605
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Unusual behavior detection and object ranking from movement trajectories in target regions

, &
Pages 364-386 | Received 06 Jan 2016, Accepted 10 Jun 2016, Published online: 27 Jun 2016

References

  • Alvares, L.O., et al., 2011. An algorithm to identify avoidance behavior in moving object trajectories. Journal of the Brazilian Computer Society, 17 (3), 193–203. doi:10.1007/s13173-011-0037-3
  • Biljecki, F., Ledoux, H., and van Oosterom, P., 2013. Transportation mode-based segmentation and classification of movement trajectories. International Journal of Geographical Information Science, 27 (2), 385–407. doi:10.1080/13658816.2012.692791
  • Biuk-Aghai, R.P., et al., 2012. Individual movement behaviour in secure physical environments: modeling and detection of suspicious activity. In: L. Cao, P.S. Yu, eds. Behavior computing: modeling, analysis, mining and decision. London: Springer, 241–253.
  • Carboni, E.M. and Bogorny, V., 2014. Inferring drivers behavior through trajectory analysis. In: P. Angelov, et al., eds. Intelligent Systems’2014 - Proceedings of the 7th International Conference Intelligent Systems IEEE IS’2014, 24–26 September 2014, Warsaw, Poland, Volume 1: mathematical Foundations, Theory, Analyses. London: Springer, 837–848.
  • Chen, C., et al., 2013. iBOAT: isolation-based online anomalous trajectory detection. Intelligent Transportation Systems, IEEE Transactions on, 14 (2), 806–818.
  • Chen, Z., Shen, H.T., and Zhou, X., 2011. Discovering popular routes from trajectories. In: IEEE 27th international conference on Data engineering (ICDE), 11–16 April. Hannover: IEEE Computer Society, 900–911. ISBN 978-1-4244-8958-9.
  • De Aquino, A.R., et al., 2013. Towards semantic trajectory outlier detection. In: XIV Brazilian Symposium on Geoinformatics, 24–27 November, Campos do Jordão. São José dos Campos: MCT/INPE.
  • de Lucca Siqueira, F. and Bogorny, V., 2011. Discovering chasing behavior in moving object trajectories. Transactions in GIS, 15 (5), 667–688. doi:10.1111/tgis.2011.15.issue-5
  • Giannotti, F., et al., 2007. Trajectory pattern mining. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, San Jose, CA, 12–15 August. New York: ACM.
  • Huang, H., 2015. Anomalous behavior detection in single-trajectory data. International Journal of Geographical Information Science, 29 (12), 2075–2094. doi:10.1080/13658816.2015.1063640
  • Kleiner, A., et al., 2014. Behavior-based multi-robot collision avoidance. In: IEEE International Conference on Robotics and Automation (ICRA), 31 May–7 June. Hong Kong, China: IEEE Computer Society, 1668–1673.
  • Ko, T., 2008. A survey on behavior analysis in video surveillance for homeland security applications. In: 37th IEEE Applied Imagery Pattern Recognition Workshop, AIPR 2008, 15–17 October 2008. Washington, DC: IEEE Computer Society, 1–8.
  • Laube, P., Imfeld, S., and Weibel, R., 2005. Discovering relative motion patterns in groups of moving point objects. International Journal of Geographical Information Science, 19 (6), 639–668. doi:10.1080/13658810500105572
  • Lettich, F., et al., 2016. Detecting avoidance behaviors between moving object trajectories. Data & Knowledge Engineering, 102, 22–41. doi:10.1016/j.datak.2015.12.003
  • Li, X., et al., 2013. A method of abnormal pedestrian behavior detection based on the trajectory model. In: ICTE 2013 : proceedings of the fourth international conference on transportation engineering,19–20 October 2013, Chengdu. Reston, VI: American Society of Civil Engineers.
  • Liu, Y.H., Du, X.M., and Yang, S.H., 2005. The design of a fuzzy-neural network for ship collision avoidance. In: Advances in machine learning and cybernetics 4th international conference, ICMLC 2005, Guangzhou, 18–21 August 2005, Revised Selected Papers. S. Daniel, et al. eds. Secaucus, NJ: Springer-Verlag New York, Inc.
  • Mahjri, I., Dhraief, A., and Belghith, A., 2015. A review on collision avoidance systems for unmanned aerial vehicles. In: M. Kassab, et al., eds. Communication technologies for vehicles 8th international workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, 6–8 May 2015, Sousse, Proceedings of LNCC 6066. Springer International Publishing, 203–214. doi:10.1007/978-3-319-17765-6_18.
  • Popoola, O.P. and Wang, K., 2012. Video-based abnormal human behavior recognition—a review. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42 (6), 865–878. doi:10.1109/TSMCC.2011.2178594
  • Prelipcean, A.C., Gidofalvi, G., and Susilo, Y.O., 2016. Measures of transport mode segmentation of trajectories. International Journal of Geographical Information Science, 0 (0), 1–22.
  • Shen, M., Liu, D.-R., and Shann, S.-H., 2015. Outlier detection from vehicle trajectories to discover roaming events..Information Sciences, 294, 242–254. doi:10.1016/j.ins.2014.09.037
  • Tomas-Gabarron, J.-B., Egea-Lopez, E., and Garcia-Haro, J., 2013. Vehicular trajectory optimization for cooperative collision avoidance at high speeds. IEEE Transactions on Intelligent Transportation Systems, 14, 1930–1941. doi:10.1109/TITS.2013.2270009
  • Yuan, G., et al., 2011. Trajectory outlier detection algorithm based on structural features. Journal of Computational Information Systems, 7 (11), 4137–4144.
  • Zhang, L., Hu, Z., and Yang, G., 2014. Trajectory outlier detection based on multi-factors. IEICE TRANSACTIONS on Information and Systems, 97 (8), 2170–2173.
  • Zheng, K., et al., 2014. Online discovery of gathering patterns over trajectories. IEEE Transactions on Knowledge and Data Engineering, 28 (8), 1974–1988.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.