{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T03:56:13Z","timestamp":1754020573467},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/stc-csit.2018.8526596","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T23:28:11Z","timestamp":1541719691000},"page":"352-355","source":"Crossref","is-referenced-by-count":5,"title":["Violent Crime Detection System"],"prefix":"10.1109","author":[{"given":"Yaroslav","family":"Dorogyy","sequence":"first","affiliation":[]},{"given":"Vadym","family":"Kolisnichenko","sequence":"additional","affiliation":[]},{"given":"Kseniia","family":"Levchenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2601097.2601119","article-title":"The Visual Microphone: Passive Recovery of Sound from Video","author":"davis","year":"2014","journal-title":"ACM Transactions on Graphics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2016.7451989"},{"journal-title":"Super Resolution for images using deep learning","year":"0","key":"ref12"},{"journal-title":"Face Detection using Haar Cascades","year":"0","key":"ref13"},{"journal-title":"Real-time facial landmark detection with OpenCV Python and dlib","year":"0","key":"ref14"},{"key":"ref15","article-title":"Predictive Policing","author":"brayne","year":"2015","journal-title":"Data & Civil Rights A New Era of Policing and Justice"},{"journal-title":"What Every Body Is Saying An Ex-FBI Agent's Guide to Speed-Reading People","year":"2008","author":"navarro","key":"ref4"},{"journal-title":"Intelligent Video Analytics Platform","year":"0","key":"ref3"},{"key":"ref6","article-title":"Communication in the Real World: An Introduction to Communication Studies","author":"jones","year":"2016","journal-title":"University of Minnesota Libraries Publishing"},{"journal-title":"Threatening Communications and Behavior","year":"2011","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/984353"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.46"},{"key":"ref2","first-page":"451","article-title":"Violent Scene Detection Using Convolutional Neural Networks and Deep Audio Features","author":"mu","year":"2016","journal-title":"Pattern Recognition 7th Chinese Conference CCPR 2016"},{"journal-title":"The Locust Effect Why the End of Poverty Requires the End of Violence","year":"2014","author":"haugen","key":"ref1"},{"key":"ref9","article-title":"Lip Reading in the Wild","author":"chung","year":"2016","journal-title":"Asian Conference on Computer Vision"}],"event":{"name":"2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","start":{"date-parts":[[2018,9,11]]},"location":"Lviv","end":{"date-parts":[[2018,9,14]]}},"container-title":["2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8509220\/8526581\/08526596.pdf?arnumber=8526596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:24:38Z","timestamp":1643221478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8526596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/stc-csit.2018.8526596","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}