{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:42:21Z","timestamp":1768822941353,"version":"3.49.0"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T00:00:00Z","timestamp":1551139200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s40860-019-00073-2","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T06:22:06Z","timestamp":1551162126000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Flooding disaster resilience information framework for smart and connected communities"],"prefix":"10.1007","volume":"5","author":[{"given":"Sathish A. P.","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shaowu","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Vivek","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Hallstrom","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,26]]},"reference":[{"key":"73_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00778-003-0108-y","volume":"13","author":"A Adi","year":"2004","unstructured":"Adi A, Etzion O (2004) Amit\u2014the situation manager. VLDB J 13:177\u2013203","journal-title":"VLDB J"},{"key":"73_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.0016-7363.2005.00671.x","volume":"38","author":"L Anselin","year":"2005","unstructured":"Anselin L, Syabri I, Kho Y (2005) GeoDa: an introduction to spatial data analysis. Geogr Anal 38:5\u201322","journal-title":"Geogr Anal"},{"key":"73_CR3","volume-title":"Designing geodatabases: case studies in GIS data modeling","author":"D Arctur","year":"2004","unstructured":"Arctur D, Zeiler M (2004) Designing geodatabases: case studies in GIS data modeling. ESRI Press, Redlands"},{"key":"73_CR4","unstructured":"Baheti R, Gill H (2011) Cyber-physical systems. In: The impact of control technology, pp 161\u2013166"},{"key":"73_CR5","doi-asserted-by":"crossref","unstructured":"Bansal N, Koudas N (2007) Blogscope: spatio-temporal analysis of the blogosphere. In: Proceedings of the 16th international conference on World Wide Web, pp 1269\u20131270","DOI":"10.1145\/1242572.1242802"},{"key":"73_CR6","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.1002\/hyp.7424","volume":"23","author":"S Balica","year":"2009","unstructured":"Balica S, Wright NG (2009) A network of knowledge on applying an indicator-based methodology for minimizing flood vulnerability. Hydrol Process 23:2983\u20132986","journal-title":"Hydrol Process"},{"key":"73_CR7","unstructured":"Bao S, Yu Z, Xu J, Yan T, Pietrafesa L, Gayes P (2016) An easy to implement method to couple weather research and forecast (WRF) with other geophysical models and its application on simulating a northwest pacific typhoon. Environ Model Softw"},{"key":"73_CR8","unstructured":"Booij N, Holthuijsen LH, Ris RC (1996) The \u201cSWAN\u201d wave model for shallow water. In: Coast engineering proceeding"},{"key":"73_CR9","doi-asserted-by":"crossref","unstructured":"Beach A, Gartrell M, Xing X, Han R, Lv Q, Mishra S, Seada K (2010) Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the eleventh workshop on mobile computing systems & applications, pp 60\u201365","DOI":"10.1145\/1734583.1734599"},{"key":"73_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jocs.2010.12.007","volume":"2","author":"J Bollen","year":"2011","unstructured":"Bollen J, Mao H, Zeng X (2011) Twitter mood predicts the stock market. J Comput Sci 2:1\u20138","journal-title":"J Comput Sci"},{"key":"73_CR11","doi-asserted-by":"crossref","unstructured":"Chae H, Kim DH, Jeong D, In H (2006) A situation aware personalization in ubiquitous mobile computing environments. In: Emerging directions in embedded and ubiquitous computing, pp 213\u2013223","DOI":"10.1007\/11807964_22"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Daniel F, Casati F, Soi S, Fox J, Zancarli D, Shan MC (2009) Hosted universal integration on the web: the mashart platform. In: Service-oriented computing, pp 647\u2013648","DOI":"10.1007\/978-3-642-10383-4_51"},{"key":"73_CR13","unstructured":"Delft, Hydraulics (2006) Delft3D-FLOW user manual. Delft, the Netherlands"},{"key":"73_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1207\/S15327051HCI16234_02","volume":"16","author":"AK Dey","year":"2001","unstructured":"Dey AK, Abowd GD, Salber D (2001) A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum Comput Interact 16:97\u2013166","journal-title":"Hum Comput Interact"},{"key":"73_CR15","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.eswa.2007.09.061","volume":"36","author":"YH Feng","year":"2009","unstructured":"Feng YH, Teng TH, Tan AH (2009) Modelling situation awareness for context-aware decision support. Expert Syst Appl 36:455\u2013463","journal-title":"Expert Syst Appl"},{"key":"73_CR16","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s11069-011-9825-5","volume":"58","author":"S Fuchs","year":"2011","unstructured":"Fuchs S, Kuhlicke C, Meyer V (2011) Editorial for the special issue: vulnerability to natural hazards\u2014the challenge of integration. Nat Hazards 58:609\u2013619","journal-title":"Nat Hazards"},{"key":"73_CR17","doi-asserted-by":"crossref","unstructured":"Gao M, Singh VK, Jain R (2012) EventShop: From heterogeneous web streams to personalized situation detection and control. In: Proceedings of the ACM international conference on web science","DOI":"10.1145\/2380718.2380733"},{"key":"73_CR18","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1038\/nature07634","volume":"457","author":"J Ginsberg","year":"2008","unstructured":"Ginsberg J, Mohebbi MH, Patel RS, Brammer L, Smolinski MS, Brilliant L (2008) Detecting influenza epidemics using search engine query data. Nature 457:1012\u20131014","journal-title":"Nature"},{"key":"73_CR19","doi-asserted-by":"crossref","unstructured":"Girolami M, Lenzi S, Furfari F, Chessa S (2008) Sail: A sensor abstraction and integration layer for context awareness. In: Software engineering and advanced applications, 2008. SEAA\u201908. 34th Euromicro conference, pp 374\u2013381","DOI":"10.1109\/SEAA.2008.30"},{"key":"73_CR20","volume-title":"Environmental modeling with GIS","author":"MF Goodchild","year":"1993","unstructured":"Goodchild MF, Parks BO, Steyaert LT (1993) Environmental modeling with GIS. Oxford University Press, New York"},{"key":"73_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1107499.1107503","volume":"34","author":"J Gray","year":"2005","unstructured":"Gray J, Liu DT, Nieto-Santisteban M, Szalay A, DeWitt DJ, Heber G (2005) Scientific data management in the coming decade. ACM SIGMOD Rec 34:34\u201341","journal-title":"ACM SIGMOD Rec"},{"key":"73_CR22","volume-title":"Matrix algebra from a statistician\u2019s perspective","author":"DA Harville","year":"2008","unstructured":"Harville DA (2008) Matrix algebra from a statistician\u2019s perspective. Springer, Berlin"},{"key":"73_CR23","doi-asserted-by":"crossref","unstructured":"Henricksen K, Indulska J, McFadden T, Balasubramaniam S (2005) Middleware for distributed context-aware systems. In: On the move to meaningful internet systems 2005: CoopIS, DOA, and ODBASE, pp 846\u2013863","DOI":"10.1007\/11575771_53"},{"key":"73_CR24","first-page":"137","volume":"2007","author":"B Hore","year":"2007","unstructured":"Hore B, Jafarpour H, Jain R, Ji S, Massaguer D, Mehrotra S, Venkatasubramanian N, Westermann U (2007) Design and implementation of a middleware for sentient spaces. Intell Secur Inf IEEE 2007:137\u2013144","journal-title":"Intell Secur Inf IEEE"},{"key":"73_CR25","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s11069-011-9823-7","volume":"58","author":"G Hufschmidt","year":"2011","unstructured":"Hufschmidt G (2011) A comparative analysis of several vulnerability concepts. Nat Hazards 58:621\u2013643","journal-title":"Nat Hazards"},{"key":"73_CR26","unstructured":"Jadhav A, Purohit H, Kapanipathi P, Ananthram P, Ranabahu A, Nguyen V, Mendes PN, Smith AG, Cooney M, Sheth A (2010) Twitris 2.0: Semantically empowered system for understanding perceptions from social data. In: Proceedings of the semantic web challenge 2010"},{"key":"73_CR27","unstructured":"Jakobson JB, Lewis L (2006) A framework of cognitive situation modeling and recognition. In: Military communications conference, 2006. MILCOM 2006. IEEE, 2006, pp 1\u20137"},{"key":"73_CR28","first-page":"209","volume":"2009","author":"L Jia","year":"2009","unstructured":"Jia L, Lin L, Wei C (2009) \u201cThe research and application on streaming data of GIS data mining,\u201d in Database Technology and Applications. First Int Workshop 2009:209\u2013212","journal-title":"First Int Workshop"},{"key":"73_CR29","doi-asserted-by":"crossref","unstructured":"Jones CB, Purves R, Ruas A, Sanderson M, Sester M, Van Kreveld M, Weibel R (2002) Spatial information retrieval and geographical ontologies an overview of the SPIRIT project. In: Proceedings of the 25th annual international ACM SIGIR conference on research and development in information retrieval, 2002, pp 387\u2013388","DOI":"10.1145\/564376.564457"},{"key":"73_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4015-8","volume-title":"Foundations of modern probability","author":"O Kallenberg","year":"2002","unstructured":"Kallenberg O (2002) Foundations of modern probability. Springer, Berlin"},{"key":"73_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/1467-985X.00186","volume":"164","author":"M Kulldorff","year":"2001","unstructured":"Kulldorff M (2001) Prospective time periodic geographical disease surveillance using a scan statistic. J R Stat Soc Ser A (Stat Soc) 164:61\u201372","journal-title":"J R Stat Soc Ser A (Stat Soc)"},{"key":"73_CR32","volume-title":"Remote sensing and image interpretation","author":"TM Lillesand","year":"2004","unstructured":"Lillesand TM, Kiefer RW, Chipman JW (2004) Remote sensing and image interpretation. Wiley, Oxford"},{"key":"73_CR33","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1017\/S0269888905000263","volume":"19","author":"SW Loke","year":"2004","unstructured":"Loke SW (2004) Representing and reasoning with situations for context-aware pervasive computing: a logic programming perspective. Knowl Eng Rev 19:213\u2013234","journal-title":"Knowl Eng Rev"},{"key":"73_CR34","volume-title":"Web mapping illustrated: using open source GIS toolkits","author":"T Mitchell","year":"2005","unstructured":"Mitchell T (2005) Web mapping illustrated: using open source GIS toolkits. O\u2019Reilly Media, Newton"},{"key":"73_CR35","unstructured":"Nazari Shirehjini A (2006) Situation modelling: a domain analysis and user study. In: Intelligent environments, 2006. IE 06. 2nd IET international conference on, 2006, pp 193\u2013199"},{"key":"73_CR36","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/S0926-5805(03)00057-8","volume":"12","author":"AA Oloufa","year":"2003","unstructured":"Oloufa AA, Ikeda M, Oda H (2003) Situational awareness of construction equipment using GPS, wireless and web technologies. Autom Constr 12:737\u2013748","journal-title":"Autom Constr"},{"key":"73_CR37","doi-asserted-by":"crossref","unstructured":"Popovich VV, Pankin AV, Voronin MN, Sokolova LA (2006) Intelligent situation awareness on a GIS basis. In: Military communications conference, 2006. IEEE, pp 1\u20137","DOI":"10.1109\/MILCOM.2006.302395"},{"key":"73_CR38","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/953460.953490","volume":"46","author":"B Rao","year":"2003","unstructured":"Rao B, Minakakis L (2003) Evolution of mobile location-based services. Commun ACM 46:61\u201365","journal-title":"Commun ACM"},{"key":"73_CR39","doi-asserted-by":"crossref","unstructured":"Ratkiewicz J, Michael C, Mark M, Bruno G, Snehal P, Alessandro F, Filippo M (2011) Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th international conference companion on World Wide Web, ACM, pp 249\u2013252","DOI":"10.1145\/1963192.1963301"},{"key":"73_CR40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2008.4481348","volume":"46","author":"R Roman","year":"2008","unstructured":"Roman R, Lopez J, Gritzalis S (2008) Situation awareness mechanisms for wireless sensor networks. Commun Mag IEEE 46:102\u2013107","journal-title":"Commun Mag IEEE"},{"key":"73_CR41","doi-asserted-by":"crossref","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: Real-time event detection by social sensors. In: Proceedings of the 19th international conference on World Wide Web, 2010, pp 851\u2013860","DOI":"10.1145\/1772690.1772777"},{"key":"73_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355063","volume-title":"Managing rescue and relief operations using wireless mobile ad hoc technology, the best way?","author":"L Khoukhi","year":"2009","unstructured":"Khoukhi L, Cherkaoui S, Ga\u00efti D (2009) Managing rescue and relief operations using wireless mobile ad hoc technology, the best way?. IEEE LCN On-MOVE, Switzerland"},{"key":"73_CR43","doi-asserted-by":"crossref","unstructured":"Xu J, Wang S, Su S, Kumar SAP, Wu C (2016) Latent interest and topic mining on user-item bipartite networks. In: 2016 IEEE international conference on services computing (SCC), pp 778\u2013781. IEEE","DOI":"10.1109\/SCC.2016.105"},{"key":"73_CR44","doi-asserted-by":"crossref","unstructured":"Xu B, Kumar SA (2015) Big data analytics framework for system health monitoring. In: Big data (BigData Congress), 2015 IEEE international congress on, pp 401\u2013408. IEEE","DOI":"10.1109\/BigDataCongress.2015.66"},{"key":"73_CR45","unstructured":"Xu B, Kumar S (2015) A text mining classification framework and its experiments using aviation datasets"},{"key":"73_CR46","unstructured":"Alampalayam SP, Kumar A (2004) Predictive security model using data mining. In: Global telecommunications conference, 2004. GLOBECOM\u201904. IEEE, vol 4, pp 2208\u20132212. IEEE"},{"key":"73_CR47","doi-asserted-by":"crossref","unstructured":"Alampalayam SP, Kumar A (2003) Security model for routing attacks in mobile ad hoc networks. In: Vehicular technology conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, vol 3, pp 2122\u20132126. IEEE","DOI":"10.1109\/VETECF.2003.1285399"},{"issue":"10","key":"73_CR48","first-page":"333","volume":"7","author":"S Kumar","year":"2007","unstructured":"Kumar S, Kumar A, Srinivasan S (2007) Statistical based intrusion detection framework using six sigma technique. IJCSNS 7(10):333","journal-title":"IJCSNS"},{"issue":"3","key":"73_CR49","first-page":"1","volume":"4","author":"S Alampalayam","year":"2008","unstructured":"Alampalayam S, Natsheh EF (2008) Multivariate fuzzy analysis for Mobile ad hoc Network threat Detection. IJBDCN 4(3):1\u201330","journal-title":"IJBDCN"},{"key":"73_CR50","unstructured":"Duran J, Kumar SAP (2011) CUDA based multi-objective parallel genetic algorithms: adapting evolutionary algorithms for document searches. In: Proceedings of the international conference on information and knowledge engineering (IKE). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p 1"},{"issue":"1","key":"73_CR51","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.pmcj.2011.01.004","volume":"8","author":"J Ye","year":"2012","unstructured":"Ye J, Dobson S, McKeever S (2012) Situation identification techniques in pervasive computing: a review. Pervas Mob Comput 8(1):36\u201366","journal-title":"Pervas Mob Comput"},{"issue":"3","key":"73_CR52","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/s11036-012-0409-8","volume":"18","author":"A Coronato","year":"2013","unstructured":"Coronato A, De Pietro G (2013) Situation awareness in applications of ambient assisted living for cognitive impaired people. Mob Netw Appl 18(3):444\u2013453","journal-title":"Mob Netw Appl"},{"key":"73_CR53","doi-asserted-by":"crossref","unstructured":"McCarthy J (1963) Situations, actions, and causal laws. No. AI-MEMO-2. Stanford Univ CA Dept of Computer Science","DOI":"10.21236\/AD0785031"},{"key":"73_CR54","doi-asserted-by":"crossref","unstructured":"Coronato A, De Florio V, Bakhouya M, Serugendo G (2012) Formal modeling of socio-technical collective adaptive systems. In: Self-adaptive and self-organizing systems workshops (SASOW), 2012 IEEE sixth international conference on, pp 187\u2013192. IEEE","DOI":"10.1109\/SASOW.2012.40"},{"key":"73_CR55","doi-asserted-by":"crossref","DOI":"10.1201\/b11371","volume-title":"Designing for situation awareness: an approach to user-centered design","author":"MR Endsley","year":"2016","unstructured":"Endsley MR (2016) Designing for situation awareness: an approach to user-centered design. CRC, Oxford"},{"issue":"4","key":"73_CR56","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.cogsys.2005.09.001","volume":"7","author":"R Sun","year":"2006","unstructured":"Sun R, Zhang X, Mathews R (2006) Modeling meta-cognition in a cognitive architecture. Cognit Syst Res 7(4):327\u2013338","journal-title":"Cognit Syst Res"},{"issue":"10","key":"73_CR57","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.neucom.2013.06.009","volume":"123","author":"K Subramanian","year":"2014","unstructured":"Subramanian K, Savitha R, Suresh S (2014) A complex-valued neuro-fuzzy inference system and its learning mechanism. Neurocomputing 123(10):110\u2013120","journal-title":"Neurocomputing"},{"issue":"4","key":"73_CR58","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.12732\/ijpam.v107i4.20","volume":"107","author":"K Asaithambi","year":"2016","unstructured":"Asaithambi K, Nagoor Gani A (2016) Performance of self-organized and metacognitive neuro fuzzy system for traffic flow prediction. Int J Pure Appl Math 107(4):1025\u20131036","journal-title":"Int J Pure Appl Math"},{"issue":"1","key":"73_CR59","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.asoc.2012.08.047","volume":"13","author":"G Sateesh Babu","year":"2013","unstructured":"Sateesh Babu G, Suresh S (2013) Meta-cognitive RBF network and its projection based learning algorithm for classification problems. Appl Soft Comput 13(1):654\u2013666","journal-title":"Appl Soft Comput"},{"key":"73_CR60","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.compedu.2003.12.019","volume":"44","author":"S Yeh","year":"2005","unstructured":"Yeh S, Lo J (2005) Assessing metacognitive knowledge in web-based CALL: a neural network approach. Comput Educ 44:97\u2013113","journal-title":"Comput Educ"},{"issue":"3","key":"73_CR61","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1080\/09528130600926066","volume":"18","author":"ML Anderson","year":"2006","unstructured":"Anderson ML et al (2006) The metacognitive loop I: enhancing reinforcement learning with metacognitive monitoring and control for improved perturbation tolerance. J Exp Theor Artif Intell 18(3):387\u2013411","journal-title":"J Exp Theor Artif Intell"},{"issue":"06","key":"73_CR62","doi-asserted-by":"publisher","first-page":"1250028","DOI":"10.1142\/S0129065712500281","volume":"22","author":"K Subramanian","year":"2012","unstructured":"Subramanian K, Suresh K (2012) Human action recognition using meta-cognitive neuro-fuzzy inference system. Int J Neural Syst 22(06):1250028","journal-title":"Int J Neural Syst"},{"issue":"5","key":"73_CR63","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1162\/NECO_a_00254","volume":"24","author":"R Savitha","year":"2012","unstructured":"Savitha R, Suresh S, Sundararajan N (2012) Meta-cognitive learning in a fully complex-valued radial basis function neural network. Neural Comput 24(5):1297\u20131328","journal-title":"Neural Comput"},{"key":"73_CR64","doi-asserted-by":"crossref","unstructured":"Paisner M, Perlis D, Cox MT (2013) Symbolic anomaly detection and assessment using growing neural gas. In: Proc. of 25th IEEE international conference on tools with artificial intelligence (ICTAI)","DOI":"10.1109\/ICTAI.2013.35"},{"key":"73_CR65","doi-asserted-by":"crossref","unstructured":"L\u00f6ffler A, Klahold J, R\u00fcckert U (1999) Artificial neural networks for autonomous robot control: reflective navigation and adaptive sensor calibration. In: Proc. of the 6th intl conf on neural information processing, Perth, Australia, pp 667\u2013672","DOI":"10.1109\/ICONIP.1999.845675"},{"key":"73_CR66","doi-asserted-by":"crossref","unstructured":"Sateesh Babu G, Xiao-Li L, Suresh S (2016) Meta-cognitive regression neural network for function approximation: application to remaining useful life estimation. In: Proc. of 2016 international joint conference on neural networks (IJCNN)","DOI":"10.1109\/IJCNN.2016.7727831"},{"key":"73_CR67","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s12530-013-9102-9","volume":"5","author":"K Subramanian","year":"2014","unstructured":"Subramanian K, Das A, Suresh S, Savitha R (2014) A meta-cognitive interval type-2 fuzzy inference system and its projection based learning algorithm. Evolv Syst 5:219","journal-title":"Evolv Syst"},{"key":"73_CR68","doi-asserted-by":"crossref","unstructured":"Masci J et al (2011) Stacked convolutional auto-encoders for hierarchical feature extraction. In: Proc. of international conference on artificial neural networks, pp 52\u201359","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"73_CR69","doi-asserted-by":"crossref","unstructured":"Sakurada M, Takehisa Y (2014) Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proc. of the 2nd workshop on machine learning for sensory data analysis, MLSDA, p 4","DOI":"10.1145\/2689746.2689747"},{"key":"73_CR70","doi-asserted-by":"crossref","unstructured":"Sabokrou M et al (2015) Real-time anomaly detection and localization in crowded scenes. In: Proc. of IEEE conference on computer vision and pattern recognition workshops, pp 56\u201362","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"73_CR71","unstructured":"Feng Q et al (2016) Anomaly detection of spectrum in wireless communication via deep autoencoder. In: Proc. of international conference on computer science and its applications, pp 259\u2013265"},{"key":"73_CR72","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.ocemod.2004.08.002","volume":"9","author":"AF Shchepetkin","year":"2005","unstructured":"Shchepetkin AF, McWilliams JC (2005) The regional oceanic modeling system (ROMS): a split-explicit, free-surface, topography-following-coordinate oceanic model. Ocean Model 9:347\u2013404","journal-title":"Ocean Model"},{"key":"73_CR73","unstructured":"Skamarock WC et al (2008) A description of the advanced research WRF Version 3. NCAR Technical Note NCAR\/TN-475\u2009+\u2009STR, p 113"},{"key":"73_CR74","doi-asserted-by":"publisher","first-page":"2246","DOI":"10.3390\/ijgi4042246","volume":"4","author":"B Jongman","year":"2015","unstructured":"Jongman B, Wagemaker J, Romero BR, De Perez EC (2015) Early flood detection for rapid humanitarian response: harnessing near real-time satellite and twitter signals. ISPRS Int J Geo-Inf 4:2246\u20132266","journal-title":"ISPRS Int J Geo-Inf"},{"key":"73_CR75","doi-asserted-by":"crossref","unstructured":"Bao S, Gayes P, Pietrafesa L (2018) The need and rationale for a coastal flood risk index. In: OCEANS 2018 MTS\/IEEE Charleston, IEEE, pp 1\u20134","DOI":"10.1109\/OCEANS.2018.8604927"},{"key":"73_CR76","volume-title":"The revised Atlantic hurricane dataset (HURDAT2)","author":"C Landsea","year":"2015","unstructured":"Landsea C, Franklin J, Beven J (2015) The revised Atlantic hurricane dataset (HURDAT2). NOAA National Hurricane Center, USA"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00073-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00073-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00073-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T19:08:19Z","timestamp":1582657699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00073-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,26]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["73"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00073-2","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,26]]},"assertion":[{"value":"21 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}