1,275 research outputs found

    Trip destination prediction based on past GPS log using a Hidden Markov Model

    Get PDF
    In this paper, a system based on the generation of a Hidden Markov Model from the past GPS log and cur- rent location is presented to predict a user’s destination when beginning a new trip. This approach dras- tically reduces the number of points supplied by the GPS device and it permits a ‘‘support-map” to be generated in which the main characteristics of the trips for each user are taken into account. Hence, in contrast with other similar approaches, total independence from a street-map database is achievedMinisterio de Educación y Ciencia TSI2006–13390-C02–02Junta de Andalucia TIC214

    Modeling Taxi Drivers' Behaviour for the Next Destination Prediction

    Full text link
    In this paper, we study how to model taxi drivers' behaviour and geographical information for an interesting and challenging task: the next destination prediction in a taxi journey. Predicting the next location is a well studied problem in human mobility, which finds several applications in real-world scenarios, from optimizing the efficiency of electronic dispatching systems to predicting and reducing the traffic jam. This task is normally modeled as a multiclass classification problem, where the goal is to select, among a set of already known locations, the next taxi destination. We present a Recurrent Neural Network (RNN) approach that models the taxi drivers' behaviour and encodes the semantics of visited locations by using geographical information from Location-Based Social Networks (LBSNs). In particular, RNNs are trained to predict the exact coordinates of the next destination, overcoming the problem of producing, in output, a limited set of locations, seen during the training phase. The proposed approach was tested on the ECML/PKDD Discovery Challenge 2015 dataset - based on the city of Porto -, obtaining better results with respect to the competition winner, whilst using less information, and on Manhattan and San Francisco datasets.Comment: preprint version of a paper submitted to IEEE Transactions on Intelligent Transportation System

    Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures

    Get PDF
    Usage-based insurance (UBI) is regarded as a promising way to provide accurate automotive insurance rates by analyzing the driving behaviors (e.g., speed, mileage, and harsh braking/accelerating) of drivers. The best practice that has been adopted by many insurance programs to protect users\u27 location privacy is the use of driving speed rather than GPS data. However, in this paper, we challenge this approach by presenting a novel speed-based location trajectory inference framework. The basic strategy of the proposed inference framework is motivated by the following observations. In practice, many environmental factors, such as real-time traffic and traffic regulations, can influence the driving speed. These factors provide side-channel information about the driving route, which can be exploited to infer the vehicle\u27s trace. We implement our discovered attack on a public data set in New Jersey. The experimental results show that the attacker has a nearly 60% probability of obtaining the real route if he chooses the top 10 candidate routes. To thwart the proposed attack, we design a privacy preserving scoring and data audition framework that enhances drivers\u27 control on location privacy without affecting the utility of UBI. Our defense framework can also detect users\u27 dishonest behavior (e.g., modification of speed data) via a probabilistic audition scheme. Extensive experimental results validate the effectiveness of the defense framework

    Towards sustainable transport: wireless detection of passenger trips on public transport buses

    Full text link
    An important problem in creating efficient public transport is obtaining data about the set of trips that passengers make, usually referred to as an Origin/Destination (OD) matrix. Obtaining this data is problematic and expensive in general, especially in the case of buses because on-board ticketing systems do not record where and when passengers get off a bus. In this paper we describe a novel and inexpensive system that uses off-the-shelf Bluetooth hardware to accurately record passenger journeys. Here we show how our system can be used to derive passenger OD matrices, and additionally we show how our data can be used to further improve public transport services.Comment: 13 pages, 4 figures, 1 tabl

    Mobility insights through consumer data: a case study of concessionary bus travel in the West Midlands

    Get PDF
    Current transport facilities are often built around efficiency and meeting the needs of the commuting population. These can therefore struggle to provide services suited to some of the most vulnerable members of society. In order to achieve an inclusive transport system, it is vital that transport authorities have access to detailed insights into the mobility needs and demands of different groups of the population. Increasingly, these transport authorities are making use of smart technologies and the resulting data to gain greater insight into transport users, and in turn inform decision making and policy planning. These smart technologies include automated fare collection (AFC) systems, which produce large volumes of detailed transport and mobility data from smart card transactions. To a lesser extent, retail datasets, such as loyalty card transaction data, have also been utilised. The spatiotemporal components of these data can provide valuable insight into the activity patterns of cardholders that may not be captured in traditional transport data. This thesis presents an exploration of these two forms of consumer data, with a focus on the older population in the West Midlands. Firstly, this thesis demonstrates how smart card data can be processed and analysed to provide detailed insights into the mobility patterns of concessionary bus users and how these relate to long-term changes in bus patronage recorded in the study area. Secondly, the extent to which loyalty card transaction data can be employed to understand retail behaviours and activity patterns is explored, with a focus on how these insights can be used to supplement and enhance the understanding of mobility gained from the smart card data. Finally, these insights are discussed in terms of the capacity of the current transport network to meet the mobility needs of the older population and the potential of consumer data for future transport-related research

    Destination Prediction by Trajectory Distribution Based Model

    Get PDF
    International audienceIn this paper we propose a new method to predict the final destination of vehicle trips based on their initial partial trajectories. We first review how we obtained clustering of trajectories that describes user behaviour. Then, we explain how we model main traffic flow patterns by a mixture of 2d Gaussian distributions. This yielded a density based clustering of locations, which produces a data driven grid of similar points within each pattern. We present how this model can be used to predict the final destination of a new trajectory based on their first locations using a two step procedure: We first assign the new trajectory to the clusters it mot likely belongs. Secondly, we use characteristics from trajectories inside these clusters to predict the final destination. Finally, we present experimental results of our methods for classification of trajectories and final destination prediction on datasets of timestamped GPS-Location of taxi trips. We test our methods on two different datasets, to assess the capacity of our method to adapt automatically to different subsets

    Leveraging Client Processing for Location Privacy in Mobile Local Search

    Get PDF
    Usage of mobile services is growing rapidly. Most Internet-based services targeted for PC based browsers now have mobile counterparts. These mobile counterparts often are enhanced when they use user\u27s location as one of the inputs. Even some PC-based services such as point of interest Search, Mapping, Airline tickets, and software download mirrors now use user\u27s location in order to enhance their services. Location-based services are exactly these, that take the user\u27s location as an input and enhance the experience based on that. With increased use of these services comes the increased risk to location privacy. The location is considered an attribute that user\u27s hold as important to their privacy. Compromise of one\u27s location, in other words, loss of location privacy can have several detrimental effects on the user ranging from trivial annoyance to unreasonable persecution. More and more companies in the Internet economy rely exclusively on the huge data sets they collect about users. The more detailed and accurate the data a company has about its users, the more valuable the company is considered. No wonder that these companies are often the same companies that offer these services for free. This gives them an opportunity to collect more accurate location information. Research community in the location privacy protection area had to reciprocate by modeling an adversary that could be the service provider itself. To further drive this point, we show that a well-equipped service provider can infer user\u27s location even if the location information is not directly available by using other information he collects about the user. There is no dearth of proposals of several protocols and algorithms that protect location privacy. A lot of these earlier proposals require a trusted third party to play as an intermediary between the service provider and the user. These protocols use anonymization and/or obfuscation techniques to protect user\u27s identity and/or location. This requirement of trusted third parties comes with its own complications and risks and makes these proposals impractical in real life scenarios. Thus it is preferable that protocols do not require a trusted third party. We look at existing proposals in the area of private information retrieval. We present a brief survey of several proposals in the literature and implement two representative algorithms. We run experiments using different sizes of databases to ascertain their practicability and performance features. We show that private information retrieval based protocols still have long ways to go before they become practical enough for local search applications. We propose location privacy preserving mechanisms that take advantage of the processing power of modern mobile devices and provide configurable levels of location privacy. We propose these techniques both in the single query scenario and multiple query scenario. In single query scenario, the user issues a query to the server and obtains the answer. In the multiple query scenario, the user keeps sending queries as she moves about in the area of interest. We show that the multiple query scenario increases the accuracy of adversary\u27s determination of user\u27s location, and hence improvements are needed to cope with this situation. So, we propose an extension of the single query scenario that addresses this riskier multiple query scenario, still maintaining the practicability and acceptable performance when implemented on a modern mobile device. Later we propose a technique based on differential privacy that is inspired by differential privacy in statistical databases. All three mechanisms proposed by us are implemented in realistic hardware or simulators, run against simulated but real life data and their characteristics ascertained to show that they are practical and ready for adaptation. This dissertation study the privacy issues for location-based services in mobile environment and proposes a set of new techniques that eliminate the need for a trusted third party by implementing efficient algorithms on modern mobile hardware

    Selective Trajectory Memory Network andits application in Vehicle DestinationPrediction

    Get PDF
    학위논문 (석사)-- 서울대학교 대학원 : 공과대학 산업공학과, 2019. 2. Cho, Sungzoon.Predicting efficiently the final destinations of moving vehicles can be of significant usefulness for several applications. Many probabilistic methods have been developed to address it but often include heavy feature engineering and do not generalize well to new datasets. To face these limitations, Deep-Learning models present the advantage of automating processing steps and can therefore be easily adapted to new input data. De Brébisson et al. proposed clustering based deep-learning approaches to solve it in the specific case of the prediction of Taxis destinations with remarkable performances, alongside with a proposition of a novel architecture inspired by Memory-Networks used in Natural Language Processing, and requiring no preliminary clustering. A large room for improvement was however left for the latter approach : the necessity of a relevant selection function retrieving historical trajectories similar to partial trips to predict was indeed outlined by the authors. In this work we propose to use the Segment-Path distance, introduced by Besse et al. in former works on trajectory clustering, to come up with an improved architecture of this memory model. A review of several Memory Networks architecture and their applications in time-series prediction is provided to give an overview of the different structural alternatives existing for the design of our model architecture. Finally, our model is confronted to individual car data and we propose a personalized user-by-user prediction of destinations. We discuss the suitability and limits of the type of model in this specific problem and conclude that the promising obtained results are penalized by infrequent destinations cases inducing noise whose effect could be reduced by turning our approach into a classification problem.Abstract i Contents List of Tables vi List of Figures viii Chapter 1 Introduction 1 1.1 Motivations, background . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Problem Description : destination forecasting problem . . . . . . . . 2 1.2.1 General context . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.2 Specific problem tackled . . . . . . . . . . . . . . . . . . . . . 2 1.3 Existing models and methods . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Research Motivation and Contributions . . . . . . . . . . . . . . . . 6 1.5 Organization of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . 7 Chapter 2 Related works 8 2.1 Artificial neural network models for trajectory prediction . . . . . . 8 2.1.1 Encoding and clustering approach . . . . . . . . . . . . . . . 8 2.1.2 "Memory network" model for taxi trajectory prediction . . . 11 2.2 Memory networks and applications . . . . . . . . . . . . . . . . . . . 13 2.2.1 MemNN models . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.2 End-to-end memory networks (MemN2N) . . . . . . . . . . . 16 2.2.3 Memory networks for multi-dimensional time-series forecasting (MTNnet) . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.3 Analogies and comparisons between the memory models introduced . 19 2.4 Distances measures for vehicle trajectories . . . . . . . . . . . . . . . 22 2.4.1 Segment-Path Distance (SPD) . . . . . . . . . . . . . . . . . 23 2.5 Personalized predictions on car manufacturer data . . . . . . . . . . 26 2.5.1 Problem approach and redefinition . . . . . . . . . . . . . . . 26 2.5.2 Method and model . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 3 Proposed Model 28 3.1 Overall architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.2 Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.3 Memory storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.4 Trajectory encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.4.1 Encoding architecture . . . . . . . . . . . . . . . . . . . . . . 30 3.4.2 Metadata and embedding . . . . . . . . . . . . . . . . . . . . 31 3.4.3 Distinctions between encoders, weight-sharing . . . . . . . . . 31 3.5 Memory selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 3.5.1 Attention mechanism . . . . . . . . . . . . . . . . . . . . . . 32 3.5.2 Data used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3.6 Query-memory association . . . . . . . . . . . . . . . . . . . . . . . . 33 3.7 Final prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Chapter 4 Experiments 35 4.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 4.2 Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 4.2.1 Variability and predictability . . . . . . . . . . . . . . . . . . 36 4.2.2 Considered vehicles . . . . . . . . . . . . . . . . . . . . . . . . 37 4.3 Experimental settings . . . . . . . . . . . . . . . . . . . . . . . . . . 39 4.3.1 Training and testing set . . . . . . . . . . . . . . . . . . . . . 39 4.3.2 Test methodology and parameters . . . . . . . . . . . . . . . 40 4.3.3 Baseline model : simple encoding . . . . . . . . . . . . . . . . 42 4.4 Experimental results . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.4.1 General results . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.4.2 Factors of influence on models performances . . . . . . . . . . 45 4.4.3 Case studies : 5 example vehicles analysis . . . . . . . . . . . 49 4.4.4 Baseline model . . . . . . . . . . . . . . . . . . . . . . . . . . 51 4.5 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Chapter 5 Conclusion 56 5.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 5.2 Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Bibliography 58 감사의 글 62Maste
    corecore