Results 21 to 30 of about 54,278 (285)

Real-Time Road Traffic Anomaly Detection

open access: yesJournal of Transportation Technologies, 2014
Many modeling approaches have been proposed to help forecast and detect incidents. Accident has received the most attention from researchers due to its impacts economically. The traffic congestion costs billions of dollars to economy. The main reasons of major percentage of traffic congestion are the incidents.
Jamal Raiyn, Tomer Toledo
openaire   +2 more sources

Privacy-Friendly Mobility Analytics using Aggregate Location Data [PDF]

open access: yes, 2016
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can ...
De Cristofaro, Emiliano   +2 more
core   +2 more sources

A Review of Road Surface Anomaly Detection and Classification Systems Based on Vibration-Based Techniques

open access: yesApplied Sciences, 2022
Road surfaces suffer from sources of deterioration, such as weather conditions, constant usage, loads, and the age of the infrastructure. These sources of decay generate anomalies that could cause harm to vehicle users and pedestrians and also develop a ...
Erick Axel Martinez-Ríos   +2 more
doaj   +1 more source

A Three-Stage Anomaly Detection Framework for Traffic Videos

open access: yesJournal of Advanced Transportation, 2022
As reported by the United Nations in 2021, road accidents cause 1.3 million deaths and 50 million injuries worldwide each year. Detecting traffic anomalies timely and taking immediate emergency response and rescue measures are essential to reduce ...
Junzhou Chen   +3 more
doaj   +1 more source

A multi-method approach to delineate and validate migratory corridors [PDF]

open access: yes, 2017
Context: Managers are faced with numerous methods for delineating wildlife movement corridors, and often must make decisions with limited data. Delineated corridors should be robust to different data and models.
Bond, Monica L.   +4 more
core   +1 more source

Enabling real-time road anomaly detection via mobile edge computing

open access: yesInternational Journal of Distributed Sensor Networks, 2019
To discover road anomalies, a large number of detection methods have been proposed. Most of them apply classification techniques by extracting time and frequency features from the acceleration data. Existing methods are time-consuming since these methods
Zengwei Zheng   +4 more
doaj   +1 more source

Streaming-Based Anomaly Detection in ITS Messages

open access: yesApplied Sciences, 2023
Intelligent transportation systems (ITS) enhance safety, comfort, transport efficiency, and environmental conservation by allowing vehicles to communicate wirelessly with other vehicles and road infrastructure.
Juliet Chebet Moso   +4 more
doaj   +1 more source

Detection of Road Traffic Anomalies Based on Computational Data Science [PDF]

open access: yesDiscover Internet of Things, 2022
Abstract The development of 5G has enabled the autonomous vehicles (AVs) to have full control over all functions. The AV acts autonomously and collects travel data based on various smart devices and sensors, with the goal of enabling it to operate under its own power.
openaire   +2 more sources

A Drift-Aware Online Learner for Anomaly Detection from Streaming Data [PDF]

open access: yesهوش محاسباتی در مهندسی برق, 2022
Streaming data has been evolved in a dynamically changing and evolving environment. Therefore, concept drift or changing the underlying distribution of data over time is considered as an important challenge in processing this type of data.
Maryam Amoozegar   +3 more
doaj   +1 more source

A dubiety-determining based model for database cumulated anomaly intrusion [PDF]

open access: yes, 2007
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core   +1 more source

Home - About - Disclaimer - Privacy