{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:30:16Z","timestamp":1750311016621,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996023","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Real-Time Based Driver's Drowsiness and Fatigue Detection System"],"prefix":"10.1109","author":[{"given":"Ashish","family":"Srivastava","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Shreya","family":"Bansal","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Satbir S","family":"Sehgal","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"journal-title":"","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/167850a0"},{"article-title":"-real-time eye blink detection using facial landmarks","volume-title":"21st computer vision winter workshop luka cehovin","author":"Soukupova","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s20154093"},{"key":"ref5","first-page":"2375","author":"Culjak","year":"2012","journal-title":"A brief introduction to opencv"},{"key":"ref6","article-title":"382 avenues de leurope","volume":"3828","author":"Dalal","journal-title":"Montbonnot"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2609928"},{"key":"ref8","first-page":"2019","article-title":"MACSth International Conference on Mathematics, Actuarial Science, Computer Science and Statistics","volume-title":"Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning","volume":"9024821","author":"Fatima-Tuz-Zahra","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00794-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3153-5_49"},{"issue":"3","key":"ref11","first-page":"2250","article-title":"Solving ipv4 (32 bits) address shortage problem using ipv6 (128 bits)","volume":"2","author":"Gupta","year":"2012","journal-title":"IJREISS"},{"issue":"3","key":"ref12","first-page":"2554","article-title":"Ideas on ad hoc networks and power aware networks","volume":"4","author":"Gupta","year":"2018","journal-title":"IJFRCSCE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040510"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s22082820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.164583"},{"key":"ref17","first-page":"2382","article-title":"-dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/computers8040079"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.254"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/fi11050115"},{"issue":"6","key":"ref21","first-page":"7","article-title":"Iot and cloud based smart agriculture framework to improve crop yield meeting worlds food needs","volume-title":"IJCSNS","volume":"22","author":"Bin Muhammad","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NSEC.2015.7396336"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3153-5_52"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2013.59"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8334927"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100133"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54526-4_9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2787130"},{"issue":"5","key":"ref30","first-page":"2319","article-title":"Potential of replication in distibuted r.t.d.b","volume":"4","author":"Lal Yadav","year":"2015","journal-title":"IJECS"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996023.pdf?arnumber=9996023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:24:47Z","timestamp":1709378687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996023","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}