{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:50Z","timestamp":1742912150812,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031538261"},{"type":"electronic","value":"9783031538278"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53827-8_34","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T09:02:24Z","timestamp":1709110944000},"page":"380-393","update-policy":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fraudulent Practice Detection in\u00a0Bullion Trade in\u00a0Selling of\u00a0Gold Jewellery Through AI Methods"],"prefix":"10.1007","author":[{"given":"Nagamani","family":"Molakatala","sequence":"first","affiliation":[]},{"given":"Vimal Babu","family":"Undru","sequence":"additional","affiliation":[]},{"given":"Shalem Raju","family":"Tambala","sequence":"additional","affiliation":[]},{"given":"M.","family":"Tejaswini","sequence":"additional","affiliation":[]},{"given":"M.","family":"Teja Kiran","sequence":"additional","affiliation":[]},{"given":"M.","family":"Tejo Seshadri","sequence":"additional","affiliation":[]},{"given":"Venkateswara Sagar","family":"Juturi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"issue":"12","key":"34_CR1","first-page":"1020","volume":"8","author":"A Krishnan","year":"2017","unstructured":"Krishnan, A., Nandhini, M.: A study on the factors which leading customers to purchase gold jewellery with special reference to working women. Int. J. Mech. Eng. Technol. (IJMET) 8(12), 1020\u20131029 (2017)","journal-title":"Int. J. Mech. Eng. Technol. (IJMET)"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF03214776","volume":"31","author":"W Stankiewicz","year":"1998","unstructured":"Stankiewicz, W., Bolibrzuch, B., Marczak, M.: Gold and gold alloy reference materials for XRF analysis. Gold Bull. 31, 119\u2013125 (1998)","journal-title":"Gold Bull."},{"key":"34_CR3","unstructured":"Mamaghani, M., Ghorbani, N., Dowling, J.: Detecting financial fraud using GANs at swedbank with Hopsworks and NVIDIA GPUs (2021)"},{"key":"34_CR4","unstructured":"Ekstedt, E., Torres, D., Gustafsson, J.: Synthetic data generation using transformer networks. Comput. Sci. (2021). School of Electrical Engineering and Computer Science Host company: Text generering med transformatorn\u00e4tverk Swedish subtitle: Skapa text fr\u00e5n ett syntetiskt dataset i tabellform @ 2021 Pedro Campos"},{"key":"34_CR5","unstructured":"Gold price prediction: step by step guide using python machine learning. Quantitative Finance & Algo Trading Blog by QuantInsti (2023)"},{"key":"34_CR6","unstructured":"Bhajantri, R.M., Puttappanavar, R.F., Shashank, Vishal, Rao, B.: Gold price prediction using machine learning. Int. J. Adv. Res. Innov. Ideas Educ. 9(3), 1664\u20131668 (2023)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Wang, S., Xiang, J., Zhong, Y., Zhou Y.: Convolutional neural network-based hidden Markov models for rolling element bearing fault identification (2018). College of Mechanical and Electrical Engineering, Wenzhou University, Wenzhou, PR China","DOI":"10.1016\/j.knosys.2017.12.027"},{"key":"34_CR8","doi-asserted-by":"publisher","unstructured":"Harraj, A., Raissoun, N.: OCR accuracy improvement on document images through a novel pre-processing approaches. Journal (SIPIJ) 6(4) (2015). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.5121\/SIPIJ.2016.6401","DOI":"10.5121\/SIPIJ.2016.6401"},{"key":"34_CR9","unstructured":"Pongnumkul, S., Chaovalit, P., Surasvadi, N.: A systematic review of research (2015). National Electronics and Computer Technology Center (NECTEC), 112 Thailand Science Park, Phahonyothin Road, Khlong Nueng, Khlong Luang, Pathum Thani 12120, Thailand"},{"key":"34_CR10","doi-asserted-by":"publisher","unstructured":"She, J., et al.: ETA prediction with graph neural networks in Google maps. ArXiv (2021). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1145\/3459637.3481916","DOI":"10.1145\/3459637.3481916"},{"key":"34_CR11","doi-asserted-by":"publisher","unstructured":"Zhou, R., Jiang, C., Xu, Q.: A survey on generative adversarial network-based text-to-image synthesis. Neurocomputing 451 (2021). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1016\/j.neucom.2021.04.069","DOI":"10.1016\/j.neucom.2021.04.069"},{"key":"34_CR12","unstructured":"Rupa, R., Sailini, P.: A study on consumer\u2019s preferences towards Goad as an investment with reference to Coimbatore city Peripex. Indian J. Res. V(ix) (2016)"},{"key":"34_CR13","unstructured":"Can, Y.S.: Classification of original and counterfeit gold matters by applying deep neural networks and support vector machines. ]ursa Uluda\u011f Univ. J. Fac. Eng. 27(1) (2022)"},{"key":"34_CR14","unstructured":"Indulia, B.: Protection of jewellery under law and standardisations\u2014SCC Blog. SCC Blog (2022. https:\/\/2.zoppoz.workers.dev:443\/https\/www.scconline.com\/blog\/post\/2022\/07\/22\/protection-of-jewellery-under-law-and-standardisations\/. In-Text Citation: (Indulia, 2022)"},{"issue":"5","key":"34_CR15","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TCSS.2021.3076930","volume":"8","author":"S Das","year":"2021","unstructured":"Das, S., Biswas, A.: Deployment of information diffusion for community detection in online social networks: a comprehensive review. IEEE Trans. Comput. Soc. Syst. 8(5), 1083\u20131107 (2021). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1109\/TCSS.2021.3076930","journal-title":"IEEE Trans. Comput. Soc. Syst."}],"container-title":["Lecture Notes in Computer Science","Intelligent Human Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53827-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T09:10:50Z","timestamp":1709111450000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/10.1007\/978-3-031-53827-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031538261","9783031538278"],"references-count":15,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/978-3-031-53827-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IHCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Human Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daegu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ihci2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.ihcisociety.org\/ihci-2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"139","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"User Friendly, Easy to manage","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}