{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:55:43Z","timestamp":1775667343203,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03968-1","type":"journal-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T06:04:25Z","timestamp":1625465065000},"page":"2651-2664","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["RETRACTED ARTICLE: Smart communication using tri-spectral sign recognition for hearing-impaired people"],"prefix":"10.1007","volume":"78","author":[{"given":"B.","family":"Kanisha","sequence":"first","affiliation":[]},{"given":"V.","family":"Mahalakshmi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4655-7667","authenticated-orcid":false,"given":"M.","family":"Baskar","sequence":"additional","affiliation":[]},{"given":"K.","family":"Vijaya","sequence":"additional","affiliation":[]},{"given":"P.","family":"Kalyanasundaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,5]]},"reference":[{"key":"3968_CR1","doi-asserted-by":"crossref","unstructured":"Oi Mean Foong, Tang Jung Low, Wai Wan La (2009) Voice to sign language translation system to malaysian deaf people. In: Proceedings of First International Visual Informatics Conference, Kaula Lumpur, Malyasia, pp. 868\u2013876","DOI":"10.1007\/978-3-642-05036-7_82"},{"key":"3968_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-020-10391-9","author":"TS Arulananth","year":"2020","unstructured":"Arulananth TS, Balaji L, Baskar M et al (2020) PCA Based dimensional data reduction and segmentation for DICOM images. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-020-10391-9","journal-title":"Neural Process Lett"},{"issue":"1","key":"3968_CR3","first-page":"2640","volume":"4","author":"P Verma","year":"2015","unstructured":"Verma P, Shimi SL, Priyadarshini R (2015) Design of communication interpreter for deaf and dumb person. Int J Sci Res 4(1):2640\u20132643","journal-title":"Int J Sci Res"},{"key":"3968_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02744-y","author":"M Baskar","year":"2021","unstructured":"Baskar M, Ramkumar J, Karthikeyan C et al (2021) Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-020-02744-y","journal-title":"J Ambient Intell Hum Comput"},{"key":"3968_CR5","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.procs.2018.10.435","volume":"143","author":"A Abraham","year":"2018","unstructured":"Abraham A, Rohini V (2018) Real time conversion of sign language to speech and prediction of gestures using artificial neural network. Proc Comput Sci 143:587\u2013594","journal-title":"Proc Comput Sci"},{"issue":"4","key":"3968_CR6","first-page":"21","volume":"9","author":"B Kanisha","year":"2016","unstructured":"Kanisha B, Balakrishnan G (2016) Speech recognition with advanced feature extraction methods using adaptive particle swarm optimization. Int J Intel Eng Syst 9(4):21\u201330","journal-title":"Int J Intel Eng Syst"},{"issue":"23","key":"3968_CR7","doi-asserted-by":"publisher","first-page":"5282","DOI":"10.3390\/s19235282","volume":"19","author":"AA Mohammed","year":"2019","unstructured":"Mohammed AA, Lv J, Islam MDS (2019) A deep learning-based end to end composite system for hand detection and gesture recognition. Sensors (Basel) 19(23):5282","journal-title":"Sensors (Basel)"},{"key":"3968_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.05.002","author":"PK Athira","year":"2019","unstructured":"Athira PK, Sruthi CJC, Lijiya A (2019) A signer independent sign language recognition with co\u2013articulation elimination from live videos: an Indian scenario. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2019.05.002","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"3968_CR9","doi-asserted-by":"publisher","unstructured":"Baskar M, Gnanasekaran T, Saravanan S (2013) Adaptive IP traceback mechanism for detecting low rate DDoS attacks. In: 2013 IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tirunelveli, pp. 373-377. https:\/\/doi.org\/10.1109\/ICE-CCN.2013.6528526","DOI":"10.1109\/ICE-CCN.2013.6528526"},{"key":"3968_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-020-10407-4","author":"M Baskar","year":"2021","unstructured":"Baskar M, Renuka Devi R, Ramkumar J et al (2021) Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-020-10407-4","journal-title":"Neural Process Lett"},{"issue":"7","key":"3968_CR11","first-page":"2072","volume":"6","author":"SK Jedwa","year":"2015","unstructured":"Jedwa SK (2015) Feature extraction for hand gesture recognition: a review. Int J Sci Eng Res 6(7):2072\u20132077","journal-title":"Int J Sci Eng Res"},{"issue":"6","key":"3968_CR12","first-page":"1347","volume":"120","author":"K Manikandan","year":"2018","unstructured":"Manikandan K, Patidar A, Walia P, Roy AB (2018) Hand gesture detection and conversion to speech and text. Int J Pure Appl Math 120(6):1347\u20131352","journal-title":"Int J Pure Appl Math"},{"key":"3968_CR13","doi-asserted-by":"publisher","first-page":"103809","DOI":"10.1016\/j.micpro.2020.103809","volume":"82","author":"TS Arulananth","year":"2021","unstructured":"Arulananth TS, Baskar M, Sankar SMU, Thiagarajan R, Dalton GA, Rajeshwari PR, Kumar AS, Suresh A (2021) Evaluation of low power consumption network on chip routing architecture. Microprocess Microsyst 82:103809","journal-title":"Microprocess Microsyst"},{"key":"3968_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03917-y","author":"PC Karthik","year":"2021","unstructured":"Karthik PC, Sasikumar J, Baskar M et al (2021) Field equations for incompressible non-viscous fluids using artificial intelligence. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03917-y","journal-title":"J Supercomput"},{"issue":"10","key":"3968_CR15","doi-asserted-by":"publisher","first-page":"6616","DOI":"10.1166\/jctn.2016.5607","volume":"13","author":"B Kanisha","year":"2016","unstructured":"Kanisha B, Balakrishnan G (2016) Speech recognition based on feature extraction with the aid of multi support vector machine. J Comput Theor Nanosci 13(10):6616\u20136627","journal-title":"J Comput Theor Nanosci"},{"key":"3968_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03930-1","author":"P Kirubanantham","year":"2021","unstructured":"Kirubanantham P, Sankar SMU, Amuthadevi C et al (2021) An intelligent web service group-based recommendation system for long-term composition. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03930-1","journal-title":"J Supercomput"},{"issue":"5","key":"3968_CR17","first-page":"301","volume":"29","author":"J Ramkumar","year":"2020","unstructured":"Ramkumar J, Baskar M, Viswak M, Ashish MD (2020) Smart shopping with integrated secure system based on IoT. Intern J Adv Sci Technol 29(5):301\u2013312","journal-title":"Intern J Adv Sci Technol"},{"key":"3968_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11277-021-08092-0","volume":"119","author":"R Thiagarajan","year":"2021","unstructured":"Thiagarajan R, Ganesan R, Anbarasu V et al (2021) Optimised with secure approach in detecting and isolation of malicious nodes in MANET. Wireless Pers Commun 119:21\u201335. https:\/\/doi.org\/10.1007\/s11277-021-08092-0","journal-title":"Wireless Pers Commun"}],"updated-by":[{"DOI":"10.1007\/s11227-022-04859-9","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000},"record-id":"40173"},{"DOI":"10.1007\/s11227-021-03968-1","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000}},{"DOI":"10.1007\/s11227-022-04859-9","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03968-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03968-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03968-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:19:48Z","timestamp":1772021988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03968-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,5]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3968"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03968-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,5]]},"assertion":[{"value":"19 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-022-04859-9","URL":"https:\/\/doi.org\/10.1007\/s11227-022-04859-9","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}