{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:46:15Z","timestamp":1742931975408,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030152345"},{"type":"electronic","value":"9783030152352"}],"license":[{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-15235-2_81","type":"book-chapter","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T13:02:48Z","timestamp":1556110968000},"page":"569-579","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Human Action Recognition Based on Fusion Features"],"prefix":"10.1007","author":[{"given":"Shiqiang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jiangtao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guohao","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Dexin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Cheng W, Xue Y, Liu C et al (2017) An efficient method of recognition human motion in human-robot interaction system. In: International conference on electrical engineering and automation, pp 785\u2013793","key":"81_CR1","DOI":"10.1142\/9789813220362_0094"},{"issue":"01","key":"81_CR2","first-page":"35","volume":"27","author":"R Li","year":"2014","unstructured":"Li R, Wang L, Wang W (2014) A review of research on human action recognition. Pattern Recognit Artif Intell 27(01):35\u201348 (in Chinese)","journal-title":"Pattern Recognit Artif Intell"},{"issue":"3","key":"81_CR3","first-page":"63","volume":"59","author":"I Lillo","year":"2016","unstructured":"Lillo I, Niebles JC, Soto A (2016) Sparse composition of body poses and atomic actions for human activity recognition in RGB-D videos. Image Vis Comput 59(3):63\u201375","journal-title":"Image Vis Comput"},{"issue":"PB","key":"81_CR4","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1016\/j.neucom.2014.08.003","volume":"149","author":"Y Li","year":"2015","unstructured":"Li Y, Wang S, Tian Q et al (2015) A survey of recent advances in visual feature detection. Neurocomputing 149(PB):736\u2013751","journal-title":"Neurocomputing"},{"issue":"8","key":"81_CR5","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1109\/TIP.2017.2708506","volume":"26","author":"X Chang","year":"2017","unstructured":"Chang X, Ma Z, Lin M et al (2017) Feature interaction augmented sparse learning for fast kinect motion detection. IEEE Trans Image Process 26(8):3911\u20133920","journal-title":"IEEE Trans Image Process"},{"doi-asserted-by":"crossref","unstructured":"Raptis M, Kirovski D et al (2011) Real-time classification of dance gestures from skeleton animation, vol 8, pp 147\u2013156","key":"81_CR6","DOI":"10.1145\/2019406.2019426"},{"unstructured":"Shimada A, Taniguchi RI (2012) Gesture recognition using sparse code of hierarchical SOM. In: International conference on pattern recognition, pp 1\u20134","key":"81_CR7"},{"issue":"105","key":"81_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.neucom.2012.04.038","volume":"105","author":"X Zhao","year":"2013","unstructured":"Zhao X, Li X, Pang C et al (2013) Human action recognition based on semi-supervised discriminant analysis with global constraint. Neurocomputing 105(105):45\u201350","journal-title":"Neurocomputing"},{"unstructured":"Vieira AW, Lewiner T, Schwartz WR et al (2012) Distance matrices as invariant features for classifying MoCap data. In: International conference on pattern recognition, pp 2934\u20132937","key":"81_CR9"},{"issue":"1","key":"81_CR10","first-page":"1","volume":"12","author":"X Li","year":"2017","unstructured":"Li X, Zhang Y, Liao D (2017) Mining key skeleton poses with latent SVM for action recognition. Comput Intell Soft Comput 12(1):1\u201311","journal-title":"Comput Intell Soft Comput"},{"doi-asserted-by":"crossref","unstructured":"Neili S, Gazzah S, Yacoubi MAE et al (2017) Human posture recognition approach based on ConvNets and SVM classifier. In: International conference on advanced technologies for signal and image processing, pp 85\u201391","key":"81_CR11","DOI":"10.1109\/ATSIP.2017.8075518"},{"unstructured":"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=52283&from=http%3A%2F%2Fresearch.microsoft.com%2Fen-us%2Fum%2Fcambridge%2Fprojects%2Fmsrc12%2F","key":"81_CR12"}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15235-2_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:05:08Z","timestamp":1558148708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15235-2_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,25]]},"ISBN":["9783030152345","9783030152352"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15235-2_81","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,25]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2019.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}