{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:57:41Z","timestamp":1767844661880,"version":"3.49.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002553","name":"Seoul National University of Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002553","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing is represented as a next-generation application AI-based solutions which provide human\u2013machine interaction with personalized interactions and services that imitate human behavior. On the other hand, a large volume of data is generated from smart city applications such as healthcare, smart transportation, retail industry, and firefighting. There is always a concern on how to efficiently manage the large volume of generated data. Recently many existing researches discussed the analysis of the large quantity of data using cognitive computing; however, these researches are failed to handle the certain problems, namely scalability, and flexibility of data gathered in a smart city environment. Data captured from millions of sensors can be cross implemented across various cognitive computing applications to ensure real-time responses. In this paper, we study the cognitive internet of things (CIoT) and propose a CIoT-based smart city network (CIoT-Net) architecture which describes how data gathered from smart city applications can be analyzed using cognitive computing and handle the scalability and flexibility problems. We discuss various technologies such as AI and big data analysis to implement the proposed architecture. Finally, we describe the possible research challenges and opportunities while implementing the proposed architecture.<\/jats:p>","DOI":"10.1186\/s13673-019-0190-9","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:05:00Z","timestamp":1564617900000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":96,"title":["CIoT-Net: a scalable cognitive IoT based smart city network architecture"],"prefix":"10.1186","volume":"9","author":[{"given":"Jin-ho","family":"Park","sequence":"first","affiliation":[]},{"given":"Mikail Mohammed","family":"Salim","sequence":"additional","affiliation":[]},{"given":"Jeong Hoon","family":"Jo","sequence":"additional","affiliation":[]},{"given":"Jose Costa Sapalo","family":"Sicato","sequence":"additional","affiliation":[]},{"given":"Shailendra","family":"Rathore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"190_CR1","doi-asserted-by":"publisher","first-page":"19774","DOI":"10.1109\/ACCESS.2018.2791469","volume":"6","author":"M Chen","year":"2018","unstructured":"Chen M, Herrera F, Hwang K (2018) Cognitive computing: architecture, technologies and intelligent applications. IEEE Access 6:19774\u201319783","journal-title":"IEEE Access"},{"issue":"6","key":"190_CR2","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1007\/s11036-018-1113-0","volume":"23","author":"M Alhussein","year":"2018","unstructured":"Alhussein M, Muhammad G, Hossain MS, Amin SU (2018) Cognitive IoT-cloud integration for smart healthcare: case study for epileptic seizure detection and monitoring. Mob Netw Appl 23(6):1624\u20131635","journal-title":"Mob Netw Appl"},{"key":"190_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.ijinfomgt.2018.06.005","volume":"42","author":"S Gupta","year":"2018","unstructured":"Gupta S, Kar AK, Baabdullah A, Al-Khowaiter WA (2018) Big data with cognitive computing: a review for the future. Int J Inf Manag 42:78\u201389","journal-title":"Int J Inf Manag"},{"key":"190_CR4","doi-asserted-by":"publisher","first-page":"78238","DOI":"10.1109\/ACCESS.2018.2884906","volume":"6","author":"H Xu","year":"2018","unstructured":"Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial internet of things: a cyber-physical systems perspective. IEEE Access 6:78238\u201378259","journal-title":"IEEE Access"},{"issue":"2","key":"190_CR5","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MIS.2016.34","volume":"31","author":"A Sheth","year":"2016","unstructured":"Sheth A (2016) Internet of things to smart IoT through semantic, cognitive, and perceptual computing. IEEE Intell Syst 31(2):108\u2013112","journal-title":"IEEE Intell Syst"},{"issue":"42","key":"190_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.inffus.2017.10.001","volume":"1","author":"S Ram\u00edrez","year":"2018","unstructured":"Ram\u00edrez S, Fern\u00e1ndez A, Garc\u00eda S, Chen M, Herrera F (2018) Big data: tutorial and guidelines on information and process fusion for analytics algorithms with MapReduce. Inf Fusion 1(42):51\u201361","journal-title":"Inf Fusion"},{"key":"190_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.adhoc.2016.06.010","volume":"57","author":"O Bello","year":"2017","unstructured":"Bello O, Zeadally S, Badra M (2017) Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT). Ad Hoc Netw 57:52\u201362","journal-title":"Ad Hoc Netw"},{"key":"190_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2011.6069711","volume":"49","author":"X Li","year":"2011","unstructured":"Li X, Lu R, Liang Z, Shen X, Chen J, Lin X (2011) Smart community: an internet of things application. IEEE Commun Mag 49:68\u201375","journal-title":"IEEE Commun Mag"},{"key":"190_CR9","doi-asserted-by":"crossref","unstructured":"Cui A, Stolfo SJ (2010) A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: Proceedings of the 26th annual computer security applications conference. Austin","DOI":"10.1145\/1920261.1920276"},{"key":"190_CR10","unstructured":"Wu M, Lu T, Ling F, Sun J, Hui-Ying Du (2010) Research on the architecture of Internet of Things. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE), Chengdu"},{"key":"190_CR11","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2013.6525602","volume":"51","author":"P Vlacheas","year":"2013","unstructured":"Vlacheas P, Giaffreda R, Stavroulaki V, Kelaidonis D, Foteinos V, Poulios G, Demestichas P, Somov A, Biswas AR, Moessner K (2013) Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun Mag 51:102\u2013111","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"190_CR12","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"issue":"38","key":"190_CR13","first-page":"8","volume":"1","author":"M Ammar","year":"2018","unstructured":"Ammar M, Russello G, Crispo B (2018) Internet of Things: a survey on the security of IoT frameworks. J Inf Secur Appl 1(38):8\u201327","journal-title":"J Inf Secur Appl"},{"key":"190_CR14","first-page":"151","volume":"9","author":"M Zhang","year":"2012","unstructured":"Zhang M, Zhao H, Zheng R, Wu Q, Wei W (2012) Cognitive internet of things: concepts and application example. Int J Comput Sci Issues (IJCSI) 9:151","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"190_CR15","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s13673-017-0113-6","volume":"7","author":"J Vanus","year":"2017","unstructured":"Vanus J, Belesova J, Martinek R, Nedoma J, Fajkus M, Bilik P, Zidek J (2017) Monitoring of the daily living activities in smart home care. Hum-Centric Comput Inf Sci 7:30","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"190_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TAMD.2013.2277589","volume":"6","author":"S Franklin","year":"2014","unstructured":"Franklin S, Madl T, D\u2019mello S, Snaider J (2014) LIDA: a systems-level architecture for cognition, emotion, and learning. IEEE Trans Auton Ment Dev 6:19\u201341","journal-title":"IEEE Trans Auton Ment Dev"},{"key":"190_CR17","doi-asserted-by":"crossref","unstructured":"Zucker G, Habib U, Bl\u00f6chle M, Wendt A, Schaat S, Siafara LC (2015) Building energy management and data analytics. In: 2015 international symposium on smart electric distribution systems and technologies (EDST), Vienna","DOI":"10.1109\/SEDST.2015.7315253"},{"key":"190_CR18","doi-asserted-by":"publisher","first-page":"20557","DOI":"10.1109\/ACCESS.2017.2751586","volume":"5","author":"M Chen","year":"2017","unstructured":"Chen M, Miao Y, Hao Y, Hwang K (2017) Narrow band internet of things. IEEE Access 5:20557\u201320577","journal-title":"IEEE Access"},{"key":"190_CR19","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/T-AFFC.2013.14","volume":"4","author":"R Reisenzein","year":"2013","unstructured":"Reisenzein R, Hudlicka E, Dastani M, Gratch J, Hindriks K, Lorini E, Meyer JJ (2013) Computational modeling of emotion: toward improving the inter-and intradisciplinary exchange. IEEE Trans Affect Comput 4:246\u2013266","journal-title":"IEEE Trans Affect Comput"},{"key":"190_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIC.2009.143","volume":"14","author":"G Kortuem","year":"2009","unstructured":"Kortuem G, Kawsar F, Sundramoorthy V, Fitton D (2009) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14:44\u201351","journal-title":"IEEE Internet Comput"},{"key":"190_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2011.6069709","volume":"49","author":"L Foschini","year":"2011","unstructured":"Foschini L, Taleb T, Corradi A, Bottazzi D (2011) M2\u00a0M-based metropolitan platform for IMS-enabled road traffic management in IoT. IEEE Commun Mag 49:50\u201357","journal-title":"IEEE Commun Mag"},{"key":"190_CR22","doi-asserted-by":"publisher","first-page":"1911","DOI":"10.1109\/JIOT.2018.2883490","volume":"6","author":"L Li","year":"2018","unstructured":"Li L, Ghasemi A (2018) IoT enabled machine learning for an algorithmic spectrum decision process. IEEE Internet Things J 6:1911\u20131919","journal-title":"IEEE Internet Things J"},{"key":"190_CR23","doi-asserted-by":"crossref","unstructured":"Bhattacharya A, Ploennigs J, Culler D. (2015) Short paper: analyzing metadata schemas for buildings: The good, the bad, and the ugly. In: Proceedings of the 2nd ACM international conference on embedded systems for energy-efficient built environments, Seoul","DOI":"10.1145\/2821650.2821669"},{"key":"190_CR24","first-page":"73","volume":"9","author":"L Wei","year":"2015","unstructured":"Wei L, Yong-feng C, Ya L (2015) Information systems security assessment based on system dynamics. Int J Secur Appl 9:73\u201384","journal-title":"Int J Secur Appl"},{"key":"190_CR25","unstructured":"Fierro G, Culler DE (2015) XBOS: an extensible building operating system. In: Proceedings of the 2nd ACM international conference on embedded systems for energy-efficient built environments, Seoul"},{"key":"190_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCE.2018.2816745","volume":"7","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Rathore S, Park JH (2018) DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electron Mag 7:55\u201364","journal-title":"IEEE Consum Electron Mag"},{"key":"190_CR27","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jmsy.2018.01.003","volume":"48","author":"J Wang","year":"2018","unstructured":"Wang J, Ma Y, Zhang L, Gao RX, Wu D (2018) Deep learning for smart manufacturing: methods and applications. J Manuf Syst 48:144\u2013156","journal-title":"J Manuf Syst"},{"key":"190_CR28","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu Q, Li P, Zhao W, Cai W, Yu S, Leung VC (2018) A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6:12103\u201312117","journal-title":"IEEE Access"},{"key":"190_CR29","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1016\/j.drudis.2017.08.010","volume":"22","author":"L Zhang","year":"2017","unstructured":"Zhang L, Tan J, Han D, Zhu H (2017) From machine learning to deep learning: progress in machine intelligence for rational drug discovery. Drug Discov Today 22:1680\u20131685","journal-title":"Drug Discov Today"},{"key":"190_CR30","doi-asserted-by":"publisher","first-page":"27091","DOI":"10.1109\/ACCESS.2017.2777827","volume":"5","author":"ND Nguyen","year":"2017","unstructured":"Nguyen ND, Nguyen T, Nahavandi S (2017) System design perspective for human-level agents using deep reinforcement learning: a survey. IEEE Access 5:27091\u201327102","journal-title":"IEEE Access"},{"key":"190_CR31","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","volume":"34","author":"K Arulkumaran","year":"2017","unstructured":"Arulkumaran K, Deisenroth MP, Brundage M, Bharath AA (2017) Deep reinforcement learning: a brief survey. IEEE Signal Process Mag 34:26\u201338","journal-title":"IEEE Signal Process Mag"},{"key":"190_CR32","doi-asserted-by":"crossref","unstructured":"Wang Y (2016) Deep reasoning and thinking beyond deep learning by cognitive robots and brain-inspired systems. In: 2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), Palo Alto","DOI":"10.1109\/ICCI-CC.2016.7862095"},{"issue":"1","key":"190_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MPRV.2017.8","volume":"16","author":"A Schmidt","year":"2017","unstructured":"Schmidt A (2017) Augmenting human intellect and amplifying perception and cognition. IEEE Pervasive Comput 16(1):6\u201310","journal-title":"IEEE Pervasive Comput"},{"key":"190_CR34","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MPUL.2017.2678098","volume":"8","author":"MN Ahmed","year":"2017","unstructured":"Ahmed MN, Toor AS, O\u2019Neil K, Friedland D (2017) Cognitive computing and the future of health care cognitive computing and the future of healthcare: the cognitive power of IBM Watson has the potential to transform global personalized medicine. IEEE Pulse 8:4\u20139","journal-title":"IEEE Pulse"},{"key":"190_CR35","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.neucom.2016.12.043","volume":"230","author":"Y Sun","year":"2017","unstructured":"Sun Y, Wen G (2017) Cognitive facial expression recognition with constrained dimensionality reduction. Neurocomputing 230:397\u2013408","journal-title":"Neurocomputing"},{"key":"190_CR36","doi-asserted-by":"crossref","unstructured":"Dilokthanakul N, Kaplanis C, Pawlowski N, Shanahan M. (2019) Feature control as intrinsic motivation for hierarchical reinforcement learning. IEEE Trans Neural Netw Learn Syst 1\u201310","DOI":"10.1109\/TNNLS.2019.2891792"},{"key":"190_CR37","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1016\/j.jpdc.2014.01.003","volume":"74","author":"K Kambatla","year":"2014","unstructured":"Kambatla K, Kollias G, Kumar V, Grama A (2014) Trends in big data analytics. J Parallel Distrib Comput 74:2561\u20132573","journal-title":"J Parallel Distrib Comput"},{"key":"190_CR38","doi-asserted-by":"crossref","unstructured":"Ogiela MR, Ogiela L (2016) On using cognitive models in cryptography. In 2016 IEEE 30th international conference on advanced information networking and applications (AINA) IEEE, Crans-Montana","DOI":"10.1109\/AINA.2016.159"},{"key":"190_CR39","first-page":"151","volume":"2","author":"RT Bedeley","year":"2018","unstructured":"Bedeley RT, Ghoshal T, Iyer LS, Bhadury J (2018) Business analytics and organizational value chains: a relational mapping. J Comput Inf Syst 2:151\u2013161","journal-title":"J Comput Inf Syst"},{"key":"190_CR40","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1016\/j.clinthera.2015.12.001","volume":"38","author":"Y Chen","year":"2016","unstructured":"Chen Y, Argentinis JE, Weber G (2016) IBM Watson: how cognitive computing can be applied to big data challenges in life sciences research. Clin Ther 38:688\u2013701","journal-title":"Clin Ther"},{"key":"190_CR41","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.ijinfomgt.2017.07.012","volume":"37","author":"MY Santos","year":"2017","unstructured":"Santos MY, e S\u00e1 JO, Andrade C, Lima FV, Costa E, Costa C, Martinho B, Galv\u00e3o J (2017) A big data system supporting bosch braga industry 4.0 strategy. Int J Inf Manag 37:750\u2013760","journal-title":"Int J Inf Manag"},{"key":"190_CR42","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/17538947.2016.1239771","volume":"2","author":"C Yang","year":"2017","unstructured":"Yang C, Huang Q, Li Z, Liu K, Hu F (2017) Big data and cloud computing: innovation opportunities and challenges. Int J Digit Earth 2:13\u201353","journal-title":"Int J Digit Earth"},{"key":"190_CR43","doi-asserted-by":"crossref","unstructured":"Palmer C, Lazik P, Buevich M, Gao J, Berges M, Rowe A, Pereira RL, Martin C, Mortar IO (2014) A concrete building automation system: Demo abstract. In: Proceedings of the 1st ACM conference on embedded systems for energy-efficient buildings, Memphis","DOI":"10.1145\/2674061.2675035"},{"key":"190_CR44","doi-asserted-by":"crossref","unstructured":"Gan G, Lu Z, Jiang J (2011) Internet of things security analysis. In: 2011 International conference on internet technology and applications, Wuhan","DOI":"10.1109\/ITAP.2011.6006307"},{"key":"190_CR45","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bdr.2015.01.006","volume":"2","author":"X Jin","year":"2015","unstructured":"Jin X, Wah BW, Cheng X, Wang Y (2015) Significance and challenges of big data research. Big Data Res 2:59\u201364","journal-title":"Big Data Res"},{"key":"190_CR46","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.neucom.2017.01.026","volume":"237","author":"L Zhou","year":"2017","unstructured":"Zhou L, Pan S, Wang J, Vasilakos AV (2017) Machine learning on big data: opportunities and challenges. Neurocomputing 237:350\u2013361","journal-title":"Neurocomputing"},{"key":"190_CR47","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55:122\u2013129","journal-title":"IEEE Commun Mag"},{"key":"190_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-018-0146-5","volume":"8","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Ryu JH, Park KY, Park JH, Park JH (2018) Li-Fi based on security cloud framework for future IT environment. Hum-Cent Comput Inf Sci 8:1\u201313","journal-title":"Hum-Cent Comput Inf Sci"},{"key":"190_CR49","first-page":"9","volume":"174","author":"C Li","year":"2015","unstructured":"Li C (2015) Big data technology and smart city development: a combination of technology and management perspective. J Tianjin Admin Inst 174:9\u201345","journal-title":"J Tianjin Admin Inst"},{"key":"190_CR50","first-page":"1","volume":"3","author":"S Arora","year":"2018","unstructured":"Arora S, Agarwal M (2018) Empowerment through big data: issues & challenges. Int J Sci Res Comput Sci Eng Inf Technol 3:1\u20139","journal-title":"Int J Sci Res Comput Sci Eng Inf Technol"},{"key":"190_CR51","first-page":"262","volume":"63","author":"K Bili\u0144ska-Reformat","year":"2017","unstructured":"Bili\u0144ska-Reformat K, Reformat B (2017) Knowledge about customer behaviour as the basis for development of loyalty programmes of retail chains. Organ Cult Leadersh Impact Safety Progr Change Model 63:262","journal-title":"Organ Cult Leadersh Impact Safety Progr Change Model"},{"key":"190_CR52","first-page":"184","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. JIPS 13:184\u2013195","journal-title":"JIPS"},{"key":"190_CR53","first-page":"1361","volume":"14","author":"NY Kim","year":"2018","unstructured":"Kim NY, Rathore S, Ryu JH, Park JH, Park JH (2018) A survey on cyber-physical system security for IoT: issues, challenges, threats, solutions. J Inf Process Syst 14:1361\u20131384","journal-title":"J Inf Process Syst"},{"key":"190_CR54","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCSVT.2016.2539698","volume":"27","author":"L Zhou","year":"2017","unstructured":"Zhou L (2017) QoE-driven delay announcement for cloud mobile media. IEEE Trans Circuits Syst Video Technol 27:84\u201394","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-019-0190-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T11:44:28Z","timestamp":1627645468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-019-0190-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["190"],"URL":"https:\/\/doi.org\/10.1186\/s13673-019-0190-9","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,1]]},"assertion":[{"value":"1 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"29"}}