2,893 research outputs found
Towards Distributed Convoy Pattern Mining
Mining movement data to reveal interesting behavioral patterns has gained
attention in recent years. One such pattern is the convoy pattern which
consists of at least m objects moving together for at least k consecutive time
instants where m and k are user-defined parameters. Existing algorithms for
detecting convoy patterns, however do not scale to real-life dataset sizes.
Therefore a distributed algorithm for convoy mining is inevitable. In this
paper, we discuss the problem of convoy mining and analyze different data
partitioning strategies to pave the way for a generic distributed convoy
pattern mining algorithm.Comment: SIGSPATIAL'15 November 03-06, 2015, Bellevue, WA, US
Distributed mining of convoys in large scale datasets
Tremendous increase in the use of the mobile devices equipped with the GPS and other location sensors has resulted in the generation of a huge amount of movement data. In recent years, mining this data to understand the collective mobility behavior of humans, animals and other objects has become popular. Numerous mobility patterns, or their mining algorithms have been proposed, each representing a specific movement behavior. Convoy pattern is one such pattern which can be used to find groups of people moving together in public transport or to prevent traffic jams. A convoy is a set of at least m objects moving together for at least k consecutive time stamps where m and k are user-defined parameters. Existing algorithms for detecting convoy patterns do not scale to real-life dataset sizes. Therefore in this paper, we propose a generic distributed convoy pattern mining algorithm called DCM and show how such an algorithm can be implemented using the MapReduce framework. We present a cost model for DCM and a detailed theoretical analysis backed by experimental results. We show the effect of partition size on the performance of DCM. The results from our experiments on different data-sets and hardware setups, show that our distributed algorithm is scalable in terms of data size and number of nodes, and more efficient than any existing sequential as well as distributed convoy pattern mining algorithm, showing speed-ups of up to 16 times over SPARE, the state of the art distributed co-movement pattern mining framework. DCM is thus able to process large datasets which SPARE is unable to.SCOPUS: ar.jDecretOANoAutActifinfo:eu-repo/semantics/publishe
Key concepts of group pattern discovery algorithms from spatio-temporal trajectories
Over the years, the increasing development of location acquisition devices have generated a significant amount of spatio-temporal data. This data can be further analysed in search for some interesting patterns, new information, or to construct predictive models such as next location prediction. The goal of this paper is to contribute to the future research and development of group pattern discovery algorithms from spatio-temporal data by providing an insight into algorithms design in this research area which is based on a comprehensive classification of state-of-the-art models. This work includes static, big data as well as data stream processing models which to the best of authors’knowledge is the first attempt of presenting them in this context.Furthermore, the currently available surveys and taxonomies in this research area do not focus on group pattern mining algorithms nor include the state-of-the-art models. The authors conclude with the proposal of a conceptual model of Universal,Streaming, Distributed and Parameter-light (UDSP) algorithm that addresses current challenges in this research area
k/2-hop: Fast Mining of Convoy Patterns With Effective Pruning
With the increase of devices equipped with location sensors, mining spatio-temporal data for interesting behavioral patterns has gained attention in recent years. One of such well-known patterns is the convoy pattern which can be used, e.g. to find groups of people moving together in public transport or to prevent traffic jams. A convoy consists of at least m objects moving together for at least k consecutive time instants where m and k are user-defined parameters. Convoy mining is an expensive task and existing sequential algorithms do not scale to real-life dataset sizes. Existing sequential as well as parallel algorithms require a complex set of data-dependent parameters which are hard to set and tune. Therefore, in this paper, we propose a new fast exact sequential convoy pattern mining algorithm \k/2-hop" that is free of data-dependent parameters. The proposed algorithm processes the data corresponding to a few specific key timestamps at each step and quickly prunes objects with no possibility of forming a convoy. Thus, only a very small portion of the complete dataset is considered for mining convoys. Our experimental results show that k/2-hop outperforms existing sequential as well as parallel convoy pattern mining algorithms by orders of magnitude, and scales to larger datasets which existing algorithms fail on.SCOPUS: cp.pDecretOANoAutActifinfo:eu-repo/semantics/publishe
Querying recurrent convoys over trajectory data
National Research Foundation (NRF) Singapore under International Research Centres in Singapore Funding Initiativ
Colossal Trajectory Mining: A unifying approach to mine behavioral mobility patterns
Spatio-temporal mobility patterns are at the core of strategic applications such as urban planning and monitoring. Depending on the strength of spatio-temporal constraints, different mobility patterns can be defined. While existing approaches work well in the extraction of groups of objects sharing fine-grained paths, the huge volume of large-scale data asks for coarse-grained solutions. In this paper, we introduce Colossal Trajectory Mining (CTM) to efficiently extract heterogeneous mobility patterns out of a multidimensional space that, along with space and time dimensions, can consider additional trajectory features (e.g., means of transport or activity) to characterize behavioral mobility patterns. The algorithm is natively designed in a distributed fashion, and the experimental evaluation shows its scalability with respect to the involved features and the cardinality of the trajectory dataset
Co-movement Pattern Mining from Videos
Co-movement pattern mining from GPS trajectories has been an intriguing
subject in spatial-temporal data mining. In this paper, we extend this research
line by migrating the data source from GPS sensors to surveillance cameras, and
presenting the first investigation into co-movement pattern mining from videos.
We formulate the new problem, re-define the spatial-temporal proximity
constraints from cameras deployed in a road network, and theoretically prove
its hardness. Due to the lack of readily applicable solutions, we adapt
existing techniques and propose two competitive baselines using Apriori-based
enumerator and CMC algorithm, respectively.
As the principal technical contributions, we introduce a novel index called
temporal-cluster suffix tree (TCS-tree), which performs two-level temporal
clustering within each camera and constructs a suffix tree from the resulting
clusters. Moreover, we present a sequence-ahead pruning framework based on
TCS-tree, which allows for the simultaneous leverage of all pattern constraints
to filter candidate paths. Finally, to reduce verification cost on the
candidate paths, we propose a sliding-window based co-movement pattern
enumeration strategy and a hashing-based dominance eliminator, both of which
are effective in avoiding redundant operations.
We conduct extensive experiments for scalability and effectiveness analysis.
Our results validate the efficiency of the proposed index and mining algorithm,
which runs remarkably faster than the two baseline methods. Additionally, we
construct a video database with 1169 cameras and perform an end-to-end pipeline
analysis to study the performance gap between GPS-driven and video-driven
methods. Our results demonstrate that the derived patterns from the
video-driven approach are similar to those derived from groundtruth
trajectories, providing evidence of its effectiveness
Truck platooning: great prospect or unrealistic concept for military logistics in Europe?
Truck platooning is a technology that allows trucks to drive in a convoy one behind the other, communicating with each other and adapting themselves to the convoy. There are various configurations with different degrees of autonomy but, in most cases, there is still a driver on board, which distinguishes the concept from fully autonomous vehicles. In this article, Dominik Juling examines the advantages, hurdles and limits of military truck platooning in Europe, and provides examples of projects and technologies that are already operational. The benefits include a reduced number of drivers, increased safety for the crew and less resource consumption
Cybersecurity issues in software architectures for innovative services
The recent advances in data center development have been at the basis of the widespread
success of the cloud computing paradigm, which is at the basis of models for software based applications and services, which is the "Everything as a Service" (XaaS) model. According to the XaaS model, service of any kind are deployed on demand
as cloud based applications, with a great degree of flexibility and a limited need for investments in dedicated hardware and or software components. This approach opens up a lot of opportunities, for instance providing access to complex and widely
distributed applications, whose cost and complexity represented in the past a significant entry barrier, also to small or emerging businesses. Unfortunately, networking is now embedded in every service and application, raising several cybersecurity issues related to corruption and leakage of data, unauthorized access, etc. However, new service-oriented architectures are emerging in this context, the so-called services enabler architecture. The aim of these architectures is not only to expose and give the resources to these types of services, but it is also to validate them. The validation includes numerous aspects, from the legal to the infrastructural ones e.g., but above all the cybersecurity threats. A solid threat analysis of the aforementioned architecture is therefore necessary, and this is the main goal of this thesis. This work investigate the security threats of the emerging service enabler architectures, providing proof of concepts for these issues and the solutions too, based on several use-cases implemented in real world scenarios
Multiple-Aspect Analysis of Semantic Trajectories
This open access book constitutes the refereed post-conference proceedings of the First International Workshop on Multiple-Aspect Analysis of Semantic Trajectories, MASTER 2019, held in conjunction with the 19th European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2019, in WĂĽrzburg, Germany, in September 2019. The 8 full papers presented were carefully reviewed and selected from 12 submissions. They represent an interesting mix of techniques to solve recurrent as well as new problems in the semantic trajectory domain, such as data representation models, data management systems, machine learning approaches for anomaly detection, and common pathways identification
- …