{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:48:21Z","timestamp":1768013301443,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819773558","type":"print"},{"value":"9789819773565","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7356-5_30","type":"book-chapter","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T20:04:03Z","timestamp":1735416243000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Protection Approach for Coal Miners Safety Helmet Using IoT"],"prefix":"10.1007","author":[{"given":"Shabina","family":"Modi","sequence":"first","affiliation":[]},{"given":"Yogesh","family":"Mali","sequence":"additional","affiliation":[]},{"given":"Lakshmi","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Prajakta","family":"Khairnar","sequence":"additional","affiliation":[]},{"given":"Dnyanesh S.","family":"Gaikwad","sequence":"additional","affiliation":[]},{"given":"Vishal","family":"Borate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,29]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Borate V, Mali Y, Suryawanshi V, Singh S, Dhoke V, Kulkarni A (2023) IoT Based Self Alert Generating Coal Miner Safety Helmets, 2023 International Conference on Computational Intelligence, Networks and Security (ICCINS), Mylavaram, India, pp. 01\u201304. https:\/\/doi.org\/10.1109\/ICCINS58907.2023.10450044","DOI":"10.1109\/ICCINS58907.2023.10450044"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Mali YK, Darekar SA, Sopal S, Kale M, Kshatriya V, Palaskar A (2023) Fault Detection of Underwater Cables by Using Robotic Operating System, 2023 IEEE International Carnahan Conference on Security Technology (ICCST), Pune, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCST59048.2023.10474270","DOI":"10.1109\/ICCST59048.2023.10474270"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Vaidya AO, Dangore M, Borate VK, Raut N, Mali YK, Chaudhari A (2024) Deep Fake Detection for Preventing Audio and Video Frauds Using Advanced Deep Learning Techniques, 2024 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Kothamangalam, Kerala, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/RAICS61201.2024.10689785","DOI":"10.1109\/RAICS61201.2024.10689785"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Bhongade A., Dargad S, Dixit A., Mali YK, Kumari B, Shende A (2024) Cyber Threats in Social Metaverse and Mitigation Techniques. In: Somani AK, Mundra A., Gupta RK, Bhattacharya S, Mazumdar AP (eds) Smart Systems: Innovations in Computing. SSIC 2023. Smart Innovation, Systems and Technologies, vol 392. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-97-3690-4_34","DOI":"10.1007\/978-981-97-3690-4_34"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Shabina M, Sunita M, Sakshi M, Rutuja K, Rutuja J, Sampada M, Yogesh M (2024) Automated Attendance Monitoring System for Cattle through CCTV. Revista Electronica De Veterinaria, 25(1), 1025\u20131034. https:\/\/doi.org\/10.69980\/redvet.v25i1.724","DOI":"10.69980\/redvet.v25i1.724"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Karajgar MD et al. (2024) Comparison of Machine Learning Models for Identifying Malicious URLs, 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, , pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICITEICS61368.2024.10625423","DOI":"10.1109\/ICITEICS61368.2024.10625423"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"Mali Y, Pawar ME, More A, Shinde S, Borate V, Shirbhate R (2023) Improved pin entry method to prevent shoulder surfing attacks. In: 2023 14th international conference on computing communication and networking technologies (ICCCNT), Delhi, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306875","DOI":"10.1109\/ICCCNT56998.2023.10306875"},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"Mali YK, Mohanpurkar A (2015) Advanced pin entry method by resisting shoulder surfing attacks. In: 2015 international conference on information processing (ICIP), Pune, India, pp 37\u201342. https:\/\/doi.org\/10.1109\/INFOP.2015.7489347","DOI":"10.1109\/INFOP.2015.7489347"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Pawar J, Bhosle AA, Gupta P, Mehta Shiyal H, Borate VK, Mali YK (2024) Analyzing Acute Lymphoblastic Leukemia Across Multiple Classes Using an Enhanced Deep Convolutional Neural Network on Blood Smear, 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICITEICS61368.2024.10624915","DOI":"10.1109\/ICITEICS61368.2024.10624915"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Naik DR, Ghonge VD, Thube SM, Khadke A, Mali YK, Borate VK (2024) Software-Defined-Storage Performance Testing Using Mininet, 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICITEICS61368.2024.10625153","DOI":"10.1109\/ICITEICS61368.2024.10625153"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Dangore M, Ghanashyam Chendke ASRA, Shirbhate R, Mali YK, Kisan Borate V (2024) Multi-class Investigation of Acute Lymphoblastic Leukemia using Optimized Deep Convolutional Neural Network on Blood Smear Images, 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Pune, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/MITADTSoCiCon60330.2024.10575245","DOI":"10.1109\/MITADTSoCiCon60330.2024.10575245"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Chaudhari A et al. (2024) Cyber Security Challenges in Social Meta-verse and Mitigation Techniques, 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Pune, India, pp. 1\u20137. https:\/\/doi.org\/10.1109\/MITADTSoCiCon60330.2024.10575295","DOI":"10.1109\/MITADTSoCiCon60330.2024.10575295"}],"container-title":["Lecture Notes in Electrical Engineering","Semantic Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7356-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T21:29:51Z","timestamp":1735421391000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7356-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819773558","9789819773565"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7356-5_30","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Semantic Intelligence Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Braga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isic32023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}