{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:19:47Z","timestamp":1729631987119,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8125869","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T17:26:11Z","timestamp":1512408371000},"page":"371-379","source":"Crossref","is-referenced-by-count":3,"title":["Comparing chirplet-based classification with alternate feature-extraction approaches for outdoor intrusion detection using a pir sensor platform"],"prefix":"10.1109","author":[{"given":"Tarun","family":"Choubisa","sequence":"first","affiliation":[]},{"given":"Mohan","family":"Kashyap","sequence":"additional","affiliation":[]},{"given":"Sampad B.","family":"Mohanty","sequence":"additional","affiliation":[]},{"given":"P. Vijay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"ref31","article-title":"Linear discriminant analysis-a brief tutorial","volume":"18","author":"balakrishnama","year":"1998","journal-title":"Inst for Signal and Information Process"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1117\/12.606093"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/TPAMI.2006.172","article-title":"Subclass discriminant analysis","volume":"28","author":"zhu","year":"2006","journal-title":"IEEE Trans Pattern Anal Mach In-tell"},{"key":"ref34","first-page":"1","article-title":"Pattern recognition","volume":"128","author":"bishop","year":"2006","journal-title":"Machine Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460665"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2623325"},{"journal-title":"PIR sensor array for hand motion recognition","year":"2011","author":"wojtczuk","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2454000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1364\/OE.14.006643"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.92"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2496154"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4637603"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098941"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2005.47"},{"journal-title":"Animation and chirplet-based development of a PIR sensor array for intruder classification in an outdoor environment","year":"2016","author":"upadrashta","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2012.248759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.06.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2007.4353160"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2006.884562"},{"journal-title":"Sparse Representations With Chirplets via Maximum Likelihood Estimation","year":"2000","author":"o'neill","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-011-0161-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s140407209"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2009.2039792"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s16060822"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2296601"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2514606"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2011.6100680"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10765-012-1258-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.13.0112.0219"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1117\/1.OE.53.2.023101"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2177257"},{"key":"ref26","first-page":"347","article-title":"Wireless sensor networks for human intruder detection","volume":"90","author":"team","year":"2010","journal-title":"Journal of the Indian Institute of Science Special issue on Advances in Electrical Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s16010126"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08125869.pdf?arnumber=8125869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T07:26:16Z","timestamp":1570433176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8125869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8125869","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}