{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:13:20Z","timestamp":1730236400398,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995767","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:53:52Z","timestamp":1672764832000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Recognition of Handwritten Digit Using Different Machine Learning Algorithms"],"prefix":"10.1109","author":[{"given":"Kumar","family":"Priyadarshini","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Satnam","family":"Singh","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Anil","family":"Kumar Dixit","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"key":"ref13","first-page":"4109","article-title":"Agarwal, r., thomas, a","volume":"68","author":"srinivasan","year":"2021","journal-title":"G Performance comparison of deep cnn models for detecting driver's distraction in Computers Materials and Continua"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7114-9.ch011"},{"key":"ref15","first-page":"8085","article-title":"Ideas for some improvement in a.c.o. on the behalf of presently working a.c.o","volume":"3","author":"lal yadav","year":"2014","journal-title":"IJECS"},{"key":"ref14","article-title":"Ai-based prediction of capital structure: Performance comparison of ann svm and lr models","author":"cuauhtemoc","year":"2022","journal-title":"Comput Intel and Neurosci"},{"key":"ref11","article-title":"Energy-efficient model for recovery from multiple cluster nodes failure using moth flame optimization in wireless sensor networks","volume":"248","author":"ramisetty","year":"0","journal-title":"Peng Intelligent Computing and Innovation on Data Science Lecture Notes in Networks and Systems"},{"journal-title":"Deeply-supervised nets&#x201D; nips","year":"2014","author":"lee","key":"ref10"},{"key":"ref2","article-title":"A comparative review on non-chaotic and chaotic image encryption techniques","volume":"248","author":"ghosh","year":"0","journal-title":"Peng Intelligent Computing and Innovation on Data Science Lecture Notes in Networks and Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055398"},{"key":"ref16","first-page":"2319","article-title":"Potential of replication in distibuted r.t.d.b","volume":"4","author":"lal yada","year":"2015","journal-title":"IJECS"},{"key":"ref8","article-title":"Fully connected travelling: A step towards smart cities","volume":"9","author":"yousuf khan","year":"2021","journal-title":"Pakistan Journal of Engineering Technology & Science"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-981-16-3153-5_45","article-title":"Multi-class segmentation of organ at risk from abdominal ct images: A deep learning approach","author":"khalil","year":"2021","journal-title":"Intelligent Computing and editor and Innovation on Data Science"},{"key":"ref9","first-page":"8","article-title":"A review of intrusion detection system using machine learning approach","volume":"12","author":"kok","year":"2019","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref4","first-page":"2554","article-title":"Ideas on ad hoc networks and power aware networks","volume":"4","author":"gupta","year":"2018","journal-title":"IJFRCSCE"},{"key":"ref3","first-page":"2250","article-title":"Solving ipv4 (32 bits) address shortage problem using ipv6 (128 bits)","volume":"2","author":"gupta","year":"2012","journal-title":"IJREISS"},{"key":"ref6","article-title":"Threshold Segmentation Approach for Tumor Detection and Classification of MRI Brain Images","author":"khairandish","year":"2021","journal-title":"IRBM"},{"key":"ref5","first-page":"1","article-title":"Proposing a hybrid rpl protocol for rank and wormhole attack mitigation using machine learning","author":"jhanjhi","year":"2020","journal-title":"2020 2nd International Conference on Computer and Information Sciences (ICCIS) ICCIS"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995767.pdf?arnumber=9995767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T14:58:28Z","timestamp":1675090708000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995767","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}