A location-based service is a service based on the geographical position of a mobile handheld device like a smartphone. This research proposes location-based research, which uses location information to find route anomalies, a common problem of daily life. For example, an alert should be generated when a deliveryman does not follow his regular route to make deliveries. Different kinds of route anomalies are discussed and various methods for detecting the anomalies are proposed in this paper. The proposed method based on a linear route representation finds the matched routes from a set of stored routes as the current route is entered location by location. Route matching is made easy by comparing the current location to linear routes. An alert is generated when no matched routes exist. Preliminary experimental results show the proposed methods are effective and easy to use. 1. Introduction Table 1 shows the worldwide PC and mobile phone sales according to various market research reports [1]. The number of smartphones shipped worldwide has passed the number of PCs and servers shipped in 2011 and the gap between them is expected to keep bigger. The emerging smartphones have created many kinds of applications that are not possible or inconvenient for PCs and servers, even notebooks. One of the best-seller applications is location-based services (LBSs) according to the following market research.(i)Hillard [2] reports 80% of smartphone owners have location-based services and half of them use services that provide offers, promotions, and sales based on their current locations.(ii)The most convenient mobile shopping experience is price comparison and product research according to JiWire [3].(iii) The number of location-based services users was increased from 12.3 million in 2009 to 33.2 million in 2010 (170% increase) in the US based on SNL Kagan [4]. Table 1: Worldwide PC, cellphone, and tablet PC sales. This paper proposes location-based research, which uses location information to find route anomalies. Different kinds of route anomalies are discussed and various methods for detecting the anomalies are proposed in this research. It is divided into five steps: (i) route data collection, (ii) route data preparation, (iii) route pattern discovery, (iv) route pattern analysis and visualization, and (v) route anomaly detection. The major methods use a technique of incremental location search based on a linear route representation, which facilitates the route storage and matching. It begins the searching as soon as the first location of the search route is entered.
References
[1]
W.-C. Hu, “Worldwide: Computer and Device Sales,” 2012, http://www.handheldresearch.org/.
[2]
F. Hillard, “Digital Influence Study,” 2012, http://www.factbrowser.com/facts/4671/.
[3]
JiWire, “JiWire Mobile Audience Insights Report Q2 2011,” 2011, http://www.factbrowser.com/facts/3196/.
[4]
C. C. Chang, E. Jungert, and G. Tortora, Intelligent Image Database System, World Scientific, Singapore, 1996.
[5]
K. Kolodziej and J. Hjelm, Local Positioning Systems: LBS Applications and Services, CRC Taylor & Francis, 2006.
[6]
A. Kupper, Location-Based Services: Fundamentals and Operation 2005, John Wiley & Sons.
[7]
S. Steiniger, M. Neun, and A. Edwardes, “Foundations of Location-Based Services,” 2006, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.1844.
[8]
S. Wang, J. Min, and B. K. Yi, “Location based services for mobiles: technologies and standards,” in Proceedings of the IEEE International Conference on Communication (ICC '08), Beijing, China, May 2008.
[9]
Y. Zheng, L. Zhang, X. Xie, and W.-Y. Ma, “Mining interesting locations and travel sequences from GPS trajectories,” in Proceedings of the 18th International World Wide Web Conference (WWW '09), Madrid, Spain, April 2009.
[10]
Y. Zheng, L. Liu, L. Wang, and X. Xie, “Learning transportation mode from raw GPS data for geographic applications on the web,” in Proceedings of the 17th International Conference on World Wide Web (WWW '08), pp. 247–256, April 2008.
[11]
H. Yoon, Y. Zheng, X. Xie, and W. Woo, “Smart itinerary recommendation based on user-generated GPS trajectories,” Lecture Notes in Computer Science, vol. 6406, pp. 19–34, 2010.
[12]
D. Liu and M. Chang, “Recommend touring routes to travelers according to their sequential wandering behaviours,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN '09), pp. 350–355, Kaohsiung, Taiwan, December 2009.
[13]
M. Duckham, S. Winter, and M. Robinson, “Including landmarks in routing instructions,” Journal of Location Based Services, vol. 4, no. 1, pp. 28–52, 2010.
[14]
F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi, “Trajectory pattern mining,” in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '07), pp. 330–339, San Jose, Calif, USA, August 2007.
[15]
W. Liu, Y. Zheng, S. Chawla, J. Yuan, and X. Xie, “Discovering spatio-temporal cal interactions in traffic data streams,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '11), San Diego, Calif, USA, August 2011.
[16]
G. Myles, A. Friday, and N. Davies, “Preserving privacy in environments with location-based applications,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 56–64, 2003.
[17]
H. Tootell, “Location-based services and the price of security,” in Proceedings of the IEEE Internaional Symposium on Technology and Society (ISTAS '06), Queens, NY, USA, June 2006.
[18]
L. X. Pang, S. Chawla, W. Liu, and Y. Zheng, “On mining anomalous patterns in road traffic streams,” in Proceedings of the 7th International Conference on Advanced Data Mining and Applications (ADMA '11), pp. 237–251, Beijing, China, December 2011.
[19]
S. Y. Lee and F. J. Hsu, “2D C-string: a new spatial knowledge representation for image database systems,” Pattern Recognition, vol. 23, no. 10, pp. 1077–1087, 1990.
[20]
P. W. Huang and Y. R. Jean, “Using 2D C+-strings as spatial knowledge representation for image database systems,” Pattern Recognition, vol. 27, no. 9, pp. 1249–1257, 1994.
[21]
S. Y. Lee, M. K. Shan, and W. P. Yang, “Similarity retrieval of iconic image database,” Pattern Recognition, vol. 22, no. 6, pp. 675–682, 1989.
[22]
T. C. Wu and C. C. Chang, “Application of geometric hashing to iconic database retrieval,” Pattern Recognition Letters, vol. 15, no. 9, pp. 871–876, 1994.
[23]
A. V. Aho and M. J. Corasick, “Efficient string matching: an aid to bibliographic search,” Communications of the ACM, vol. 18, no. 6, pp. 333–340, 1975.
[24]
B. Meyer, “Incremental string matching,” Information Processing Letters, vol. 21, no. 5, pp. 219–227, 1985.
[25]
K. Tsuda, M. Fuketa, and J. I. Aoe, “An incremental algorithm for string pattern matching machines,” International Journal of Computer Mathematics, vol. 58, no. 1-2, pp. 33–42, 1995.
[26]
S. Koenig, M. Likhachev, and D. Furcy, “Lifelong planning A*,” Artificial Intelligence, vol. 155, no. 1-2, pp. 93–146, 2004.
[27]
S. Koenig, M. Likhachev, Y. Liu, and D. Furcy, “Incremental heuristic search in AI,” AI Magazine, vol. 25, no. 2, pp. 99–112, 2004.
[28]
Y. Chen, K. Jiang, Y. Zheng, C. Li, and N. Yu, “Trajectory simplification method for location-based social networking services,” in Proceedings of the International Workshop on Location Based Social Networks (LBSN '09), pp. 33–40, 2009.
[29]
T. Pavlidis, Structural Pattern Recognition, Spring, New York, NY, USA, 1977.