• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Adaptive Classifier Based Approach for Crowd Anomaly Detection

    2022-08-24 12:57:28SofiaNishathandNithyaDarisini
    Computers Materials&Continua 2022年7期

    Sofia Nishath and P.S.Nithya Darisini

    School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, 600 127, India

    Abstract: Crowd Anomaly Detection has become a challenge in intelligent video surveillance system and security.Intelligent video surveillance systems make extensive use of data mining, machine learning and deep learning methods.In this paper a novel approach is proposed to identify abnormal occurrences in crowded situations using deep learning.In this approach,Adaptive GoogleNet Neural Network Classifier with Multi-Objective Whale Optimization Algorithm are applied to predict the abnormal video frames in the crowded scenes.We use multiple instance learning (MIL) to dynamically develop a deep anomalous ranking framework.This technique predicts higher anomalous values for abnormal video frames by treating regular and irregular video bags and video sections.We use the multi-objective whale optimization algorithm to optimize the entire process and get the best results.The performance parameters such as accuracy, precision, recall, and F-score are considered to evaluate the proposed technique using the Python simulation tool.Our simulation results show that the proposed method performs better than the conventional methods on the public live video dataset.

    Keywords: Abnormal event detection; adaptive GoogleNet neural network classifier; multiple instance learning; multi-objective whale optimization algorithm

    1 Introduction

    Conventional video monitoring techniques depend on a human operator to monitor and control the situations for unexpected and abnormal occurrences.Hence, a lot of effort has gone into anomalous incident identification in video monitoring.The modern improvements have positive effect on cost saving in labor [1].Because of the rising concerns about social security and protection,anomalous incident identification is extensively investigated in computer vision as one of the essential methodologies in smart video sequences.Surveillance cameras are installed in several public places,like campuses, shopping centers, airports, railway stations, subways, and plazas for safety and security reasons.Automatic monitoring techniques are frequently utilized to extricate object-level characteristics like location, size, velocity, and trajectories for every moving object to identify irregularities in places with dense populations of moving objects.The strange entity is then determined based on these characteristics.The efficiency of machine-learning algorithms suffers in congested areas because of the momentary losses of an object as it is hidden from camera vision.Effective extraction of features of the obstacles or hinderances is a significant issue in object-level approaches.We need a strategy that can continue to function well in crowded systems with varying over crowdedness of the target environment [2].

    The necessity for automatic detection and segmentation of sequences of relevance has arisen.Current technology necessitates a significant amount of configuration work on every video feed just before implementing the video analysis phase.Those occurrences are focused on predetermined heuristic algorithms complicating the detection approach and making it tougher to generalize it to the various surveillance scenarios [3].The growing interest in video surveillance systems for public security has prompted researchers to look into crowd abnormality detection [4].There are two fundamental reasons why detecting abnormalities are complex.For instance, the number of databases having ground truth anomaly data is limited.It’s especially true for deep-learning-based algorithms that have demonstrated substantial efficiency gains in various other classification methods but are data-hungry.The lack of a precise and accurate description of abnormalities is the second cause.Furthermore, those.Furthermore,those two issues are linked since anomaly definition variability renders anomaly ground truth collection which is very difficult [5].Hence, this article proposes a unique method for anomalous incident identification in crowded scenes employing deep learning approaches.

    The remaining portion of the article is structured as follows: Section 2 provides the literary works associated with this paper.Section 3 describes the proposed flow.Section 4 analyzes the behavior of the recommended approach and compares it with the conventional methodologies.And, finally, Section 5 concludes the overall objective of the paper.

    2 Related Works

    In [6] the author proposed a new notion called reference event, which denotes probable event sequences in ordinary video occurrences.Regular occurrences are more likely to resemble such reference events than strange happenings.Smoothness regularization, on the contrary, is used to characterize the relations between video occurrences.Resemblances in the feature space and spatial arrangement in the surveillance videos are utilized to form the associations.Video occurrences that are connected are more prone to having interpretations in this situation.An incremental update technique is used to optimize the hierarchical dictionary and sparse representation parameters.During the testing stage, strange occurrences are recognized as examples that the learnt vocabulary cannot adequately represent.In paper [7], Ramchandran presented an efficient untrained deep learning architecture for video abnormality identification.Raw image patterns are mixed with edge image sequence and fed into the Conv LSTM model of the convolutional autoencoder.The suggested approach is evaluated experimentally using three independent benchmark datasets.In contrast to conventional techniques, the presented technique of Hybrid Deep Learning Architecture for Video Anomaly Detection (HDLVAD) achieves higher efficiency.The next step in the research is to look into video streaming in the context of big data.

    In surveillance videos, the authors in the paper [8] suggested a hybrid swarm intelligencedependent technique to address the challenge of abnormal incident identification in congested surroundings.As a result, the 2D variance plane is partitioned into salient and non-salient clusters using an enhanced Ant Colony Optimization (ACO) clustering technique.Lastly, a unique predatorprey method is devised, in which attackers are directed over the prey scores in the chosen cluster to estimate the Histogram of Swarm (HOS) for a video sequence.In their trials, the suggested methodology outperformed the recent advancements on two widely employed sets of data namely the UMN crowd abnormality database and the UCF web database.Zhang in his paper [9] established a novel Low-Rank and Compact Coefficient Dictionary Learning (LRCCDL) approach for anomalous activity identification in populated settings.To identify malicious frames, a Reconstruction Cost (RC)is implemented.Experimental tests demonstrate the efficacy of this method on both international and domestic anomalous action recognition.The suggested approach produces comparable detection results as compared to the conventional techniques utilizing multiple criteria.Beya in his paper [10]developed an automatic vision-based monitoring strategy for abnormal events identification and localization in congested areas.The Deep One-Class (DOC) framework, developed by the authors in [11] is a revolutionary end-to-end design that incorporates the one-class Support Vector Machine(SVM) into a Convolutional Neural Network (CNN).To improve the characteristics of such a system,a stable loss function generated from a one-class SVM is presented.In contrast to hierarchical models,this design not only reduces the complexities of the procedure but also achieves the worldwide optimum solution for the entire process.

    Wang in his paper [12] presented the Abnormal Event Detection network (AED-Net), a selfsupervised architecture consisting of a Principal Component Analysis Network (PCANet) and kernel principal component analysis (kPCA).The PCANet is developed to retrieve higher-level semantics of the crowd’s scenario utilizing surveillance footage sequence from multiple scenes as raw data.Then, to find abnormalities in the image, kPCA, a one-class classifier, is developed.Unlike specific deep learning techniques, this architecture is self-trained as it only uses video frames from everyday life.Moreover, they proposed that the initial AED-Net can be modified by incorporating the Local Response Normalization (LRN) layer.The experiments demonstrated that the proposed version outperforms the original by enhancing the framework’s generalization ability.Lee in his paper [13]introduced a novel Spatio-Temporal Adversarial Network-based anomalous event detection approach(STAN).They created a Spatio-temporal generator that uses bidirectional Conv LSTM to synthesize an inter-frame by evaluating Spatio-temporal properties.With 3D convolutional layers, the suggested Spatio-temporal discriminator decides if an incoming frame is normal or not.Those two networks are trained to successfully encode Spatio-temporal aspects of stable structures in an adversarial manner.The generator and discriminator shall be utilized as identifiers after the learning process.They detect variations from the already taught regular structures concluding as anomalies.

    Chen in his paper [14] described a new approach for detecting aberrant behavior in crowded environments.The motion energy framework depicts the local motion pattern in the crowd statistical data of low-level characteristic flow that effectively represents body motion.The framework emphasizes the contrast between normal and aberrant behaviors by examining the Sum of Square Differences(SSD) measure of movement information in the central and nearby blocks.Nevertheless, a rising data rate is employed to eliminate aberrations and attain boundary values between anomalous and typical movement patterns.Aberrant behavior is recognized in this framework if the chance of the abnormality occurring is more than a predetermined threshold, i.e., the motion energy score of the associated block block is higher than the usual one.

    Ma in his paper [15] suggested a partially supervised learning method for video anomalous event identification and positioning that only uses regular samples to train the detection algorithm.Considering that the propagation of every typical instance is Gaussian, the abnormal model may appear in this Gaussian distribution with a reduced probability.The method depends on the Variational Auto Encoder (VAE) that restricts the hidden unit representations of the regular sample to a Gaussian distribution utilizing an end-to-end deep learning model.The variational autoencoder is used to derive the test sample’s hidden layer representations that indicate the likelihood of conforming to the Gaussian distribution.The recognition threshold determines whether it is abnormal or normal event.

    To identify abnormal occurrences,the authors in [16] suggested an Anomaly-introduced Learning(AL) technique.With regular and aberrant video data, a graph-dependent Multi-Instance Learning(MIL) framework is created.The MIL approach generates a set of possibly aberrant examples by a simple classifier.Such samples are utilized to increase dictionary learning also referred to as Anchor Dictionary Learning (ADL).The anomaly is measured using the Sparse Reconstruction Cost (SRC).At first, they leverage aberrant data and secondly prune testing samples with coarse filtering.This lowers the time cost of estimating SRC when compared to the existing techniques.Experiments show how the suggested ADL technique affects competitive results.Anomalous incident identification was defined as a one-vs.-rest binary categorization issue by Khan in his paper [17].They make a twofold commitment.Initially, they present an unsupervised feature learning system that encodes both movement and aesthetic data using object-centric convolutional auto-encoders.Secondly, they offer a trained categorization method depending on its normality by grouping the training instances.The normalcy clusters are then separated from the rest using a one-vs.-all aberrant event classifier.The other groups serve as dummy abnormalities for the classifier’s training.If the best classification value provided by the one-vs.-rest classifiers is negative, an item is designated as aberrant during interpretation.

    To solve the challenge of abnormal action recognition, Ding in his paper [18] suggested an unsupervised architecture.Lower-level characteristics and Optical Flows (OF) of surveillance videos are collected to describe motion data in the video frame.Furthermore, aberrant events frequently take place in local places and are spatially connected to their surroundings.Its initial stage is to compute OF patterns and partition them into a series of non-overlapping sub-maps to obtain higher-level data from local areas and represent the relationships in the feature space.Related PCANet models are trained after utilizing the sub-maps in the OF maps at the same spatial position.A series of oneclass classifiers are developed to forecast the abnormal values of test frames using the block-wise histograms derived by the PCANet model.The architecture is entirely uncontrolled since it uses regular films.In the paper [19] the network is trained by using a transfer learning method.To learn spatial level appearance characteristics for abnormal and normal patterns, a CNN-based VGG16 pre-trained model was employed.Anomalies may be discovered using either a homogeneous or a hybrid method.Pre-trained networks are used to fine-tune CNN for each dataset in a homogenous manner.Pre-trained networks are used to fine-tune CNN on one dataset, whereas hybrid approaches employ them to finetune CNN on the second dataset as well.

    Poor contrast, noise, and the tiny size of the flaws may make finding individuals difficult.In order to measure the quality of detection, it is necessary to have complete information about the defect’s geometry.In the paper [20] the method of detecting and tracking unexpected occurrences in scenes is made easier with the development of the two new techniques.First, they used the Gaussian Mixture Model(GMM)method to gather statistical models of the element for each person throughout the temporal monitoring of several individuals.Later they enhanced this technique for seeking and tracking large crowds namely Improved Gaussian Mixture Model (IGMM).The authors have used two techniques for optical flow representation namely the Lucas and Kanade (LK) differential method and the Horn Schunck (HS) optical flow estimate method.The authors developed a new descriptor called the Distribution of Magnitude of Optical Flow (DMOF) to detect abnormal occurrences in video surveillance footages.In [21] the authors proposed to extract spatiotemporal characteristics from video sequences and utilize the deep learning method to identify anomalous events.Saliency Information (SI) of video frames represents the features in the spatial domain since human eyes are drawn to aberrant occurrences in video sequences.The temporal domain Optical Flow (OF) of the video sequences is considered essential.Multi-scale Histogram Optical Flow (MHOF) via OF may be used to derive precise motion information.The spatiotemporal characteristics of the video frames are created by fusing MHOF and SI.When it comes to anomalous event detection, a deep learning network called PCANet is used.It has been observed that UMN dataset [22] has been implemented in most of the above works which includes the proposed work as well.

    3 Proposed Work

    Anomaly detection has grown in importance in the computer vision and pattern recognition fields in recent years.The primary problem is the wide variety of anomalous event settings.Determining an interface that spans the range of potential anomalous occurrences is challenging.As a result,the statistical processing of unusual occurrences may be defined as those that exhibit deviation from the regular expectations and are not consistent with the normal samples, which is a typical solution.Anomaly detection techniques may be generally split into two stages namely event representation and anomaly detection model.In event representation, relevant elements are extracted from the video to depict the occasion.As a result of the ambiguity in event description, the event may be classified as having either object-level or pixel-level properties.Images of sports history and sports energy are examples of the former, which utilize object trajectory features and object appearance traits to signify an event.There are a lot of obstacles that obstruct each other’s view when using object-level features,which makes it tough to manage busy scenes.Pixel-level characteristics, such as Spatio Temporal Gradient (STG), Histograms of Optical Flow (HOF), and a Mixture of Dynamic Textures (MDT),are often derived from two-dimensional image blocks or three-dimensional video cubes according to their representation.

    A model for anomaly detection must be constructed once the event characteristics have been obtained.Detecting anomalies requires creating rules or models for everyday occurrences.When a test result deviates from the model or violates the guidelines, it is deemed as an exception.Clusterbased detection models, state inference detection models, and sparse reconstruction detection models are some of the examples.The cluster-based detection approach, for instance, groups together normal events that are related in some way.As a result, during the testing phase, samples located outside of the cluster centers are deemed anomalous.The assumption is that the state inference model predicts a constant shift in normal occurrences for a longer duration.According to sparse reconstruction detection models, the fundamental concept is that normal events have a modest inaccuracy in comparison to abnormal occurrences.These approaches have shown promise in earlier research.However, there is a design flaw in such approaches since the event representation and anomaly detection models were developed independently.These procedures require a great deal of study time and effort to develop them individually, yet the techniques frequently fail.Generalization ability is weak when the video picture changes.Object identification, object detection, behavior recognition and health diagnosis have all been benefited greatly from the overwhelming performance of the deep learning methodology.Since the two stages of feature representation and pattern recognition are intertwined, deep learning techniques are most successful when they are used in conjunction with each other to maximize the performance of the model.It has the potential to enhance the method’s generalizability in many situations.Researchers started to use deep learning in abnormal event detection due to its effectiveness and its efficiency.Hence, we propose a novel approach for abnormal event detection in crowded scenes using an Adaptive Google Net Neural Network classifier.Also, to enhance the accuracy in this abnormal event detection, we employ Multi-Objective Whale Optimization Algorithm.Our contributions in this work are:

    ?A novel classification approach for detection of abnormal events in crowded scenes using Adaptive Google Net Neural Network classifier.

    ?Integration of a multi-objective whale optimization algorithm for accurate detection of the abnormal frames classified by the classifier.

    This section explains the flow of the proposed work.The schematic representation of the proposed work is depicted in Fig.1.In this approach, for frame-level evaluation indicators, initially the abnormal features are classified using the Adaptive Google Net Neural Network Classifier followed by the Multi-Objective Whale Optimization Algorithm for its identification.

    Figure 1: Flow of the proposed method

    3.1 Data Pre-Processing

    A histogram is a visual representation of the probability density function of a specific type of information.An image histogram is a graphical depiction of the spectral propagation of grey values in a digitized image.The histogram can determine the frequency of existence of the different grey values in the pictures.The histogram of a digitized image with luminance degree in the interval [0, L - 1] is a continuous function.It is provided by,

    Heresjrepresents thejthintensity number, andmjrepresents the count of pixels in the images with the intensity ofsj.Dividing every one of the histogram’s components by the overall count of pixels in the image denoted by the product YZ, where Y and Z are the picture’s row and column dimensions, accordingly normalizes the histogram.As a consequence, a normalized histogram equals the following:

    wherep(sj) is a likelihood assessment for the presence of intensity levelsjin the image.The total items in a normalized histogram will be one.The histograms of poor pictures are often smaller, but the histograms of high-quality images are usually wide.As a result, the histogram is altered to convert an ordinary image into a better version.By distributing the intensity values across the whole range,histogram equalization improves the image’s brightness.For pictures with non-uniform background luminance, the histogram equalization approach cannot be used.It merely includes extra pixels to the lighter areas of the image and detracts additional pixels from the dark areas giving rise to a greater dynamic interval in the final image.Histogram equalization aims to evenly distribute a given image’s brightness over its whole interval, which in this case is between 0 and 1.In the histogram equalization method, the Probability Density Function (PDF) is changed.The probability density function (PDF)of the images is calculated as follows [3]:

    Here, j=0, 1,..., t andmJrepresent the total pixels count from H0to Hsintensity degrees.

    Here j = (t + 1), (t + 2),..., (J - 1) andmUindicates the total count of pixels from Ht+1to HJ-1intensity degrees.Cumulative density functions (CDF) are then represented by,

    Transform functions concerning cumulative density functions:

    Transform function of the images is given by Transform Function (TF):

    The above-indicated image with a Transform Function (TF) is later processed through a Gabor filter for denoising, leading to a final enhanced image.Gabor filters are especially effective in representing and discriminating between different textures.Gabor filters exhibit optimum localization properties in both spatial and frequency domain.Hence, they are used for motion analysis in abnormal event detection.The Gabor filter effectively defines images energy transfer and denoising because it utilizes frequencies and directional representations to differentiate and define the image texture.The Gabor filter of thex1th scale andy1th direction is described by using Gaussian kernel function (a, b)of pixel point (a, b) modified by a sinusoidal waveform.

    Here, c indicates the scale parameter,x0andy0indicate the total scales and directions, accordingly.Then, the lower frequency component is convolved with the Gabor filter to obtain the Gabor coefficient,

    where (a, b) represents the input matrix of the low-frequency component.Now, the Gabor energy of every scalex0and directionsy0shall be estimated as,

    3.2 Adaptive Google Net Neural Network Classifier

    The current deep learning framework increases the neural network’s efficacy by extending the layers.The computational complexity of this concept increases dramatically as the layer goes more profound, which is a severe flaw.Google proposed the inception architecture known as Google Net.The interior surface of the neural networks was expanded to output numerous correlation propagations.The heart of this architecture is built on the notion that obtaining diverse likelihood functions with significant correlation with the input data optimizes the neural network outputs of every layer.The results are pooled into a unified data set in the fundamental inception v1 component whereas here the input data is given into four distinct stages (1×1, 3×3, 5×5 convolution units,and 3×3 max pooling unit).

    There are totally eleven layers in the proposed architecture of adaptive GoogleNet neural network classifier.The layers include one layer for input, four convolution layers, three pooling layers, one mapping layer, one-fully connected layer and one output layer.The convolutional units collect diverse spatial data from the input information, while the max-pooling unit reduces the channels and sizes of the input information to extract discrete characteristics.The inception component is a means of extricating massive data into a small depth.The inception architecture has been changed to version 4 at this time.V1 has a slightly elongated form.This method uses the v1 framework to build three CNN units, an activation unit, and a max-pooling unit.In this classifier, the abnormal frames and the normal frames are passed into a number of layers, where they are verified and checked for abnormalities.This classifier helps to classify the abnormal frame by using the adaptive inception unit which can identify the abnormality in the video frames.The processing time of this classifier is very fast and the abnormalities can be detected rapidly.The frame is classified as an abnormal frame even if it contains at least one abnormal pixel in the test sample.The architecture of the adaptable Google Net Neural Network Classifier is shown in Fig.2.Tab.1 presents the developed incessant model’s aggregate characteristics and the pooling layer’s specifications.The system with the most extensive accuracy parameter is the one wherein the kernel size was increased to nine inception components.

    Figure 2: Architecture of adaptive Google Net neural network classifier

    Table 1: Google Net inception architectural elements

    3.3 Multi-Objective Whale Optimization Algorithm

    The primary objective of inclusion of whale optimization algorithm in the proposed work is to improve the performance of the abnormal event detection in terms of its accuracy.The main principle of Multi-Objective Problems (MOP) is presented in this section.The MOPs are designed to reduce or increase many competing goal functionalities.Considering the reduction issue with numerous functions fj(a), j=1, 2,..., N (in which N represents the overall count of operations) as in (13) to derive the MOP:

    subject to,

    In which x denotes the vector of solutions,,gj(a)andhj(a)represent the constraint operations.Solution(13) is said to dominate solutionbif the condition in (16) is met.

    where,j,k∈1,2,3,....N.

    The Whale Optimization Algorithm (WOA) is a novel meta-heuristic algorithm that models humpback whales.The quest in WOA begins with the generation of a random set of whales.The whales approach their targets using bubble-net or encircling techniques.The whales adjust their posture in the encircling activity according to their ideal position:

    where E denotes the distance between the preyY*(t) and a whaleY(t), and t indicates the present iteration count.B and D represent the coefficient vectors and are estimated as shown below:

    In which r random vector∈[0, 1], and the score of b is linearly reduced from 2 to 0 as repetitions continue.

    The bubble-net behavior shall be simulated using two methods.The initial one is the shrinking encircling, which is achieved by lowering the score of b in (19), which also reduces value of B.The next is the spiral upgrading location by (21) which is used to simulate the humpback whales’helical structure motion around its prey:

    whereE′= |Y*(t) -Y(t)| denotes the distance between the whales and preys, f denotes a constant for stating the shape of the logarithmic spiral, g denotes a randomized integer in [-1, 1] and⊙denotes multiplication of components.

    Such whales may swim about their prey in a diminishing circle and along a spiral course simultaneously.

    where p∈[0, 1] denotes a randomized integer that indicates the likelihood of selecting the shrinking encircling procedure or the spiral design to upgrade the location of whales.

    Moreover, the humpback whales find an unexpected way to attack the prey.The position of a whale is upgraded by selecting an accidental search agent rather than the optimal search agent, as shown below:

    whereYrandrepresents a random location vector selected from the existing population.The whole framework of WOA is depicted in the subsequent algorithm.

    Algorithm 1: Multi-Objective Whale Optimization Algorithm (WOA)Input: Dimension of each whale, Y*best solution Output: yup Initial value to itern: number iteration, Fupbest function G=1 repeat for Decrease the value of b from 2 to 0 do Compute B and D using (19) and (20) respectively p=rand if p≥0.5 then Update Position based on (21)else if |B|≥0.5 then Update Position based on (22)-(23)else Update Position based on (17)-(18)end if end if end for Compute the Fitness function G=G+1 until G<itern

    4 Performance Analysis

    4.1 Dataset Description

    UMN dataset [22] consists of a crowd escaping in panic situation.This dataset consists of 11 videos with three scenes.The videos are at a normal starting section with abnormality at the ending section.The video size is of 320×240 pixels.

    The proposed method is simulated utilizing the Python simulation tool, and the behavioral metrics are analyzed.The suggested technique is contrasted and compared with the existing approaches based on the performance metrics like accuracy, precision, recall and F-score.Criteria such as True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN) are considered for its evaluation.The pixel numbers that the algorithm correctly detects as positive are referred to as True Positive (TP).The pixel numbers that the system correctly detects as unfavorable are referred to as True Negative (TN).The pixel numbers that are identified as positive but not exact are known as False Positive (FP).The pixel numbers that are recognized as unfavorable but not the exact ones are referred to as False Negative (FN).Tab.2 displays the performance metric values of the proposed work.

    Table 2: Performance metric evaluation

    4.2 Accuracy

    It determines the number of samples which were successfully detected.It determines how closely the outcome corresponds to the initial result.Fig.3 shows the graph for accuracy attained for various video frames.

    Figure 3: Number of frames vs. accuracy (%)

    4.3 Precision

    Precision refers to a model’s ability to recognize only critical ones.It’s the proportion of positive predictions that are accurate.Fig.4 shows the graph for precision attained for various video frames.

    Figure 4: Number of frames vs. precision (%)

    4.4 Recall

    The potential of a system to identify every relevant object is known as recall.It’s the proportion of optimistic expectations that are correct from all the available ground truths.Fig.5 shows the graph for recall attained for various video frames.

    4.5 F-Score

    The F-score, also termed as F1-score, measures the efficiency of a framework for a given dataset.It is utilized to assess binary categorization algorithms that classify samples as either“Positive”or“Negative”.The F-score is described as the harmonic average of the recall and precision of the system.It is also a method which integrates them.The F-score for various frame numbers is shown in Fig.6.

    Figure 6: Number of frames vs. F-score

    Fig.7 shows the comparative analysis of performance metrics for the existing and the proposed method.The inference from the graph is evident that the method which is proposed in our work is better than the traditional approaches [20,21].

    Figure 7: Comparison of existing vs. proposed methods

    The above figure depicts various anomaly frames in which anomaly of the crowded scene is detected.Figs.8a-8d show the detection steps of anomaly frames.Multiple detection with a bounding box occurs in each anomaly frame.Reduction in processing time is observed in the process.The detection covers maximum number of people in a single frame.After extracting the spatio-temporal feature vectors, a minimum distance matrix over the mega blocks is constructed.The value of an element in the matrix is defined by the minimum Euclidean distance.The distance is calculated between a feature vector of the current test frame and the codewords in the corresponding block.The values in a minimum distance matrix are compared against the threshold value (5.83682407063e-05).The current frame is classified as unusual if the highest value is larger than the threshold and less unusual if lesser.

    Figure 8: Detection output steps for anomaly frames.Frames (a)-(f) denote the sequence of anomaly detection events in progressive steps

    5 Conclusion

    In this paper we have used a new strategy for identifying anomalous occurrences in crowded situations.This technique of Adaptive Google Net Neural Network Classifier uses Multiple Instances Learning (MIL) to dynamically develop a deep anomaly ranking framework.A multi-objective whale optimization algorithm is employed to obtain a more accurate determination of visual abnormalities.This predicts high anomalous values for abnormal video frames.The experiments revealed that the suggested strategy outperforms the conventional algorithms in detecting anomalous occurrences in crowded settings based on the metrics in the UMN dataset.The proposed method gives better results in comparison to the existing approaches based on its detection accuracy and the processing time.Our future work is to incorporate and implement contextual anomaly detection and localization in the crowded scenarios which will give more semantic and meaningful results to the proposed crowd anomaly detection technique.Hence more improvement in performance and quality can be achieved with such enhancements in our model.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    十分钟在线观看高清视频www| 久久久久网色| 免费黄频网站在线观看国产| 一级,二级,三级黄色视频| 国产精品秋霞免费鲁丝片| 成人18禁高潮啪啪吃奶动态图 | 天堂俺去俺来也www色官网| 精品久久久噜噜| 免费av不卡在线播放| 欧美精品一区二区免费开放| 久久久久久久精品精品| 建设人人有责人人尽责人人享有的| 久久婷婷青草| 男女边摸边吃奶| 亚洲av福利一区| 久久午夜福利片| 欧美日韩亚洲高清精品| 欧美+日韩+精品| 这个男人来自地球电影免费观看 | 亚洲精品久久成人aⅴ小说 | 国产精品一区二区在线不卡| 一级片'在线观看视频| 黑人高潮一二区| a级毛片免费高清观看在线播放| 国产高清国产精品国产三级| 精品一区二区三区视频在线| 97在线人人人人妻| 看十八女毛片水多多多| 国产一区二区三区av在线| 亚洲精品色激情综合| 日本av手机在线免费观看| 免费日韩欧美在线观看| 精品99又大又爽又粗少妇毛片| 久久国产精品男人的天堂亚洲 | 九九在线视频观看精品| 26uuu在线亚洲综合色| 亚洲av福利一区| 久久国产亚洲av麻豆专区| 欧美精品亚洲一区二区| 免费黄频网站在线观看国产| 国产成人freesex在线| 男女免费视频国产| 亚洲av.av天堂| 黑人欧美特级aaaaaa片| 国产精品熟女久久久久浪| 999精品在线视频| 国产淫语在线视频| 全区人妻精品视频| 搡女人真爽免费视频火全软件| 欧美国产精品一级二级三级| 久久久久精品性色| av线在线观看网站| 亚洲精品美女久久av网站| 边亲边吃奶的免费视频| xxx大片免费视频| 国精品久久久久久国模美| 国产精品99久久99久久久不卡 | 只有这里有精品99| 国产一区亚洲一区在线观看| av国产精品久久久久影院| 国产成人aa在线观看| 高清在线视频一区二区三区| 亚洲中文av在线| 午夜日本视频在线| 久久久久视频综合| 最近手机中文字幕大全| 精品亚洲乱码少妇综合久久| 久久av网站| 寂寞人妻少妇视频99o| 日韩伦理黄色片| 国产视频首页在线观看| 女性被躁到高潮视频| 亚洲人成网站在线播| 亚洲精华国产精华液的使用体验| 满18在线观看网站| av又黄又爽大尺度在线免费看| 国精品久久久久久国模美| 人妻系列 视频| 精品久久久噜噜| .国产精品久久| 国产精品无大码| 有码 亚洲区| 丰满少妇做爰视频| 日日啪夜夜爽| 久久女婷五月综合色啪小说| 草草在线视频免费看| 18禁在线播放成人免费| 秋霞在线观看毛片| 赤兔流量卡办理| 日本免费在线观看一区| 久久久久久伊人网av| xxxhd国产人妻xxx| 999精品在线视频| 蜜桃在线观看..| 寂寞人妻少妇视频99o| 搡女人真爽免费视频火全软件| 人人澡人人妻人| 春色校园在线视频观看| 麻豆乱淫一区二区| 国产精品人妻久久久久久| 大话2 男鬼变身卡| 99久久中文字幕三级久久日本| 日本爱情动作片www.在线观看| 精品人妻熟女av久视频| 日韩欧美一区视频在线观看| 国产免费福利视频在线观看| 久久久国产一区二区| 大片免费播放器 马上看| 欧美3d第一页| 国产精品99久久久久久久久| 街头女战士在线观看网站| 免费久久久久久久精品成人欧美视频 | 麻豆精品久久久久久蜜桃| 国产精品99久久久久久久久| 国产 一区精品| 亚洲精品国产色婷婷电影| 简卡轻食公司| 精品视频人人做人人爽| av网站免费在线观看视频| 国产精品国产三级国产av玫瑰| 啦啦啦中文免费视频观看日本| 国产69精品久久久久777片| 精品一品国产午夜福利视频| 人妻夜夜爽99麻豆av| 亚洲精品色激情综合| 亚洲综合精品二区| 极品少妇高潮喷水抽搐| 欧美最新免费一区二区三区| 精品国产一区二区久久| 午夜老司机福利剧场| 18禁观看日本| 精品少妇黑人巨大在线播放| 91aial.com中文字幕在线观看| 国产亚洲最大av| 亚洲国产色片| 精品视频人人做人人爽| 亚洲精品日韩在线中文字幕| 亚洲av电影在线观看一区二区三区| 黄色视频在线播放观看不卡| 热99久久久久精品小说推荐| 成人毛片a级毛片在线播放| 久久久久视频综合| 狂野欧美激情性bbbbbb| 欧美激情 高清一区二区三区| 日本午夜av视频| 精品卡一卡二卡四卡免费| 中文字幕亚洲精品专区| 久久99一区二区三区| 18禁裸乳无遮挡动漫免费视频| 2021少妇久久久久久久久久久| 少妇精品久久久久久久| 人妻夜夜爽99麻豆av| av天堂久久9| 久久精品国产亚洲网站| 黄色配什么色好看| 日韩精品有码人妻一区| 亚洲欧美一区二区三区国产| 麻豆成人av视频| 久久99蜜桃精品久久| 多毛熟女@视频| 亚洲人与动物交配视频| 十八禁网站网址无遮挡| 亚洲av男天堂| 婷婷色av中文字幕| 免费高清在线观看日韩| 久久久久视频综合| 水蜜桃什么品种好| 国产成人freesex在线| 99热国产这里只有精品6| 黄色毛片三级朝国网站| 蜜桃久久精品国产亚洲av| 久久女婷五月综合色啪小说| 爱豆传媒免费全集在线观看| 国产黄色视频一区二区在线观看| 一个人看视频在线观看www免费| 日本av免费视频播放| 天堂8中文在线网| 亚洲精品中文字幕在线视频| 欧美激情极品国产一区二区三区 | 欧美bdsm另类| 丝袜美足系列| 天天影视国产精品| 日韩av在线免费看完整版不卡| 一区二区av电影网| 欧美 亚洲 国产 日韩一| 老女人水多毛片| 99国产综合亚洲精品| 亚洲国产av新网站| 久久久久网色| 久久亚洲国产成人精品v| 国产国语露脸激情在线看| 久久国产亚洲av麻豆专区| 久久精品国产a三级三级三级| 久久女婷五月综合色啪小说| 国产精品人妻久久久影院| 在线 av 中文字幕| 在线观看免费视频网站a站| 国产永久视频网站| 国产成人av激情在线播放 | 国产白丝娇喘喷水9色精品| 国产欧美日韩综合在线一区二区| 中文字幕精品免费在线观看视频 | 国产一区二区三区综合在线观看 | 久久久久视频综合| 日韩一区二区三区影片| 欧美人与善性xxx| 少妇被粗大猛烈的视频| 亚洲国产最新在线播放| 久久狼人影院| 视频在线观看一区二区三区| 欧美性感艳星| 成年av动漫网址| 国产成人精品在线电影| 国产一区亚洲一区在线观看| av女优亚洲男人天堂| 久热这里只有精品99| 国产黄色免费在线视频| 人人妻人人添人人爽欧美一区卜| 中文字幕亚洲精品专区| 免费av不卡在线播放| av免费在线看不卡| 最近的中文字幕免费完整| a级片在线免费高清观看视频| 国产精品一国产av| 国产精品久久久久成人av| 国产色婷婷99| 欧美精品一区二区大全| 黄色怎么调成土黄色| 成年av动漫网址| 国产熟女欧美一区二区| 一级片'在线观看视频| 少妇 在线观看| 亚洲性久久影院| 精品国产乱码久久久久久小说| 性色avwww在线观看| 欧美精品高潮呻吟av久久| 永久免费av网站大全| 男女高潮啪啪啪动态图| 亚洲精品乱码久久久v下载方式| 一级毛片黄色毛片免费观看视频| 91久久精品国产一区二区三区| 丰满饥渴人妻一区二区三| 日韩,欧美,国产一区二区三区| 日韩不卡一区二区三区视频在线| 国语对白做爰xxxⅹ性视频网站| 久久国产精品男人的天堂亚洲 | 国产av精品麻豆| 各种免费的搞黄视频| 十八禁高潮呻吟视频| 99精国产麻豆久久婷婷| 在线观看免费高清a一片| 久久久久久久久久久丰满| 欧美日韩综合久久久久久| 五月玫瑰六月丁香| 夜夜骑夜夜射夜夜干| 99国产精品免费福利视频| 91aial.com中文字幕在线观看| 精品一区二区免费观看| 久久国产亚洲av麻豆专区| videos熟女内射| 肉色欧美久久久久久久蜜桃| 欧美国产精品一级二级三级| 成年av动漫网址| 制服丝袜香蕉在线| 91久久精品国产一区二区三区| 蜜桃国产av成人99| 久久人妻熟女aⅴ| 青春草亚洲视频在线观看| 纯流量卡能插随身wifi吗| 九九在线视频观看精品| 国产精品女同一区二区软件| 精品亚洲乱码少妇综合久久| a级毛片在线看网站| 黄片播放在线免费| 九九爱精品视频在线观看| 永久网站在线| 国精品久久久久久国模美| 在线观看人妻少妇| 91午夜精品亚洲一区二区三区| 一级毛片我不卡| 少妇的逼水好多| 观看av在线不卡| 亚洲av免费高清在线观看| 亚洲无线观看免费| 欧美精品国产亚洲| 亚洲第一av免费看| av福利片在线| 国产精品久久久久久精品古装| 你懂的网址亚洲精品在线观看| 亚洲欧洲精品一区二区精品久久久 | 久久精品夜色国产| 国产av精品麻豆| 亚洲精品国产色婷婷电影| 午夜激情av网站| 国产精品麻豆人妻色哟哟久久| 日韩一本色道免费dvd| av在线播放精品| 如何舔出高潮| 国产成人精品无人区| 欧美日韩国产mv在线观看视频| 免费看不卡的av| 少妇人妻久久综合中文| 欧美3d第一页| 亚洲国产精品一区二区三区在线| 91在线精品国自产拍蜜月| 在线观看人妻少妇| 五月伊人婷婷丁香| 水蜜桃什么品种好| 日本免费在线观看一区| 亚洲精品av麻豆狂野| 精品人妻一区二区三区麻豆| 汤姆久久久久久久影院中文字幕| 国模一区二区三区四区视频| 国产精品99久久久久久久久| 多毛熟女@视频| 久久精品国产a三级三级三级| 一级,二级,三级黄色视频| 黄色毛片三级朝国网站| 99久久精品一区二区三区| 视频区图区小说| 久久人人爽人人片av| 国产成人精品在线电影| 青春草亚洲视频在线观看| 国产乱人偷精品视频| 这个男人来自地球电影免费观看 | 国产片特级美女逼逼视频| 国产毛片在线视频| 国产精品秋霞免费鲁丝片| 久久久久精品性色| 免费观看在线日韩| 校园人妻丝袜中文字幕| 精品一品国产午夜福利视频| 少妇丰满av| 亚洲欧美中文字幕日韩二区| 波野结衣二区三区在线| 成人漫画全彩无遮挡| 午夜免费观看性视频| 日韩精品有码人妻一区| 丰满饥渴人妻一区二区三| 欧美日韩综合久久久久久| 国产精品一区二区在线不卡| 国产精品麻豆人妻色哟哟久久| av播播在线观看一区| 一级毛片我不卡| 欧美人与善性xxx| 欧美精品国产亚洲| 精品亚洲乱码少妇综合久久| 日本黄大片高清| 天美传媒精品一区二区| 日本欧美视频一区| 亚洲精品色激情综合| 欧美 日韩 精品 国产| 欧美精品人与动牲交sv欧美| 精品卡一卡二卡四卡免费| 国产精品人妻久久久久久| 18禁裸乳无遮挡动漫免费视频| 999精品在线视频| 精品人妻偷拍中文字幕| 日韩欧美精品免费久久| 亚洲在久久综合| 久久久国产一区二区| 丝瓜视频免费看黄片| 亚洲精品亚洲一区二区| 精品久久久精品久久久| 亚洲无线观看免费| 啦啦啦在线观看免费高清www| 亚洲国产成人一精品久久久| av在线观看视频网站免费| 免费观看的影片在线观看| 精品少妇黑人巨大在线播放| 久久ye,这里只有精品| 丁香六月天网| 九九久久精品国产亚洲av麻豆| 免费黄色在线免费观看| 日本黄大片高清| 欧美国产精品一级二级三级| 国产一区有黄有色的免费视频| 中国三级夫妇交换| 久热久热在线精品观看| 91午夜精品亚洲一区二区三区| 人妻人人澡人人爽人人| 日韩,欧美,国产一区二区三区| 亚洲欧洲日产国产| 乱人伦中国视频| 国产黄频视频在线观看| 在线 av 中文字幕| 免费av不卡在线播放| 国产综合精华液| 免费人成在线观看视频色| www.色视频.com| 免费看av在线观看网站| 只有这里有精品99| 久久久久国产精品人妻一区二区| 亚洲国产精品一区二区三区在线| 日韩免费高清中文字幕av| 一个人看视频在线观看www免费| 国产亚洲欧美精品永久| av在线app专区| 亚洲色图 男人天堂 中文字幕 | 9色porny在线观看| 丁香六月天网| 搡女人真爽免费视频火全软件| 久久精品久久久久久久性| 欧美精品人与动牲交sv欧美| 人妻系列 视频| 精品熟女少妇av免费看| 亚洲欧美清纯卡通| www.av在线官网国产| 久久影院123| 黄色欧美视频在线观看| 我的女老师完整版在线观看| 中文字幕亚洲精品专区| 91国产中文字幕| 国产黄色视频一区二区在线观看| 中文天堂在线官网| 国语对白做爰xxxⅹ性视频网站| 欧美激情极品国产一区二区三区 | 最近中文字幕高清免费大全6| 久久这里有精品视频免费| 久久久久视频综合| 乱码一卡2卡4卡精品| 欧美日韩精品成人综合77777| 久久精品夜色国产| 久久99一区二区三区| 能在线免费看毛片的网站| 亚洲中文av在线| 天堂8中文在线网| 热99久久久久精品小说推荐| 九色成人免费人妻av| 97在线人人人人妻| 视频区图区小说| 女的被弄到高潮叫床怎么办| 男的添女的下面高潮视频| 麻豆乱淫一区二区| 亚洲精品自拍成人| av女优亚洲男人天堂| 免费观看av网站的网址| 国产成人a∨麻豆精品| 亚洲精品美女久久av网站| 在线观看美女被高潮喷水网站| 国产不卡av网站在线观看| 2018国产大陆天天弄谢| 久久av网站| 亚洲av电影在线观看一区二区三区| 国产午夜精品一二区理论片| 精品久久蜜臀av无| 亚洲欧美色中文字幕在线| 亚洲伊人久久精品综合| av线在线观看网站| 日本wwww免费看| 丁香六月天网| 亚洲综合色惰| 亚洲精品一区蜜桃| 精品久久久久久电影网| 亚洲国产欧美日韩在线播放| 国产成人91sexporn| 熟妇人妻不卡中文字幕| 日本av免费视频播放| 黑人巨大精品欧美一区二区蜜桃 | 亚洲人成网站在线观看播放| 久久久久久伊人网av| 建设人人有责人人尽责人人享有的| 天堂中文最新版在线下载| 亚洲综合精品二区| 夜夜看夜夜爽夜夜摸| 最后的刺客免费高清国语| 精品酒店卫生间| 日日摸夜夜添夜夜爱| 大香蕉久久网| 天美传媒精品一区二区| 不卡视频在线观看欧美| 国产片内射在线| 80岁老熟妇乱子伦牲交| 亚洲美女视频黄频| 久久久久久久国产电影| 精品久久久久久久久亚洲| 日本黄色片子视频| 久久久午夜欧美精品| 午夜激情av网站| 欧美精品一区二区大全| 欧美日韩av久久| av.在线天堂| 最后的刺客免费高清国语| 国产不卡av网站在线观看| 国国产精品蜜臀av免费| 色5月婷婷丁香| 久久久久视频综合| 男女无遮挡免费网站观看| 久久久国产一区二区| 成年女人在线观看亚洲视频| 人人澡人人妻人| 大陆偷拍与自拍| av女优亚洲男人天堂| 亚洲美女黄色视频免费看| 久久精品国产a三级三级三级| 九色成人免费人妻av| 99re6热这里在线精品视频| 精品卡一卡二卡四卡免费| 中文天堂在线官网| 亚洲国产成人一精品久久久| 中文精品一卡2卡3卡4更新| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产av精品麻豆| 婷婷色综合www| 免费观看在线日韩| 成年人午夜在线观看视频| 国产成人精品无人区| 熟女人妻精品中文字幕| 午夜日本视频在线| 国产亚洲一区二区精品| 如日韩欧美国产精品一区二区三区 | 欧美国产精品一级二级三级| 黑人巨大精品欧美一区二区蜜桃 | 亚洲一级一片aⅴ在线观看| 亚洲av不卡在线观看| 国产精品成人在线| 中文字幕制服av| 91aial.com中文字幕在线观看| 妹子高潮喷水视频| av福利片在线| 亚洲欧美中文字幕日韩二区| 成人毛片a级毛片在线播放| 成年人午夜在线观看视频| av网站免费在线观看视频| 在线亚洲精品国产二区图片欧美 | 最近中文字幕高清免费大全6| 国产欧美亚洲国产| 国产精品久久久久久av不卡| 色94色欧美一区二区| 精品国产国语对白av| 国产精品久久久久久久电影| 春色校园在线视频观看| 中文天堂在线官网| 黄色视频在线播放观看不卡| 亚洲精品,欧美精品| 国产精品久久久久久精品古装| 婷婷色综合大香蕉| 特大巨黑吊av在线直播| 少妇被粗大猛烈的视频| 九九爱精品视频在线观看| 日韩大片免费观看网站| 久久精品熟女亚洲av麻豆精品| √禁漫天堂资源中文www| 久久亚洲国产成人精品v| 啦啦啦中文免费视频观看日本| 国产精品一区二区在线观看99| 王馨瑶露胸无遮挡在线观看| 人妻一区二区av| 啦啦啦中文免费视频观看日本| 精品少妇黑人巨大在线播放| 91久久精品国产一区二区成人| 亚洲av日韩在线播放| 欧美xxxx性猛交bbbb| 国产精品成人在线| 精品99又大又爽又粗少妇毛片| 久久久久久久久大av| 国产高清三级在线| 夫妻午夜视频| 伦精品一区二区三区| av卡一久久| 制服丝袜香蕉在线| 性色avwww在线观看| 插逼视频在线观看| 日韩免费高清中文字幕av| 国产一区二区三区av在线| 高清毛片免费看| 中国三级夫妇交换| 午夜免费观看性视频| 一级二级三级毛片免费看| 色5月婷婷丁香| 国产精品久久久久成人av| 午夜福利在线观看免费完整高清在| 亚洲精品456在线播放app| 国产伦精品一区二区三区视频9| 午夜福利视频在线观看免费| 一边亲一边摸免费视频| 精品酒店卫生间| 亚洲精品国产av成人精品| 亚洲精品日韩av片在线观看| 精品亚洲乱码少妇综合久久| 久久午夜综合久久蜜桃| videosex国产| 建设人人有责人人尽责人人享有的| 国产国语露脸激情在线看| 一个人免费看片子| 黑人高潮一二区| 久久av网站| 国产精品久久久久久av不卡| 欧美日韩成人在线一区二区| 亚洲精品乱码久久久v下载方式| 精品午夜福利在线看| 日韩一区二区视频免费看| 亚洲婷婷狠狠爱综合网| 国产成人精品久久久久久| 国产黄色视频一区二区在线观看| 亚洲国产av新网站| 国产av一区二区精品久久| 一区二区三区四区激情视频| 插逼视频在线观看| 亚洲国产欧美日韩在线播放| 女人精品久久久久毛片| 秋霞伦理黄片| a级毛片免费高清观看在线播放| 看十八女毛片水多多多| 亚洲国产色片| 美女国产视频在线观看| h视频一区二区三区| 91在线精品国自产拍蜜月| 99精国产麻豆久久婷婷| 成人二区视频| 一本—道久久a久久精品蜜桃钙片| 赤兔流量卡办理| 99久国产av精品国产电影| 国产黄频视频在线观看| 极品少妇高潮喷水抽搐|