{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:55:45Z","timestamp":1743137745986,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811951930"},{"type":"electronic","value":"9789811951947"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-5194-7_27","type":"book-chapter","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T23:03:17Z","timestamp":1660086197000},"page":"363-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Video Object Detection Methods Based on YOLO with Motion Features"],"prefix":"10.1007","author":[{"given":"Chuanxin","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yalei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ruitong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chunguang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"177131","DOI":"10.1109\/ACCESS.2020.3024926","volume":"8","author":"A Shifa","year":"2020","unstructured":"Shifa, A., et al.: MuLViS: multi-level encryption based security system for surveillance videos. IEEE Access 8, 177131\u2013177155 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3024926","journal-title":"IEEE Access"},{"issue":"2","key":"27_CR2","first-page":"49","volume":"22","author":"H Hou","year":"2012","unstructured":"Hou, H., Li, N., Liu, D.: Research on moving object detection in intelligent video surveillance. Comput. Technol. Dev. 22(2), 49\u201352 (2012)","journal-title":"Comput. Technol. Dev."},{"issue":"10","key":"27_CR3","first-page":"221","volume":"23","author":"Y Wan","year":"2006","unstructured":"Wan, Y., Han, Y., Lu, H.: The methods for moving object detection. Comput. Simul. 23(10), 221\u2013226 (2006)","journal-title":"Comput. Simul."},{"key":"27_CR4","doi-asserted-by":"publisher","unstructured":"Lipton, A.J., Fujiyoshi, H., Patil, R.S.: Moving target classification and tracking from real-time video. In: Proceedings Fourth IEEE Workshop on Applications of Computer Vision, WACV 1998 (Cat. No. 98EX201), pp. 8\u201314 (1998). https:\/\/doi.org\/10.1109\/ACV.1998.732851","DOI":"10.1109\/ACV.1998.732851"},{"key":"27_CR5","first-page":"1","volume":"122","author":"AD Alzughaibi","year":"2015","unstructured":"Alzughaibi, A.D., Hakami, H.A., Chaczko, Z.: Review of human motion detection based on background subtraction techniques. Int. J. Comput. Appl. 122, 1\u20135 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Wu, L., Liu, Z., Li, Y.: Moving objects detection based on embedded video surveillance. In: 2012 International Conference on Systems and Informatics (ICSAI 2012), pp. 2042\u20132045 (2012). https:\/\/doi.org\/10.1109\/IC-SAI.2012.6223453","DOI":"10.1109\/IC-SAI.2012.6223453"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Lijing, C., Ke, T., Zhonglin, F.: Moving target recognition under static background. In: 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp. 117\u2013120 (2014). https:\/\/doi.org\/10.1109\/IMCCC.2014.32","DOI":"10.1109\/IMCCC.2014.32"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You Only Look Once: Unified, Real-Time Object Detection, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.-Y., Berg, A.C.: SSD: single shot multibox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Boyuan, W., Muqing, W.: Study on pedestrian detection based on an improved YOLOv4 algorithm. In: 2020 IEEE 6th International Conference on Computer and Communications (ICCC), pp. 1198\u20131202 (2020). https:\/\/doi.org\/10.1109\/ICCC51575.2020.9344983","DOI":"10.1109\/ICCC51575.2020.9344983"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Fei, R., Ou, L.: A video object detector based on deep reinforcement learning and correction module. In: 2020 IEEE 3rd International Conference on Electronics and Communication Engineering (ICECE), pp. 1\u20135 (2020). https:\/\/doi.org\/10.1109\/ICECE51594.2020.9353034","DOI":"10.1109\/ICECE51594.2020.9353034"},{"key":"27_CR12","doi-asserted-by":"publisher","unstructured":"Peng, Q., et al.: Pedestrian detection for transformer substation based on Gaussian mixture model and YOLO. In: 2016 8th International Conference on Intelligent Human\u2013Machine Systems and Cybernetics (IHMSC), pp. 562\u2013565 (2016). https:\/\/doi.org\/10.1109\/IHMSC.2016.130","DOI":"10.1109\/IHMSC.2016.130"},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Lu, Y., Chen, Y., Zhao, D., Li, H.: Hybrid deep learning based moving object detection via motion prediction. In: 2018 Chinese Automation Congress (CAC), pp. 1442\u20131447 (2018). https:\/\/doi.org\/10.1109\/CAC.2018.8623038","DOI":"10.1109\/CAC.2018.8623038"},{"issue":"2","key":"27_CR14","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vis. 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vis."},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Goyette, N., Jodoin, P., Porikli, F., Konrad, J., Ishwar, P.: Changedetection.net: a new change detection benchmark dataset. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1\u20138 (2012). https:\/\/doi.org\/10.1109\/CVPRW.2012.6238919","DOI":"10.1109\/CVPRW.2012.6238919"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5194-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:19:41Z","timestamp":1710256781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5194-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811951930","9789811951947"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5194-7_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}