{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807518,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Digital Media & Communications R&D Center"},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NIPA-2013-H0301-13-3005"],"award-info":[{"award-number":["NIPA-2013-H0301-13-3005"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003665","name":"National IT Industry Promotion Agency","doi-asserted-by":"publisher","award":["NIPA-2013-H0301-13-3005"],"award-info":[{"award-number":["NIPA-2013-H0301-13-3005"]}],"id":[{"id":"10.13039\/501100003665","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Digital Media & Communications Business"},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2013-056480"],"award-info":[{"award-number":["2013-056480"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558055","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic touching detection and recognition of music chord using auto-encoding and softmax"],"prefix":"10.1145","author":[{"given":"Hong Quy","family":"Nguyen","sequence":"first","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Hyung-Jeong","family":"Yang","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Soo-Hyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]},{"given":"Guee-Sang","family":"Lee","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/938979.939296"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-012-0004-6"},{"volume-title":"Music: In Theory and Practice","year":"2003","key":"e_1_3_2_1_3_1","unstructured":"Benward. Music: In Theory and Practice , volume 1 . Mcgraw-Hill College , seventh edition, January 2003 . Benward. Music: In Theory and Practice, volume 1. Mcgraw-Hill College, seventh edition, January 2003."},{"key":"e_1_3_2_1_4_1","first-page":"251","volume-title":"Proceedings of the 2005 Eight International Conference on Document Analysis and Recognition","author":"Zhang D. Y.","year":"2010","unstructured":"D. Y. Zhang , X. D. Tian , and X. F. Li . An improved method for segmentation of touching symbols in printed mathematical expressions . In Proceedings of the 2005 Eight International Conference on Document Analysis and Recognition , pages 251 -- 253 , 2010 . D. Y. Zhang, X. D. Tian, and X. F. Li. An improved method for segmentation of touching symbols in printed mathematical expressions. In Proceedings of the 2005 Eight International Conference on Document Analysis and Recognition, pages 251--253, 2010."},{"key":"e_1_3_2_1_5_1","first-page":"142","volume-title":"Proceedings. Seventh International Conference on Document Analysis and Recognition","author":"You D.","year":"2003","unstructured":"D. You and G. Kim . An approach for locating segmentation points of handwritten digit strings using a neural network . In Proceedings. Seventh International Conference on Document Analysis and Recognition , pages 142 -- 146 , August 2003 . D. You and G. Kim. An approach for locating segmentation points of handwritten digit strings using a neural network. In Proceedings. Seventh International Conference on Document Analysis and Recognition, pages 142--146, August 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Ninth Conference of the Cognitive Science Society","author":"Cottrell G. W.","year":"1987","unstructured":"G. W. Cottrell , P. Munro , and D. Zipser . Learning internal representations from gray-scale images: An example of extensional programming . In Proceedings of the Ninth Conference of the Cognitive Science Society , January 1987 . G. W. Cottrell, P. Munro, and D. Zipser. Learning internal representations from gray-scale images: An example of extensional programming. In Proceedings of the Ninth Conference of the Cognitive Science Society, January 1987."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.34"},{"key":"e_1_3_2_1_10_1","first-page":"536","volume-title":"Digital Image Processing","author":"Gonzalez R. C.","year":"2002","unstructured":"R. C. Gonzalez and R. E. Woods . Digital Image Processing , chapter 9, pages 536 -- 539 . Prentice Hall , second edition, 2002 . R. C. Gonzalez and R. E. Woods. Digital Image Processing, chapter 9, pages 536--539. Prentice Hall, second edition, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"Character segmentation heuristics for check amount verification. Master's thesis","author":"Khan S. A.","year":"1998","unstructured":"S. A. Khan . Character segmentation heuristics for check amount verification. Master's thesis , Massachusetts Institute of Technology. Dept . of Electrical Engineering and Computer Science, 1998 . S. A. Khan. Character segmentation heuristics for check amount verification. Master's thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.212"}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":12,"alternative-id":["10.1145\/2557977.2558055","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558055","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}