计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 425-429.doi: 10.11896/j.issn.1002-137X.2016.6A.101

• 数据挖掘 • 上一篇    下一篇

一种利用不完整数据检测交通异常的方法

王玉玲,任永功   

  1. 辽宁师范大学计算机与信息技术学院 大连116029,辽宁师范大学计算机与信息技术学院 大连116029
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(F020806),辽宁省高等学校优秀人才支持计划项目(LR2015033),辽宁省科技计划项目(2013405003),大连市科技计划项目(2013A16GX116)资助

Method of Traffic Anomaly Detection with Incomplete Data

WANG Yu-ling and REN Yong-gong   

  • Online:2018-11-14 Published:2018-11-14

摘要: 城市化进程的加快带来了严重的交通问题,检测交通异常成为数据挖掘领域的热点之一。传统道路管理主要是应用视频监控,使得处理交通问题的效率受限。鉴于上述原因,提出了一种利用不完整数据检测交通异常的方法(Traffic Anomaly Detection,TAD)。首先,利用相关性聚类从手机数据中获取车辆密度信息,降低处理不完整数据的计算开销;然后,设计一个自适应无参数检测算法,根据手机呼叫量变化率捕捉车辆的分散式动态异常,以解决道路状况不确定性难题;最后,提出异常轨迹算法来追踪异常分布路线并预测影响范围,提高异常检测效率。实验结果表明,TAD方法在不同的实验环境下能够有效地检测交通异常,与现有算法相比,所提算法在有效性和伸缩性上效果更好。

关键词: 异常检测,不完整数据,手机数据,异常轨迹

Abstract: Development of urbanization process has brought serious traffic problems,and traffic anomaly detection becomes one of hot spots in the field of data mining.The traditional traffic management mainly uses video monitoring which has a limited efficiency for handling traffic problems.A method of traffic anomaly detection with incomplete data(Traffic Anomaly Detection,TAD) was proposed in this paper.Firstly,the correlation clustering obtains vehicle density information from mobile phone data and reduces the computation costs of processing incomplete data.Secondly,an adaptive parameter-free detection algorithm is designed to capture the distributed dynamic anomalies with phone call volume change rate on the roads,solving the uncertainty problem of road condition.Finally,anomaly trajectory algorithm is devised to retrieve anomaly distribution route and forecast influence scope,improving the efficiency of anomaly detection.Experimental results show that TAD methods can effectively detect abnormal traffic in different experimental conditions and our algorithm is better in efficiency and scalability compared with existing algorithms.

Key words: Anomaly detection,Incomplete data,Mobile phone data,Anomaly trajectory

[1] Liu Si-yuan,Chen Lei,Ni L M.Anomaly detection from incomeplete data[J].ACM Transactions on Knowledge Discovery from Data,2014,9(2):1-22
[2] 黄凯奇,陈晓棠.智能视频监控技术[J].计算机学报,2014,7(49):1093-1118
[3] Faloutsos B C,Plant C.Outlier-robust clustering using inde-pendent components[C]∥ Proceedings of the 34th ACM SIGMOD International Conference on Management of Data.Vancouver B C.Canada,2008:185-198
[4] DiLorenzo C G,Liu L.Estimating origin destination flows using opportunistically collected mobile phone location data from one million users in Boston Metropolitan Area[J].IEEE Pervasive Computing,2011,1(10):109-133
[5] Kumar C R,Tomkins A.Evolutionary clustering[C]∥Procee-dings of the 12th ACM SIGKDD International Conference on knowledge Discovery and Data.Philadelphia,USA,2006:554-560
[6] Aggarwal,Yu P S.A framework for clustering uncertain datastreams[C]∥Proceedings of the IEEE 24thInternatiional Conference on Data Engineering.New York,USA,2008:150-159
[7] Leung W T,Lee D L,Lee W C.Acollaborative location recommendation framework based on co-clustering[C]∥Proceedings of the 34th ACM SIGIR Conference on Research and Development in Information Retrieval.2011:305-314
[8] Singh,Sayal M.Privately detecting bursts in streaming,distributed time series data[J].Data and Knowledge Engineering,2009,8(6):509-530
[9] Chen B L,Fu A W C.Efficient anomaly monitoring over moving object trajectory streams[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:159-168
[10] Zeng S D,Chen H.Burst detection from multiple data streams:A network-based approach[J].IEEE Transactions on Systems,Man,and Cybernetics,2010,0(3):258-267
[11] Ros A I,Assogba Y.Detecting outlier sections in us congressional legislation[C]∥Proceedings of the 34th ACM SIGIR Conference.2011:235-244
[12] Pang X,Chawla S,Liu W,et al.On detection of emerging ano-malous traffic patterns using GPS data[J].Data and Knowledge Engineering,2013,27:509-530
[13] Chawla S,Zheng Yu,Hu Jia-feng.Inferring the root cause in road traffic anomalies[C]∥Proceedings of the IEEE 12th International Conference on Data Mining.Beijing,China,2012
[14] Xiong G H,Liu C,Zhou Z H.A taxi driving fraud detection system[C]∥Proceedings of the IEEE 11th International Confe-rence on Data Mining.2011:181-190
[15] Chen M T,Oria O V.Robust and fast similarity search for mo-ving object trajectories[C]∥Proceedings of the 31th ACM SIGMOD International Conference on Management of Data,Baltimore,USA,2005:491-502
[16] Monreale F,Tresarti P R,Giannotti F.WhereNext:A location predictor on trajectory pattern mining[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Paris,France,2009:637-646
[17] Liu Y,Ni L,Fan J.Towards mobility-based clustering[C]∥Proceedings of the 16th ACM SIGKDD International Confe-rence on Knowledge Discovery and Data Mining.Washington DC,USA,2010
[18] Aggarwal C,Yu P S.A framework for clustering uncertain data streams[C]∥Proceedings of the IEEE 24th International Conference on Data Engineering.New York,USA,2008:150-159
[19] Klan K D.Adaptive burst detection in a stream engine[J].Proceedings of the 24th ACM Symposium on Applied Computing,2009,8(12):1511-1515

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!