{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:17:47Z","timestamp":1752985067356,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of Electronics and Information Technology, Government of India","award":["SMDP-C2SD"],"award-info":[{"award-number":["SMDP-C2SD"]}]},{"name":"Chip-to-Startup projects and the Visvesvaraya Ph.D. Scheme"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/jsyst.2023.3333677","type":"journal-article","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T19:19:57Z","timestamp":1702063197000},"page":"40-50","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3179-7879","authenticated-orcid":false,"given":"Vivek","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology Patna, Patna, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7345-1377","authenticated-orcid":false,"given":"Kailash Chandra","family":"Ray","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Indian Institute of Technology Patna, Patna, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6964-2648","authenticated-orcid":false,"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Patna, Patna, India"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2017.8256503"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2017.2670232"},{"key":"ref5","article-title":"Lightweight acoustic detection of logging in wireless sensor networks","volume-title":"Proc. Int. Conf. Digit. Inf., Netw., Wireless Commun., Soc. Digit. Inf. Wireless Commun.","author":"Czuni","year":"2014"},{"key":"ref6","first-page":"809","article-title":"WSN for forest monitoring to prevent illegal logging","volume-title":"Proc. IEEE Federated Conf. Comput. Sci. Inf. Syst.","author":"Papn","year":"2012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.01.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2903220.2903258"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2018.8484773"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/app10207379"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664564"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/ELMAR.2018.8534594"},{"key":"ref13","first-page":"1","article-title":"Detection of wood logging based on sound recognition using ZigBee sensor network","volume-title":"Proc. Int. Conf. Des. Archit. Signal Image Process.","author":"Harvanov","year":"2011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEREC.2018.8712091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/skima.2017.8294127"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SPED.2017.7990431"},{"key":"ref17","first-page":"178","article-title":"Acoustic signal classification for deforestation monitoring: Tree cutting problem","volume":"11","author":"Sharma","year":"2012","journal-title":"J. Comput. Sci. Syst. Biol."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BSB.2016.7552133"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2016.86"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tencon50793.2020.9293935"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2019.8768835"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s21227593"},{"key":"ref23","first-page":"554","article-title":"A functional model of neural activity patterns and auditory images","volume-title":"Advances in Speech, Hearing and Language Processing","volume":"3","author":"Patterson","year":"1996"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1152\/jn.1988.60.5.1653"},{"article-title":"An efficient auditory filterbank based on the gammatone function","year":"1988","author":"Patterson","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0378-5955(90)90170-T"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1121\/1.399052"},{"article-title":"Lyons cochlear model","year":"1988","author":"Slaney","key":"ref28"},{"article-title":"An efficient implementation of the Patterson-Holdsworth auditory filter bank","year":"1993","author":"Slaney","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537724"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/72.991427"},{"volume-title":"Swarm Intelligence","year":"2001","author":"Kennedy","key":"ref33"},{"volume-title":"Computational IntelligenceAn Introduction","year":"2007","author":"Engelbrecht","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5772\/6756"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.088"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.07.029"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/10473604\/10350006.pdf?arnumber=10350006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:53:56Z","timestamp":1733511236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10350006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":35,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2023.3333677","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}