{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:03Z","timestamp":1742914023837,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030620653"},{"type":"electronic","value":"9783030620660"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62066-0_3","type":"book-chapter","created":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T19:06:04Z","timestamp":1613070364000},"page":"23-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Application of Deep Neural Network for Robbery Evidence Using Face Recognition Approach"],"prefix":"10.1007","author":[{"given":"Alonso","family":"Medina Cortes","sequence":"first","affiliation":[]},{"given":"Magdalena","family":"Salda\u00f1a P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Humberto","family":"Sossa Azuela","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Torres Ruiz","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Moreno Ibarra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,12]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"N. Dalal, B. Triggs, C. Schmid, Human detection using oriented histograms of flow and appearance, pp. 428\u2013441. Springer (2006)","DOI":"10.1007\/11744047_33"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"W. Ouyang, X. Wang, Joint deep learning for pedestrian detection, in Proceedings of the IEEE International Conference on Computer Vision, pp. 2056\u20132063 (2013)","DOI":"10.1109\/ICCV.2013.257"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"O. Tuzel, F. Porikli, P. Meer, Human detection via classification on riemannian manifolds, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138 (2007)","DOI":"10.1109\/CVPR.2007.383197"},{"key":"3_CR4","unstructured":"N. Dalal, Finding people in images and videos. Doctoral dissertation (2006)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"A. Ess, B. Leibe, K. Schindler, L. Van Gool, A mobile vision system for robust multi-person tracking, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPR.2008.4587581"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"D.M. Gavrila, S. Munder, Multi-cue pedestrian detection and tracking from a moving vehicle. Int. J. Comput. Vision 41\u201359 (2007)","DOI":"10.1007\/s11263-006-9038-7"},{"key":"3_CR7","unstructured":"A.G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, Weyand, Mobilenets: efficient convolutional neural networks for mobile vision applications. Google Inc. pp. 1\u20139 (2017)"},{"key":"3_CR8","unstructured":"T. Ebrahimi, F. Dufaux, Smart Video Surveillance System Ensuring Privacy.\u00a0U.S. Patent Application No. 11\/631, 806 (2007)"},{"key":"3_CR9","unstructured":"LANG, Steve; SISKIND, Barry.\u00a0Digital video surveillance system. U.S. Patent Application No 11\/891, 381 (14 Feb 2008)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"TIAN, Ying-li, et al., IBM smart surveillance system (S3): event based video surveillance system with an open and extensible framework.\u00a0Mach. Vision Appl. 315\u2013327 (2008)","DOI":"10.1007\/s00138-008-0153-z"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"M. Everingham, et al., The pascal visual object classes challenge: a retrospective.\u00a0Int. J. Comput. Vision 98\u2013136 (2015)","DOI":"10.1007\/s11263-014-0733-5"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"T.Y. Lin, et al., Microsoft coco: common objects in context, in\u00a0European conference on computer vision. Springer, Cham (2014)","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"3_CR13","unstructured":"Dalal, Navneet, and Bill Triggs. \u201cINRIA person dataset (2005)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"P. Doll\u00e1r, C. Wojek, B. Schiele, P. Perona, Pedestrian detection: a benchmark, in IEEE Conference on Computer Vision and Pattern Recognition, pp. 304\u2013311 (2009)","DOI":"10.1109\/CVPR.2009.5206631"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"H. Jiang, E. Learned-Miller, Face detection with the faster R-CNN, in IEEE International Conference on Automatic Face and Gesture Recognition, pp. 650\u2013657 (2017)","DOI":"10.1109\/FG.2017.82"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"J. Redmon, S. Divvala, R. Girshick, A. Farhadi, You only look once: unified, real-time object detection, in IEEE conference on computer vision and pattern recognition, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"3_CR17","unstructured":"P. Viola, M. Jones, Robust real-time object detection. Int. J. Comput. Vision 34\u201347 (2001)"},{"key":"3_CR18","unstructured":"S. Ren, K. He, R. Girshick, J. Sun, Faster r-cnn: towards real-time object detection with region proposal networks. Adv. Neural Inf. Process. Syst. 91\u201399 (2015)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"O.M. Parkhi, A. Vedaldi, A. Zisserman, Deep Face Recognition, pp. 1\u201312. University of Oxford (2015)","DOI":"10.5244\/C.29.41"},{"key":"3_CR20","unstructured":"M.Z. Alom, T.M. Taha, C. Yakopcic, S. Westberg, P. Sidike, Nasrin: the history began from alexnet: a comprehensive survey on deep learning approaches. arXiv, pp. 1\u201339 (2018)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"P. Mach, B. Zdenek, Mobile edge computing: a survey on architecture and computation offloading.\u00a0IEEE Commun. Surveys Tutorials\u00a019.3 (2017)","DOI":"10.1109\/COMST.2017.2682318"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Y. Mao, et al., A survey on mobile edge computing: the communication perspective.\u00a0IEEE Commun. Surveys Tutorials\u00a019.4 (2017)","DOI":"10.1109\/COMST.2017.2745201"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"W. Shi, et al., Edge computing: vision and challenges.\u00a0IEEE Internet Things J 3.5 (2016)","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"N. Dalal, B. Triggs, Histograms of oriented gradients for human detection, in IEEE computer society conference on computer vision and pattern recognition, pp. 886\u2013893 (2005)","DOI":"10.1109\/CVPR.2005.177"},{"key":"3_CR25","unstructured":"M.A. Turk, A.P. Pentland, Face recognition using eigenfaces, in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 586\u2013687 (1991)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"H. Li, Z. Lin, X. Shen, J. Brandt, G. Hua, A convolutional neural network cascade for face detection, in IEEE conference on computer vision and pattern recognition, pp. 5325\u20135334 (2015)","DOI":"10.1109\/CVPR.2015.7299170"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.Y. Fu, A.C. Berg, Ssd: single shot multibox detector, in European conference on computer vision, pp. 21\u201337 (2016)","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"T. Jameel, R. Ali, S. Ali, Security in modern smart cities, in International Conference on Communication, Computing and Digital systems. IEEE, pp. 293\u2013298 (2019)","DOI":"10.1109\/C-CODE.2019.8681021"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"S. Yang, P. Luo, C.C. Loy, X. Tang, From facial parts responses to face detection: a deep learning approach, in IEEE International Conference on Computer Vision, pp. 3676\u20133684 (2015)","DOI":"10.1109\/ICCV.2015.419"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"F. Schroff, D. Kalenichenko, J. Philbin, Facenet: a unified embedding for face recognition and clustering, in IEEE conference on computer vision and pattern recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"S. Yang, et al.,Wider face: a face detection benchmark, in\u00a0Proceedings of the IEEE conference on computer vision and pattern recognition (2016)","DOI":"10.1109\/CVPR.2016.596"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"N. Bodla, B. Singh, R. Chellappa, L.S. Davis, Soft-NMS\u2014improving object detection with one line of code, in IEEE international conference on computer vision, pp. 5561\u20135569 (2017)","DOI":"10.1109\/ICCV.2017.593"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"R. Girshick, Fast r-cnn, in IEEE international conference on computer vision, pp. 1440\u20131448 (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Z. Liu, Z. Chen, Z. Li, W. Hu, An efficient pedestrian detection method based on YOLOv2. Math. Problems Eng. 1\u201310 (2018)","DOI":"10.1155\/2018\/3518959"}],"container-title":["Springer Proceedings in Complexity","Research and Innovation Forum 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62066-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T02:07:07Z","timestamp":1724465227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62066-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030620653","9783030620660"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62066-0_3","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RIIFORUM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Research & Innovation Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"riiforum2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rii-forum.org\/2019\/08\/16\/rii-forum-2020-timeline\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}