2021","unstructured":"Kumar S, Tiwari R (2021) Dynamic popularity window and distance-based efficient caching for fast content delivery applications in CCN. Eng Sci Technol. https:\/\/doi.org\/10.1016\/j.jestch.2020.12.018","journal-title":"Eng Sci Technol"},{"key":"3538_CR25","doi-asserted-by":"crossref","unstructured":"Kumar S, Tiwari R, Obaidat MS, Kumar N, Hsiao KF (2020) CPNDD: content placement approach in content centric networking. In: ICC 2020-2020 IEEE international conference on communications (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC40277.2020.9149025"},{"issue":"7","key":"3538_CR26","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.peva.2005.05.003","volume":"63","author":"N Laoutaris","year":"2006","unstructured":"Laoutaris N, Che H, Stavrakakis I (2006) The lcd interconnection of lru caches and its analysis. Perform Eval 63(7):609\u2013634","journal-title":"Perform Eval"},{"issue":"2","key":"3538_CR27","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TIFS.2014.2365742","volume":"10","author":"Q Li","year":"2014","unstructured":"Li Q, Zhang X, Zheng Q, Sandhu R, Fu X (2014) Live: Lightweight integrity verification and content access control for named data networking. IEEE Trans Inf Forensics Secur 10(2):308\u2013320","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"3538_CR28","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/LCOMM.2014.2329482","volume":"18","author":"SH Lim","year":"2014","unstructured":"Lim SH, Ko YB, Jung GH, Kim J, Jang MW (2014) Inter-chunk popularity-based edge-first caching in content-centric networking. IEEE Commun Lett 18(8):1331\u20131334","journal-title":"IEEE Commun Lett"},{"key":"3538_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.jnca.2014.02.012","volume":"42","author":"L Ma","year":"2014","unstructured":"Ma L, Hu K, Zhu Y, Chen H (2014) Cooperative artificial bee colony algorithm for multi-objective rfid network planning. J Netw Comput Appl 42:143\u2013162","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"3538_CR30","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TSMC.2017.2723483","volume":"49","author":"L Ma","year":"2017","unstructured":"Ma L, Wang X, Huang M, Lin Z, Tian L, Chen H (2017) Two-level master-slave rfid networks planning via hybrid multiobjective artificial bee colony optimizer. IEEE Trans Syst Man Cybern Syst 49(5):861\u2013880","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"3538_CR31","doi-asserted-by":"publisher","unstructured":"Ma L, Cheng S, Shi Y (2020) Enhancing learning efficiency of brain storm optimization via orthogonal learning design. IEEE Trans Syst Man Cybern Syst. https:\/\/doi.org\/10.1109\/TSMC.2020.2963943","DOI":"10.1109\/TSMC.2020.2963943"},{"issue":"1","key":"3538_CR32","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11277-018-6104-8","volume":"105","author":"D Mars","year":"2019","unstructured":"Mars D, Gammar SM, Lahmadi A, Saidane LA (2019) Using information centric networking in internet of things: a survey. Wirel Pers Commun 105(1):87\u2013103","journal-title":"Wirel Pers Commun"},{"key":"3538_CR33","doi-asserted-by":"crossref","unstructured":"Meddeb M, Dhraief A, Belghith A, Monteil T, Drira K (2017) How to cache in icn-based iot environments? In: 2017 IEEE\/ACS 14th international conference on computer systems and applications (AICCSA), IEEE, pp 1117\u20131124","DOI":"10.1109\/AICCSA.2017.37"},{"key":"3538_CR34","doi-asserted-by":"crossref","unstructured":"Mishra D, Khan A, Tiwari R, Upadhay S (2018) Automated irrigation system-iot based approach. In: 2018 3rd International conference on Internet of Things: smart innovation and usages (IoT-SIU), IEEE, pp 1\u20134","DOI":"10.1109\/IoT-SIU.2018.8519886"},{"issue":"7","key":"3538_CR35","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.3390\/su10072576","volume":"10","author":"MA Naeem","year":"2018","unstructured":"Naeem MA, Ali R, Kim BS, Nor SA, Hassan S (2018) A periodic caching strategy solution for the smart city in information-centric internet of things. Sustainability 10(7):2576","journal-title":"Sustainability"},{"issue":"3","key":"3538_CR36","doi-asserted-by":"publisher","first-page":"694","DOI":"10.3390\/s19030694","volume":"19","author":"QN Nguyen","year":"2019","unstructured":"Nguyen QN, Liu J, Pan Z, Benkacem I, Tsuda T, Taleb T, Shimamoto S, Sato T (2019a) Ppcs: a progressive popularity-aware caching scheme for edge-based cache redundancy avoidance in information-centric networks. Sensors 19(3):694","journal-title":"Sensors"},{"issue":"9","key":"3538_CR37","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIFS.2019.2899247","volume":"14","author":"T Nguyen","year":"2019","unstructured":"Nguyen T, Mai HL, Cogranne R, Doyen G, Mallouli W, Nguyen L, El Aoun M, De Oca EM, Festor O (2019b) Reliable detection of interest flooding attack in real deployment of named data networking. IEEE Trans Inf Forensics Secur 14(9):2470\u20132485","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3538_CR38","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comcom.2019.05.010","volume":"142","author":"B Nour","year":"2019","unstructured":"Nour B, Sharif K, Li F, Biswas S, Moungla H, Guizani M, Wang Y (2019) A survey of internet of things communication using icn: a use case perspective. Comput Commun 142:95\u2013123","journal-title":"Comput Commun"},{"key":"3538_CR39","doi-asserted-by":"crossref","unstructured":"Ong MD, Chen M, Taleb T, Wang X, Leung VC (2014) Fgpc: fine-grained popularity-based caching design for content centric networking. In: Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, pp 295\u2013302","DOI":"10.1145\/2641798.2641837"},{"key":"3538_CR40","doi-asserted-by":"crossref","unstructured":"Psaras I, Chai WK, Pavlou G (2012) Probabilistic in-network caching for information-centric networks. In: Proceedings of the second edition of the ICN workshop on information-centric networking, pp 55\u201360","DOI":"10.1145\/2342488.2342501"},{"key":"3538_CR41","doi-asserted-by":"crossref","unstructured":"Ren J, Qi W, Westphal C, Wang J, Lu K, Liu S, Wang S (2014) Magic: a distributed max-gain in-network caching strategy in information-centric networks. In: 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 470\u2013475","DOI":"10.1109\/INFCOMW.2014.6849277"},{"key":"3538_CR42","doi-asserted-by":"crossref","unstructured":"Rossi D, Rossini G (2012) On sizing ccn content stores by exploiting topological information. In: 2012 Proceedings IEEE INFOCOM workshops, IEEE, pp 280\u2013285","DOI":"10.1109\/INFCOMW.2012.6193506"},{"key":"3538_CR43","doi-asserted-by":"publisher","first-page":"149117","DOI":"10.1109\/ACCESS.2019.2947064","volume":"7","author":"S Shan","year":"2019","unstructured":"Shan S, Feng C, Zhang T, Loo J (2019) Proactive caching placement for arbitrary topology with multi-hop forwarding in icn. IEEE Access 7:149117\u2013149131","journal-title":"IEEE Access"},{"key":"3538_CR44","unstructured":"Shang W, Yu Y, Droms R, Zhang L (2016) Challenges in IoT networking via TCP\/IP architecture. In: Technical report NDN-0038 NDN project"},{"key":"3538_CR45","doi-asserted-by":"crossref","unstructured":"Sourlas V, Paschos GS, Flegkas P, Tassiulas L (2009) Caching in content-based publish\/subscribe systems. In: GLOBECOM 2009-2009 IEEE global telecommunications conference, IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2009.5425532"},{"issue":"4","key":"3538_CR46","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1007\/s11277-015-2867-3","volume":"85","author":"R Tiwari","year":"2015","unstructured":"Tiwari R, Kumar N (2015) Cooperative gateway cache invalidation scheme for internet-based vehicular ad hoc networks. Wirel Pers Commun 85(4):1789\u20131814","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"3538_CR47","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s11235-015-0070-1","volume":"62","author":"R Tiwari","year":"2016","unstructured":"Tiwari R, Kumar N (2016) An adaptive cache invalidation technique for wireless environments. Telecommun Syst 62(1):149\u2013165","journal-title":"Telecommun Syst"},{"key":"3538_CR48","doi-asserted-by":"crossref","unstructured":"Vural S, Navaratnam P, Wang N, Wang C, Dong L, Tafazolli R (2014) In-network caching of internet-of-things data. In: 2014 IEEE International conference on communications (ICC), IEEE, pp 3185\u20133190","DOI":"10.1109\/ICC.2014.6883811"},{"key":"3538_CR49","doi-asserted-by":"crossref","unstructured":"Wang L, Afanasyev A, Kuntz R, Vuyyuru R, Wakikawa R, Zhang L (2012) Rapid traffic information dissemination using named data. In: Proceedings of the 1st ACM workshop on emerging name-oriented mobile networking design-architecture, algorithms, and applications, pp 7\u201312","DOI":"10.1145\/2248361.2248365"},{"issue":"4","key":"3538_CR50","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1145\/2534169.2491727","volume":"43","author":"S Wang","year":"2013","unstructured":"Wang S, Bi J, Wu J (2013) Collaborative caching based on hash-routing for information-centric networking. ACM SIGCOMM Comput Commun Rev 43(4):535\u2013536","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"5","key":"3538_CR51","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1109\/TNET.2015.2480093","volume":"24","author":"S Wang","year":"2015","unstructured":"Wang S, Bi J, Wu J, Vasilakos AV (2015) Cphr: in-network caching for information-centric networking with partitioning and hash-routing. IEEE ACM Trans Netw 24(5):2742\u20132755","journal-title":"IEEE ACM Trans Netw"},{"issue":"1","key":"3538_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-019-0206-5","volume":"9","author":"HT Wu","year":"2019","unstructured":"Wu HT, Cho HH, Wang SJ, Tseng FH (2019) Intelligent data cache based on content popularity and user location for content centric networks. Hum Centric Comput Inf Sci 9(1):1\u201316","journal-title":"Hum Centric Comput Inf Sci"},{"issue":"2","key":"3538_CR53","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/SURV.2013.070813.00063","volume":"16","author":"G Xylomenos","year":"2013","unstructured":"Xylomenos G, Ververidis CN, Siris VA, Fotiou N, Tsilopoulos C, Vasilakos X, Katsaros KV, Polyzos GC (2013) A survey of information-centric networking research. IEEE Commun Surv Tutor 16(2):1024\u20131049","journal-title":"IEEE Commun Surv Tutor"},{"key":"3538_CR54","doi-asserted-by":"publisher","first-page":"8433","DOI":"10.1109\/ACCESS.2017.2694045","volume":"5","author":"H Yan","year":"2017","unstructured":"Yan H, Gao D, Su W, Foh CH, Zhang H, Vasilakos AV (2017) Caching strategy based on hierarchical cluster for named data networking. IEEE Access 5:8433\u20138443","journal-title":"IEEE Access"},{"issue":"4","key":"3538_CR55","doi-asserted-by":"publisher","first-page":"3404","DOI":"10.1109\/JIOT.2020.2969466","volume":"7","author":"S Zhang","year":"2020","unstructured":"Zhang S, Liu J (2020) Optimal probabilistic caching in heterogeneous IoT networks. IEEE Internet Things J 7(4):3404\u20133414","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"3538_CR56","doi-asserted-by":"publisher","first-page":"7955","DOI":"10.1109\/TVT.2020.2994181","volume":"69","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Lung CH, St-Hilaire M, Lambadaris I (2020) Smart proactive caching: empower the video delivery for autonomous vehicles in ICN-based networks. IEEE Trans Veh Technol 69(7):7955\u20137965","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03538-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03538-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03538-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T17:56:01Z","timestamp":1684864561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03538-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,21]]},"references-count":56,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["3538"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03538-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,21]]},"assertion":[{"value":"16 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}