{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:05:02Z","timestamp":1757628302749,"version":"3.44.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031983597"},{"type":"electronic","value":"9783031983603"}],"license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-98360-3_5","type":"book-chapter","created":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T17:40:47Z","timestamp":1756662047000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure System to Detect Animal Intrusion and Notify Users in a Farmland"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2706-2239","authenticated-orcid":false,"given":"Karmel","family":"Arockiasamy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3682-1337","authenticated-orcid":false,"given":"R. A.","family":"Arun Santhosh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5639-8166","authenticated-orcid":false,"given":"S.","family":"Josiga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3531-7675","authenticated-orcid":false,"given":"Yanamadala Sai","family":"Chakrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Sheik Mohammed, S., Sheela, T., Muthumanickam, T.: Development of animal-detection system using modified CNN algorithm. In: Proceedings of the 2022 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), pp. 249\u2013253 (2022)","DOI":"10.1109\/ICAISS55157.2022.10011014"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Sumathi, R., Raveena, P., Rakshana, P., Nigila, P., Mahalakshmi, P.: Real-time protection of farmlands from animal intrusion. In: Proceedings of the 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), pp. 365\u2013370 (2022)","DOI":"10.1109\/AIC55036.2022.9848808"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Mohd Zainordin, M.S., Saon, S., Mahamad, A.K., Khuzairi, N.U., Ahmadon, M.A.B., Yamaguchi, S.: Intruder motion detection with notification system. In: Proceedings of the 2023 IEEE Global Conference on Consumer Electronics (GCCE), pp. 1\u20135 (2023)","DOI":"10.1109\/GCCE59613.2023.10315658"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Uma, J., Shobana, M., Abhiniti, G., Rahul, R., Kavinkumar, S.P., Roshan, S.H.: IoT-based smart farmland using deep learning. In: Proceedings of the 2024 2nd International Conference on Emerging Trends in Intelligent Computing and Informatics (ETIC), pp. 1\u20136 (2024)","DOI":"10.1109\/AIMLA59606.2024.10531335"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chitra, K., Tamilarasi, A., Pyingkodi, M., Nanthini, K., Sneka, V., Swetha, S.: Animals detection system in the farm area using IoT. In: Proceedings of the 2023 IEEE International Conference on Advances in Computing, Communication and Control (ICAC3), pp. 50\u201355 (2023)","DOI":"10.1109\/ICCCI56745.2023.10128557"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Begum, M.H., Janeera, D.A., Kumar, A.G.: Internet of things-based wild animal infringement identification, diversion, and alert system. In: Proceedings of the 2020 IEEE International Conference on Advances in Computing, Communication and Engineering (ICACCE), pp. 315\u2013319 (2020)","DOI":"10.1109\/ICICT48043.2020.9112433"},{"key":"5_CR7","unstructured":"Chandralekha, E., Thiruselvan, P., Ravikumar, S., Vijay, K.: Animal intrusion detection system: Protected crops and promoted safety using machine learning. In: Proceedings of the 2023 IEEE International Conference on Artificial Intelligence, Machine Learning and Data Science (AIMLDS), pp. 112\u2013116 (2023)"},{"key":"5_CR8","unstructured":"Sathesh, A., Vishnu, K., Yuvaneshwar, A., Vellaisamy, V., Gowthami, K.: Image processing-based protection of crops from wild animals using intelligent surveillance. In: Proceedings of the 2023 IEEE International Conference on Computing and Communication Technologies (ICCCT), pp. 215\u2013220 (2023)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Usharani, S., Gayathri, K., Rajarajeswari, S., Kishore, D.S., Depuru, S.: IoT-based animal trespass identification and prevention system for smart agriculture. In: Proceedings of the 2023 IEEE International Conference on Smart Agriculture and Technology (ICSAT), pp. 167\u2013172 (2023)","DOI":"10.1109\/ICICCS56967.2023.10142814"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Penukonda, S., Terence, S., Basil, S.: Deep learning-based animal intrusion detection system. In: Proceedings of the 4th International Conference on Artificial Intelligence and Smart Energy (ICAIS 2024), pp. 170\u2013181 (2024)","DOI":"10.1007\/978-3-031-61471-2_12"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, A., Sharma, S., Mangal, M.: Automated animal intrusion detection: a deep learning approach. Adaptive Intelligence (InCITe 2024), pp. 195\u2013208. Springer (2025)","DOI":"10.1007\/978-981-97-9045-6_17"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Sajithra Varun, S., Nagarajan, G.: DeepAID: a design of smart animal intrusion detection and classification using deep hybrid neural networks. Soft Computing (2023)","DOI":"10.1007\/s00500-023-08270-1"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10586-024-04888-4","volume":"28","author":"QM Alzubi","year":"2025","unstructured":"Alzubi, Q.M., Sanjalawe, Y., Makhadmeh, S.N., Fakhouri, H.N.: An enhanced method for intrusion detection systems in IoT environment. Clust. Comput. 28, 257 (2025)","journal-title":"Clust. Comput."},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Barhate, M., et al.: Wild animal detection system on a farm using image processing. In: Raj, G., Unhelker, B., Choudhary, A. (eds.) Advances in Artificial Intelligence and Machine Learning. ICAAAIML 2023. LNEE, vol. 1264. Springer, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-97-9507-9_27","DOI":"10.1007\/978-981-97-9507-9_27"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Dhar, P., Mandal, R.K.: Wildlife detection using ANN and other modern technology: a survey of literatures. In: Proceedings of the International Conference on Computational Technologies and Electronics (ICCTE 2023), pp. 31\u201344. Springer (2025)","DOI":"10.1007\/978-3-031-81935-3_3"}],"container-title":["IFIP Advances in Information and Communication Technology","Computational Intelligence in Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-98360-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T06:10:15Z","timestamp":1757484615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-98360-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"ISBN":["9783031983597","9783031983603"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-98360-3_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025,9,1]]},"assertion":[{"value":"1 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 February 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccids2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccids.in\/ICCIDS2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}