Next Article in Journal
A Comprehensive Framework for Transportation Infrastructure Digitalization: TJYRoad-Net for Enhanced Point Cloud Segmentation
Previous Article in Journal
Evaluation of Cluster Algorithms for Radar-Based Object Recognition in Autonomous and Assisted Driving
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Heuristic Optimal Scheduling for Road Traffic Incident Detection Under Computational Constraints

by
Hao Wu
1,2,
Jiahao Yang
1,2,
Ming-Dong Yuan
1,2,* and
Xin Li
3
1
The Smart City Research Institute of China Electronics Technology Group Corporation, Shenzhen 518038, China
2
Guangdong Provincial Key Laboratory of Intelligent Urban Security Monitoring and Smart City Planning, Guangzhou 510200, China
3
Faculty of Applied Sciences, Macao Polytechnic University, Macao 999078, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(22), 7221; https://doi.org/10.3390/s24227221
Submission received: 25 September 2024 / Revised: 31 October 2024 / Accepted: 7 November 2024 / Published: 12 November 2024
(This article belongs to the Section Internet of Things)

Abstract

:
The intelligent monitoring of road surveillance videos is a crucial tool for detecting and predicting traffic anomalies, swiftly identifying road safety risks, rapidly addressing potential hazards, and preventing accidents or secondary incidents. With the vast number of surveillance cameras in operation, conducting traditional real-time video analysis across all cameras at once requires substantial computational resources. Alternatively, methods that employ periodic camera patrol analysis frequently overlook a significant number of anomalous traffic events, thereby hindering the effectiveness of traffic event detection. To overcome these challenges, this paper introduces a heuristic optimal scheduling approach designed to enhance traffic event detection efficiency while operating within limited computational resources. This method leverages historical data and prior knowledge to compute a weighted event feature value for each camera, providing a quantitative measure of its detection efficiency. To optimize resource allocation, a cyclic elimination mechanism is implemented to exclude low-performing cameras, enabling the dynamic reallocation of resources to higher-performing cameras, thereby enhancing overall detection performance. Finally, the effectiveness of the proposed method is validated through a case study conducted in a representative region of a major metropolitan city in China. The results revealed a substantial improvement in traffic event detection efficiency, with increases of 40%, 28%, 17%, and 28% across different time periods when compared to the pre-optimized state. Furthermore, the proposed method outperformed existing resource scheduling algorithms in terms of average load degree, load balance degree, and higher computational resource utilization. By avoiding the common issues of resource wastage and insufficiency often found in static allocation models, this approach offers greater flexibility and adaptability in computational resource scheduling, thereby effectively addressing the practical demands of traffic anomaly detection and early warning systems.

1. Introduction

Despite advancements in transportation infrastructure, the risk of traffic incidents involving pedestrians, electric bicycles, and motor vehicles, which can lead to further traffic accidents, remains substantial on highways in developed countries. A study conducted in Shanghai, China, revealed that traffic accidents in the city have a high likelihood of resulting in secondary accidents ranging from 50% to 75% [1]. This alarming statistic underscores the urgent need for effective measures to mitigate the risks associated with traffic accidents. Rapid detection and elimination of traffic anomalies are critical to reducing accident rates, fatalities, and associated economic losses.
In this context, leveraging Internet of Things (IoT) technology has emerged as a critical approach to enhancing traffic safety. By integrating traffic detectors with IoT, a network of sensors can monitor and transmit real-time, precise data on traffic anomalies, enabling proactive traffic management. Beyond the rapid detection of anomalous behaviors, IoT technology empowers real-time data exchange and facilitates seamless integration with backend systems. This enables authorities to promptly respond to emerging traffic issues, ultimately contributing to a significant reduction in accident rates.
Consequently, traffic detectors are extensively employed to monitor road traffic conditions. These detectors promote traffic order and safety by collecting real-time data on various traffic elements, including pedestrians, vehicles, roadways, and environmental conditions. In addition, they gather behavioral and event data related to interactions between people and vehicles, as well as between vehicles and roadways, further contributing to effective traffic management [2].
Recent advancements in information technology, communication technology, sensor technology, and computer vision technology have spurred the evolution of traffic detectors toward greater diversity and intelligence. A diverse range of traffic detectors are employed to monitor road conditions, including loop, geomagnetic, video, microwave, infrared, and radar detectors. Among these, video detectors equipped with cameras strategically positioned on poles on both sides of the road can detect, identify, and track vehicles, providing valuable traffic data, such as vehicle type, speed, position, and traffic flow. Video detectors can also monitor traffic congestion and intelligently identify predefined abnormal events. Current research in video detection primarily focuses on the automatic recognition and early warning of these predefined anomalies or hazards, with significant efforts directed towards object detection and tracking [3,4], event recognition and semantic understanding [5], accident prediction and proactive response [6], and integrated intelligent traffic management [7].
With the construction and development of smart cities, video detectors are increasingly installed at urban traffic intersections and critical road segments. These detectors serve as invaluable auxiliary management tools, offering a high degree of deployment density and providing intuitive real-time insights for urban traffic management authorities. The increasing demands of urban management necessitate optimizing resources for monitoring road traffic, including surveillance cameras, to enhance road safety and traffic control efficiency. This challenge is particularly critical during emergency response situations, where timely and accurate detection of traffic incidents on major urban thoroughfares is essential to ensure public safety and facilitate rapid emergency response.
However, in practical engineering applications, two primary strategies are employed to detect traffic incidents within large-scale surveillance camera networks. The first approach entails concurrent operations across all cameras and incident types to enable real-time detection. Although effective, this method’s substantial computational requirements can significantly increase project costs. In contrast, the second approach uses a polling mechanism for cameras and incidents to detect traffic incidents. While the polling mechanism offers a computationally efficient alternative, it may compromise the detection of critical events, potentially hindering the overall effectiveness of traffic incident detection. Previous studies have extensively addressed strategies for intelligent placement of camera locations [8,9], the application of artificial intelligence algorithms [10,11], and the optimization of computational resource scheduling [12,13,14]. However, a notable gap exists in the literature regarding the intelligent selection of camera locations and the optimization of event detection scheduling within the context of constrained computational resources.
To address these challenges, this study introduces a heuristic optimization approach for traffic anomaly detection. This method maximizes detection efficiency while operating within constrained computational resources. Our approach involves randomly selecting a subset of cameras within a specified time window, leveraging prior knowledge to inform the selection process, and applying detection algorithms to each selected camera for all incident types. This approach ensures that all computational resources are fully utilized and operate at full capacity during each operational cycle. Following the detection phase, the weighted value of incidents for each event type within a cycle is calculated, ranked in descending order, and then the overall detection efficiency is obtained. Cameras with the lowest P% of weighted event feature values are discarded based on predefined rules. In the subsequent cycle, a random selection of cameras that have not yet been deployed for incident detection algorithms is made, ensuring that the freed-up computational resources are fully utilized. The overall detection efficiency of incidents is recalculated for each cycle. Based on the comparative analysis of efficiency between cycles, the decision to reiterate the steps is made. If a significant improvement is observed, the new configuration is retained. Conversely, if no improvement was detected, the process was repeated with a different arrangement. This iterative approach continues until an optimal configuration that maximizes overall event detection efficiency is identified. Finally, the effectiveness of the method is validated through a case study conducted in a typical area of a large metropolis in China. The results revealed a substantial improvement in traffic incident detection efficiency, with increases of 40%, 28%, 17%, and 28% across different time periods when compared to the pre-optimized state.
In summary, the contributions of this study are as follows:
  • This study introduces a heuristic optimal configuration and scheduling method for traffic anomaly detection, designed to maximize the efficiency of traffic event detection. By calculating the weighted event feature value for each camera to represent its detection efficiency, the method dynamically adjusts camera resource allocation based on detection requirements. This adaptive dynamic scheduling approach effectively addresses the limitations of static allocation models, avoiding resource wastage or insufficiency and enhancing overall detection performance.
  • An innovative cyclic elimination mechanism is introduced. This process identifies and removes low-performing cameras based on their detection efficiency within each cycle, and resources are redistributed from inactive cameras. This mechanism facilitates the continuous optimization of resource utilization across multiple cycles, thereby enhancing the flexibility and adaptability of computational resource scheduling.
The remainder of this paper is organized as follows: Section 1 introduces the adverse impacts of traffic incidents and existing problems related to current traffic incident detection. Section 2 reviews related studies on layout strategies for intelligent camera placement, the application of artificial intelligence algorithm optimization, and the optimization of computational resource scheduling. Section 3 presents the proposed method, followed by an empirical case study in Section 4. Finally, Section 5 provides a summary of the study.

2. Related Work

Previous studies on traffic incident detection have primarily centered on three key areas: intelligent monitoring point layout strategies, the application of artificial intelligence algorithm optimization, and the optimization of computational resource scheduling. This section provides an overview of relevant studies within these areas.
Regarding intelligent monitoring point layout, Xu et al. [8] conducted a review of the optimization layouts and design of road traffic detectors, considering factors such as detector types, application scenarios, data collection indicators, and the research objectives of various optimization studies. Micko et al. [15] addressed the challenge of optimizing monitoring tasks in intelligent transportation systems by developing a sensor classification framework that categorizes sensors according to their operating principles and maintenance requirements. Furthermore, they proposed a generic sensor system architecture designed to improve monitoring efficiency in intelligent transportation systems. Qiu et al. [16] simulated basic highway segments and scenarios involving abnormal events using a simulation platform. They employed an indirect event detection algorithm that identifies events based on changes in traffic flow parameters, in conjunction with direct perception of anomalies within the range of roadside detection equipment. This approach informed their determination of optimal video detector placement schemes and the associated benefits. Sun et al. [9] developed a multi-objective optimization model for traffic sensor layout, leveraging traffic big data to identify key influencing factors such as system cost, multi-source data sharing, data demand, sensor failure, road infrastructure, and sensor types. Similarly, Li et al. [17] proposed a multi-objective optimization framework to deploy traffic monitoring cameras on road networks, addressing comprehensive traffic management challenges such as accident prevention, traffic violation management, and traffic efficiency improvement.
In the context of artificial intelligence algorithm optimization, Bing et al. [18] studied how traffic flow parameters change both upstream and downstream of traffic incidents. Based on the analysis, an initial variable set with 12 variables to enhance traffic incident detection was developed. The random forest method was employed to screen key variables from the initial variable set. A relevant vector machine model with a combination kernel function was developed, and optimized through particle swarm optimization, to enhance the accuracy of traffic incident detection. Recent advancements in deep learning image processing and edge computing technology have significantly impacted the field of intelligent transportation. These developments were explored by Cao et al. [10], while Li et al. [19] addressed the challenges posed by small sample size and imbalanced datasets in traffic incident detection by introducing a hybrid detection method that leverages generative adversarial networks (GAN) and stacked autoencoders. Yan et al. [20] addressed the challenge of imbalanced datasets in video surveillance by introducing a semi-supervised approach to anomaly detection. Wan et al. [11] developed a long video event retrieval algorithm that utilizes superframe segmentation to eliminate redundant frames, significantly reducing the number of frames requiring subsequent computation. Singh et al. [21] introduced a novel framework for the automated detection of road traffic accidents in surveillance videos. In contrast to traditional handcrafted features, this framework utilizes a denoising autoencoder to automatically learn spatiotemporal feature representations from raw video data, extracting deep features and assessing the likelihood of accidents based on the reconstruction error and the probability of deep representations. Yan et al. [22] systematically analyzed the application of generative AI techniques in addressing critical challenges in traffic anomaly detection. Detecting unusual traffic events or patterns is essential for safety. By learning normal traffic patterns, generative AI models can effectively identify deviations as anomalies, leveraging techniques like conditional normalization of flow. Furthermore, these models can enhance sensor data quality by generating synthetic data that fill in gaps and provide a more comprehensive representation of traffic conditions. Qiu et al. [23] developed a vehicle recognition algorithm that utilizes convolutional neural networks enhanced by fused edge features (FE-CNN). This approach improves vehicle recognition accuracy and model convergence speed through a simple and efficient method of edge feature fusion. Li et al. [19] tackled the challenges of small sample size, imbalanced datasets, and real-time requirements in traffic incident detection by proposing a hybrid model designed specifically for this purpose. The proposed model employs GAN to increase the sample size and balance the dataset, while a Temporal-Spatio Stacked Autoencoder (TSSAE) is utilized to extract spatiotemporal correlations in traffic flow and identify potential incidents. Vishnu et al. [24] developed a cost-effective early warning system that integrates video processing technology with Vehicle-to-Infrastructure (V2I) communication. By using the Lucas–Kanade optical flow algorithm, the system can detect potential collision risks from moving objects and transmit timely alerts to vehicles. Ravishka et al. [25] introduced a traffic collision prevention system that leverages 5G/6G networks and edge computing to collect real-time vehicle location and dynamic data. By analyzing this information, the system can predict potential collisions and transmit early warnings to at-risk vehicles via low-latency communication.
In the area of computational resource optimization and scheduling, Ma et al. [12] proposed incorporating computational reuse technology into computational power networks to minimize service latency and optimize resource consumption by reusing the results of previous computational tasks. Jia et al. [13] proposed a deep integration of computational power with networks, facilitating the coordination of distributed computing resources to enhance overall computational resource utilization. Mijuskovic et al. [14] proposed a framework for evaluating resource management algorithms in cloud, fog, and edge environments. Their innovative approach provides valuable insights into the challenges and opportunities associated with resource allocation, workload balancing, resource provisioning, task scheduling, and quality of service (QoS). Lee et al. [26] developed a framework to enhance highway safety and efficiency by enabling real-time detection of critical traffic incidents and emergencies. The framework employs an enhanced ResNet classification algorithm integrated into an onboard module to monitor driving conditions and facilitate faster responses to hazardous events such as road debris, unexpected pedestrians, accidents, and vehicle breakdowns. Xu et al. [27] proposed an enhanced round-robin load balancing strategy that optimizes scheduling results by incorporating system state information. The scheduling involves a circular server list and a dynamic pointer that is adjusted based on the previously selected server, ensuring a more equitable distribution of tasks across resources. Kang et al. [28] introduced an adaptive scheduling algorithm based on minimum traffic, which assesses server load using network traffic parameters and establishes management thresholds to allocate new requests to low-load server nodes. Ge et al. [29] proposed TCL-ACO, an enhanced multi-objective ant colony optimization algorithm, tailored for cloud computing task scheduling. This approach seeks to simultaneously optimize task completion time, cost, and load balancing. Han et al. [30] introduced a multi-modal multi-objective particle swarm optimization algorithm (MMOPSOSS) equipped with an adaptive adjustment mechanism. This algorithm dynamically fine-tunes optimization parameters and population size to facilitate comprehensive convergence across multiple solution sets.
While previous research has largely concentrated on isolated aspects of smart city development, such as intelligent monitoring point placement or optimizing individual AI algorithms and computational resources, there remains a significant gap in exploring the integrated optimization of these elements within the context of specific business applications. This holistic approach is increasingly recognized as a crucial component of successful smart city initiatives. This study examines typical urban governance scenarios and road traffic safety management, investigating optimal automatic early warning capabilities for road traffic safety within the constraint of limited computational resources. Aiming to maximize the overall efficiency of traffic incident detection (OETID), specifically to detect as many critical incidents as possible, this study introduced a heuristic optimal configuration method for traffic anomaly detection. The following section offers a detailed introduction to this method.

3. Methodology

This section outlines the proposed method, which leverages historical data and prior knowledge, incorporating factors such as camera location selection, algorithm deployment, and deployment schedules to create a robust and intelligent system capable of effectively identifying and responding to critical traffic events. The method aims to optimize event detection capabilities within the constraint of limited computational resources to maximize OETID. To provide a clear and comprehensive understanding of our research, We will begin by defining key terms and concepts, followed by the proposal of a metric for OETID, and conclude with a detailed description of the method.

3.1. Preliminaries

Traffic incidents on highways are influenced by various factors, including human behavior, vehicular conditions, road conditions, and environmental influences. These incidents are characterized by sudden occurrence, random timing, and situation variability. Each traffic incident can be categorized based on its type and defined by three essential attributes: temporal, type, and spatial attributes.
  • Temporal Attribute t: This refers to the specific time at which a traffic incident occurs. To facilitate data analysis, traffic incident data are often segmented into time windows T, that is, traffic incident data statistics are processed every T hour.
  • Type Attribute l: This refers to the specific category of a traffic incident, such as pedestrians on highways, traffic congestion, and abnormal parking:
    l { l 1 , l 2 , , l M } ,
    where M denotes the number of traffic incident types.
  • Spatial Attribute s: This refers to the specific geographic location where a traffic incident occurs. In this study, the approximate location of the incident is determined by utilizing the geographic coordinates of the monitoring camera:
    s { s 1 , s 2 , , s N } ,
    where N denotes the number of traffic surveillance cameras on the highway.

3.2. Overall Efficiency of Traffic Incident Detection

With limited computational resources, maximizing the utilization rate of computational resources can be achieved by deploying diverse detection algorithms across different cameras during specified time windows. This necessitates carefully determining the most suitable algorithm types for each traffic surveillance camera to maximize the collection of critical incident information within the available time frame, thereby maximizing the effectiveness of road safety accident prevention.
  • To simplify the analysis, it is assumed, without loss of generality, that the computational cost of each traffic incident detection algorithm is the same across all cameras. This means that deploying any type of algorithm on any camera incurs the same computational overhead, denoted by r. Assuming that all cameras can deploy M types of incident detection algorithms, the maximum number of surveillance cameras that can be deployed using all M types of incident detection algorithms is n  n = R M × r ,   where   R denotes the total computational resources . In addition, a status value of 1 is assigned to surveillance cameras if they have deployed detection algorithms, while those without such algorithms are assigned a value of 0.
  • Based on prior knowledge, such as business requirements or expert evaluation, the significance of the j-th type of incident is defined by w j , where j = 1 , 2 , , M ; d i j denotes the number of j-type traffic incidents detected by the i-th camera.
  • The weighted sum of the numbers of various abnormal incidents detected by each camera within a time window T is defined as follows:
    f ( i ) = j = 1 m i w j d i j ,
    where m i denotes the number of algorithms deployed on the i-th camera and f ( i ) denotes the effective incident detection efficiency of the i-th camera.
  • Furthermore, the average effective incident detection efficiency of all cameras with deployed algorithms is defined as the OETID for this time window and is calculated as follows:
    f = i = 1 β f ( i ) β = i = 1 β j = 1 m i w j d i j β ,
    where β denotes the number of cameras. This study aims to maximize the OETID within computational constraints, with a specific focus on maximizing the average number of effective incident detections. To accomplish this objective, the following function can be derived:
    max f O E T I D = i = 1 β f ( i ) β , s . t . i = 1 β m i r R .

3.3. Proposed Method

To optimize the overall efficiency of event detection within the constraints of limited computational resources, it is essential to continuously remove cameras with lower effective event detection efficiency according to predefined rules throughout the implementation of the method. In the subsequent cycle, the computational resources freed up by this process should be reallocated to new cameras for event detection, ensuring that all computational resources are fully utilized and operate at maximum capacity during each operational cycle. Consequently, this study focuses on optimizing the OETID following the removal of cameras with lower effective event detection efficiency, as illustrated in Figure 1.
Specifically, the pseudo code for this optimization model is illustrated in Algorithm 1 and primarily includes the following steps:
  • Set a time window T (e.g., 00:00–06:00). Based on prior knowledge or expert experience, heuristically and randomly select n cameras from the initial N cameras during the first round. Deploy all M types of detection algorithms on each selected camera, ensuring that all computational resources are fully allocated. This is calculated as: R = M × n × r . Additionally, mark all cameras that have been configured with algorithms as 1.
  • Calculate the effective event detection efficiency of each camera with deployed algorithms over a cycle (e.g., one week). For all cameras with deployed algorithms, if  d i j = 0 , it indicates that the j-th type of algorithm is no longer deployed on the i-th camera. Consequently, the freed-up computational resources can be reallocated to other relevant event types on different cameras, thereby maximizing the utilization of limited computational resources.
  • Sort the obtained effective event detection efficiencies in descending order. Remove the cameras corresponding to the bottom P % (where P denotes a specified value, typically in the range (0, 20]), and calculate the remaining computational resources R s = R i = 1 n r × m i , where n denotes the number of cameras with the deployed detection algorithms. Furthermore, calculate the OETID for the top 1 P % cameras.
  • Enter the next cycle. Select R s / M cameras (where . denotes the ceiling function) from those marked as 0, and deploy all M types of detection algorithms on each selected camera to ensure that all remaining computational resources are fully allocated. Mark these cameras as 1. Use steps (2) and (3) to calculate the OETID f C for the top 1 P % cameras in this cycle (where f C denotes the OETID for cycle C).
  • If the designated number of cycles is reached or all cameras are marked as 1, complete the optimization, exit the loop, and terminate the iteration. After the algorithm iteration is concluded, sort the obtained weighted event feature values in descending order and remove the cameras corresponding to the bottom P % of effective event detection efficiency. To maximize the utilization of computational resources, the saved computational resources can be dynamically allocated by relevant personnel based on experience and urgency of tasks.
  • In the next time window T (e.g., 06:00–12:00), repeat steps (1)–(5) until all time windows T are fully optimized.
Algorithm 1 Pseudo Code of Dynamic Computing Resource Allocation
  1:
Input: T, N, n, M, r, P, β , m a x c y c l e s
  2:
Parameter: R, R s , s t a t u s , d, f, f _ s o r t , w, m i
  3:
Output:  r e s o u r c e _ a l l o c a t i o n _ p l a n
  4:
Initialize s t a t u s [ 0 ] × N
  5:
s e l e c t _ r a n d o m _ c a m e r a s ( n ) _ f o r _ s t a t u s = = 1
  6:
R M × n × r
  7:
R s 0
  8:
m i M
  9:
c y c l e 0
10:
m a x c y c l e s 24 T
11:
while  c y c l e < m a x c y c l e s   do
12:
      while  a n y ( s t a t u s = = 0 )  do
13:
             D e p l o y _ c a m e r a s _ p l a n
14:
            for  i 1 to n do
15:
                  if  s t a t u s [ i ] = = 1  then
16:
                        for  j 1 to m i  do
17:
                              if  d [ i ] [ j ] = = 0  then
18:
                                    r e m o v e _ a l g o r i t h m _ d ( i , j )
19:
                                    m i m i 1
20:
                              end if
21:
                        end for
22:
                  end if
23:
            end for
24:
            for  i 1 to n do
25:
                   f ( i ) j = 1 m i w j · d i j
26:
            end for
27:
             f _ s o r t s o r t ( f ( i ) )
28:
             n u m _ t o _ r e m o v e P × l e n ( f _ s o r t ) / / 100
29:
             n n u m _ t o _ r e m a i n = n n u m _ t o _ r e m o v e
30:
            for  i 1 to n u m _ t o _ r e m a i n  do
31:
                   c a m e r a _ t o _ r e m a i n f _ s o r t [ i ]
32:
                   f 1 i = 1 n w j f ( i ) n
33:
            end for
34:
            for  i n n u m _ t o _ r e m o v e + 1 to n do
35:
                   c a m e r a _ t o _ r e m o v e f _ s o r t [ i ]
36:
            end for
37:
             R s R i = 1 n r · m i
38:
             n u m _ n e w _ c a m e r a s R s M
39:
            Select  n u m _ n e w _ c a m e r a s  from  u n a l l o c a t e d _ c a m e r a s
40:
            for  i 1 to n u m _ n e w _ c a m e r a s  do
41:
                   s t a t u s [ c a m e r a _ t o _ n e w [ i ] ] 1
42:
            end for
43:
      end while
44:
       f i = 1 β f ( i ) β
45:
      for  i 1 to N do
46:
             s t a t u s [ i ] 0
47:
      end for
48:
end while
49:
return  r e s o u r c e _ a l l o c a t i o n _ p l a n

4. Experimental Analysis

4.1. Data and Processing

This section examines a megacity in China, focusing on its highway and urban expressway, to optimize and validate the existing road traffic incident detection scheme using the proposed method. To enhance data reliability and mitigate the impact of sporadic traffic incidents, a 14-day cycle was used for statistical analysis of the data. This cycle serves as the basis for optimizing resource allocation under limited computational resources.
The data used in this study include traffic surveillance camera location data and traffic incident data. The traffic surveillance camera location data were sourced from the deployment information provided by the traffic management department, including the identification (ID) codes and the latitude and longitude coordinates of each surveillance camera. The traffic incident data were sourced from the incident detection system of the traffic management department. These data include the ID codes of the surveillance cameras with deployed intelligent algorithms, the types of automatically detected incidents, detection times, and the resolution status of each incident.
To ensure the reliability of the computational results, a thorough data preprocessing process was conducted. First, the traffic surveillance camera location data were linked to the traffic incident data using camera ID codes. This integration allowed for the approximation of the geographic locations of traffic incidents based on the locations of the corresponding surveillance cameras. Next, traffic incidents that were manually confirmed as false alarms were filtered out to ensure a valid dataset. Finally, statistical analysis was conducted on the number and types of incidents, categorized by different times, intervals, and regions.
The city has a total of 750 traffic surveillance cameras installed across a specific administrative district’s expressways, monitoring key traffic events that affect road safety, such as pedestrians on highways, abnormal parking, congestion, and non-motorized vehicles on highways. The computational resource R is sufficient to deploy four types of traffic event detection algorithms on 150 traffic surveillance cameras simultaneously. The dataset utilized for this analysis comprises traffic event data collected by these 150 cameras within 6 h time windows T, spanning the period from 1 July 2023 to 6 April 2024. These 150 cameras were selected by the traffic management department based on their expertise and experience in accident prevention. The spatial distribution of these cameras across the expressway network is shown in Figure 2.

4.2. Data Evaluation Metrics

To comprehensively and accurately evaluate the actual performance of the proposed method and gain a deeper analysis of its scheduling effects, this study employs computational resource utilization, average load degree, and load balance degree as the core evaluation metrics.
Computational resource utilization refers to the ratio of the actual computational power used by the system to the total available computational power. This metric reflects the effectiveness of resource utilization within the system. The calculation formula is as follows:
U = i = 1 N R i R × 100 %
where U is the computational resource utilization, R i ( R i = m i × r ) represents the load (or computational power consumption) of the i-th camera, and R is the maximum computational capacity. Computational resource utilization measures the effectiveness of resource allocation within the system. A utilization rate approaching 100% signifies optimal resource allocation, with no idle resources. Conversely, a lower utilization rate may suggest resource waste or improper scheduling within the system.
The average load degree represents the overall load distribution across all cameras. It is calculated as the mean of the individual camera loads, where load can be defined in terms of computational power consumption, workload, or event detection workload of each camera. The calculation formula is as follows:
R ¯ = 1 N i = 1 N R i
where R ¯ represents the average load degree. The average load degree reflects the overall load condition of the system. A high average load degree signifies that most cameras are operating under heavy load, while a low average load degree suggests that most cameras have lighter loads, potentially indicating idle resources within the system.
The load balance degree is evaluated using the standard deviation, which measures the degree of uneven load distribution among the cameras in the system. It reflects the disparity in load between different cameras and quantifies the imbalance in load distribution among the cameras. The calculation formula is as follows:
σ = 1 N i = 1 N ( R i R ¯ ) 2
where σ represents the load balance degree. The load balance degree measures the unevenness of workload distribution among the cameras in the system. A high load balance degree indicates a significant disparity in load, with some cameras operating under heavy load while others have lighter workloads. This imbalance can lead to processing bottlenecks on the overloaded cameras, affecting the overall system efficiency and stability. Conversely, a lower load balance typically signifies a more even distribution of load, which is a sign of effective load distribution across the cameras. This indicates effective load optimization and suggests that the system’s overall performance is at its best.

4.3. Experimental Results and Analysis

In practice, the selection of the 150 traffic surveillance camera locations was based on experience, coupled with the sporadic nature of abnormal events. As a result, it is uncertain whether this configuration scheme will achieve the highest detection efficiency for incident instances. Therefore, this configuration is regarded as the initial scheme, and an optimization method will be applied to enhance the configuration according to the aforementioned approach. Weights are assigned based on expert experience and are objectively determined according to historical incident statistics and the societal impact of these incidents. This approach results in a comprehensive score, ensuring that the sum of all event weights equals 1. Table 1 shows the weight values for the four types of traffic incidents: pedestrians on highways, abnormal parking, traffic congestion, and non-motorized vehicles on highways.
Using the initial data from 1 July 2023 to 14 July 2023 and applying Equations (3) and (4), traffic incident data and detection efficiency are calculated from the 150 traffic surveillance cameras equipped with detection algorithms for each time window. The collected traffic incident data and OETID values under this scheme are presented in Table 2.
Based on the optimization method, the effective event detection efficiency f ( i ) within each time window is ranked, and the cameras corresponding to the bottom 20% of incident cases are removed. Additionally, following the computational resource allocation principle, if the number of j-type traffic incidents detected by the i-th camera is 0, the algorithms for that type of incident will no longer be deployed at that location. The remaining computational resources are reallocated to establish the optimal detection configuration scheme. The optimization method is applied to calculate the optimal detection configuration scheme for each of the four time windows separately. As shown in Figure 3, after 20 iterations, all camera configurations are completed. This figure illustrates the following observations:
  • With each successive iteration, the OETID within the four time windows demonstrated steady improvement. This indicates that continuous optimization iterations can enhance the identification of traffic incidents, even under the constraints of limited computational resources.
  • Throughout the iterative optimization process, the rankings of detection efficiency for the four time windows consistently remain in descending order: 12:00–18:00, 06:00–12:00, 18:00–24:00, and 00:00–06:00. The detection efficiency during the time window 12:00–18:00 is significantly higher, while the efficiency during time windows 18:00–24:00 and 00:00–06:00 are relatively similar. This indicates that the efficiency of traffic incident detection is greatly influenced by the time of day, underscoring the need for an optimization method tailored to different times.
The OETID under the initial and optimal configuration schemes for the four time windows is presented in Table 3.
As illustrated in the figure, the optimized detection efficiency improves across the four time windows. Notably, during the 00:00–06:00 time window, detection efficiency increased from 0.84 to 1.18, representing a 40% improvement. In the 06:00–12:00 time window, detection efficiency increased from 2.26 to 2.89, resulting in a 28% improvement. Similarly, in the 12:00–18:00 time window, detection efficiency increased from 3.36 to 3.93, showing an improvement of 17%. Lastly, in the 18:00–24:00 time window, detection efficiency increased from 1.06 to 1.36, showing an improvement of 28%.
Due to limited computational resources, there is a notable disparity in the number of algorithm types deployed on the cameras across each time window. In the 00:00–06:00 time window, as shown in Figure 4a, there are 175 camera locations with at least one type of algorithm deployed. Among these, 96 cameras are equipped with all types of algorithms, while 9 cameras utilize only one type of algorithm. In the 06:00–12:00 time window, as illustrated in Figure 4b, 165 camera locations had at least one type of algorithm deployed. Among these, 113 cameras were configured with all types of algorithms, while only 5 cameras had a single type of algorithm deployed. In the 12:00–18:00 time window, as shown in Figure 4c, 162 camera locations had at least one algorithm deployed, with 108 cameras utilizing all types and 7 cameras using only one. Finally, in the 18:00–24:00 time window, as shown in Figure 4d, 168 cameras have at least one algorithm deployed, with 110 cameras using all algorithm types and 8 cameras using only one.
The overall performance indicators for traffic events during the four time periods are presented in Table 4. The highest overall detection efficiency is achieved during the 12:00–18:00 time window, indicating that the cameras perform most effectively during this period. In contrast, the lowest efficiency is observed between 00:00 and 06:00, possibly due to reduced monitoring activities during these hours. The average load degree shows minimal variation across the time periods, indicating a relatively stable overall trend. This consistency suggests that the system applies a balanced load scheduling strategy to ensure that the computational task load of each camera remains relatively consistent across different time periods. Regarding the load balance degree, the time window from 00:00 to 06:00 experiences lower traffic flow and fewer monitoring tasks, resulting in a lower load balance degree. In the 06:00–12:00 time window, corresponding to the morning rush hour (06:00–09:30), traffic flow increases significantly, and traffic events occur more frequently, causing noticeable discrepancies in the load across different cameras. Similarly, the 12:00 to 18:00 window, which includes both the noon and evening peak hours (11:30–13:30 and 17:00–20:00), sees substantial traffic flow and complex incident patterns, particularly on major roads, leading to higher loads across the cameras. However, non-major roads experience relatively lighter traffic, which exacerbates the issue of load imbalance. During the 18:00–24:00 time window, which corresponds to the late stage of the evening peak (19:00–20:00), traffic flow and the occurrence of incidents gradually decrease. As a result, the load differences among cameras become less pronounced, reflecting a more balanced distribution of computational tasks. Computational resource utilization shows minimal variation across the time windows, demonstrating the effectiveness of the dynamic resource scheduling mechanism. The monitoring system maintains a substantial reserve of computational resources, enabling a balanced distribution during different time periods and ensuring a consistently high level of computational resource utilization.
In terms of the number of incidents detected, the optimized scheme has increased the number of detected incidents for all types of traffic events, as illustrated in Figure 5a–d, which illustrate the time windows 00:00–06:00, 06:00–12:00, 12:00–18:00, and 18:00–24:00, respectively. Overall, the distribution of incident types within each time window exhibits both similarities and differences.
The similarity across all time windows is that abnormal parking consistently emerges as the most frequent and significantly increasing incident type. This trend highlights the widespread nature and severity of abnormal parking issues in traffic incidents. Regardless of the time, addressing abnormal parking remains a critical priority for effective traffic management and urban planning.
A notable difference occurs in the time window 12:00–18:00. While abnormal parking remains a prevalent issue, the number of congestion incidents is relatively high during this period. This reflects the increased volume of traffic and its contribution to road congestion. Moreover, the prevalence of abnormal parking incidents can further intensify traffic congestion, because inappropriate parking behavior occupies road space and disrupts traffic flow. To effectively manage traffic and enhance road efficiency, authorities must prioritize addressing both congestion and abnormal parking issues.
Commonly used methods for scheduling computing power in event detection include static round-robin scheduling, weighted round-robin scheduling, and priority round-robin scheduling. Static round-robin scheduling distributes computing power evenly among all cameras, allocating resources in a rotating manner at fixed time intervals, ensuring that each camera receives an equal amount of computing power. Weighted round-robin scheduling assigns a fixed weight to each camera based on its actual operational capacity. When it is a camera’s turn to receive resources at predetermined intervals, allocations are made in proportion to its assigned weight. Priority round-robin scheduling allocates computing power based on the priority assigned to each camera, ensuring that higher-priority cameras receive computing resources first. In this study, the proposed heuristic adaptive scheduling method is compared with the three widely adopted methods using the same dataset. The comparison of different traffic event detection computing power scheduling methods is presented in Table 5, where each of the three values is derived from the average across four time windows.
In static round-robin scheduling, the lack of consideration for the actual load demands of the cameras can lead to inefficiencies. Cameras with lighter loads may waste computing power, while those with heavier loads may not receive sufficient resources, resulting in significant load disparities among the cameras. As a result, the average load degree is lower and the load balance degree is higher, reaching values of 4.25 and 37.43, respectively. However, the computational resource utilization is lower at only 77.22%. In comparison to static round-robin scheduling, the proposed method demonstrates significant performance improvements. The average load degree and load balance degree are optimized by 62% and 47%, respectively, indicating a more equitable distribution of workload among the cameras. Additionally, the computational resource utilization is increased by 26%, suggesting more efficient use of resources.
In weighted round-robin scheduling, the method does not dynamically adapt to fluctuations in load and instead relies on initially assigned weights based on anticipated camera capabilities. Under typical conditions, the load degree of the cameras aligns more closely with actual demands, yielding performance similar to the method proposed in this paper. However, when low-weight cameras encounter unexpected traffic events, they may not have adequate computing power. In comparison to the proposed method, weighted round-robin scheduling exhibits slightly lower performance, reaching values of 5.78 and 25.32 in average load degree and load balance degree, respectively. The computational resource utilization is slightly lower at 89.67%. In comparison to weighted round-robin scheduling, the proposed method demonstrates improvements in all three performance indicators: average load degree, load balance degree, and computational resource utilization. The proposed method optimizes these indicators by 19%, 22%, and 8%, respectively.
In priority round-robin scheduling, this approach often leads to insufficient computing power for lower-priority cameras, further exacerbating disparities among cameras. As a result, this method exhibits a lower average load degree and a higher load balance degree, reaching values of 5.52 and 29.65, respectively, while the computational resource utilization is reduced to 85.34%. Compared to priority-based round-robin scheduling, the method proposed in this paper optimizes the three indicators by 25%, 33%, and 14%, respectively.
In summary, the heuristic adaptive scheduling method proposed in this paper demonstrates a higher average load degree, reduced load imbalance degree, and enhanced computational resource utilization. This approach effectively mitigates issues associated with inefficient resource allocation, resource wastage, and insufficient computing power that are common in static round-robin scheduling, weighted round-robin scheduling, and priority round-robin scheduling. This approach enables dynamic resource allocation and promotes efficient utilization of camera resources.
As can be observed from the results of the camera distribution (Figure 6, Figure 7, Figure 8 and Figure 9), after optimization, the camera locations within each time window are more concentrated along specific sections of the Jihe East Expressway, Guangshen Expressway, Qingping Expressway, and Nanguang Expressway. In comparison with the initial spatial distribution of the 150 cameras, the optimized traffic incident detection is more strategically focused on both location and incident type, thereby mitigating the impact of random and sporadic occurrences. This optimization highlights the distinct spatiotemporal characteristics of various types of traffic incidents. Consequently, in practical applications with limited computational resources, the optimized configuration method enables a scientifically accurate allocation of resources across spatiotemporal dimensions.

5. Conclusions

This paper addresses the challenges of urban road hazard management, particularly the current shortage of traffic police resources. It proposes an optimized traffic event detection configuration model using road surveillance cameras within the constraints of limited computing power. The proposed method leverages historical data and prior knowledge to calculate a weighted event feature value for each camera, serving as its detection efficiency. A cyclic elimination mechanism is introduced to eliminate inefficient cameras, dynamically adjust camera resource allocation and enhance overall detection performance. The case study analysis of the optimized configuration reveals that the location distribution, coverage, and types of anomaly warnings in the optimized traffic event detection are more strategically targeted, resulting in detection efficiency improvements of 40%, 28%, 17%, and 28% across different time windows. Additionally, the model exhibits a higher average load degree, reduced load balance degree, and higher computational resource utilization. It effectively avoids issues such as unreasonable computing power allocation, resource wastage, and inadequacy inherent in existing scheduling methods, thereby facilitating dynamic resource allocation for camera resources. This study demonstrates the feasibility and effectiveness of the optimization model, offering a novel approach that enhances cost-efficiency and performance in road accident prevention and hazard warning in the era of artificial intelligence. The model is suitable for periodic and dynamic scheduling in smart transportation systems, serving as a valuable reference for practical application.

Author Contributions

Conceptualization, H.W. and J.Y.; methodology, H.W., J.Y. and M.-D.Y.; validation; J.Y. and M.-D.Y.; investigation, H.W. and J.Y.; data curation, J.Y. and X.L.; funding acquisition, H.W. and M.-D.Y.; writing-original draft preparation, H.W., J.Y., M.-D.Y. and X.L.; writing-review and editing, M.-D.Y. and X.L. All authors have read and agreed to published version of the manuscript.

Funding

This research was funded by the 2022 Provincial Science and Technology Innovation Strategy Special Fund Project (newly established by Provincial Key Laboratory): Guangdong Provincial Key Laboratory of Intelligent Urban Security Monitoring and Smart City Planning, grant number 2022B1212020010.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw/processed data required to reproduce these findings cannot be shared at this time as the data also form part of an ongoing study.

Acknowledgments

We would like to express our sincere gratitude to the traffic management departments of the mega city mentioned in the article for providing us with a validation environment and methodological inspiration; We also want to thank Jingxiong Zhang, Jiarun Huang, Bifeng Liao and Mingwei Tan from the on-site software implementation team for their diligent efforts in program development to validate our methods. Finally, we are grateful to the editors and reviewers for their valuable comments and suggestions which greatly improve the quality of this work.

Conflicts of Interest

Authors Hao Wu, Jiahao Yang and Ming-Dong Yuan are employed by the company The Smart City Research Institute of China Electronics Technology Group Corporation. The remaining author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Jiyang, B.; Zhang, X.; Sun, L. Traffic incident duration prediction grounded on Bayesian decision method-based tree algorithm. J. Tongji Univ. (Nat. Sci.) 2008, 36, 319. [Google Scholar]
  2. Wang, X.; Che, Z.; Jiang, B.; Xiao, N.; Yang, K.; Tang, J.; Ye, J.; Wang, J.; Qi, Q. Robust unsupervised video anomaly detection by multipath frame prediction. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 2301–2312. [Google Scholar] [CrossRef]
  3. Shehata, M.S.; Cai, J.; Badawy, W.M.; Burr, T.W.; Pervez, M.S.; Johannesson, R.J.; Radmanesh, A. Video-based automatic incident detection for smart roads: The outdoor environmental challenges regarding false alarms. IEEE Trans. Intell. Transp. Syst. 2008, 9, 349–360. [Google Scholar] [CrossRef]
  4. Azfar, T.; Li, J.; Yu, H.; Cheu, R.L.; Lv, Y.; Ke, R. Deep learning-based computer vision methods for complex traffic environments perception: A review. Data Sci. Transp. 2024, 6, 1. [Google Scholar] [CrossRef]
  5. Maaloul, B.; Taleb-Ahmed, A.; Niar, S.; Harb, N.; Valderrama, C. Adaptive video-based algorithm for accident detection on highways. In Proceedings of the 2017 12th IEEE International Symposium on Industrial Embedded Systems, Toulouse, France, 14–16 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar]
  6. Karim, M.M.; Li, Y.; Qin, R. Toward explainable artificial intelligence for early anticipation of traffic accidents. Transp. Res. Rec. 2022, 2676, 743–755. [Google Scholar] [CrossRef]
  7. Adewopo, V.A.; Elsayed, N.; ElSayed, Z.; Ozer, M.; Wangia-Anderson, V.; Abdelgawad, A. AI on the Road: A Comprehensive Analysis of Traffic Accidents and Accident Detection System in Smart Cities. arXiv 2023, arXiv:2307.12128. [Google Scholar]
  8. Zhihang, X.; Xinpeng, Y.; Zhigang, X.; Xiaobo, Q. Review of Research on Road Traffic Detectors and Its Optimized Deployment Methods. J. South China Univ. Technol. (Nat. Sci. Ed.) 2023, 51, 68–88. [Google Scholar]
  9. Sun, X.; Bai, Z.; Lin, K.; Jiao, P.; Lu, H. Optimization model of traffic sensor layout considering traffic big data. J. Adv. Transp. 2020, 2020, 8845832. [Google Scholar] [CrossRef]
  10. Cao, X.; Zhang, Z.; Sun, Y.; Wang, P.; Xu, S.; Liu, F.; Wang, C.; Peng, F.; Mu, S.; Liu, Y. The review of image processing and edge computing for intelligent transportation system. J. Image Graph. 2022, 27, 1743–1767. [Google Scholar] [CrossRef]
  11. Wan, S.; Xu, X.; Wang, T.; Gu, Z. An intelligent video analysis method for abnormal event detection in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4487–4495. [Google Scholar] [CrossRef]
  12. Ma, Y.; Wu, Z.; Xu, Z.; Zhong, L.; Xu, C. Optimization of task scheduling for computing reuse in computing power network. J. Commun. 2023, 44, 129–142. [Google Scholar]
  13. Jia, Q.; Ding, R.; Liu, H.; Zhang, C.; Xie, R. Survey on research progress for compute first networking. Chin. J. Netw. Inf. Secur. 2021, 7, 1–12. [Google Scholar]
  14. Mijuskovic, A.; Chiumento, A.; Bemthuis, R.; Aldea, A.; Havinga, P. Resource management techniques for cloud/fog and edge computing: An evaluation framework and classification. Sensors 2021, 21, 1832. [Google Scholar] [CrossRef]
  15. Micko, K.; Papcun, P.; Zolotova, I. Review of IoT sensor systems used for monitoring the road infrastructure. Sensors 2023, 23, 4469. [Google Scholar] [CrossRef]
  16. Xingyou, Q.; Zhihang, X.; Bin, T.; Jinchuan, W.; Lijuan, L.; Shibei, D. Research on optimal layout method of perceptive equipment on intelligent highway side. Electron. Des. Eng. 2023, 31, 11–15+20. [Google Scholar] [CrossRef]
  17. Li, Y.; Cheng, Z.; Yao, X.; Kong, Z.; Wang, Z.; Liu, M. Multi-Objective Optimal Deployment of Road Traffic Monitoring Cameras: A Case Study in Wujiang, China. Sustainability 2023, 15, 12011. [Google Scholar] [CrossRef]
  18. Qichun, B.; Bowen, G.; Ciyun, L.; Zhaosheng, Y. Traffic incident automatic detection algorithm for urban expressway. J. Cent. South Univ. (Sci. Technol.) 2017, 48, 1682–1687. [Google Scholar]
  19. Li, L.; Lin, Y.; Du, B.; Yang, F.; Ran, B. Real-time traffic incident detection based on a hybrid deep learning model. Transp. A Transp. Sci. 2022, 18, 78–98. [Google Scholar] [CrossRef]
  20. Yan, S.; Smith, J.S.; Lu, W.; Zhang, B. Abnormal event detection from videos using a two-stream recurrent variational autoencoder. IEEE Trans. Cogn. Dev. Syst. 2018, 12, 30–42. [Google Scholar] [CrossRef]
  21. Singh, D.; Mohan, C.K. Deep spatio-temporal representation for detection of road accidents using stacked autoencoder. IEEE Trans. Intell. Transp. Syst. 2018, 20, 879–887. [Google Scholar] [CrossRef]
  22. Yan, H.; Li, Y. A Survey of Generative AI for Intelligent Transportation Systems. arXiv 2023, arXiv:2312.08248. [Google Scholar]
  23. Qiu, L.; Zhang, D.; Tian, Y.; Al-Nabhan, N. Deep learning-based algorithm for vehicle detection in intelligent transportation systems. J. Supercomput. 2021, 77, 11083–11098. [Google Scholar] [CrossRef]
  24. Vishnu, S.; Ramanadhan, U.; Vasudevan, N.; Ramachandran, A. Vehicular collision avoidance using video processing and vehicle-to-infrastructure communication. In Proceedings of the 2015 International Conference on Connected Vehicles and Expo, Shenzhen, China, 19–23 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 387–388. [Google Scholar]
  25. Hasarinda, R.; Tharuminda, T.; Palitharathna, K.; Edirisinghe, S. Traffic Collision Avoidance with Vehicular Edge Computing. In Proceedings of the 2023 3rd International Conference on Advanced Research in Computing (ICARC), Belihuloya, Sri Lanka, 23–24 February 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 316–321. [Google Scholar]
  26. Lee, S.; Lee, S.; Noh, J.; Kim, J.; Jeong, H. Special traffic event detection: Framework, dataset generation, and deep neural network perspectives. Sensors 2023, 23, 8129. [Google Scholar] [CrossRef] [PubMed]
  27. Xu, Z.; Wang, X. A modified round-robin load-balancing algorithm for cluster-based web servers. In Proceedings of the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 3580–3584. [Google Scholar]
  28. Kang, L.; Ting, X. Application of adaptive load balancing algorithm based on minimum traffic in cloud computing architecture. In Proceedings of the 2015 International Conference on Logistics, Informatics and Service Sciences (LISS), Barcelona, Spain, 27–29 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5. [Google Scholar]
  29. Ge, J.W.; Guo, Q.; Fang, Y.Q. A Multi-objective Optimization Algorithm for Cloud Computing Task Scheduling Based on Improved Ant Colony Algorithm. Microelectron. Comput. 2017, 34, 63–67. [Google Scholar]
  30. Han, H.; Liu, Y.; Hou, Y.; Qiao, J. Multi-modal multi-objective particle swarm optimization with self-adjusting strategy. Inf. Sci. 2023, 629, 580–598. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the traffic anomaly event detection efficiency optimization model workflow.
Figure 1. Schematic diagram of the traffic anomaly event detection efficiency optimization model workflow.
Sensors 24 07221 g001
Figure 2. Spatial distribution characteristics of the 150 cameras in the initial state.
Figure 2. Spatial distribution characteristics of the 150 cameras in the initial state.
Sensors 24 07221 g002
Figure 3. The values of the overall efficiency of traffic incident detection with iterations.
Figure 3. The values of the overall efficiency of traffic incident detection with iterations.
Sensors 24 07221 g003
Figure 4. Number of algorithm types deployed on cameras in each time window.
Figure 4. Number of algorithm types deployed on cameras in each time window.
Sensors 24 07221 g004
Figure 5. Comparison of the number of detected incidents by type before and after optimization across different time windows.
Figure 5. Comparison of the number of detected incidents by type before and after optimization across different time windows.
Sensors 24 07221 g005
Figure 6. Spatial distribution characteristics of 175 intelligent detection cameras after optimization for the time window 00:00–06:00.
Figure 6. Spatial distribution characteristics of 175 intelligent detection cameras after optimization for the time window 00:00–06:00.
Sensors 24 07221 g006
Figure 7. Spatial distribution characteristics of 165 intelligent detection cameras after optimization for the time window 06:00–12:00.
Figure 7. Spatial distribution characteristics of 165 intelligent detection cameras after optimization for the time window 06:00–12:00.
Sensors 24 07221 g007
Figure 8. Spatial distribution characteristics of 162 intelligent detection cameras after optimization for the time window 12:00–18:00.
Figure 8. Spatial distribution characteristics of 162 intelligent detection cameras after optimization for the time window 12:00–18:00.
Sensors 24 07221 g008
Figure 9. Spatial distribution characteristics of 168 intelligent detection cameras after optimization for the time window 18:00–24:00.
Figure 9. Spatial distribution characteristics of 168 intelligent detection cameras after optimization for the time window 18:00–24:00.
Sensors 24 07221 g009
Table 1. Weight values for different types of traffic incidents.
Table 1. Weight values for different types of traffic incidents.
Incident TypePedestrians on HighwaysAbnormal ParkingTraffic CongestionNon-Motorized Vehicles on Highways
Weight0.420.240.150.19
Table 2. Data collected and detection efficiency scores for each camera location from 0:00 to 6:00, from 1 July 2023 to 14 July 2023.
Table 2. Data collected and detection efficiency scores for each camera location from 0:00 to 6:00, from 1 July 2023 to 14 July 2023.
Camera LocationPedestrians on HighwaysAbnormal ParkingTraffic CongestionNon-Motorized Vehicles on HighwaysDetection Efficiency
14151067.92
206843.4
352624813.46
405832.97
514121.91
Table 3. Comparison of the overall efficiency of traffic incident detection before and after optimization.
Table 3. Comparison of the overall efficiency of traffic incident detection before and after optimization.
Time WindowBefore OptimizationAfter OptimizationImprovement
00:00–06:000.841.1840%
06:00–12:002.262.8928%
12:00–18:003.363.9317%
18:00–24:001.061.3628%
Table 4. Overall performance indicators of traffic events.
Table 4. Overall performance indicators of traffic events.
Time Window IntervalOverall Efficiency of Traffic Incident Detection (f)Average Load Degree (U)Load Balance Degree ( R ¯ )Computational Resource Utilization ( σ )
00:00–06:001.183.457.4497.50%
06:00–12:002.898.1114.5798.17%
12:00–18:003.9311.6835.7394.83%
18:00–24:001.364.2921.4097.33%
Table 5. Comparison of traffic event detection computing power scheduling methods.
Table 5. Comparison of traffic event detection computing power scheduling methods.
Method NameAverage Load Degree (U)Load Balance Degree ( R ¯ )Computational Resource Utilization ( σ )
Static Round-Robin Scheduling4.2537.4377.22%
Weighted Round-Robin Scheduling5.7825.3289.67%
Priority Round-Robin Scheduling5.5229.6585.34%
Heuristic Adaptive Scheduling6.8819.7896.96%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, H.; Yang, J.; Yuan, M.-D.; Li, X. Heuristic Optimal Scheduling for Road Traffic Incident Detection Under Computational Constraints. Sensors 2024, 24, 7221. https://doi.org/10.3390/s24227221

AMA Style

Wu H, Yang J, Yuan M-D, Li X. Heuristic Optimal Scheduling for Road Traffic Incident Detection Under Computational Constraints. Sensors. 2024; 24(22):7221. https://doi.org/10.3390/s24227221

Chicago/Turabian Style

Wu, Hao, Jiahao Yang, Ming-Dong Yuan, and Xin Li. 2024. "Heuristic Optimal Scheduling for Road Traffic Incident Detection Under Computational Constraints" Sensors 24, no. 22: 7221. https://doi.org/10.3390/s24227221

APA Style

Wu, H., Yang, J., Yuan, M.-D., & Li, X. (2024). Heuristic Optimal Scheduling for Road Traffic Incident Detection Under Computational Constraints. Sensors, 24(22), 7221. https://doi.org/10.3390/s24227221

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop