{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:13:16Z","timestamp":1773015196036,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article discusses an effective technique for detecting abnormalities in Hajj crowd videos. In order to guarantee the identification of anomalies in scenes, a trained and supervised FCNN is turned into an FCNN using FCNNs and temporal data. By minimizing computational complexity, incorrect movement detection is utilized to achieve high performance in terms of speed and precision. This FCNN-based architecture is designed to handle two primary tasks: feature representation and the detection of incorrect movement outliers. Additionally, to overcome the aforementioned issues, this research will generate a new crowd anomaly video dataset based on the Hajj pilgrimage scenario. On the proposed dataset, the UCSD Ped2, Subway Entry, and Subway Exit datasets, the proposed FCNN-based technique obtained ultimate accuracy of 100%, 90%, 95%, and 89%, respectively. Additionally, the ResNet50-based technique achieved ultimate accuracy of 96%, 89%, 94%, and 92%, respectively, for the proposed dataset, the UCSD Ped2, Subway Entry, and Subway Exit datasets.<\/jats:p>","DOI":"10.1186\/s40537-023-00779-4","type":"journal-article","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T13:01:31Z","timestamp":1685278891000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Hajj pilgrimage abnormal crowd movement monitoring using optical flow and FCNN"],"prefix":"10.1186","volume":"10","author":[{"given":"Md Roman","family":"Bhuiyan","sequence":"first","affiliation":[]},{"given":"Junaidi","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Noramiza","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Fahmid Al","family":"Farid","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Uddin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,28]]},"reference":[{"issue":"4","key":"779_CR1","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TIP.2017.2670780","volume":"26","author":"M Sabokrou","year":"2017","unstructured":"Sabokrou M, Fayyaz M, Fathy M, Klette R. Deep-cascade: cascading 3d deep neural networks for fast anomaly detection and localization in crowded scenes. IEEE Trans Image Process. 2017;26(4):1992\u20132004.","journal-title":"IEEE Trans Image Process"},{"key":"779_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/3065386","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Hinton Sutskever I, GE. Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst. 2012. https:\/\/doi.org\/10.1145\/3065386.","journal-title":"Adv Neural Inf Process Syst"},{"key":"779_CR3","doi-asserted-by":"crossref","unstructured":"Girshick R, Donahue J, Darrell T, Malik J. Rich feature hierarchies for accurate object detection and semantic segmentation, in proceedings of the IEEE conference on computer vision and pattern recognition, 2014;580\u2013587.","DOI":"10.1109\/CVPR.2014.81"},{"key":"779_CR4","unstructured":"Simonyan K, Zisserman A. Two-stream convolutional networks for action recognition in videos, Advances in neural information processing systems, 2014;27."},{"key":"779_CR5","doi-asserted-by":"crossref","unstructured":"Sabokrou M, Fathy M, Hoseini M, Klette R, Real-time anomaly detection and localization in crowded scenes, in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, 2015;56\u201362.","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"779_CR6","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1510.01553","author":"D Xu","year":"2015","unstructured":"Xu D, Ricci E, Yan Y, Song J, Sebe N. Learning deep representations of appearance and motion for anomalous event detection. arXiv Prepr. 2015. https:\/\/doi.org\/10.48550\/arXiv.1510.01553.","journal-title":"arXiv Prepr"},{"issue":"13","key":"779_CR7","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1049\/el.2016.0440","volume":"52","author":"M Sabokrou","year":"2016","unstructured":"Sabokrou M, Fathy M, Hoseini M. Video anomaly detection and localisation based on the sparsity and reconstruction error of auto- encoder. Electron Lett. 2016;52(13):1122\u20134.","journal-title":"Electron Lett"},{"key":"779_CR8","unstructured":"Ren S, He K, Girshick R, Sun J. Faster r-cnn: towards real-time object detection with region proposal networks, advances in neural information processing systems, 2015;28."},{"key":"779_CR9","doi-asserted-by":"crossref","unstructured":"Long J, Shelhamer E, Darrell T. Fully convolutional networks for semantic segmentation, in proceedings of the IEEE conference on computer vision and pattern recognition, 2015;3431\u20133440.","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"779_CR10","unstructured":"Zhou B, Lapedriza A, Xiao J, Torralba A. Oliva A. Learning deep features for scene recognition using places database: advances in neural information processing systems, 2014; 27."},{"key":"779_CR11","unstructured":"Fie-Fie L, Li K. Imagenet, image-net. org, 2016."},{"key":"779_CR12","doi-asserted-by":"publisher","unstructured":"J. Deng, W. Dong, R. Socher, L. -J. Li, Kai Li and Li Fei-Fei, \"ImageNet: A large-scale hierarchical image database,\" 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 2009, pp. 248\u2013255. https:\/\/doi.org\/10.1109\/CVPR.2009.5206848.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"779_CR13","unstructured":"places M. database, places.csail.mit.edu, in IEEE conference on computer vision and pattern recognition. Ieee. 2009;2017: 248\u201355."},{"key":"779_CR14","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6229","author":"P Sermanet","year":"2013","unstructured":"Sermanet P, Eigen D, Zhang X, Mathieu M, Fergus R, Le- Cun Y. Overfeat: integrated recognition, localization and detection using convolutional networks. arXiv Preprint. 2013. https:\/\/doi.org\/10.48550\/arXiv.1312.6229.","journal-title":"arXiv Preprint"},{"key":"779_CR15","doi-asserted-by":"crossref","unstructured":"Oquab M, Bottou L, Laptev I, Sivic J. Learning and transferring mid-level image representations using convolutional neural networks, in proceedings of the IEEE conference on computer vision and pattern recognition, 2014;1717\u20131724.","DOI":"10.1109\/CVPR.2014.222"},{"issue":"3","key":"779_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.cviu.2010.10.008","volume":"115","author":"F Jiang","year":"2011","unstructured":"Jiang F, Yuan J, Tsaftaris SA, Katsaggelos AK. Anomalous video event detection using spatiotemporal context. Comput Vis Image Underst. 2011;115(3):323\u201333.","journal-title":"Comput Vis Image Underst"},{"key":"779_CR17","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.neucom.2016.09.063","volume":"219","author":"Y Feng","year":"2017","unstructured":"Feng Y, Yuan Y, Lu X. Learning deep event models for crowd anomaly detection. Neurocomputing. 2017;219:548\u201356.","journal-title":"Neurocomputing"},{"issue":"12","key":"779_CR18","doi-asserted-by":"publisher","first-page":"5017","DOI":"10.1109\/TIP.2015.2475625","volume":"24","author":"T-H Chan","year":"2015","unstructured":"Chan T-H, Jia K, Gao S, Lu J, Zeng Z, Ma Y. Pcanet: a simple deep learning baseline for image classification? IEEE Trans Image Process. 2015;24(12):5017\u201332.","journal-title":"IEEE Trans Image Process"},{"issue":"22","key":"779_CR19","doi-asserted-by":"publisher","first-page":"14617","DOI":"10.1007\/s11042-016-3316-3","volume":"75","author":"Z Fang","year":"2016","unstructured":"Fang Z, Fei F, Fang Y, Lee C, Xiong N, Shu L, Chen S. Abnormal event detection in crowded scenes based on deep learning. Multimed Tools Appl. 2016;75(22):14617\u201339.","journal-title":"Multimed Tools Appl"},{"key":"779_CR20","doi-asserted-by":"crossref","unstructured":"Wu S, Moore BE, Shah M, Chaotic invariants of lagrangian particle trajectories for anomaly detection in crowded scenes, in IEEE computer society conference on computer vision and pattern recognition. IEEE. 2010;2010:2054\u201360.","DOI":"10.1109\/CVPR.2010.5539882"},{"issue":"15","key":"779_CR21","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1016\/j.patrec.2006.02.004","volume":"27","author":"C Piciarelli","year":"2006","unstructured":"Piciarelli C, Foresti GL. On-line trajectory clustering for anomalous events detection. Pattern Recognit Lett. 2006;27(15):1835\u201342.","journal-title":"Pattern Recognit Lett"},{"issue":"11","key":"779_CR22","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TCSVT.2008.2005599","volume":"18","author":"C Piciarelli","year":"2008","unstructured":"Piciarelli C, Micheloni C, Foresti GL. Trajectory-based anomalous event detection. IEEE Trans Circuits Syst video Technol. 2008;18(11):1544\u201354.","journal-title":"IEEE Trans Circuits Syst video Technol"},{"issue":"9","key":"779_CR23","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1016\/j.sigpro.2009.03.016","volume":"89","author":"P Antonakaki","year":"2009","unstructured":"Antonakaki P, Kosmopoulos D, Perantonis SJ. Detecting abnormal human behaviour using multiple cameras. Signal Process. 2009;89(9):1723\u201338.","journal-title":"Signal Process"},{"issue":"8","key":"779_CR24","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.cviu.2011.03.003","volume":"115","author":"S Calderara","year":"2011","unstructured":"Calderara S, Heinemann U, Prati A, Cucchiara R, Tishby N. Detecting anomalies in people\u2019s trajectories using spectral graph analysis. Comput Vision Image Underst. 2011;115(8):1099\u2013111.","journal-title":"Comput Vision Image Underst"},{"issue":"11","key":"779_CR25","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1109\/TPAMI.2011.64","volume":"33","author":"BT Morris","year":"2011","unstructured":"Morris BT, Trivedi MM. Trajectory learning for activity under- standing: unsupervised, multilevel, and long-term adaptive approach. IEEE Trans Pattern Anal Mach Intell. 2011;33(11):2287\u2013301.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"9","key":"779_CR26","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/TPAMI.2006.176","volume":"28","author":"W Hu","year":"2006","unstructured":"Hu W, Xiao X, Fu Z, Xie D, Tan T, Maybank S. A system for learning statistical motion patterns. IEEE Trans Pattern Anal Mach Intell. 2006;28(9):1450\u201364.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"779_CR27","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.imavis.2010.11.003","volume":"29","author":"F Tung","year":"2011","unstructured":"Tung F, Zelek JS, Clausi DA. Goal-based trajectory analysis for unusual behaviour detection in intelligent surveillance. Image Vision Comput. 2011;29(4):230\u201340.","journal-title":"Image Vision Comput"},{"key":"779_CR28","doi-asserted-by":"crossref","unstructured":"Zhang D, Gatica-Perez D, Bengio S, McCowan I. Semi- supervised adapted hmms for unusual event detection, in 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905), vol. 1. IEEE, 2005;611\u2013618.","DOI":"10.1109\/CVPR.2005.316"},{"issue":"1","key":"779_CR29","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11263-006-0009-9","volume":"74","author":"O Boiman","year":"2007","unstructured":"Boiman O, Irani M. Detecting irregularities in images and in video. Int J Comput Vision. 2007;74(1):17\u201331.","journal-title":"Int J Comput Vision"},{"issue":"3","key":"779_CR30","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D. Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans Pattern Anal Mach Intell. 2008;30(3):555\u201360.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"779_CR31","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N, Anomaly detection in crowded scenes, in IEEE computer society conference on computer vision and pattern recognition. IEEE. 2010;2010:1975\u201381.","DOI":"10.1109\/CVPR.2010.5539872"},{"issue":"1","key":"779_CR32","first-page":"18","volume":"36","author":"W Li","year":"2013","unstructured":"Li W, Mahadevan V, Vasconcelos N. Anomaly detection and localization in crowded scenes. IEEE Trans Pattern Anal Mach Intell. 2013;36(1):18\u201332.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"779_CR33","doi-asserted-by":"crossref","unstructured":"Kim J, Grauman K. Observe locally, infer globally: a space-time mrf for detecting abnormal activities with incremental updates, in IEEE conference on computer vision and pattern recognition. IEEE. 2009;2009:2921\u20138.","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"779_CR34","doi-asserted-by":"crossref","unstructured":"Benezeth Y, Jodoin P-M, Saligrama V, Rosenberger C, Abnormal events detection based on spatio-temporal co-occurences, in IEEE conference on computer vision and pattern recognition. IEEE. 2009;2009:2458\u201365.","DOI":"10.1109\/CVPR.2009.5206686"},{"key":"779_CR35","doi-asserted-by":"crossref","unstructured":"Kratz L, Nishino K. Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models, in IEEE conference on computer vision and pattern recognition. IEEE. 2009;2009:1446\u201353.","DOI":"10.1109\/CVPR.2009.5206771"},{"key":"779_CR36","doi-asserted-by":"crossref","unstructured":"Mehran R, Oyama A, Shah M. Abnormal crowd behavior detection using social force model, in IEEE conference on computer vision and pattern recognition. IEEE. 2009;2009:935\u201342.","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"779_CR37","doi-asserted-by":"crossref","unstructured":"Zaharescu A, Wildes R. Anomalous behaviour detection using spatiotemporal oriented energies, subset inclusion histogram comparison and event-driven processing, in European conference on computer vision. Springer, 2010;563\u2013576.","DOI":"10.1007\/978-3-642-15549-9_41"},{"key":"779_CR38","first-page":"3449","volume":"2011","author":"Y Cong","year":"2011","unstructured":"Cong Y, Yuan J, Liu J. Sparse reconstruction cost for abnormal event detection, in CVPR. IEEE. 2011;2011:3449\u201356.","journal-title":"IEEE"},{"key":"779_CR39","doi-asserted-by":"crossref","unstructured":"Saligrama V, Chen Z, Video anomaly detection based on local statistical aggregates, in IEEE conference on computer vision and pattern recognition. IEEE. 2012;2012:2112\u20139.","DOI":"10.1109\/CVPR.2012.6247917"},{"key":"779_CR40","unstructured":"Ullah H, Conci N. Crowd motion segmentation and anomaly detection via multi-label optimization, in ICPR workshop on pattern recognition and crowd analysis, 2012; 75."},{"key":"779_CR41","doi-asserted-by":"crossref","unstructured":"Lu C, Shi J, Jia J. Abnormal event detection at 150 fps in matlab, in proceedings of the IEEE international conference on computer vision, 2013; 2720\u20132727.","DOI":"10.1109\/ICCV.2013.338"},{"issue":"10","key":"779_CR42","doi-asserted-by":"publisher","first-page":"1436","DOI":"10.1016\/j.cviu.2013.06.007","volume":"117","author":"MJ Roshtkhari","year":"2013","unstructured":"Roshtkhari MJ, Levine MD. An on-line, real-time learning method for detecting anomalies in videos using spatio-temporal com- positions. Comput Vision Image Underst. 2013;117(10):1436\u201352.","journal-title":"Comput Vision Image Underst"},{"key":"779_CR43","doi-asserted-by":"crossref","unstructured":"Zhu Y, Nayak NM, Roy-Chowdhury AK. Context-aware modeling and recognition of activities in video, in proceedings of the IEEE conference on computer vision and pattern recognition, 2013;2491\u20132498.","DOI":"10.1109\/CVPR.2013.322"},{"issue":"10","key":"779_CR44","doi-asserted-by":"publisher","first-page":"1590","DOI":"10.1109\/TIFS.2013.2272243","volume":"8","author":"Y Cong","year":"2013","unstructured":"Cong Y, Yuan J, Tang Y. Video anomaly search in crowded scenes via spatio-temporal motion context. IEEE Trans Inform Forensics Secur. 2013;8(10):1590\u20139.","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"779_CR45","doi-asserted-by":"crossref","unstructured":"Roshtkhari M Javan, Levine MD. Online dominant and anomalous behavior detection in videos, in proceedings of the IEEE conference on computer vision and pattern recognition, 2013;2611\u20132618.","DOI":"10.1109\/CVPR.2013.337"},{"key":"779_CR46","doi-asserted-by":"crossref","unstructured":"Ullah H, Tenuti L, Conci N. Gaussian mixtures for anomaly detection in crowded scenes, in video surveillance and transportation imaging applications, vol. 8663. International society for optics and photonics, 2013;866303.","DOI":"10.1117\/12.2003893"},{"key":"779_CR47","doi-asserted-by":"crossref","unstructured":"Ullah H, Ullah M, Conci N. Real-time anomaly detection in dense crowded scenes, in video surveillance and transportation imaging applications 2014;9026. SPIE, 2014, pp. 51\u201357.","DOI":"10.1117\/12.2040521"},{"key":"779_CR48","doi-asserted-by":"crossref","unstructured":"Ullah H, Ullah M, Conci N. Dominant motion analysis in regular and irregular crowd scenes, in international workshop on human behavior understanding. Springer, 2014; 62\u201372.","DOI":"10.1007\/978-3-319-11839-0_6"},{"key":"779_CR49","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.neucom.2014.06.011","volume":"143","author":"D Xu","year":"2014","unstructured":"Xu D, Song R, Wu X, Li N, Feng W, Qian H. Video anomaly detection based on a hierarchical activity discovery within spatiotemporal contexts. Neurocomputing. 2014;143:144\u201352.","journal-title":"Neurocomputing"},{"key":"779_CR50","doi-asserted-by":"crossref","unstructured":"Vincent P, Larochelle H, Bengio Y, Manzagol P-A. Extracting and composing robust features with denoising autoencoders, in proceedings of the 25th international conference on machine learning, 2008;1096\u20131103.","DOI":"10.1145\/1390156.1390294"},{"key":"779_CR51","doi-asserted-by":"crossref","unstructured":"Mousavi H, Nabi M, Galoogahi HK, Perina A, Murino V. Abnormality detection with improved histogram of oriented tracklets, in international conference on image analysis and processing. Springer, 2015;722\u2013732.","DOI":"10.1007\/978-3-319-23234-8_66"},{"issue":"3","key":"779_CR52","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1109\/TCYB.2014.2330853","volume":"45","author":"Y Yuan","year":"2014","unstructured":"Yuan Y, Fang J, Wang Q. Online anomaly detection in crowd scenes via structure analysis. IEEE Trans cybern. 2014;45(3):548\u201361.","journal-title":"IEEE Trans cybern"},{"key":"779_CR53","doi-asserted-by":"crossref","unstructured":"Cheng K-W, Chen Y-T, Fang W-H. Video anomaly detection and localization using hierarchical feature representation and gaussian process regression, in proceedings of the IEEE conference on computer vision and pattern recognition, 2015;2909\u20132917.","DOI":"10.1109\/CVPR.2015.7298909"},{"issue":"9","key":"779_CR54","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1109\/LSP.2015.2410031","volume":"22","author":"T Xiao","year":"2015","unstructured":"Xiao T, Zhang C, Zha H. Learning to detect anomalies in surveillance video. IEEE Signal Process Lett. 2015;22(9):1477\u201381.","journal-title":"IEEE Signal Process Lett"},{"key":"779_CR55","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cviu.2018.02.006","volume":"172","author":"M Sabokrou","year":"2018","unstructured":"Sabokrou M, Fayyaz M, Fathy M, Moayed Z, Klette R. Deepanomaly: fully convolutional neural network for fast anomaly detection in crowded scenes. Comput Vision Image Underst. 2018;172:88\u201397.","journal-title":"Comput Vision Image Underst"},{"key":"779_CR56","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.neucom.2014.12.064","volume":"155","author":"N Li","year":"2015","unstructured":"Li N, Wu X, Xu D, Guo H, Feng W. Spatiotemporal context analysis within video volumes for anomalous-event detection and localization. Neurocomputing. 2015;155:309\u201319.","journal-title":"Neurocomputing"},{"key":"779_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-022-12833-z","volume":"81","author":"MR Bhuiyan","year":"2022","unstructured":"Bhuiyan MR, Abdullah J, Hashim N, Al Farid F. Video analytics using deep learning for crowd analysis: a review. Multimed Tools Appl. 2022;81:1\u201328.","journal-title":"Multimed Tools Appl"},{"key":"779_CR58","doi-asserted-by":"crossref","unstructured":"Rabiee H, Haddadnia J, Mousavi H, Kalantarzadeh M, Nabi M, Murino V. Novel dataset for fine-grained abnormal behavior understanding in crowd, in 2016 13th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, 2016;95\u2013101.","DOI":"10.1109\/AVSS.2016.7738074"},{"issue":"5","key":"779_CR59","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3390\/electronics12051165","volume":"12","author":"T Alafif","year":"2023","unstructured":"Alafif T, et al. Hybrid classifiers for spatio-temporal abnormal behavior detection. Tracking, and recognition in massive hajj crowds. Electronics. 2023;12(5):1165. https:\/\/doi.org\/10.3390\/electronics12051165.","journal-title":"Electronics"},{"key":"779_CR60","doi-asserted-by":"publisher","first-page":"15673","DOI":"10.1007\/s11042-022-13967-w","volume":"82","author":"A Alhothali","year":"2023","unstructured":"Alhothali A, Balabid A, Alharthi R, et al. Anomalous event detection and localization in dense crowd scenes. Multimed Tools Appl. 2023;82:15673\u201394. https:\/\/doi.org\/10.1007\/s11042-022-13967-w.","journal-title":"Multimed Tools Appl"},{"key":"779_CR61","unstructured":"Kingma DP, Ba J. Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 2014."},{"key":"779_CR62","doi-asserted-by":"crossref","unstructured":"Vijay Mahadevan, Weixin Li, Viral Bhalodia and Nuno Vasconcelos. Anomaly Detection in Crowded Scenes, In Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), San Francisco, CA, 2010.","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"779_CR63","unstructured":"Ma K, Doescher M, Bodden C. Anomaly detection in crowded scenes using dense trajectories. University of Wisconsin-Madison. 2015."},{"key":"779_CR64","doi-asserted-by":"crossref","unstructured":"Goutte C, Gaussier E. A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In Advances in Information Retrieval: 27th European Conference on IR Research, ECIR 2005, Santiago de Compostela, Spain, March 21\u201323, 2005. Proceedings 27 2005 (pp. 345\u2013359). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-31865-1_25"},{"key":"779_CR65","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.895","volume":"8","author":"MR Bhuiyan","year":"2022","unstructured":"Bhuiyan MR, Abdullah J, Hashim N, Al Farid F, Haque MA, Uddin J, Isa WNM, Husen MN, Abdullah N. A deep crowd density classification model for hajj pilgrimage using fully convolutional neural network. PeerJ Comput Sci. 2022;8: e895.","journal-title":"PeerJ Comput Sci"},{"issue":"1","key":"779_CR66","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R. Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res. 2014;15(1):1929\u201358.","journal-title":"J Mach Learn Res"},{"key":"779_CR67","doi-asserted-by":"crossref","unstructured":"Dahl GE, Sainath TN, Hinton GE, Improving deep neural networks for lvcsr using rectified linear units and dropout, in IEEE international conference on acoustics, speech and signal processing. IEEE. 2013;2013:8609\u201313.","DOI":"10.1109\/ICASSP.2013.6639346"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-023-00779-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-023-00779-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-023-00779-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T07:34:43Z","timestamp":1729496083000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-023-00779-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":67,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["779"],"URL":"https:\/\/doi.org\/10.1186\/s40537-023-00779-4","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,28]]},"assertion":[{"value":"21 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that there is no competing interest in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"86"}}