Detecting Anomalous Trajectories from Highway Traffic Data

نویسندگان

  • Fan Jiang
  • Sotirios A. Tsaftaris
  • Ying Wu
  • Aggelos K. Katsaggelos
چکیده

In this paper we modify our unsupervised anomaly detection algorithm [1,2] and apply it to highway traffic anomaly analysis. We propose a method to identify anomalies under a probabilistic framework. Instead of determining anomalies based on the size of each cluster, they are determined in a probabilistic framework. Moreover, we present our findings on using different features when analyzing real highway vehicle trajectory data. Based on real highway traffic video data we demonstrate that the inclusion of certain features, brings us closer to identifying events that are both anomalous and abnormal (based on driving rules).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Anomalous Trajectories and Behavior Patterns Using Hierarchical Clustering from Taxi GPS Data

Anomalous taxi trajectories are those chosen by a small number of drivers that are different from the regular choices of other drivers. These anomalous driving trajectories provide us an opportunity to extract driver or passenger behaviors and monitor adverse urban traffic events. Because various trajectory clustering methods have previously proven to be an effective means to analyze similariti...

متن کامل

Real-time traffic incident detection using a probabilistic topic model

Traffic congestion occurs frequently in urban settings, and is not always caused by traffic incidents. In this paper, we propose a simple method for detecting traffic incidents from probe-car data by identifying unusual events that distinguish incidents from spontaneous congestion. First, we introduce a traffic state model based on a probabilistic topic model to describe the traffic states for ...

متن کامل

Detecting anomalies in people's trajectories using spectral graph analysis

1077-3142/$ see front matter 2011 Elsevier Inc. A doi:10.1016/j.cviu.2011.03.003 ⇑ Corresponding author. E-mail address: [email protected] (A. Prati) Video surveillance is becoming the technology of choice for monitoring crowded areas for security threats. While video provides ample information for human inspectors, there is a great need for robust automated techniques that can efficientl...

متن کامل

Traffic Flow Characteristics of Isolated Off-ramps in Iranian Expressways

The purpose of this study was to investigate traffic flow characteristics at off-ramp junctions in Iranian expressways. The study was conducted on the traffic behavior in isolated off-ramp vicinity of 6-lane expressways. The database consisted of traffic flow and traffic speed information extracted from videotapes. The relationship between diverging traffic flow in the right lane of expressway ...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009