{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:21:29Z","timestamp":1758248489204,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652458","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Hyperdimensional Consumer Pattern Analysis with Quantum Neural Architectures using Non-Hermitian Operators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9374-7907","authenticated-orcid":false,"given":"Shivam","family":"Goyal","sequence":"first","affiliation":[{"name":"CSE, Chandigarh College of Engineering and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4876-7190","authenticated-orcid":false,"given":"Sunil K.","family":"Singh","sequence":"additional","affiliation":[{"name":"CSE, Chandigarh College of Engineering and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7928-4234","authenticated-orcid":false,"given":"Sudhakar","family":"Kumar","sequence":"additional","affiliation":[{"name":"CSE, Chandigarh College of Engineering and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-3445","authenticated-orcid":false,"given":"Saket","family":"Sarin","sequence":"additional","affiliation":[{"name":"CSE, Chandigarh College of Engineering and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-4698","authenticated-orcid":false,"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering (CSIE), Asia University, Taichung, Taiwan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7549-4429","authenticated-orcid":false,"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[{"name":"Department of Business Administration, Asia University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7992-9901","authenticated-orcid":false,"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[{"name":"CSE, Hong Kong Metropolitan University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"123","article-title":"Advances in Real-Time Hyperdimensional Pattern Analysis for Consumer Technology","volume":"45","author":"Smith J.","year":"2022","unstructured":"[1]Smith, J. et al. (2022). \"Advances in Real-Time Hyperdimensional Pattern Analysis for Consumer Technology.\" Journal of Consumer Technology, 45(3), 123-145.","journal-title":"Journal of Consumer Technology"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Multimodal Complexity in Consumer Data Analysis","author":"Johnson A.","year":"2021","unstructured":"[2] Johnson, A. et al. (2021). \"Multimodal Complexity in Consumer Data Analysis.\" International Conference on Data Science, 1-10.","journal-title":"International Conference on Data Science"},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"67","article-title":"Quantum Computing and the Curse of Dimensionality","volume":"12","author":"Brown C.","year":"2020","unstructured":"[3] Brown, C. et al. (2020). \"Quantum Computing and the Curse of Dimensionality.\" Quantum Computing Journal, 12(2), 67-82.","journal-title":"Quantum Computing Journal"},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"567","article-title":"Challenges of High-Dimensional Data Analysis in Traditional Computing","volume":"30","author":"White E.","year":"2019","unstructured":"[4] White, E. et al. (2019). \"Challenges of High-Dimensional Data Analysis in Traditional Computing.\" Journal of Computational Complexity, 30(4), 567-580.","journal-title":"Journal of Computational Complexity"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003369066-2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9819-5_37"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.23062"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-8413-2.ch004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-8413-2.ch004"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Evaluating the Sustainable COVID-19 Vaccination Framework of India Using Recurrent Neural Networks","author":"Gupta A.","year":"2023","unstructured":"[10] Gupta, A., Singh, S. K., Gupta, B. B., Chopra, M., & Gill, S. S. (2023). Evaluating the Sustainable COVID-19 Vaccination Framework of India Using Recurrent Neural Networks. Wireless Personal Communications, 1-19.","journal-title":"Wireless Personal Communications"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.stae.2022.100006"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Explainable context-aware IoT framework using human digital twin for healthcare","author":"Vats T.","year":"2023","unstructured":"[12] Vats, T., Singh, S. K., Kumar, S., Gupta, B. B., Gill, S. S., Arya, V., & Alhalabi, W. (2023). Explainable context-aware IoT framework using human digital twin for healthcare. Multimedia Tools and Applications, 1-25.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003369066-14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.300364"},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks","author":"Kumar R.","year":"2023","unstructured":"[15] Kumar, R., Singh, S. K., & Lobiyal, D. K. (2023). UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. The Journal of Supercomputing, 1-28.","journal-title":"The Journal of Supercomputing"},{"key":"e_1_3_2_1_16_1","volume-title":"2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN) (pp. 656-662)","author":"Kumar R.","year":"2023","unstructured":"[16] Kumar, R., Sinngh, S. K., & Lobiyal, D. K. (2023, April). Routing of Vehicular IoT Networks based on various routing Metrics, Characteristics, and Properties. In 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN) (pp. 656-662). IEEE."},{"key":"e_1_3_2_1_17_1","volume-title":"Fuzzy Based Clustering of Consumers\u2019 Big Data in Industrial Applications. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 01-03)","author":"Sharma A.","year":"2023","unstructured":"[17] Sharma, A., Singh, S. K., Badwal, E., Kumar, S., Gupta, B. B., Arya, V.,... & Santaniello, D. (2023, January). Fuzzy Based Clustering of Consumers\u2019 Big Data in Industrial Applications. In 2023 IEEE International Conference on Consumer Electronics (ICCE) (pp. 01-03). IEEE."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003333500-34"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"12","article-title":"Quantum Computing: A Beacon of Hope in High-Dimensional Data Analysis","volume":"5","author":"Anderson D.","year":"2023","unstructured":"[19] Anderson, D. et al. (2023). \"Quantum Computing: A Beacon of Hope in High-Dimensional Data Analysis.\" Nature Quantum Computing, 5(1), 12-24.","journal-title":"Nature Quantum Computing"},{"issue":"6","key":"e_1_3_2_1_20_1","first-page":"145","article-title":"Synthesis of Quantum Neural Architectures and Non-Hermitian Operators","volume":"14","author":"Lee Q.","year":"2021","unstructured":"[20] Lee, Q. et al. (2021). \"Synthesis of Quantum Neural Architectures and Non-Hermitian Operators.\" Quantum Information Processing, 14(6), 145-160.","journal-title":"Quantum Information Processing"},{"key":"e_1_3_2_1_21_1","volume-title":"Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions. Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 1-19","author":"Aggarwal K.","year":"2022","unstructured":"[21] Aggarwal, K., Singh, S. K., Chopra, M., Kumar, S., & Colace, F. (2022). Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions. Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, 1-19."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9416-5_18"},{"key":"e_1_3_2_1_23_1","first-page":"50","article-title":"Revolutionizing Consumer Technology with Quantum Computing","author":"Wilson M.","year":"2022","unstructured":"[23] Wilson, M. et al. (2022). \"Revolutionizing Consumer Technology with Quantum Computing.\" Consumer Technology Innovations Conference, 50-65.","journal-title":"Consumer Technology Innovations Conference"},{"key":"e_1_3_2_1_24_1","first-page":"28","article-title":"Quantum Cryptography for Consumer Applications: Ensuring Security in the Quantum Era","author":"Thomas S.","year":"2023","unstructured":"[24] Thomas, S. et al. (2023). \"Quantum Cryptography for Consumer Applications: Ensuring Security in the Quantum Era.\" Quantum Security Symposium, 28-42.10","journal-title":"Quantum Security Symposium"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000001523"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.23062"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2021070102"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/645503.656271"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9416-5_18"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.308278"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.308469"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.307324"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11213463"},{"issue":"19","key":"e_1_3_2_1_34_1","first-page":"3606","volume":"10","author":"Elaziz M. A.","year":"2022","unstructured":"[34] Elaziz, M. A., Ahmadein, M., Ataya, S., Alsaleh, N., Forestiero, A., & Elsheikh, A. H. (2022). A Quantum-Based Chameleon Swarm for Feature Selection. Mathematics, 10(19), 3606.","journal-title":"A Quantum-Based Chameleon Swarm for Feature Selection. Mathematics"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/math10234565"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01443615.2021.1904216"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820603"},{"issue":"3","key":"e_1_3_2_1_38_1","first-page":"282","article-title":"An identity-based signcryption on lattice without trapdoor","volume":"25","author":"Wang X.","year":"2019","unstructured":"[38] Wang, X., Zhang, Y., Gupta, B. B., Zhu, H., & Liu, D. (2019). An identity-based signcryption on lattice without trapdoor. J. Univers. Comput. Sci., 25(3), 282-293.","journal-title":"J. Univers. Comput. Sci."},{"key":"e_1_3_2_1_39_1","volume-title":"2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT) (pp. 1-5). IEEE.","author":"Pljonkin A. P.","year":"2017","unstructured":"[39] Pljonkin, A. P., Gupta, B. B., Rumyantsev, K. E., Korovin, I., & Schaefer, G. (2017, September). Features of detection of a single-photon pulse at synchronisation in quantum key distribution systems. In 2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT) (pp. 1-5). IEEE."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2242-4.ch015"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1384-8_10"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:22:57Z","timestamp":1758216177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":41,"alternative-id":["10.1145\/3647444.3652458","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652458","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}