{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:41:25Z","timestamp":1751647285760,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10398018","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"2392-2398","source":"Crossref","is-referenced-by-count":1,"title":["Smart Auto Image Captioning Using LSTM and Densenet Network"],"prefix":"10.1109","author":[{"given":"Arumugam","family":"M","sequence":"first","affiliation":[{"name":"Kongu Engineering College,Department of Computer Technology - PG,Perundurai,India"}]},{"given":"Vijayakumar","family":"P","sequence":"additional","affiliation":[{"name":"Kongu Engineering College,Department of Master of Computer Applications,Perundurai,Tamil Nadu,638060"}]},{"given":"Siddharrth G","family":"M","sequence":"additional","affiliation":[{"name":"Kongu Engineering College,Department of Computer Technology - PG,Perundurai,India"}]},{"given":"Rohini","family":"J","sequence":"additional","affiliation":[{"name":"Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057"}]},{"given":"Karthikeyan","family":"A","sequence":"additional","affiliation":[{"name":"PSNA College of Engineering and Technology,Department of Electrical and Electronics Engineering,Dindigul,624622"}]},{"given":"Rohith Bhat","family":"C","sequence":"additional","affiliation":[{"name":"Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences,Department of Computer Science and Engineering,Chennai,India"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"1","article-title":"Review on network security and cryptography","volume":"3","author":"Kumar","year":"2015","journal-title":"International Transaction of Electrical and Computer Engineers System"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2991\/icoposdev-17.2018.57"},{"issue":"6","key":"ref3","first-page":"2349","article-title":"Implementation of new modified MD5-512 bit algorithm for cryptography","volume":"1","author":"Walia","year":"2014","journal-title":"International Journal of Innovative Research in Advanced Engineering (IJIRAE)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2427260"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2006.09.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58996-7_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-015-0203-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5772\/9385"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-201691"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_44"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EAMTA.2014.6906085"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1116-x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/41164466"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.8b00719"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024x(200102)31:2<103::aid-spe358>3.0.co;2-o"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3224924"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X12454579"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0715-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2013.07872.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04039-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/ijaip.2020.104111"},{"issue":"10","key":"ref24","first-page":"2789","article-title":"An Efficient Method for Brain Tumor Detection Using Texture Features and SVM Classifier in MR Images","volume":"19","author":"Kavin Kumar","year":"2018","journal-title":"PubMed"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.033927"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.12760"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2023,9,14]]},"location":"Gautam Buddha Nagar, India","end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10398018.pdf?arnumber=10398018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:27:15Z","timestamp":1706898435000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10398018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10398018","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}