{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:09:41Z","timestamp":1725800981515},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/nextcomp.2019.8883635","type":"proceedings-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:25:08Z","timestamp":1572308708000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Determining the Location of a Concealed Handgun on the Human Body using Marker-Less Gait Analysis and Machine Learning"],"prefix":"10.1109","author":[{"given":"Henry Muchiri","family":"Muriithi","sequence":"first","affiliation":[]},{"given":"Ismail Ateya","family":"Lukandu","sequence":"additional","affiliation":[]},{"given":"Gregory Wabuke","family":"Wanyembi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"256","article-title":"Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification","author":"patil","year":"2013","journal-title":"International Journal Of Computer Science And Appli"},{"key":"ref38","article-title":"The National Police Service Annual Crime Report","author":"s","year":"2016","journal-title":"National Police Service Nairobi"},{"key":"ref33","first-page":"1","article-title":"A Review One Valuation Metrics For Data Classification Evaluations","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining & Knowledge Management Process"},{"key":"ref32","first-page":"63","article-title":"A Review of Feature Selection Algorithms for Data Mining Techniques","author":"sutha","year":"2015","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"key":"ref31","first-page":"85","article-title":"Space-Time Representation of People Based on 3D Skeletal Data: A Review","author":"han","year":"2015","journal-title":"Computer Vision and Image Understanding"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.227"},{"key":"ref37","first-page":"189201","article-title":"The Impact of False and Nuisance Alarms on the Design Optimization of Physical Security Systems","author":"bandlow","year":"2016","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"ref35","first-page":"27","article-title":"Evaluation Measures for Models Assessment over Imbalanced Data Sets","author":"bekkar","year":"2013","journal-title":"IISTE Journal of Information Engineering and Applications"},{"key":"ref34","first-page":"1806","article-title":"Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification","author":"miho","year":"2017","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2377111"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4351435"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2017.0118"},{"journal-title":"United Nations Vienna","article-title":"Global Study on Homicide 2013: Trends, Contexts, Data","year":"2013","key":"ref2"},{"key":"ref1","first-page":"792","article-title":"Global Mortality From Firearms, 1990-2016","year":"2018","journal-title":"JAMA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2015.7312678"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39470-6_30"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/rs71013070"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2514\/1.27549"},{"key":"ref23","first-page":"1","article-title":"Machine learning classification of medication adherence in patients","author":"tucker","year":"2015","journal-title":"Elsevier"},{"key":"ref26","article-title":"Understanding Tools: TaskOriented Object Modeling, Learning and Recognition","author":"yixin","year":"2015","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0174052"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1992","author":"quinlan","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2014.956265"},{"journal-title":"The Nature of Statistical Learning Theory","year":"1998","author":"vapnik","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5120\/8233-1389"},{"key":"ref53","first-page":"435445","article-title":"Data classification using Support vector Machine (SVM), a simplified approach","author":"amarappa","year":"2014","journal-title":"International Journal of Electronics and Computer Science Engineering"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref10","first-page":"1300","article-title":"Event Detection Using Background Subtraction For Surveillance Systems","author":"rahangdale","year":"2016","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref11","first-page":"99","article-title":"Suspicious Human Activity Detection in Classroom Examiniation","author":"senthilkimar","year":"2016","journal-title":"Springer Science+Business Media B V"},{"key":"ref40","first-page":"103130","article-title":"On the optimality of the simple Bayesian classifier under zero-one loss","author":"domingo","year":"1997","journal-title":"Machine Learning"},{"key":"ref12","first-page":"187","article-title":"Concealed Firearm Detection in Male and Female on Video using Machine Learning Classification: A Comparative Study","author":"muchiri","year":"2018","journal-title":"Journal of Advanced Science and Engineering Research"},{"key":"ref13","first-page":"1","article-title":"Video benchmarks of human action datasets: a review","author":"singh","year":"2018","journal-title":"Springer Nature"},{"key":"ref14","first-page":"4736","article-title":"An Automatic Hybrid Approach to Detect Concealed Weopons Using Deep Learning","author":"al-shoukry","year":"2017","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"journal-title":"Interviewee Police Officer","year":"2018","author":"oduor","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.11.016"},{"key":"ref17","first-page":"73","article-title":"Computer Vision-Based Fall Detection Methods Using the Kinect Camera: A Survey","author":"jarraya","year":"2015","journal-title":"International Journal of Computer Science & Information Technology"},{"key":"ref18","first-page":"4313","article-title":"RGB-D datasets using microsoft kinect or similar sensors: a survey","author":"cai","year":"2016","journal-title":"Multimed Tools Appl"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0175813"},{"article-title":"Criminal use of handguns in Australia","year":"2008","author":"bricknell","key":"ref4"},{"article-title":"Behavioral Indicators of Legal and Illegal Gun Carrying","year":"2015","author":"meehan","key":"ref3"},{"journal-title":"Beautiful Evidence","year":"2006","author":"edward","key":"ref6"},{"year":"2017","key":"ref5","article-title":"Armed Subjects Instructor Guide"},{"key":"ref8","first-page":"15560","article-title":"Video Surveillance And Monitoring System For Examination Malpractice","author":"amanze","year":"2016","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.800264"},{"key":"ref49","article-title":"Supervised Machine Learning: A Review of Classification Techniques","author":"kotsiantis","year":"2007","journal-title":"Proceedings of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering Real Word AI Systems with Applications in EHealth HCI Information Retrieval and Pervasive Technologies"},{"key":"ref9","first-page":"1","article-title":"Don&#x2019;t Overlook the Human! Applying the Principles of Cognitive Systems Engineering to the Design of Intelligent Video Surveillance Systems","author":"suss","year":"2015","journal-title":"IEEE"},{"journal-title":"Responsible Conduct of Research","year":"2003","author":"steneck","key":"ref46"},{"key":"ref45","article-title":"A study on C.5 Decision Tree Classification Algorithm for Risk Predictions during Pregnancy","author":"lakshmi","year":"2015","journal-title":"International Conference on Emerging Trends in Engineering Science and Technology (ICETEST-2015)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An introduction to kernel and nearest-neighbor nonparametric regression","author":"altman","year":"1992","journal-title":"The American Statistician"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s19030529"},{"key":"ref41","first-page":"832","article-title":"The Random Subspace Method for Constructing Decision Forests","author":"ho","year":"1998","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref44","first-page":"1479","article-title":"Selecting features for nuclear transients classification by means of genetic algorithms","author":"baraldi","year":"2006","journal-title":"IEEE Transactions on Nuclear Science"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1406","DOI":"10.1109\/TCYB.2013.2264285","article-title":"Rank preserving sparse learning for kinect based scene classification","author":"tao","year":"2013","journal-title":"IEEE Transactions on Cybernetics"}],"event":{"name":"2019 Conference on Next Generation Computing Applications (NextComp)","start":{"date-parts":[[2019,9,19]]},"location":"Mauritius","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 Conference on Next Generation Computing Applications (NextComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8882365\/8883436\/08883635.pdf?arnumber=8883635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T21:56:23Z","timestamp":1721944583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8883635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/nextcomp.2019.8883635","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}