{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:31Z","timestamp":1750220791038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":113,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T00:00:00Z","timestamp":1596585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,5]]},"DOI":"10.1145\/3421558.3421584","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:31:31Z","timestamp":1606422691000},"page":"158-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mitigating Wild Animals Poaching Through State-of-the-art Multimedia Data Mining Techniques: A Review"],"prefix":"10.1145","author":[{"given":"Sibusiso R.","family":"Bakana","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering: Beihang University, China"}]},{"given":"Yongfei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering and Beijing Key Lab of Digital Media: Beihang University, China Beijing"}]},{"given":"Bhekisipho","family":"Twala","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering:Durban University of Technology, South Africa Durban"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194168"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","doi-asserted-by":"crossref","unstructured":"Amosov O.S. 2019. Using the ensemble of deep neural networks for normal and abnormal situations detection and recognition in the continuous video stream of the security system. Procedia Computer Science. 150 (2019) 532-539. DOI:https:\/\/doi.org\/10.1016\/j.procs.2019.02.089. 10.1016\/j.procs.2019.02.089","DOI":"10.1016\/j.procs.2019.02.089"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","doi-asserted-by":"crossref","unstructured":"Amosov O.S. 2019. Using the ensemble of deep neural networks for normal and abnormal situations detection and recognition in the continuous video stream of the security system. Procedia Computer Science. 150 (2019) 532-539. DOI:https:\/\/doi.org\/10.1016\/j.procs.2019.02.089.","DOI":"10.1016\/j.procs.2019.02.089"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017. 2018-Janua, (2018","author":"Augusta Kani G.","year":"2017","unstructured":"Augusta Kani , G. and Geetha , P . 2018. Object-based region proposal via multiple cues extraction . Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017. 2018-Janua, (2018 ), 1550\u20131554. DOI:https:\/\/doi.org\/10.1109\/ICCSP. 2017 .8286648. 10.1109\/ICCSP.2017.8286648 Augusta Kani, G. and Geetha, P. 2018. Object-based region proposal via multiple cues extraction. Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017. 2018-Janua, (2018), 1550\u20131554. DOI:https:\/\/doi.org\/10.1109\/ICCSP.2017.8286648."},{"key":"#cr-split#-e_1_3_2_1_4_1.1","doi-asserted-by":"crossref","unstructured":"Bai Y. 2018. SOD-MTGAN: Small object detection via multi-task generative adversarial network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11217 LNCS i (2018) 210-226. DOI:https:\/\/doi.org\/10.1007\/978-3-030-01261-8_13. 10.1007\/978-3-030-01261-8_13","DOI":"10.1007\/978-3-030-01261-8_13"},{"key":"#cr-split#-e_1_3_2_1_4_1.2","doi-asserted-by":"crossref","unstructured":"Bai Y. 2018. SOD-MTGAN: Small object detection via multi-task generative adversarial network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11217 LNCS i (2018) 210-226. DOI:https:\/\/doi.org\/10.1007\/978-3-030-01261-8_13.","DOI":"10.1007\/978-3-030-01261-8_13"},{"key":"e_1_3_2_1_5_1","volume-title":"Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neural Networks. 33rd International Conference on Machine Learning, ICML 2016. 4, (2016","author":"Bell S.","year":"2016","unstructured":"Bell , S. 2016 . Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neural Networks. 33rd International Conference on Machine Learning, ICML 2016. 4, (2016 ), 2611\u20132620. DOI:https:\/\/doi.org\/10.4249\/scholarpedia.1888. 10.4249\/scholarpedia.1888 Bell, S. 2016. Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neural Networks. 33rd International Conference on Machine Learning, ICML 2016. 4, (2016), 2611\u20132620. DOI:https:\/\/doi.org\/10.4249\/scholarpedia.1888."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0645-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.17.44"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3306127.3332104"},{"key":"e_1_3_2_1_9_1","volume-title":"Outdoor animal tracking combining neural network and time-lapse cameras. Computers and Electronics in Agriculture","author":"Bonneau M.","year":"2019","unstructured":"Bonneau , M. 2020. Outdoor animal tracking combining neural network and time-lapse cameras. Computers and Electronics in Agriculture . 168, December 2019 (2020), 105150. DOI:https:\/\/doi.org\/10.1016\/j.compag.2019.105150. 10.1016\/j.compag.2019.105150 Bonneau, M. 2020. Outdoor animal tracking combining neural network and time-lapse cameras. Computers and Electronics in Agriculture. 168, December 2019 (2020), 105150. DOI:https:\/\/doi.org\/10.1016\/j.compag.2019.105150."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Borwarnginn P. and Thongkanchorn K. 2019. Breakthrough Conventional Based Approach for Dog Breed Classification Using CNN with Transfer Learning. 2019 11th International Conference on Information Technology and Electrical Engineering (ICITEE). 7 (2019) 1\u20135.  Borwarnginn P. and Thongkanchorn K. 2019. Breakthrough Conventional Based Approach for Dog Breed Classification Using CNN with Transfer Learning. 2019 11th International Conference on Information Technology and Electrical Engineering (ICITEE). 7 (2019) 1\u20135.","DOI":"10.1109\/ICITEED.2019.8929955"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554775"},{"key":"e_1_3_2_1_12_1","volume-title":"LITE: Light-based Intrusion deTection systEm Using an Optical-Camera and a Single Board Computer. submitted to SenseApp","author":"Choubisa T.","year":"2017","unstructured":"Choubisa , T. 2017 . LITE: Light-based Intrusion deTection systEm Using an Optical-Camera and a Single Board Computer. submitted to SenseApp 2017. (2017), 1\u20133. Choubisa, T. 2017. LITE: Light-based Intrusion deTection systEm Using an Optical-Camera and a Single Board Computer. submitted to SenseApp 2017. (2017), 1\u20133."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2003.815066"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-39917-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2005.65"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Debeljak M. 2001. Habitat suitability modelling for red deer (Cervus elaphus L.) in South-central Slovenia with classification trees. Ecological Modelling. 138 (2001) 321\u2013330.  Debeljak M. 2001. Habitat suitability modelling for red deer (Cervus elaphus L.) in South-central Slovenia with classification trees. Ecological Modelling. 138 (2001) 321\u2013330.","DOI":"10.1016\/S0304-3800(00)00411-7"},{"key":"e_1_3_2_1_17_1","unstructured":"Deep Learning in Video Surveillance: 2018. https:\/\/www.ee.cuhk.edu.hk\/\u223cxgwang\/MSF.pdf. Accessed: 2019-11-21.  Deep Learning in Video Surveillance: 2018. https:\/\/www.ee.cuhk.edu.hk\/\u223cxgwang\/MSF.pdf. Accessed: 2019-11-21."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. VIIth Digital Image.","author":"Dick A.R.","year":"2003","unstructured":"Dick , A.R. and Brooks , M.J . 2003. Issues in automated visual surveillance . Proc. VIIth Digital Image. January 2003 (2003), 195\u2013204. DOI:https:\/\/doi.org\/10.1.1.124.2355. Dick, A.R. and Brooks, M.J. 2003. Issues in automated visual surveillance. Proc. VIIth Digital Image. January 2003 (2003), 195\u2013204. DOI:https:\/\/doi.org\/10.1.1.124.2355."},{"key":"e_1_3_2_1_19_1","volume-title":"Deep Learning for Wildlife Conservation and Restoration Efforts. International Conference on Machine Learning.","author":"Duhart C.","year":"2019","unstructured":"Duhart , C. 2019 . Deep Learning for Wildlife Conservation and Restoration Efforts. International Conference on Machine Learning. June (2019). Duhart, C. 2019. Deep Learning for Wildlife Conservation and Restoration Efforts. International Conference on Machine Learning. June (2019)."},{"key":"e_1_3_2_1_20_1","unstructured":"Dynamic Time Warping with Time Series: 2018. https:\/\/medium.com\/@shachiakyaagba_41915\/dynamic-time-warping-with-time-series-1f5c05fb8950. Accessed: 2020-02-08.  Dynamic Time Warping with Time Series: 2018. https:\/\/medium.com\/@shachiakyaagba_41915\/dynamic-time-warping-with-time-series-1f5c05fb8950. Accessed: 2020-02-08."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.019"},{"key":"e_1_3_2_1_22_1","first-page":"12","article-title":"A New Muzzle Classification Model Using Decision Tree Classifier","volume":"6","author":"El-Henawy I.","year":"2017","unstructured":"El-Henawy , I. 2017 . A New Muzzle Classification Model Using Decision Tree Classifier . International Journal of Electronics and Information Engineering. 6 , 1 (2017), 12 \u2013 24 . DOI:https:\/\/doi.org\/10.6636\/IJEIE.201703.6(1).02). 10.6636\/IJEIE.201703.6(1).02) El-Henawy, I. 2017. A New Muzzle Classification Model Using Decision Tree Classifier. International Journal of Electronics and Information Engineering. 6, 1 (2017), 12\u201324. DOI:https:\/\/doi.org\/10.6636\/IJEIE.201703.6(1).02).","journal-title":"International Journal of Electronics and Information Engineering."},{"key":"e_1_3_2_1_23_1","volume-title":"International Workshop on Image Analysis for Multimedia Interactive Services.","author":"Ellwart D.","year":"2011","unstructured":"Ellwart , D. and Czyzewski , A . 2011. Viewpoint independent shape-based object classification for video surveillance . International Workshop on Image Analysis for Multimedia Interactive Services. ( 2011 ). Ellwart, D. and Czyzewski, A. 2011. Viewpoint independent shape-based object classification for video surveillance. International Workshop on Image Analysis for Multimedia Interactive Services. (2011)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.276"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016387.3016464"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2017.2713584"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832581.2832611"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2832581.2832611"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994501.2994507"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.06.007"},{"key":"e_1_3_2_1_31_1","volume-title":"Computer Security: Intrusion, Detection and Prevention.","author":"Feyereisl J.","year":"2016","unstructured":"Feyereisl , J. and Aickelin , U . 2016 . SelfOrganising Maps in Computer Security . Computer Security: Intrusion, Detection and Prevention. (2016), 1\u201330. Feyereisl, J. and Aickelin, U. 2016. SelfOrganising Maps in Computer Security. Computer Security: Intrusion, Detection and Prevention. (2016), 1\u201330."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3237383.3237505"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0532-6"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981859"},{"key":"e_1_3_2_1_37_1","volume-title":"2009 IEEE 12th International Conference on Computer Vision. Iccv (2010","author":"Hospedales T.","year":"2010","unstructured":"Hospedales , T. 2010 . A Markov Clustering Topic Model for mining behaviour in video . 2009 IEEE 12th International Conference on Computer Vision. Iccv (2010 ), 1165\u20131172. DOI:https:\/\/doi.org\/10.1109\/iccv.2009.5459342. 10.1109\/iccv.2009.5459342 Hospedales, T. 2010. A Markov Clustering Topic Model for mining behaviour in video. 2009 IEEE 12th International Conference on Computer Vision. Iccv (2010), 1165\u20131172. DOI:https:\/\/doi.org\/10.1109\/iccv.2009.5459342."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.829274"},{"key":"e_1_3_2_1_39_1","volume-title":"An improved single shot multibox detector method applied in body condition score for dairy cows. Animals - MDPI. 9, 7","author":"Huang X.","year":"2019","unstructured":"Huang , X. 2019. An improved single shot multibox detector method applied in body condition score for dairy cows. Animals - MDPI. 9, 7 ( 2019 ). DOI:https:\/\/doi.org\/10.3390\/ani9070470. 10.3390\/ani9070470 Huang, X. 2019. An improved single shot multibox detector method applied in body condition score for dairy cows. Animals - MDPI. 9, 7 (2019). DOI:https:\/\/doi.org\/10.3390\/ani9070470."},{"key":"e_1_3_2_1_40_1","unstructured":"Introduction to Decision Trees: 2018. https:\/\/medium.com\/greyatom\/decision-trees-a-simple-way-to-visualize-a-decision-dc506a403aeb. Accessed: 2019-12-31.  Introduction to Decision Trees: 2018. https:\/\/medium.com\/greyatom\/decision-trees-a-simple-way-to-visualize-a-decision-dc506a403aeb. Accessed: 2019-12-31."},{"key":"e_1_3_2_1_41_1","volume-title":"Tutorial on Support Vector Machine (SVM). School of EECS","author":"Jakkula V.","year":"2011","unstructured":"Jakkula , V. 2011. Tutorial on Support Vector Machine (SVM). School of EECS , Washington State University . ( 2011 ), 1\u201313. Jakkula, V. 2011. Tutorial on Support Vector Machine (SVM). School of EECS, Washington State University. (2011), 1\u201313."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2027608"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2018.8777708"},{"key":"e_1_3_2_1_44_1","first-page":"1005","article-title":"A Survey on Image Classification Approaches and Techniques","volume":"2","author":"Kamavisdar P.","year":"2013","unstructured":"Kamavisdar , P. 2013 . A Survey on Image Classification Approaches and Techniques . International Journal of Advanced Research in Computer and Communication Engineering. 2 , 1 (2013), 1005 \u2013 1009 . Kamavisdar, P. 2013. A Survey on Image Classification Approaches and Techniques. International Journal of Advanced Research in Computer and Communication Engineering. 2, 1 (2013), 1005\u20131009.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091125.3091153"},{"key":"e_1_3_2_1_46_1","volume-title":"COLOR BASED SKIN CLASSIFICATION. Information Engineering and Computer Science. March","author":"Khan R.","year":"2012","unstructured":"Khan , R. 2012. COLOR BASED SKIN CLASSIFICATION. Information Engineering and Computer Science. March ( 2012 ). Khan, R. 2012. COLOR BASED SKIN CLASSIFICATION. Information Engineering and Computer Science. March (2012)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676969"},{"key":"e_1_3_2_1_48_1","volume-title":"Discovering Spatio-Temporal Dependencies in Dynamic Scenes. Proc. IEEE International Conference of Computer Vision. (2010)","author":"Kuettel D.","year":"2010","unstructured":"Kuettel , D. 2010 . What's going on ? Discovering Spatio-Temporal Dependencies in Dynamic Scenes. Proc. IEEE International Conference of Computer Vision. (2010) , 1951\u20131958. Kuettel, D. 2010. What's going on? Discovering Spatio-Temporal Dependencies in Dynamic Scenes. Proc. IEEE International Conference of Computer Vision. (2010), 1951\u20131958."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.68"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13253-017-0282-9"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.022"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00572"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.111"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2009.5293337"},{"key":"e_1_3_2_1_55_1","first-page":"46448","volume-title":"SSD: Single Shot MultiBox Detector. European Conference on Computer Vision. 1","author":"Liu W.","year":"2016","unstructured":"Liu , W. 2016 . SSD: Single Shot MultiBox Detector. European Conference on Computer Vision. 1 , (2016), 852\u2013869. DOI:https:\/\/doi.org\/10.1007\/978-3-319- 46448 - 46440 . 10.1007\/978-3-319-46448-0 Liu, W. 2016. SSD: Single Shot MultiBox Detector. European Conference on Computer Vision. 1, (2016), 852\u2013869. DOI:https:\/\/doi.org\/10.1007\/978-3-319-46448-0."},{"key":"#cr-split#-e_1_3_2_1_56_1.1","doi-asserted-by":"crossref","unstructured":"Lovell B.C. and Walder C.J. 2005. Support vector machines for business applications. Business Applications and Computational Intelligence. (2005) 267-290. DOI:https:\/\/doi.org\/10.4018\/978-1-59140-702-7.ch014. 10.4018\/978-1-59140-702-7.ch014","DOI":"10.4018\/978-1-59140-702-7.ch014"},{"key":"#cr-split#-e_1_3_2_1_56_1.2","doi-asserted-by":"crossref","unstructured":"Lovell B.C. and Walder C.J. 2005. Support vector machines for business applications. Business Applications and Computational Intelligence. (2005) 267-290. DOI:https:\/\/doi.org\/10.4018\/978-1-59140-702-7.ch014.","DOI":"10.4018\/978-1-59140-702-7.ch014"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.924285"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8202193"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ELEKTRO.2014.6847875"},{"key":"e_1_3_2_1_60_1","volume-title":"Classification of Wild Animals Based on SVM and Local Descriptors. AASRI Conference on Circuits and Signal Processing.","author":"Matuska S.","year":"2014","unstructured":"Matuska , S. 2014 . Classification of Wild Animals Based on SVM and Local Descriptors. AASRI Conference on Circuits and Signal Processing. (2014). Matuska, S. 2014. Classification of Wild Animals Based on SVM and Local Descriptors. AASRI Conference on Circuits and Signal Processing. (2014)."},{"key":"e_1_3_2_1_61_1","unstructured":"Menezes R.S.T. de 2016. Object Recognition Using Convolutional Neural Networks. IntechOpen.  Menezes R.S.T. de 2016. Object Recognition Using Convolutional Neural Networks. IntechOpen."},{"key":"e_1_3_2_1_62_1","volume-title":"A self-organizing neural network architecture for learning human-object interactions. Neurocomputing","author":"Mici L.","year":"2019","unstructured":"Mici , L. 2018. A self-organizing neural network architecture for learning human-object interactions. Neurocomputing . 307, December 2019 (2018), 14\u201324. DOI:https:\/\/doi.org\/10.1016\/j.neucom.2018.04.015. 10.1016\/j.neucom.2018.04.015 Mici, L. 2018. A self-organizing neural network architecture for learning human-object interactions. Neurocomputing. 307, December 2019 (2018), 14\u201324. DOI:https:\/\/doi.org\/10.1016\/j.neucom.2018.04.015."},{"key":"e_1_3_2_1_63_1","unstructured":"Nawaz M.A. 2015. Animal Classification in Wildlife Through Images Using Statistical Methods and Decision Tree.  Nawaz M.A. 2015. Animal Classification in Wildlife Through Images Using Statistical Methods and Decision Tree."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2936924.2937037"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1719367115"},{"key":"e_1_3_2_1_66_1","first-page":"01424","volume-title":"Detection and Recognition of Badgers Using Deep Learning. 27th International Conference on Artificial Neural Networks.","author":"Okafor E.","year":"2018","unstructured":"Okafor , E. 2018 . Detection and Recognition of Badgers Using Deep Learning. 27th International Conference on Artificial Neural Networks. November (2018), 554\u2013563. DOI:https:\/\/doi.org\/10.1007\/978-3-030- 01424 - 01427 . 10.1007\/978-3-030-01424-7 Okafor, E. 2018. Detection and Recognition of Badgers Using Deep Learning. 27th International Conference on Artificial Neural Networks. November (2018), 554\u2013563. DOI:https:\/\/doi.org\/10.1007\/978-3-030-01424-7."},{"key":"e_1_3_2_1_67_1","volume-title":"ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology.","author":"Ouivirach K.","year":"2010","unstructured":"Ouivirach , K. and Dailey , M.N . 2010. Clustering human behaviors with dynamic time warping and hidden Markov models for a video surveillance system . ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology. ( 2010 ), 884\u2013888. Ouivirach, K. and Dailey, M.N. 2010. Clustering human behaviors with dynamic time warping and hidden Markov models for a video surveillance system. ECTI-CON 2010 - The 2010 ECTI International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology. (2010), 884\u2013888."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2017","author":"Ovhal K.B.","year":"2018","unstructured":"Ovhal , K.B. 2018 . Analysis of anomaly detection techniques in video surveillance . Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2017 . Iciss (2018), 596\u2013601. DOI:https:\/\/doi.org\/10.1109\/ISS1.2017.8389240. 10.1109\/ISS1.2017.8389240 Ovhal, K.B. 2018. Analysis of anomaly detection techniques in video surveillance. Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2017. Iciss (2018), 596\u2013601. DOI:https:\/\/doi.org\/10.1109\/ISS1.2017.8389240."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00123"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.09.001"},{"key":"e_1_3_2_1_71_1","volume-title":"2nd IEEE- RTEICT.","author":"Pavithra G.","year":"2017","unstructured":"Pavithra , G. 2017. Real-Time Color Classification of Objects from Video Streams . 2nd IEEE- RTEICT. ( 2017 ), 1683\u20131686. Pavithra, G. 2017. Real-Time Color Classification of Objects from Video Streams. 2nd IEEE- RTEICT. (2017), 1683\u20131686."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888089.1888101"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196468"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1980522.1980527"},{"key":"e_1_3_2_1_75_1","first-page":"20","article-title":"Negative selection algorithm: recent improvements and its application in intrusion detection system","volume":"6","author":"Ramdane C.","year":"2017","unstructured":"Ramdane , C. and Chikhi , S. 2017 . Negative selection algorithm: recent improvements and its application in intrusion detection system . Int. J. Comput. Acad. Res.(IJCAR). 6 , 2 (2017), 20 \u2013 30 . Ramdane, C. and Chikhi, S. 2017. Negative selection algorithm: recent improvements and its application in intrusion detection system. Int. J. Comput. Acad. Res.(IJCAR). 6, 2 (2017), 20\u201330.","journal-title":"Int. J. Comput. Acad. Res.(IJCAR)."},{"key":"e_1_3_2_1_76_1","volume-title":"DOI:https:\/\/doi.org\/10.1109\/CVPR.2016.91","author":"Redmon J.","year":"2016","unstructured":"Redmon , J. 2016. (YOLO) You Only Look Once . Cvpr. ( 2016 ). DOI:https:\/\/doi.org\/10.1109\/CVPR.2016.91 . 10.1109\/CVPR.2016.91 Redmon, J. 2016. (YOLO) You Only Look Once. Cvpr. (2016). DOI:https:\/\/doi.org\/10.1109\/CVPR.2016.91."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. 2017-Janua, (2017","author":"Redmon J.","year":"2017","unstructured":"Redmon , J. and Farhadi , A . 2017. YOLO9000: Better, faster, stronger . Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. 2017-Janua, (2017 ), 6517\u20136525. DOI:https:\/\/doi.org\/10.1109\/CVPR. 2017 .690. 10.1109\/CVPR.2017.690 Redmon, J. and Farhadi, A. 2017. YOLO9000: Better, faster, stronger. Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. 2017-Janua, (2017), 6517\u20136525. DOI:https:\/\/doi.org\/10.1109\/CVPR.2017.690."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2009.03.002"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/1748111.1748149"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/130994.130996"},{"key":"e_1_3_2_1_83_1","volume-title":"Multi Class Classification, Optimizations, and Analysis. ProQuest Dissertations and Theses.","author":"Schmidt B.H.","year":"2017","unstructured":"Schmidt , B.H. 2017. Artificial Immune Systems: Applications , Multi Class Classification, Optimizations, and Analysis. ProQuest Dissertations and Theses. ( 2017 ), 183. Schmidt, B.H. 2017. Artificial Immune Systems: Applications, Multi Class Classification, Optimizations, and Analysis. ProQuest Dissertations and Theses. (2017), 183."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aaw0736"},{"key":"e_1_3_2_1_85_1","unstructured":"Self Organizing Maps: 2018. https:\/\/towardsdatascience.com\/self-organizing-maps-ff5853a118d4. Accessed: 2020-02-05.  Self Organizing Maps: 2018. https:\/\/towardsdatascience.com\/self-organizing-maps-ff5853a118d4. Accessed: 2020-02-05."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2011.6021605"},{"key":"e_1_3_2_1_87_1","volume-title":"Science. 2007","author":"Senin P.","year":"2008","unstructured":"Senin , P. 2008 . Dynamic Time Warping Algorithm Review . Science. 2007 , December (2008), 1\u201323. DOI:https:\/\/doi.org\/10.1109\/IEMBS.2007.4353810. 10.1109\/IEMBS.2007.4353810 Senin, P. 2008. Dynamic Time Warping Algorithm Review. Science. 2007, December (2008), 1\u201323. DOI:https:\/\/doi.org\/10.1109\/IEMBS.2007.4353810."},{"key":"e_1_3_2_1_88_1","volume-title":"Color Content-based Image Classification. 5th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics.","author":"Sergy\u00e1n S.","year":"2007","unstructured":"Sergy\u00e1n , S. 2007 . Color Content-based Image Classification. 5th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics. (2007), 427\u2013434. Sergy\u00e1n, S. 2007. Color Content-based Image Classification. 5th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics. (2007), 427\u2013434."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2016.41002"},{"key":"e_1_3_2_1_90_1","volume-title":"Iccids","author":"Sharma N.","year":"2018","unstructured":"Sharma , N. 2018. An Analysis of Convolutional Neural Networks for Image Classification. Procedia Computer Science. 132 , Iccids ( 2018 ), 377\u2013384. DOI:https:\/\/doi.org\/10.1016\/j.procs.2018.05.198. 10.1016\/j.procs.2018.05.198 Sharma, N. 2018. An Analysis of Convolutional Neural Networks for Image Classification. Procedia Computer Science. 132, Iccids (2018), 377\u2013384. DOI:https:\/\/doi.org\/10.1016\/j.procs.2018.05.198."},{"key":"e_1_3_2_1_91_1","volume-title":"2015 2nd International Conference on Pattern Recognition and Image Analysis, IPRIA 2015. Ipria (2015","author":"Soltani-Sarvestani M.A.","year":"2015","unstructured":"Soltani-Sarvestani , M.A. and Zohreh , A . 2015. Batch color classification using bag of colors and discriminative sparse coding . 2015 2nd International Conference on Pattern Recognition and Image Analysis, IPRIA 2015. Ipria (2015 ), 1\u20135. DOI:https:\/\/doi.org\/10.1109\/PRIA. 2015 .7161620. 10.1109\/PRIA.2015.7161620 Soltani-Sarvestani, M.A. and Zohreh, A. 2015. Batch color classification using bag of colors and discriminative sparse coding. 2015 2nd International Conference on Pattern Recognition and Image Analysis, IPRIA 2015. Ipria (2015), 1\u20135. DOI:https:\/\/doi.org\/10.1109\/PRIA.2015.7161620."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2017.0079"},{"key":"#cr-split#-e_1_3_2_1_94_1.1","doi-asserted-by":"crossref","unstructured":"Tekalp A.M. 2009. Video Segmentation. The Essential Guide to Video Processing. (2009) 141-173. DOI:https:\/\/doi.org\/10.1016\/B978-0-12-374456-2.00007-4. 10.1016\/B978-0-12-374456-2.00007-4","DOI":"10.1016\/B978-0-12-374456-2.00007-4"},{"key":"#cr-split#-e_1_3_2_1_94_1.2","doi-asserted-by":"crossref","unstructured":"Tekalp A.M. 2009. Video Segmentation. The Essential Guide to Video Processing. (2009) 141-173. DOI:https:\/\/doi.org\/10.1016\/B978-0-12-374456-2.00007-4.","DOI":"10.1016\/B978-0-12-374456-2.00007-4"},{"key":"#cr-split#-e_1_3_2_1_95_1.1","doi-asserted-by":"crossref","unstructured":"Thomsen M.S. 2016. To include or not to include (the invader in community analysis)? That is the question. Biological Invasions. (2016). DOI:https:\/\/doi.org\/10.1007\/s10530-016-1102-9. 10.1007\/s10530-016-1102-9","DOI":"10.1007\/s10530-016-1102-9"},{"key":"#cr-split#-e_1_3_2_1_95_1.2","doi-asserted-by":"crossref","unstructured":"Thomsen M.S. 2016. To include or not to include (the invader in community analysis)? That is the question. Biological Invasions. (2016). DOI:https:\/\/doi.org\/10.1007\/s10530-016-1102-9.","DOI":"10.1007\/s10530-016-1102-9"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"crossref","unstructured":"Thyagarajmurthy A. Ninad M.G. Rakesh B.G. Niranjan S. M.B. 2019. Anomaly Detection in Surveillance Video Using Pose Estimation.  Thyagarajmurthy A. Ninad M.G. Rakesh B.G. Niranjan S. M.B. 2019. Anomaly Detection in Surveillance Video Using Pose Estimation.","DOI":"10.1007\/978-981-13-5802-9_66"},{"key":"e_1_3_2_1_97_1","unstructured":"Using drones to protect elephants and rhinos in Africa: 2018. .  Using drones to protect elephants and rhinos in Africa: 2018. ."},{"key":"e_1_3_2_1_98_1","unstructured":"Verdaguer S.L. 2009. Color Based Image Classification and Description. Universitat Politecnica De Catalunya.  Verdaguer S.L. 2009. Color Based Image Classification and Description. Universitat Politecnica De Catalunya."},{"key":"e_1_3_2_1_99_1","unstructured":"Wankhade P. and Wadhe P.A.P. 2014. Survey on Analysis of Various Techniques for Multimedia Data Mining. 2 3 (2014) 137\u2013142.  Wankhade P. and Wadhe P.A.P. 2014. Survey on Analysis of Various Techniques for Multimedia Data Mining. 2 3 (2014) 137\u2013142."},{"key":"e_1_3_2_1_100_1","volume-title":"ASSD: Attentive single shot multibox detector. Computer Vision and Image Understanding. 189","author":"Yi J.","year":"2019","unstructured":"Yi , J. 2019 . ASSD: Attentive single shot multibox detector. Computer Vision and Image Understanding. 189 , (2019). DOI:https:\/\/doi.org\/10.1016\/j.cviu.2019.102827. 10.1016\/j.cviu.2019.102827 Yi, J. 2019. ASSD: Attentive single shot multibox detector. Computer Vision and Image Understanding. 189, (2019). DOI:https:\/\/doi.org\/10.1016\/j.cviu.2019.102827."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050762"},{"key":"e_1_3_2_1_102_1","unstructured":"Zhang C. and Zhang Z. 2010. A Survey of Recent Advances in Face Detection. MSR-TR-2010-66. 1000 (2010) 53\u201369.  Zhang C. and Zhang Z. 2010. A Survey of Recent Advances in Face Detection. MSR-TR-2010-66. 1000 (2010) 53\u201369."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178313"},{"key":"e_1_3_2_1_104_1","volume-title":"Animal Detection from Highly Cluttered Natural Scenes Using Spatiotemporal Object Region Proposals and Patch Verification","author":"Zhang Z.","year":"2016","unstructured":"Zhang , Z. 2016. Animal Detection from Highly Cluttered Natural Scenes Using Spatiotemporal Object Region Proposals and Patch Verification . IEEE Transactions on Multimedia . ( 2016 ). DOI:https:\/\/doi.org\/10.1109\/TMM.2016.2594138. 10.1109\/TMM.2016.2594138 Zhang, Z. 2016. Animal Detection from Highly Cluttered Natural Scenes Using Spatiotemporal Object Region Proposals and Patch Verification. IEEE Transactions on Multimedia. (2016). DOI:https:\/\/doi.org\/10.1109\/TMM.2016.2594138."},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"#cr-split#-e_1_3_2_1_106_1.1","doi-asserted-by":"crossref","unstructured":"Zhu C. 2017. CMS-RCNN: Contextual multi-scale region-based CNN for unconstrained face detection. Advances in Computer Vision and Pattern Recognition. PartF1 (2017) 57-79. DOI:https:\/\/doi.org\/10.1007\/978-3-319-61657-5_3. 10.1007\/978-3-319-61657-5_3","DOI":"10.1007\/978-3-319-61657-5_3"},{"key":"#cr-split#-e_1_3_2_1_106_1.2","doi-asserted-by":"crossref","unstructured":"Zhu C. 2017. CMS-RCNN: Contextual multi-scale region-based CNN for unconstrained face detection. Advances in Computer Vision and Pattern Recognition. PartF1 (2017) 57-79. DOI:https:\/\/doi.org\/10.1007\/978-3-319-61657-5_3.","DOI":"10.1007\/978-3-319-61657-5_3"},{"key":"e_1_3_2_1_107_1","volume-title":"Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. (2017","author":"Zin T.T.","year":"2017","unstructured":"Zin , T.T. 2017 . A General Video Surveillance Framework for Animal Behavior Analysis . Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. (2017 ), 130\u2013133. DOI:https:\/\/doi.org\/10.1109\/CMCSN.2016.55. 10.1109\/CMCSN.2016.55 Zin, T.T. 2017. A General Video Surveillance Framework for Animal Behavior Analysis. Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. (2017), 130\u2013133. DOI:https:\/\/doi.org\/10.1109\/CMCSN.2016.55."}],"event":{"name":"IPMV 2020: 2020 2nd International Conference on Image Processing and Machine Vision","acronym":"IPMV 2020","location":"Bangkok Thailand"},"container-title":["2020 2nd International Conference on Image Processing and Machine Vision"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421558.3421584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421558.3421584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:45Z","timestamp":1750200105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421558.3421584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,5]]},"references-count":113,"alternative-id":["10.1145\/3421558.3421584","10.1145\/3421558"],"URL":"https:\/\/doi.org\/10.1145\/3421558.3421584","relation":{},"subject":[],"published":{"date-parts":[[2020,8,5]]},"assertion":[{"value":"2020-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}