{"id":"https://openalex.org/W4396573119","doi":"https://doi.org/10.5220/0012716500003690","title":"Use of Custom Videogame Dataset and YOLO Model for Accurate Handgun Detection in Real-Time Video Security Applications","display_name":"Use of Custom Videogame Dataset and YOLO Model for Accurate Handgun Detection in Real-Time Video Security Applications","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396573119","doi":"https://doi.org/10.5220/0012716500003690"},"language":"en","primary_location":{"id":"doi:10.5220/0012716500003690","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012716500003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0012716500003690","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5096129571","display_name":"Diego Bazan","orcid":null},"institutions":[{"id":"https://openalex.org/I1311157440","display_name":"Peruvian University of Applied Sciences","ror":"https://ror.org/047xrr705","country_code":"PE","type":"education","lineage":["https://openalex.org/I1311157440"]}],"countries":["PE"],"is_corresponding":true,"raw_author_name":"Diego Bazan","raw_affiliation_strings":["Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---","institution_ids":["https://openalex.org/I1311157440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061180630","display_name":"R.H. Casanova","orcid":null},"institutions":[{"id":"https://openalex.org/I1311157440","display_name":"Peruvian University of Applied Sciences","ror":"https://ror.org/047xrr705","country_code":"PE","type":"education","lineage":["https://openalex.org/I1311157440"]}],"countries":["PE"],"is_corresponding":false,"raw_author_name":"Raul Casanova","raw_affiliation_strings":["Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---","institution_ids":["https://openalex.org/I1311157440"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076194651","display_name":"Willy Ugarte","orcid":"https://orcid.org/0000-0002-7510-618X"},"institutions":[{"id":"https://openalex.org/I1311157440","display_name":"Peruvian University of Applied Sciences","ror":"https://ror.org/047xrr705","country_code":"PE","type":"education","lineage":["https://openalex.org/I1311157440"]}],"countries":["PE"],"is_corresponding":false,"raw_author_name":"Willy Ugarte","raw_affiliation_strings":["Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Universidad Peruana de Ciencias Aplicadas, Lima, Peru, --- Select a Country ---","institution_ids":["https://openalex.org/I1311157440"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5096129571"],"corresponding_institution_ids":["https://openalex.org/I1311157440"],"apc_list":null,"apc_paid":null,"fwci":1.0632,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79641792,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"520","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9398000240325928,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.737240731716156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4155375063419342},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.40650853514671326},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3861870765686035},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3484981060028076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33510857820510864}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.737240731716156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4155375063419342},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40650853514671326},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3861870765686035},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3484981060028076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33510857820510864}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0012716500003690","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012716500003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:repositorioacademico.upc.edu.pe:10757/676064","is_oa":true,"landing_page_url":"http://hdl.handle.net/10757/676064","pdf_url":"https://repositorioacademico.upc.edu.pe/bitstream/10757/676064/1/127165.pdf","source":{"id":"https://openalex.org/S4306401415","display_name":"Repositorio Acad\u00e9mico de la Universidad Peruana de Ciencias Aplicadas (Universidad Peruana de Ciencias Aplicadas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1311157440","host_organization_name":"Peruvian University of Applied Sciences","host_organization_lineage":["https://openalex.org/I1311157440"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"529","raw_type":"http://purl.org/coar/version/c_970fb48d4fbd8a493"}],"best_oa_location":{"id":"doi:10.5220/0012716500003690","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012716500003690","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2772917594","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398","https://openalex.org/W2775347418"],"abstract_inverted_index":{"Research":[0],"has":[1],"shown":[2,30],"the":[3,25,44,65,86,107,115,125,134,149],"ineffectiveness":[4],"of":[5,47,114],"video":[6,81,112,162],"surveillance":[7,82,163],"operators":[8],"in":[9,38,139,154,158],"detecting":[10,155],"crimes":[11],"through":[12],"security":[13,180],"cameras,":[14],"which":[15,136],"is":[16],"a":[17,60,71,80,140],"challenge":[18,95],"due":[19,42],"to":[20,43,50,97,105,123,132,171],"their":[21],"physical":[22],"limitations.":[23],"On":[24],"other":[26],"hand,":[27],"it":[28],"was":[29,96,121,137,169],"that":[31,84],"computer":[32,72,108],"vision,":[33],"although":[34],"promising,":[35,147],"faces":[36],"difficulties":[37],"real-time":[39],"crime":[40,91,157],"detection":[41],"large":[45],"amount":[46],"data":[48],"needed":[49],"build":[51],"reliable":[52],"models.":[53],"This":[54],"study":[55],"presents":[56],"three":[57],"key":[58],"innovations:":[59],"gun":[61,90,156],"dataset":[62],"extracted":[63],"from":[64],"Grand":[66,116],"Theft":[67,117],"Auto":[68,118],"V":[69,119],"game,":[70],"vision":[73,109],"model":[74,87,150,168],"trained":[75],"on":[76,166,179],"this":[77,167],"data,":[78],"and":[79,103,174],"application":[83,164],"employs":[85],"for":[88],"automatic":[89],"detection.":[92],"The":[93,111,143,161],"main":[94],"collect":[98],"images":[99,129],"representing":[100],"various":[101],"scenarios":[102],"angles":[104],"reinforce":[106],"model.":[110],"editor":[113],"game":[120],"used":[122,131],"obtain":[124],"necessary":[126],"images.":[127],"These":[128],"were":[130,145],"train":[133],"model,":[135],"implemented":[138],"desktop":[141],"application.":[142],"results":[144],"very":[146],"as":[148],"demonstrated":[151],"high":[152],"accuracy":[153],"real":[159],"time.":[160],"based":[165],"able":[170],"automatically":[172],"identify":[173],"alert":[175],"about":[176],"criminal":[177],"situations":[178],"cameras-":[181]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
