{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:32:49Z","timestamp":1730219569862,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6022904","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:24:52Z","timestamp":1318451092000},"page":"230-233","source":"Crossref","is-referenced-by-count":5,"title":["Review of intelligent video surveillance technology research"],"prefix":"10.1109","author":[{"given":"Caiyan","family":"Yu","sequence":"first","affiliation":[{"name":"Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Network, Jinan, China"}]},{"given":"Xiaoshi","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Network, Jinan, China"}]},{"given":"Yanling","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Network, Jinan, China"}]},{"given":"Guangqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Network, Jinan, China"}]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center, Shandong Provincial Key Laboratory of Computer Network, Jinan, China"}]}],"member":"263","reference":[{"key":"19","first-page":"59","article-title":"Technology and application of intelligent video surveillance [J]","volume":"3","author":"zheng","year":"2009","journal-title":"Safety amp Security Technology"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/34.910878"},{"journal-title":"Research on Intelligent Video Surveillance Technology [D]","year":"2008","author":"kong","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2003.12.001"},{"key":"16","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1006\/cviu.2000.0891","article-title":"Tracking and modeling people in video sequences [J]","volume":"81","author":"ralf","year":"2001","journal-title":"Computer Vision and Image Understanding"},{"key":"13","first-page":"201","article-title":"The algorithm of small targets classification in video surveillance system[J]","volume":"34","author":"fang","year":"2005","journal-title":"Information and Control"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HAVE.2002.1106920"},{"journal-title":"Wavelet Coding and Network Video Transmission [M]","year":"2005","author":"shen","key":"11"},{"key":"12","first-page":"212","article-title":"Detection algorithm of moving objects based on background subtraction method","volume":"30","author":"li","year":"2008","journal-title":"Beijing Keji Daxue Xuebao\/Journal of University of Science and Technology Beijing"},{"key":"3","first-page":"1506","article-title":"Shen lan-sun. Intelligent visual surveillance technology: A survey [J]","volume":"9","author":"suyu","year":"2007","journal-title":"Journal of Image and Graphics"},{"key":"20","first-page":"221","article-title":"Seibert detecting abandoned packages in a multi-camera video surveillance system[C]","author":"baynon","year":"2003","journal-title":"Proc of the IEEE Cord on Advanced Video and Signal Based Surveillance"},{"key":"2","first-page":"75","article-title":"Intelligent video supervising technologies and their applications in security [J]","volume":"4","author":"zhihong","year":"2009","journal-title":"Ordnance Industry Automation"},{"key":"1","article-title":"Talking about the applications and development of video surveillance system[J]","volume":"20","author":"yaqin","year":"2005","journal-title":"SCI-Tech information development and economy"},{"key":"10","first-page":"225","article-title":"A survey of visual analysis of human motion [J]","volume":"3","author":"wang","year":"2002","journal-title":"Chinese Journal of Computers"},{"key":"7","article-title":"Knight M : A real time surveillance system for multiple overlapping and non-overlapping cameras [J]","author":"javed","year":"2003","journal-title":"The Fourth International Conference On Multimedia And Expo"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/34.868683"},{"key":"5","article-title":"A system for video surveillance and monitoring VSAM final report[R]","author":"collins","year":"2000","journal-title":"Carnegie Mellon University Technical Report CMU-RI-TR-2000"},{"key":"4","first-page":"1133","article-title":"Jonathan cancelled al. smart surveillance: Applications technologies and implication[A]","volume":"2","author":"uampapur","year":"2003","journal-title":"Proceedings of Fourth International Conference all Information["},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00100-0"},{"key":"8","first-page":"48","article-title":"Prahge. detecting. recognizing and understanding video events in surveillance video[C]","author":"john","year":"2003","journal-title":"Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance Miami AVSS'03"}],"event":{"name":"2011 International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6022828\/06022904.pdf?arnumber=6022904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:05:16Z","timestamp":1711483516000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6022904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6022904","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}