{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:17:38Z","timestamp":1764937058996,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/jiot.2019.2912984","type":"journal-article","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T20:34:18Z","timestamp":1556138058000},"page":"9308-9315","source":"Crossref","is-referenced-by-count":16,"title":["An Innovative Chain Coding Technique for Compression Based on the Concept of Biological Reproduction: An Agent-Based Modeling Approach"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5584-9034","authenticated-orcid":false,"given":"Khaldoon","family":"Dhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6947-0519","authenticated-orcid":false,"given":"Christopher","family":"Cruzen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1190-6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.engstruct.2015.08.034"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.857610"},{"key":"ref32","first-page":"1","article-title":"On genetic algorithm effectiveness for finding behaviors in agent-based predator prey models","author":"olsen","year":"2018","journal-title":"Proc 50th Comput Simulat Conf"},{"journal-title":"NetLogo Wolf Sheep Predation Model","year":"1997","author":"wilensky","key":"ref31"},{"journal-title":"Ants Model","year":"1997","author":"wilensky","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.267"},{"key":"ref36","first-page":"63","article-title":"Re-conceiving introductory computer science curricula through agent-based modeling","volume":"9","author":"stonedahl","year":"2011","journal-title":"Proc EduMAS Workshop AAMAS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67669-2_14"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"ref60","first-page":"3553","article-title":"Analysis and comparison of compression algorithm for light field mask","volume":"12","author":"cho","year":"2017","journal-title":"Int J Appl Eng Res"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351063"},{"key":"ref61","first-page":"75","article-title":"A study on size optimization of scanned textual documents","author":"saraswat","year":"2015","journal-title":"Proc Pac Rim Symp Adv Image Video Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0021(05)02033-2"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/356625.356627"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2189222"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s11676-017-0528-y"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1504\/IJHM.2018.094885"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18564\/jasss.2897"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763534"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.03.024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0149-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0135"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2018.088432"},{"key":"ref23","first-page":"541","article-title":"Reversible natural language watermarking using synonym substitution and arithmetic coding","volume":"55","author":"xiang","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.02.094"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CALCON.2017.8280688"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.02.011"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0923-6_56"},{"journal-title":"Facsimile coding schemes and coding control functions for group 4 facsimile apparatus","year":"1988","key":"ref59"},{"journal-title":"Standardization of Group 3 Facsimile Apparatus for Document Transmission","year":"1980","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/76.735380"},{"year":"1993","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91250-9_34"},{"key":"ref54","first-page":"341","article-title":"Artificial neural networks for surface ozone prediction: Models and analysis","volume":"23","author":"faris","year":"2014","journal-title":"Polish Journal of Environmental Studies"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2954-3"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.conbuildmat.2017.10.132"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1961.5219197"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10674-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0006688400720078"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93701-4_9"},{"journal-title":"NetLogo Rabbits Grass Weeds Model","year":"2001","author":"wilensky","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.24124\/2007\/bpgub462","article-title":"A new highly efficient algorithm for lossless binary image compression","author":"zhou","year":"2007"},{"key":"ref15","first-page":"880","article-title":"On the digital processing and transmission of handwriting and sketching","volume":"77","author":"bons","year":"1977","journal-title":"Proc EUROCON"},{"key":"ref16","first-page":"225","article-title":"An efficient shape coding scheme and its codec design","author":"hwang","year":"2001","journal-title":"Proc IEEE Workshop Signal Process Syst"},{"key":"ref17","first-page":"117","article-title":"A new advanced cryptographic algorithm system for binary codes by means of mathematical equation","volume":"12","author":"ksasy","year":"2018","journal-title":"ICIC Exp Lett"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.patcog.2004.08.017","article-title":"An efficient chain code with huffman coding","volume":"38","author":"liu","year":"2005","journal-title":"Pattern Recognit"},{"key":"ref19","first-page":"1321","article-title":"A new chain coding based method for binary image compression and reconstruction","author":"zahir","year":"2007","journal-title":"Proc Picture Coding Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2017.11.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7179026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2016.06.002"},{"key":"ref5","article-title":"Size judgment and comparison in tag clouds","author":"dhou","year":"2013","journal-title":"In IEEE InfoVis Posters"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2018.1018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07692-8_18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/e20020145"},{"article-title":"Toward a better understanding of viewers&#x2019; perceptions of tag clouds: Relative size judgment","year":"2013","author":"dhou","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2018-0194"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.15.0443"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2017-0292"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-018-9846-0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2046-2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.05.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231071"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231070"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8931267\/08698308.pdf?arnumber=8698308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:11:07Z","timestamp":1657746667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8698308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":65,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2912984","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}