{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:11:13Z","timestamp":1742973073006,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030821951"},{"type":"electronic","value":"9783030821968"}],"license":[{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-82196-8_56","type":"book-chapter","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T09:09:10Z","timestamp":1627895350000},"page":"755-770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of a Human Identification Software System in Real Time"],"prefix":"10.1007","author":[{"given":"Askar","family":"Boranbayev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seilkhan","family":"Boranbayev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mukhamedzhan","family":"Amirtaev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Malik","family":"Baimukhamedov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Askar","family":"Nurbekov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,8,3]]},"reference":[{"key":"56_CR1","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. http:\/\/lear.inrialpes.fr\/people\/triggs\/pubs\/Dalal-cvpr05.pdf"},{"key":"56_CR2","unstructured":"Extract HOG Features. https:\/\/www.mathworks.com\/help\/vision\/ref\/extracthogfeatures.html"},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Yang, M., Ahuja, N., Kriegman, D.: Face recognition using kernel eigenfaces. In: Image Processing. IEEE Transactions, vol. 1, pp. 37\u201340 (2000)","DOI":"10.1109\/ICIP.2000.900886"},{"key":"56_CR4","doi-asserted-by":"crossref","unstructured":"Kazemi, V., Josephine, S.: One millisecond face alignment with an ensemble of regression trees. In: CVPR (2014). http:\/\/www.csc.kth.se\/~vahidk\/papers\/KazemiCVPR14.pdf","DOI":"10.1109\/CVPR.2014.241"},{"key":"56_CR5","unstructured":"Facial recognition. https:\/\/ai.nal.vn\/facial-recognition\/"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of CVPR (2015). https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2015\/app\/1A_089.pdf","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"56_CR7","unstructured":"Rudraraju, N., Rajitha, K., Shirisha, K.: Constructing networked, intelligent and adaptable buildings using edge computing. http:\/\/ijrar.com\/upload_issue\/ijrar_issue_20542753.pdf"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection: In: Proceedings of the IEEE Conference Computer Vision and Pattern Recognition, pp. 886\u2013893 (2005)","DOI":"10.1109\/CVPR.2005.177"},{"key":"56_CR9","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. https:\/\/goo.gl\/WLqpHN"},{"key":"56_CR10","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. https:\/\/arxiv.org\/abs\/1512.03385"},{"key":"56_CR11","unstructured":"Face recognition. https:\/\/github.com\/ageitgey\/face_recognition"},{"key":"56_CR12","unstructured":"Howse, J.: OpenCV Computer Vision with Python. Packt Publishing Ltd., UK (2013)"},{"key":"56_CR13","unstructured":"Ullah Khan, R., Zhang, X., Kumar, R.: Analysis of ResNet and GoogleNet models for malware detection. https:\/\/www.researchgate.net\/publication\/327271897_Analysis_of_ResNet_and_GoogleNet_models_for_malware_detection"},{"key":"56_CR14","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: Development of a software system to ensure the reliability and fault tolerance in information systems. J. Eng. Appl. Sci. 13(23), 10080\u201310085 (2018)"},{"key":"56_CR15","unstructured":"Boranbayev, S., Goranin, N., Nurusheva, A.: The methods and technologies of reliability and security of information systems and information and communication infrastructures. J. Theor. Appl. Inf. Technol. 96(18), 6172\u20136188 (2018)"},{"key":"56_CR16","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A.: Development of a software system to ensure the reliability and fault tolerance in information systems based on expert estimates. Adv. Intell. Syst. Comput. 869, 924\u2013935 (2018)","DOI":"10.1007\/978-3-030-01057-7_68"},{"key":"56_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/978-3-319-77028-4_93","volume-title":"Information Technology \u2013 New Generations","author":"A Boranbayev","year":"2018","unstructured":"Boranbayev, A., Boranbayev, S., Yersakhanov, K., Nurusheva, A., Taberkhan, R.: Methods of ensuring the reliability and fault tolerance of information systems. In: Latifi, S. (ed.) Information Technology \u2013 New Generations. AISC, vol. 738, pp. 729\u2013730. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77028-4_93"},{"key":"56_CR18","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A.: Applying the method of diverse redundancy in cloud based systems for increasing reliability. In: The 12th International Conference on Information Technology: New Generations (ITNG 2015). April 13\u201315, 2015, Las Vegas, Nevada, USA, pp. 796\u2013799 (2015)","DOI":"10.1109\/ITNG.2015.145"},{"key":"56_CR19","doi-asserted-by":"crossref","unstructured":"Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: A fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development. Sustainability (Switzerland) 11(2), 424 (2019)","DOI":"10.3390\/su11020424"},{"key":"56_CR20","doi-asserted-by":"crossref","unstructured":"Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica (Netherlands) 30(1), 187\u2013211 (2019)","DOI":"10.15388\/Informatica.2018.203"},{"key":"56_CR21","unstructured":"Boranbayev, A.S., Boranbayev, S.N., Nurusheva, A.M., Yersakhanov, K.B., Seitkulov, Y.N.: Development of web application for detection and mitigation of risks of information and automated systems. Eurasian J. Math. Comput. Appl. 7(1), 4\u201322 (2019)"},{"key":"56_CR22","doi-asserted-by":"crossref","unstructured":"Boranbayev, A.S., Boranbayev, S.N., Nurusheva, A.M., Seitkulov, Y.N., Sissenov, N.M.: A method to determine the level of the information system fault-tolerance. Eurasian J. Math. Comput. Appl. 7(3), 13\u201332 (2019)","DOI":"10.32523\/2306-6172-2019-7-3-13-32"},{"key":"56_CR23","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A., Taberkhan, R.: The development of a software system for solving the problem of data classification and data processing. In: 16th International Conference on Information Technology - New Generations (ITNG 2019), vol. 800, pp. 621\u2013623 (2019)","DOI":"10.1007\/978-3-030-14070-0_90"},{"key":"56_CR24","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K., Seitkulov, Y.: A software system for risk management of information systems. In: Proceedings of the 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT 2018), 17\u201319 October, Almaty, Kazakhstan, pp. 284\u2013289 (2018)","DOI":"10.1109\/ICAICT.2018.8747045"},{"key":"56_CR25","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Boranbayev, A., Altayev, S., Nurbekov, A.: Mathematical model for optimal designing of reliable information systems. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT 2014), Astana, Kazakhstan, October 15\u201317, pp. 123\u2013127 (2014)","DOI":"10.1109\/ICAICT.2014.7035926"},{"key":"56_CR26","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A., Seitkulov, Y.: Application of diversity method for reliability of cloud computing. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT 2014), Astana, Kazakhstan, October 15\u201317, pp.244\u2013248 (2014)","DOI":"10.1109\/ICAICT.2014.7035955"},{"key":"56_CR27","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A.: Analyzing methods of recognition, classification and development of a software system. Adv. Intell. Syst. Comput. 869, 690\u2013702 (2018)","DOI":"10.1007\/978-3-030-01057-7_53"},{"key":"56_CR28","doi-asserted-by":"crossref","unstructured":"Boranbayev, A.S., Boranbayev, S.N.: Development and optimization of information systems for health insurance billing. In: ITNG 2010 - 7th International Conference on Information Technology: New Generations, pp. 1282\u20131284 (2010)","DOI":"10.1109\/ITNG.2010.215"},{"key":"56_CR29","unstructured":"Akhmetova, Z., Zhuzbayev, S., Boranbayev, S., Sarsenov, B.: Development of the system with component for the numerical calculation and visualization of non-stationary waves propagation in solids. Front. Artif. Intell. Appl. 293, 353\u2013359 (2016)"},{"key":"56_CR30","unstructured":"Boranbayev, S.N., Nurbekov, A.B.: Development of the methods and technologies for the information system designing and implementation. J. Theor. Appl. Inf. Technol. 82(2), 212\u2013220 (2015)"},{"key":"56_CR31","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-319-54978-1_39","volume-title":"Information Technology \u2013 New Generations","author":"A Boranbayev","year":"2018","unstructured":"Boranbayev, A., Shuitenov, G., Boranbayev, S.: The method of data analysis from social networks using apache hadoop. In: Latifi, S. (ed.) Information Technology \u2013 New Generations. AISC, vol. 558, pp. 281\u2013288. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-54978-1_39"},{"key":"56_CR32","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/978-3-319-77028-4_99","volume-title":"Information Technology \u2013 New Generations","author":"S Boranbayev","year":"2018","unstructured":"Boranbayev, S., Nurkas, A., Tulebayev, Y., Tashtai, B.: Method of processing big data. In: Latifi, S. (ed.) Information Technology \u2013 New Generations. AISC, vol. 738, pp. 757\u2013758. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77028-4_99"},{"key":"56_CR33","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/978-3-030-39445-5_54","volume-title":"Advances in Information and Communication","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Estimation of the degree of reliability and safety of software systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2020. AISC, vol. 1129, pp. 743\u2013755. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39445-5_54"},{"key":"56_CR34","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-030-39445-5_53","volume-title":"Advances in Information and Communication","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Development of the technique for the identification, assessment and neutralization of risks in information systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2020. AISC, vol. 1129, pp. 733\u2013742. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39445-5_53"},{"key":"56_CR35","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-030-32523-7_22","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2019","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Seitkulov, Y., Nurbekov, A.: Multi criteria method for determining the failure resistance of information system components. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) FTC 2019. AISC, vol. 1070, pp. 324\u2013337. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-32523-7_22"},{"key":"56_CR36","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/978-3-030-22871-2_76","volume-title":"Intelligent Computing","author":"A Boranbayev","year":"2019","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A., Taberkhan, R.: The software system for solving the problem of recognition and classification. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) CompCom 2019. AISC, vol. 997, pp. 1063\u20131074. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22871-2_76"},{"key":"56_CR37","doi-asserted-by":"crossref","unstructured":"Akhmetova, Z., Boranbayev, S., Zhuzbayev, S.: The visual representation of numerical solution for a non-stationary deformation in a solid body. Adv. Intell. Syst. Comput. 448, 473\u2013482 (2016)","DOI":"10.1007\/978-3-319-32467-8_42"},{"key":"56_CR38","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-030-43020-7_87","volume-title":"17th International Conference on Information Technology\u2013New Generations (ITNG 2020)","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Evaluating and applying risk remission strategy approaches to prevent prospective failures in information systems. In: Latifi, S. (ed.) 17th International Conference on Information Technology\u2013New Generations (ITNG 2020). AISC, vol. 1134, pp. 647\u2013651. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43020-7_87"},{"key":"56_CR39","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-43020-7_22","volume-title":"17th International Conference on Information Technology\u2013New Generations (ITNG 2020)","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: A proposed software developed for identifying and reducing risks at early stages of implementation to improve the dependability of information systems. In: Latifi, S. (ed.) 17th International Conference on Information Technology\u2013New Generations (ITNG 2020). AISC, vol. 1134, pp. 163\u2013168. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43020-7_22"},{"key":"56_CR40","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-55187-2_8","volume-title":"Intelligent Systems and Applications","author":"A Boranbayev","year":"2021","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Java based application development for facial identification using OpenCV library. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2020. AISC, vol. 1251, pp. 77\u201385. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55187-2_8"},{"key":"56_CR41","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-030-55190-2_11","volume-title":"Intelligent Systems and Applications","author":"A Boranbayev","year":"2021","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Measures to ensure the reliability of the functioning of information systems in respect to state and critically important information systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2020. AISC, vol. 1252, pp. 139\u2013152. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55190-2_11"},{"key":"56_CR42","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-030-52246-9_28","volume-title":"Intelligent Computing","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A.: Development of a hardware-software system for the assembled helicopter-type UAV prototype by applying optimal classification and pattern recognition methods. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1229, pp. 380\u2013394. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52246-9_28"},{"key":"56_CR43","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-030-52246-9_49","volume-title":"Intelligent Computing","author":"A Boranbayev","year":"2020","unstructured":"Boranbayev, A., Shuitenov, G., Boranbayev, S.: The method of analysis of data from social networks using Rapidminer. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1229, pp. 667\u2013673. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52246-9_49"},{"key":"56_CR44","unstructured":"Boranbayev, A., Boranbayev, S., Yatsenko, Y., Tulebayev, Y.: Methods and software for simulation of optimal renewal of capital assets. J. Theor. Appl. Inf. Technol. (JATIT) 98(21), 3545\u20133558 (2020)"},{"key":"56_CR45","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-77028-4_6","volume-title":"Information Technology \u2013 New Generations","author":"A Boranbayev","year":"2018","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: The modern state and the further development prospects of information security in the republic of Kazakhstan. In: Latifi, S. (ed.) Information Technology \u2013 New Generations. AISC, vol. 738, pp. 33\u201338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77028-4_6"},{"issue":"1","key":"56_CR46","doi-asserted-by":"publisher","first-page":"352","DOI":"10.12693\/APhysPolA.130.352","volume":"130","author":"Z Akhmetova","year":"2016","unstructured":"Akhmetova, Z., Zhuzbaev, S., Boranbayev, S.: The method and software for the solution of dynamic waves propagation problem in elastic medium. Acta Phys. Pol. A 130(1), 352\u2013354 (2016)","journal-title":"Acta Phys. Pol. A"},{"issue":"15","key":"56_CR47","doi-asserted-by":"publisher","first-page":"4365","DOI":"10.1016\/j.apm.2014.12.056","volume":"39","author":"N Hritonenko","year":"2015","unstructured":"Hritonenko, N., Yatsenko, Y., Boranbayev, S.: Environmentally sustainable industrial modernization and resource consumption: Is the Hotelling\u2019s rule too steep? Appl. Math. Model. 39(15), 4365\u20134377 (2015)","journal-title":"Appl. Math. Model."},{"issue":"4","key":"56_CR48","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1080\/0013791X.2020.1716126","volume":"65","author":"Y Yatsenko","year":"2020","unstructured":"Yatsenko, Y., Hritonenko, N., Boranbayev, S.: Non-equal-life asset replacement under evolving technology: a multi-cycle approach. Eng. Econ. 65(4), 339\u2013362 (2020)","journal-title":"Eng. Econ."},{"issue":"1","key":"56_CR49","first-page":"61","volume":"80","author":"SN Boranbayev","year":"2015","unstructured":"Boranbayev, S.N., Nurbekov, A.B.: Construction of an optimal mathematical model of functioning of the manufacturing industry of the republic of Kazakhstan. J. Theor. Appl. Inf. Technol. 80(1), 61\u201374 (2015)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"56_CR50","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/978-3-030-63089-8_39","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2020, Volume 2","author":"A Boranbayev","year":"2021","unstructured":"Boranbayev, A., Boranbayev, S., Muratov, T., Nurbekov, A.: Modeling dependence between air transportation and economic development of countries. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FTC 2020. AISC, vol. 1289, pp. 601\u2013613. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-63089-8_39"},{"key":"56_CR51","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1007\/978-3-030-63092-8_57","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3","author":"A Boranbayev","year":"2021","unstructured":"Boranbayev, A., Boranbayev, S., Seitkulov, Y., Nurbekov, A.: Proposing recommendations for improving the reliability and security of information systems in governmental organizations in the republic of Kazakhstan. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FTC 2020. AISC, vol. 1290, pp. 854\u2013868. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-63092-8_57"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82196-8_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:27:00Z","timestamp":1725553620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82196-8_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,3]]},"ISBN":["9783030821951","9783030821968"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82196-8_56","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,8,3]]},"assertion":[{"value":"3 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}