{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:25:50Z","timestamp":1758248750017,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647935","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Alzheimer's Disease Prediction with Bayesian Optimization and Ensemble Methods"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6245-3097","authenticated-orcid":false,"given":"D. S.","family":"Wankhede","sequence":"first","affiliation":[{"name":"Computer Engineering, VIIT, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1643-9320","authenticated-orcid":false,"given":"Nuvita","family":"Kalra","sequence":"additional","affiliation":[{"name":"Symbiosis Law School, Nagpur Campus, Symbiosis International (Deemed University), India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0516-6736","authenticated-orcid":false,"given":"Ritika","family":"Dhabliya","sequence":"additional","affiliation":[{"name":"Computer, Yashika Journal Publications Pvt. Ltd, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5055-6037","authenticated-orcid":false,"given":"Vinit","family":"Khetani","sequence":"additional","affiliation":[{"name":"Computer, Cybrix Technologies, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6758-0252","authenticated-orcid":false,"given":"Tushar","family":"Waykole","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Nutan Maharashtra Institute of Information &amp; Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4239-9295","authenticated-orcid":false,"given":"Aparna S.","family":"Shirkande","sequence":"additional","affiliation":[{"name":"E &amp; TC, Assistant Professor, S. B. Patil College of Engineering, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcce.2021.12.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062484"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10101842"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2022.9020049"},{"key":"e_1_3_2_1_5_1","first-page":"253","article-title":"Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains","volume":"11","author":"Khetani V","year":"2023","unstructured":"Khetani V, Gandhi Y, Bhattacharya S, (2023) Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. Int J Intell Syst Appl Eng 11:253\u2013262","journal-title":"Int J Intell Syst Appl Eng"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106240"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroscience.2023.01.029"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.09.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3389\/fnagi.2022.810125"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibror.2019.07.490"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nicl.2019.101811"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gpb.2019.09.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibneur.2022.08.010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06131-3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107371"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e07287"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3083274"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10161908"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037107"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590882"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590879"},{"key":"e_1_3_2_1_22_1","first-page":"864","article-title":"Different aspects of cloud security","volume":"2","author":"Chauhan M.","year":"2012","unstructured":"Chauhan, M., Malhotra, R., Pathak, M., & Singh, U. P. (2012). Different aspects of cloud security. International Journal of Engineering Research and Applications, 2, 864-869.","journal-title":"International Journal of Engineering Research and Applications"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00703-015-0375-3"},{"issue":"181","key":"e_1_3_2_1_24_1","first-page":"27","article-title":"Predictability study of forced Lorenz model: an artificial neural network approach","volume":"40","author":"Singh U. P.","year":"2015","unstructured":"Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2015). Predictability study of forced Lorenz model: an artificial neural network approach. History, 40(181), 27-33.","journal-title":"History"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2166\/wcc.2019.212"},{"issue":"2","key":"e_1_3_2_1_26_1","first-page":"838","article-title":"Secure communication protocol for ATM using TLS handshake","volume":"2","author":"Singh U.","year":"2012","unstructured":"Singh, U., Pathak, M., Malhotra, R., & Chauhan, M. (2012). Secure communication protocol for ATM using TLS handshake. Journal of Engineering Research and Applications (IJERA), 2(2), 838-948.","journal-title":"Journal of Engineering Research and Applications (IJERA)"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2166\/wcc.2021.097"},{"issue":"4","key":"e_1_3_2_1_28_1","first-page":"411","article-title":"Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model","volume":"1","author":"Tiwari A.","year":"2015","unstructured":"Tiwari, A., Mittal, A. K., Dwivedi, S., & Singh, U. P. (2015). Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model. Climate Change, 1(4), 411-417.","journal-title":"Climate Change"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590888"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:23:53Z","timestamp":1758216233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":29,"alternative-id":["10.1145\/3647444.3647935","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647935","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}