dc.contributor.author | Djenouri, Youcef | |
dc.contributor.author | Belhadi, Asma | |
dc.contributor.author | Lin, Chun Wei | |
dc.contributor.author | Djenouri, Djamel | |
dc.contributor.author | Cano, Alberto | |
dc.date.accessioned | 2019-06-28T10:54:57Z | |
dc.date.available | 2019-06-28T10:54:57Z | |
dc.date.created | 2019-04-03T21:18:42Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | IEEE Access. 2019, 7 (1), 12192-12205. | nb_NO |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | http://hdl.handle.net/11250/2602800 | |
dc.description.abstract | This paper reviews the use of outlier detection approaches in urban traffic analysis. We divide existing solutions into two main categories: flow outlier detection and trajectory outlier detection. The first category groups solutions that detect flow outliers and includes statistical, similarity and pattern mining approaches. The second category contains solutions where the trajectory outliers are derived, including off-line processing for trajectory outliers and online processing for sub-trajectory outliers. Solutions in each of these categories are described, illustrated, and discussed, and open perspectives and research trends are drawn. Compared to the state-of-the-art survey papers, the contribution of this paper lies in providing a deep analysis of all the kinds of representations in urban traffic data, including flow values, segment flow values, trajectories, and sub-trajectories. In this context, we can better understand the intuition, limitations, and benefits of the existing outlier urban traffic detection algorithms. As a result, practitioners can receive some guidance for selecting the most suitable methods for their particular case. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.title | A Survey on Urban Traffic Anomalies Detection Algorithms | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | publishedVersion | nb_NO |
dc.source.pagenumber | 12192-12205 | nb_NO |
dc.source.volume | 7 | nb_NO |
dc.source.journal | IEEE Access | nb_NO |
dc.source.issue | 1 | nb_NO |
dc.identifier.doi | 10.1109/ACCESS.2019.2893124 | |
dc.identifier.cristin | 1690085 | |
dc.description.localcode | Copyright 2019 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. | nb_NO |
cristin.unitcode | 194,63,10,0 | |
cristin.unitname | Institutt for datateknologi og informatikk | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |