计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 425-429.doi: 10.11896/j.issn.1002-137X.2016.6A.101
王玉玲,任永功
WANG Yu-ling and REN Yong-gong
摘要: 城市化进程的加快带来了严重的交通问题,检测交通异常成为数据挖掘领域的热点之一。传统道路管理主要是应用视频监控,使得处理交通问题的效率受限。鉴于上述原因,提出了一种利用不完整数据检测交通异常的方法(Traffic Anomaly Detection,TAD)。首先,利用相关性聚类从手机数据中获取车辆密度信息,降低处理不完整数据的计算开销;然后,设计一个自适应无参数检测算法,根据手机呼叫量变化率捕捉车辆的分散式动态异常,以解决道路状况不确定性难题;最后,提出异常轨迹算法来追踪异常分布路线并预测影响范围,提高异常检测效率。实验结果表明,TAD方法在不同的实验环境下能够有效地检测交通异常,与现有算法相比,所提算法在有效性和伸缩性上效果更好。
[1] Liu Si-yuan,Chen Lei,Ni L M.Anomaly detection from incomeplete data[J].ACM Transactions on Knowledge Discovery from Data,2014,9(2):1-22 [2] 黄凯奇,陈晓棠.智能视频监控技术[J].计算机学报,2014,7(49):1093-1118 [3] Faloutsos B C,Plant C.Outlier-robust clustering using inde-pendent components[C]∥ Proceedings of the 34th ACM SIGMOD International Conference on Management of Data.Vancouver B C.Canada,2008:185-198 [4] DiLorenzo C G,Liu L.Estimating origin destination flows using opportunistically collected mobile phone location data from one million users in Boston Metropolitan Area[J].IEEE Pervasive Computing,2011,1(10):109-133 [5] Kumar C R,Tomkins A.Evolutionary clustering[C]∥Procee-dings of the 12th ACM SIGKDD International Conference on knowledge Discovery and Data.Philadelphia,USA,2006:554-560 [6] Aggarwal,Yu P S.A framework for clustering uncertain datastreams[C]∥Proceedings of the IEEE 24thInternatiional Conference on Data Engineering.New York,USA,2008:150-159 [7] Leung W T,Lee D L,Lee W C.Acollaborative location recommendation framework based on co-clustering[C]∥Proceedings of the 34th ACM SIGIR Conference on Research and Development in Information Retrieval.2011:305-314 [8] Singh,Sayal M.Privately detecting bursts in streaming,distributed time series data[J].Data and Knowledge Engineering,2009,8(6):509-530 [9] Chen B L,Fu A W C.Efficient anomaly monitoring over moving object trajectory streams[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:159-168 [10] Zeng S D,Chen H.Burst detection from multiple data streams:A network-based approach[J].IEEE Transactions on Systems,Man,and Cybernetics,2010,0(3):258-267 [11] Ros A I,Assogba Y.Detecting outlier sections in us congressional legislation[C]∥Proceedings of the 34th ACM SIGIR Conference.2011:235-244 [12] Pang X,Chawla S,Liu W,et al.On detection of emerging ano-malous traffic patterns using GPS data[J].Data and Knowledge Engineering,2013,27:509-530 [13] Chawla S,Zheng Yu,Hu Jia-feng.Inferring the root cause in road traffic anomalies[C]∥Proceedings of the IEEE 12th International Conference on Data Mining.Beijing,China,2012 [14] Xiong G H,Liu C,Zhou Z H.A taxi driving fraud detection system[C]∥Proceedings of the IEEE 11th International Confe-rence on Data Mining.2011:181-190 [15] Chen M T,Oria O V.Robust and fast similarity search for mo-ving object trajectories[C]∥Proceedings of the 31th ACM SIGMOD International Conference on Management of Data,Baltimore,USA,2005:491-502 [16] Monreale F,Tresarti P R,Giannotti F.WhereNext:A location predictor on trajectory pattern mining[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Paris,France,2009:637-646 [17] Liu Y,Ni L,Fan J.Towards mobility-based clustering[C]∥Proceedings of the 16th ACM SIGKDD International Confe-rence on Knowledge Discovery and Data Mining.Washington DC,USA,2010 [18] Aggarwal C,Yu P S.A framework for clustering uncertain data streams[C]∥Proceedings of the IEEE 24th International Conference on Data Engineering.New York,USA,2008:150-159 [19] Klan K D.Adaptive burst detection in a stream engine[J].Proceedings of the 24th ACM Symposium on Applied Computing,2009,8(12):1511-1515 |
No related articles found! |
|