{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:10:22Z","timestamp":1777450222496,"version":"3.51.4"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:00Z","timestamp":1565308800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:00Z","timestamp":1565308800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s42044-019-00045-y","type":"journal-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T06:02:25Z","timestamp":1565330545000},"page":"103-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Anomaly detection in group activities based on fuzzy lattices using Schr\u00f6dinger equation"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1838-7341","authenticated-orcid":false,"given":"Rajiv","family":"Kapoor","sequence":"first","affiliation":[]},{"given":"Om","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"M. M.","family":"Tripathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Cui, P., Sun, L., et al.: A sequential Monte Carlo approach to anomaly detection in tracking visual events. In: IEEE Workshop on Visual Surveillance, pp. 1\u20138 (2007)","DOI":"10.1109\/CVPR.2007.383515"},{"issue":"5","key":"45_CR2","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song, X., Wu, M., et al.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631\u2013645 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"45_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10851-005-3616-0","volume":"24","author":"J Serra","year":"2006","unstructured":"Serra, J.: A lattice approach to image segmentation. J. Math. Imaging Vis. 24, 83\u2013130 (2006)","journal-title":"J. Math. Imaging Vis."},{"issue":"11","key":"45_CR4","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1109\/TCSVT.2008.2005609","volume":"18","author":"A Hervieu","year":"2008","unstructured":"Hervieu, A., Bouthemy, P., et al.: A statistical video content recognition method using invariant features on object trajectories. IEEE Trans. Circuits Syst. Video Technol. 18(11), 1533\u20131543 (2008)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Dee, H., Hogg, D.: Detecting inexplicable behaviour. In: Proceedings of British Machine Vision Conference, pp. 477\u2013486 (2004)","DOI":"10.5244\/C.18.50"},{"key":"45_CR6","unstructured":"Basharat, A., Gritai, A., et al.: Learning object motion patterns for anomaly detection and improved object detection. In: Stauffer, C., Grimson, E. (eds.) CVPR. 1-8 (2008): Learning Patterns of Activity Using Real-time Tracking. IEEE Transactions on PAMI, vol. 22, pp. 747\u2013757 (2000)"},{"key":"45_CR7","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/34.868677","volume":"22","author":"C Stauffer","year":"2000","unstructured":"Stauffer, C., Grimson, E.: Learning patterns of activity using real-time tracking. IEEE Trans. PAMI 22, 747\u2013757 (2000)","journal-title":"IEEE Trans. PAMI"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TPAMI.2008.241","volume":"32","author":"X Wang","year":"2010","unstructured":"Wang, X., Tieu, K., et al.: Correspondence-free activity analysis and scene modeling in multiple camera views. IEEE Trans. Pattern Anal. Mach. Intell. 32(1), 56\u201371 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"45_CR9","unstructured":"Zelniniker, E., Gong, S., et al.: Global abnormal behavior detection using a network of CCTV cameras. In: Eighth International Workshop on Visual Surveillance (2008)"},{"issue":"5","key":"45_CR10","doi-asserted-by":"publisher","first-page":"4282","DOI":"10.1103\/PhysRevE.51.4282","volume":"51","author":"D Helbing","year":"1995","unstructured":"Helbing, D., Molnar, P.: Social force model for pedestrian dynamics. Phys. Rev. E. 51(5), 4282\u20134286 (1995)","journal-title":"Phys. Rev. E."},{"issue":"8","key":"45_CR11","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/34.868684","volume":"22","author":"N Oliver","year":"2000","unstructured":"Oliver, N., Rosario, B., et al.: A Bayesian computer vision system for modelling human interactions. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 831\u2013843 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"45_CR12","unstructured":"Zelnik-Manor, L., Irani, M.: Event-based video analysis. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (2001)"},{"issue":"3","key":"45_CR13","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam, A., Rivlin, E., et al.: Robust real-time unusual event detection using multiple fixed locations monitors. PAMI 30(3), 555\u2013560 (2008)","journal-title":"PAMI"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., et al.: Anomaly detection in crowded scenes. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1975\u20131981 (2010)","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Kim, J., Grauman, K.: A space-time mrf for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2921\u20132928 (2009)","DOI":"10.1109\/CVPR.2009.5206569"},{"issue":"3","key":"45_CR16","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1049\/iet-cvi.2012.0097","volume":"7","author":"R Kapoor","year":"2013","unstructured":"Kapoor, R., Gupta, R.: Non-linearity dimensionality reduction using fuzzy lattices. IET Comput. Vis. 7(3), 201\u2013208 (2013)","journal-title":"IET Comput. Vis."},{"issue":"1","key":"45_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li, W., Mahadevan, V., et al.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2014)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"45_CR18","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.neucom.2014.06.011","volume":"143","author":"D Xu","year":"2014","unstructured":"Xu, D., Song, R., et al.: Video anomaly detection based on a hierarchical activity discovery within spatiotemporal contexts. Neurocomputing 143, 144\u2013152 (2014)","journal-title":"Neurocomputing"},{"issue":"6","key":"45_CR19","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1103\/PhysRev.28.1049","volume":"28","author":"E Schrodinger","year":"1926","unstructured":"Schrodinger, E.: An undulatory theory of the mechanics of atoms and molecules. Am. Phys. Soc. Rev. 28(6), 1049\u20131070 (1926)","journal-title":"Am. Phys. Soc. Rev."},{"issue":"5500","key":"45_CR20","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","volume":"290","author":"S Roweis","year":"2000","unstructured":"Roweis, S., Saul, L.: Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323\u20132326 (2000)","journal-title":"Science"},{"key":"45_CR21","first-page":"585","volume-title":"Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering. Advances in Neural Information Processing Systems","author":"M Belkin","year":"2001","unstructured":"Belkin, M., Niyogi, P.: Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering. Advances in Neural Information Processing Systems, pp. 585\u2013591. MIT Press, Cambridge (2001)"},{"issue":"5500","key":"45_CR22","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1126\/science.290.5500.2319","volume":"290","author":"J Tenenbaum","year":"2000","unstructured":"Tenenbaum, J., Silva, V., et al.: A global geometric framework for nonlinear dimensionality reduction. Science 290(5500), 2319\u20132323 (2000)","journal-title":"Science"},{"key":"45_CR23","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TIP.2017.2670780","volume":"26","author":"M Sabokrou","year":"2017","unstructured":"Sabokrou, M., Fayyaz, M., et al.: Deep-cascade: cascading 3D deep neural networks for fast anomaly detection and localization in crowded scenes. IEEE Trans. Image Process. 26, 1992\u20132004 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"45_CR24","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Fathy, M., et al.: Real-time anomaly detection and localization in crowded scenes. In: International Workshop on Computer Vision Pattern Recognition, pp. 56\u201362 (2015)","DOI":"10.1109\/CVPRW.2015.7301284"},{"issue":"1","key":"45_CR25","first-page":"548","volume":"219","author":"F Yachuang","year":"2017","unstructured":"Yachuang, F., Yuan, Y., Xiaoqiang, L.: Learning deep event models for crowd anomaly detection. ACM J. Neurocomput. 219(1), 548\u2013556 (2017)","journal-title":"ACM J. Neurocomput."},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Karpathy, A., Toderici, G., et al.: Large-scale video classification with convolutional neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725\u20131732 (2014)","DOI":"10.1109\/CVPR.2014.223"},{"issue":"20","key":"45_CR27","doi-asserted-by":"publisher","first-page":"26901","DOI":"10.1007\/s11042-018-5893-9","volume":"77","author":"B Meng","year":"2018","unstructured":"Meng, B., et al.: Human action recognition based on quaternion spatial-temporal convolutional neural network and LSTM in RGB videos. Springer Multimed. Tools Appl. 77(20), 26901\u201326918 (2018)","journal-title":"Springer Multimed. Tools Appl."},{"key":"45_CR28","volume-title":"Deep-anomaly: Fully Convolutional Neural Network for Fast Anomaly Detection in Crowded Scenes. Computer Vision and Image Understanding","author":"M Sabokrou","year":"2016","unstructured":"Sabokrou, M., Fayyaz, M., et al.: Deep-anomaly: Fully Convolutional Neural Network for Fast Anomaly Detection in Crowded Scenes. Computer Vision and Image Understanding. Elsevier, Amsterdam (2016)"},{"key":"45_CR29","doi-asserted-by":"crossref","unstructured":"Kapoor, R., Gupta, R.: Fuzzy lattice based technique for classification of power quality disturbances. In: European Transactions on Electrical Power, pp. 147\u2013156 (2012)","DOI":"10.1007\/s00202-012-0245-7"},{"key":"45_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, T., Lu, H., et al.: Learning semantic scene models by object classification and trajectory clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1940\u20131947 (2009)","DOI":"10.1109\/CVPR.2009.5206809"},{"issue":"11","key":"45_CR31","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TCSVT.2008.2005599","volume":"18","author":"C Piciarelli","year":"2008","unstructured":"Piciarelli, C., et al.: Trajectory-based anomalous event detection. IEEE Circuit Syst. Video Technol. 18(11), 1544\u20131554 (2008)","journal-title":"IEEE Circuit Syst. Video Technol."},{"key":"45_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389","volume-title":"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini, N., Shave-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, Cambridge (2000)"},{"key":"45_CR33","volume-title":"Learning with Kernels Support Vector Machines, Regularization, Optimization and Beyond","author":"B Schokopof","year":"2002","unstructured":"Schokopof, B., Smola, A.: Learning with Kernels Support Vector Machines, Regularization, Optimization and Beyond. MIT Press, Cambridge (2002)"},{"key":"45_CR34","unstructured":"Moore, W.: Schrodinger: Life and Thought. Cambridge University Press, Cambridge. ISBN 0-521-43767-9 (1992)"},{"key":"45_CR35","unstructured":"UNN dataset, access on September 18, 2018 (online). http:\/\/mha.cs.umn.edu\/Movies\/CrowdActivity-All.avi"},{"key":"45_CR36","unstructured":"UCSD dataset (online). http:\/\/www.svcl.ucsd.edu\/projects\/anomaly\/dataset.html . Accessed 18 Sept 2018"},{"issue":"10","key":"45_CR37","doi-asserted-by":"publisher","first-page":"2064","DOI":"10.1109\/TPAMI.2012.123","volume":"34","author":"B Solmaz","year":"2012","unstructured":"Solmaz, B., Moore, B., et al.: Identifying behaviors in crowd scenes using stability analysis for dynamical systems. IEEE Trans. Pattern Anal. Mach. Intell. 34(10), 2064\u20132070 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"22","key":"45_CR38","doi-asserted-by":"publisher","first-page":"14617","DOI":"10.1007\/s11042-016-3316-3","volume":"75","author":"F Zhijun","year":"2016","unstructured":"Zhijun, F., Fei, F., et al.: Abnormal event detection in crowded scenes based on deep learning. ACM J. Multimed. Tools Appl. 75(22), 14617\u201314639 (2016)","journal-title":"ACM J. Multimed. Tools Appl."},{"key":"45_CR39","doi-asserted-by":"crossref","unstructured":"Mousavi, H., Nabi, M., et al.: Abnormality detection with an improved histogram of oriented tracklets. In: International Conference on Image Analysis Processing, pp. 722\u2013732 (2015)","DOI":"10.1007\/978-3-319-23234-8_66"},{"key":"45_CR40","unstructured":"MOT challenge dataset (online). https:\/\/motchallenge.net\/vis\/MOT17-08-FRCNN . Accessed 18 Sept 2018"},{"key":"45_CR41","unstructured":"Youtube video (online). http:\/\/www.youtube.com\/watch?v=pG3nIN_CxAY . Accessed 18 Sept 2018"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00045-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-019-00045-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00045-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,25]],"date-time":"2022-09-25T10:54:55Z","timestamp":1664103295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-019-00045-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,9]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["45"],"URL":"https:\/\/doi.org\/10.1007\/s42044-019-00045-y","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,9]]},"assertion":[{"value":"21 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}