{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T07:56:03Z","timestamp":1722671763853},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/elex.14.20170023","type":"journal-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T22:08:21Z","timestamp":1487110101000},"page":"20170023-20170023","source":"Crossref","is-referenced-by-count":7,"title":["An optic-fiber fence intrusion recognition system using mixture Gaussian hidden Markov models"],"prefix":"10.1587","volume":"14","author":[{"given":"Zhixian","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University"}]},{"given":"Yao","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University"}]},{"given":"Jie","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] G. Allwoodet al.: \u201cOptical fiber sensors in physical intrusion detection systems: a review,\u201d IEEE Sensors J. <b>16<\/b> (2016) 5497 (DOI: 10.1109\/JSEN.2016.2535465).","DOI":"10.1109\/JSEN.2016.2535465"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] T. H. Ali, <i>et al.<\/i>: \u201cIntrusion detection and classification using optical fiber vibration sensor,\u201d CEIT (2015) (DOI: 10.1109\/ceit.2015.7233060).","DOI":"10.1109\/CEIT.2015.7233060"},{"key":"3","unstructured":"[3] J. Zhu: \u201cResearch on classification of fiber intrusion signal based on supported vector machines,\u201d INFOCOMP (2014) 163."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] Q. Zhu and W. Ye: \u201cDistributed fiber-optic sensing using double-loop sagnac interferometer,\u201d ICIEA (2014) 499 (DOI: 10.1109\/iciea.2014.6931215).","DOI":"10.1109\/ICIEA.2014.6931215"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D. Xu, <i>et al.<\/i>: \u201cRobust intrusion detection and recognition via sparse representation,\u201d ISP (2013) 1 (DOI: 10.1049\/cp.2013.2061).","DOI":"10.1049\/cp.2013.2061"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] S. S. Mahmoud and J. Katsifolis: \u201cPerformance investigation of real-time fiber optic perimeter intrusion detection systems using event classification,\u201d ICCST (2010) 387 (DOI: 10.1109\/ccst.2010.5678690).","DOI":"10.1109\/CCST.2010.5678690"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] H. K. Min, <i>et al.<\/i>: \u201cAbnormal signal detection in gas pipes using neural networks,\u201d IECON (2007) 2503 (DOI: 10.1109\/iecon.2007.4460266).","DOI":"10.1109\/IECON.2007.4460266"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] A. Yousefi, <i>et al.<\/i>: \u201cThe application of non-homogenous hmm on the detection of security fence breaches,\u201d ICASSP (2010) 1606 (DOI: 10.1109\/icassp.2010.5495540).","DOI":"10.1109\/ICASSP.2010.5495540"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A. Yousefi, <i>et al.<\/i>: \u201cIntelligent fence intrusion detection system: detection of intentional fence breaching and recognition of fence climbing,\u201d HST\u201908 (2008) 620 (DOI: 10.1109\/ths.2008.4635057).","DOI":"10.1109\/THS.2008.4635057"},{"key":"10","unstructured":"[10] T. Ganchev, <i>et al.<\/i>: \u201cComparative evaluation of various mfcc implementations on the speaker verification task,\u201d SPECOM (2005) 191."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] D. Yu and L. Deng: <i>Automatic Speech Recognition: A Deep Learning Approach<\/i> (Springer-Verlag, London, 2015) 25.","DOI":"10.1007\/978-1-4471-5779-3"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] L. E. Baum and T. Petrie: \u201cStatistical inference for probabilistic functions of finite state markov chains,\u201d Ann. Math. Stat. <b>37<\/b> (1966) 1554 (DOI: 10.1214\/aoms\/1177699147).","DOI":"10.1214\/aoms\/1177699147"}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/14\/5\/14_14.20170023\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T10:32:29Z","timestamp":1498386749000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/14\/5\/14_14.20170023\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.14.20170023","relation":{},"ISSN":["1349-2543"],"issn-type":[{"value":"1349-2543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}