{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:24Z","timestamp":1764688104869,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647876","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Image Processing using Cloud for Surveillance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2617-0544","authenticated-orcid":false,"given":"Shivam","family":"Tiwari","sequence":"first","affiliation":[{"name":"Department of Networking and Communications, SRM Institute of Science and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5927-1242","authenticated-orcid":false,"given":"Aarhee","family":"Phukan","sequence":"additional","affiliation":[{"name":"Department of Networking and Communication, SRM Institute of Science and Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1460-0958","authenticated-orcid":false,"given":"T R","family":"Vedhavathy","sequence":"additional","affiliation":[{"name":"Department of Networking and Communications, SRM Institute of Science and Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3224325"},{"key":"e_1_3_2_1_2_1","first-page":"562","volume-title":"Shenzhen","author":"Wu Y.","year":"2018","unstructured":"Y. Wu, X. Qin, Y. Pan and C. Yuan, \"Convolution Neural Network based Transfer Learning for Classification of Flowers,\" IEEE 3rd International Conference on Signal and Image Processing (ICSIP), Shenzhen, China, pp. 562-566, 2018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_4_1","first-page":"1809","volume-title":"Proc. 2nd Int. Conf. Intell. Comput. Control Syst. ICICCS","author":"Mane S.","year":"2019","unstructured":"S. Mane and S. Mangale, \"Moving Object Detection and Tracking Using Convolutional Neural Networks\", Proc. 2nd Int. Conf. Intell. Comput. Control Syst. ICICCS, pp. 1809-1813, 2019."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2844175"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Machine Learning","author":"Tan M.","year":"2019","unstructured":"M. Tan and Q. V. Le, \u201cEfficientNet: Rethinking Model Scaling for Convolutional Neural Networks,\u201d in International Conference on Machine Learning, 2019."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAGIRS48042.2020.9165649"},{"key":"e_1_3_2_1_9_1","first-page":"183","volume-title":"USA","author":"Shrestha R.","year":"2022","unstructured":"R. Shrestha and B. Nisha, \"Microservices vs Serverless Deployment in AWS: A Case Study with an Image Processing Application,\" 2022 IEEE\/ACM 15th International Conference on Utility and Cloud Computing (UCC), Vancouver, WA, USA, 2022, pp. 183-184"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI53556.2022.9776884"},{"key":"e_1_3_2_1_11_1","first-page":"567","volume-title":"Cloud and Parallel Computing (COM-IT-CON)","author":"Jha S.","year":"2022","unstructured":"S. Jha, M. Arora, Y. Sharma, A. Anand and D. Sharma, \"Comparative Analysis of Cloud Computing Based Face Recognition Services,\" 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), Faridabad, India, 2022, pp. 567-572"},{"key":"e_1_3_2_1_12_1","first-page":"1649","volume-title":"USA","author":"Modolo D.","year":"2021","unstructured":"D. Modolo, B. Shuai, R. R. Varior and J. Tighe, \"Understanding the impact of mistakes on background regions in crowd counting,\" 2021 IEEE Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA, 2021, pp. 1649-1658."},{"key":"e_1_3_2_1_13_1","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume":"9","author":"Glorot X.","year":"2010","unstructured":"X. Glorot and Y. Bengio, \u201cUnderstanding the difficulty of training deep feedforward neural networks,\u201d Journal of Machine Learning Research - Proceedings Track, vol. 9, pp. 249-256, 2010.","journal-title":"Journal of Machine Learning Research - Proceedings Track"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_39"},{"key":"e_1_3_2_1_15_1","volume-title":"Revisiting ResNets: Improved Training and Scaling Strategies","author":"Fedus W.","year":"2021","unstructured":"Bello, W. Fedus, X. Du, E. D. Cubuk, A. Srinivas, T.-Y. Lin, J. Shlens and B. Zoph, Revisiting ResNets: Improved Training and Scaling Strategies, 2021."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Security Analysis of AWS-based Video Surveillance Systems,\" 2021 International Conference on Engineering and Emerging Technologies (ICEET)","author":"Aklamati D.","year":"2021","unstructured":"D. Aklamati, B. Abdus-Shakur and T. Kacem, \"Security Analysis of AWS-based Video Surveillance Systems,\" 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, 2021, pp. 1-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2018.00018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA60121.2023.00104"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCC59169.2023.10335053"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCIS51004.2021.9397079"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.0001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01302"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWAIT.2018.8369633"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS46528.2019.9074588"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3321152"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647876","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:22:24Z","timestamp":1758216144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":25,"alternative-id":["10.1145\/3647444.3647876","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647876","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}