{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:00:19Z","timestamp":1754154019403,"version":"3.41.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996001","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:53:52Z","timestamp":1672764832000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Retracted: Sign language recognition Using Python"],"prefix":"10.1109","author":[{"given":"Gurpartap","family":"Singh","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Anup Lal","family":"Yadav","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Satbir","family":"S Sehgal","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"1","article-title":"A survey on animal identification techniques past and present","volume":"1","author":"Ahmad","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.00010"},{"journal-title":"Understanding and implementing lenet-5 cnn architecture","year":"2020","author":"Alake","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055398"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622141"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT46314.2019.8987908"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2009.5206848"},{"article-title":"Bar A3, and title = M booktitle = ChaLearn Looking at People Challenge Dataset and Results year","volume-title":"2014 publisher = Workshop at the European Conference on Computer Vision","author":"Escalera","key":"ref9"},{"key":"ref10","first-page":"2019","article-title":"in MACSth International Conference on Mathematics, Actuarial Science, Computer Science and Statistics, Proceedings 9024821","volume-title":"Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning","author":"Jhanjhi","year":"2019"},{"issue":"3","key":"ref11","first-page":"406","article-title":"a vision based recognition of Indian sign language alphabets and numerals using b-spline approximation","volume":"4","author":"Geetha","year":"2012","journal-title":"international journal on computer science and engineering (ijcse)"},{"issue":"3","key":"ref12","first-page":"2250","article-title":"Test driven software development technique for software engineering","volume":"2","author":"Gupta","year":"2012","journal-title":"IJREISS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSRE.2019.8807586"},{"journal-title":"IMAGE BASED SIGN LANGUAGE RECOGNITION SYSTEM FOR SINHALA SIGN LANGUAGE","year":"2013","author":"Herath","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS49240.2020.9257607"},{"issue":"1","key":"ref16","first-page":"8","article-title":"A review of intrusion detection system using machine learning approach","volume":"12","author":"Kok","year":"2019","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.350"},{"issue":"9","key":"ref19","first-page":"9734562","article-title":"Conversion of sign language into text","volume":"13","author":"Kumar","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIDS.2019.8862125"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095559"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16178-5_40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2019.8247"},{"key":"ref24","article-title":"Lsa64: A dataset of argentinian sign language","volume-title":"XX II Congreso Argentino de Ciencias de la Computacion (CACIC)","author":"Ronchetti","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7114-9.ch011"},{"journal-title":"What is Ida: Linear discriminant analysis for machine learning","year":"2019","author":"Sarkar","key":"ref26"},{"journal-title":"Understanding the backbone of video classification: The i3d architecture","year":"2020","author":"Schiappa","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5120\/12174-7306"},{"key":"ref29","first-page":"1","volume":"101","author":"Soomro","year":"2012","journal-title":"UCF"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INAPR.2018.8627014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100133"},{"issue":"12","key":"ref32","first-page":"2319","article-title":"Grip on the cloud and service grid technologies some pain points that clouds and service grids address","volume":"2","author":"Yadav","year":"2013","journal-title":"IJECS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1117\/12.456333"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996001.pdf?arnumber=9996001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T18:42:00Z","timestamp":1753296120000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996001","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}