{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T09:26:31Z","timestamp":1748078791808,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icacs55311.2023.10089752","type":"proceedings-article","created":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T17:30:05Z","timestamp":1680715805000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Framework for Human Action Recognition Based on Features Fusion and Decision Tree"],"prefix":"10.1109","author":[{"given":"Tanvir Fatima Naik","family":"Bukht","sequence":"first","affiliation":[{"name":"Air University,Dept. of Computer Science,Islamabad,Pakistan"}]},{"given":"Hameedur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Air University,Department of Creative Technologies,Islamabad,Pakistan"}]},{"given":"Ahmad","family":"Jalal","sequence":"additional","affiliation":[{"name":"Air University,Dept. of Computer Science,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-017-0871-1"},{"key":"ref2","article-title":"Semantic Segmentation Based Crowd Tracking and Anomaly Detection via Neuro-fuzzy Classifier in Smart Surveillance System","author":"Faisal","year":"2022","journal-title":"AJSE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058986"},{"key":"ref4","article-title":"Analyzing cyber-attacks targeted on the Banks of Pakistan and their Solutions","author":"Bukht","year":"2020","journal-title":"IJCSNS"},{"key":"ref5","article-title":"Analyzing the Behaviour of DDOS Cyber Attacks","author":"Raza","year":"2021","journal-title":"Technical Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s21227584"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.5.8.818-825"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.08.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.912"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.12.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2015.05.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.10.095"},{"key":"ref13","article-title":"The Mechanism of Edge Detection using the Block Matching Criteria for the Motion Estimation","author":"Jalal","year":"2005","journal-title":"Proc. Human Computer Interaction"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.121"},{"key":"ref15","article-title":"A complexity removal in the floating point and rate control phenomenon","author":"Jalal","year":"2005","journal-title":"Proc. Korea multimedia society"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1420326x11423163"},{"key":"ref17","article-title":"Human activity recognition using the labeled depth body parts information of depth silhouettes","author":"Jalal","year":"2012","journal-title":"ISHB"},{"key":"ref18","article-title":"Feature based steganalysis using wavelet decomposition and magnitude statistics","author":"Kumar","year":"2010","journal-title":"ICACE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.124"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30779-9_36"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.04.038"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/1420326X12469714"},{"key":"ref23","article-title":"Security enhancement for e-learning portal","author":"Jalal","year":"2008","journal-title":"IJCSNS"},{"article-title":"Motion templates for automatic classification and retrieval of motion capture data","volume-title":"ACM Symposium on Computer Animation","author":"Muller","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2014.6963015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2014.6918654"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.38"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/bioengineering9080368"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ComTech52583.2021.9616681"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.07.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-018-00012-w"},{"key":"ref32","article-title":"Multiple facial feature detection using vertex-modeling structure","author":"Jalal","year":"2007","journal-title":"ICAL"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-019-09892-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2019.8680993"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08463-7"},{"key":"ref36","article-title":"Facial Expression recognition using 1D transform features and Hidden Markov Model","author":"Jalal","year":"2017","journal-title":"JEET"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2007.07.020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1086\/424955"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3379310.3379318"},{"issue":"1","key":"ref40","first-page":"381","article-title":"Window selection impact in human activity recognition","volume":"3","author":"Nurwulan","year":"2020","journal-title":"International Journal of Innovative Technology and Inter-disciplinary Sciences"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-020-01057-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRS54038.2022.9853854"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-013-0514-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s20082346"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2319594"}],"event":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","start":{"date-parts":[[2023,2,20]]},"location":"Lahore, Pakistan","end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 4th International Conference on Advancements in Computational Sciences (ICACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10089613\/10089626\/10089752.pdf?arnumber=10089752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T11:12:58Z","timestamp":1709464378000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10089752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icacs55311.2023.10089752","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}