{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:51:09Z","timestamp":1742968269440,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031160349"},{"type":"electronic","value":"9783031160356"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16035-6_6","type":"book-chapter","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T15:03:45Z","timestamp":1661958225000},"page":"65-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Smart Video Surveillance System for\u00a0Helping Law Enforcement Agencies in\u00a0Detecting Knife Related Crimes"],"prefix":"10.1007","author":[{"given":"Raed","family":"Abdallah","sequence":"first","affiliation":[]},{"given":"Salima","family":"Benbernou","sequence":"additional","affiliation":[]},{"given":"Yehia","family":"Taher","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Younas","sequence":"additional","affiliation":[]},{"given":"Rafiqul","family":"Haque","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.neucom.2018.10.076","volume":"330","author":"A Castillo","year":"2019","unstructured":"Castillo, A., Tabik, S., P\u00e9rez, F., Olmos, R., Herrera, F.: Brightness guided preprocessing for automatic cold steel weapon detection in surveillance videos with deep learning. Neurocomputing 330, 151\u2013161 (2019)","journal-title":"Neurocomputing"},{"key":"6_CR2","unstructured":"The United Nations Office on Drugs and Crime\u2019s: Global study on homicide 2019: executive summary (2019)"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The PASCAL Visual Object Classes (VOC) challenge. Int. J. Comput. Vision 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-030-31321-0_38","volume-title":"Pattern Recognition and Image Analysis","author":"MM Fernandez-Carrobles","year":"2019","unstructured":"Fernandez-Carrobles, M.M., Deniz, O., Maroto, F.: Gun and knife detection based on faster R-CNN for video surveillance. In: Morales, A., Fierrez, J., S\u00e1nchez, J.S., Ribeiro, B. (eds.) IbPRIA 2019. LNCS, vol. 11868, pp. 441\u2013452. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31321-0_38"},{"issue":"12","key":"6_CR5","doi-asserted-by":"publisher","first-page":"4253","DOI":"10.1007\/s11042-013-1537-2","volume":"74","author":"A Glowacz","year":"2015","unstructured":"Glowacz, A., Kmie\u0107, M., Dziech, A.: Visual detection of knives in security applications using active appearance models. Multimedia Tools Appl. 74(12), 4253\u20134267 (2015)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/s16010047","volume":"16","author":"M Grega","year":"2016","unstructured":"Grega, M., Matiola\u0144ski, A., Guzik, P., Leszczuk, M.: Automated detection of firearms and knives in a CCTV image. Sensors 16(1), 47 (2016)","journal-title":"Sensors"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Guo, R., Zhang, L., Ying, Y., Sun, H., Han, Y., Tan, H.: Automatic detection and identification of controlled knives based on improved SSD model. In: 2019 Chinese Automation Congress (CAC), pp. 5120\u20135125. IEEE (2019)","DOI":"10.1109\/CAC48633.2019.8996879"},{"key":"6_CR8","unstructured":"Huang, J., et al.: TensorFlow object detection API, Code. https:\/\/github.com\/tensorflow\/models.git. Documentation. https:\/\/modelzoo.co\/model\/objectdetection"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Huang, J., et al.: Speed\/accuracy trade-offs for modern convolutional object detectors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7310\u20137311 (2017)","DOI":"10.1109\/CVPR.2017.351"},{"key":"6_CR10","unstructured":"Jiang, S., Qin, H., Zhang, B., Zheng, J.: Optimized loss functions for object detection and application on nighttime vehicle detection. arXiv preprint arXiv:2011.05523 (2020)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.patrec.2014.09.018","volume":"52","author":"M Kmie\u0107","year":"2015","unstructured":"Kmie\u0107, M., Glowacz, A.: Object detection in security applications using dominant edge directions. Pattern Recogn. Lett. 52, 72\u201379 (2015)","journal-title":"Pattern Recogn. Lett."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Kundegorski, M.E., Ak\u00e7ay, S., Devereux, M., Mouton, A., Breckon, T.P.: On using feature descriptors as visual words for object detection within x-ray baggage security screening. In: 7th International Conference on Imaging for Crime Detection and Prevention (ICDP 2016), pp. 1\u20136. IEEE (2016)","DOI":"10.1049\/ic.2016.0080"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: single shot MultiBox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Navalgund, U.V., Priyadharshini, K.: Crime intention detection system using deep learning. In: 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICCSDET.2018.8821168"},{"key":"6_CR16","unstructured":"Noever, D.A., Noever, S.E.M.: Knife and threat detectors. arXiv preprint arXiv:2004.03366, pp. 1\u20138 (2020)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520 (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"key":"6_CR18","unstructured":"Sarkar, D., Bali, R., Ghosh, T.: Hands-On Transfer Learning with Python: Implement Advanced Deep Learning and Neural Network Models Using TensorFlow and Keras. Packt Publishing Ltd. (2018)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"}],"container-title":["Lecture Notes in Networks and Systems","The International Conference on Deep Learning, Big Data and Blockchain (DBB 2022)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16035-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T15:07:44Z","timestamp":1661958464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16035-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9783031160349","9783031160356"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16035-6_6","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"1 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Deep Learning, Big Data and Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"deepbdb2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ficloud.org\/dbb2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}