Big data platform of traffic violation detection system: identifying the risky behaviors of vehicle drivers

被引:15
作者
Asadianfam, Shiva [1 ]
Shamsi, Mahboubeh [2 ]
Rasouli Kenari, Abdolreza [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qom Branch, Qom, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Qom, Iran
关键词
Big data; Behavior-based safety; Risky behavior; Traffic violation detection; Traffic surveillance cameras; SAFETY MANAGEMENT; DATA ANALYTICS; ACCIDENTS; IMPLEMENTATION; TECHNOLOGY; EXPERIENCE; FRAMEWORK; MODEL; LANE;
D O I
10.1007/s11042-020-09099-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the traffic data has a high volume, high diversity and high speed of production, the traditional systems cannot process them accurately. In this paper, a big data based system was designed and implemented for identifying the offenders' behaviors. The proposed Traffic Violation Detection System (TVD system) included four main phases which were described using the MAPE methodology. In the monitor phase, unstructured data, such as videos captured by traffic control cameras as well as the images and the descriptions provided by traffic officers, were collected. In the analysis phase, the knowledge base of unsafe driving behaviors was created and classified. In this phase, a standard Work Breakdown Structure for unsafe behaviors was created by the experts in traffic control. In the Plan phase, in order to detect unsafe driving behaviors related to police descriptions for collected images, and to detect unsafe behaviors from video cameras, Behavior-Based Safety process with Map/ Reduce technique and Vector Space Model (VSM) were employed. In the last phase, all types of data, including the structured data and the multimedia/unstructured data, along with the types and details of violations, were stored on the Hadoop Distributed File System. The prototype of the proposed TVD system was successfully implemented for a few common violations. The results showed that by applying big data technologies, the driving violations could be detected more accurately using the combination of the structured and unstructured data. The results indicate that compared to the sequential program, Hadoop only with a single slave-node decreases the processing time of big data by more than 70%. Also, by increasing the number of slave nodes from 1 to 7 in the police descriptions and images of surveillance cameras, the processing time reduces by 60.87% and 70%, respectively. Thus, the TVD performance increases by more than 75% as the number of data nodes boosts. Based on the results, it can be concluded that by identifying unsafe driving behaviors, it is possible to diminish traffic accidents and the damage caused by them at a satisfactory level. Also, the authors decided to compare these studies in terms of qualitative criteria, such as fieldwork and behavioral identification, and quantitative criteria.
引用
收藏
页码:24645 / 24684
页数:40
相关论文
共 64 条
[21]   Automated human behavior analysis from surveillance videos: a survey [J].
Gowsikhaa, D. ;
Abirami, S. ;
Baskaran, R. .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) :747-765
[22]   A Big-Data-based platform of workers' behavior: Observations from the field [J].
Guo, S. Y. ;
Ding, L. Y. ;
Luo, H. B. ;
Jiang, X. Y. .
ACCIDENT ANALYSIS AND PREVENTION, 2016, 93 :299-309
[23]  
Hajeb S, 2013, INT J SCI ENG INVEST, P1
[24]  
Hartford T, 2002, TECHNICAL INFORM PAP
[25]   Multi-level trajectory learning for traffic behavior detection and analysis [J].
Hu, Hong-Yu ;
Qu, Zhao-Wei ;
Li, Zhi-Hui .
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2014, 37 (08) :995-1006
[26]  
Iglesia D.G, 2014, MAPE K FORMAL TEMPLA
[27]   Behaviour Based Approach for Quality and Safety Environment Improvement: Malaysian Experience in the Oil and Gas Industry [J].
Ismail, Faridah ;
Hashim, Ahmad Ezanee ;
Ismail, Wan Zuriea Wan ;
Kamarudin, Hikmah ;
Baharom, Zarita Ahmad .
AICE-BS 2011 FAMAGUSTA (ASIA PACIFIC INTERNATIONAL CONFERENCE ON ENVIRONMENT-BEHAVIOUR STUDIES), 2012, 35 :586-594
[28]  
James L., 2000, ROAD RAGE AGGRESSIVE
[29]  
Jin Z., 2018, Environment Modeling-Based Requirements Engineering for Software Intensive Systems
[30]  
Kasaei SHM, 2011, INT SEC INF C EISIC