skip to main content
research-article

Research Issues of Outlier Detection in Trajectory Streams Using GPUs

Published:11 December 2018Publication History
Skip Abstract Section

Abstract

The widespread availability of sensors like GPS and traffic cameras has made it possible to collect large amounts of spatio-temporal data. One such type of data are trajectories, each of which consists of a time-ordered sequence of positions that a moving object occupies in space as time goes by. Trajectories can be streamed in real time from sensors, and because of this, they capture the current state of moving objects. For this reason, trajectories can be used in applications such as the real-time detection of senior citizens who have just fallen or who have just gotten lost outdoors, the real-time detection of drunk drivers, and the real-time detection of enemy forces in the battlefield. These applications involve the identification of trajectories with anomalous behaviors, and require fast processing in order to take immediate preventive action. However, outlier detection poses challenges stemming from both the complexity of the data and of the task. One way to address this is through parallel architectures like GPUs. In this paper, we present the problem of outlier detection in trajectory streams, and discuss the research issues that should be addressed by new outlier detection techniques for trajectory streams on GPUs.

References

  1. V. Chandola, A. Banerjee and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41, no. 3, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Hawkins, Identification of Outliers, Chapman and Hall, 1980.Google ScholarGoogle Scholar
  3. M. Gupta, J. Gao, C. Aggarwal and J. Han, Outlier Detection for Temporal Data, Morgan Claypool Synthesis Lectures, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Stonebraker, U. Çetintemel and S. Zdonik, "The 8 requirements of real-time stream processing," ACM SIGMOD Record, vol. 34, no. 4, pp. 42--47, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Z. Galic, Spatio-temporal Data Streams, Springer, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. C. Aggarwal, Outlier Analysis, 2nd ed., Springer, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Bu, L. Chen, A. W.-C. Fu and D. Liu, "Efficient anomaly monitoring over moving object trajectory streams," in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Yu, L. Cao, E. A. Rundensteiner and Q. Wang, "Outlier Detection over Massive-Scale Trajectory Streams," ACM Transactions on Database Systems (TODS), vol. 42, no. 2, June 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Ge, H. Xiong, Z.-h. Zhou, H. Ozdemir, J. Yu and K. C. Lee, "Top-Eye: top-k evolving trajectory outlier detection," in CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Yu, L. Cao, E. A. Rundensteiner and Q. Wang, "Detecting Moving Object Outliers in Massive-Scale Trajectory Streams," in Knowledge Discovery and Data Mining (KDD), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L.-a. Tang, X. Yu, S. Kim, J. Han, C.-C. Hung and W.-C. Peng, "Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems," in IEEE International Conference on Data Mining, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. V. W. Lee, C. Kim, J. Chhugani, M. Deisher, D. Kim, A. D. Nguyen, N. Satish, M. Smelyanskiy, S. Chennupaty, P. Hammarlund, R. Singhal and P. Dubey, "Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU," in 37th annual international symposium on Computer architecture, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Cao, O. Wolfson and G. Trajcevski, "Spatio-temporal data reduction with deterministic error bounds," vol. 15, no. 3, pp. 211--228, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J.-G. Lee, J. Han and X. Li, "Trajectory Outlier Detection: A Partition-and-Detect Framework," in Proceedings of the IEEE 24th International Conference on Data Engineering, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Lustig and M. Martonosi, "Reducing GPU offload latency via fine-grained CPU-GPU synchronization," in Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Li, Y. Luo, N. Zhang and Y. Cao, "HeteroSpark: A heterogeneous CPU/GPU Spark platform for machine learning algorithms," in IEEE Conference on Networking, Architecture and Storage, 2015.Google ScholarGoogle Scholar
  17. M. Zaharia, M. Chowdhury, M. J. Franklin and I. Stoica, "Spark: cluster computing with working sets," in Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Garland and D. Kirk, "Understanding Throughputoriented Architectures," Communications of the ACM, vol. 53, no. 11, p. 58--66, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Wilt, The CUDA Handbook: A Comprehensive Guide to GPU Programming, Addison-Wesley, 2013.Google ScholarGoogle Scholar
  20. N. Wilt, The CUDA Handbook: A Comprehensive Guide to GPU Programming, Addison-Wesley, 2013.Google ScholarGoogle Scholar
  21. Y. Ge, H. Xiong, C. Liu and Z.-H. Zhou, "A Taxi Driving Fraud Detection System," in Proceedings of the 2011 IEEE 11th International Conference on Data Mining, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Stonebraker, U. Çetintemel and S. Zdonik, "The 8 requirements of real-time stream processing," ACM SIGMOD Record, vol. 34, no. 4, pp. 42--47, December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Ma, H. Lu, L. Shou and G. Chen, "KSQ: Top-k Similarity Query on Uncertain Trajectories," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 9, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. F. Cagnacci, L. Boitani, R. A. Powell and M. S. Boyce, "Animal ecology meets GPS-based radiotelemetry: a perfect storm of opportunities and challenges," Philosophical Transactions of the Royal Society of Biological Sciences, vol. 365, no. 1550, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  25. N. J. Hill, I. T. M. Hussein, K. R. Davis, E. J. Ma, T. J. Spivey, A. M. Ramey, W. B. Puryear, S. R. Das, R. A. Halpin, X. Lin, N. B. Fedorova, D. L. Suares, W. M. Boyce and J. A. Runstadler, "Reassortment of Influenza A Viruses in Wild Birds in Alaska before H5 Clade 2.3.4.4 Outbreaks," Emerging and Infectious Diseases, vol. 23, no. 4, 2017.Google ScholarGoogle Scholar
  26. H. Cao, O. Wolfson and G. Trajcevski, "Spatio-temporal data reduction with deterministic error bounds," The VLDB Journal, vol. 15, no. 3, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Nvidia, "Cuda C Best Practices Guide v.9.1," March 2018. {Online}.Google ScholarGoogle Scholar
  28. D. Kirk and W.-m. Hwu, Programming Massively Parallel Processors: A Hands on Approach, San Francisco: Morgan Kauffman, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Nvidia, "CUDA Programming Guide v.9.1.85," 2018 March. {Online}.Google ScholarGoogle Scholar
  30. X. Wu, X. Zhu, G.-Q. Wu and W. Ding, "Data Mining with Big Data," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader