{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:00:50Z","timestamp":1742796050656,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996012","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Activity Based Easy Learning Of PushDown Automata"],"prefix":"10.1109","author":[{"given":"Liaqat","family":"Ali","sequence":"first","affiliation":[{"name":"College of Engineering and Technology, University of Science and Technology of Fujairah,Fujairah,UAE"}]},{"given":"Nizar","family":"Sahawneh","sequence":"additional","affiliation":[{"name":"School of Business, Skyline University College,Sharjah,UAE"}]},{"given":"Yousuf","family":"Agha","sequence":"additional","affiliation":[{"name":"Monash University,Faculty of information technology"}]},{"given":"Saira","family":"Kanwal","sequence":"additional","affiliation":[{"name":"Agriculture University,Department of Computer Science,Faisalabad,Pakistan"}]},{"family":"Imran","sequence":"additional","affiliation":[{"name":"Fatima memorial hospital college of medicine and dentistry Lahore,Lahore,Pakistan,54000"}]},{"given":"Nouh Sabri","family":"Elmitwally","sequence":"additional","affiliation":[{"name":"School of Computing and Digital Technology, Birmingham City University,Birmingham,UK,B4 7XG"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Adaptive Intelligent Tutoring System for Learning Computer Theory","volume":"4","author":"Al-Nakhal","year":"2017","journal-title":"European Academic Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.058"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/FIE.2015.7344185","volume-title":"Teaching-learning methodology for Formal Languages and Automata Theory","author":"De Souza","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AICERA.2012.6306722"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1384271.1384359"},{"key":"ref6","article-title":"Implementation of Automata Theory to Improve the Learning Disability","author":"Ali","year":"2013","journal-title":"arXiv preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6759526"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8017496"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023480"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023239"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023278"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023785"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023557"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-12181-w"},{"issue":"3","key":"ref15","first-page":"51","article-title":"Evaluation of planet factors of smart city through multi-layer fuzzy logic (MFL)","volume":"11","author":"Fatima","year":"2019","journal-title":"The ISC International Journal of Information Security"},{"issue":"1","key":"ref16","first-page":"188","article-title":"IoT enabled smart monitoring of coronavirus empowered with fuzzy inference system","volume":"6","author":"Fatima","year":"2020","journal-title":"International journal of advance research, ideas and innovations in technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE47252.2019.8940752"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9758929"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.03.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.12.008"},{"issue":"1","key":"ref21","article-title":"Genetic Algorithm Based Intelligent System for Estate Value Estimation","volume":"1","author":"Muneer","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"1","key":"ref22","first-page":"1","article-title":"Intelligent Intrusion Detection System for Apache Web Server Empowered with Machine Learning Approaches","volume":"1","author":"Muhammad","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"2","key":"ref23","first-page":"69","article-title":"AA Novel Method to improve the Round Robin CPU Scheduling Quantum time using Arithmetic Mean","volume":"1","author":"Akmal","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"2","key":"ref24","first-page":"1","article-title":"A survey on Animal Identification Techniques Past and Present","volume":"1","author":"Ahmad","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"issue":"1","key":"ref25","first-page":"23","article-title":"Integration Of Blockchain and Edge Computing to Improve The Scalability and Latency","volume":"1","author":"Sami","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"issue":"1","key":"ref26","first-page":"16","article-title":"Performance Analysis of Multiple Networks of Blockchain with Varying Transaction","volume":"1","author":"Iftikhar","year":"2022","journal-title":"International Journal of Advanced Sciences and Computing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023392"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.029400"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2022.5.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.06.007"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996012.pdf?arnumber=9996012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:24:34Z","timestamp":1709378674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996012","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}