{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:11:56Z","timestamp":1717978316789},"reference-count":15,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002559","name":"Sookmyung Women\u2019s University","doi-asserted-by":"publisher","award":["1-1603-2031","NRF-2015R1D1A1A09057141"],"id":[{"id":"10.13039\/501100002559","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2016]]},"abstract":"In the WSN- (wireless sensor network-) based surveillance system to detect undesired intrusion, all detected objects are not intruders. In order to reduce false alarms, human detection mechanism needs to determine if the detected object is a human. For human detection, physical characteristics of human are usually used. In this paper, we use the physical height to differentiate an intruder from detected objects. Using the measured information from sensors, we estimate the height of the detected object. Based on the height, if the detected object is decided as an intruder, an alarm is given to a control center. The experimental results indicate that our mechanism correctly and fast estimates the height of the object without complex computation.<\/jats:p>","DOI":"10.1155\/2016\/2127593","type":"journal-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T21:11:38Z","timestamp":1476220298000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["WSN-Based Height Estimation of Moving Object in Surveillance Systems"],"prefix":"10.1155","volume":"2016","author":[{"given":"Jaeseok","family":"Shim","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Suwon, San 2-2, Wau-ri, Bongdam-eup, Hwaseong, Gyeonggi-do 445-743, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3076-8040","authenticated-orcid":true,"given":"Yujin","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of Information Technology Engineering, Sookmyung Women\u2019s University, Cheongpa-ro 47-gil 100, Yongsan-gu, Seoul 04310, Republic of Korea"}]}],"member":"98","reference":[{"key":"1","series-title":"Lecture Notes of the Institute for Computer Sciences","first-page":"607","volume-title":"Building intrusion detection with a wireless sensor network","volume":"28","year":"2010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2015.2393713"},{"key":"3","series-title":"Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-642-27299-8_48","volume-title":"Sensor-cloud: assimilation of wireless sensor network and the cloud","volume":"84","year":"2012"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2010.5601957"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.125671"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2014.994138"},{"issue":"1","key":"9","first-page":"90","volume":"3","year":"2013","journal-title":"International Journal of Computational Engineering Research"},{"issue":"6","key":"10","first-page":"2463","volume":"8","year":"2012","journal-title":"Journal of Computational Information Systems"},{"issue":"10","key":"12","first-page":"83","volume":"2010","year":"2010","journal-title":"Computer Aided Drafting, Design and Manufacturing"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.12.2582-2589"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.9.1384-1390"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.167"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2456057"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2314064"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/s0025557200178532"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/2127593.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/2127593.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/2127593.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:52:31Z","timestamp":1498351951000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2016\/2127593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":15,"alternative-id":["2127593","2127593"],"URL":"https:\/\/doi.org\/10.1155\/2016\/2127593","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"value":"1574-017X","type":"print"},{"value":"1875-905X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}