{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:21:29Z","timestamp":1758248489290,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647877","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Virtual Surveillance Assistant: Converging Computer Vision, NLP, and Chatbot Technologies via Azure Cognitive Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8138-3936","authenticated-orcid":false,"given":"Garima","family":"Srivastava","sequence":"first","affiliation":[{"name":"Computer Science, Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2196-4573","authenticated-orcid":false,"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[{"name":"Electronics &amp; Communication Engineering, Amity University Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3841-418X","authenticated-orcid":false,"given":"Kunal","family":"Yadav","sequence":"additional","affiliation":[{"name":"Amity School of Engineering and Technology, Amity University Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"unstructured":"Microsoft Azure Cognitive Services \"Computer Vision - Extract rich information from images and videos \" Microsoft Corporation 2021. [Online]. Available: https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/computer-vision\/","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"identify, analyze, organize, and tag faces in photos,\" Microsoft Corporation","author":"Microsoft Azure Cognitive Services","year":"2021","unstructured":"Microsoft Azure Cognitive Services, \"Face API - Detect, identify, analyze, organize, and tag faces in photos,\" Microsoft Corporation, 2021. [Online]. Available: https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/face\/"},{"unstructured":"Microsoft Azure Cognitive Services \"Custom Vision - Build and deploy custom machine learning models \" Microsoft Corporation 2021. [Online]. Available: https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/custom-vision-service\/","key":"e_1_3_2_1_3_1"},{"unstructured":"Microsoft Azure Cognitive Services \"Text Analytics - Microsoft Azure \" Microsoft Corporation 2021. [Online]. Available: https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/text-analytics\/","key":"e_1_3_2_1_4_1"},{"unstructured":"Microsoft Azure Cognitive Services \"Speech Services - Convert spoken language into written text and back again \" Microsoft Corporation 2021. [Online]. Available: https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/speech-services\/","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Histograms of Oriented Gradients for Human Detection,\" in IEEE Computer Society Conference on Computer Vision and Pattern Recognition","author":"Dalal B.","year":"2005","unstructured":"N. Dalal and B. Triggs, \"Histograms of Oriented Gradients for Human Detection,\" in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Computer Vision Projects with Python,\" Packt Publishing","author":"L\u00f3pez CV","year":"2016","unstructured":"A. M. L\u00f3pez, \"OpenCV: Computer Vision Projects with Python,\" Packt Publishing, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TIP.2010.2101613"},{"key":"e_1_3_2_1_9_1","first-page":"50","volume-title":"IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","author":"Sieradzki R.","year":"2013","unstructured":"Sieradzki, R., Grega, M., Lach, S.: Automated recognition of firearms in surveillance video. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Diego, CA, USA, pp. 45\u201350 , 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICIP.2010.5653676"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ICIP.2016.7532519"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"16","article-title":"Detection of regular objects in baggage using multiple X-ray views","volume":"55","author":"Merry D.","year":"2013","unstructured":"Merry, D., Mondragon, G., Riffo, V., Zuccar, I.: Detection of regular objects in baggage using multiple X-ray views. Insight-Non-Destr. Test. Cond. Monit. 55(1), 16\u201320, 2013.","journal-title":"Insight-Non-Destr. Test. Cond. Monit."},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"65","article-title":"Detection of concealed weapons in X-ray images using fuzzy k-nn","volume":"2","author":"Roomi M.","year":"2012","unstructured":"Roomi, M., Rajashankarii, R.: Detection of concealed weapons in X-ray images using fuzzy k-nn. Int. J. Comput. Sci. Eng. Inf. Technol. 2(2), 65\u201370, 2012.","journal-title":"Int. J. Comput. Sci. Eng. Inf. Technol."},{"key":"e_1_3_2_1_14_1","first-page":"s231n","article-title":"Developing a real-time gun detection classifier","author":"Lai J.","year":"2017","unstructured":"Lai, J., Maples, S.: Developing a real-time gun detection classifier. Accessed on August 2017). http:\/\/cs231n.stanford.edu\/reports\/2017\/pdfs\/716.pdf","journal-title":"Accessed on"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/EEEI.2012.6377063"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.neucom.2017.05.012"},{"key":"e_1_3_2_1_17_1","volume-title":"Speech and Signal Processing","author":"Graves A.-r.","year":"2013","unstructured":"A. Graves, A.-r. Mohamed, and G. Hinton, \"Speech Recognition with Deep Recurrent Neural Networks,\" in IEEE International Conference on Acoustics, Speech and Signal Processing, 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"A Review of Challenges and Opportunities in Video Analytics,\" in ACM Transactions on Multimedia Computing, Communications, and Applications","author":"Papangelis F.","year":"2020","unstructured":"A. Papangelis and F. Schaub, \"A Review of Challenges and Opportunities in Video Analytics,\" in ACM Transactions on Multimedia Computing, Communications, and Applications, 2020."},{"issue":"3","key":"e_1_3_2_1_19_1","first-page":"145","article-title":"NLP Techniques for Language Detection and Translation in Surveillance Systems","volume":"8","author":"Gupta S.","year":"2020","unstructured":"Gupta, S., , \"NLP Techniques for Language Detection and Translation in Surveillance Systems.\" Journal of Security and Communication Systems, 8(3), 145-157, 2020.","journal-title":"Journal of Security and Communication Systems"},{"key":"e_1_3_2_1_20_1","first-page":"78","volume-title":"International Conference on Intelligent Surveillance Systems","author":"Liu M.","year":"2018","unstructured":"Liu, M., , \"Chatbot Integration in Surveillance Systems for Real-time Information Retrieval.\" International Conference on Intelligent Surveillance Systems, Proceedings, 78-89, 2018."},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"213","article-title":"Enhancing Security Systems with Interactive Chatbots for Incident Reporting and Emergency Response","volume":"16","author":"Kim S.","year":"2020","unstructured":"Kim, S., , \"Enhancing Security Systems with Interactive Chatbots for Incident Reporting and Emergency Response.\" Journal of Security Technology, 16(4), 213-226, 2020.","journal-title":"Journal of Security Technology"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE","author":"Jha","year":"2023","unstructured":"Jha, Mahesh Kumar, \"Converge of IoT and AI in Metaverse: Challenges and Opportunities.\"\u00a02023 5th International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2023."},{"key":"e_1_3_2_1_23_1","volume-title":"IEEE 8th International Conference for Convergence in Technology (I2CT). IEEE","author":"Chandwani","year":"2023","unstructured":"Chandwani, Akshaj, \"Virtual Assistant for Appointment Booking.\"\u00a02023 IEEE 8th International Conference for Convergence in Technology (I2CT). IEEE, 2023."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1002\/cav.2129"},{"key":"e_1_3_2_1_25_1","article-title":"Understanding the Motion Adaption of Machine Using Long Short\u2013Term Memory Networks for voiceless Virtual Assistant","volume":"1","author":"Roy","year":"2023","unstructured":"Roy, Subhrajit, and Binoy Das. \"Understanding the Motion Adaption of Machine Using Long Short\u2013Term Memory Networks for voiceless Virtual Assistant.\"\u00a0International Journal of Digital Technologies\u00a02.1 (2023).","journal-title":"\u00a0International Journal of Digital Technologies\u00a02"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE","author":"Sriram V. P.","year":"2022","unstructured":"Sriram, V. P., \"Design of voice based virtual assistant using internet of things.\"\u00a02022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2022."}],"event":{"acronym":"ICIMMI 2023","name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647877","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:22:22Z","timestamp":1758216142000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":26,"alternative-id":["10.1145\/3647444.3647877","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647877","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}