{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:34:21Z","timestamp":1762342461688,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10877245","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection"],"prefix":"10.1109","author":[{"given":"Anas M.","family":"Al-Oraiqat","sequence":"first","affiliation":[{"name":"Zarqa University,Faculty of Information Technology,Department of Computer Science,Jordan"}]},{"given":"Oleksandr","family":"Drieiev","sequence":"additional","affiliation":[{"name":"Central Ukrainian National Technical University,Department of Cybersecurity and Software,Kropyvnytskyi,Ukraine"}]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[{"name":"Zarqa University,Faculty of Information Technology,Department of Computer Science,Jordan"}]},{"given":"Sattam","family":"Almatarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Faculty of Information Technology,Department of Data Science and Artificial Intelligence,Jordan"}]},{"given":"Karim A.","family":"Al-Oraiqat","sequence":"additional","affiliation":[{"name":"Zarqa University,Faculty of Information Technology,Department of Data Science and Artificial Intelligence,Jordan"}]},{"given":"Hazim","family":"Alrawashdeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Faculty of Information Technology,Department of Software Engineering,Jordan"}]},{"given":"Hanna","family":"Drieieva","sequence":"additional","affiliation":[{"name":"Central Ukrainian National Technical University,Department of Cybersecurity and Software,Kropyvnytskyi,Ukraine"}]},{"given":"Ali","family":"Elrashidi","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]},{"given":"Yassin M. Y.","family":"Hasan","sequence":"additional","affiliation":[{"name":"Assiut University,Electrical Engineering Department,Egypt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038334"},{"issue":"11","key":"ref2","article-title":"MyL Based Crowd Detection System\u2013A Review","volume":"8","author":"Ubale","year":"2021","journal-title":"International Research Journal of Engineering and Technology, (IRJET)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060631"},{"issue":"1","key":"ref4","article-title":"DETECTION OF ABNORMAL BEHAVIORS IN CROWD SCENE: A REVIEW Int. J. Advance","volume-title":"Soft Comput. Appl.","volume":"4","author":"Sjarif","year":"2012"},{"volume-title":"Software product: Crowd Detection Monitor People Capacity and Occupancy Levels","key":"ref5"},{"key":"ref6","first-page":"350","article-title":"Human Crowd Detection for City Wide Surveillance","volume-title":"Procedia Computer Science","volume":"171","author":"Singh","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06167-8_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3197826"},{"volume-title":"Crowd detection in video sequences","author":"Reisman","key":"ref9"},{"volume-title":"Crowd Detection Model","author":"DRANITSYNA","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-023-01276-w"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/tgis.12984"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3574131.3574445"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-024-04771-5"},{"key":"ref15","article-title":"One dag to rule them all","volume-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence","author":"Federico Bolelli","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s120912694"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3077006"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2024,12,10]]},"location":"Zarqa, Jordan","end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10877245.pdf?arnumber=10877245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:12Z","timestamp":1740081492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10877245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10877245","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}