{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:56Z","timestamp":1748751056931,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":12,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226512"},{"type":"electronic","value":"9788132226536"}],"license":[{"start":{"date-parts":[[2015,11,19]],"date-time":"2015-11-19T00:00:00Z","timestamp":1447891200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2653-6_20","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T15:47:51Z","timestamp":1447861671000},"page":"303-320","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection and Three Anomalous Coins Problem"],"prefix":"10.1007","author":[{"given":"Arpan","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Joydeb","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Piyali","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Ankita","family":"Nandy","sequence":"additional","affiliation":[]},{"given":"Rajat Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Ghosh, J., Senmajumdar, P., Maitra, S., Dhal, D., Pal, R.K.: A generalized algorithm for solving n coins problem. In: Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2011), vol. 2, pp. 411\u2013415. Shanghai (2011)","DOI":"10.1109\/CSAE.2011.5952498"},{"issue":"II","key":"20_CR2","first-page":"118","volume":"8","author":"J Ghosh","year":"2011","unstructured":"Ghosh, J., Senmajumdar, P., Maitra, S., Dhal, D., Pal, R.K.: Yet another algorithm for solving n coins problem. Assam Univ. J. Sci. Technol.: Phys. Sci. Technol. 8(II), 118\u2013125 (2011). ISSN: 0975-2773","journal-title":"Assam Univ. J. Sci. Technol.: Phys. Sci. Technol."},{"issue":"3","key":"20_CR3","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0012-365X(83)90123-1","volume":"46","author":"Ratko To\u0161i\u0107","year":"1983","unstructured":"To\u0161i\u0107, R.: Two counterfeit coins. Discrete Math. 46, 295\u2013298 (1983) (North-Holland)","journal-title":"Discrete Mathematics"},{"issue":"2","key":"20_CR4","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1080\/0025570X.1977.11976622","volume":"50","author":"Bennet Manvel","year":"1977","unstructured":"Manvel, B.: Counterfeit coin problems, mathematics magazine, mathematical association of America 50(2), 90\u201392 (1977)","journal-title":"Mathematics Magazine"},{"issue":"2\u20133","key":"20_CR5","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/S0019-9958(61)80002-8","volume":"4","author":"R Bellman","year":"1961","unstructured":"Bellman, R., Gluss, B.: On various versions of the defective coin problem. Inf. Control 4(2\u20133), 118\u2013131 (1961)","journal-title":"Inf. Control"},{"key":"20_CR6","unstructured":"Ghosh, J., Dey, L., Nandy, A., Chakraborty, A., Datta, P., Pal, R.K., Samanta, R.K.: An advanced approach to solve two counterfeit coins problem. Proc. Ann. Pure Appl. Math. 7(1), 77\u201382 (2014). ISSN:2279-087X (P), 2279-0888 (online)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, J., Datta, P., Chakraborty, A., Nandy, A., Dey, L., Pal, R.K., Samanta, R.K.: An endeavour to find two unequal false coins. In: Proceedings of the 8th International Conference on Electrical and Computer Engineering (ICECE 2014), pp. 333\u2013336. Dhaka (2014)","DOI":"10.1109\/ICECE.2014.7026864"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Ghosh, J., Chakraborty, A., Datta, P., Dey, L., Nandy, A., Pal, R.K., Samanta, R.K.: The first algorithm for solving two coins counterfeiting with \u03c9(\u0394H)\u00a0=\u00a0\u03c9(\u0394L). In: Proceedings of the 8th International Conference on Electrical and Computer Engineering (ICECE 2014), pp. 337\u2013340. Dhaka (2014)","DOI":"10.1109\/ICECE.2014.7026874"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ghosh, J., Nandy, A., Dey, L., Datta, P., Chakraborty, A., Pal, R.K., Samanta, R.K.: An algorithm for identifying two unequal heavier \/ lighter coins out of n given coins. In: Proceedings of the 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT2015), pp. 1\u20136. Academy of Technology, West Bengal (2015)","DOI":"10.1109\/C3IT.2015.7060157"},{"key":"20_CR10","unstructured":"Kim, J.H.: Finding Weighted Graphs by Combinatorial Search (2012). arXiv:1201.3793v1 [math.CO]"},{"key":"20_CR11","unstructured":"Lim, E.W.C.: On Anomaly Identification and the Counterfeit Coin Problem (2009) arXiv:0905.0085"},{"key":"20_CR12","doi-asserted-by":"publisher","DOI":"10.1142\/1936","volume-title":"Combinatorial Group Testing and its Applications Series on Applied Mathematics","author":"DZ Du","year":"1993","unstructured":"Du, D.Z., Hwang, F.K.: Combinatorial Group Testing and its Applications Series on Applied Mathematics, vol. 3. World Scientific Publishing Co. Pvt. Ltd., Singapore (1993)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2653-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:45:41Z","timestamp":1748695541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2653-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,19]]},"ISBN":["9788132226512","9788132226536"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2653-6_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,19]]}}}