{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:35:20Z","timestamp":1740148520358,"version":"3.37.3"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41201378","41101432","2014M561212","2011jjA30014"],"award-info":[{"award-number":["41201378","41101432","2014M561212","2011jjA30014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41201378","41101432","2014M561212","2011jjA30014"],"award-info":[{"award-number":["41201378","41101432","2014M561212","2011jjA30014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["41201378","41101432","2014M561212","2011jjA30014"],"award-info":[{"award-number":["41201378","41101432","2014M561212","2011jjA30014"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation Project of Chongqing CSTC","award":["41201378","41101432","2014M561212","2011jjA30014"],"award-info":[{"award-number":["41201378","41101432","2014M561212","2011jjA30014"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2014]]},"abstract":"<jats:p>Public security is a widespread disastrous phenomenon that constitutes a grave threat. Although information fusion of video sensor networks for public security has been studied extensively, multimedia fusion in heterogeneous sensor networks or its application in public security remains a challenge and central goal in the field of information fusion. In this study, to realize the detection, monitoring, and intelligent alarm of such hazards, we develop a graph-based real-time schema for studying the dynamic structure of heterogeneous sensors for public security. In the proposed schema, data fusion algorithms based on data-driven aspects of fusion are explored to locate the optimal sensing ranges of sensor nodes in a network with heterogeneous targets. In addition, we propose a framework incorporating useful contextual and temporal cues for public security alarm, explore its conceptualizations, benefits, and challenges, and analyze the correlations of the target motion elements in the multimedia sensor stream. The experimental results show that the new method offers a better way of intelligent alarm that cannot be achieved by existing schemes.<\/jats:p>","DOI":"10.1155\/2014\/273210","type":"journal-article","created":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T17:02:09Z","timestamp":1414429329000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Multimedia Fusion for Public Security in Heterogeneous Sensor Networks"],"prefix":"10.1155","volume":"2014","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9155-1865","authenticated-orcid":true,"given":"Jiangfan","family":"Feng","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"Key Laboratory of Instrument Science and Dynamic Test, North University of China, Taiyuan 030051, China"}]},{"given":"Wenwen","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Kaixin","family":"Sun","sequence":"additional","affiliation":[{"name":"Key Laboratory of Virtual Geographic Environment, Nanjing Normal University, Nanjing 210046, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/704504"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01271280"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2012.01.001"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.03.008"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.12.006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37835-5_33"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33738-3_36"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1186\/2213-7459-1-10"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2005.03.023"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-009-0211-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-006-0025-6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-008-9138-7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-005-4327-y"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/158569"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.823147"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-010-0182-0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.07.002"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2005.03.006"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.09.002"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.09.002"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-005-6994-4"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.019"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s00442-006-0565-2"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.14358\/PERS.70.5.589"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/62.825666"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04129-2_19"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4533-z"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2010.07.017"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1019"},{"issue":"2","key":"37","first-page":"501","volume":"10","year":"2013","journal-title":"Journal of Information and Computational Science"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2293093"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2014\/273210.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2014\/273210.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2014\/273210.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:01:31Z","timestamp":1469718091000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/js\/2014\/273210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":31,"alternative-id":["273210","273210"],"URL":"https:\/\/doi.org\/10.1155\/2014\/273210","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"type":"print","value":"1687-725X"},{"type":"electronic","value":"1687-7268"}],"subject":[],"published":{"date-parts":[[2014]]}}}