{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:03:00Z","timestamp":1775066580574,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T00:00:00Z","timestamp":1709596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T00:00:00Z","timestamp":1709596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps","award":["2020DB005"],"award-info":[{"award-number":["2020DB005"]}]},{"name":"the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps","award":["2020DB005"],"award-info":[{"award-number":["2020DB005"]}]},{"name":"the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps","award":["2020DB005"],"award-info":[{"award-number":["2020DB005"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Trajectory anomalies serve as early indicators of potential issues and frequently provide valuable insights into event occurrence. Existing methods for detecting abnormal trajectories primarily focus on comparing the spatial characteristics of the trajectories. However, they fail to capture the temporal dimension\u2019s pattern and evolution within the trajectory data, thereby inadequately identifying the behavioral inertia of the target group. A few detection methods that incorporate spatiotemporal features have also failed to adequately analyze the spatiotemporal sequence evolution information; consequently, detection methods that ignore temporal and spatial correlations are too one-sided. Recurrent neural networks (RNNs), especially gate recurrent unit (GRU) that design reset and update gate control units, process nonlinear sequence processing capabilities, enabling effective extraction and analysis of both temporal and spatial characteristics. However, the basic GRU network model has limited expressive power and may not be able to adequately capture complex sequence patterns and semantic information. To address the above issues, an abnormal trajectory detection method based on the improved GRU model is proposed in cloud computing in this paper. To enhance the anomaly detection ability and training efficiency of relevant models, strictly control the input of irrelevant features and improve the model fitting effect, an improved model combining the random forest algorithm and fully connected layer network is designed. The method deconstructs spatiotemporal semantics through reset and update gated units, while effectively capturing feature evolution information and target behavioral inertia by leveraging the integration of features and nonlinear mapping capabilities of the fully connected layer network. The experimental results based on the GeoLife GPS trajectory dataset indicate that the proposed approach improves both generalization ability by 1% and reduces training cost by 31.68%. This success do provides a practical solution for the task of anomaly trajectory detection.<\/jats:p>","DOI":"10.1186\/s13677-024-00611-1","type":"journal-article","created":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T08:03:27Z","timestamp":1709625807000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing"],"prefix":"10.1186","volume":"13","author":[{"given":"Guohao","family":"Tang","sequence":"first","affiliation":[]},{"given":"Huaying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Baohua","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,5]]},"reference":[{"issue":"7","key":"611_CR1","first-page":"2018","volume":"29","author":"D Yao","year":"2018","unstructured":"Yao D, Zhang C, Huang JH, Chen YX, Bi JP (2018) Semantic understanding of spatio-temporal data: technology & application. Ruan Jian Xue Bao\/J Softw 29(7):2018\u20132045.\u00a0in Chinese.\u00a0http:\/\/www.jos.org.cn\/1000-9825\/5576.htm","journal-title":"Ruan Jian Xue Bao\/J Softw"},{"issue":"2","key":"611_CR2","doi-asserted-by":"publisher","first-page":"2847","DOI":"10.3233\/jifs-220417","volume":"44","author":"B Wang","year":"2023","unstructured":"Wang B, Wei H, Li R, Liu S, Wang K (2023) Rumor detection model fused with static spatiotemporal information. J Intelligent Fuzzy Syst 44(2):2847\u20132862. https:\/\/doi.org\/10.3233\/jifs-220417","journal-title":"J Intelligent Fuzzy Syst"},{"key":"611_CR3","doi-asserted-by":"publisher","first-page":"109985","DOI":"10.1016\/j.knosys.2022.109985","volume":"258","author":"J Wang","year":"2022","unstructured":"Wang J et al (2022) STHGCN: a spatiotemporal prediction framework based on higher-order graph convolution networks. Knowl-Based Syst 258:109985. https:\/\/doi.org\/10.1016\/j.knosys.2022.109985","journal-title":"Knowl-Based Syst"},{"key":"611_CR4","doi-asserted-by":"publisher","unstructured":"Yuan G, Sun P, Zhao J, Li D, Wang C. A review of moving object trajectory clustering algorithms. Artif Intell Rev. 2017:123\u2013144. https:\/\/doi.org\/10.1007\/s10462-016-9477-7","DOI":"10.1007\/s10462-016-9477-7"},{"key":"611_CR5","doi-asserted-by":"publisher","first-page":"117427","DOI":"10.1016\/j.eswa.2022.117427","volume":"203","author":"E Zhao","year":"2022","unstructured":"Zhao E, Du P, Sun S (2022) Historical pattern recognition with trajectory similarity for daily tourist arrivals forecasting. Expert Syst Appl 203:117427. https:\/\/doi.org\/10.1016\/j.eswa.2022.117427","journal-title":"Expert Syst Appl"},{"key":"611_CR6","unstructured":"Guan Q, Reich BJ, Laber EB (2020) A spatiotemporal recommendation engine for malaria control. Cornell University - arXiv,Cornell University \u2013 arXiv"},{"issue":"23","key":"611_CR7","doi-asserted-by":"publisher","first-page":"4058","DOI":"10.3390\/electronics11234058","volume":"11","author":"H Zang","year":"2022","unstructured":"Zang H, Zhu J, Gao Q (2022) Deep learning architecture for flight flow spatiotemporal prediction in airport network. Electronics 11(23):4058. https:\/\/doi.org\/10.3390\/electronics11234058","journal-title":"Electronics"},{"key":"611_CR8","doi-asserted-by":"publisher","unstructured":"Zheng Li, Xiaolong Xu, Tian Hang, Haolong Xiang, Yan Cui, Lianyong Qi, Xiaokang Zhou (2022) A knowledge-driven anomaly detection framework for social production system https:\/\/doi.org\/10.1109\/TCSS.2022.3217790","DOI":"10.1109\/TCSS.2022.3217790"},{"issue":"2","key":"611_CR9","first-page":"2503","volume":"24","author":"W Liu","year":"2023","unstructured":"Liu W, Xu X, Wu L, Qi L, Jolfaei A, Ding W, Khosravi MR (2023) Intrusion detection for maritime transportation systems with batch federated aggregation. IEEE Trans Intell Transp Syst 24(2):2503\u20132514","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"611_CR10","doi-asserted-by":"publisher","first-page":"407","DOI":"10.4097\/kjae.2017.70.4.407","volume":"70","author":"SK Kwak","year":"2017","unstructured":"Kwak SK, Kim JH (2017) Statistical data preparation: management of missing values and outliers. Korean J Anesthesiol. 70(4):407. https:\/\/doi.org\/10.4097\/kjae.2017.70.4.407","journal-title":"Korean J Anesthesiol."},{"key":"611_CR11","volume-title":"An anomaly detection algorithm for traffic trajectory data based on long short term memory model","author":"Q Shengjun","year":"2021","unstructured":"Shengjun Q, Ting L (2021) An anomaly detection algorithm for traffic trajectory data based on long short term memory model"},{"key":"611_CR12","doi-asserted-by":"publisher","unstructured":"Zhou W, Yu Y, Zhan Y, Wang C (2022) A vision-based abnormal trajectory detection framework for online traffic incident alert on freeways. Neural Comput Appl 14945\u201314958. https:\/\/doi.org\/10.1007\/s00521-022-07335-w","DOI":"10.1007\/s00521-022-07335-w"},{"key":"611_CR13","doi-asserted-by":"publisher","unstructured":"Wang H et al (2020) Abnormal trajectory detection based on geospatial consistent modeling. IEEE Access 184633\u2013184643. https:\/\/doi.org\/10.1109\/access.2020.3028847","DOI":"10.1109\/access.2020.3028847"},{"key":"611_CR14","doi-asserted-by":"publisher","unstructured":"Zheng Li, Xiaolong Xu, Xuefei Cao, Wentao Liu, Yiwen Zhang, Dehua Chen, Haipeng Dai (2022) Integrated CNN and federated learning for COVID-19 detection on chest x-ray images. IEEE\/ACM Trans ComputBiol Bioinform https:\/\/doi.org\/10.1109\/TCBB.2022.3184319","DOI":"10.1109\/TCBB.2022.3184319"},{"issue":"11","key":"611_CR15","doi-asserted-by":"publisher","first-page":"20757","DOI":"10.1109\/TITS.2022.3190669","volume":"23","author":"X Xu","year":"2023","unstructured":"Xu X, Liu Z, Bilal M, Vimal S, Song H (2023) Computation offloading and service caching for intelligent transportation systems with digital twin. IEEE Trans Intell Transp Syst. 23(11):20757\u201320772","journal-title":"IEEE Trans Intell Transp Syst."},{"key":"611_CR16","doi-asserted-by":"crossref","unstructured":"Liang Yao, Xiaolong Xu* (2022) Muhammad Bilal, Huihui Wang. Dynamic edge computation offloading for internet of vehicles with deep reinforcement learning. IEEE Trans Intell Transp Syst 24(11):12991 - 12999","DOI":"10.1109\/TITS.2022.3178759"},{"key":"611_CR17","doi-asserted-by":"crossref","unstructured":"Hao Tian, Xiaolong Xu*, Tingyu Lin, Yong Cheng, Cheng Qian, Lei Ren, Muhammad Bilal (2021) DIMA: distributed cooperative microservice caching for internet of things in edge computing by deep reinforcement learning. World Wide Web J 25(5):1769\u20131792.","DOI":"10.1007\/s11280-021-00939-7"},{"issue":"2","key":"611_CR18","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/TII.2022.3195896","volume":"19","author":"Xu Xiaolong","year":"2023","unstructured":"Xiaolong Xu, Li H, Li Z, Zhou X (2023) Safe: synergic data filtering for federated learning in cloud-edge computing. IEEE Trans Industr Inf 19(2):1655\u20131665","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"611_CR19","first-page":"17","volume":"28","author":"JL Mao","year":"2017","unstructured":"Mao JL, Jin CQ, Zhang ZG, Zhou AY (2017) Anomaly detection for trajectory big data: advancements and framework. Ruan Jian Xue Bao\/J Softw 28(1):17\u201334.\u00a0in Chinese.\u00a0http:\/\/www.jos.org.cn\/1000-9825\/5151.htm","journal-title":"Ruan Jian Xue Bao\/J Softw"},{"issue":"1","key":"611_CR20","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10115-015-0845-4","volume":"47","author":"P-R Lei","year":"2016","unstructured":"Lei P-R (2016) A framework for anomaly detection in maritime trajectory behavior. Knowl Inf Syst 47(1):189\u2013214. https:\/\/doi.org\/10.1007\/s10115-015-0845-4","journal-title":"Knowl Inf Syst"},{"key":"611_CR21","doi-asserted-by":"publisher","unstructured":"Wang Jet al (2020) Anomalous trajectory detection and classification based on difference and intersection set distance. IEEE Trans Vehicular Technol 2487\u20132500. https:\/\/doi.org\/10.1109\/tvt.2020.2967865","DOI":"10.1109\/tvt.2020.2967865"},{"key":"611_CR22","doi-asserted-by":"publisher","unstructured":"Zhu J, Jiang W, Liu A, Liu G, Zhao L (2015) Time-dependent popular routes based trajectory outlier detection,\u201d in Lecture Notes in Computer Science,Web Information Systems Engineering \u2013 WISE 2015 16\u201330. https:\/\/doi.org\/10.1007\/978-3-319-26190-4_2","DOI":"10.1007\/978-3-319-26190-4_2"},{"issue":"3","key":"611_CR23","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s10044-018-0732-1","volume":"22","author":"I San Rom\u00e1n","year":"2019","unstructured":"San Rom\u00e1n I, de Mart\u00edn Diego I, Conde C, Cabello E (2019) Outlier trajectory detection through a context-aware distance. Pattern Anal Appl. 22(3):831\u2013839. https:\/\/doi.org\/10.1007\/s10044-018-0732-1","journal-title":"Pattern Anal Appl."},{"issue":"2","key":"611_CR24","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/ijgi12020040","volume":"12","author":"C Chen","year":"2023","unstructured":"Chen C et al (2023) Abnormal-trajectory detection method based on variable grid partitioning. ISPRS Int J Geo Inf 12(2):40. https:\/\/doi.org\/10.3390\/ijgi12020040","journal-title":"ISPRS Int J Geo Inf"},{"key":"611_CR25","doi-asserted-by":"publisher","first-page":"128770","DOI":"10.1016\/j.physa.2023.128770","volume":"621","author":"X Dawen","year":"2023","unstructured":"Dawen X, Shunying J, Yunsong L et al (2023) An ASM-CF model for anomalous trajectory detection with mobile trajectory big data. Phys A Stat Mechanics Appl 621:128770","journal-title":"Phys A Stat Mechanics Appl"},{"key":"611_CR26","doi-asserted-by":"publisher","first-page":"184633","DOI":"10.1109\/access.2020.3028847","volume":"8","author":"H Wang","year":"2020","unstructured":"Wang H et al (2020) Abnormal trajectory detection based on geospatial consistent modeling. IEEE Access 8:184633\u2013184643. https:\/\/doi.org\/10.1109\/access.2020.3028847","journal-title":"IEEE Access"},{"issue":"17","key":"611_CR27","doi-asserted-by":"publisher","first-page":"14945","DOI":"10.1007\/s00521-022-07335-w","volume":"34","author":"W Zhou","year":"2022","unstructured":"Zhou W, Yu Y, Zhan Y, Wang C (2022) A vision-based abnormal trajectory detection framework for online traffic incident alert on freeways. Neural Comput Appl 34(17):14945\u201314958. https:\/\/doi.org\/10.1007\/s00521-022-07335-w","journal-title":"Neural Comput Appl"},{"key":"611_CR28","doi-asserted-by":"publisher","unstructured":"Ji Y, Wang L, Wu W, Shao H, Feng Y (2020) A method for LSTM-based trajectory modeling and abnormal trajectory detection. EEE Access 104063\u2013104073. https:\/\/doi.org\/10.1109\/access.2020.2997967","DOI":"10.1109\/access.2020.2997967"},{"key":"611_CR29","unstructured":"Zheng Y, Xie X, Ma WY (2010) GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory. IEEE Data Eng Bull 33(2):32\u20139"},{"key":"611_CR30","doi-asserted-by":"publisher","unstructured":"Hassan B, Zineb R, Amine L, Elhoussine L (2021) A complexity survey on density based spatial clustering of applications of noise clustering algorithms. Int J Adv Comput Sci Appl 12(2). https:\/\/doi.org\/10.14569\/ijacsa.2021.0120283","DOI":"10.14569\/ijacsa.2021.0120283"},{"key":"611_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cie.2017.12.018","volume":"116","author":"M Mestria","year":"2018","unstructured":"Mestria M (2018) New hybrid heuristic algorithm for the clustered traveling salesman problem. Comput Ind Eng 116:1\u201312. https:\/\/doi.org\/10.1016\/j.cie.2017.12.018","journal-title":"Comput Ind Eng"},{"key":"611_CR32","doi-asserted-by":"publisher","first-page":"127712","DOI":"10.1016\/j.fuel.2023.127712","volume":"341","author":"J Fischer","year":"2023","unstructured":"Fischer J, Wirtz S, Scherer V (2023) Random forest classifier and neural network for fraction identification of refuse-derived fuel images. Fuel 341:127712. https:\/\/doi.org\/10.1016\/j.fuel.2023.127712","journal-title":"Fuel"},{"key":"611_CR33","unstructured":"Duchi J, Hazan E, Singer Y (2010) Adaptive subgradient methods for online learning and stochastic optimization. Conference on Learning Theory, Conference on Learning Theory"},{"key":"611_CR34","unstructured":"Tieleman T, Hinton G (2021) Lecture 6.5- rmsprop: divide the gradient by a running average of its recent magnitude. Coursera: Neural Networks for Machine Learning"},{"key":"611_CR35","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv: Learning, arXiv: Learning"},{"issue":"12","key":"611_CR36","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1109\/lsp.2013.2288579","volume":"20","author":"R Zhang","year":"2013","unstructured":"Zhang R, Gong W, Grzeda V, Yaworski A, Greenspan M (2013) An adaptive learning rate method for improving adaptability of background models. IEEE Signal Process Lett 20(12):1266\u20131269. https:\/\/doi.org\/10.1109\/lsp.2013.2288579","journal-title":"IEEE Signal Process Lett"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00611-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00611-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00611-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T16:27:24Z","timestamp":1709915244000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00611-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,5]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["611"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00611-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3303325\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,5]]},"assertion":[{"value":"28 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"53"}}