999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Arithmetic Optimization with Deep Learning Enabled Anomaly Detection in Smart City

2022-11-10 02:28:52MahmoudRagabandMahaFaroukSabir
Computers Materials&Continua 2022年10期

Mahmoud Ragaband Maha Farouk S.Sabir

1Information Technology Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia

2Centre of Artificial Intelligence for Precision Medicines,King Abdulaziz University,Jeddah,21589,Saudi Arabia

3Mathematics Department,Faculty of Science,Al-Azhar University,Naser City,11884,Cairo,Egypt

4Information Systems Department,Faculty of Computing and Information Technology King Abdulaziz University,Jeddah,21589,Saudi Arabia

Abstract:In recent years,Smart City Infrastructures(SCI)have become familiar whereas intelligent models have been designed to improve the quality of living in smart cities.Simultaneously,anomaly detection in SCI has become a hot research topic and is widely explored to enhance the safety of pedestrians.The increasing popularity of video surveillance system and drastic increase in the amount of collected videos make the conventional physical investigation method to identify abnormal actions,a laborious process.In this background,Deep Learning(DL)models can be used in the detection of anomalies found through video surveillance systems.The current research paper develops an Internet of Things Assisted Deep Learning Enabled Anomaly Detection Technique for Smart City Infrastructures,named(IoTAD-SCI)technique.The aim of the proposed IoTAD-SCI technique is to mainly identify the existence of anomalies in smart city environment.Besides,IoTAD-SCI technique involves Deep Consensus Network (DCN) model design to detect the anomalies in input video frames.In addition,Arithmetic Optimization Algorithm (AOA)is executed to tune the hyperparameters of the DCN model.Moreover,ID3 classifier is also utilized to classify the identified objects in different classes.The experimental analysis was conducted for the proposed IoTADSCI technique upon benchmark UCSD anomaly detection dataset and the results were inspected under different measures.The simulation results infer the superiority of the proposed IoTAD-SCI technique under different metrics.

Keywords:Object detection;anomaly detection;smart city infrastructure;deep learning;parameter tuning

1 Introduction

Video surveillance systems have been widely installed in the recent years for monitoring the crowd at public places.The video information generated by such systems is complex,huge and in different formats while Traditional manual analysis to label abnormal events in such data is challenging and time-consuming in nature.Thus,a smart surveillance scheme and a hotspot of Computer Vision(CV) applications and researches are immediately required to detect and recognize anomalies[1].But localization and anomaly detection remain a challenge in smart video surveillance.However,considerable development has occurred in the recent years in terms of behavior modeling,anomaly measuring,and feature extraction.One of the primary challenges in anomaly detection is that the description of the anomaly is indeterminate in almost all real-time surveillance videos.Generally,an event that is considerably distinct from general event is classified as anomaly.In other terms,anomalies are determined as common events rather than details of themselves or classifications[2].An event which is anomalous in one scene (people running) may not be necessarily anomalous in another scene.This is because the common event in another scene might include the person running,while the initial scene does not.Thus,anomaly is composed of inadequate similarities and sizes to be efficiently modelled.Essentially,anomaly detection for crowd scenes has an innovation detection that is called a one-class,semi-supervised learning problem[3].This is because the training data of the current dataset comprises of common events,where the information to be confirmed has abnormal as well as normal events.Fig.1 illustrates the structure of smart city.

Figure 1:Smart city infrastructure

Several CV methods that depends upon work,have been presented earlier.These methods focus on the operation including scene learning,data acquisition,behavioural learning,feature extraction,activity learning,etc[4].The main objective is to calculate the operation that includes video processing model,anomaly predictive approach,scene detection,human behavior learning,vehicle prediction,multiple camera-based challenges and schemes,vehicle observation,traffic observation,activity examination,etc.Now,anomalous prediction is considered as a sub-region of behavioral learning in the captured visual scene[5].The availability of video captured in public places has led to anomalous prediction and the simulation of video analysis.Furthermore,anomaly prediction methods understand to differentiate the normal behavior through training.Any important changes that deviate from common behavior are considered as anomalous.Sudden dispersion of people from a crowd,presence of vehicles on pathways,jaywalking,person fainting when walking,U-turn of vehicles at red signals and signal bypasses at a traffic junction are some of the instances of anomalies[6].Recently,Deep Learning (DL) method has attained an outstanding achievement in a number of CV methods that include object detection and classification since the application depends upon supervised learning.

The current research work develops an Internet of Things Assisted Deep Learning Enabled Anomaly Detection Technique for Smart City Infrastructures,abbreviated as(IoTAD-SCI)technique.The proposed IoTAD-SCI technique involves the design of Deep Consensus Network(DCN)model to detect the anomalies in input video frames.In addition,Arithmetic Optimization Algorithm(AOA)is implemented to fine tune the hyperparameters of DCN technique.Moreover,ID3 classifier is also utilized to classify the identified objects under different classes.The experimental analysis was conducted for IoTAD-SCI technique upon benchmark UCSD anomaly detection dataset and the results were inspected under different measures.

2 Related works

Li et al.[7]proposed an anomaly detection model and video anomaly event feature.At first,dense optical flow of video was attained and the data of optical flow was converted into histogram features of the optical flow.Next,the space-time cube of video was created using space-time relation of the video.At last,sparse depiction technique was utilized to model the entire procedure.Font et al.[8]used real-time information from smart cities of Barcelona to identify typical attacks and simulate WSN as and when required.Next,the researchers compared the commonly-utilized anomaly detection methods that disclose such attacks.The algorithm was evaluated under distinct necessities on access network data.

Alrashdi et al.[9]presented an Anomalous Detection-IoT(AD-IoT)method i.e.,a smart anomalous detection-based RF-ML method.The presented method was able to identify the compromised IoT devices in distribution fog nodes efficiently.To estimate the presented method,the study employed current datasets to demonstrate the accuracy of the algorithm.Chackravarthy et al.[10]introduced a NN approach as well as a Hybrid Deep Learning method to analyze the video stream data.The presented method was capable of identifying and assessing the criminal activities quickly.This sequentially reduced the manual workload on supervisors.While the method was executed through smart city framework,it also allowed one to an adaptable and efficient crime detection method.

Kang et al.[11]introduced an NN-based model which integrates the idea of AUC using Multi-Instance Learning(MIL)model.The authors created MI-AUC method which forecasts high anomaly scores for anomalous segments.Moreover,sparsity and temporal smoothness limitations were also employed in this study from loss function for effective anomalous detection.Chen et al.[12]designed an architecture-based bi-directional prediction that forecasts a similar target frame by both forward and backward predictive subsystems,correspondingly.Next,the loss function is formulated on the basis of bi-directional predictive frame and real-time target frame.Additionally,an anomaly score assessment model-based sliding window system was presented in this study that focuses on the foreground of predictive error map.

Ullah et al.[13]developed an effective deep feature-based intelligent anomaly detection method.In the presented method,the spatiotemporal features were initially extracted from a sequence of frames by passing everyone to a pre-trained CNN method.The feature extracted from the series of frames is beneficial in terms of capturing anomalous actions.Next,the extracted deep feature is passed onto multilayer Bi-LSTM method that could precisely categorize the ongoing normal or anomalous events in complicated surveillance scenes.

3 The Proposed Model

In current study,an effective IoTAD-SCI technique is developed to identify the presence of anomalies in smart city environment.The proposed IoTAD-SCI technique involves the design of DCN technique to detect anomalies in input video frames.Followed by,AOA is applied to fine tune the hyperparameters of DCN technique whereas ID3 classifier is utilized to classify the identified objects under different classes.

3.1 Object Detection Using DCN Model

In initial stage,DCN model is applied for the identification of objects that exist in input video frame.DCN has an analogous structure alike RetinaNet[14].It makes use of Feature Pyramid Network (FPN) for feature extraction at different scales from ResNet-50 mainstream by following squeeze-and-excite method for the residual.In order to detect smaller objects,higher-resolution variants of FPN is employed in this study.It is utilized for Leaky ReLU activation function and group normalization.The feature extraction maps,at all the scales,are transmitted to Centroid Proposal Network (CPN).In comparison with Region Proposal Network (RPN) that predicts the bounding boxes,CPN forecasts a subset of centroidsv′with respective confidence score(v′).When compared with RetinaNet,CPN does not share the weight at all the scales to capture distinct representations.This is because each image within the microscopy data sets has a similar magnification.Like RPN in RetinaNet,anchor is utilized in this study as prior,but with a distinct configuration.

3.2 Hyperparameter Tuning Using AOA

In order to proficiently adjust the hyperparameters of DCN model,AOA is utilized.AOA is stimulated on the basis of basic arithmetic operators used in mathematics.In line with other optimization algorithms,AOA mainly operates on two searching processes namely,exploration and exploration[16],depending upon the arithmetic operators like-,+,*,and/.Initially,AOA produces a collection ofNsolutions(agent).And every individual solution indicates a solution for the applied problem.Therefore,the solution or agent indicatesXpopulation which is given below:

wherer3indicates an arbitrary number in the range of zero and one.Then,the agent update procedure is carried out using AOA operators.The process involved in AOA is shown in Algorithm 1.

Algorithm 1:Pseudocode of AOA Input:Initialize parameters α,control function N and maximal iterations Mt.Determine the agent’s initial value Xii=1,...N·while(t <Mt)do Determine the fitness of all agents Compute optimal agent Xb.Upgrade the MOA and MOP for i=1 to N do for j =1 to Dim do Upgrade:r1,r2,and r3 values if r1 >MOA then Exploration procedure Upgrade Xi.else Exploitation procedure Upgrade Xi.end if end for end for t=t+1 end while Display the optimal agent(Xb).

3.3 ID3 Based Classification Model

Once the objects are detected in input frame,ID3 classifier is applied to classify the objects as either anomalies or non-anomalies.Id3 method selects the testing features by comparing and calculating their data gains.Here,Srepresents the subset of data instances.Assume the class attributeChasmdistinct values that denotemdistinct class label,Ci(i=1,2,...,m).Here,Sirepresents the number of samples from classCi(i=1,2,...,m).The predicted number of data required to classifySis shown below.

The less data amount needed;the more purity of sub-data set is.

Whilepijdenotes the probability of samples inSjthat belongs to the classCi.I(s1j,s2j,...,smj)implies the average number of data required to identify the class labels for each instance inSj.The data gain ofAis determined as follows.

viz.,the number of new data needed minus the number of original data needed.Choose the attributes with maximalInfoGain(A)as testing attributes that are allocated as internal node in a decision tree.In this method,the required amount of data to classify the samples is minimal.

4 Experimental Results and Discussion

The experimental analysis was conducted upon the proposed IoTAD-SCI technique using UCSD dataset[19].In this study,two testbeds namely,Test007 and Test005 were used for simulation and these datasets comprise a total of 360 frames with 12 s duration.Fig.2 demonstrates the sample test images with ground truth of the anomalies that exist in the image.

Figure 2:(Continued)

Figure 2:Sample images(a and c)ground truth(b and d)

Fig.3 visualizes the outcome of the proposed IoTAD-SCI technique on test image.From the figure,it can be understood that the presented IoTAD-SCI technique identified the presence of two anomalies namely‘bicycle and truck’in an efficient manner.

Figure 3:Anomaly detected image

Tab.1 provides the results of detection analysis accomplished by IoTAD-SCI technique on Test004 testbed.The results indicate that the presented IoTAD-SCI technique effectually identified all the anomalies with maximum accuracy.For instance,on 142 frames,IoTAD-SCI technique identified anomalies[1,2]withaccyvalues such as 99.69% and 99.68% respectively.Likewise,on 146 frames,the presented IoTAD-SCI technique recognized the anomalies 1 and 2 with accuracy values such as 99.08%and 98.99%correspondingly.Moreover,on 179 frames,the proposed IoTAD-SCI technique categorized the anomalies[1,2]withaccyvalues such as 99.86%and 99.78%respectively.At last,on 180 frames,IoTAD-SCI technique identified the anomalies[1,2]withaccyvalues such as 99.76%and 99.91%correspondingly.

Table 1:Accuracy of anomalies in Test004 sequences

A brief comparative anomaly detection analysis was conducted between the proposed IoTADSCI technique and other methods and the results are shown in Fig.4.The outcomes report that the proposed IoTAD-SCI approach achieved effectual outcomes under all the frames.For instance,with 142 frames,IoTAD-SCI technique offered a high accuracy of 99.69%whereas DLAD,RSCNN,FRCNN,and MDT techniques obtained the least accuracy values namely,99.37%,98.49%,93.21%,and 81.39%.Concurrently,with 180 frames,the proposed IoTAD-SCI technique achieved an increased accuracy of 99.84%,whereas DLAD,RSCNN,FRCNN,and MDT techniques reached low accuracy values such as 99.19%,99.14%,86.08%,and 85.84%respectively.

Figure 4:Accuracy analysis of IoTAD-SCI technique under test004 testbed

Fig.5 highlights the ROC analysis results achieved by IoTAD-SCI technique on test004 testbed.The figure reports the enhanced anomaly detection outcomes of IoTAD-SCI technique with an increased ROC value of 99.9452.

Figure 5:ROC analysis of IoTAD-SCI technique under test004 testbed

Tab.2 offers the results of detection analysis accomplished by IoTAD-SCI approach on Test007 testbed.The results indicate that the proposed IoTAD-SCI technique effectually identified all the anomalies with maximum accuracy.For instance,on 040 frames,IoTAD-SCI methodology identified the anomalies[1,2]withaccyvalues such as 98.47% and 98.47% correspondingly.Besides,on 075 frames,IoTAD-SCI algorithm recognized the anomalies[1,2]withaccyvalues being 96.49% and 96.59% correspondingly.Furthermore,on 135 frames,the proposed IoTAD-SCI technique categorized the anomalies[1,2]with the accuracy values such as 99.75%and 99.67%respectively.Eventually,on 180 frames,IoTAD-SCI approach identified the anomalies 1 and 2 withaccyvalues such as 89.68%and 89.65%correspondingly.

Table 2:Accuracy of anomalies in Test007 Sequences

A detailed comparative anomaly detection analysis was conducted upon IoTAD-SCI approach against other techniques and the results are shown in Fig.6.The outcomes demonstrate that the proposed IoTAD-SCI system produced effective outcomes under all the frames.For sample,with 042 frames,the presented IoTAD-SCI technique offered a high accuracy of 98.47%,whereas DLAD,RSCNN,FRCNN,and MDT techniques attained the minimal accuracy values namely,97.52%,94.62%,89.98%,and 85.17%respectively.In addition,with 180 frames,IoTAD-SCI approach offered a maximum accuracy of 89.67%,whereas DLAD,RSCNN,FRCNN,and MDT methodologies reached low accuracy values such as 88.58%,83.65%,81.65%,and 80.88%correspondingly.

Figure 6:Accuracy analysis of IoTAD-SCI technique under test007 testbed

Fig.7 demonstrates the ROC analysis graph generated by IoTAD-SCI approach upon test007 testbed.The figure reveals the improved anomaly detection outcomes of IoTAD-SCI approach with a maximum ROC of 99.9452.

Figure 7:ROC analysis of IoTAD-SCI technique under test007 testbed

Figs.8 and 9 show the average anomaly detection outcomes of the presented IoTAD-SCI technique against recent methods on two testbeds.The figure reports that the proposed IoTADSCI technique has the ability to effectively identify the anomalies on both testbeds.For instance,with Test004 testbed,IoTAD-SCI technique reached a high average accuracy value i.e.,99.70%whereas DLAD,RSCNN,FRCNN,and MDT techniques obtained low average accuracy values such as 99.22%,98.84%,86.60%,and 81.27% respectively.Similarly,with Test007 testbed,the proposed IoTAD-SCI technique reached an increased average accuracy of 96%,whereas DLAD,RSCNN,FRCNN,and MDT techniques achieved low average accuracy values namely,95.01%,91.84%,88.34%,and 84.03%.

Figure 8:Average accuracy analysis results of IoTAD-SCI technique under test004 testbed

Figure 9:Average accuracy analysis results of IoTAD-SCI technique under test007 testbed

Finally,running time analysis was conducted between the proposed IoTAD-SCI system and the existing models and the results are shown in Tab.3 and Fig.10[20-22].The results demonstrate that the presented IoTAD-SCI technique required minimal running time compared to other techniques.For instance,with Test004 testbed,the IoTAD-SCI technique offered a minimum running time of 10.159 s,whereas DLAD,RSCNN,FRCNN,and MDT techniques demanded the maximum running times such as 10.825,12.355,12.403 and 12.463 s respectively.At the same time,with Test007 testbed,the proposed IoTAD-SCI technique produced a low running time of 10.504s,whereas DLAD,RSCNN,FRCNN,and MDT techniques attained a maximum running time of 11.043,11.480,11.876 and 12.000 s respectively.Based on the results and discussion made above,it can be understood that the proposed IoTAD-SCI technique is superior compared to existing techniques.

Table 3:Running time analysis results of IoTAD-SCI technique against existing methods

Figure 10:Running time analysis of IoTAD-SCI technique with recent algorithms

5 Conclusion

In current study,an effective IoTAD-SCI technique has been developed to identify the presence of anomalies in smart city environment.The proposed IoTAD-SCI technique involves the design of DCN technique to detect the anomalies from input video frames.Followed by,AOA is applied to fine tune the hyperparameters of DCN technique whereas ID3 classifier is utilized to classify the identified objects under different classes.The experimental analysis results of IoTAD-SCI technique against the benchmark UCSD anomaly detection dataset were inspected under different measures.The simulation outcomes infer the superiority of the proposed IoTAD-SCI technique under different metrics compared to other recent approaches.As a part of future work,IoTAD-SCI technique can be realized in real time environment.

Acknowledgement:The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPIP-1308-612-1442)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.

Funding Statement:This project was supported financially by Institution Fund projects under grant no.(IFPIP-1308-612-1442).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产色伊人| 亚洲成a人在线播放www| 亚洲精品视频在线观看视频| 亚洲欧美精品一中文字幕| 色偷偷一区二区三区| 国产成人精品免费视频大全五级| 亚洲欧洲日韩久久狠狠爱| 这里只有精品在线| av无码一区二区三区在线| 91精品aⅴ无码中文字字幕蜜桃| 亚洲浓毛av| 香港一级毛片免费看| 亚洲浓毛av| 手机在线国产精品| 1024你懂的国产精品| 手机在线国产精品| 91无码人妻精品一区二区蜜桃| 一区二区三区四区日韩| 精品一区二区三区自慰喷水| 欧美日韩中文国产va另类| 亚洲欧美成人综合| 亚洲男人天堂网址| 国产乱人伦偷精品视频AAA| 国产三级韩国三级理| 欧美日韩一区二区在线免费观看 | 99久久婷婷国产综合精| 色综合天天视频在线观看| 成人午夜视频网站| 高清不卡毛片| 欧美亚洲欧美| 亚洲色中色| 亚洲国产精品日韩av专区| 欧美日韩一区二区三区在线视频| 久热99这里只有精品视频6| 91精品专区国产盗摄| 黄色成年视频| 亚洲免费福利视频| 亚洲欧州色色免费AV| 亚洲网综合| 国产欧美日本在线观看| 亚洲成a人片77777在线播放| 国产精品页| 成年人福利视频| 亚洲av无码成人专区| 色综合激情网| 国产精品播放| 欧美精品H在线播放| 凹凸精品免费精品视频| 人妻无码一区二区视频| 有专无码视频| 性视频久久| 狠狠躁天天躁夜夜躁婷婷| 亚洲欧美日韩天堂| 成人午夜视频在线| 91精品免费高清在线| 国语少妇高潮| 亚洲福利一区二区三区| 高清国产在线| 久久人体视频| 国产打屁股免费区网站| 色噜噜综合网| 久久香蕉国产线| 97视频免费在线观看| 欧美高清三区| 一本久道久久综合多人| 丝袜亚洲综合| 国产在线视频自拍| 亚洲色图欧美在线| 国产精品第5页| 欧美第一页在线| 日韩毛片视频| 99成人在线观看| 一级黄色欧美| 欧美亚洲一区二区三区导航| 欧美成人a∨视频免费观看| 日本人又色又爽的视频| 大学生久久香蕉国产线观看| 色婷婷国产精品视频| 亚洲黄色成人| 无码区日韩专区免费系列| 久久性妇女精品免费| 91在线播放国产|