Browse > Article
http://dx.doi.org/10.7236/IJIBC.2022.14.2.109

Detecting Anomalous Trajectories of Workers using Density Method  

Lan, Doi Thi (Department of Electrical, Electronic and Computer Engineering, University of Ulsan)
Yoon, Seokhoon (Department of Electrical, Electronic and Computer Engineering, University of Ulsan)
Publication Information
International Journal of Internet, Broadcasting and Communication / v.14, no.2, 2022 , pp. 109-118 More about this Journal
Abstract
Workers' anomalous trajectories allow us to detect emergency situations in the workplace, such as accidents of workers, security threats, and fire. In this work, we develop a scheme to detect abnormal trajectories of workers using the edit distance on real sequence (EDR) and density method. Our anomaly detection scheme consists of two phases: offline phase and online phase. In the offline phase, we design a method to determine the algorithm parameters: distance threshold and density threshold using accumulated trajectories. In the online phase, an input trajectory is detected as normal or abnormal. To achieve this objective, neighbor density of the input trajectory is calculated using the distance threshold. Then, the input trajectory is marked as an anomaly if its density is less than the density threshold. We also evaluate performance of the proposed scheme based on the MIT Badge dataset in this work. The experimental results show that over 80 % of anomalous trajectories are detected with a precision of about 70 %, and F1-score achieves 74.68 %.
Keywords
Anomalous trajectory detection of worker; density method; EDR; distance threshold; density threshold;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhu, Zhihua, et al. "Sub-trajectory-and trajectory-neighbor-based outlier detection over trajectory streams." PacificAsia Conference on Knowledge Discovery and Data Mining. Springer, Cham, 2018. DOI: 10.1007/978-3-319-93034-3_44   DOI
2 Zhang, Daqing, et al. "iBAT: detecting anomalous taxi trajectories from GPS traces." Proceedings of the 13th international conference on Ubiquitous computing. 2011. DOI: doi.org/10.1145/2030112.2030127   DOI
3 Ghrab, Najla Bouarada, Emna Fendri, and Mohamed Hammami. "Abnormal events detection based on trajectory clustering." 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV). IEEE, 2016. DOI: 10.1109/CGiV.2016.65   DOI
4 Hsieh, Cheng-Ta, et al. "Abnormal event detection using trajectory features." Journal of Information Technology and Applications 5.1 (2011): 22-27. DOI: 10.6302/JITA.201103_5(1).0003   DOI
5 Tao, Yaguang, et al. "A comparative analysis of trajectory similarity measures." GIScience & Remote Sensing 58.5 (2021): 643-669. DOI: doi.org/10.1080/15481603.2021.1908927   DOI
6 Wang, Yulong, et al. "Detecting anomalous trajectories and behavior patterns using hierarchical clustering from taxi GPS data." ISPRS International Journal of Geo-Information 7.1 (2018): 25. DOI: doi.org/10.3390/ijgi7010025   DOI
7 Olguin, Daniel Olguin, et al. "Sensible organizations: Technology and methodology for automatically measuring organizational behavior." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39.1 (2008): 43-55. DOI: 10.1109/TSMCB.2008.2006638   DOI
8 Chandola, Varun, Arindam Banerjee, and Vipin Kumar. "Anomaly detection: A survey." ACM computing surveys (CSUR) 41.3 (2009): 1-58. DOI: doi.org/10.1145/1541880.1541882   DOI
9 Morris, Brendan Tran, and Mohan Manubhai Trivedi. "A survey of vision-based trajectory learning and analysis for surveillance." IEEE transactions on circuits and systems for video technology 18.8 (2008): 1114-1127. DOI: 10.1109/TCSVT.2008.927109   DOI
10 Belhadi, Asma, et al. "Trajectory outlier detection: algorithms, taxonomies, evaluation, and open challenges." ACM Transactions on Management Information Systems (TMIS) 11.3 (2020): 1-29. DOI: doi.org/10.1145/3399631   DOI
11 Vlachos, Michail, George Kollios, and Dimitrios Gunopulos. "Discovering similar multidimensional trajectories." Proceedings 18th international conference on data engineering. IEEE, 2002. DOI: 10.1109/ICDE.2002.994784   DOI
12 Berndt, D. J., and J. Clifford. "Using Dynamic Time Warping to Find Patterns in Time Series." In KDD Workshop, 1994, 359-370.
13 Chen, L. M., T. Ozsu, and V. Oria. "Robust and Fast Similarity Search for Moving Object Trajectories." In Proc. ACM SIGMOD International Conference on Management of Data, 2005, 491-502. DOI:10.1145/1066157.1066213   DOI
14 Usman, Koredianto, and Mohammad Ramdhani. "Comparison of Classical Interpolation Methods and Compressive Sensing for Missing Data Reconstruction." 2019 IEEE International Conference on Signals and Systems (ICSigSys). IEEE, 2019. DOI: 10.1109/ICSIGSYS.2019.8811057   DOI
15 Lee, Jae-Gil, Jiawei Han, and Xiaolei Li. "Trajectory outlier detection: A partition-and-detect framework." 2008 IEEE 24th International Conference on Data Engineering. IEEE, 2008. DOI: 10.1109/ICDE.2008.4497422   DOI