{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:05:45Z","timestamp":1774195545691,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6-7","license":[{"start":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:00:00Z","timestamp":1747180800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:00:00Z","timestamp":1747180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12652-025-04974-4","type":"journal-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:43:52Z","timestamp":1747201432000},"page":"727-760","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HyDeepIDF-Net: Hybrid Deep ID FaceNet for Person Re-Identification"],"prefix":"10.1007","volume":"16","author":[{"given":"Kedar Nagnathrao","family":"Ghogale","sequence":"first","affiliation":[]},{"given":"Ravindra Sadashivrao","family":"Apare","sequence":"additional","affiliation":[]},{"given":"Ravindra H.","family":"Borhade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"4974_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed E, Jones M and Marks TK (2015) An improved deep learning architecture for person re-identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3908\u20133916","DOI":"10.1109\/CVPR.2015.7299016"},{"issue":"3","key":"4974_CR2","doi-asserted-by":"publisher","first-page":"1450011","DOI":"10.1142\/S0219467814500119","volume":"14","author":"H Ali","year":"2014","unstructured":"Ali H, Tariq UU, Abid M (2014) Learning discriminating features for gender recognition of real world faces. Int J Image Graph 14(3):1450011","journal-title":"Int J Image Graph"},{"issue":"11","key":"4974_CR3","doi-asserted-by":"publisher","first-page":"7951","DOI":"10.1109\/TCSVT.2022.3189027","volume":"32","author":"T Chai","year":"2022","unstructured":"Chai T, Chen Z, Li A, Chen J, Mei X, Wang Y (2022) Video person re-identification using attribute-enhanced features. IEEE Trans Circ Syst Video Technol 32(11):7951\u20137966","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"4974_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2019.111793","volume":"198","author":"Z Chen","year":"2019","unstructured":"Chen Z, Chen Y, Wu L, Cheng S, Lin P (2019) Deep residual network based fault detection and diagnosis of photovoltaic arrays using current-voltage curves and ambient conditions. Energy Convers Manage 198:111793","journal-title":"Energy Convers Manage"},{"issue":"4","key":"4974_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.21275\/v5i4.NOV162465","volume":"5","author":"MK Dabhi","year":"2016","unstructured":"Dabhi MK, Pancholi BK (2016) Face detection system based on Viola-Jones algorithm. Int J Sci Res (IJSR) 5(4):62\u201364","journal-title":"Int J Sci Res (IJSR)"},{"issue":"1","key":"4974_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1177\/1470357206060917","volume":"5","author":"R Flewitt","year":"2006","unstructured":"Flewitt R (2006) Using video to investigate preschool classroom interaction: education research assumptions and methodological practices. Vis Commun 5(1):25\u201350","journal-title":"Vis Commun"},{"key":"4974_CR7","doi-asserted-by":"publisher","first-page":"29399","DOI":"10.1007\/s11042-020-09528-8","volume":"79","author":"K Jayapriya","year":"2020","unstructured":"Jayapriya K, Jacob IJ, Mary NAB (2020) Person re-identification using prioritized chromatic texture (PCT) with deep learning. Multimed Tools Appl 79:29399\u201329410","journal-title":"Multimed Tools Appl"},{"key":"4974_CR8","unstructured":"Jewitt C (2012) An introduction to using video for research"},{"key":"4974_CR9","unstructured":"Li Y, Zhang T and Tretter D (2001) An overview of video abstraction techniques"},{"key":"4974_CR10","doi-asserted-by":"crossref","unstructured":"Liu C, Gong S, Loy CC and Lin X (2012) Person re-identification: What features are important?. In: Proceedings of Computer Vision\u2013ECCV 2012. Workshops and Demonstrations: Florence, Italy, October 7\u201313, 2012, Proceedings, Part I 12, pp 391\u2013401, Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-33863-2_39"},{"key":"4974_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104068","volume":"106","author":"G Liu","year":"2021","unstructured":"Liu G, Wu J (2021) Video-based person re-identification by intra-frame and inter-frame graph neural network. Image vis Comput 106:104068","journal-title":"Image vis Comput"},{"key":"4974_CR12","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Del Rincon JM and Miller P (2016) Recurrent convolutional network for video-based person re-identification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1325\u20131334","DOI":"10.1109\/CVPR.2016.148"},{"key":"4974_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2022.104394","volume":"119","author":"Z Ming","year":"2022","unstructured":"Ming Z, Zhu M, Wang X, Zhu J, Cheng J, Gao C, Yang Y, Wei X (2022) Deep learning-based person re-identification methods: a survey and outlook of recent works. Image vis Comput 119:104394","journal-title":"Image vis Comput"},{"issue":"19","key":"4974_CR14","doi-asserted-by":"publisher","first-page":"3530","DOI":"10.3390\/math10193530","volume":"10","author":"HJ Mohammed","year":"2022","unstructured":"Mohammed HJ, Al-Fahdawi S, Al-Waisy AS, Zebari DA, Ibrahim DA, Mohammed MA, Kadry S, Kim J (2022) ReID-DeePNet: a hybrid deep learning system for person re-identification. Mathematics 10(19):3530","journal-title":"Mathematics"},{"key":"4974_CR15","doi-asserted-by":"publisher","first-page":"14270","DOI":"10.1109\/ACCESS.2022.3147869","volume":"10","author":"HT Nguyen","year":"2022","unstructured":"Nguyen HT, Li S, Cheah CC (2022) A layer-wise theoretical framework for deep learning of convolutional neural networks. IEEE Access 10:14270\u201314287","journal-title":"IEEE Access"},{"key":"4974_CR16","doi-asserted-by":"crossref","unstructured":"Ouyang W, Wang X, Zeng X, Qiu S, Luo P, Tian Y, Li H, Yang S, Wang Z, Loy CC and Tang X (2015) Deepid-net: Deformable deep convolutional neural networks for object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2403\u20132412","DOI":"10.1109\/CVPR.2015.7298854"},{"issue":"11","key":"4974_CR17","doi-asserted-by":"publisher","first-page":"13567","DOI":"10.1109\/TPAMI.2023.3297058","volume":"45","author":"N Pu","year":"2023","unstructured":"Pu N, Zhong Z, Sebe N, Lew MS (2023) A memorizing and generalizing framework for lifelong person re-identification. IEEE Trans Pattern Anal Mach Intell 45(11):13567\u201313585","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4974_CR18","unstructured":"Re-Identification Across Indoor-Outdoor Dataset (RAiD) is taken from \u201chttps:\/\/github.com\/dasabir\/RAiD_Dataset\u201d, accessed on May 2024"},{"key":"4974_CR19","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.ins.2022.10.105","volume":"617","author":"S Saber","year":"2022","unstructured":"Saber S, Amin K, P\u0142awiak P, Tadeusiewicz R, Hammad M (2022) Graph convolutional network with triplet attention learning for person re-identification. Inf Sci 617:331\u2013345","journal-title":"Inf Sci"},{"issue":"7","key":"4974_CR20","doi-asserted-by":"publisher","first-page":"3678","DOI":"10.3390\/s23073678","volume":"23","author":"S Saber","year":"2023","unstructured":"Saber S, Meshoul S, Amin K, P\u0142awiak P, Hammad M (2023) A multi-attention approach for person re-identification using deep learning. Sensors 23(7):3678","journal-title":"Sensors"},{"key":"4974_CR21","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D and Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 815\u2013823","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"4974_CR22","unstructured":"Starter: person reidentification dataset is taken from \u201chttps:\/\/www.kaggle.com\/code\/kerneler\/starter-person-reidentification-8781826b-0\/input,\u201d accessed on October 2024"},{"key":"4974_CR23","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cnsns.2018.04.019","volume":"64","author":"H Sun","year":"2018","unstructured":"Sun H, Zhang Y, Baleanu D, Chen W, Chen Y (2018) A new collection of real world applications of fractional calculus in science and engineering. Commun Nonlinear Sci Numer Simul 64:213\u2013231","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4974_CR24","doi-asserted-by":"crossref","unstructured":"Tang S, Andriluka M, Andres B and Schiele B (2017) Multiple people tracking by lifted multicut and person re-identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3539\u20133548","DOI":"10.1109\/CVPR.2017.394"},{"key":"4974_CR25","doi-asserted-by":"crossref","unstructured":"Varior RR, Haloi M and Wang G (2016) Gated siamese convolutional neural network architecture for human re-identification. In: Proceedings of Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part VIII 14, pp 791\u2013808, Springer International Publishing","DOI":"10.1007\/978-3-319-46484-8_48"},{"issue":"12","key":"4974_CR26","doi-asserted-by":"publisher","first-page":"8179","DOI":"10.1109\/TCSVT.2021.3076097","volume":"32","author":"Z Wang","year":"2021","unstructured":"Wang Z, He L, Tu X, Zhao J, Gao X, Shen S, Feng J (2021a) Robust video-based person re-identification by hierarchical mining. IEEE Trans Circ Syst Video Technol 32(12):8179\u20138191","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"4974_CR27","doi-asserted-by":"publisher","first-page":"3017","DOI":"10.1109\/TIP.2021.3056223","volume":"30","author":"X Wang","year":"2021","unstructured":"Wang X, Liu M, Raychaudhuri DS, Paul S, Wang Y, Roy-Chowdhury AK (2021b) Learning person re-identification models from videos with weak supervision. IEEE Trans Image Process 30:3017\u20133028","journal-title":"IEEE Trans Image Process"},{"key":"4974_CR28","doi-asserted-by":"publisher","first-page":"70447","DOI":"10.1109\/ACCESS.2019.2919806","volume":"7","author":"SY Wong","year":"2019","unstructured":"Wong SY, Yap KS, Zhai Q, Li X (2019) Realization of a hybrid locally connected extreme learning machine with DeepID for face verification. IEEE Access 7:70447\u201370460","journal-title":"IEEE Access"},{"key":"4974_CR29","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1109\/TIFS.2024.3356233","volume":"19","author":"M Ye","year":"2024","unstructured":"Ye M, Shen W, Zhang J, Yang Y, Du B (2024) SecureReID: privacy-preserving anonymization for person re-identification. IEEE Trans Inf Forensics Secur 19:2840\u20132853","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4974_CR30","doi-asserted-by":"crossref","unstructured":"Yu SI, Yang Y and Hauptmann A (2013) Harry potter's marauder's map: localizing and tracking multiple persons-of-interest by nonnegative discretization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 3714\u20133720","DOI":"10.1109\/CVPR.2013.476"},{"key":"4974_CR31","unstructured":"Zheng L, Yang Y and Hauptmann AG (2016) Person re-identification: past, present and future. arXiv preprint arXiv:1610.02984"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-04974-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-025-04974-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-04974-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T14:43:44Z","timestamp":1757169824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-025-04974-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,14]]},"references-count":31,"journal-issue":{"issue":"6-7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["4974"],"URL":"https:\/\/doi.org\/10.1007\/s12652-025-04974-4","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,14]]},"assertion":[{"value":"15 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}