{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:46:09Z","timestamp":1740159969848,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s13198-021-01063-5","type":"journal-article","created":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T09:04:22Z","timestamp":1612170262000},"page":"689-695","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The use of data mining and artificial intelligence technology in art colors and graph and images of computer vision under 6G internet of things communication"],"prefix":"10.1007","volume":"12","author":[{"given":"Ziang","family":"Ye","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5403-7413","authenticated-orcid":false,"given":"Lei","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,1]]},"reference":[{"key":"1063_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"issue":"6","key":"1063_CR2","doi-asserted-by":"publisher","first-page":"617","DOI":"10.3109\/14767058.2014.927862","volume":"28","author":"APA Beck","year":"2015","unstructured":"Beck APA, Araujo Junior E, Leslie ATFS et al (2015) Assessment of fetal lung maturity by ultrasound: objective study using gray-scale histogram. J Matern Fetal Neonatal Med 28(6):617\u2013622","journal-title":"J Matern Fetal Neonatal Med"},{"key":"1063_CR3","first-page":"237","volume":"1","author":"S Chakraborty","year":"2015","unstructured":"Chakraborty S, Karaa WBA, Dey N et al (2015) Image mining framework and techniques: a review. Ann De Dermatologie Et De V\u00e9n\u00e9r\u00e9ologie 1:237\u2013244","journal-title":"Ann De Dermatologie Et De V\u00e9n\u00e9r\u00e9ologie"},{"issue":"8","key":"1063_CR4","first-page":"2544","volume":"36","author":"WZ Dai","year":"2019","unstructured":"Dai WZ, Yang Y (2019) Noise image edge detection based on improved Gauss-Laplace operator. Appl Res Comput 36(8):2544\u20132547","journal-title":"Appl Res Comput"},{"key":"1063_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.procs.2016.05.196","volume":"85","author":"J Deshmukh","year":"2016","unstructured":"Deshmukh J, Bhosle U (2016) Image mining using association rule for medical image dataset. Procedia Comput Sci 85:117\u2013124","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"1063_CR6","doi-asserted-by":"publisher","first-page":"4816","DOI":"10.1109\/JIOT.2020.2969247","volume":"7","author":"W Dong","year":"2020","unstructured":"Dong W, Xu ZH, Li XX et al (2020) Low-cost subarrayed sensor array design strategy for IoT and future 6G applications. IEEE Internet of Things J 7(6):4816\u20134826","journal-title":"IEEE Internet of Things J"},{"key":"1063_CR7","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.future.2018.06.022","volume":"88","author":"R Gharbia","year":"2018","unstructured":"Gharbia R, Hassanien AE, El-Baz AH et al (2018) Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications. Future Gener Comput Syst 88:501\u2013511","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"1063_CR8","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1007\/s00500-014-1541-0","volume":"20","author":"CI Gonzalez","year":"2016","unstructured":"Gonzalez CI, Melin P, Castro JR et al (2016) An improved sobel edge detection method based on generalized type-2 fuzzy logic. Soft Comput 20(2):773\u2013784","journal-title":"Soft Comput"},{"issue":"5","key":"1063_CR9","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1007\/s40846-015-0078-8","volume":"35","author":"WY Hsu","year":"2015","unstructured":"Hsu WY, Chou CY (2015) Medical image enhancement using modified color histogram equalization. J Med Biolog Eng 35(5):580\u2013584","journal-title":"J Med Biolog Eng"},{"issue":"6","key":"1063_CR10","first-page":"957","volume":"8","author":"H Lu","year":"2016","unstructured":"Lu H, Setiono R, Liu H (2016) Effective data mining using neural networks. Knowl Data Eng IEEE Trans 8(6):957\u2013961","journal-title":"Knowl Data Eng IEEE Trans"},{"issue":"10","key":"1063_CR11","first-page":"23547","volume":"8","author":"MM Neto","year":"2018","unstructured":"Neto MM, Filho R, Paulo J et al (2018) Algorithm to detect nitrogen foliar deficiency in bean crops applying digital image processing and data mining. Int J Dev Res 8(10):23547\u201323552","journal-title":"Int J Dev Res"},{"issue":"1","key":"1063_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MSP.2017.2763440","volume":"35","author":"S Nie","year":"2018","unstructured":"Nie S, Zheng M, Ji Q (2018) The deep regression bayesian network and its applications: probabilistic deep learning for computer vision. IEEE Signal Process Mag 35(1):101\u2013111","journal-title":"IEEE Signal Process Mag"},{"key":"1063_CR13","doi-asserted-by":"publisher","first-page":"7716","DOI":"10.1109\/ACCESS.2016.2585661","volume":"4","author":"A Sharmila","year":"2016","unstructured":"Sharmila A, Geethanjali P (2016) DWT based detection of epileptic seizure from EEG signals using naive Bayes and k-NN classifiers. IEEE Access 4:7716\u20137727","journal-title":"IEEE Access"},{"key":"1063_CR14","doi-asserted-by":"publisher","first-page":"24239","DOI":"10.1109\/ACCESS.2018.2828081","volume":"6","author":"Y Tang","year":"2018","unstructured":"Tang Y, Wang H, Guo K et al (2018) Relevant feedback based accurate and intelligent retrieval on capturing user intention for personalized websites. IEEE Access 6:24239\u201324248","journal-title":"IEEE Access"},{"issue":"12","key":"1063_CR15","first-page":"135","volume":"39","author":"YY Yu","year":"2016","unstructured":"Yu YY, Zhang Y, Zhang JS (2016) Research summary of relevant feedback in information retrieval. Inf Stud Theory Appl 39(12):135\u2013139","journal-title":"Inf Stud Theory Appl"},{"issue":"7","key":"1063_CR16","first-page":"242","volume":"6","author":"B Zahradnikova","year":"2015","unstructured":"Zahradnikova B, Duchovicova S, Schreiber P (2015) Image mining: review and new challenges. Int J Adv Comput Sci Appl 6(7):242\u2013246","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"2","key":"1063_CR17","first-page":"160","volume":"25","author":"YP Zhao","year":"2017","unstructured":"Zhao YP (2017) Vehicle target recognition method based on image mining technology. Comput Meas Control 25(2):160\u2013163","journal-title":"Comput Meas Control"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01063-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T05:09:38Z","timestamp":1625807378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01063-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,1]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1063"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01063-5","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2021,2,1]]},"assertion":[{"value":"4 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}