A Semantic Interpretation of Unusual Behaviors Extracted from Outliers of Moving Objects Trajectories
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
The increasing use of location-aware devices has led to generate a huge volume of data from satellite images and mobile sensors; these data can be classified into geographical data. And traces generated by objects moving on geographical territory, these traces are usually modeled as streams of spatiotemporal points called trajectories. Integrating trajectory sample points with geographical and contextual data before applying mining techniques can be more gainful for the application users. It contributes to produce significant knowledge about movements and provide applications with richer and more meaningful patterns. Trajectory Outliers are a sort of patterns that can be extracted from trajectories. However, the majority of algorithms proposed for discovering outliers are based on the geometric side of trajectories; our approach extends these works to produce outliers based on semantic trajectories in order to give meaning to the outliers extracted, and to understand the unusual behaviors that can be detected. To prove the efficiency of the approach proposed we show some experimental results.
Authors and Affiliations
Sana CHAKRI, Said RAGHAY, Salah EL HADAJ
Generation of Attributes for Bangla Words for Universal Networking Language(UNL)
The usage of native language through Internet is highly demanding now a day due to rapidly increase of Internet based application in daily needs. It is important to read all information in Bangla from the internet. Unive...
BAAC: Bangor Arabic Annotated Corpus
This paper describes the creation of the new Bangor Arabic Annotated Corpus (BAAC) which is a Modern Standard Arabic (MSA) corpus that comprises 50K words manually annotated by parts-of-speech. For evaluating the quality...
An Enhanced Automated Test Item Creation Based on Learners Preferred Concept Space
Recently, research has become increasingly inter-ested in developing tools that are able to automatically create test items out of text-based learning contents. Such tools might not only support instructors in creating t...
Plethora of Cyber Forensics
As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistic...
Nonlinear Identification and Control of Coupled Mass-Spring-Damper System using Polynomial Structures
The paper aims to identify and control the coupled mass-spring-damper system. A nonlinear discrete polynomial structure is elaborated. Its parameters are estimated using Recursive Least Squares (RLS) algorithm. Moreover,...