Analyzing Abnormal Events from Spatio-Temporal Trajectories Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong Li Lee, Mohan Kankanhalli School of Computing National University of Singapore - Singapore {dhaval,chidansh,whsu,leeml,mohan}.comp.nus.edu.sg Abstract—Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is captured in a trajectory database and can be analyzed for the monitoring of abnormal events. In this paper, we describe a system called InViTA for analyzing abnormal events from spatio-temporal trajectories captured during an ofſce evacuation after an explosion. InViTA utilizes a trajectory representation scheme and extract the features to derive a set of rules that label each person’s trajectory as belonging to a suspect, witness, or victim, etc. We run the system on the ofſce evacuation data provided in VAST 2008 challenge and obtain comparable results with that obtained from visualization and human analysis. The system includes a user-friendly graphical interface for parameter tuning and intuitive result analysis. Keywords-representation scheme, trajectory classiſcation, abnormal events I. I NTRODUCTION Many government organizations such as embassies, multi- nationals companies, shopping malls, banks and etc use surveillance systems to record movements of employees, visitors, merchandise etc. Video cameras or RFID tags are frequently utilized to record the locations of each employee and visitor at regular time points, that is, these devices capture the spatio-temporal trajectories of each individual. Figure 1 gives an example of such trajectories recorded using RFID tags. These trajectories can be analyzed in two modes. In real time or online processing, the objective is to detect suspicious people based on their movements in order to circumvent any potential security threats and minimize loss or casualty [2]. Off-line processing is typically focused on analyzing the trajectories before and after the occurrence of an abnormal event in order to obtain more insights into causes and characteristics of the event. An abnormal event includes an explosion in a building, open shooting in a campus, hit-and-run accident, etc. Such events will trigger investigations to identify suspects, victims and witnesses. Existing approaches mostly utilize animation based visualization techniques to display all the trajectories and a person is needed to manually select trajectories which seems to be suspicious [3]. However, plotting trajectories in a two-dimensional space is limited since the paths of two persons could be the same but their speeds along the paths could vary greatly. For example, in the case of an explosion, the majority of the people would run for the nearest exit, 10 20 30 40 50 60 70 80 90 10 20 30 40 50 60 Figure 1. RFID Trajectories on Building Floor Map while the terrorist responsible for planting the bomb may walk slowly to a safe exit. Further, the manual determination of suspicious trajectories is not scalable and prone to human errors and subjectivity. In this paper, we describe a system to systematically analyze trajectories and identify suspicious people, witnesses and locate casualties in an ofſce evacuation scenario. Our system overcomes the limitation of two-dimensional trajec- tory plots by transforming two-dimensional trajectories into two one-dimensional time series. This allows us to differ- entiate trajectories with different speeds passing through the same region, as well as characterize the trajectories before and after the occurrence of an abnormal event. This char- acterization reƀects the drastic change in the environment as a result of an abnormal event, thereby allowing us to pinpoint the time and location of the event. Based on the time and location of the abnormal event, we use a set of rules and develop an effective and accurate technique to label the trajectories of suspicious persons, identify witnesses and locate casualties. The contributions of this work are summarized as follows: Transformation Scheme: We design two measures to transform the two-dimensional spatio-temporal trajecto- ries into two one-dimensional time series. The measures are Window based Average Speed (WAS) and Window based Average traversed Region (WAR). The transfor- mation facilitates the visualization of trajectories of varying speeds and provides for the detection of the occurrence of an abnormal event. Trajectory Classiſcation: We devise an effective and accurate trajectory classiſcation method based on the 2009 IEEE International Conference on Data Mining Workshops 978-0-7695-3902-7/09 $26.00 © 2009 IEEE DOI 10.1109/ICDMW.2009.45 630 2009 IEEE International Conference on Data Mining Workshops 978-0-7695-3902-7/09 $26.00 © 2009 IEEE DOI 10.1109/ICDMW.2009.45 638 2009 IEEE International Conference on Data Mining Workshops 978-0-7695-3902-7/09 $26.00 © 2009 IEEE DOI 10.1109/ICDMW.2009.45 616 Authorized licensed use limited to: University of North Texas. Downloaded on February 15,2010 at 12:20:04 EST from IEEE Xplore. Restrictions apply.