{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:02:04Z","timestamp":1729627324459,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057942","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:58:20Z","timestamp":1426265900000},"page":"444-448","source":"Crossref","is-referenced-by-count":3,"title":["Behavior tracking model in dynamic situation using the risk ratio EM"],"prefix":"10.1109","author":[{"given":"Yuchae","family":"Jung","sequence":"first","affiliation":[]},{"given":"Yongik","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2001043"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.89"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2012070"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.2002.1030081"},{"key":"ref14","first-page":"186","article-title":"Abnormality detection for improving elder's daily life independent","author":"hung","year":"2010","journal-title":"Proc 8th Int Conf Smart Homes Health Telematics"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1839294.1839305"},{"key":"ref16","first-page":"2458","article-title":"Abnormal events detection based on spatio-temporal co-occurrences","author":"benezeth","year":"2009","journal-title":"Proc of IEEE Conf Comp Vision and Pattern Recog"},{"key":"ref17","article-title":"An Intelligent Intrusion Detection System Based On Expectation Maximization Algorithm in Wireless Sensor Networks","volume":"4","author":"khanbabapour","year":"2014","journal-title":"International Journal of Information and Communication Technology Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.11.004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2010.5652091"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2007.4421639"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-007-0117-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315249"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2008.45"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2006.14"},{"key":"ref7","first-page":"611","article-title":"Semisupervised adapted HMMs for unusual event detection","volume":"1","author":"zhang","year":"2005","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recog"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2178594"},{"key":"ref9","first-page":"1161","article-title":"Unusual event detection via multi-camera video mining","author":"zhou","year":"2006","journal-title":"Proc 18th Int Conf Pattern Recog"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2010.5512258"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.2.34"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/29.1552"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/S0165-1684(01)00198-0","article-title":"A Bayesian EM algorithm for optimal tracking of a maneuvering target in clutter","author":"logothetisa","year":"2002","journal-title":"Signal Processing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1078\/1434-8411-54100183"},{"key":"ref25","first-page":"73","article-title":"Comparison the various clustering algorithms of weka tools","volume":"2","author":"sharma","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057942.pdf?arnumber=7057942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:19:50Z","timestamp":1498187990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057942","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}