{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:34:59Z","timestamp":1770226499438,"version":"3.49.0"},"reference-count":75,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Network analysis aids management in reducing overall expenditures and maintenance workload. Social media platforms frequently use neural networks to suggest material that corresponds with user preferences. Machine learning is one of many methods for social network analysis. Machine learning algorithms operate on a collection of observable features that are taken from user data. Machine learning and neural network-based systems represent a topic of study that spans several fields. Computers can now recognize the emotions behind particular content uploaded by users to social media networks thanks to machine learning. This study examines research on machine learning and neural networks, with an emphasis on social analysis in the context of the current literature.<\/jats:p>","DOI":"10.3390\/a16060271","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T03:39:36Z","timestamp":1685331576000},"page":"271","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Enhancing Social Media Platforms with Machine Learning Algorithms and Neural Networks"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6503-6739","authenticated-orcid":false,"given":"Hamed","family":"Taherdoost","sequence":"first","affiliation":[{"name":"Department of Arts, Communications and Social Sciences, University Canada West, Vancouver, BC V6B 1V9, Canada"},{"name":"Research and Development Department, Research Club, Hamta Group|Hamta Business Corporation, Vancouver, BC V6E 1C9, Canada"},{"name":"College of Technology and Engineering, Westcliff University, Irvine, CA 92614, USA"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7776","DOI":"10.1109\/ACCESS.2017.2696365","article-title":"Machine learning with big data: Challenges and approaches","volume":"5","author":"Grolinger","year":"2017","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","article-title":"Machine learning: Trends, perspectives, and prospects","volume":"349","author":"Jordan","year":"2015","journal-title":"Science"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1257\/jep.28.2.3","article-title":"Big data: New tricks for econometrics","volume":"28","author":"Varian","year":"2014","journal-title":"J. Econ. Perspect."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1126\/science.aac4420","article-title":"Predicting poverty and wealth from mobile phone metadata","volume":"350","author":"Blumenstock","year":"2015","journal-title":"Science"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1257\/jep.31.2.3","article-title":"The state of applied econometrics: Causality and policy evaluation","volume":"31","author":"Athey","year":"2017","journal-title":"J. Econ. Perspect."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1257\/jep.31.2.87","article-title":"Machine learning: An applied econometric approach","volume":"31","author":"Mullainathan","year":"2017","journal-title":"J. Econ. Perspect."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1177\/0003122416663683","article-title":"Varieties of American popular nationalism","volume":"81","author":"Bonikowski","year":"2016","journal-title":"Am. Sociol. Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1146\/annurev-soc-073014-112445","article-title":"Field experiments across the social sciences","volume":"43","author":"Baldassarri","year":"2017","journal-title":"Annu. Rev. Sociol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1146\/annurev-soc-081715-074206","article-title":"Machine translation: Mining text for social theory","volume":"42","author":"Evans","year":"2016","journal-title":"Annu. Rev. Sociol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11186-014-9216-5","article-title":"The cultural environment: Measuring culture with big data","volume":"43","author":"Bail","year":"2014","journal-title":"Theory Soc."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/0049124118782533","article-title":"Fairness in criminal justice risk assessments: The state of the art","volume":"50","author":"Berk","year":"2021","journal-title":"Sociol. Methods Res."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1257\/aer.p20151023","article-title":"Prediction policy problems","volume":"105","author":"Kleinberg","year":"2015","journal-title":"Am. Econ. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.3389\/fpsyg.2017.01351","article-title":"The relationship between social networking site use and the internalization of a thin ideal in females: A meta-analytic review","volume":"8","author":"Mingoia","year":"2017","journal-title":"Front. Psychol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1111\/sipr.12033","article-title":"Do social network sites enhance or undermine subjective well-being? A critical review","volume":"11","author":"Verduyn","year":"2017","journal-title":"Soc. Issues Policy Rev."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1089\/cyber.2016.0201","article-title":"Instagram use, loneliness, and social comparison orientation: Interact and browse on social media, but don\u2019t compare","volume":"19","author":"Yang","year":"2016","journal-title":"Cyberpsychology Behav. Soc. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1089\/cyber.2014.0560","article-title":"Instagram# instasad?: Exploring associations among instagram use, depressive symptoms, negative social comparison, and strangers followed","volume":"18","author":"Lup","year":"2015","journal-title":"Cyberpsychology Behav. Soc. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.chb.2017.08.021","article-title":"Understanding social media and identity work in young people transitioning to university","volume":"76","author":"Thomas","year":"2017","journal-title":"Comput. Hum. Behav."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"628","DOI":"10.3389\/fpsyg.2018.00628","article-title":"Your co-author received 150 citations: Pride, but not envy, mediates the effect of system-generated achievement messages on motivation","volume":"9","author":"Utz","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.adolescence.2018.09.007","article-title":"Social media social comparison and identity distress at the college transition: A dual-path model","volume":"69","author":"Yang","year":"2018","journal-title":"J. Adolesc."},{"key":"ref_20","first-page":"39","article-title":"La transformaci\u00f3n digital en el sector cooperativo agroalimentario espa\u00f1ol: Situaci\u00f3n y perspectivas","volume":"9","author":"Cebolla","year":"2019","journal-title":"CIRIEC-Espa\u00f1a Rev. De Econ. P\u00fablica Soc. Y Coop."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alegre, R. (2019). Polic\u00edas Comunales y Polic\u00edas Locales: Un Estudio de la Seguridad en Una Ciudad del Interior de la Provincia de Buenos Aires.","DOI":"10.2307\/j.ctvt6rmwh.7"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.14778\/2794367.2794376","article-title":"Real-time targeted influence maximization for online advertisements","volume":"8","author":"Li","year":"2015","journal-title":"Proc. VLDB Endow."},{"key":"ref_23","unstructured":"Song, X., Tseng, B.L., Lin, C.-Y., and Sun, M.-T. (1999, January 15\u201319). Personalized recommendation driven by information flow. Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Berkeley, CA, USA."},{"key":"ref_24","unstructured":"Chen, W., Wang, C., and Wang, Y. (2016, January 13\u201317). Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2337542.2337558","article-title":"Ranking user influence in healthcare social media","volume":"3","author":"Tang","year":"2012","journal-title":"ACM Trans. Intell. Syst. Technol. TIST"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MNET.2016.1500104NM","article-title":"Social influence analysis in social networking big data: Opportunities and challenges","volume":"31","author":"Peng","year":"2016","journal-title":"IEEE Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1109\/TKDE.2013.56","article-title":"A two-level topic model towards knowledge discovery from citation networks","volume":"26","author":"Guo","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_28","unstructured":"Taherdoost, H. (2023). Encyclopedia of Data Science and Machine Learning, IGI Global."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kitchin, R. (2014). The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences, Sage.","DOI":"10.4135\/9781473909472"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.37256\/ccds.5120233284","article-title":"An Overview of Trends in Information Systems: Emerging Technologies that Transform the Information Technology Industry","volume":"4","author":"Taherdoost","year":"2023","journal-title":"Cloud Comput. Data Sci."},{"key":"ref_31","unstructured":"Pramod, A., Naicker, H.S., and Tyagi, A.K. (2021). Computational Analysis and Deep Learning for Medical Care: Principles, Methods, and Applications, John Wiley & Sons, Ltd."},{"key":"ref_32","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_33","unstructured":"Dong, C. The Evolution of Machine Learning. TechCrunch, 18 August 2018."},{"key":"ref_34","unstructured":"Russell, S.J. (2010). Artificial Intelligence A Modern Approach, Pearson Education, Inc."},{"key":"ref_35","unstructured":"Nilsson, N.J. (2009). The Quest for rtificial Intelligence, Cambridge University Press."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., and Marchetti, M. (June, January 30). On the effectiveness of machine and deep learning for cyber security. Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Yavanoglu, O., and Aydos, M. (2017, January 10\u201312). A review on cyber security datasets for machine learning algorithms. Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Beijing, China.","DOI":"10.1109\/BigData.2017.8258167"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Bhamare, D., Salman, T., Samaka, M., Erbad, A., and Jain, R. (2016, January 19\u201322). Feasibility of supervised machine learning for cloud security. Proceedings of the 2016 International Conference on Information Science and Security (ICISS), Pattaya, Thailand.","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"ref_40","unstructured":"Malekian, A., and Chitsaz, N. (2021). Advances in Streamflow Forecasting, Elsevier."},{"key":"ref_41","first-page":"192","article-title":"Intelligent computing system based on pattern recognition and data mining algorithms","volume":"20","author":"Zhang","year":"2018","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"16605","DOI":"10.1038\/s41598-018-35021-2","article-title":"A research on preparation and application of the monolithic catalyst with interconnecting pore structure","volume":"8","author":"Tsai","year":"2018","journal-title":"Sci. Rep."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1007\/s11227-020-03294-y","article-title":"DeepFakE: Improving fake news detection using tensor decomposition-based deep neural network","volume":"77","author":"Kaliyar","year":"2021","journal-title":"J. Supercomput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"45141","DOI":"10.1038\/srep45141","article-title":"Characterisation of mental health conditions in social media using Informed Deep Learning","volume":"7","author":"Gkotsis","year":"2017","journal-title":"Sci. Rep."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Dion\u00edsio, N., Alves, F., Ferreira, P.M., and Bessani, A. (2019, January 14\u201319). Cyberthreat detection from twitter using deep neural networks. Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary.","DOI":"10.1109\/IJCNN.2019.8852475"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Taherdoost, H., and Madanchian, M. (2023). Artificial Intelligence and Sentiment Analysis: A Review in Competitive Research. Computers, 12.","DOI":"10.3390\/computers12020037"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"6679512","DOI":"10.1155\/2021\/6679512","article-title":"Involvement of machine learning tools in healthcare decision making","volume":"2021","author":"Jayatilake","year":"2021","journal-title":"J. Healthc. Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2053951717743530","DOI":"10.1177\/2053951717743530","article-title":"Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data","volume":"4","author":"Veale","year":"2017","journal-title":"Big Data Soc."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1002\/ajim.23262","article-title":"Fragmentation in the future of work: A horizon scan examining the impact of the changing nature of work on workers experiencing vulnerability","volume":"64","author":"Jetha","year":"2021","journal-title":"Am. J. Ind. Med."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"114802","DOI":"10.1016\/j.eswa.2021.114802","article-title":"Detecting abusive Instagram comments in Turkish using convolutional Neural network and machine learning methods","volume":"174","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Komatsu, H., Watanabe, E., and Fukuchi, M. (2021). Psychiatric neural networks and precision therapeutics by machine learning. Biomedicines, 9.","DOI":"10.3390\/biomedicines9040403"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.ssci.2019.05.011","article-title":"Risk early warning safety model for sports events based on back propagation neural network machine learning","volume":"118","author":"Zhang","year":"2019","journal-title":"Saf. Sci."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Song, T., Ding, W., Liu, H., Wu, J., Zhou, H., and Chu, J. (2020). Uncertainty quantification in machine learning modeling for multi-step time series forecasting: Example of recurrent neural networks in discharge simulations. Water, 12.","DOI":"10.3390\/w12030912"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s00146-019-00910-1","article-title":"Interperforming in AI: Question of \u2018natural\u2019 in machine learning and recurrent neural networks","volume":"35","author":"Yalur","year":"2020","journal-title":"AI Soc."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"100190","DOI":"10.1016\/j.tine.2022.100190","article-title":"A machine learning prediction of academic performance of secondary school students using radial basis function neural network","volume":"29","author":"Olabanjo","year":"2022","journal-title":"Trends Neurosci. Educ."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"20539517221111361","DOI":"10.1177\/20539517221111361","article-title":"Toward a sociology of machine learning explainability: Human\u2013machine interaction in deep neural network-based automated trading","volume":"9","author":"Borch","year":"2022","journal-title":"Big Data Soc."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"e23191","DOI":"10.1002\/mmce.23191","article-title":"Multilayer perceptron\u2013random forest based hybrid machine learning\u2013neural network model for GaN high electron mobility transistor\u2019s parameter estimations","volume":"32","author":"Mishra","year":"2022","journal-title":"Int. J. RF Microw. Comput. -Aided Eng."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Cavus, N., Mohammed, Y.B., Gital, A.Y., Bulama, M., Tukur, A.M., Mohammed, D., Isah, M.L., and Hassan, A. (2022). Emotional Artificial Neural Networks and Gaussian Process-Regression-Based Hybrid Machine-Learning Model for Prediction of Security and Privacy Effects on M-Banking Attractiveness. Sustainability, 14.","DOI":"10.3390\/su14105826"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"17018","DOI":"10.1080\/10106049.2022.2120638","article-title":"Novel ensemble of deep learning neural network and support vector machine for landslide susceptibility mapping in Tehri region, Garhwal Himalaya","volume":"37","author":"Saha","year":"2022","journal-title":"Geocarto Int."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"2112","DOI":"10.1021\/acs.jchemed.1c01288","article-title":"Artificial Neural Networks Applied to Colorimetric Nanosensors: An Undergraduate Experience Tailorable from Gold Nanoparticles Synthesis to Optical Spectroscopy and Machine Learning","volume":"99","author":"Revignas","year":"2022","journal-title":"J. Chem. Educ."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"4509575","DOI":"10.1155\/2022\/4509575","article-title":"Research on Innovation Ecosystem of Dairy Industry Cluster Based on Machine Learning and Improved Neural Network","volume":"2022","author":"Hui","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"S34","DOI":"10.3349\/ymj.2022.63.S34","article-title":"Real-Time Exercise Feedback through a Convolutional Neural Network: A Machine Learning-Based Motion-Detecting Mobile Exercise Coaching Application","volume":"63","author":"Park","year":"2022","journal-title":"Yonsei Med. J."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Harrison, D., De Leo, F.C., Gallin, W.J., Mir, F., Marini, S., and Leys, S.P. (2021). Machine learning applications of convolutional neural networks and unet architecture to predict and classify demosponge behavior. Water, 13.","DOI":"10.3390\/w13182512"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1007\/s00779-020-01389-0","article-title":"Supervised machine learning for audio emotion recognition: Enhancing film sound design using audio features, regression models and artificial neural networks","volume":"25","author":"Cunningham","year":"2021","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Zoboroski, L., Wagner, T., and Langhals, B. (2021). Classical and neural network machine learning to determine the risk of marijuana use. Int. J. Environ. Res. Public Health, 18.","DOI":"10.3390\/ijerph18147466"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1007\/s11135-020-01037-y","article-title":"Machine learning, artificial neural networks and social research","volume":"55","author":"Santurro","year":"2021","journal-title":"Qual. Quant."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"100022","DOI":"10.1016\/j.caeai.2021.100022","article-title":"Lecture quality assessment based on the audience reactions using machine learning and neural networks","volume":"2","author":"Mohammadreza","year":"2021","journal-title":"Comput. Educ. Artif. Intell."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Forradellas, R.F.R., Alonso, S.L.N., Rodriguez, M.L., and Jorge-Vazquez, J. (2021). Applied machine learning in social sciences: Neural networks and crime prediction. Soc. Sci., 10.","DOI":"10.3390\/socsci10010004"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1007\/s00357-019-09352-2","article-title":"An Optimal Weight Semi-Supervised Learning Machine for Neural Networks with Time Delay","volume":"37","author":"Lu","year":"2020","journal-title":"J. Classif."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1177\/2042753020901730","article-title":"Impact of the WampServer application in Blended learning considering data science, machine learning, and neural networks","volume":"17","year":"2020","journal-title":"E-Learn. Digit. Media"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"2453","DOI":"10.1007\/s10462-019-09738-z","article-title":"Comparison of support vector machine, back propagation neural network and extreme learning machine for syndrome element differentiation","volume":"53","author":"Yan","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1177\/0016986219867483","article-title":"Machine Learning in Gifted Education: A Demonstration Using Neural Networks","volume":"63","author":"Hodges","year":"2019","journal-title":"Gift. Child Q."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.cose.2019.06.013","article-title":"Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms","volume":"86","author":"Chiba","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1021\/acs.jcim.8b00348","article-title":"Dissecting Machine-Learning Prediction of Molecular Activity: Is an Applicability Domain Needed for Quantitative Structure-Activity Relationship Models Based on Deep Neural Networks?","volume":"59","author":"Liu","year":"2019","journal-title":"J. Chem. Inf. Model."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Niu, W.J., Feng, Z.K., Feng, B.F., Min, Y.W., Cheng, C.T., and Zhou, J.Z. (2019). Comparison of multiple linear regression, artificial neural network, extreme learning machine, and support vector machine in deriving operation rule of hydropower reservoir. Water, 11.","DOI":"10.3390\/w11010088"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/6\/271\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:44:10Z","timestamp":1760125450000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/6\/271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":75,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["a16060271"],"URL":"https:\/\/doi.org\/10.3390\/a16060271","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,29]]}}}