4.8 Article

An Intelligent Particle Swarm Optimization for Short-Term Traffic Flow Forecasting Using on-Road Sensor Systems

Journal

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
Volume 60, Issue 10, Pages 4714-4725

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2012.2213556

Keywords

Fuzzy inference system; neural networks (NNs); particle swarm optimization (PSO); sensor data; sensor systems; time-varying systems; traffic contingency; traffic flow forecasting

Ask authors/readers for more resources

On-road sensor systems installed on freeways are used to capture traffic flow data for short-term traffic flow predictors for traffic management, to reduce traffic congestion and improve vehicular mobility. This paper intends to tackle the impractical time-invariant assumptions which underlie the methods currently used to develop short-term traffic flow predictors: 1) the characteristics of current data captured by on-road sensors are assumed to be time invariant with respect to those of the historical data, which is used to developed short-term traffic flow predictors; and 2) the configuration of the on-road sensor systems is assumed to be time-invariant. In fact, both assumptions are impractical in the real world, as the current traffic flow characteristics can be very different from the historical ones, and also the on-road sensor systems are time varying in nature due to damaged sensors or component wear. Therefore, misleading forecasting results are likely to be produced when short-term traffic flow predictors are designed using these two time-invariant assumptions. To tackle these time-invariant assumptions, an intelligent particle swarm optimization (IPSO) algorithm is proposed to develop short-term traffic flow predictors by integrating the mechanisms of PSO, neural network and fuzzy inference system, to adapt to the time-varying traffic flow characteristics and the time-varying configurations of the on-road sensor systems. The proposed IPSO was applied to forecast traffic flow conditions on a section of freeway in Western Australia, whose traffic flow information can be captured on-line by the on-road sensor system. These results clearly demonstrate the effectiveness of using the proposed IPSO for real-time traffic flow forecasting based on traffic flow data captured by on-road sensor systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Requirement ambiguity and fuzziness in large-scale projects: The problem and potential solutions

Mehdi Rajabi Asadabadi, Elizabeth Chang, Keiran Sharpe

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Theory & Methods

Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control

A. S. M. Kayes, Wenny Rahayu, Paul Watters, Mamoun Alazab, Tharam Dillon, Elizabeth Chang

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Interdisciplinary Applications

Knowledge fusion through academic articles: a survey of definitions, techniques, applications and challenges

Yu Zhang, Min Wang, Morteza Saberi, Elizabeth Chang

SCIENTOMETRICS (2020)

Article Computer Science, Hardware & Architecture

A survey on the suitability of risk identification techniques in the current networked environment

Hamed Aboutorab, Omar K. Hussain, Morteza Saberi, Farookh Khadeer Hussain, Elizabeth Chang

Summary: Risk management is crucial in global supply chains, with most studies focusing on managerial rather than technical perspectives. This paper specifically evaluates techniques for risk identification in the current networked supply chain environment to inform improvements needed for effective risk management.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Energy & Fuels

An Artificial Intelligence Empowered Cyber Physical Ecosystem for Energy Efficiency and Occupation Health and Safety

Petros Koutroumpinas, Yu Zhang, Steve Wallis, Elizabeth Chang

Summary: Reducing energy waste is crucial for Remote Industrial Plants (RIP), especially during the COVID-19 pandemic where balancing energy efficiency and OHS becomes challenging. The AI Empowered Cyber Physical Ecosystem (AECPE) has shown promising results in reducing energy costs, optimizing environmental conditions, and enhancing OHS for industries.

ENERGIES (2021)

Article Computer Science, Interdisciplinary Applications

Analysing academic paper ranking algorithms using test data and benchmarks: an investigation

Yu Zhang, Min Wang, Morteza Saberi, Elizabeth Chang

Summary: Research on academic paper ranking has gained attention, but lacks reliable evaluation standards. Researchers analyze their algorithms using expert decisions and predefined benchmarks, but different methods lead to different results. This study provides a guideline on conducting comprehensive analysis using multiple benchmarks.

SCIENTOMETRICS (2022)

Article Computer Science, Interdisciplinary Applications

Enhancing the analysis of online product reviews to support product improvement: integrating text mining with quality function deployment

Mehdi Rajabi Asadabadi, Morteza Saberi, Nima Salehi Sadghiani, Ofer Zwikael, Elizabeth Chang

Summary: This paper proposes an automated approach to quality management and product improvement using online product reviews. By performing text mining, it effectively captures the voice of the customer and utilizes the extracted information to guide the product improvement process. This approach enhances quality management processes in organizations and advances customer-oriented product improvement.

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2023)

Article Computer Science, Theory & Methods

Provenance-based Intrusion Detection Systems: A Survey

Michael Zipperle, Florian Gottwalt, Elizabeth Chang, Tharam Dillon

Summary: Traditional IDS cannot handle the increasing and sophisticated cyberattacks effectively, while recent research has explored the potential of utilizing data provenance for Host-based IDS to improve detection performance and reduce false alarms. This survey aims to provide a detailed evaluation, propose a novel taxonomy, discuss current issues, and encourage researchers to tackle challenges in data collection, graph summarization, intrusion detection, and real-world benchmark datasets for PIDS.

ACM COMPUTING SURVEYS (2023)

Article Engineering, Electrical & Electronic

Markov Chain-based Mobility Prediction and Relay-node Selection for QoS Provisioned Routing in Opportunistic Wireless Network

C. P. Koushik, P. Vetrivelan, Elizabeth Chang

Summary: This paper proposes a Markov chain-based opportunistic routing protocol, which predicts node mobility using historical movement information and proposes a neighbor table-based relay node selection procedure. The performance of the proposed protocol is evaluated through simulation experiments and compared with existing routing protocols, demonstrating its superiority.

IETE JOURNAL OF RESEARCH (2023)

Article Chemistry, Analytical

An Energy-Efficient T-Based Routing Topology for Target Tracking in Battery Operated Mobile Wireless Sensor Networks

K. Kalaivanan, G. Idayachandran, P. Vetrivelan, A. Henridass, V. Bhanumathi, Elizabeth Chang, P. Sam Methuselah

Summary: Real-time smart applications are now possible due to advancements in communication and sensor technology. Wireless sensor networks (WSNs) are used to collect data from disaster sites and accurately locate detected information for safe rescue operations. The T-based Routing Topology (TRT) is suggested for data collection in landmine-affected areas, utilizing sensors, GPS, and cameras to locate explosive materials with high accuracy. The efficiency of this method is evaluated using Network Simulator-2 (NS-2).

SENSORS (2023)

Proceedings Paper Automation & Control Systems

A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection Systems

Michael Zipperle, Florian Gottwalt, Yu Zhang, Omar Hussain, Elizabeth Chang, Tharam Dillon

Summary: Traditional Intrusion Detection Systems are unable to keep up with sophisticated cyber-attacks, but Provenance-based Intrusion Detection Systems using fine-grained event correlation show increased detection accuracy and reduced false-alarm rates. However, manually creating rules by security experts is time-consuming and lacks high-quality standards. To address this, an automated rule generation framework is proposed to promptly identify similar attacks and affected systems.

2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Towards Expert Preference on Academic Article Recommendation Using Bibliometric Networks

Yu Zhang, Min Wang, Morteza Saberi, Elizabeth Chang

TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Customer-Oriented Assortment Selection in the Big Data Environment

Morteza Saberi, Zahra Saberi, Mehdi Rajabi Aasadabadi, Omar Khadeer Hussain, Elizabeth Chang

ADVANCES IN E-BUSINESS ENGINEERING FOR UBIQUITOUS COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems

Tharam S. Dillon, Yi-Ping Phoebe Chen, Elizabeth Chang, Mukesh Mohania, Vish Ramakonar

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2020)

Editorial Material Automation & Control Systems

Guest Editorial: Blockchain and AI Enabled 5G Mobile Edge Computing

Elizabeth Chang, Kit Yan Chan, Ponnie Clark, Vidy Potdar

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

No Data Available