scholarly journals Learning-Based Lane-Change Behaviour Detection for Intelligent and Connected Vehicles

2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Luyao Du ◽  
Wei Chen ◽  
Zhonghui Pei ◽  
Hongjiang Zheng ◽  
Shuaizhi Fu ◽  
...  

Detection of lane-change behaviour is critical to driving safety, especially on highways. In this paper, we proposed a method and designed a learning-based detection model of lane-change behaviour in highway environment, which only needs the vehicle to be equipped with velocity and direction sensors or each section of the highway to have a video camera. First, based on the Next Generation Simulation (NGSIM) Interstate 80 Freeway Dataset, we analyzed the relevant features of lane-changing behaviour and preprocessed the data and then used machine learning algorithms to select the suitable features for lane-change detection. According to the result of feature selection, we chose the lateral velocity of the vehicle as the lane-change feature and used machine learning algorithms to learn the lane-change behaviour of the vehicle to detect it. From the dataset, continuous data of 14 vehicles with frequent lane changes were selected for experimental analysis. The experimental results show that the designed KNN lane-change detection model has the best performance with detection accuracy between 89.57% and 100% on the selected dataset, which can well complete the vehicle lane-change detection task.

The internet has become an irreplaceable communicating and informative tool in the current world. With the ever-growing importance and massive use of the internet today, there has been interesting from researchers to find the perfect Cyber Attack Detection Systems (CADSs) or rather referred to as Intrusion Detection Systems (IDSs) to protect against the vulnerabilities of network security. CADS presently exist in various variants but can be largely categorized into two broad classifications; signature-based detection and anomaly detection CADSs, based on their approaches to recognize attack packets.The signature-based CADS use the well-known signatures or fingerprints of the attack packets to signal the entry across the gateways of secured networks. Signature-based CADS can only recognize threats that use the known signature, new attacks with unknown signatures can, therefore, strike without notice. Alternatively, anomaly-based CADS are enabled to detect any abnormal traffic within the network and report. There are so many ways of identifying anomalies and different machine learning algorithms are introduced to counter such threats. Most systems, however, fall short of complete attack prevention in the real world due system administration and configuration, system complexity and abuse of authorized access. Several scholars and researchers have achieved a significant milestone in the development of CADS owing to the importance of computer and network security. This paper reviews the current trends of CADS analyzing the efficiency or level of detection accuracy of the machine learning algorithms for cyber-attack detection with an aim to point out to the best. CADS is a developing research area that continues to attract several researchers due to its critical objective.


Author(s):  
B. Praveen ◽  
S. Mustak ◽  
Pritee Sharma

<p><strong>Abstract.</strong> Mapping of agricultural land use/cover was initiated since the past several decades for land use planning, change detection analysis, crop yield monitoring etc. using earth observation datasets and traditional parametric classifiers. Recently, machine learning, cloud computing, Google Earth Engine (GEE) and open source earth observation datasets widely used for fast, cost-efficient and precise agricultural land use/cover mapping and change detection analysis. Main objective of this study was to assess the transferability of the machine learning algorithms for land use/cover mapping using cloud computing and open source earth observation datasets. In this study, the Landsat TM (L5, L8) of 2018, 2009 and 1998 were selected and median reflectance of spectral bands in Kharif and Rabi season were used for the classification. In addition, three important machine learning algorithms such as Support Vector Machine with Radial Basis Function (SVM-RBF), Random forest (RF) and Classification and Regression Tree (CART) were selected to evaluate the performance in transferability for agricultural land use classification using GEE. Seven land use/cover classes such as built-up, cropland, fallow land, vegetation etc. were selected based on literature review and local land use classification scheme. In this classification, several strategies were employed such as feature extraction, feature selection, parameter tuning, sensitivity analysis on size of training samples, transferability analysis to assess the performance of the selected machine learning algorithms for land use/cover classification. The result shows that SVM-RBF outperforms the RF and CART for both spatial and temporal transferability analysis. This result is very helpful for agriculture and remote sensing scientist to suggest promising guideline to land use planner and policy-makers for efficient land use mapping, change detection analysis, land use planning and natural resource management.</p>


Now a day’s human relations are maintained by social media networks. Traditional relationships now days are obsolete. To maintain in association, sharing ideas, exchange knowledge between we use social media networking sites. Social media networking sites like Twitter, Facebook, LinkedIn etc are available in the communication environment. Through Twitter media users share their opinions, interests, knowledge to others by messages. At the same time some of the user’s misguide the genuine users. These genuine users are also called solicited users and the users who misguidance are called spammers. These spammers post unwanted information to the non spam users. The non spammers may retweet them to others and they follow the spammers. To avoid this spam messages we propose a methodology by us using machine learning algorithms. To develop our approach used a set of content based features. In spam detection model we used Support vector machine algorithm(SVM) and Naive bayes classification algorithm. To measure the performance of our model we used precision, recall and F measure metrics.


2019 ◽  
Vol 1368 ◽  
pp. 052027
Author(s):  
A M Gareev ◽  
E Yu Minaev ◽  
D M Stadnik ◽  
N S Davydov ◽  
V I Protsenko ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document