Inicio  /  Algorithms  /  Vol: 13 Par: 9 (2020)  /  Artículo
ARTÍCULO
TITULO

Detecting Traffic Incidents Using Persistence Diagrams

Eric S. Weber    
Steven N. Harding and Lee Przybylski    

Resumen

We introduce a novel methodology for anomaly detection in time-series data. The method uses persistence diagrams and bottleneck distances to identify anomalies. Specifically, we generate multiple predictors by randomly bagging the data (reference bags), then for each data point replacing the data point for a randomly chosen point in each bag (modified bags). The predictors then are the set of bottleneck distances for the reference/modified bag pairs. We prove the stability of the predictors as the number of bags increases. We apply our methodology to traffic data and measure the performance for identifying known incidents.

 Artículos similares

       
 
Francisco Javier Moreno Arboleda, Georgia Garani and Simon Zea Gallego    
In this paper, a measure is proposed that, based on the trajectories of moving objects, computes the speed limit rate in each of the cells in which a region is segmented (the space where the objects move). The time is also segmented into intervals. In th... ver más
Revista: Informatics

 
Zihao Liu, Zhaolin Wu, Zhongyi Zheng, Xianda Yu, Xiaoxuan Bu and Wenjun Zhang    
In recent years, the increasing volume and complexity of ship traffic has raised the probability of collision accidents in ports, waterways, and coastal waters. Due to the relative rarity of collision accidents, near misses have been used in the research... ver más

 
Xinqiang Chen, Chenxin Wei, Zhengang Xin, Jiansen Zhao and Jiangfeng Xian    
Maritime ship detection plays a crucial role in smart ships and intelligent transportation systems. However, adverse maritime weather conditions, such as rain streak and fog, can significantly impair the performance of visual systems for maritime traffic... ver más

 
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences

 
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov    
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num... ver más
Revista: Applied Sciences