{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:29:45Z","timestamp":1725838185208},"publisher-location":"New Delhi","reference-count":12,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226512"},{"type":"electronic","value":"9788132226536"}],"license":[{"start":{"date-parts":[[2015,11,19]],"date-time":"2015-11-19T00:00:00Z","timestamp":1447891200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2653-6_18","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T15:47:51Z","timestamp":1447861671000},"page":"271-288","source":"Crossref","is-referenced-by-count":1,"title":["An Algorithm to Solve 3D Guard Zone Computation Problem"],"prefix":"10.1007","author":[{"given":"Ranjan","family":"Mehera","sequence":"first","affiliation":[]},{"given":"Piyali","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Arpan","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"18_CR1","volume-title":"An Introduction to Geographical Information Systems","author":"I Heywood","year":"1998","unstructured":"Heywood, I., Cornelius, S., Carver, S.: An Introduction to Geographical Information Systems. Addison Wesley Longman, New York (1998)"},{"key":"18_CR2","volume-title":"Computational Line Geometry","author":"H Pottmann","year":"1997","unstructured":"Pottmann, H., Wallner, J.: Computational Line Geometry. Springer, Berlin (1997)"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1006\/gmip.1998.0464","volume":"60","author":"I-K Lee","year":"1998","unstructured":"Lee, I.-K., Kimand, M.-S., Elber, G.: Polynomial\/rational approximation of minkowski sum boundary curves (Article No.: IP970464). Graph. Models Image Process. 60(2), 136\u2013165 (1998)","journal-title":"Graph. Models Image Process."},{"key":"#cr-split#-18_CR4.1","doi-asserted-by":"crossref","unstructured":"Mehlhorn, K.: Data Structures and Algorithms 3: Multi-Dimensional Searching and Computational Geometry. Springer (1984)","DOI":"10.1007\/978-3-642-69900-9_2"},{"key":"#cr-split#-18_CR4.2","doi-asserted-by":"crossref","unstructured":"Bajaj, C., Kim, M.-S.: Generation of configuration space obstacles: the case of a moving algebraic curves. Algorithmica 4(2), 157-172 (1989)","DOI":"10.1007\/BF01553884"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/BF02574703","volume":"6","author":"B Chazelle","year":"1991","unstructured":"Chazelle, B.: Triangulating a simple polygon in linear time. Discrete Comput. Geom. 6, 485\u2013524 (1991)","journal-title":"Discrete Comput. Geom."},{"key":"18_CR6","unstructured":"Mehera, R., Chatterjee, S., Pal, R.K., A time-optimal algorithm for guard zone problem. In: Proceedings of 22nd IEEE Region 10 International Conference on Intelligent Information Communication Technologies for Better Human Life (IEEE TENCON 2007), CD: Session: ThCP-P.2 (Computing) (Four pages). Taipei (2007)"},{"issue":"3","key":"18_CR7","first-page":"14","volume":"II","author":"R Mehera","year":"2008","unstructured":"Mehera, R., Chatterjee, S., Pal, R.K.: Yet another linear time algorithm for guard zone problem. Icfai J. Comput. Sci. II(3), 14\u201323 (2008)","journal-title":"Icfai J. Comput. Sci."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Mehera, R., Chakraborty, A., Datta, P., Pal, R.K.: An innovative approach towards detection and exclusion of overlapped regions in guard zone computation. In: Proceedings of 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT 2015), pp. 1\u20136. Academy of Technology, West Bengal (2015)","DOI":"10.1109\/C3IT.2015.7060156"},{"key":"18_CR9","volume-title":"Computer Architecture and Parallel Processing","author":"K Hwang","year":"1984","unstructured":"Hwang, K., Briggs, F.A.: Computer Architecture and Parallel Processing. McGraw-Hill, New York (1984)"},{"key":"18_CR10","isbn-type":"print","volume-title":"Higher Engineering Mathematics","author":"BS Grewal","year":"2005","unstructured":"Grewal, B.S.: Higher Engineering Mathematics, 39th edn. Khanna Publishers, Delhi India (2005). ISBN 81-7409-195-5","ISBN":"http:\/\/id.crossref.org\/isbn\/8174091955","edition":"39"},{"key":"18_CR11","volume-title":"Analytical Geometry and Vector Analysis","author":"JG Chakravorty","year":"2009","unstructured":"Chakravorty, J.G., Ghosh, P.R.: Analytical Geometry and Vector Analysis. U.N. Dhur and Sons Private Ltd., Kolkata (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2653-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T16:08:08Z","timestamp":1559318888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2653-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,19]]},"ISBN":["9788132226512","9788132226536"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2653-6_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,19]]}}}