Pervasive Systems, Algorithms and Networks: 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings

Ship movement information is becoming increasingly available, resulting in an overwhelming increase of data transmitted to human operators. Understanding the Maritime traffic patterns is important to Maritime Situational Awareness (MSA) applications in particular, to classify and predict trajectories on sea. Therefore, there is need for automatic processing to synthesize the behavior of interest in a simplified, clear, and effective way without any loss of data originality. In this paper, we propose a method to calculate route prediction from a synthetic route representation data once the picture of the maritime traffic is constructed. The synthetic route knowledge based on Automatic Identification System (AIS) is used to classify and predict future routes along which a vessel is going to move. This is in agreement with the partially observed track and given the vessel static and dynamic information. The prediction results do not only reduce data storage space in the database but can also supply data support for traffic management, accident detection, and avoidance of automatic collision and therefore promote the development of maritime intelligent traffic systems. Finally, the simulation results shows a good tradeoff between the predicted and the actual observed vessel routes.

[1]  Colin Boyd,et al.  Analysis of two authorization protocols using Colored Petri Nets , 2014, International Journal of Information Security.

[2]  Sebastian Mödersheim,et al.  OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .

[3]  Peter Szolovits,et al.  The coming of age of artificial intelligence in medicine , 2009, Artif. Intell. Medicine.

[4]  Yang Xu,et al.  Modeling and Analysis of Security Protocols Using Colored Petri Nets , 2011, J. Comput..

[5]  Luigi Catuogno,et al.  On the Security of a Two-Factor Authentication Scheme , 2010, WISTP.

[6]  Julian Fierrez,et al.  Graphical Password-Based User Authentication With Free-Form Doodles , 2016, IEEE Transactions on Human-Machine Systems.

[7]  Henry A. Kautz,et al.  An Overview of the Assisted Cognition Project , 2002 .

[8]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[9]  James M. Robins,et al.  Optimal Structural Nested Models for Optimal Sequential Decisions , 2004 .

[10]  Vahid Rafe,et al.  Security analysis of network protocols through model checking: a case study on mobile IPv6 , 2016, Secur. Commun. Networks.

[11]  David A. Wagner,et al.  Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[12]  David J. Reinkensmeyer,et al.  A computational model of use-dependent motor recovery following a stroke: Optimizing corticospinal activations via reinforcement learning can explain residual capacity and other strength recovery dynamics , 2012, Neural Networks.

[13]  Dawn Xiaodong Song Athena: a new efficient automatic checker for security protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[14]  Lars Michael Kristensen,et al.  Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.

[15]  Kunihiko Miyazaki,et al.  Improving the Security of Cryptographic Protocol Standards , 2015, IEEE Security & Privacy.

[16]  S. Murphy,et al.  Methodological Challenges in Constructing Effective Treatment Sequences for Chronic Psychiatric Disorders , 2007, Neuropsychopharmacology.

[17]  Luigi Catuogno,et al.  On user authentication by means of video events recognition , 2014, J. Ambient Intell. Humaniz. Comput..

[18]  Giuseppe De Pietro,et al.  A Reinforcement Learning-Based Approach for the Risk Management of e-Health Environments: A Case Study , 2018, 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).

[19]  Issam Al-Azzoni,et al.  THE VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS USING COLOURED PETRI NETS , 2004 .

[20]  Jiachen Yang,et al.  Precision medicine as a control problem: Using simulation and deep reinforcement learning to discover adaptive, personalized multi-cytokine therapy for sepsis , 2018, ArXiv.

[21]  A. Cheng,et al.  Model Checking Coloured Petri Nets - Exploiting Strongly Connected Components , 1997 .

[22]  Lars Michael Kristensen,et al.  Coloured Petri Nets - Modelling and Validation of Concurrent Systems , 2009 .

[23]  Gustavo Carneiro,et al.  Deep Reinforcement Learning for Active Breast Lesion Detection from DCE-MRI , 2017, MICCAI.

[24]  Ron Steinfeld,et al.  On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Antonio Coronato,et al.  A Reinforcement-Learning-Based Approach for the Planning of Safety Strategies in AAL Applications , 2018, Intelligent Environments.

[26]  Alessandro Armando,et al.  SATMC: A SAT-Based Model Checker for Security-Critical Systems , 2014, TACAS.

[27]  W. Rogowski,et al.  What is personalized medicine: sharpening a vague term based on a systematic literature review , 2013, BMC Medical Ethics.

[28]  Olli Saarela,et al.  Optimal Dynamic Regimes: Presenting a Case for Predictive Inference , 2010, The international journal of biostatistics.

[29]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[30]  P. Thall,et al.  Covariate‐adjusted adaptive randomization in a sarcoma trial with multi‐stage treatments , 2005, Statistics in medicine.

[31]  Luigi Catuogno,et al.  Analysis of a two-factor graphical password scheme , 2014, International Journal of Information Security.

[32]  Elizabeth D. Mynatt,et al.  Increasing the opportunities for aging in place , 2000, CUU '00.

[33]  Athanasios S. Polydoros,et al.  Survey of Model-Based Reinforcement Learning: Applications on Robotics , 2017, J. Intell. Robotic Syst..

[34]  Alfredo Pironti,et al.  Formal verification of security protocol implementations: a survey , 2012, Formal Aspects of Computing.

[35]  Ree Dawson,et al.  Dynamic treatment regimes: practical design considerations , 2004, Clinical trials.

[36]  Stefan Schaal,et al.  2008 Special Issue: Reinforcement learning of motor skills with policy gradients , 2008 .

[37]  Giovanni Paragliola,et al.  Risk management for nuclear medical department using reinforcement learning algorithms , 2019, Journal of Reliable Intelligent Environments.

[38]  Li Xu,et al.  Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.

[39]  Jeannette M. Wing A specifier's introduction to formal methods , 1990, Computer.

[40]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .

[41]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[42]  J. Sinacore,et al.  The Importance of Patient Preferences in the Measurement of Health Care Satisfaction , 1993, Medical care.

[43]  Salah A. Aly,et al.  Protocol Verification And Analysis Using Colored Petri Nets , 2003 .