{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:22:46Z","timestamp":1740169366173,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Scientific Research Deanship, University of Ha\u2019il, Saudi Arabia","award":["RG 23-187"],"award-info":[{"award-number":["RG 23-187"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3414374","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:16:45Z","timestamp":1718302605000},"page":"186313-186325","source":"Crossref","is-referenced-by-count":0,"title":["FABI: A Formal Analyzer of Binary Image Objects Identification Tools"],"prefix":"10.1109","volume":"12","author":[{"given":"Saima","family":"Iqbal","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2893-0042","authenticated-orcid":false,"given":"Ahmed B.","family":"Altamimi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0993-5964","authenticated-orcid":false,"given":"Wilayat","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8116-5322","authenticated-orcid":false,"given":"Mohammad","family":"Alsaffar","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]},{"given":"Aakash","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, Lancaster University Leipzig, Leipzig, Germany"}]},{"given":"Fahad F.","family":"Alfaisal","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, University of Ha&#x2019;il, Ha&#x2019;il, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging3020021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13153-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1086-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/eai.12-4-2021.169184"},{"key":"ref6","first-page":"69","article-title":"Face detection for video surveillance-based security system","volume-title":"Proc. COLINS","author":"Yakovleva"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.34133\/2021\/8786793"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v24.i2.pp1149-1160"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3040136"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27183-0_7"},{"volume-title":"Landscape Structure Analysis Using the Landscape Patch Analysis Toolset in Grass GIS","year":"2023","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/iis2.13053"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4041349"},{"issue":"3","key":"ref15","first-page":"1","article-title":"Mathematical modeling and availability optimization of embedded life critical systems","volume":"7","author":"Saini","year":"2022","journal-title":"Adv. Math. Models Appl."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4M.2016.045"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150529"},{"volume-title":"Web session security: Formal verification, client-side enforcement and experimental analysis","year":"2015","author":"Khan","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-020-00951-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1322264"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3459665"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-021-04747-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91908-9_18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1561\/2500000045"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.15354\/si.19.re117"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icfpt47387.2019.00082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00307-8"},{"issue":"8","key":"ref29","first-page":"2004","article-title":"Connected component based medical image segmentation","volume":"2","author":"Vyavahare","year":"2014","journal-title":"Int. J. Innov. Res. Electr., Electron., Instrum. Control Eng. (IJIREEICE)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2020.3004639"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.04.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s17092052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108702"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7346763"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3485494"},{"volume-title":"The compcert C verified compiler: Documentation and user\u2019s manual","year":"2023","author":"Leroy","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-019-09226-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.25195\/ijci.v46i1.249"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001414600027"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3287226"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2020.3006477"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2989782"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.427"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.01.085"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52483-2"},{"volume-title":"Computer Vision","year":"2001","author":"Stockman","key":"ref46"},{"volume-title":"IPython Interactive Computing and Visualization Cookbook: Over 100 Hands-On Recipes to Sharpen Your Skills in High-Performance Numerical Computing and Data Science in the Jupyter Notebook","year":"2018","author":"Rossant","key":"ref47"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10556518.pdf?arnumber=10556518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T06:43:53Z","timestamp":1734590633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3414374","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}