{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:55:03Z","timestamp":1725814503331},"publisher-location":"New Delhi","reference-count":14,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_24","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"303-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Classification of Error-Correcting Coded Data Using Multidimensional Feature Vectors"],"prefix":"10.1007","author":[{"given":"Rajesh","family":"Asthana","sequence":"first","affiliation":[]},{"given":"Anand","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Ratan","sequence":"additional","affiliation":[]},{"given":"Neelam","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"24_CR1","volume-title":"The Theory of Error-Correcting Codes","author":"FJ MacWilliams","year":"1992","unstructured":"MacWilliams, F.J., Sloane, N.J.: The Theory of Error-Correcting Codes. Elsevier Science, North-Holland (1992)"},{"key":"24_CR2","volume-title":"Introduction to Cryptography with Coding Theory","author":"W Trappe","year":"2006","unstructured":"Trappe, W., Washington, L.C.: Introduction to Cryptography with Coding Theory. Pearson Prentice Hall, Upper Saddle River (2006)"},{"key":"24_CR3","volume-title":"Information Theory, Coding and Cryptography","author":"R Bose","year":"2008","unstructured":"Bose, R.: Information Theory, Coding and Cryptography. McGraw-Hill, New York (2008)"},{"key":"24_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-8534-6","volume-title":"Recognition of Patterns: Using Frequency of Binary Words","author":"PW Beker","year":"1978","unstructured":"Beker, P.W.: Recognition of Patterns: Using Frequency of Binary Words. Springer, New York (1978)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/S0167-8655(00)00054-4","volume":"21","author":"S Kant","year":"2001","unstructured":"Kant, S., Verma, N.: An effective source recognition algorithm: Extraction of significant binary words. Pattern Recogn. Lett. 21, 981\u2013988 (2001)","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"24_CR6","first-page":"329","volume":"13","author":"S Kant","year":"2010","unstructured":"Kant, S., Verma, V., Verma, N., Das, B.K.: Identification scheme for romanized Indian languages from their plain and ciphered bit stream. J. Disc. Math. Sci. Crypt. 13(4), 329\u2013345 (2010)","journal-title":"J. Disc. Math. Sci. Crypt."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Maiya, D., Ratan, R., Bhateja, A. K., Bhateja, A.: Multimedia classification using ANN approach. In: Proceedings of SocProS 2012, Springer\u2019s AISC 236, pp. 905\u2013910 (2014)","DOI":"10.1007\/978-81-322-1602-5_96"},{"issue":"1\u20132","key":"24_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0166-218X(00)00353-X","volume":"111","author":"A Valembois","year":"2001","unstructured":"Valembois, A.: Detection and recognition of a binary linear code. Disc. Appl. Math 111(1\u20132), 199\u2013218 (2001)","journal-title":"Disc. Appl. Math"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.3390\/e15051705","volume":"15","author":"J Zhou","year":"2013","unstructured":"Zhou, J., Huang, Z., Liu, C., Su, S., Zhang, Y.: Information dispersion entropy based blind recognition of binary BCH codes in soft decision situations. J. Entropy 15, 1705\u20131725 (2013)","journal-title":"J. Entropy"},{"key":"24_CR10","volume-title":"Pattern Recognition: Statistical, Structural and Neural Approaches","author":"R Schalkoff","year":"1992","unstructured":"Schalkoff, R.: Pattern Recognition: Statistical, Structural and Neural Approaches. Wiley, Hoboken (1992)"},{"key":"24_CR11","unstructured":"Tou, J.T., Gonzalez, R.C.: Pattern Recognition Principles. Addison-Wesley, Reading (1974)"},{"key":"24_CR12","volume-title":"Pattern Recognition","author":"B Sing-Tze","year":"1984","unstructured":"Sing-Tze, B.: Pattern Recognition. Marcel Dekker Inc., New York (1984)"},{"key":"24_CR13","volume-title":"Pattern Classification","author":"RO Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley Interscience, Hoboken (2001)"},{"key":"24_CR14","volume-title":"Pattern Recognition","author":"S Theodoridis","year":"1999","unstructured":"Theodoridis, S., Kourtroumbas, K.: Pattern Recognition. Academic Press, Waltham (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T02:07:13Z","timestamp":1559095633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}