Paper
10 April 2023 Clustering vehicle movement in restricted area for security: an experimental analysis
Qurban A. Memon
Author Affiliations +
Proceedings Volume 12616, International Conference on Mathematical and Statistical Physics, Computational Science, Education, and Communication (ICMSCE 2022); 126160H (2023) https://doi.org/10.1117/12.2675490
Event: International Conference on Mathematical and Statistical Physics, Computational Science, Education, and Communication (ICMSCE 2022), 2022, Istanbul, Turkey
Abstract
Vehicle access in restricted or protected areas of a country involves phase wise collection of vehicle data in areas like diplomatic enclave. Thus, data gathering at each street junction produces an output that forms the input to the next junction. The analysis system thus developed is intended to be used by government agencies and other special task force to provide sound reports for legal proceeding against violations. In this research, two approaches namely SOM and K-means clustering are used to generate a low-dimensional discretized representation of the vehicle data in the original feature space. The objective is to generate access control for security purposes by providing an automated vehicle analysis based upon clustered data for quicker information on vehicle movement in a particular neighborhood. Comprehensive experimental results are presented to draw conclusions.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qurban A. Memon "Clustering vehicle movement in restricted area for security: an experimental analysis", Proc. SPIE 12616, International Conference on Mathematical and Statistical Physics, Computational Science, Education, and Communication (ICMSCE 2022), 126160H (10 April 2023); https://doi.org/10.1117/12.2675490
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Machine learning

Neurons

Computer security

Data modeling

Visualization

Artificial neural networks

Network security

Back to Top