DOI QR코드

DOI QR Code

An Abnormal Worker Movement Detection System Based on Data Stream Processing and Hierarchical Clustering

  • Duong, Dat Van Anh (Department of Electrical, Electronic and Computer Engineering, University of Ulsan) ;
  • Lan, Doi Thi (Department of Electrical, Electronic and Computer Engineering, University of Ulsan) ;
  • Yoon, Seokhoon (Department of Electrical, Electronic and Computer Engineering, University of Ulsan)
  • Received : 2022.09.07
  • Accepted : 2022.09.14
  • Published : 2022.11.30

Abstract

Detecting anomalies in human movement is an important task in industrial applications, such as monitoring industrial disasters or accidents and recognizing unauthorized factory intruders. In this paper, we propose an abnormal worker movement detection system based on data stream processing and hierarchical clustering. In the proposed system, Apache Spark is used for streaming the location data of people. A hierarchical clustering-based anomalous trajectory detection algorithm is designed for detecting anomalies in human movement. The algorithm is integrated into Apache Spark for detecting anomalies from location data. Specifically, the location information is streamed to Apache Spark using the message queuing telemetry transport protocol. Then, Apache Spark processes and stores location data in a data frame. When there is a request from a client, the processed data in the data frame is taken and put into the proposed algorithm for detecting anomalies. A real mobility trace of people is used to evaluate the proposed system. The obtained results show that the system has high performance and can be used for a wide range of industrial applications.

Keywords

Acknowledgement

This work was supported in part by the Institute of Information and Communication Technology Planning and Evaluation (IITP) Grant by the Korean Government through MSIT (Development of 5G-Based Shipbuilding and Marine Smart Communication Platform and Convergence Service) under Grant 2020-0-00869, and in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant 2021R1I1A3051364.

References

  1. F. Zhang, H. A. D. E. Kodituwakku, W. Hines, and J. B. Coble, "Multi-layer data-driven cyber-attack detection system for industrial control systems based on network, system and process data." IEEE Transactions on Industrial Informatics 15, 7, pp. 4362-4369, 2019. DOI: 10.1109/TII.2019.2891261
  2. D. Wijayasekara, O. Linda, M. Manic, and C. Rieger, "Mining building energy management system data using fuzzy anomaly detection and linguistic descriptions." IEEE Transactions on Industrial Informatics 10, 3, pp. 1829-1840, 2014. DOI: 10.1109/TII.2014.2328291
  3. M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica, "Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing." In 9th Symposium on Networked Systems Design and Implementation, pp. 15-28, 2012.
  4. S. A. Shinde, P. A. Nimkar, S. P. Singh, V. D. Salpe, and Y. R. Jadhav, "MQTT-message queuing telemetry transport protocol." International Journal of Research, 3(3), pp.240-244, 2016.
  5. C. Che, D. Zhang, P. S. Castro, N. Li, L. Sun, S. Li, Z. Wang, "iBOAT: Isolation-based online anomalous trajectory detection." IEEE Transactions on Intelligent Transportation Systems. Vol. 14(2), pp. 806-818, Feb 2013. DOI: 10.1109/TITS.2013.2238531
  6. P. Banerjee, P. Yawalkar, and S. Ranu, "Mantra: a scalable approach to mining temporally anomalous subtrajectories." in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery,pp. 1415-1424, Aug 2016. DOI: 10.1145/2939672.2939846
  7. J.-G. Lee, J. Han, and X. Li, "Trajectory outlier detection: A partition-and-detect framework." in 2008 IEEE 24th International Conference on Data Engineering. pp. 140-149, Apr 2008. DOI: 10.1109/ICDE.2008.4497422
  8. Z. Zhu, D. Yao, J. Huang, H. Li, and J. Bi, "Sub-trajectory-and trajectory-neighbor-based outlier detection over trajectory streams." in Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 551-563, Jun 2018. DOI: 10.1007/978-3-319-93034-3_44
  9. Y. Wang, K. Qin, Y. Chen, and P. Zhao, "Detecting anomalous trajectories and behavior patterns using hierarchical clustering from taxi GPS data." ISPRS International Journal of Geo-Information, 7(1), p.25, Jan 2018. DOI: 10.3390/ijgi7010025
  10. Z. Fu, W. Hu, and T. Tan, "Similarity based vehicle trajectory clustering and anomaly detection." in IEEE International Conference on Image Processing, vol. 2, pp. II-602, Sep 2005. DOI: 10.1109/ICIP.2005.1530127
  11. N. B. Ghrab, E. Fendri, and M. Hammami, "Abnormal events detection based on trajectory clustering." In 2016 13th International Conference on Computer Graphics, Imaging and Visualization, pp. 301-306, Mar 2016. DOI: 10.1109/CGiV.2016.65
  12. L. M. Chen, T. Ozsu, and V. Oria. "Robust and Fast Similarity Search for Moving Object Trajectories." In Proc. ACM SIGMOD International Conference on Management of Data, pp. 491-502, Jun 2005. DOI: 10.1145/1066157.1066213
  13. Q. Zhao, and P. Franti, "WB-index: A sum-of-squares based index for cluster validity." Data & Knowledge Engineering, 92, pp.77-89, Jul 2014. DOI: 10.1016/j.datak.2014.07.008
  14. D. O. Olguin, B. N. Waber, T. Kim, A. Mohan, K. Ara, and A. Pentland, "Sensible organizations: Technology and methodology for automatically measuring organizational behavior." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39 (1), pp. 43-55, Dec 2008. DOI: 10.1109/TSMCB.2008.2006638