{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:05:03Z","timestamp":1760709903386},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:00:00Z","timestamp":1557792000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:00:00Z","timestamp":1557792000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"eAsy inteLligent service Platform for Healthy Aging (ALPHA) Project"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s40860-019-00084-z","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T23:31:29Z","timestamp":1557876689000},"page":"105-113","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Risk management for nuclear medical department using reinforcement learning algorithms"],"prefix":"10.1007","volume":"5","author":[{"given":"Giovanni","family":"Paragliola","sequence":"first","affiliation":[]},{"given":"Muddasar","family":"Naeem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,14]]},"reference":[{"issue":"1","key":"84_CR1","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/2168260.2168266","volume":"7","author":"M Bakhouya","year":"2012","unstructured":"Bakhouya M, Campbell R, Coronato A, Pietro Gd, Ranganathan A (2012) Introduction to special section on formal methods in pervasive computing. ACM Trans Auton Adapt Syst 7(1):6:1\u20136:9. \n                    https:\/\/doi.org\/10.1145\/2168260.2168266","journal-title":"ACM Trans Auton Adapt Syst"},{"key":"84_CR2","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/978-1-4614-3535-8_48","volume-title":"Innovations and advances in computer, information, systems sciences, and engineering","author":"M Cinque","year":"2013","unstructured":"Cinque M, Coronato A, Testa A (2013) A failure modes and effects analysis of mobile health monitoring systems. In: Elleithy K, Sobh T (eds) Innovations and advances in computer, information, systems sciences, and engineering. Springer, New York, pp 569\u2013582"},{"key":"84_CR3","doi-asserted-by":"publisher","unstructured":"Coronato A, Paragliola G (2017) A structured approach for the designing of safe aal applications. Exp Syst Appl 85:1\u201313. \n                    https:\/\/doi.org\/10.1016\/j.eswa.2017.04.058\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417417303147\n                    \n                  . Accessed 20 Sept 2018","DOI":"10.1016\/j.eswa.2017.04.058"},{"key":"84_CR4","doi-asserted-by":"publisher","unstructured":"Coronato A, Pietro GD, Gallo L (2008) An agent based platform for task distribution in virtual environments. J Syst Architect 54(9):877\u2013882. \n                    https:\/\/doi.org\/10.1016\/j.sysarc.2008.01.011\n                    \n                  . \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1383762108000386\n                    \n                  . Parallel, Distributed and Network-Based Processing. Accessed 21 Sept 2018","DOI":"10.1016\/j.sysarc.2008.01.011"},{"key":"84_CR5","doi-asserted-by":"publisher","unstructured":"Coronato A, de\u00a0Pietro G, Paragliola G (2013) A monitoring system enhanced by means of situation-awareness for cognitive impaired people. In: Proceedings of the 8th international conference on body area networks, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, BodyNets \u201913, pp 124\u2013127. \n                    https:\/\/doi.org\/10.4108\/icst.bodynets.2013.253551","DOI":"10.4108\/icst.bodynets.2013.253551"},{"issue":"2","key":"84_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s40860-017-0035-0","volume":"3","author":"J Dahmen","year":"2017","unstructured":"Dahmen J, Cook DJ, Wang X, Honglei W (2017) Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats. J Reliable Intell Environ 3(2):83\u201398. \n                    https:\/\/doi.org\/10.1007\/s40860-017-0035-0","journal-title":"J Reliable Intell Environ"},{"issue":"1","key":"84_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s40860-017-0040-3","volume":"3","author":"MdM Gallardo","year":"2017","unstructured":"Gallardo MdM, Lavado L, Panizo L, Titolo L (2017) A constraint-based language for modelling intelligent environments. J Reliable Intell Environ 3(1):55\u201379. \n                    https:\/\/doi.org\/10.1007\/s40860-017-0040-3","journal-title":"J Reliable Intell Environ"},{"issue":"1","key":"84_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40860-017-0043-0","volume":"3","author":"MJ Hornos","year":"2017","unstructured":"Hornos MJ (2017) Application of software engineering techniques to improve the reliability of intelligent environments. J Reliable Intell Environ 3(1):1\u20133. \n                    https:\/\/doi.org\/10.1007\/s40860-017-0043-0","journal-title":"J Reliable Intell Environ"},{"issue":"6","key":"84_CR9","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1162\/neco.1994.6.6.1185","volume":"6","author":"T Jaakkola","year":"1994","unstructured":"Jaakkola T, Jordan MI, Singh SP (1994) On the convergence of stochastic iterative dynamic programming algorithms. Neural Comput 6(6):1185\u20131201. \n                    https:\/\/doi.org\/10.1162\/neco.1994.6.6.1185","journal-title":"Neural Comput"},{"key":"84_CR10","first-page":"285","volume":"16","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG (1998) Reinforcement learning: an introduction. IEEE Trans Neural Netw 16:285\u2013286","journal-title":"IEEE Trans Neural Netw"},{"issue":"2","key":"84_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s40860-017-0036-z","volume":"3","author":"C Vannucchi","year":"2017","unstructured":"Vannucchi C, Diamanti M, Mazzante G, Cacciagrano D, Culmone R, Gorogiannis N, Mostarda L, Raimondi F (2017) Symbolic verification of event\u2013condition\u2013action rules in intelligent environments. J Reliable Intell Environ 3(2):117\u2013130. \n                    https:\/\/doi.org\/10.1007\/s40860-017-0036-z","journal-title":"J Reliable Intell Environ"},{"key":"84_CR12","doi-asserted-by":"crossref","unstructured":"Vincent C, West Sussex U (2010) (ISBN: 9781405192217) Patient safety. Wiley, Amsterdam","DOI":"10.1002\/9781444323856"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00084-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00084-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00084-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T23:17:18Z","timestamp":1589325438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00084-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,14]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["84"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00084-z","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,14]]},"assertion":[{"value":"28 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}