Uncovering Abnormal Behavior Patterns from Mobility Trajectories
Abstract
:1. Introduction
- (1)
- This paper implemented the extraction of abnormal behavior trajectory and the identification of abnormal pattern using trajectory data, in terms of the machine learning method and the feature matching method.
- (2)
- The abnormal trajectory data were well recognized by LSTM and the K-means cluster method. These methods can achieve data screening in big data without any prior knowledge.
- (3)
- The abnormal patterns of social safety were defined, and their feature models were constructed. The abnormal pattern was well identified by the feature matching based on the feature models.
2. Research Methods
2.1. Data Procession
2.1.1. Noise and Abnormal Points’ Removal
- (1)
- Personal trajectories are roughly inferred based on the normal speed of each person. For example, Bolt’s 100 m race score is 9 s 58, and the speed is about 10 m per second; this value was used as the threshold. If the speed exceeds the threshold, the trajectory point is judged as noise and abnormal points and eliminated.
- (2)
- Detect the speed per minute of each point and the corresponding distance radiation of the next minute to determine whether its speed is less than the speed threshold, as shown in Figure 2. If the speed of the track point is greater than the threshold, it is eliminated.
2.1.2. Trajectories of Interest Area Extraction
Algorithm 1 Determining if a point is inside a polygon. |
|
2.2. Initial Screening of Abnormal Trajectories Based on the SeqtoSeq Model
2.3. Abnormal Patterns’ Identification
2.3.1. Abnormal Pattern Definition
2.3.2. Wandering, Scouting, and Random Walking Behaviors’ Identification
Algorithm 2 Identifying mobility patterns. |
|
Algorithm 3 Judge wandering behavior. |
|
2.3.3. Trailing Recognition Based on the Probability Model
3. Cases Study and Results
3.1. Data Preparation
3.2. Motion Type Analysis
3.3. Effects of Wandering, Scouting, and Random Walking Behavior Identification
3.4. Effects of Trailing Behavior Identification
4. Discussion
4.1. Limitations
4.2. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Ben Mabrouk, A.; Zagrouba, E. Abnormal behavior recognition for intelligent video surveillance systems: A review. Expert Syst. Appl. 2018, 91, 480–491. [Google Scholar] [CrossRef]
- Kulkarni, P.; Patil, B.; Joglekar, B. An effective content based video analysis and retrieval using pattern indexing techniques. In Proceedings of the 2015 International Conference on Industrial Instrumentation and Control (ICIC), Pune, India, 28–30 May 2015; pp. 87–92. [Google Scholar]
- Dhiman, C.; Vishwakarma, D.K. A review of state-of-the-art techniques for abnormal human activity recognition. Eng. Appl. Artif. Intell. 2019, 77, 21–45. [Google Scholar] [CrossRef]
- Hsieh, J.; Chuang, C.; Alghyaline, S.; Chiang, H.; Chiang, C. Abnormal Scene Change Detection From a Moving Camera Using Bags of Patches and Spider-Web Map. IEEE Sens. J. 2015, 15, 2866–2881. [Google Scholar] [CrossRef]
- Cosar, S.; Donatiello, G.; Bogorny, V.; Garate, C.; Alvares, L.O.; Brémond, F. Toward Abnormal Trajectory and Event Detection in Video Surveillance. IEEE Trans. Circuits Syst. Video Technol. 2017, 27, 683–695. [Google Scholar] [CrossRef]
- Kok, V.J.; Lim, M.K.; Chan, C.S. Crowd Behavior Analysis: A Review where Physics meets Biology. Neurocomputing 2015, 177, 342–362. [Google Scholar] [CrossRef] [Green Version]
- Rai, H.; Kolekar, M.H.; Keshav, N.; Mukherjee, J.K. Trajectory Based Unusual Human Movement Identification for Video Surveillance System. In Progress in Systems Engineering; Selvaraj, H., Zydek, D., Chmaj, G., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 789–794. [Google Scholar]
- Pathak, D.; Sharang, A.; Mukerjee, A. Anomaly Localization in Topic-Based Analysis of Surveillance Videos. In Proceedings of the 2015 IEEE Winter Conference on Applications of Computer Vision, IEEE Computer Society, Waikoloa, HI, USA, 5–9 January 2015; pp. 389–395. [Google Scholar] [CrossRef]
- Yi, P.; Wang, Z.; Jiang, K.; Jiang, J.; Lu, T.; Ma, J. A Progressive Fusion Generative Adversarial Network for Realistic and Consistent Video Super-Resolution. Trans. Pattern Anal. Mach. Intell. 2020. [Google Scholar] [CrossRef] [PubMed]
- De Souza, F.D.M.; Chavez, G.C.; do Valle, E.A., Jr.; Araujo, A.D.A. Violence Detection in Video Using Spatio-Temporal Features. In Proceedings of the 2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images, IEEE Computer Society, Gramado, Brazil, 30 Auguast–3 September 2010; pp. 224–230. [Google Scholar] [CrossRef]
- Hassner, T.; Itcher, Y.; Kliper-Gross, O. Violent flows: Real-time detection of violent crowd behavior. In Proceedings of the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Providence, RI, USA, 16–21 June 2012; pp. 1–6. [Google Scholar] [CrossRef]
- Martin, V.; Glotin, H.; Paris, S.; Halkias, X.; Prevot, J.-M. Violence Detection in Video by Large Scale Multi-Scale Local Binary Patterns Dynamics. In Proceedings of the CEUR Workshop Proceedings, Pisa, Italy, 4–5 October 2012; pp. 160–167. [Google Scholar]
- Wang, S.; Wu, L.; Zhou, F.; Zheng, C.; Wang, H. Group Pattern Mining Algorithm of Moving Objects’ Uncertain Trajectories. Int. J. Comput. Commun. Control 2015, 10, 428–440. [Google Scholar] [CrossRef] [Green Version]
- Guan, Y.; Xia, S.; Zhang, Y. Interesting Activities Discovery for Moving Objects Based on Collaborative Filtering. Math. Probl. Eng. 2013, 2013, 380871.1–380871.9. [Google Scholar]
- Park, J.; Abdel-Aty, M.; Wu, Y.; Mattei, I. Enhancing In-Vehicle Driving Assistance Information Under Connected Vehicle Environment. IEEE Trans. Intell. Transp. Syst. 2018, 3558–3567. [Google Scholar] [CrossRef]
- Chen, L.; Özsu, M.T.; Oria, V. Robust and Fast Similarity Search for Moving Object Trajectories. In Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data; Association for Computing Machinery: New York, NY, USA, 2005; pp. 491–502. [Google Scholar] [CrossRef]
- Lee, J.G.; Han, J.; Whang, K.Y. Trajectory Clustering: A Partition-and-Group Framework. In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data; Association for Computing Machinery: New York, NY, USA, 2007; pp. 593–604. [Google Scholar] [CrossRef]
- Tang, W.; Pi, D.; He, Y. A Density-Based Clustering Algorithm with Sampling for Travel Behavior Analysis. In Intelligent Data Engineering and Automated Learning—IDEAL 2016; Springer International Publishing: Cham, Switzerland, 2016; pp. 231–239. [Google Scholar]
- Li, Z.; Lee, J.G.; Li, X.; Han, J. Incremental Clustering for Trajectories; Springer: Berlin/Heidelberg, Germany, 2010; pp. 32–46. [Google Scholar] [CrossRef] [Green Version]
- Besse, P.C.; Guillouet, B.; Loubes, J.M.; Royer, F. Review and Perspective for Distance-Based Clustering of Vehicle Trajectories. Trans. Intell. Transport. Sys. 2016, 17, 3306–3317. [Google Scholar] [CrossRef] [Green Version]
- Batista, E.; Casino, F.; Solanas, A. On wandering detection methods in context-aware scenarios. In Proceedings of the 2016 7th International Conference on Information, Intelligence, Systems Applications (IISA), Chalkidiki, Greece, 13–15 July 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Batista, E.; Borras, F.; Casino, F.; Solanas, A. A study on the detection of wandering patterns in human trajectories. In Proceedings of the 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA), Corfu, Greece, 6–8 July 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Martínez-Ballesté, A.; Budesca, F.B.; Solanas, A. An autonomous intelligent system for the private outdoors monitoring of people with mild cognitive impairments. In Advanced Technological Solutions for E- Health and Dementia Patient Monitoring; IGI Global: Pennsylvania, PA, USA, 2015; pp. 137–152. [Google Scholar]
- Li, X.; Zhang, X.; Ren, X.; Fritsche, M.; Wickert, J.; Schuh, H. Precise positioning with current multi-constellation Global Navigation Satellite Systems: GPS, GLONASS, Galileo and BeiDou. Sci. Rep. 2015, 5, 8328. [Google Scholar] [CrossRef] [PubMed]
- Vuong, N.K.; Chan, S.; Lau, C.T.; Lau, K.M. Feasibility Study of a Real-Time Wandering Detection Algorithm for Dementia Patients. In Proceedings of the First ACM MobiHoc Workshop on Pervasive Wireless Healthcare; Association for Computing Machinery: New York, NY, USA, 2011. [Google Scholar] [CrossRef]
- Martino-Saltzman, D.; Blasch, B.B.; Morris, R.D.; McNeal, L.W. Travel Behavior of Nursing Home Residents Perceived as Wanderers and Nonwanderers. Gerontologist 1991, 31, 666–672. [Google Scholar] [CrossRef] [PubMed]
- Chang, Y.J. Anomaly Detection for Travelling Individuals with Cognitive Impairments. SIGACCESS Access. Comput. 2010, 25–32. [Google Scholar] [CrossRef]
- Yao, D.; Zhang, C.; Zhu, Z.; Huang, J.; Bi, J. Trajectory clustering via deep representation learning. In Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), Anchorage, AK, USA, 14–19 May 2017; pp. 3880–3887. [Google Scholar] [CrossRef]
- Syakur, M.A.; Khotimah, B.K.; Rochman, E.M.S.; Satoto, B.D. Integration K-Means Clustering Method and Elbow Method For Identification of The Best Customer Profile Cluster. IOP Conf. Ser. Mater. Sci. Eng. 2018, 336, 012017. [Google Scholar] [CrossRef] [Green Version]
- Sutskever, I.; Vinyals, O.; Le, Q.V. Sequence to Sequence Learning with Neural Networks. In Proceedings of the 27th International Conference on Neural Information Processing Systems—Volume 2; MIT Press: Cambridge, MA, USA, 2014; pp. 3104–3112. [Google Scholar]
- Strahorn, J.S., Jr. Preparation for crime as a criminal attempt. Wash. Lee L. Rev. 1939, 1, 1. [Google Scholar]
- Qi, M.; Wang, Z.; He, Z.; Shao, Z. User Identification across Asynchronous Mobility Trajectories. Sensors 2019, 19, 2102. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Vuong, N.K.; Chan, S.; Lau, C.T. Automated detection of wandering patterns in people with dementia. Gerontechnology 2014, 12, 127–147. [Google Scholar] [CrossRef]
Result | Accuracy (Precision/Recall) | ||||
---|---|---|---|---|---|
Direct | Pacing | Lapping | Random | Total | |
SSPD | 0.46/0.60 | 0.40/0.40 | 0.40/0.40 | 0.41/0.50 | 0.47 |
LCSS | 0.37/0.60 | 0.25/0.40 | 0.31/0.50 | 0.25/0.40 | 0.47 |
Hausdorff | 0.45/0.50 | 0.35/0.50 | 0.21/0.37 | 0.35/0.30 | 0.45 |
Frechet | 0.75/0.30 | 0.31/0.50 | 0.35/0.60 | 0.25/0.40 | 0.45 |
Discrete Frechet | 0.71/0.50 | 0.35/0.50 | 0.35/0.50 | 0.28/0.40 | 0.47 |
ERP | 0.31/0.50 | 1.00/0.40 | 0.54/0.60 | 0.31/0.50 | 0.50 |
DTW | 0.33/0.30 | 0.30/0.40 | 0.38/0.50 | 0.44/0.40 | 0.40 |
EDR | 0.26/0.50 | 0.47/0.90 | 0.31/0.60 | 0.36/0.70 | 0.67 |
Our Method | 1.00/0.87 | 0.89/0.98 | 0.99/0.98 | 0.98/1.00 | 0.96 |
Result | Accuracy | |||
---|---|---|---|---|
Direct | Wandering | Scouting | Random Walk | |
Precision | 0.88 | 0.77 | 0.73 | 0.66 |
Recall | 0.44 | 0.98 | 0.48 | 0.50 |
Accuracy | ||
---|---|---|
Precision | Recall | |
0.75 | 0.88 | 0.77 |
0.80 | 0.86 | 0.74 |
0.85 | 0.83 | 0.70 |
0.90 | 0.78 | 0.65 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wu, H.; Tang, X.; Wang, Z.; Wang, N. Uncovering Abnormal Behavior Patterns from Mobility Trajectories. Sensors 2021, 21, 3520. https://doi.org/10.3390/s21103520
Wu H, Tang X, Wang Z, Wang N. Uncovering Abnormal Behavior Patterns from Mobility Trajectories. Sensors. 2021; 21(10):3520. https://doi.org/10.3390/s21103520
Chicago/Turabian StyleWu, Hao, Xuehua Tang, Zhongyuan Wang, and Nanxi Wang. 2021. "Uncovering Abnormal Behavior Patterns from Mobility Trajectories" Sensors 21, no. 10: 3520. https://doi.org/10.3390/s21103520
APA StyleWu, H., Tang, X., Wang, Z., & Wang, N. (2021). Uncovering Abnormal Behavior Patterns from Mobility Trajectories. Sensors, 21(10), 3520. https://doi.org/10.3390/s21103520