{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T18:44:57Z","timestamp":1763923497018},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s00034-024-02725-y","type":"journal-article","created":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T19:01:25Z","timestamp":1717959685000},"page":"5933-5963","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fog-Assisted Abnormal Motion Detection System: A Semantic Ontology Approach"],"prefix":"10.1007","volume":"43","author":[{"given":"R. S.","family":"Amshavalli","sequence":"first","affiliation":[]},{"given":"J.","family":"Kalaivani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,9]]},"reference":[{"key":"2725_CR1","doi-asserted-by":"crossref","unstructured":"F. Abdullah, A. Jalal, Multi-pedestrians anomaly detection via conditional random field and deep learning. In\u00a02023 4th International Conference on Advancements in Computational Sciences (ICACS)\u00a0(pp. 1\u20136) (2023). IEEE.","DOI":"10.1109\/ICACS55311.2023.10089730"},{"key":"2725_CR2","doi-asserted-by":"crossref","unstructured":"R.A.M. Alairaji, I.A. Aljazaery, H.T.S. ALRikabi, Abnormal behavior detection of students in the examination hall from surveillance videos. In\u00a0Advanced Computational Paradigms and Hybrid Intelligent Computing: Proceedings of ICACCP 2021\u00a0(pp. 113\u2013125) (2022). Springer Singapore.","DOI":"10.1007\/978-981-16-4369-9_12"},{"key":"2725_CR3","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s00521-016-2363-z","volume":"28","author":"M Al-Nawashi","year":"2017","unstructured":"M. Al-Nawashi, O.M. Al-Hazaimeh, M. Saraee, A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments. Neural Comput. Appl. 28, 565\u2013572 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"2725_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/s11554-023-01350-3","volume":"20","author":"RS Amshavalli","year":"2023","unstructured":"R.S. Amshavalli, J. Kalaivani, Real-time institution video data analysis using fog computing and adaptive background subtraction. J. Real-Time Image Process. 20(5), 96 (2023)","journal-title":"J. Real-Time Image Process."},{"key":"2725_CR5","doi-asserted-by":"publisher","unstructured":"R.S. Amshavalli, J. Kalaivani, A Comprehensive Survey on Role of Fog Computing and Need for Semantic Technology in Modern Computing Platform. in 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2023, pp. 719\u2013725. https:\/\/doi.org\/10.1109\/ICICCS56967.2023.10142888","DOI":"10.1109\/ICICCS56967.2023.10142888"},{"issue":"1","key":"2725_CR6","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1007\/s10489-021-02356-9","volume":"52","author":"M Asad","year":"2022","unstructured":"M. Asad, H. Jiang, J. Yang, T. Enmei, A.A. Malik, Multi-Stream 3D latent feature clustering for abnormality detection in videos. Appl. Intell. 52(1), 1126\u20131143 (2022). https:\/\/doi.org\/10.1007\/s10489-021-02356-9","journal-title":"Appl. Intell."},{"key":"2725_CR7","doi-asserted-by":"crossref","unstructured":"A. Awasthi, D. Bhat, M. Oak, N. Kayarvizhy, Effectiveness of Connected Components Labelling Approach in Noise Reduction for Image De-fencing. In\u00a0Proceedings of International Conference on Communication and Computational Technologies: ICCCT 2021\u00a0(pp. 635\u2013646) (2021). Springer Singapore.","DOI":"10.1007\/978-981-16-3246-4_49"},{"issue":"2","key":"2725_CR8","doi-asserted-by":"publisher","first-page":"693","DOI":"10.32604\/iasc.2022.022241","volume":"32","author":"A Balasundaram","year":"2022","unstructured":"A. Balasundaram, G. Dilip, M. Manickam, A.K. Sivaraman, K. Gurunathan, R. Dhanalakshmi, S. Ashokkumar, Abnormality identification in video surveillance system using DCT. Intell. Automation Soft Comput. 32(2), 693 (2022)","journal-title":"Intell. Automation Soft Comput."},{"key":"2725_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2010\/343057","volume":"2010","author":"M Cristani","year":"2010","unstructured":"M. Cristani, M. Farenzena, D. Bloisi, V. Murino, Background subtraction for automated multisensor surveillance: a comprehensive review. EURASIP J. Adv. Signal Process. 2010, 1\u201324 (2010)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"2725_CR10","doi-asserted-by":"crossref","unstructured":"H. Deng, Z. Zhang, S. Zou, X. Li, Bi-Directional frame interpolation for unsupervised video anomaly detection. In\u00a0Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision\u00a0(pp. 2634\u20132643) (2023)","DOI":"10.1109\/WACV56688.2023.00266"},{"key":"2725_CR11","volume":"82","author":"F Farahi","year":"2020","unstructured":"F. Farahi, H.S. Yazdi, Probabilistic Kalman filter for moving object tracking. Signal Process.: Image Commun. 82, 115751 (2020)","journal-title":"Signal Process.: Image Commun."},{"key":"2725_CR12","doi-asserted-by":"crossref","unstructured":"A. Flaborea, L. Collorone, G. D'Amely, S. D'Arrigo, B. Prenkaj, F. Galasso, Multimodal Motion Conditioned Diffusion Model for Skeleton-based Video Anomaly Detection.\u00a0arXiv preprint arXiv:2307.07205. (2023)","DOI":"10.1109\/ICCV51070.2023.00947"},{"key":"2725_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100204","volume":"35","author":"B Garcia-Garcia","year":"2020","unstructured":"B. Garcia-Garcia, T. Bouwmans, A.J.R. Silva, Background subtraction in real applications: challenges, current models and future directions. Comput. Sci. Rev. 35, 100204 (2020)","journal-title":"Comput. Sci. Rev."},{"key":"2725_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1142\/9789811211072_0003","volume-title":"Handbook of Pattern Recognition and Computer Vision","author":"JH Giraldo","year":"2020","unstructured":"J.H. Giraldo, H.T. Le, T. Bouwmans, Deep learning based background subtraction: a systematic survey, in Handbook of Pattern Recognition and Computer Vision. ed. by C.H. Chen (World Scientific, 2020), pp.51\u201373. https:\/\/doi.org\/10.1142\/9789811211072_0003"},{"key":"2725_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-030-81638-4_3","volume-title":"Frontiers of Computer Vision: 27th International Workshop, IW-FCV 2021, Daegu, South Korea, February 22\u201323, 2021, Revised Selected Papers","author":"JH Giraldo","year":"2021","unstructured":"J.H. Giraldo, S. Javed, M. Sultana, S.K. Jung, T. Bouwmans, The emerging field of graph signal processing for moving object segmentation, in Frontiers of Computer Vision: 27th International Workshop, IW-FCV 2021, Daegu, South Korea, February 22\u201323, 2021, Revised Selected Papers. ed. by H. Jeong, K. Sumi (Springer International Publishing, Cham, 2021), pp.31\u201345. https:\/\/doi.org\/10.1007\/978-3-030-81638-4_3"},{"issue":"25\u201326","key":"2725_CR16","doi-asserted-by":"publisher","first-page":"17579","DOI":"10.1007\/s11042-020-08659-2","volume":"79","author":"E Hatirnaz","year":"2020","unstructured":"E. Hatirnaz, M. Sah, C. Direkoglu, A novel framework and concept-based semantic search Interface for abnormal crowd behaviour analysis in surveillance videos. Multimed. Tools Appl. 79(25\u201326), 17579\u201317617 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"2725_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.comcom.2021.12.007","volume":"184","author":"M Hou","year":"2022","unstructured":"M. Hou, M. Wang, W. Zhao, Q. Ni, Z. Cai, X. Kong, A lightweight framework for abnormal driving behavior detection. Comput. Commun. 184, 128\u2013136 (2022)","journal-title":"Comput. Commun."},{"issue":"10","key":"2725_CR18","doi-asserted-by":"publisher","first-page":"3862","DOI":"10.3390\/s22103862","volume":"22","author":"PY Ingle","year":"2022","unstructured":"P.Y. Ingle, Y.G. Kim, Real-time abnormal object detection for video surveillance in smart cities. Sensors 22(10), 3862 (2022)","journal-title":"Sensors"},{"issue":"2","key":"2725_CR19","doi-asserted-by":"publisher","first-page":"2843","DOI":"10.1109\/TII.2023.3298476","volume":"20","author":"Y Liu","year":"2024","unstructured":"Y. Liu, J. Liu, K. Yang, J. Bobo, S. Liu, Y. Wang, D. Yang, P. Sun, L. Song, Amp-net: appearance-motion prototype network assisted automatic video anomaly detection system. IEEE Trans. Ind. Inform. 20(2), 2843\u20132855 (2024). https:\/\/doi.org\/10.1109\/TII.2023.3298476","journal-title":"IEEE Trans. Ind. Inform."},{"key":"2725_CR20","doi-asserted-by":"publisher","DOI":"10.29304\/jqcm.2021.13.4.858","author":"MS Mahdi","year":"2021","unstructured":"M.S. Mahdi, A.J. Mohammed, A.A. Waedallah, Detection of unusual activity in surveillance video scenes based on deep learning strategies. J. Al-Qadisiyah Comput. Sci. Math. (2021). https:\/\/doi.org\/10.29304\/jqcm.2021.13.4.858","journal-title":"J. Al-Qadisiyah Comput. Sci. Math."},{"issue":"29","key":"2725_CR21","doi-asserted-by":"publisher","first-page":"42371","DOI":"10.1007\/s11042-022-13494-8","volume":"81","author":"P Matlani","year":"2022","unstructured":"P. Matlani, M. Shrivastava, Efficient abnormal event detection in video using deep attention based bidirectional lstm with a mayfly optimization. Multimed. Tools Appl. 81(29), 42371\u201342392 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"2725_CR22","doi-asserted-by":"crossref","unstructured":"S. Messelodi, C.M. Modena, N. Segata, M. Zanin, A Kalman filter based background updating algorithm robust to sharp illumination changes. In\u00a0Image Analysis and Processing\u2013ICIAP 2005: 13th International Conference, Cagliari, Italy, September 6\u20138, 2005. Proceedings 13\u00a0(pp. 163\u2013170) (2005). Springer Berlin Heidelberg","DOI":"10.1007\/11553595_20"},{"key":"2725_CR23","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.920","volume":"8","author":"B Omarov","year":"2022","unstructured":"B. Omarov, S. Narynov, Z. Zhumanov, A. Gumar, M. Khassanova, State-of-the-art violence detection techniques in video surveillance security systems: a systematic review. PeerJ Comput. Sci. 8, e920 (2022)","journal-title":"PeerJ Comput. Sci."},{"issue":"08","key":"2725_CR24","doi-asserted-by":"publisher","first-page":"124","DOI":"10.3991\/ijim.v16i08.30157","volume":"16","author":"M Roa\u2019a","year":"2022","unstructured":"M. Roa\u2019a, I.A. Aljazaery, H.T.S. Alrikabi, A.H.M. Alaidi, Automated cheating detection based on video surveillance in the examination classes. Int. J. Interact. Mobile Technol. 16(08), 124\u2013137 (2022). https:\/\/doi.org\/10.3991\/ijim.v16i08.30157","journal-title":"Int. J. Interact. Mobile Technol."},{"issue":"02","key":"2725_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.36548\/jscp.2021.2.001","volume":"3","author":"R Sharma","year":"2021","unstructured":"R. Sharma, A. Sungheetha, An efficient dimension reduction based fusion of CNN and SVM model for detection of abnormal incident in video surveillance. J. Soft Comput. Paradigm (JSCP) 3(02), 55\u201369 (2021)","journal-title":"J. Soft Comput. Paradigm (JSCP)"},{"issue":"4","key":"2725_CR26","first-page":"1415","volume":"23","author":"SB Song","year":"2019","unstructured":"S.B. Song, J.H. Kim, SFMOG: super fast MOG based background subtraction algorithm. J. IKEEE 23(4), 1415\u20131422 (2019)","journal-title":"J. IKEEE"},{"issue":"3","key":"2725_CR27","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1109\/TCSS.2021.3137306","volume":"10","author":"BN Subudhi","year":"2023","unstructured":"B.N. Subudhi, M.K. Panda, T. Veerakumar, V. Jakhetiya, S. Esakkirajan, Kernel-induced possibilistic fuzzy associate background subtraction for video scene. IEEE Trans. Comput. Soc. Syst. 10(3), 1314\u20131325 (2023). https:\/\/doi.org\/10.1109\/TCSS.2021.3137306","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"4","key":"2725_CR28","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2018.2826566","volume":"35","author":"N Vaswani","year":"2018","unstructured":"N. Vaswani, T. Bouwmans, S. Javed, P. Narayanamurthy, Robust subspace learning: robust PCA, robust subspace tracking, and robust subspace recovery. IEEE Signal Process. Mag. 35(4), 32\u201355 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"2725_CR29","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-031-20080-9_29","volume-title":"Computer Vision \u2013 ECCV 2022: 17th European Conference, Tel Aviv, Israel, October 23\u201327, 2022, Proceedings, Part X","author":"G Wang","year":"2022","unstructured":"G. Wang, Y. Wang, J. Qin, D. Zhang, X. Bao, Di. Huang, Video anomaly detection by\u00a0solving decoupled spatio-temporal jigsaw puzzles, in Computer Vision \u2013 ECCV 2022: 17th European Conference, Tel Aviv, Israel, October 23\u201327, 2022, Proceedings, Part X. ed. by S. Avidan, G. Brostow, M. Ciss\u00e9, G.M. Farinella, T. Hassner (Springer Nature Switzerland, Cham, 2022), pp.494\u2013511. https:\/\/doi.org\/10.1007\/978-3-031-20080-9_29"},{"key":"2725_CR30","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1007\/s11227-020-03391-y","volume":"77","author":"L Xia","year":"2021","unstructured":"L. Xia, Z. Li, A new method of abnormal behavior detection using LSTM network with temporal attention mechanism. J. Supercomput. 77, 3223\u20133241 (2021)","journal-title":"J. Supercomput."},{"key":"2725_CR31","doi-asserted-by":"publisher","first-page":"126561","DOI":"10.1016\/j.neucom.2023.126561","volume":"553","author":"Y Yang","year":"2023","unstructured":"Y. Yang, F. Zeyu, S.M. Naqvi, Abnormal event detection for video surveillance using an enhanced two-stream fusion method. Neurocomputing 553, 126561 (2023). https:\/\/doi.org\/10.1016\/j.neucom.2023.126561","journal-title":"Neurocomputing"},{"key":"2725_CR32","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ins.2021.11.001","volume":"586","author":"J Yu","year":"2022","unstructured":"J. Yu, J.G. Kim, J. Gwak, B.G. Lee, M. Jeon, Abnormal event detection using adversarial predictive coding for motion and appearance. Inf. Sci. 586, 59\u201373 (2022)","journal-title":"Inf. Sci."},{"key":"2725_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108336","volume":"122","author":"Y Zhong","year":"2022","unstructured":"Y. Zhong, X. Chen, J. Jiang, F. Ren, A cascade reconstruction model with generalization ability evaluation for anomaly detection in videos. Pattern Recogn. 122, 108336 (2022)","journal-title":"Pattern Recogn."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02725-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02725-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02725-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T12:08:28Z","timestamp":1723637308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02725-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["2725"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02725-y","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2024,6,9]]},"assertion":[{"value":"10 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}