Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2457317.2457325acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article

Mining irregularities in maritime container itineraries

Published: 18 March 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Identifying irregularities in sequential data is essential for many application domains. This paper discusses unusual events and how such events could be identified in sequential data. The type of sequential data used in this study holds location-based and time-based information. The irregularities are managed by establishing a weighted relationship between consecutive terms of the sequence. The sequences are spotted as irregular if a sequence is quasi-identical to a usual behavior which means if it is slightly different from a frequent behavior.
    This paper proposes a new approach for identifying and analyzing such irregularities in sequential data. The data used to validate the method represent cargo shipments. This work is part of a PhD research, now in the 3rd year. The proposed technique has been developed to identify irregular maritime container itineraries. The technique consists of two main parts. The first part is to establish the most frequent sequences of ports (regular itineraries). The second part identifies those itineraries that are slightly different to the regular itineraries using a distance-based method in order to classify a given itinerary as normal or suspicious. The distance is calculated using a method that combines quantitative and qualitative differences of the itineraries.

    References

    [1]
    V. Chandola, A. Banerjee and V. Kumar, "Anomaly Detection for Discrete Sequences: A Survey", IEEE Trans. on Knowledge and Data Engineering, pp. 823--839, 2012
    [2]
    W. Eberle, L. Holder and B. Massengill, "Graph-Based Anomaly Detection Applied to Homeland Security Cargo Screening," International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), 2012
    [3]
    B. Cardoso "Standalone Multiple Anomaly Recognition Technique -- SMART" http://www.sbir.gov/sbirsearch/detail/137676
    [4]
    R. E. Swaney and E. R. Gianoulis "Cargo X-Ray Image Anomaly Detection using Intelligent Agents - FORELL" http://www.sbir.gov/sbirsearch/detail/168550
    [5]
    A. Agovic, A. Banerjee, A. R Ganguly, V. Protopopescu "Anomaly detection using manifold embedding and its applications in transportation corridors", Intelligent Data Analysis, 13(3), pp. 435--455, 2009
    [6]
    Y. Ling, M. Jin, M. R Hilliard and J. M Usher, "A study of real-time identification and monitoring of barge-carried hazardous commodities", 17th International Conference on Geoinformatics, pp. 1--4, 2009
    [7]
    P. Sun and S. Chawla, "On local spatial outliers", Fourth IEEE International Conference on Data Mining, pp. 209--216, 2004
    [8]
    C. Lu, D. Chen and Y. Kou, "Detecting spatial outliers with multiple attributes", Fifth IEEE International Conference on Tools with Artificial Intelligence, pp. 122, 2008
    [9]
    Y. Kou, C. Lu and D. Chen, "Spatial weighted outlier detection", Proceedings of the Sixth SIAM International Conference on Data Mining, Bethesda, MD, USA, 2006
    [10]
    W. Eberle and L. Holder, "Anomaly detection in data represented as graphs", Journal Intelligent Data Analysis, 11(6), pp. 663--689, 2007
    [11]
    D. J. Cook and L. B. Holder, "Graph-Based Data Mining", IEEE Intelligent Systems, 15(2), pp. 32--41, 2000
    [12]
    J. Rissanen, "Stochastic Complexity in Statistical Inquiry", World Scientific Publishing Company, 1989

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 Workshops
    March 2013
    423 pages
    ISBN:9781450315999
    DOI:10.1145/2457317
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 March 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    EDBT/ICDT '13

    Acceptance Rates

    EDBT '13 Paper Acceptance Rate 7 of 10 submissions, 70%;
    Overall Acceptance Rate 7 of 10 submissions, 70%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 55
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media