{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:46:36Z","timestamp":1743018396182,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031581809"},{"type":"electronic","value":"9783031581816"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-58181-6_45","type":"book-chapter","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T10:03:42Z","timestamp":1719914622000},"page":"532-543","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fusion of\u00a0LSTM and\u00a0RNN for\u00a0Abnormal Activity Detection from\u00a0CCTV Camera Feeds"],"prefix":"10.1007","author":[{"given":"Vijay","family":"Ukani","sequence":"first","affiliation":[]},{"given":"Pritam","family":"Prajapati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Abdali, A.R.: Data efficient video transformer for violence detection. In: 2021 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), pp. 195\u2013199. IEEE (2021)","DOI":"10.1109\/COMNETSAT53002.2021.9530829"},{"issue":"4","key":"45_CR2","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/08839514.2020.1723876","volume":"34","author":"S Accattoli","year":"2020","unstructured":"Accattoli, S., Sernani, P., Falcionelli, N., Mekuria, D.N., Dragoni, A.F.: Violence detection in videos by combining 3D convolutional neural networks and support vector machines. Appl. Artif. Intell. 34(4), 329\u2013344 (2020)","journal-title":"Appl. Artif. Intell."},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Biradar, K., Dube, S., Vipparthi, S.K.: DEARESt: deep convolutional aberrant behavior detection in real-world scenarios. In: 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS), pp. 163\u2013167. IEEE (2018)","DOI":"10.1109\/ICIINFS.2018.8721378"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Dosovitskiy, A., et al.: FlowNet: learning optical flow with convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2758\u20132766 (2015)","DOI":"10.1109\/ICCV.2015.316"},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.apacoust.2019.07.033","volume":"156","author":"F Ertam","year":"2019","unstructured":"Ertam, F.: An effective gender recognition approach using voice data via deeper LSTM networks. Appl. Acoust. 156, 351\u2013358 (2019)","journal-title":"Appl. Acoust."},{"issue":"4","key":"45_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s42979-020-00207-x","volume":"1","author":"R Halder","year":"2020","unstructured":"Halder, R., Chatterjee, R.: CNN-BiLSTM model for violence detection in smart surveillance. SN Comput. Sci. 1(4), 201 (2020)","journal-title":"SN Comput. Sci."},{"key":"45_CR7","unstructured":"Hao, K.: We analyzed 16,625 papers to figure out where AI is headed next (2020)"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/JBHI.2018.2808281","volume":"23","author":"N Lu","year":"2018","unstructured":"Lu, N., Wu, Y., Feng, L., Song, J.: Deep learning for fall detection: three-dimensional CNN combined with LSTM on video kinematic data. IEEE J. Biomed. Health Inform. 23(1), 314\u2013323 (2018)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"45_CR9","first-page":"1","volume":"2021","author":"Q Ma","year":"2021","unstructured":"Ma, Q.: Abnormal event detection in videos based on deep neural networks. Sci. Program. 2021, 1\u20138 (2021)","journal-title":"Sci. Program."},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"de\u00a0Oliveira\u00a0Lima, J.P., Figueiredo, C.M.S.: A temporal fusion approach for video classification with convolutional and LSTM neural networks applied to violence detection. Intell. Artif. 24(67), 40\u201350 (2021)","DOI":"10.4114\/intartif.vol24iss67pp40-50"},{"issue":"2","key":"45_CR11","first-page":"1076","volume":"28","author":"M Pathade","year":"2022","unstructured":"Pathade, M., Khambete, M.: Recognition of crowd abnormal activities using fusion of handcrafted and deep features. Indon. J. Electr. Eng. Comput. Sci. 28(2), 1076\u20131087 (2022)","journal-title":"Indon. J. Electr. Eng. Comput. Sci."},{"key":"45_CR12","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-981-19-8825-7_7","volume-title":"Proceedings of International Conference on Recent Trends in Computing","author":"S Rathi","year":"2023","unstructured":"Rathi, S., Sharma, S., Ojha, S., Kumar, K.: Violence recognition from videos using deep learning. In: Mahapatra, R.P., Peddoju, S.K., Roy, S., Parwekar, P. (eds.) Proceedings of International Conference on Recent Trends in Computing. Lecture Notes in Networks and Systems, vol. 600, pp. 69\u201377. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-8825-7_7"},{"issue":"10","key":"45_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.5897\/JMCS2018.0627","volume":"10","author":"K Ravichandran","year":"2018","unstructured":"Ravichandran, K., Arulchelvan, S., PeriyaKannan, K.: Perception of medical awareness of media analyzed by multilayer perceptron. J. Media Commun. Stud. 10(10), 118\u2013127 (2018)","journal-title":"J. Media Commun. Stud."},{"issue":"9","key":"45_CR14","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1162\/neco_a_00990","volume":"29","author":"W Rawat","year":"2017","unstructured":"Rawat, W., Wang, Z.: Deep convolutional neural networks for image classification: a comprehensive review. Neural Comput. 29(9), 2352\u20132449 (2017)","journal-title":"Neural Comput."},{"key":"45_CR15","doi-asserted-by":"publisher","first-page":"160580","DOI":"10.1109\/ACCESS.2021.3131315","volume":"9","author":"P Sernani","year":"2021","unstructured":"Sernani, P., Falcionelli, N., Tomassini, S., Contardo, P., Dragoni, A.F.: Deep learning for automatic violence detection: tests on the AIRTLab dataset. IEEE Access 9, 160580\u2013160595 (2021)","journal-title":"IEEE Access"},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Soliman, M.M., Kamal, M.H., Nashed, M.A.E.M., Mostafa, Y.M., Chawky, B.S., Khattab, D.: Violence recognition from videos using deep learning techniques. In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 80\u201385. IEEE (2019)","DOI":"10.1109\/ICICIS46948.2019.9014714"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"issue":"8","key":"45_CR18","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.3390\/s21082811","volume":"21","author":"W Ullah","year":"2021","unstructured":"Ullah, W., Ullah, A., Hussain, T., Khan, Z.A., Baik, S.W.: An efficient anomaly recognition framework using an attention residual LSTM in surveillance videos. Sensors 21(8), 2811 (2021)","journal-title":"Sensors"},{"issue":"6","key":"45_CR19","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.3390\/s22062216","volume":"22","author":"R Vijeikis","year":"2022","unstructured":"Vijeikis, R., Raudonis, V., Dervinis, G.: Efficient violence detection in surveillance. Sensors 22(6), 2216 (2022)","journal-title":"Sensors"},{"issue":"3","key":"45_CR20","doi-asserted-by":"publisher","first-page":"406","DOI":"10.3390\/en10030406","volume":"10","author":"D Wei","year":"2017","unstructured":"Wei, D., et al.: Research on unstructured text data mining and fault classification based on RNN-LSTM with malfunction inspection report. Energies 10(3), 406 (2017)","journal-title":"Energies"}],"container-title":["Communications in Computer and Information Science","Computer Vision and Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-58181-6_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T10:13:31Z","timestamp":1719915211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-58181-6_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031581809","9783031581816"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-58181-6_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CVIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Image Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cvip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iitjammu.ac.in\/cvip2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"461","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"140","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}