{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:11:39Z","timestamp":1725999099170},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010539"},{"type":"electronic","value":"9783030010546"}],"license":[{"start":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T00:00:00Z","timestamp":1541721600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-01054-6_36","type":"book-chapter","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T14:47:05Z","timestamp":1541688425000},"page":"504-520","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Motion Detection and Facial Recognition to Secure Places of High Security: A Case Study at Banking Vaults of Ghana"],"prefix":"10.1007","author":[{"given":"Emmanuel","family":"Effah","sequence":"first","affiliation":[]},{"given":"Salah","family":"Kabanda","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Owusu-Adjei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,9]]},"reference":[{"issue":"5","key":"36_CR1","first-page":"23","volume":"4","author":"S Meshgini","year":"2012","unstructured":"Meshgini, S., Aghagolzadeh, A., Seyedarabi, H.: Face recognition using Gabor filter bank, kernel principal component analysis and support vector machine. Int. J. Comput. Theory Eng. 4(5), 23\u201334 (2012)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"36_CR2","unstructured":"Krem.com article: Catching Identity Thieves with Facial Recognition. http:\/\/www.krem.com\/story\/news\/local\/2-on-your-side\/2016\/12\/13\/dol-catching-identity-thieves-with-facial-recognition\/20355021\/ . Accessed 5th May 2017"},{"key":"36_CR3","unstructured":"Lowcards.com article: Facial Recognition ATMs Could Curb ATM Theft. http:\/\/www.lowcards.com\/facial-recognition-atms-standard-future-29504 . Accessed 16 May 2017"},{"key":"36_CR4","unstructured":"Zorzi, M.: AI emulates the human brain. https:\/\/erc.europa.eu\/projects-and-results\/erc-stories\/self-learning-ai-emulates-human-brain . Accessed 24 Feb 2017"},{"key":"36_CR5","unstructured":"Joshi, A.: How do I detect an object in the video frame using OpenCV. https:\/\/www.quora.com\/How-do-I-detect-an-object-in-video-frame-using-OpenCV . Accessed 19 Jan 2017"},{"issue":"2","key":"36_CR6","first-page":"112","volume":"2","author":"C Indhumathi","year":"2014","unstructured":"Indhumathi, C., Gayathri, N.S.: Unconstrained face recognition from blurred and illumination with pose variant face image using SVM. Int. J. Res. Comput. Appl. Robot. 2(2), 112\u2013117 (2014)","journal-title":"Int. J. Res. Comput. Appl. Robot."},{"key":"36_CR7","unstructured":"Szeliski, R.: Computer Vision: Algorithms and Applications. http:\/\/szeliski.org\/Book\/ . Accessed 18 Feb 2017"},{"key":"36_CR8","unstructured":"Carroll, J.: Computer vision software tools from Facebook are now open source. http:\/\/www.vision-systems.com\/articles\/2016\/08\/computer-vision-software-tools-from-facebook-are-now-open-source.html . Accessed 9 Apr 2017"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur, P.N., Hespanha, J.P., Kriegman, J.D.: Eigenfaces vs. sherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19, 711\u2013720 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"36_CR10","first-page":"179188","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugen. 7, 179188 (1936)","journal-title":"Ann. Eugen."},{"key":"36_CR11","unstructured":"Sinha, U.: OpenCV vs. VXL vs. LTI: performance test (2010). http:\/\/aishack.in\/tutorials\/opencv-vs-vxl-vs-lti-performance-test\/ . Accessed 8 Apr 2017"},{"issue":"6","key":"36_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/2184319.2184337","volume":"55","author":"K Pulli","year":"2012","unstructured":"Pulli, K., Baksheev, A., Kornyakov, K., Eruhimov, V.: Real-time computer vision with OpenCV. Commun. ACM 55(6), 61\u201369 (2012). https:\/\/doi.org\/10.1145\/2184319.2184337","journal-title":"Commun. ACM"},{"key":"36_CR13","unstructured":"Hamid, R.K., et al.: A comparison of energy consumption prediction models based on neural networks of a bioclimatic building. Energies 567573, 1\u201324 (2016). MDPI"},{"key":"36_CR14","unstructured":"Brandon, A.: OpenFace: a general-purpose face recognition library with mobile applications, p. 12 (2016). http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/2016\/CMU-CS-16-118.pdf . Accessed 24 Feb 2017"},{"key":"36_CR15","unstructured":"Zeil, S.: Software development process (2016). https:\/\/www.cs.odu.edu\/~zeil\/cs350\/f16\/Public\/processModels\/index.html . Accessed 8 Apr 2017"},{"issue":"1","key":"36_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCSVT.2010.2087812","volume":"21","author":"S-C Huang","year":"2011","unstructured":"Huang, S.-C.: An advanced motion detection algorithm with video quality analysis for video surveillance systems. IEEE Trans. Circuits Syst. Video Technol. 21(1), 1\u201314 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"36_CR17","unstructured":"Czarneszki, K.: What is structural modelling (2015). www.softlab.ntua.gr\/~kkontog\/ECE355-05\/lectures\/Lect8-Ch2-Unit4-Part3.ppt . Accessed 26 April 2017"},{"key":"36_CR18","unstructured":"Fakhroutdinov, K.: Class diagram uml diagrams (2009). http:\/\/www.uml-diagrams.org . Accessed 26 Apr 2015"},{"key":"36_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principal Component Analysis","author":"IT Jolliffe","year":"1986","unstructured":"Jolliffe, I.T.: Principal Component Analysis. Springer, New York (1986)"},{"issue":"1","key":"36_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s12559-012-9163-2","volume":"5","author":"Virginia Espinosa-Dur\u00f3","year":"2012","unstructured":"Espinosa-Duro, V., Faundez-Zanuy, M., Mekyska, J.: A new face database simultaneously acquired in visible, near infrared and thermal spectrums. In: Cognitive Computation. Springer (2012). https:\/\/doi.org\/10.1007\/s12559-012-9163-2","journal-title":"Cognitive Computation"},{"issue":"1","key":"36_CR21","first-page":"233","volume":"3","author":"A Swaminathan","year":"2014","unstructured":"Swaminathan, A., Kumar, N., Ramesh Kumar, M.: A review of numerous facial recognition techniques in image processing. IJCSMC 3(1), 233\u2013243 (2014)","journal-title":"IJCSMC"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Lin, F., Fookes, C., Chandran, V., Sridharan, S.: Face recognition from super-resolved images. In: Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, pp. 667\u2013670 (2005)","DOI":"10.1109\/ISSPA.2005.1581026"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Lin, F., Fookes, C., Chandran, V., Sridharan, S.: Super-resolved faces for improved face recognition from surveillance video. In: International Conference on Biometrics, p. 110 (2007)","DOI":"10.1007\/978-3-540-74549-5_1"},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s12559-012-9163-2","volume":"5","author":"V Espinosa-Duro","year":"2012","unstructured":"Espinosa-Duro, V., Faundez-Zanuy, M., Mekyska, J.: A new face database simultaneously acquired in visible, near infrared and thermal spectrums. Cogn. Comput. 5, 119\u2013135 (2012). https:\/\/doi.org\/10.1007\/s12559-012-9163-2","journal-title":"Cogn. Comput."},{"issue":"6","key":"36_CR25","doi-asserted-by":"publisher","first-page":"17091724","DOI":"10.1109\/TIP.2010.2101613","volume":"20","author":"O Barnich","year":"2011","unstructured":"Barnich, O., Van Droogenbroeck, M.: ViBe: a universal background subtraction algorithm for video sequences. IEEE Trans. Image Process. 20(6), 17091724 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"36_CR26","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu, W.: A survey on visual surveillance of object motion and behaviors. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 34(3), 334\u2013352 (2004)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Hermosilla, G., et al.: Face recognition and drunk classification using infrared face images. J. Sens. 2018, Article ID 5813514, 8 pp (2018)","DOI":"10.1155\/2018\/5813514"},{"issue":"3","key":"36_CR28","first-page":"212","volume":"3","author":"K-H Lee","year":"2015","unstructured":"Lee, K.-H.: An efficient learning scheme for extreme learning machine and its application. Int. J. Comput. Sci. Electron. Eng. (IJCSEE) 3(3), 212\u2013216 (2015). ISSN 2320402","journal-title":"Int. J. Comput. Sci. Electron. Eng. (IJCSEE)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01054-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T03:23:18Z","timestamp":1572578598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01054-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,9]]},"ISBN":["9783030010539","9783030010546"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01054-6_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,11,9]]},"assertion":[{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys2018\/CallforPapers","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}