**Surveillance services**

various types of sensing devices such as CCD surveillance cameras, QR/barcode scanners, localization equipment (NFC tags, WiFi beacons, etc), RFID scanners, etc., (b) processing units, both centralized and/or distributed, and (c) terminal devices such as mobile phones/tablets, computers, screens, electric signs, etc. (**Figure 24**). Each sensor device may pre-process the acquired raw data (distributed processing) and the results are gathered on a central cloud-computing infrastructure consisting of independent but co-operative intelligent component each one dedicated for processing data and producing a specific intelligent response for the system. Moreover, the output is transferred to terminal devices. This processing

The intelligent services are also responsible for automating the monitoring procedure and enhancing visitors' experience. Therefore, we propose two types of

These services aim at monitoring visitors' behavior, profile, and interactions and provide information that could facilitate their purpose of visit and indicate services

procedure consists of the following steps (**Figure 25**).

**Assistance services**

*Back-end intelligence system architecture.*

*Deep Learning Applications*

**Figure 24.**

**Figure 25.**

**136**

*Flow of data from sensors to the cloud or terminal devices.*

services: (a) *Assistance services* and (b) *Surveillance services.*

These services aim at monitoring visitors' position and behavior and automatically detect incidents of significant interest such as malicious behavior, anomalous crowd trajectory flow etc. This solution is expected to enhance surveillance procedure for large-scale circumstances where it is demanded in real time, the accurate surveillance of a massive crowd. Indicatively we suggest two surveillance services: Suspicious unattended luggage incidents detection and suspicious visitor loitering detection.

