Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning
<p>Access, Egress, and Interchange (AEI) Framework with data collection points from approximately 380 stations.</p> "> Figure 2
<p>Topological mapping of Artificial Neural Network (ANN)-based mobility prediction for the London Underground and Overground (LUO) environment.</p> "> Figure 3
<p>Test scenario layout.</p> "> Figure 4
<p>Plain text AEI data.</p> "> Figure 5
<p>Simulation results for train traffic flows AEI framework considering three dimensional (3D) dataset for 1 week in the year 2017–2018. Plotted LUO dataset is from 05:00 AM to 02:00 AM (21-h) by different train lines on multiple stations with specific station numbers.</p> "> Figure 6
<p>ANN algorithm based simulation results for the classification of train traffic flows AEI framework mobility predictions using three classes; Access (A), Egress (E), and Interchange (I).</p> "> Figure 7
<p>Receiver operating characteristic (ROC) curve for three classes Access (A), Egress (E), and Interchange (I) representing the specificity pair corresponding to a AEI Framework decision threshold. Grey line in the middle of the plot is a threshold line between True Positive and False Positive Ratios.</p> "> Figure 8
<p>Encrypted text AEI data.</p> ">
Abstract
:1. Introduction
1.1. Motivations
- Real-Time processing (Train Network side): Engineers and control centres would be able to remotely access the network for maintenance purposes such as passenger traffic flows for undertaking any measures against safety, monitoring passengers’ pathways to advise the best possible routes in real-time and reduce the risk of critical conditions. In the context of the LUO environment, there is an immediate requirement to optimise the whole network with train conditions and live monitoring for improving attribution of delays, scheduling, and analysis. Furthermore, it would enhance train prediction times, which is the cornerstone of better passenger journeys, suggesting alternate routes and positioning on the correct platform at terminus stations.
- Passenger live experience (User side): 5G can help facilitate daily passengers to avoid such trains which are congested and have minimum space to comfortably board on. 5G automated mechanisms, such as sensors within the train carriages, tunnels, stations and, platforms, would assist passengers in deciding the best pathway to take.
- Low latency for real-time data response: Manage customer incidents to reduce the risk of antisocial behaviour and to improve passenger safety, a 5G empowered mechanism using the AEI framework would be able to provide better automated incident management.
- Data and Analytics: For increasing the revenue through media and advertising, it would attract companies to advertise on the train network when demographics and AEI traffic flow information through predicted cases are available. Similarly, train braking performances are recorded through moisture sensors, which is an essential part of adhesion management and control. Hence, using the AEI framework with the mobility prediction accuracies, braking rate adjustments and reduction in unnecessary delay information can be obtained. This would, in turn, automate the braking adjustments while continuously monitoring predicted real-time traffic flows through proactive scheduling decisions. Furthermore, weight and temperature monitoring are other applications equally important when considering the train network below ground. Therefore, 5G empowered mechanisms that would monitor predicted weight and temperature in the real-time scenario, advising passengers to move into other train carriages, removing passengers from specific carriages, providing real-time advice to carry water in hot temperatures, de-training in critical circumstances, enforcing no-trains if delays are possible, holding doors for longer periods, providing better information to reduce risk of carrying ill passengers, minimizing platform crowding, and providing accurate timetabling and scheduling, would further strengthen the theme of mobility predictions.
- Private AEI Framework: To preserve real-time passenger data recorded through the tap-in tap-out machines at the stations, real-time encryption is required to provide an added security layer. Lightweight encryption with less time of operation is important against malicious attacks on the key information that is subject to authorised staff only.
1.2. Related Work
- Reactive mode of operation: Traditional SON algorithms are reactive in nature and the methods employed for mobile network optimisation are not well suited in the context of the target problem since passenger traffic flows in an LUO environment are dynamic and constantly varying. Improvement can be obtained through this method but at the cost of sacrificing time, resources, and QoS. However, due to the continuously varying dynamics of the passenger traffic flows in an LUO environment according to time of congestion on the platforms and stations when a remedy is planned, the conditions may have already changed drastically. This leaves a gap in planning new remedies before it can be influenced. The problem becomes worse in 5G, where complexity of haphazard assortment of different types of passengers traffic in either absence or limitations of cellular coverage within the LUO environment.
- 5G optimisation in ultra reliable low latency: Real-time alerts, monitoring, and supporting mission critical applications are required to meet certain 5G optimisation and latency standards [44] keeping good QoS and without affecting the operational technology (OT) train network. Traffic complexity on stations, tunnels, and platforms add unnecessary latency, which puts the train’s operational network in a difficult position to address mission critical applications. Therefore, a demand for predicting passenger flows for low-latency remedies demands is needed.
- User Flow Discovery in LUO Environment: A key challenge to discover a user pattern where users have multiple ways to travel in the LUO network, such as Access, Egress, and Interchange (AEI), along with the ridership data obtained from Interchange-Alighters and Interchange-Boarders. Existing mobility prediction methods overlook this challenge to the best of our knowledge. User mobility pattern approaches may work in low, medium, and high density networks above ground where the LTE cellular network is available; however, we are not aware of any studies that address the problem of 5G scalability, measurability, and applications in complex LUO ecology.
- Intelligent transport systems (ITS): Another challenge in the 5G domain is to have an intelligent system that would assist transportation in SCP. Many concepts have been proposed to regulate the mobility of users above ground by using cellular services. However, there is not much work done in the field of ITS using the AEI framework in an LUO environment where cellular services are patchy. With the limitation of cellular services, either on-board train modules or ticket machines take the responsibility of traffic flow monitoring. The 5G concept of onboard ITS is fairly new, which is yet to be deployed. Train suppliers, for example, Siemens, are making splendid efforts in order to deliver innovative trains with special functionality of on-board monitoring concept (Mobility in Metro London can be found online at: https://www.mobility.siemens.com/global/en/portfolio/references/metro-london.html).
- Planning and cost of technology: When 5G brings numerous benefits to the technology, it also brings concerns over planning and deployment costs. There are various methods discussed within the domain of 5G, associated with planning and costs in the energy efficiency, densely populated HetNets, spectrum usage domain, internal logistics and Logistics 4.0, transport systems, etc. However, there seems to have been less work conducted in the domain of classification of mobility predictions and encryption modelling considering passenger traffic flows in underground trains.
- Encryption: Advanced Encryption Standard (AES) and Data Encryption Standard (DES) can provide confidentiality but for real-time encryption, a light-weight encryption algorithm is required [42]. Over several years, cryptographers are using chaos-based cryptosystems for faster and real-time encryption. In this paper, we have also used two chaotic maps known as a nonlinear chaotic map and logistic map that have quick time responses and have lower memory sizes compared to existing schemes. Our novel scheme would be able to provide an extra layer of security that is difficult to deduce secret cryptographic keys. One can also propose an encryption algorithm with a single map for faster processing but due to lower key space issues, we have used two maps in this research.
1.3. Contributions
- As a building block of the AEI framework, we propose ML driven models that take into account spatio-temporal characteristics of passenger flows in the LUO environment for mobility prediction in a large-scale train network. Our proposed mobility prediction model overcomes the limitation of conventional ML classification algorithms that failed to incorporate high accumulated passenger traffic in three dimensional states (3D), i.e., number of passengers, travelling time, and AEI based passengers travelling and behavioural information (Section 2.1 and Section 2.2).
- Based on the intelligence gained from the mobility model, i.e., mobility prediction classification and directions, a proactive movement precision is formulated to maximise the advantage of traffic flows in several unexpected directions and instructing passengers to take necessary interchanges. In this way, real-time directions can be exploited for monitoring purposes shown in Section 2.3. Classification estimation for the next passenger movements is mentioned in Section 2.4.
- We also propose a novel encryption method to preserve real-time passenger traffic flows where a system incorporates cost, easy deployment, security and privacy preservation aspects (Section 2.5). This is benchmarked against the current security parameters and measures that have been used across transportation specifically in train ticket machines using RFID technology. The encryption provides security, which is transaction oriented data integrity that is light weight, proactive, and provides faster data rates than existing technologies.
- Next, we propose a novel method to map the classification results through comparative performance analysis of six ML algorithms, comprehensively. It has been shown that the highest prediction accuracy has been obtained by ANN, as detailed in Section 3.3.1. In addition, an encryption algorithm that is capable of handling the heavy passengers traffic flow in real-time while providing faster processing that can hold an unlimited number of different applications without any limitations of memory sizes is discussed in Section 3.3.2.
- System level comprehensive performance analysis of our proposed model have been conducted that complies with multi-tier 3GPP simulations. The prediction accuracies of ML algorithms have been compared using a realistic AEI framework. Error margins have been estimated in cross validation of training real-time data to be around 10%.
2. System Model
- Artificial Neural Network (ANN) driven Mobility Prediction.
- Movement Precision to map Future User Location.
- Next Movement Classification Estimation.
- Encryption based real-time security built into the passenger traffic flow recorded by RFID contactless devices at ticket machines.
2.1. AEI Framework
2.2. Artificial Neural Network (Ann) Driven Mapping of Mobility Prediction
2.3. Movement Precision to Map Future User Location
2.4. Next Movement Classification Estimation
2.5. Encryption of Passenger Traffic Flows
- Let A is a plain text data having size . Apply secure hash algorithm (SHA-512) on A and get a 128 hexadecimal value. Store SHA value in .
- Convert into decimal and store value in .
- Get an initial value for chaos map using the below equation:
- Provide seed parameter to Nonlinear chaos map given below [42]:
- Define other seed and parameters for chaos map and iterate map to get random sequences and save sequence in .
- Convert plain text information into three different channels, i.e., , , and . Now shuffle rows and columns of each channel with the sequence obtain from the chaos map and store value in , , and , respectively.
- Logistic map is written as [43]:
- Reshape S into three separate matrices, i.e., , , and Apply XOR operation:
- Combine , , and save the value in C that is the final encrypted sensitive information.
3. Methodology
3.1. Machine Learning Based Mobility Prediction Algorithms
3.1.1. K-Nearest Neighbour (KNN)
3.1.2. Support Vector Machine (SVM)
3.1.3. Discriminant Analysis (DA)
3.1.4. Naive Bayes (NB)
3.1.5. Decision Tree (DT)
3.2. Simulation Settings and Data Set
3.3. Results
3.3.1. Mobility Prediction Accuracy
3.3.2. Encryption
4. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Oh, E.; Krishnamachari, B.; Liu, X.; Niu, Z. Toward dynamic energy-efficient operation of cellular network infrastructure. IEEE Commun. Mag. 2011, 49, 56–61. [Google Scholar] [CrossRef]
- Patel, D.; Neil, G. Passenger information systems on London Underground Limited rolling stock. In Proceedings of the IEEE Colloquium on Passenger Information (Trains and Trackside) (Digest No.030), London, UK, 5 February 1991. [Google Scholar]
- Malmodin, J.; Lunden, D.; Moberg, Å.; Andersson, G.; Nilsson, M. Life Cycle Assessment of ICT: Carbon footprint and operational electricity use from the operator, national, and subscriber perspective in Sweden. IEEE J. Ind. Ecol. 2014, 18, 829–845. [Google Scholar] [CrossRef]
- Wang, H.; Xu, F.; Li, Y.; Zhang, P.; Jin, D. Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment. IEEE/ACM Trans. Netw. 2017, 25, 1147–1161. [Google Scholar]
- Asad, S.M.; Ozturk, M.; Rais, R.N.B.; Zoha, A.; Hussain, S.; Abbasi, Q.H.; Imran, M.A. Reinforcement Learning driven Energy Efficient Mobile Communication and Applications. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, UAE, 10–12 December 2019. [Google Scholar]
- Chen, C.; Berry, R.A.; Honig, M.L.; Subramanian, V.G. Competitive Resource Allocation in HetNets: The Impact of Small-Cell Spectrum Constraints and Investment Costs. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 478–490. [Google Scholar] [CrossRef] [Green Version]
- Baumann, P.; Koehler, C.; Dey, A.K.; Santini, S. Selecting Individual and Population Models for Predicting Human Mobility. Trans. Mob. Comput. 2018, 17, 2408–2422. [Google Scholar] [CrossRef]
- Lee, K.; Hong, S.; Kim, S.J.; Rhee, I.; Chong, S. SLAW: Self-Similar Least-Action Human Walk. IEEE/ACM Trans. Netw. 2012, 20, 515–529. [Google Scholar] [CrossRef]
- Klaine, P.V.; Imran, M.A.; Onireti, O.; Souza, R.D. A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks. IEEE Commun. Surv. Tutor. 2017, 19, 2392–2431. [Google Scholar] [CrossRef] [Green Version]
- Liu, L.; Shah, S.A.; Zhao, G.; Yang, X. Respiration symptoms monitoring in body area networks. Appl. Sci. 2018, 8, 568. [Google Scholar] [CrossRef] [Green Version]
- Fazio, P.; Tropea, M.; De Rango, F.; Voznak, M. Pattern Prediction and Passive Bandwidth Management for Hand-over Optimization in QoS Cellular Networks with Vehicular Mobility. IEEE Trans. Mob. Comput. 2016, 15, 2809–2824. [Google Scholar] [CrossRef]
- Farooq, H.; Imran, A. Spatiotemporal Mobility Prediction in Proactive Self-Organizing Cellular Networks. IEEE Commun. Lett. 2017, 21, 370–373. [Google Scholar] [CrossRef]
- Song, C.; Qu, Z.; Blumm, N.; Barabási, A.L. Limits of Predictability in Human Mobility. IEEE Trans. Mob. Comput. 2010, 327, 1018–1021. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zhang, H.; Dai, L. Mobility prediction: A survey on state-of-the-art schemes and future applications. IEEE Access 2019, 7, 802–822. [Google Scholar] [CrossRef]
- Park, H.; Lim, Y. A markov-based prediction algorithm for user mobility at heterogeneous cloud radio access network. In Proceedings of the IEEE International Conference on Big Data and Smart Computing (BigComp), Kyoto, Japan, 27 February–2 March 2019; pp. 1–5. [Google Scholar]
- Aliu, O.G.; Imran, A.; Imran, M.A.; Evans, B. A Survey of Self Organisation in Future Cellular Networks. IEEE Commun. Surv. Tutor. 2013, 15, 336–361. [Google Scholar] [CrossRef] [Green Version]
- Lv, Q.; Qiao, Y.; Ansari, N.; Liu, J.; Yang, J. Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest. IEEE Trans. Veh. Technol. 2017, 66, 5204–5216. [Google Scholar] [CrossRef]
- Hasan Farooq, A.A.; Imran, A. Mobility Prediction-Based Autonomous Proactive Energy Saving (AURORA) Framework for Emerging Ultra-Dense Networks. IEEE Trans. Green Commun. Netw. 2018, 2, 958–971. [Google Scholar] [CrossRef]
- Cong, Y.; Zhou, X.; Kennedy, R.A. Interference Prediction in Mobile Ad Hoc Networks With a General Mobility Model. IEEE Trans. Wirel. Commun. 2015, 14, 4277–4290. [Google Scholar] [CrossRef]
- Apollinaire Nadembega, A.H.; Taleb, T. A Destination and Mobility Path Prediction Scheme for Mobile Networks. IEEE Trans. Veh. Technol. 2015, 64, 2577–2590. [Google Scholar] [CrossRef]
- Yu, Z.; Wang, H.; Guo, B.; Gu, T.; Mei, T. Supporting Serendipitous Social Interaction Using Human Mobility Prediction. IEEE Trans. Hum.-Mach. Syst. 2015, 45, 811–818. [Google Scholar] [CrossRef]
- Mondal, M.A.; Rehena, Z. Identifying Traffic Congestion Pattern using K-means Clustering Technique. In Proceedings of the International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019. [Google Scholar]
- Asif, M.T.; Dauwels, J.; Goh, C.Y.; Oran, A.; Fathi, E.; Xu, M.; Dhanya, M.M.; Mitrovic, N.; Jaillet, P. Spatiotemporal Patterns in Large-Scale Traffic Speed Prediction. IEEE Trans. Intell. Transp. Syst. 2014, 15, 794–804. [Google Scholar] [CrossRef] [Green Version]
- Chen, M.; Challita, U.; Saad, W.; Yin, C.; Debbah, M. Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial. IEEE Commun. Surv. Tutor. 2019, 21, 3039–3071. [Google Scholar] [CrossRef] [Green Version]
- Chan, K.Y.; Dillon, T.S.; Singh, J.; Chang, E. Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg–Marquardt Algorithm. IEEE Trans. Intell. Transp. Syst. 2012, 13, 644–654. [Google Scholar] [CrossRef]
- Ning, Y. Traffic Pattern Recognition System Design and Development Based on Smart Phones. In Proceedings of the 7th International Conference on Intelligent Computation Technology and Automation, Changsha, China, 25–26 October 2014. [Google Scholar]
- Ki, Y.K.; Heo, N.W.; Choi, J.W.; Ahn, G.H.; Park, K.S. An incident detection algorithm using artificial neural networks and traffic information. In Proceedings of the Cybernetics and Informatics (K&I), Lazy pod Makytou, Slovakia, 31 January–3 February 2018. [Google Scholar]
- Zhany, Y.; Luo, B.-S. Development and Implementation of Traffic Pattern Recognition Software Based on iOS Framework. In Proceedings of the 7th International Conference on Intelligent Computation Technology and Automation, Changsha, China, 25–26 October 2014; pp. 182–185. [Google Scholar]
- Gorbachev, R.; Moroz, N.; Semenikhin, K.; Starostenko, A. Identification of Rolling Stock Parameters for Adaptive Train Control. In Proceedings of the 2016 International Conference on Engineering and Telecommunication (EnT), Moscow, Russia, 29–30 November 2016; pp. 99–103. [Google Scholar]
- Fikejz, J. Localization Of Rolling Stock Within The Railway Network Model. In Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, 14–16 April 2014; pp. 734–739. [Google Scholar]
- Meng, X.; Jia, L.; Xie, J.; Qin, Y.; Xu, J. Complex characteristic analysis of passenger train flow network. In Proceedings of the 2010 Chinese Control and Decision Conference, Xuzhou, China, 26–28 May 2010; pp. 2533–2536. [Google Scholar]
- Bavafa-Toosi, Y.; Blendinger, C.; Mehrmann, V.; Steinbrecher, A.; Unger, R. A New Methodology for Modeling, Analysis, Synthesis, and Simulation of Time-Optimal Train Traffic in Large Networks. IEEE Trans. Autom. Sci. Eng. 2008, 5, 43–52. [Google Scholar] [CrossRef]
- Wang, G.; Zeng, X.; Yuan, T. Study on the influence of train control system on service quality of rail transit. In Proceedings of the 2017 International Conference on Service Systems and Service Management, Dalian, China, 16–18 June 2017; pp. 1–4. [Google Scholar]
- Gu, Q.; Tang, T.; Cao, F.; Song, Y.D. Energy-Efficient Train Operation in Urban Rail Transit Using Real-Time Traffic Information. IEEE Trans. Intell. Transp. Syst. 2014, 15, 1216–1233. [Google Scholar] [CrossRef]
- Tong, G.; Fan, C.; Cui, F.; Meng, X. Fuzzy Neural Network Model Applied in the Traffic Flow Prediction. In Proceedings of the 2006 IEEE International Conference on Information Acquisition, Weihai, China, 20–23 August 2006; pp. 1229–1233. [Google Scholar]
- Zhao, E.; Zhang, Y.; Yao, D.; Li, L.; Tan, J.; Li, Z. A New Training Structure for Multiple-to-Multiple Traffic Flow Prediction. In Proceedings of the 2018 Chinese Automation Congress (CAC), Xi’an, China, 30 November–2 December 2018. [Google Scholar]
- Ahmad, J.; Ahmed, F. Efficiency analysis and security evaluation of image encryption schemes. Computing 2010, 23, 25. [Google Scholar]
- Major, W.; Buchanan, W.J.; Ahmad, J. An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dyn. 2020, 3068–3087. [Google Scholar] [CrossRef] [Green Version]
- Adeel, A.; Ahmad, J.; Larijani, H.; Hussain, A. A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognit. Comput. 2019. [Google Scholar] [CrossRef]
- Masood, F.; Ahmad, J.; Shah, S.A.; Jamal, S.S.; Hussain, I. A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy 2020, 22, 274. [Google Scholar] [CrossRef] [Green Version]
- Jawad, A.; Masood, F.; Shah, S.A.; Jamal, S.S.; Hussain, I. A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry 2020, 12, 350. [Google Scholar]
- Ahmad, J.; Khan, M.A.; Hwang, S.O.; Khan, J.S. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 2017, 28, 953–967. [Google Scholar] [CrossRef]
- Zhang, G.; Ding, W.; Li, L. Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map. Symmetry 2020, 12, 355. [Google Scholar] [CrossRef] [Green Version]
- Imran, A.; Zoha, A.; Abu-Dayya, A. Challenges in 5G: How to empower SON with big data for enabling 5G. IEEE Netw. 2014, 28, 27–33. [Google Scholar] [CrossRef]
- Murphy, K.P. Machine Learning: A Probabilistic Perspective; The MIT Press: Cambridge, MA, USA, 2012. [Google Scholar]
- Shah, S.A.; Fan, D.; Ren, A.; Zhao, N.; Yang, X.; Tanoli, S.A.K. Seizure episodes detection via smart medical sensing system. J. Ambient Intell. Humaniz. Comput. 2018. [Google Scholar] [CrossRef] [Green Version]
- Zoha, A.; Saeed, A.; Farooq, H.; Rizwan, A.; Imran, A.; Imran, M.A. Leveraging Intelligence from Network CDR Data for Interference Aware Energy Consumption Minimization. IEEE Trans. Mob. Comput. 2018, 17, 1569–1582. [Google Scholar] [CrossRef] [Green Version]
- Ren, A.; Zahid, A.; Zoha, A.; Shah, S.A.; Imran, M.A.; Alomainy, A.; Abbasi, Q.H. Machine Learning Driven Approach Towards the Quality Assessment of Fresh Fruits Using Non-Invasive Sensing. IEEE Sens. J. 2020, 20, 2075–2083. [Google Scholar] [CrossRef] [Green Version]
- Rizwan, A.; Ali, N.A.; Zoha, A.; Ozturk, M.; Alomaniy, A.; Imran, M.A.; Abbasi, Q.H. Non-invasive hydration level estimation in human body using Galvanic Skin Response. IEEE Sens. J. 2020, 20, 4891–4900. [Google Scholar] [CrossRef] [Green Version]
- Haider, D.; Ren, A.; Fan, D.; Zhao, N.; Yang, X.; Shah, S.A.; Hu, F.; Abbasi, Q.H. An efficient monitoring of eclamptic seizures in wireless sensors networks. Comput. Electr. Eng. 2019, 75, 16–30. [Google Scholar] [CrossRef]
- Fioranelli, F.; Le Kernec, J.; Shah, S.A. Radar for Health Care: Recognizing Human Activities and Monitoring Vital Signs. IEEE Potentials 2019, 38, 16–23. [Google Scholar] [CrossRef] [Green Version]
- Michal Gorawski, K.G. Review of Mobility Models for Performance Evaluation of Wireless Networks. In Man-Machine Interactions; Springer: Berlin/Heidelberg, Germany, 2014; pp. 567–577. [Google Scholar]
- Ahmad, J.; Hwang, S.O. A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 2016, 75, 13951–13976. [Google Scholar] [CrossRef]
- Ahmad, J.; Hwang, S.O. Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn. 2015, 82, 1839–1850. [Google Scholar] [CrossRef]
Data Type | Value |
---|---|
Number of stations (Access/Egress) | 380 |
Number of platforms (Interchanges) | 270 |
Total number of passengers | 12.15 M |
Total number of passenger (Early) | 0.41 M |
Total number of passenger (AM Peak) | 3.18 M |
Total number of passenger (Midday) | 3.02 M |
Total number of passenger (PM Peak) | 3.34 M |
Total number of passenger (Evening) | 1.51 M |
Total number of passenger (Late) | 0.68 M |
Number of classes | 3 |
Area of passenger movement probability | 100% |
Total simulation duration | 21 h |
Machine Learning Algorithm | Accuracy |
---|---|
Artificial Neural Network (ANN) | 91.17% |
Discriminant Analysis (DT) | 80.18% |
K-Nearest Neighbour (KNN) | 79.61% |
Support Vector Machine (SVM) | 79.47% |
Decision Tree (DT) | 76.37% |
Naive Bayes (NB) | 48.18% |
Security Parameter | Plain Text | Encrypted Form |
---|---|---|
(H) | 0.5890 | −0.0021 |
(V) | 0.7438 | 0.0032 |
(D) | 0.4077 | 0.0193 |
7.1273 | 7.7068 | |
NA | 99.6314% | |
NA | 33.4710 | |
3.7399 | 10.5089 | |
0.6809 | 0.3899 | |
0.0854 | 0.0156 |
Security Parameter | Plain Text | Encrypted Form |
---|---|---|
(H) | 0.5579 | 0.0341 |
(V) | 0.7593 | 0.0201 |
(D) | 0.3981 | 0.0186 |
7.1273 | 7.7068 | |
NA | 99.6140% | |
NA | 33.5032 | |
3.9899 | 10.4951 | |
0.6831 | 0.3881 | |
0.0828 | 0.0156 |
Security Parameter | Plain Text | Encrypted Form |
---|---|---|
(H) | 0.6240 | −0.0071 |
(V) | 0.7705 | −0.0309 |
(D) | 0.4199 | 0.0190 |
7.1273 | 7.7068 | |
NA | 99.6338% | |
NA | 33.4917 | |
3.5455 | 10.5004 | |
0.6922 | 0.3887 | |
0.1042 | 0.0156 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Asad, S.M.; Ahmad, J.; Hussain, S.; Zoha, A.; Abbasi, Q.H.; Imran, M.A. Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors 2020, 20, 2629. https://doi.org/10.3390/s20092629
Asad SM, Ahmad J, Hussain S, Zoha A, Abbasi QH, Imran MA. Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors. 2020; 20(9):2629. https://doi.org/10.3390/s20092629
Chicago/Turabian StyleAsad, Syed Muhammad, Jawad Ahmad, Sajjad Hussain, Ahmed Zoha, Qammer Hussain Abbasi, and Muhammad Ali Imran. 2020. "Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning" Sensors 20, no. 9: 2629. https://doi.org/10.3390/s20092629
APA StyleAsad, S. M., Ahmad, J., Hussain, S., Zoha, A., Abbasi, Q. H., & Imran, M. A. (2020). Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors, 20(9), 2629. https://doi.org/10.3390/s20092629