Skip to main content

Learning Maritime Traffic Rules Using Potential Fields

  • Conference paper
  • First Online:
Computational Logistics (ICCL 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9335))

Included in the following conference series:

  • 4133 Accesses

Abstract

The Automatic Identification System (AIS) is used to identify and locate active maritime vessels. Datasets of AIS messages recorded over time make it possible to model ship movements and analyze traffic events. Here, the maritime traffic is modeled using a potential fields method, enabling the extraction of traffic patterns and anomaly detection. A software tool named STRAND, implementing the modeling method, displays real-world ship behavior patterns, and is shown to generate traffic rules spontaneously. STRAND aids maritime situational awareness by displaying patterns of common behaviors and highlighting suspicious events, i.e., abstracting informative content from the raw AIS data and presenting it to the user. In this it can support decisions regarding, e.g., itinerary planning, routing, rescue operations, or even legislative traffic regulation. This study in particular focuses on identification and analysis of traffic rules discovered based on the computed traffic models. The case study demonstrates and compares results from three different areas, and corresponding traffic rules identified in course of the result analysis. The ability to capture distinctive, repetitive traffic behaviors in a quantitative, automatized manner may enhance detection and provide additional information about sailing practices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Osekowska, E., Axelsson, S., Carlsson, B.: Potential fields in modeling transport over water. In: Transport of Water versus Transport over Water, pp. 259–280 (2015)

    Google Scholar 

  2. Bichou, K., Szyliowicz, J.S., Zamparini, L.: Maritime Transport Security: Issues, Challenges and National Policies. Comparative Perspectives on Transportation Security Series (2014)

    Google Scholar 

  3. Coutroubis, A.D., Kiourktsoglou, G.: Maritime piracy analysis. In: Maritime Transport Security: Issues, Challenges and National Policies, p. 98 (2014)

    Google Scholar 

  4. Acciaro, M., Serra, P.: Maritime supply chain security: a critical review. In: IFSPA 2013, Trade Supply Chain Activities and Transport: Contemporary Logistics and Maritime Issues, p. 636 (2013)

    Google Scholar 

  5. Osekowska, E., Axelsson, S., Carlsson, B.: Potential fields in maritime anomaly detection. In: Proceedings of the 3rd International Conference on Models and Technologies for Intelligent Transport Systems (2013)

    Google Scholar 

  6. Hagelbäck, J.: Multi-agent potential field based architectures for real-time strategy game bots. Blekinge Institute of Technology (2012)

    Google Scholar 

  7. Perera, L.P., Oliveira, P.: Maritime Traffic Monitoring Based on Vessel Detection, Tracking, State Estimation, and Trajectory Prediction. IEEE Transactions on Intelligent Transportation Systems 13(3), 1188–1200 (2012)

    Article  Google Scholar 

  8. Cariou, P., Notteboom, T.: Bunker costs in container liner shipping: are slow steaming practices reflected in maritime fuel surcharges? In: Notteboom, T. (ed.) Current Issues in Shipping Ports and Logistics, pp. 69–82 (2011)

    Google Scholar 

  9. Laxhammar, R., Falkman, G.: Sequential conformal anomaly detection in trajectories based on Hausdorff distance. In: Proc. of the 14th Int. Conf. on Information Fusion (FUSION) (2011)

    Google Scholar 

  10. Witten, I.H., Eibe, F.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems (2011)

    Google Scholar 

  11. Brax, C., Karlsson, A., Andler, S.F., Johansson, R., Niklasson, L.: Evaluating precise and imprecise state-based anomaly detectors for maritime surveillance. In: Proceedings of the 13th Conference on Information Fusion (FUSION) (2010)

    Google Scholar 

  12. Riveiro, M., Falkman, G.: Interactive visualization of normal behavioral models and expert rules for maritime anomaly detection. In: Proc. of the Sixth Int. Conf. on Computer Graphics, Imaging and Visualization (2009)

    Google Scholar 

  13. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys 41(3), 1–58 (2009)

    Article  Google Scholar 

  14. Ristic, B., Scala, B.L., Morelande, M., Gordon, N.: Statistical analysis of motion patterns in AIS data: anomaly detection and motion prediction. In: Proc. of the 11th Int. Conf. on Information Fusion (2008)

    Google Scholar 

  15. Riveiro, M., Falkman, G., Ziemke T.: Visual analytics for the detection of anomalous maritime behavior. In: Proc. of the 12th Int. Conf. on Information Visualisation (2008)

    Google Scholar 

  16. Rhodes, B.J., Bomberger N.A., Seibert, M., Waxman, A.M.: Seecoast: automated port scene understanding facilitated by normalcy learning. In: Proceedings of the Military Communications Conf. (2006)

    Google Scholar 

  17. Mitchell, T.M.: Machine Learning. McGraw-Hill (1997)

    Google Scholar 

  18. Hutchins, E.: Cognition in the Wild. MIT Press, Cambridge (1995)

    Google Scholar 

  19. Jekeli, C.: Alternative methods to smooth the Earth’s gravity field. In: Reports of the Department of Geodetic Science and Surveying. Report 327 (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ewa Osekowska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Osekowska, E., Carlsson, B. (2015). Learning Maritime Traffic Rules Using Potential Fields. In: Corman, F., Voß, S., Negenborn, R. (eds) Computational Logistics. ICCL 2015. Lecture Notes in Computer Science(), vol 9335. Springer, Cham. https://doi.org/10.1007/978-3-319-24264-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24264-4_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24263-7

  • Online ISBN: 978-3-319-24264-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics