{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T23:03:39Z","timestamp":1778454219688,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819773558","type":"print"},{"value":"9789819773565","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7356-5_35","type":"book-chapter","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T20:04:34Z","timestamp":1735416274000},"page":"435-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Hand Gesture Recognition and Real-Time Voice Translation for the Deaf and Dumb"],"prefix":"10.1007","author":[{"given":"Shabina","family":"Modi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0582-9595","authenticated-orcid":false,"given":"Yogesh","family":"Mali","sequence":"additional","affiliation":[]},{"given":"Rekha","family":"Kotwal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7585-6667","authenticated-orcid":false,"given":"Vishal","family":"Kisan Borate","sequence":"additional","affiliation":[]},{"given":"Prajakta","family":"Khairnar","sequence":"additional","affiliation":[]},{"given":"Apashabi","family":"Pathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,29]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","unstructured":"Vaidya AO, Dangore M, Borate VK, Raut N, Mali YK, Chaudhari (2024) A deep fake detection for preventing audio and video frauds using advanced deep learning techniques. In: 2024 IEEE Recent advances in intelligent computational systems (RAICS), Kothamangalam, Kerala, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/RAICS61201.2024.10689785","DOI":"10.1109\/RAICS61201.2024.10689785"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Karajgar MD (2024) Comparison of machine learning models for identifying malicious URLs. In: 2024 IEEE International conference on information technology, electronics and intelligent communication systems (ICITEICS), Bangalore, India, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICITEICS61368.2024.10625423","DOI":"10.1109\/ICITEICS61368.2024.10625423"},{"key":"35_CR3","doi-asserted-by":"publisher","unstructured":"Naik DR, Ghonge VD, Thube SM, Khadke A, Mali YK, Borate VK (2024) Software-defined-storage performance testing using mininet. In: IEEE International conference on information technology, electronics and intelligent communication systems (ICITEICS), Bangalore, India, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICOEI48184.2020.9143031","DOI":"10.1109\/ICOEI48184.2020.9143031"},{"key":"35_CR4","doi-asserted-by":"publisher","unstructured":"Chaudhari A (2024) Cyber security challenges in social meta-verse and mitigation techniques. In: MIT art, design and technology school of computing international conference (MITADTSoCiCon), Pune, India, pp 1\u20137. https:\/\/doi.org\/10.1109\/MITADTSoCiCon60330.2024.10575295","DOI":"10.1109\/MITADTSoCiCon60330.2024.10575295"},{"key":"35_CR5","doi-asserted-by":"publisher","unstructured":"Mali Y, Pawar ME, More A, Shinde S, Borate V, Shirbhate R (2023) Improved pin entry method to prevent shoulder surfing attacks. In: 14th International conference on computing communication and networking technologies (ICCCNT), Delhi, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306875","DOI":"10.1109\/ICCCNT56998.2023.10306875"},{"key":"35_CR6","doi-asserted-by":"publisher","unstructured":"Modi S, Mali YK, Borate V, Khadke A, Mane S, Patil G (2023) Skin impedance technique to detect hand-glove rupture. In: 2023 OITS International conference on information technology (OCIT), Raipur, India, pp 309\u2013313. https:\/\/doi.org\/10.1109\/OCIT59427.2023.10430992","DOI":"10.1109\/OCIT59427.2023.10430992"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Chaudhari A, Dargad S, Mali YK, Dhend PS, Hande VA, Bhilare SS (2023) A technique for maintaining attribute-based privacy implementing blockchain and machine learning. In: IEEE international Carnahan conference on security technology (ICCST), Pune, India, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICCST59048.2023.10530511","DOI":"10.1109\/ICCST59048.2023.10530511"},{"key":"35_CR8","doi-asserted-by":"publisher","unstructured":"Mali Y, Pawar ME, More A, Shinde S, Borate V, Shirbhate R (2023) Improved pin entry method to prevent shoulder surfing attacks. In: 2023 14th International conference on computing communication and networking technologies (ICCCNT), Delhi, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306875","DOI":"10.1109\/ICCCNT56998.2023.10306875"},{"key":"35_CR9","doi-asserted-by":"publisher","unstructured":"Bhongade A, Dargad S, Dixit A, Mali YK, Kumari B, Shende A (2024) Cyber threats in social metaverse and mitigation techniques. In: Somani AK, Mundra A, Gupta RK, Bhattacharya S, Mazumdar AP (eds) Smart systems: innovations in computing. SSIC 2023. Smart innovation, systems and technologies, vol 392. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-97-3690-4_34","DOI":"10.1007\/978-981-97-3690-4_34"},{"key":"35_CR10","doi-asserted-by":"publisher","unstructured":"Mali YK, Mohanpurkar A (2014) Advanced pin entry method by resisting shoulder surfing attacks. In: 2015 International conference on information processing (ICIP), Pune, India, pp 37\u201342. https:\/\/doi.org\/10.1109\/INFOP.2015.7489347","DOI":"10.1109\/INFOP.2015.7489347"},{"key":"35_CR11","unstructured":"Mali Y, Chapte V (2014) Grid based authentication system. Int J Adv Res Comput Sci Manag Stud 2(10):93\u201399"},{"key":"35_CR12","doi-asserted-by":"publisher","unstructured":"Borate V, Mali Y, Suryawanshi V, Singh S, Dhoke V, Kulkarni A (2023) IoT based self alert generating coal miner safety helmets. In: 2023 International conference on computational intelligence, networks and security (ICCINS), Mylavaram, India, pp 01\u201304. https:\/\/doi.org\/10.1109\/ICCINS58907.2023.10450044","DOI":"10.1109\/ICCINS58907.2023.10450044"},{"key":"35_CR13","doi-asserted-by":"publisher","unstructured":"Mali Y, Sawant N (2023) Smart helmet for coal mining. Int J Adv Res Sci Commun Technol (IJARSCT) 3(1). https:\/\/doi.org\/10.48175\/IJARSCT-8064","DOI":"10.48175\/IJARSCT-8064"},{"key":"35_CR14","doi-asserted-by":"publisher","unstructured":"Pawar J, Bhosle AA, Gupta P, Mehta Shiyal H, Borate VK, Mali YK (2024) Analyzing acute lymphoblastic leukemia across multiple classes using an enhanced deep convolutional neural network on blood smear. In: IEEE International conference on information technology, electronics and intelligent communication systems (ICITEICS), Bangalore, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICITEICS61368.2024.10624915","DOI":"10.1109\/ICITEICS61368.2024.10624915"},{"key":"35_CR15","unstructured":"Lonari P, Jagdale S, Khandre S, Takale P, Mali Y (2021) Crime awareness and registration system. Int J Sci Res Comput Sci Eng Inf Technol (IJSRCSEIT) 8(3):287\u2013298. ISSN: 2456-3307"},{"key":"35_CR16","unstructured":"Pathak J, Sakore N, Kapare R, Kulkarni A, Mali Y (2019) Mobile rescue robot. Int J Sci Res Comput Sci Eng Inf Technol (IJSRCSEIT) 4(8):10\u201312. ISSN: 2456-3307"},{"key":"35_CR17","unstructured":"Dhote D, Rai P, Deshmukh S, Jaiswal A, Mali Y (2019) A survey: analysis and estimation of share market scenario. Int J Sci Res Comput Sci Eng Inf Technol (IJSRCSEIT) 4(8):77\u201380. ISSN: 2456-3307"},{"key":"35_CR18","unstructured":"Asreddy R, Shingade A, Vyavhare N, Rokde A, Mali Y (2019) A survey on secured data transmission using RSA algorithm and steganography. Int J Sci Res Comput Sci Eng Inf Technol (IJSRCSEIT) 4(8):159\u2013162. ISSN: 2456-3307"},{"key":"35_CR19","unstructured":"Chougule S, Bhosale S, Borle V, Chaugule V, Mali Y (2020) Emotion recognition based personal entertainment robot using ML and IP. Int J Sci Res Sci Technol (IJSRST) 5(8):73\u201375. Print ISSN: 2395-6011, Online ISSN: 2395-602X"},{"key":"35_CR20","unstructured":"Lokre A, Thorat S, Patil P, Gadekar C, Mali Y (2020) Fake image and document detection using machine learning. Int J Sci Res Sci Technol (IJSRST) 5(8):104\u2013109. Print ISSN: 2395-6011, Online ISSN: 2395-602X"},{"key":"35_CR21","unstructured":"Hajare R, Hodage R, Wangwad O, Mali Y, Bagwan F (2021) Data security in cloud. Int J Sci Res Comput Sci Eng Inf Technol (IJSRCSEIT) 8(3):240\u2013245. ISSN: 2456-3307"},{"issue":"3","key":"35_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.61925\/SWB.2023.1302","volume":"1","author":"Y Mali","year":"2023","unstructured":"Mali Y, Upadhyay T (2023) Fraud detection in online content mining relies on the random forest algorithm. SWB 1(3):13\u201320. https:\/\/doi.org\/10.61925\/SWB.2023.1302","journal-title":"SWB"},{"key":"35_CR23","doi-asserted-by":"publisher","unstructured":"Mali YK, Darekar SA, Sopal S, Kale M, Kshatriya V, Palaskar A (2023) Fault detection of underwater cables by using robotic operating system. In: 2023 IEEE International Carnahan conference on security technology (ICCST), Pune, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCST59048.2023.10474270","DOI":"10.1109\/ICCST59048.2023.10474270"}],"container-title":["Lecture Notes in Electrical Engineering","Semantic Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7356-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T21:30:24Z","timestamp":1735421424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7356-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819773558","9789819773565"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7356-5_35","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Semantic Intelligence Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Braga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isic32023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}