{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:43:40Z","timestamp":1773805420728,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T00:00:00Z","timestamp":1409702400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13042-014-0295-4","type":"journal-article","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T08:23:27Z","timestamp":1409646207000},"page":"943-952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An emerging hybrid mechanism for information disclosure forecasting"],"prefix":"10.1007","volume":"7","author":[{"given":"Yu-Shan","family":"Hsu","sequence":"first","affiliation":[]},{"given":"Sin-Jin","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,3]]},"reference":[{"key":"295_CR1","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s13042-012-0107-7","volume":"4","author":"EA Abo-Tabl","year":"2013","unstructured":"Abo-Tabl EA (2013) Rough sets and topological spaces based on similarity. Int J Mach Learn Cyber 4:451\u2013458","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.jacceco.2011.06.005","volume":"53","author":"CS Armstrong","year":"2012","unstructured":"Armstrong CS, Balakrishnan K, Cohen D (2012) Corporate governance and the information environment: evidence from state antitakeover laws. J Acc Econ 53:185\u2013204","journal-title":"J Acc Econ"},{"key":"295_CR3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jacceco.2010.10.001","volume":"50","author":"CS Armstrong","year":"2010","unstructured":"Armstrong CS, Guay WR, Weber JP (2010) The role of information and financial reporting in\u00a0corporate governance and debt contracting. J Acc Econ 50:179\u2013234","journal-title":"J Acc Econ"},{"key":"295_CR5","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.1016\/j.patrec.2011.05.011","volume":"32","author":"A \u00c1lvarez-Meza","year":"2011","unstructured":"\u00c1lvarez-Meza A, Valencia-Aguirre J, Daza-Santacoloma G, Castellanos-Dom\u00ednguez G (2011) Global and local choice of the number of nearest neighbors in locally linear embedding. Pattern Recogn Lett 32:2171\u20132217","journal-title":"Pattern Recogn Lett"},{"key":"295_CR4","unstructured":"Ashbaugh H, Collins DW, LaFond R (2004) Corporate governance and the cost of equity capital. Working paper, University of Wisconsin, Madison"},{"key":"295_CR6","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s13042-012-0094-8","volume":"4","author":"D Baumgartner","year":"2013","unstructured":"Baumgartner D, Serpen G (2013) Performance of global\u2013local hybrid ensemble versus boosting and bagging ensembles. Int J Mach Learn Cyber 4:301\u2013317","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR7","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1016\/j.patrec.2012.03.001","volume":"33","author":"F Bellal","year":"2012","unstructured":"Bellal F, Elghazel H, Aussem A (2012) A semi-supervised feature ranking method with ensemble learning. Pattern Recogn Lett 33:1426\u20131433","journal-title":"Pattern Recogn Lett"},{"key":"295_CR8","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24:123\u2013140","journal-title":"Mach Learn"},{"key":"295_CR9","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1016\/j.neucom.2008.01.032","volume":"71","author":"AMP Canuto","year":"2008","unstructured":"Canuto AMP, Santana LEA, Abreu MCC, Xavier JC Jr (2008) An analysis of data distribution in the ClassAge system: an agent-based system for classification tasks. Neurocomputing 71:3319\u20133325","journal-title":"Neurocomputing"},{"key":"295_CR10","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.knosys.2012.10.016","volume":"39","author":"L Chang","year":"2013","unstructured":"Chang L, Zhou Y, Jiang J, Li M, Zhang X (2013) Structure learning for belief rule base expert system: a comparative study. Knowl Based Syst 39:159\u2013172","journal-title":"Knowl Based Syst"},{"key":"295_CR11","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s13042-011-0049-5","volume":"3","author":"BP Chacko","year":"2012","unstructured":"Chacko BP, Vimal Krishnan VR, Raju G, Babu Anto P (2012) Handwritten character recognition using wavelet energy and extreme learning machine. Int J Mach Learn Cyber 3:149\u2013161","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR12","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/S0278-4254(00)00015-6","volume":"19","author":"CJP Chen","year":"2000","unstructured":"Chen CJP, Jaggi B (2000) Association between independent non-executive directors, family control and financial disclosure in Hong Kong. J Acc Public Policy 19:285\u2013310","journal-title":"J Acc Public Policy"},{"key":"295_CR13","doi-asserted-by":"crossref","first-page":"10976","DOI":"10.1016\/j.eswa.2009.02.039","volume":"36","author":"S Chen","year":"2009","unstructured":"Chen S, Wang W, Zuylen H (2009) Construct support vector machine ensemble to detect traffic incident. Expert Syst Appl 36:10976\u201310986","journal-title":"Expert Syst Appl"},{"key":"295_CR14","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.knosys.2012.11.004","volume":"39","author":"YS Chen","year":"2013","unstructured":"Chen YS, Cheng CH (2013) Hybrid models based on\u00a0rough set\u00a0classifiers for setting credit rating decision rules in the global banking industry. Knowl Based Syst 39:224\u2013239","journal-title":"Knowl Based Syst"},{"key":"295_CR15","unstructured":"Craven M, Shavlik J (1996) Extracting tree-structured representation of trained networks. In: Advances in neural information processing systems, MIT Press, Cambridge, p 24\u201330"},{"key":"295_CR16","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1016\/j.neucom.2009.11.038","volume":"73","author":"G Daza-Santacoloma","year":"2010","unstructured":"Daza-Santacoloma G, Acosta-Medina CD, Castellanos-Dom\u00ednguez G (2010) Regularization parameter choice in locally linear embedding. Neurocomputing 73:1595\u20131605","journal-title":"Neurocomputing"},{"key":"295_CR17","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/S0377-2217(98)00255-0","volume":"114","author":"AI Dimitras","year":"1999","unstructured":"Dimitras AI, Slowinski R, Susmaga R, Zopounidis C (1999) Business failure prediction using rough sets. Eur J Oper Res 114:263\u2013280","journal-title":"Eur J Oper Res"},{"key":"295_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-94-015-7975-9_14","volume-title":"Intelligent decision support: handbook of applications and advances of the rough sets theory","author":"D Dubois","year":"1992","unstructured":"Dubois D, Prade H (1992) Putting rough sets and fuzzy sets together. In: Slowinski R (ed) Intelligent decision support: handbook of applications and advances of the rough sets theory. Kluwer Academic Publishers, Dordrecht, pp 203\u2013232"},{"key":"295_CR19","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/S0278-4254(03)00037-1","volume":"22","author":"LL Eng","year":"2003","unstructured":"Eng LL, Mak YT (2003) Corporate governance and voluntary disclosure. J Acc Public Policy 22:325\u2013345","journal-title":"J Acc Public Policy"},{"key":"295_CR20","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s13042-012-0144-2","volume":"4","author":"LH Fang","year":"2013","unstructured":"Fang LH, Li KD, Li JJ (2013) Properties of two types of covering-based rough sets. Int J Mach Learn Cyber. 4:685\u2013691","journal-title":"Int J Mach Learn Cyber."},{"key":"295_CR21","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.neucom.2011.12.062","volume":"116","author":"F Han","year":"2012","unstructured":"Han F, Yao HF, Ling QH (2012) An improved evolutionary extreme learning machine based on particle swarm optimization. Neurocomputing 116:87\u201393","journal-title":"Neurocomputing"},{"key":"295_CR22","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"GB Huang","year":"2011","unstructured":"Huang GB, Wang DH, Lan Y (2011) Extreme learning machines: a survey. Int J Mach Learn Cyber 2:107\u2013122","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR23","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70:489\u2013501","journal-title":"Neurocomputing"},{"key":"295_CR24","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"TK Ho","year":"1998","unstructured":"Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal 20:832\u2013844","journal-title":"IEEE Trans Pattern Anal"},{"key":"295_CR25","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.cag.2007.04.005","volume":"31","author":"S Hou","year":"2007","unstructured":"Hou S, Ramani K (2007) Classifier combination for sketch-based 3D part retrieval. Comput Gr 31:598\u2013609","journal-title":"Comput Gr"},{"key":"295_CR26","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/0304-405X(76)90026-X","volume":"3","author":"MC Jensen","year":"1976","unstructured":"Jensen MC, Meckling WH (1976) Theory of the firm: managerial behavior, agency costs, and ownership structure. J Financ Econ 3:305\u2013360","journal-title":"J Financ Econ"},{"key":"295_CR27","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1111\/j.1540-6261.1993.tb04022.x","volume":"48","author":"M Jensen","year":"1993","unstructured":"Jensen M (1993) The modern industrial revolution, exit, and the failure of internal control systems. J Financ 48:831\u2013880","journal-title":"J Financ"},{"key":"295_CR28","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/s13042-012-0106-8","volume":"4","author":"X Kang","year":"2013","unstructured":"Kang X, Li D (2013) Dependency space, closure system and rough set theory. Int J Mach Learn Cyber 4:595\u2013599","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR29","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.ejor.2009.03.036","volume":"201","author":"HS Kim","year":"2010","unstructured":"Kim HS, Sohn SY (2010) Support vector machines for default prediction of SMEs based on technology credit. Eur J Oper Res 201:838\u2013846","journal-title":"Eur J Oper Res"},{"key":"295_CR30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0304-405X(00)00065-9","volume":"58","author":"R Porta La","year":"2000","unstructured":"La Porta R, Silanes FL, Shleifer AR, Vishny W (2000) Investor protection and corporate governance. J Financ Econ 58:3\u201327","journal-title":"J Financ Econ"},{"key":"295_CR31","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s00521-012-0946-x","volume":"22","author":"Y Lan","year":"2013","unstructured":"Lan Y, Hu Z, Soh YC, Huang GB (2013) An extreme learning machine approach for speaker recognition. Neural Comput Appl 22:417\u2013425","journal-title":"Neural Comput Appl"},{"key":"295_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0194-0","author":"X Liu","year":"2013","unstructured":"Liu X, Qian Y, Liang J (2013) A rule-extraction framework under multigranulation rough sets. Int J Mach Learn Cyber. doi: 10.1007\/s13042-013-0194-0","journal-title":"Int J Mach Learn Cyber"},{"key":"295_CR33","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.knosys.2012.11.003","volume":"39","author":"SJ Lin","year":"2013","unstructured":"Lin SJ, Chang C, Hsu MF (2013) Multiple extreme learning machines for a two-class imbalance corporate life cycle prediction. Knowl Based Syst 39:214\u2013223","journal-title":"Knowl Based Syst"},{"key":"295_CR34","doi-asserted-by":"publisher","unstructured":"Lin SJ, Hsu MF (2014) Enhanced risk management by an emerging multi-agent architecture. Connect Sci. doi: 10.1080\/09540091.2014.908821","DOI":"10.1080\/09540091.2014.908821"},{"key":"295_CR35","unstructured":"Nguyen HS, Nguyen SH (2003) Analysis of stulong data by rough set exploration system (RSES). In: Berka P (ed) Proc. ECML\/PKDD Workshop. p 71\u201382"},{"key":"295_CR36","volume-title":"Benchmarking knowledge-based economy","author":"OECD","year":"1999","unstructured":"OECD (1999) Benchmarking knowledge-based economy. Organization for Economic Cooperation and Development, Paris"},{"key":"295_CR37","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Comput Inf Sci 11:341\u2013356","journal-title":"Int J Comput Inf Sci"},{"key":"295_CR38","doi-asserted-by":"crossref","unstructured":"Pietruszkiewicz W (2008) Dynamical systems and nonlinear Kalman filtering applied in classification. In: Proceedings of 7th IEEE International Conference on Cybernetic Intelligent Systems. p 263\u2013268","DOI":"10.1109\/UKRICIS.2008.4798948"},{"key":"295_CR39","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.jfineco.2010.08.005","volume":"99","author":"R Price","year":"2011","unstructured":"Price R, Rom\u00e1n FJ, Rountree B (2011) The impact of governance reform on performance and transparency. J Financ Econ 99:76\u201396","journal-title":"J Financ Econ"},{"key":"295_CR40","doi-asserted-by":"crossref","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","volume":"290","author":"ST Roweis","year":"2000","unstructured":"Roweis ST, Lawrance KS (2000) Nonlinear dimensionality reduction by locally linear embedding. Science 290:2323\u20132326","journal-title":"Science"},{"key":"295_CR41","first-page":"13","volume":"2","author":"H Sakai","year":"2006","unstructured":"Sakai H, Nakata M (2006) On rough sets based rule generation from tables. Int J Innov Comput I 2:13\u201331","journal-title":"Int J Innov Comput I"},{"key":"295_CR42","unstructured":"Sharkey AJC, Sharkey NE (1997) Diversity, selection and ensembles of artificial neural nets. In: Proc. Third International Conference on Neural Networks and their Applications: IUSPIM Marseilles, France, p 205\u2013212"},{"key":"295_CR43","first-page":"295","volume-title":"Advances in the Dempster\u2013Shafer theory of evidence","author":"A Skowron","year":"1993","unstructured":"Skowron A, Grzymala-Busse JW (1993) From the rough set theory to the evidence theory. In: Fedrizzi M, Kacprzyk J, Yager RR (eds) Advances in the Dempster\u2013Shafer theory of evidence. Wiley, New York, pp 295\u2013305"},{"key":"295_CR44","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1111\/j.1540-6261.1997.tb04820.x","volume":"52","author":"A Shleifer","year":"1997","unstructured":"Shleifer A, Vishny RW (1997) A survey of corporate governance. J Financ 52:737\u2013783","journal-title":"J Financ"},{"key":"295_CR45","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/S0377-2217(01)00259-4","volume":"141","author":"FEH Tay","year":"2002","unstructured":"Tay FEH, Shen L (2002) Economic and financial prediction using rough sets model. Eur J Oper Res 141:641\u2013659","journal-title":"Eur J Oper Res"},{"key":"295_CR46","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0933-3657(03)00056-3","volume":"28","author":"R Wall","year":"2003","unstructured":"Wall R, Cunningham P, Walsh P, Byrne S (2003) Explaining the output of ensembles in medical decision support on a case by case basis. Artif Intell Med 28:191\u2013206","journal-title":"Artif Intell Med"},{"key":"295_CR47","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.knosys.2011.06.020","volume":"26","author":"G Wang","year":"2012","unstructured":"Wang G, Ma J, Huang L, Xu K (2012) Two credit scoring models based on dual strategy ensemble trees. Knowl Based Syst 26:61\u201368","journal-title":"Knowl Based Syst"},{"key":"295_CR48","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.knosys.2012.10.010","volume":"39","author":"F Wang","year":"2012","unstructured":"Wang F, Liang J, Qian Y (2012) Attribute reduction: a dimension incremental strategy. Knowl Based Syst 39:95\u2013108","journal-title":"Knowl Based Syst"},{"key":"295_CR49","doi-asserted-by":"crossref","first-page":"2520","DOI":"10.1016\/j.neucom.2010.12.034","volume":"74","author":"X Wang","year":"2011","unstructured":"Wang X, Chen A, Feng H (2011) Upper integral network with extreme learning mechanism. Neurocomputing 74:2520\u20132525","journal-title":"Neurocomputing"},{"key":"295_CR50","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.neucom.2011.12.046","volume":"102","author":"X Wang","year":"2013","unstructured":"Wang X, Shao Q, Miao Q, Zhai J (2013) Architecture selection for networks trained with extreme learning machine using localized generalization error model. Neurocomputing 102:3\u20139","journal-title":"Neurocomputing"},{"key":"295_CR52","volume-title":"Computer systems that learn","author":"S Weiss","year":"1991","unstructured":"Weiss S, Kulikowski C (1991) Computer systems that learn. Morgan Kaufmann Publishers Inc, USA"},{"key":"295_CR51","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.knosys.2012.04.025","volume":"35","author":"TC Wu","year":"2012","unstructured":"Wu TC, Hsu MF (2012) Credit risk assessment and decision making by a fusion approach. Knowl Based Syst 35:102\u2013110","journal-title":"Knowl Based Syst"},{"key":"295_CR53","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.knosys.2011.08.001","volume":"26","author":"Z Xiao","year":"2012","unstructured":"Xiao Z, Yang X, Pang Y, Dang X (2012) The prediction for listed companies\u2019 financial distress by using multiple prediction methods with rough set and Dempster\u2013Shafer evidence theory. Knowl Based Syst 26:196\u2013206","journal-title":"Knowl Based Syst"},{"key":"295_CR54","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.knosys.2012.07.002","volume":"36","author":"M Xia","year":"2012","unstructured":"Xia M, Zhang Y, Weng L, Ye X (2012) Fashion retailing forecasting based on extreme learning machine with adaptive metrics of inputs. Knowl Based Syst 36:253\u2013259","journal-title":"Knowl Based Syst"},{"key":"295_CR55","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.neucom.2013.01.063","volume":"128","author":"Q Yu","year":"2014","unstructured":"Yu Q, Miche Y, S\u00e9verin E, Lendasse A (2014) Bankruptcy prediction using extreme learning machine and financial expertise. Neurocomputing 128:296\u2013302","journal-title":"Neurocomputing"},{"key":"295_CR56","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1016\/j.imavis.2008.12.009","volume":"27","author":"Y Zhu","year":"2009","unstructured":"Zhu Y, Liu J, Chen S (2009) Semi-random subspace method for face recognition. Image Vis Comput 27:1358\u20131370","journal-title":"Image Vis Comput"},{"key":"295_CR57","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1016\/j.patcog.2005.03.028","volume":"38","author":"QY Zhu","year":"2005","unstructured":"Zhu QY, Qin AK, Suganthan PN, Huang GB (2005) Evolutionary extreme learning machine. Pattern Recogn 38:1759\u20131763","journal-title":"Pattern Recogn"},{"key":"295_CR58","doi-asserted-by":"crossref","first-page":"2541","DOI":"10.1016\/j.neucom.2010.12.041","volume":"74","author":"W Zong","year":"2011","unstructured":"Zong W, Huang GB (2011) Face recognition based on extreme learning machine. Neurocomputing 74:2541\u20132551","journal-title":"Neurocomputing"},{"key":"295_CR59","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.neucom.2012.08.010","volume":"101","author":"W Zong","year":"2013","unstructured":"Zong W, Huang GB, Chen Y (2013) Weighted extreme learning machine for imbalance learning. Neurocomputing 101:229\u2013242","journal-title":"Neurocomputing"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-014-0295-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13042-014-0295-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-014-0295-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-014-0295-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T14:31:16Z","timestamp":1559485876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13042-014-0295-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,3]]},"references-count":59,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["295"],"URL":"https:\/\/doi.org\/10.1007\/s13042-014-0295-4","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,3]]}}}