This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors ha...This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.展开更多
Current traffic signal split failure (SF) estimations derived from high-resolution controller event data rely on detector occupancy ratios and preset thresholds. The reliability of these techniques depends on the sele...Current traffic signal split failure (SF) estimations derived from high-resolution controller event data rely on detector occupancy ratios and preset thresholds. The reliability of these techniques depends on the selected thresholds, detector lengths, and vehicle arrival patterns. Connected vehicle (CV) trajectory data can more definitively show when a vehicle split fails by evaluating the number of stops it experiences as it approaches an intersection, but it has limited market penetration. This paper compares cycle-by-cycle SF estimations from both high-resolution controller event data and CV trajectory data, and evaluates the effect of data aggregation on SF agreement between the two techniques. Results indicate that, in general, split failure events identified from CV data are likely to also be captured from high-resolution data, but split failure events identified from high-resolution data are less likely to be captured from CV data. This is due to the CV market penetration rate (MPR) of ~5% being too low to capture representative data for every controller cycle. However, data aggregation can increase the ratio in which CV data captures split failure events. For example, day-of-week data aggregation increased the percentage of split failures identified with high-resolution data that were also captured with CV data from 35% to 56%. It is recommended that aggregated CV data be used to estimate SF as it provides conservative and actionable results without the limitations of intersection and detector configuration. As the CV MPR increases, the accuracy of CV-based SF estimation will also improve.展开更多
In modern workforce management,the demand for new ways to maximize worker satisfaction,productivity,and security levels is endless.Workforce movement data such as those source data from an access control system can su...In modern workforce management,the demand for new ways to maximize worker satisfaction,productivity,and security levels is endless.Workforce movement data such as those source data from an access control system can support this ongoing process with subsequent analysis.In this study,a solution to attaining this goal is proposed,based on the design and implementation of a data mart as part of a dimensional trajectory data warehouse(TDW)that acts as a repository for the management of movement data.A novel methodological approach is proposed for modeling multiple spatial and temporal dimensions in a logical model.The case study presented in this paper for modeling and analyzing workforce movement data is to support human resource management decision-making and the following discussion provides a representative example of the contribution of a TDW in the process of information management and decision support systems.The entire process of exporting,cleaning,consolidating,and transforming data is implemented to achieve an appropriate format for final import.Structured query language(SQL)queries demonstrate the convenience of dimensional design for data analysis,and valuable information can be extracted from the movements of employees on company premises to manage the workforce efficiently and effectively.Visual analytics through data visualization support the analysis and facilitate decisionmaking and business intelligence.展开更多
This is the first of a three-part series of pape rs which introduces a general background of building trajectory-oriented road net work data models, including motivation, related works, and basic concepts. The p urpos...This is the first of a three-part series of pape rs which introduces a general background of building trajectory-oriented road net work data models, including motivation, related works, and basic concepts. The p urpose of the series is to develop a trajectory-oriented road network data mode l, namely carriageway-based road network data model (CRNM). Part 1 deals with t he modeling background. Part 2 proposes the principle and architecture of the CR NM. Part 3 investigates the implementation of the CRNM in a case study. In the p resent paper, the challenges of managing trajectory data are discussed. Then, de veloping trajectory-oriented road network data models is proposed as a solution and existing road network data models are reviewed. Basic representation approa ches of a road network are introduced as well as its constitution.展开更多
This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introdu...This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introduced a general background of building trajectory-oriented road network data models, including motivation, related works, and basic concepts. Based on it, this paper describs the CRNM in detail. At first, the notion of basic roadway entity is proposed and discussed. Secondly, carriageway is selected as the basic roadway entity after compared with other kinds of roadway, and approaches to representing other roadways with carriageways are introduced. At last, an overall architecture of the CRNM is proposed.展开更多
This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively...This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively. An overall architecture of the CRNM has been proposed in the last paper. On the basis of the above discusses, a linear reference method (LRM) for providing spatial references for location points of a trajectory is developed. A case study is introduced to illustrate the application of the CRNM for modeling a road network in the real world is given. A comprehensive conclusion is given for the series of papers.展开更多
Anomalous trajectory detection and traffic flow classification for complicated airspace are of vital importance to safety and efficiency analysis.Some researchers employed density-based unsupervised machine learning m...Anomalous trajectory detection and traffic flow classification for complicated airspace are of vital importance to safety and efficiency analysis.Some researchers employed density-based unsupervised machine learning method to exploit these trajectories related to air traffic control(ATC)actions.However,the quality of position data and the tiny density difference between traffic flows in the terminal area make it particularly challenging.To alleviate these two challenges,this paper proposes a novel framework which combines robust deep auto-encoder(RDAE)model and density peak(DP)clustering algorithm.Specifically,the RDAE model is utilized to reconstruct denoising trajectory and identify anomaly trajectories in the terminal area by two different regularizations.Then,the nonlinear components captured by the encoder of RDAE are input in the DP algorithm to classify the global traffic flows.An experiment on a terminal airspace at Guangzhou Baiyun Airport(ZGGG)with anomaly label shows that the proposed combination can automatically capture non-conventional spatiotemporal traffic patterns in the aircraft movement.The superiority of RDAE and combination are also demonstrated by visualizing and quantitatively evaluating the experimental results.展开更多
As the rapid development of aviation industry and newly emerging crowd-sourcing projects such as Flightradar24 and FlightAware,large amount of air traffic data,particularly four-dimension(4D)trajectory data,have becom...As the rapid development of aviation industry and newly emerging crowd-sourcing projects such as Flightradar24 and FlightAware,large amount of air traffic data,particularly four-dimension(4D)trajectory data,have become available for the public.In order to guarantee the accuracy and reliability of results,data cleansing is the first step in analyzing 4D trajectory data,including error identification and mitigation.Data cleansing techniques for the 4D trajectory data are investigated.Back propagation(BP)neural network algorithm is applied to repair errors.Newton interpolation method is used to obtain even-spaced trajectory samples over a uniform distribution of each flight’s 4D trajectory data.Furthermore,a new method is proposed to compress data while maintaining the intrinsic characteristics of the trajectories.Density-based spatial clustering of applications with noise(DBSCAN)is applied to identify remaining outliers of sample points.Experiments are performed on a data set of one-day 4D trajectory data over Europe.The results show that the proposed method can achieve more efficient and effective results than the existing approaches.The work contributes to the first step of data preprocessing and lays foundation for further downstream 4D trajectory analysis.展开更多
In order to maximize the value of information(VoI)of collected data in unmanned aerial vehicle(UAV)-aided wireless sensor networks(WSNs),a UAV trajectory planning algorithm named maximum VoI first and successive conve...In order to maximize the value of information(VoI)of collected data in unmanned aerial vehicle(UAV)-aided wireless sensor networks(WSNs),a UAV trajectory planning algorithm named maximum VoI first and successive convex approximation(MVF-SCA)is proposed.First,the Rician channel model is adopted in the system and sensor nodes(SNs)are divided into key nodes and common nodes.Secondly,the data collection problem is formulated as a mixed integer non-linear program(MINLP)problem.The problem is divided into two sub-problems according to the different types of SNs to seek a sub-optimal solution with a low complexity.Finally,the MVF-SCA algorithm for UAV trajectory planning is proposed,which can not only be used for daily data collection in the target area,but also collect time-sensitive abnormal data in time when the exception occurs.Simulation results show that,compared with the existing classic traveling salesman problem(TSP)algorithm and greedy path planning algorithm,the VoI collected by the proposed algorithm can be improved by about 15%to 30%.展开更多
In recent years,mobile Internet technology and location based services have wide application.Application providers and users have accumulated huge amount of trajectory data.While publishing and analyzing user trajecto...In recent years,mobile Internet technology and location based services have wide application.Application providers and users have accumulated huge amount of trajectory data.While publishing and analyzing user trajectory data have brought great convenience for people,the disclosure risks of user privacy caused by the trajectory data publishing are also becoming more and more prominent.Traditional k-anonymous trajectory data publishing technologies cannot effectively protect user privacy against attackers with strong background knowledge.For privacy preserving trajectory data publishing,we propose a differential privacy based(k-Ψ)-anonymity method to defend against re-identification and probabilistic inference attack.The proposed method is divided into two phases:in the first phase,a dummy-based(k-Ψ)-anonymous trajectory data publishing algorithm is given,which improves(k-δ)-anonymity by considering changes of thresholdδon different road segments and constructing an adaptive threshold setΨthat takes into account road network information.In the second phase,Laplace noise regarding distance of anonymous locations under differential privacy is used for trajectory perturbation of the anonymous trajectory dataset outputted by the first phase.Experiments on real road network dataset are performed and the results show that the proposed method improves the trajectory indistinguishability and achieves good data utility in condition of preserving user privacy.展开更多
This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigati...This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigation is popular with drivers either for efficient driv- ing in unfamiliar road networks or for a better route, even in familiar road networks with heavy traffic. In this paper, we describe how to take advantage of vehicle trajectories in order to design data-forwarding schemes for information exchange in vehicular networks. The design of data-forwarding schemes takes into account not only the macro-scoped mobility of vehicular traffic statistics in road net- works, but also the micro-scoped mobility of individual vehicle trajectories. This paper addresses the importance of vehicle trajectory in the design of multihop vehicle-to-infrastructure, infrastructure-to-vehicle, and vehicle-to-vehicle data forwarding schemes. First, we explain the modeling of packet delivery delay and vehicle travel delay in both a road segment and an end-to-end path in a road net- work. Second, we describe a state-of-the-art data forwarding scheme using vehicular traffic statistics for the estimation of the end-to- end delivery delay as a forwarding metric. Last, we describe two data forwarding schemes based on both vehicle trajectory and vehicu- lar traffic statistics in a privacy-preserving manner.展开更多
Advances in wireless technologies and positioning technologies and spread of wireless devices, an interest in LBS(Location Based Service) is arising. To provide location based service, tracking data should have been s...Advances in wireless technologies and positioning technologies and spread of wireless devices, an interest in LBS(Location Based Service) is arising. To provide location based service, tracking data should have been stored in moving object database management system (called MODBMS) with proper policies and managed efficiently. So the methods which acquire the location information at regular time intervals then, store and manage have been studied. In this paper, we suggest tracking data management techniques using topology that is corresponding to the moving path of moving object. In our techniques, we update the MODBMS when moving object arrived at a street intersection or a curved road which is represented as the node in topology and predict the location at past and future with attribute of topology and linear function. In this technique, location data that are corresponding to the node in topology are stored, thus reduce the number of update and amount of data. Also in case predicting the location, because topology are used as well as existing location information, accuracy for prediction is increased than applying linear function or spline function.展开更多
There are many sources of geographic big data,and most of them come from heterogeneous environments.The data sources obtained in this case contain attribute information of different spatial scales,different time scale...There are many sources of geographic big data,and most of them come from heterogeneous environments.The data sources obtained in this case contain attribute information of different spatial scales,different time scales and different complexity levels.It is worth noting that the emergence of new high-dimensional trajectory data types and the increasing number of details are becoming more difficult.In this case,visualizing high-dimensional spatiotemporal trajectory data is extremely challenging.Therefore,i-tStar and its extension i-tStar(3D)proposed,a trajectory behavior feature formoving objects that are integrated into a view with less effort to display and extract spatiotemporal conditions,and evaluate our approach through case studies of an open-pit mine truck dataset.The experimental results show that this method is easier to mine the interaction behavior of multi-attribute trajectory data and the correlation and influence of various indicators of moving objects.展开更多
As the sixth generation network(6G)emerges,the Internet of remote things(IoRT)has become a critical issue.However,conventional terrestrial networks cannot meet the delay-sensitive data collection needs of IoRT network...As the sixth generation network(6G)emerges,the Internet of remote things(IoRT)has become a critical issue.However,conventional terrestrial networks cannot meet the delay-sensitive data collection needs of IoRT networks,and the Space-Air-Ground integrated network(SAGIN)holds promise.We propose a novel setup that integrates non-orthogonal multiple access(NOMA)and wireless power transfer(WPT)to collect latency-sensitive data from IoRT networks.To extend the lifetime of devices,we aim to minimize the maximum energy consumption among all IoRT devices.Due to the coupling between variables,the resulting problem is non-convex.We first decouple the variables and split the original problem into four subproblems.Then,we propose an iterative algorithm to solve the corresponding subproblems based on successive convex approximation(SCA)techniques and slack variables.Finally,simulation results show that the NOMA strategy has a tremendous advantage over the OMA scheme in terms of network lifetime and energy efficiency,providing valuable insights.展开更多
Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper pre...Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper presents several tools using CV data to evaluate traffic progression quality along a signalized corridor. These include both performance measures for high-level analysis as well as visualizations to examine details of the coordinated operation. With the use of CV data, it is possible to assess not only the movement of traffic on the corridor but also to consider its origin-destination (O-D) path through the corridor. Results for the real-world operation of an eight-intersection signalized arterial are presented. A series of high-level performance measures are used to evaluate overall performance by time of day, with differing results by metric. Next, the details of the operation are examined with the use of two visualization tools: a cyclic time-space diagram (TSD) and an empirical platoon progression diagram (PPD). Comparing flow visualizations developed with different included O-D paths reveals several features, such as the presence of secondary and tertiary platoons on certain sections that cannot be seen when only end-to-end journeys are included. In addition, speed heat maps are generated, providing both speed performance along the corridor and locations and the extent of the queue. The proposed visualization tools portray the corridor’s performance holistically instead of combining individual signal performance metrics. The techniques exhibited in this study are compelling for identifying locations where engineering solutions such as access management or timing plan change are required. The recent progress in infrastructure-free sensing technology has significantly increased the scope of CV data-based traffic management systems, enhancing the significance of this study. The study demonstrates the utility of CV trajectory data for obtaining high-level details of the corridor performance as well as drilling down into the minute specifics.展开更多
为定量识别城市非信控环形交叉口区域内的机动车冲突风险易发生点,降低环形交叉口的事故发生率,本文构建针对非信控环形交叉口机动车冲突风险识别模型。首先,利用无人机采集高精度、连续的多车辆轨迹视频,结合Kinovea视频运动分析软件...为定量识别城市非信控环形交叉口区域内的机动车冲突风险易发生点,降低环形交叉口的事故发生率,本文构建针对非信控环形交叉口机动车冲突风险识别模型。首先,利用无人机采集高精度、连续的多车辆轨迹视频,结合Kinovea视频运动分析软件实现运行车辆状态识别与跟踪,并记录车辆每一帧的运动数据;其次,基于交通冲突识别指标TTC(Time to Collision),提出适应环形交叉口道路线形特征的车辆TTC计算方法,并使用累计频率法确定严重、一般和轻微冲突的阈值分别为1.2,2.8,4.4 s;最后,通过绘制高峰和平峰交通冲突空间异步图,并结合交通冲突数和严重冲突率,对环形交叉口的36个子区段进行交通冲突风险等级评定。研究结果显示:在高峰时段,某一子区段的平均交通冲突发生次数约为15次,严重冲突率为17.45%;在平峰时段,某一子区段的平均交通冲突发生次数约为8次,严重冲突率为8.28%。重度风险区域在高峰时段占比达到50%,而在平峰时段为8.33%,这些重度风险区域主要集中在交织区段。因此,环形交叉口在高峰时段且位于交织区段的情况更易发生交通事故。本文研究成果有助于交通管理部门了解环形交叉口在不同时段和区段上的交通冲突情况和特征,以便采取相应的预警和管理措施。展开更多
基金funding from the Australian Government,via Grant No.AUSMURIB000001 associated with ONR MURI Grant No.N00014-19-1-2571。
文摘This paper considers a time-constrained data collection problem from a network of ground sensors located on uneven terrain by an Unmanned Aerial Vehicle(UAV),a typical Unmanned Aerial System(UAS).The ground sensors harvest renewable energy and are equipped with batteries and data buffers.The ground sensor model takes into account sensor data buffer and battery limitations.An asymptotically globally optimal method of joint UAV 3D trajectory optimization and data transmission schedule is developed.The developed method maximizes the amount of data transmitted to the UAV without losses and too long delays and minimizes the propulsion energy of the UAV.The developed algorithm of optimal trajectory optimization and transmission scheduling is based on dynamic programming.Computer simulations demonstrate the effectiveness of the proposed algorithm.
文摘Current traffic signal split failure (SF) estimations derived from high-resolution controller event data rely on detector occupancy ratios and preset thresholds. The reliability of these techniques depends on the selected thresholds, detector lengths, and vehicle arrival patterns. Connected vehicle (CV) trajectory data can more definitively show when a vehicle split fails by evaluating the number of stops it experiences as it approaches an intersection, but it has limited market penetration. This paper compares cycle-by-cycle SF estimations from both high-resolution controller event data and CV trajectory data, and evaluates the effect of data aggregation on SF agreement between the two techniques. Results indicate that, in general, split failure events identified from CV data are likely to also be captured from high-resolution data, but split failure events identified from high-resolution data are less likely to be captured from CV data. This is due to the CV market penetration rate (MPR) of ~5% being too low to capture representative data for every controller cycle. However, data aggregation can increase the ratio in which CV data captures split failure events. For example, day-of-week data aggregation increased the percentage of split failures identified with high-resolution data that were also captured with CV data from 35% to 56%. It is recommended that aggregated CV data be used to estimate SF as it provides conservative and actionable results without the limitations of intersection and detector configuration. As the CV MPR increases, the accuracy of CV-based SF estimation will also improve.
文摘In modern workforce management,the demand for new ways to maximize worker satisfaction,productivity,and security levels is endless.Workforce movement data such as those source data from an access control system can support this ongoing process with subsequent analysis.In this study,a solution to attaining this goal is proposed,based on the design and implementation of a data mart as part of a dimensional trajectory data warehouse(TDW)that acts as a repository for the management of movement data.A novel methodological approach is proposed for modeling multiple spatial and temporal dimensions in a logical model.The case study presented in this paper for modeling and analyzing workforce movement data is to support human resource management decision-making and the following discussion provides a representative example of the contribution of a TDW in the process of information management and decision support systems.The entire process of exporting,cleaning,consolidating,and transforming data is implemented to achieve an appropriate format for final import.Structured query language(SQL)queries demonstrate the convenience of dimensional design for data analysis,and valuable information can be extracted from the movements of employees on company premises to manage the workforce efficiently and effectively.Visual analytics through data visualization support the analysis and facilitate decisionmaking and business intelligence.
文摘This is the first of a three-part series of pape rs which introduces a general background of building trajectory-oriented road net work data models, including motivation, related works, and basic concepts. The p urpose of the series is to develop a trajectory-oriented road network data mode l, namely carriageway-based road network data model (CRNM). Part 1 deals with t he modeling background. Part 2 proposes the principle and architecture of the CR NM. Part 3 investigates the implementation of the CRNM in a case study. In the p resent paper, the challenges of managing trajectory data are discussed. Then, de veloping trajectory-oriented road network data models is proposed as a solution and existing road network data models are reviewed. Basic representation approa ches of a road network are introduced as well as its constitution.
文摘This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introduced a general background of building trajectory-oriented road network data models, including motivation, related works, and basic concepts. Based on it, this paper describs the CRNM in detail. At first, the notion of basic roadway entity is proposed and discussed. Secondly, carriageway is selected as the basic roadway entity after compared with other kinds of roadway, and approaches to representing other roadways with carriageways are introduced. At last, an overall architecture of the CRNM is proposed.
文摘This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively. An overall architecture of the CRNM has been proposed in the last paper. On the basis of the above discusses, a linear reference method (LRM) for providing spatial references for location points of a trajectory is developed. A case study is introduced to illustrate the application of the CRNM for modeling a road network in the real world is given. A comprehensive conclusion is given for the series of papers.
基金the Foundation of Graduate Innovation Center in NUAA(kfjj20190707).
文摘Anomalous trajectory detection and traffic flow classification for complicated airspace are of vital importance to safety and efficiency analysis.Some researchers employed density-based unsupervised machine learning method to exploit these trajectories related to air traffic control(ATC)actions.However,the quality of position data and the tiny density difference between traffic flows in the terminal area make it particularly challenging.To alleviate these two challenges,this paper proposes a novel framework which combines robust deep auto-encoder(RDAE)model and density peak(DP)clustering algorithm.Specifically,the RDAE model is utilized to reconstruct denoising trajectory and identify anomaly trajectories in the terminal area by two different regularizations.Then,the nonlinear components captured by the encoder of RDAE are input in the DP algorithm to classify the global traffic flows.An experiment on a terminal airspace at Guangzhou Baiyun Airport(ZGGG)with anomaly label shows that the proposed combination can automatically capture non-conventional spatiotemporal traffic patterns in the aircraft movement.The superiority of RDAE and combination are also demonstrated by visualizing and quantitatively evaluating the experimental results.
基金supported by the National Natural Science Foundations of China (Nos. 61861136005,61851110763,and 71731001).
文摘As the rapid development of aviation industry and newly emerging crowd-sourcing projects such as Flightradar24 and FlightAware,large amount of air traffic data,particularly four-dimension(4D)trajectory data,have become available for the public.In order to guarantee the accuracy and reliability of results,data cleansing is the first step in analyzing 4D trajectory data,including error identification and mitigation.Data cleansing techniques for the 4D trajectory data are investigated.Back propagation(BP)neural network algorithm is applied to repair errors.Newton interpolation method is used to obtain even-spaced trajectory samples over a uniform distribution of each flight’s 4D trajectory data.Furthermore,a new method is proposed to compress data while maintaining the intrinsic characteristics of the trajectories.Density-based spatial clustering of applications with noise(DBSCAN)is applied to identify remaining outliers of sample points.Experiments are performed on a data set of one-day 4D trajectory data over Europe.The results show that the proposed method can achieve more efficient and effective results than the existing approaches.The work contributes to the first step of data preprocessing and lays foundation for further downstream 4D trajectory analysis.
基金The National Key R&D Program of China(No.2018YFB1500800)the Specialized Development Foundation for the Achievement Transformation of Jiangsu Province(No.BA2019025)+1 种基金Pre-Research Fund of Science and Technology on Near-Surface Detection Laboratory(No.6142414190405)the Open Project of the Key Laboratory of Wireless Sensor Network&Communication of Shanghai Institute of Microsystem and Information Technology,Chinese Academy of Sciences(No.20190907).
文摘In order to maximize the value of information(VoI)of collected data in unmanned aerial vehicle(UAV)-aided wireless sensor networks(WSNs),a UAV trajectory planning algorithm named maximum VoI first and successive convex approximation(MVF-SCA)is proposed.First,the Rician channel model is adopted in the system and sensor nodes(SNs)are divided into key nodes and common nodes.Secondly,the data collection problem is formulated as a mixed integer non-linear program(MINLP)problem.The problem is divided into two sub-problems according to the different types of SNs to seek a sub-optimal solution with a low complexity.Finally,the MVF-SCA algorithm for UAV trajectory planning is proposed,which can not only be used for daily data collection in the target area,but also collect time-sensitive abnormal data in time when the exception occurs.Simulation results show that,compared with the existing classic traveling salesman problem(TSP)algorithm and greedy path planning algorithm,the VoI collected by the proposed algorithm can be improved by about 15%to 30%.
基金supported by the Fundamental Research Funds for the Central Universities(No.GK201906009)CERNET Innovation Project(No.NGII20190704)Science and Technology Program of Xi’an City(No.2019216914GXRC005CG006-GXYD5.2).
文摘In recent years,mobile Internet technology and location based services have wide application.Application providers and users have accumulated huge amount of trajectory data.While publishing and analyzing user trajectory data have brought great convenience for people,the disclosure risks of user privacy caused by the trajectory data publishing are also becoming more and more prominent.Traditional k-anonymous trajectory data publishing technologies cannot effectively protect user privacy against attackers with strong background knowledge.For privacy preserving trajectory data publishing,we propose a differential privacy based(k-Ψ)-anonymity method to defend against re-identification and probabilistic inference attack.The proposed method is divided into two phases:in the first phase,a dummy-based(k-Ψ)-anonymous trajectory data publishing algorithm is given,which improves(k-δ)-anonymity by considering changes of thresholdδon different road segments and constructing an adaptive threshold setΨthat takes into account road network information.In the second phase,Laplace noise regarding distance of anonymous locations under differential privacy is used for trajectory perturbation of the anonymous trajectory dataset outputted by the first phase.Experiments on real road network dataset are performed and the results show that the proposed method improves the trajectory indistinguishability and achieves good data utility in condition of preserving user privacy.
基金supported by Faculty Research Fund,Sungkyunkwan University,2013 and by DGIST CPS Global Centerpartly supported by Next-Generation Information Computing Development Program through the National Research Foundation of Korea(NRF)+1 种基金funded by the Ministry of Science,ICT & Future Planning(No.2012033347)the ITR & D program of MKE/KEIT(10041244,SmartTV 2.0 Software Platform)
文摘This paper explains trajectory-based data forwarding schemes for multihop data delivery in vehicular networks where the trajectory is the GPS navigation path for driving in a road network. Nowadays, GPS-based navigation is popular with drivers either for efficient driv- ing in unfamiliar road networks or for a better route, even in familiar road networks with heavy traffic. In this paper, we describe how to take advantage of vehicle trajectories in order to design data-forwarding schemes for information exchange in vehicular networks. The design of data-forwarding schemes takes into account not only the macro-scoped mobility of vehicular traffic statistics in road net- works, but also the micro-scoped mobility of individual vehicle trajectories. This paper addresses the importance of vehicle trajectory in the design of multihop vehicle-to-infrastructure, infrastructure-to-vehicle, and vehicle-to-vehicle data forwarding schemes. First, we explain the modeling of packet delivery delay and vehicle travel delay in both a road segment and an end-to-end path in a road net- work. Second, we describe a state-of-the-art data forwarding scheme using vehicular traffic statistics for the estimation of the end-to- end delivery delay as a forwarding metric. Last, we describe two data forwarding schemes based on both vehicle trajectory and vehicu- lar traffic statistics in a privacy-preserving manner.
文摘Advances in wireless technologies and positioning technologies and spread of wireless devices, an interest in LBS(Location Based Service) is arising. To provide location based service, tracking data should have been stored in moving object database management system (called MODBMS) with proper policies and managed efficiently. So the methods which acquire the location information at regular time intervals then, store and manage have been studied. In this paper, we suggest tracking data management techniques using topology that is corresponding to the moving path of moving object. In our techniques, we update the MODBMS when moving object arrived at a street intersection or a curved road which is represented as the node in topology and predict the location at past and future with attribute of topology and linear function. In this technique, location data that are corresponding to the node in topology are stored, thus reduce the number of update and amount of data. Also in case predicting the location, because topology are used as well as existing location information, accuracy for prediction is increased than applying linear function or spline function.
基金Beijing Key Laboratory of Urban Spatial Information Engineering,Grant No.20220105Ningxia Natural Science Foundation,No.2021AAC03060。
文摘There are many sources of geographic big data,and most of them come from heterogeneous environments.The data sources obtained in this case contain attribute information of different spatial scales,different time scales and different complexity levels.It is worth noting that the emergence of new high-dimensional trajectory data types and the increasing number of details are becoming more difficult.In this case,visualizing high-dimensional spatiotemporal trajectory data is extremely challenging.Therefore,i-tStar and its extension i-tStar(3D)proposed,a trajectory behavior feature formoving objects that are integrated into a view with less effort to display and extract spatiotemporal conditions,and evaluate our approach through case studies of an open-pit mine truck dataset.The experimental results show that this method is easier to mine the interaction behavior of multi-attribute trajectory data and the correlation and influence of various indicators of moving objects.
基金supported by National Natural Science Foundation of China(No.62171158)the project“The Major Key Project of PCL(PCL2021A03-1)”from Peng Cheng Laboratorysupported by the Science and the Research Fund Program of Guangdong Key Laboratory of Aerospace Communication and Networking Technology(2018B030322004).
文摘As the sixth generation network(6G)emerges,the Internet of remote things(IoRT)has become a critical issue.However,conventional terrestrial networks cannot meet the delay-sensitive data collection needs of IoRT networks,and the Space-Air-Ground integrated network(SAGIN)holds promise.We propose a novel setup that integrates non-orthogonal multiple access(NOMA)and wireless power transfer(WPT)to collect latency-sensitive data from IoRT networks.To extend the lifetime of devices,we aim to minimize the maximum energy consumption among all IoRT devices.Due to the coupling between variables,the resulting problem is non-convex.We first decouple the variables and split the original problem into four subproblems.Then,we propose an iterative algorithm to solve the corresponding subproblems based on successive convex approximation(SCA)techniques and slack variables.Finally,simulation results show that the NOMA strategy has a tremendous advantage over the OMA scheme in terms of network lifetime and energy efficiency,providing valuable insights.
文摘Emerging connected vehicle (CV) data sets have recently become commercially available, enabling analysts to develop a variety of powerful performance measures without deploying any field infrastructure. This paper presents several tools using CV data to evaluate traffic progression quality along a signalized corridor. These include both performance measures for high-level analysis as well as visualizations to examine details of the coordinated operation. With the use of CV data, it is possible to assess not only the movement of traffic on the corridor but also to consider its origin-destination (O-D) path through the corridor. Results for the real-world operation of an eight-intersection signalized arterial are presented. A series of high-level performance measures are used to evaluate overall performance by time of day, with differing results by metric. Next, the details of the operation are examined with the use of two visualization tools: a cyclic time-space diagram (TSD) and an empirical platoon progression diagram (PPD). Comparing flow visualizations developed with different included O-D paths reveals several features, such as the presence of secondary and tertiary platoons on certain sections that cannot be seen when only end-to-end journeys are included. In addition, speed heat maps are generated, providing both speed performance along the corridor and locations and the extent of the queue. The proposed visualization tools portray the corridor’s performance holistically instead of combining individual signal performance metrics. The techniques exhibited in this study are compelling for identifying locations where engineering solutions such as access management or timing plan change are required. The recent progress in infrastructure-free sensing technology has significantly increased the scope of CV data-based traffic management systems, enhancing the significance of this study. The study demonstrates the utility of CV trajectory data for obtaining high-level details of the corridor performance as well as drilling down into the minute specifics.
文摘为定量识别城市非信控环形交叉口区域内的机动车冲突风险易发生点,降低环形交叉口的事故发生率,本文构建针对非信控环形交叉口机动车冲突风险识别模型。首先,利用无人机采集高精度、连续的多车辆轨迹视频,结合Kinovea视频运动分析软件实现运行车辆状态识别与跟踪,并记录车辆每一帧的运动数据;其次,基于交通冲突识别指标TTC(Time to Collision),提出适应环形交叉口道路线形特征的车辆TTC计算方法,并使用累计频率法确定严重、一般和轻微冲突的阈值分别为1.2,2.8,4.4 s;最后,通过绘制高峰和平峰交通冲突空间异步图,并结合交通冲突数和严重冲突率,对环形交叉口的36个子区段进行交通冲突风险等级评定。研究结果显示:在高峰时段,某一子区段的平均交通冲突发生次数约为15次,严重冲突率为17.45%;在平峰时段,某一子区段的平均交通冲突发生次数约为8次,严重冲突率为8.28%。重度风险区域在高峰时段占比达到50%,而在平峰时段为8.33%,这些重度风险区域主要集中在交织区段。因此,环形交叉口在高峰时段且位于交织区段的情况更易发生交通事故。本文研究成果有助于交通管理部门了解环形交叉口在不同时段和区段上的交通冲突情况和特征,以便采取相应的预警和管理措施。