{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:46:42Z","timestamp":1773438402943,"version":"3.50.1"},"reference-count":36,"publisher":"American Society of Civil Engineers (ASCE)","issue":"6","content-domain":{"domain":["ascelibrary.org"],"crossmark-restriction":true},"short-container-title":["J. Comput. Civ. Eng."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1061\/(asce)cp.1943-5487.0000704","type":"journal-article","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T16:07:32Z","timestamp":1501258052000},"update-policy":"https:\/\/doi.org\/10.1061\/do.news.20190416.0001","source":"Crossref","is-referenced-by-count":22,"title":["Simulation-Based Optimization of Surveillance Camera Types, Number, and Placement in Buildings Using BIM"],"prefix":"10.1061","volume":"31","author":[{"given":"Ameen Hamza","family":"Albahri","sequence":"first","affiliation":[{"name":"Ph.D. Candidate, Dept. of Building, Civil and Environmental Engineering, Concordia Univ., Montreal, QC, Canada H3G 2W1."}]},{"given":"Amin","family":"Hammad","sequence":"additional","affiliation":[{"name":"Professor, Concordia Institute for Information Systems Engineering, Concordia Univ., 1515 Sainte Catherine St. West, Montreal, QC, Canada H3G 2W1 (corresponding author)."}]}],"member":"30","reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-137-7"},{"key":"e_1_3_2_3_1","unstructured":"Albahri A. and Hammad A. (2015). \u201cEvaluating the coverage of surveillance cameras using BIM and game engine.\u201d 2nd Int. Conf. on Civil and Building Engineering Informatics Committee on Civil Engineering Informatics of Japan Society of Civil Engineers and Japan Construction Information Center Tokyo."},{"key":"e_1_3_2_4_1","doi-asserted-by":"crossref","unstructured":"Albahri A. and Hammad A. (2016). \u201cOptimizing surveillance camera placement in buildings using BIM.\u201d Proc. Int. Symp. on Automation and Robotics in Construction International Association for Automation and Robotics in Construction Auburn AL.","DOI":"10.22260\/ISARC2016\/0088"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1247-1"},{"key":"e_1_3_2_6_1","unstructured":"Autodesk Revit [Computer software]. Autodesk San Rafael CA."},{"key":"e_1_3_2_7_1","unstructured":"Axis Communications. (2013). \u201cAxis camera families now available for Autodesk Seek while new Axis camera view add-in provides 3D camera perspectives for Autodesk Revit users.\u201d \u27e8http:\/\/www.innovativeretailtechnologies.com\/doc\/axis-camera-available-autodesk-whilenew-perspectives-revit-users-0001\u27e9 (Nov. 11 2014)."},{"key":"e_1_3_2_8_1","unstructured":"Axis Communications. (2015). \u201cNetwork cameras.\u201d \u27e8http:\/\/www.axis.com\/global\/en\/products\/network-cameras\u27e9 (Dec. 22 2015)."},{"key":"e_1_3_2_9_1","volume-title":"Classification and learning using genetic algorithms: Applications in bioinformatics and web intelligence","author":"Bandyopadhyay S.","year":"2007"},{"key":"e_1_3_2_10_1","unstructured":"Bernard R. (2014). \u201cConvergence Q&A: Convergence in design: Virtual construction.\u201d \u27e8http:\/\/www.securityinfowatch.com\/article\/11476902\/bim-modeling-is-not-evolution-of-security-systems-planning\u27e9 (Feb. 25 2016)."},{"key":"e_1_3_2_11_1","unstructured":"Bigdeli A. Lovell B. C. Sanderson C. Shan T. and Chen S. (2007). \u201cVision processing in intelligent CCTV for mass transport security.\u201d IEEE Workshop on Signal Processing Applications for Public Security and Forensics (SAFE\u201907) IEEE New York 1\u20134."},{"key":"e_1_3_2_12_1","unstructured":"Bosch. (2015). \u201cBosch to provide BIM files to facilitate construction. Improving efficiency for contractors and building designers.\u201d \u27e8http:\/\/us.boschsecurity.com\/en\/05_news_and_extras_2\/05_04_press_releases_2\/2015_1\/bosch_to_provide_bim_files_to_facilitate_construction\/bosch_to_provide_bim_files_to_facilitate_construction\u27e9 (Jan. 10 2016)."},{"key":"e_1_3_2_13_1","unstructured":"Bremer D. (2011). \u201cBIM and security system design. Modeling capabilities demonstrate security integration.\u201d \u27e8http:\/\/www.ecmag.com\/section\/systems\/bim-and-security-system-design\u27e9 (Nov. 10 2015)."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/2213-7459-1-5"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(89)80003-3"},{"key":"e_1_3_2_18_1","unstructured":"de Freitas A. (2012). \u201cMatlab central: Open genetic algorithm toolbox.\u201d \u27e8http:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/37998-open-genetic-algorithm-toolbox\u27e9 (Oct. 15 2015)."},{"key":"e_1_3_2_19_1","volume-title":"BIM handbook: A guide to building information modeling for owners, managers, designers, engineers, and contractors","author":"Eastman C.","year":"2011","edition":"2"},{"key":"e_1_3_2_20_1","volume-title":"Evolutionary multi-objective optimization in uncertain environments","author":"Goh C.-K.","year":"2009"},{"key":"e_1_3_2_21_1","doi-asserted-by":"crossref","unstructured":"Janoos F. Machiraju R. Parent R. Davis J. W. and Murray A. (2007). \u201cSensor configuration for coverage optimization for surveillance applications.\u201d Proc. SPIE Bellingham WA 649105.","DOI":"10.1117\/12.704062"},{"key":"e_1_3_2_22_1","unstructured":"Kelly H. (2013). \u201cAfter Boston: The pros and cons of surveillance cameras.\u201d \u27e8http:\/\/www.cnn.com\/2013\/04\/26\/tech\/innovation\/security-cameras-boston-bombings\/\u27e9 (Sep. 25 2013)."},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1068\/b33139"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2103310"},{"key":"e_1_3_2_25_1","unstructured":"Mansurov N. (2015). \u201cEquivalent focal length and field of view.\u201d \u27e8https:\/\/photographylife.com\/equivalent-focal-length-and-field-of-view\u27e9 (Jan. 6 2017)."},{"key":"e_1_3_2_26_1","unstructured":"MATLAB [Computer software]. MathWorks Natick MA."},{"key":"e_1_3_2_27_1","volume-title":"IP camera protection: Get the heat out. A discussion on heat and security cameras","author":"MoogVideolarm","year":"2012"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2170833"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2006.06.002"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1266-y"},{"key":"e_1_3_2_31_1","volume-title":"Video installation tips: Solutions for high vibration applications","author":"OPTICOM","year":"2013"},{"key":"e_1_3_2_32_1","volume-title":"Art gallery theorems and algorithms","author":"O\u2019Rourke J.","year":"1987"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2011.03.007"},{"key":"e_1_3_2_34_1","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-19893-9_10","volume-title":"Evolutionary multi-criterion optimization","author":"Purshouse R. C.","year":"2011"},{"key":"e_1_3_2_35_1","unstructured":"Raub E. (2016). \u201cHow to burglar proof windows.\u201d \u27e8https:\/\/www.safety.com\/blog\/how-to-burglar-proof-windows\/\u27e9 (Dec. 15 2016)."},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2015.02.001"},{"key":"e_1_3_2_37_1","unstructured":"Unity3D [Computer software]. Unity San Francisco."},{"key":"e_1_3_2_38_1","unstructured":"Wilkis K. (2015). \u201cWho\u2019s watching you? Video surveillance-user beware.\u201d \u27e8http:\/\/blog.willis.com\/2015\/05\/whos-watching-you-video-surveillance-user-beware\/\u27e9 (Oct. 23 2015)."},{"key":"e_1_3_2_39_1","unstructured":"Yabuta K. and Kitazawa H. (2008). \u201cOptimum camera placement considering camera specification for security monitoring.\u201d IEEE Int. Symp. on Circuits and Systems IEEE New York 2114\u20132117."}],"container-title":["Journal of Computing in Civil Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ascelibrary.org\/doi\/pdf\/10.1061\/%28ASCE%29CP.1943-5487.0000704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:18:39Z","timestamp":1654820319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ascelibrary.org\/doi\/10.1061\/%28ASCE%29CP.1943-5487.0000704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["10.1061\/(ASCE)CP.1943-5487.0000704"],"URL":"https:\/\/doi.org\/10.1061\/(asce)cp.1943-5487.0000704","relation":{},"ISSN":["0887-3801","1943-5487"],"issn-type":[{"value":"0887-3801","type":"print"},{"value":"1943-5487","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"2016-10-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"04017055"}}