{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T08:04:59Z","timestamp":1743840299326,"version":"3.37.3"},"reference-count":44,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972358","2017C03024"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Province Key Research and Development Project","award":["61972358","2017C03024"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,5,4]]},"abstract":"Fishing vessel monitoring systems (VMSs) play an important role in ensuring the safety of fishing vessel operations. Traditional VMSs use a cloud centralized computing model, and the storage, processing, and visualization of all fishing vessel data are completed in the monitoring center. Due to the limitation of maritime communications, the data generated by fishing vessels cannot be fully utilized, and communication delays lead to inadequate warnings in cases of fishing vessel abnormalities. In this paper, we present a real-time anomaly detection model (RADM) for fishing vessels based on edge computing. The model runs in the edge layer, making full use of the information of moving edge nodes and nearby nodes, and combines a historical trajectory extraction detection model with an online anomaly detection model to detect anomalies. The detection model of historical trajectory extraction mines frequent patterns in historical trajectories through multifeature clustering and identifies trajectories that are different from the frequent patterns as anomalies. Online anomaly detection algorithms detect anomalous behavior in specific scenarios based on the spatiotemporal neighborhood similarity and reduce the impact of anomaly evolution. Experiments show that RADM was more effective than traditional methods in real-time anomaly detection of fishing vessels, which provides a new method for upgrading the technology of traditional VMS.<\/jats:p>","DOI":"10.1155\/2021\/5598988","type":"journal-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T19:37:19Z","timestamp":1620243439000},"page":"1-15","source":"Crossref","is-referenced-by-count":10,"title":["Research on Real-Time Anomaly Detection of Fishing Vessels in a Marine Edge Computing Environment"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9717-8355","authenticated-orcid":true,"given":"Jie","family":"Huang","sequence":"first","affiliation":[{"name":"School of Information and Electronic Engineering, Zhejiang University of Science and Technology, Hangzhou 310023, China"},{"name":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Fengwei","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Zejun","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}]},{"given":"Jian","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Information and Electronic Engineering, Zhejiang University of Science and Technology, Hangzhou 310023, China"}]},{"given":"Yongjian","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3040268"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2989398"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2017.2723278"},{"first-page":"1","article-title":"FVRD: fishing vessel relations discovery through VMS trace analysis","author":"H. Huang","key":"4"},{"first-page":"1","article-title":"Clustering spatial temporal distribution of fishing vessel based LON VMS data using K-means","author":"Sunarmo","key":"5"},{"first-page":"1","article-title":"Fishing area separation and relation discovery through VMS trace analysis","author":"F. Hong","key":"6"},{"first-page":"536","article-title":"Fundamental study of traffic prediction in Tokyo Bay using machine learning","author":"M. Terayama","key":"7"},{"first-page":"66","article-title":"Predicting the trajectories of vessels using machine learning","author":"X. Liu","key":"8"},{"first-page":"128","article-title":"Marine vessel telemetry data processing using machine learning","author":"H. Susanto","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883421"},{"first-page":"2049","article-title":"Comparative analysis of iot protocols for a marine IoT system","author":"M. S. Meera","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028743"},{"first-page":"1","article-title":"Micro-VMS: a VMS mobile unit for artisanal fishing vessels","author":"P. Lous\u00e3","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113219"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0845-4"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"first-page":"273","article-title":"ROAM: rule- and motif-based anomaly detection in massive moving object data sets","author":"X. Li","key":"17"},{"first-page":"1","article-title":"AIS trajectory classification based on IMM data","author":"D. A. Herrero","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2898464"},{"first-page":"949","article-title":"Online anomalous trajectory detection with deep generative sequence modeling","author":"Y. Liu","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050006"},{"first-page":"140","article-title":"Trajectory outlier detection: a partition-and-detect framework","author":"J. Lee","key":"22"},{"first-page":"422","article-title":"Detecting moving object outliers in massive-scale trajectory streams","author":"Y. Yu","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2967865"},{"first-page":"1010","article-title":"Discovering spatio-temporal causal interactions in traffic data streams","author":"W. Liu","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2020.106936"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3029338"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.05.002"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2238531"},{"first-page":"1","article-title":"Anomalous trajectory detection from taxi GPS traces using combination of IBAT and DTW","author":"N. Taniarza","key":"30"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.3390\/en12163087"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980322"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/3391198"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3027681"},{"first-page":"58","article-title":"Exploring spatial-temporal trajectory model for location prediction","author":"P. Lei","key":"35"},{"first-page":"254","article-title":"Destination prediction by sub-trajectory synthesis and privacy protection against such prediction","author":"A. Y. Xue","key":"36"},{"key":"37","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1007\/978-3-540-74553-2_44","article-title":"Mining trajectory patterns using hidden markov models","volume-title":"Proceedings of the Data Warehousing and Knowledge Discovery","author":"H. Jeung","year":"2007"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3039500"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-015-0732-x"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2018.2842792"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2744619"},{"first-page":"138","article-title":"Forward decay: a practical time decay model for streaming systems","author":"G. Cormode","key":"42"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/557\/1\/012014"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983835"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/5598988.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/5598988.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/5598988.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T19:37:27Z","timestamp":1620243447000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/5598988\/"}},"subtitle":[],"editor":[{"given":"Xiaoxian","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":44,"alternative-id":["5598988","5598988"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5598988","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"type":"electronic","value":"1875-905X"},{"type":"print","value":"1574-017X"}],"subject":[],"published":{"date-parts":[[2021,5,4]]}}}