Mining GPS Data for Traffic Congestion Detection and Prediction
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 119

Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015

Mining GPS Data for Traffic Congestion Detection and Prediction

Suhas Prakash Kaklij

GPS data is available in the large amount, also for the devices having GPS a large amount data is being collected over time. The mining of this huge data is endorsed in discovery of the areas which face regular traffic congestion. User will have prior awareness of such locations which guide in deciding whether or not to go for that route. Avoidance of such routes will also assist in reduction of congestion of such locations. Also detected that the work which has been carried out till now in this field do not provide very precise and relevant results. The reason behind this is the no proper algorithm are selected and distinguished between on road and off road traffic. To deal with all this we proposed this system. This system will be structured and applied over GPS data i. e. data coming from devices like mobile phones, tablets, on board units etc. In the technique used in this system, these GPS data will be first cauterized using the K-means clustering algorithm. The clusters obtained are filtered out. On further processing these clusters a mining method of Naive bayes algorithm is used for mining for traffic Congestion detection and prediction

Keywords: Traffic Congestion Detection, Traffic Jam Prediction, Traffic Tracking and Tracing, Data Mining

Edition: Volume 4 Issue 9, September 2015

Pages: 876 - 880

Share this Article

How to Cite this Article?

Suhas Prakash Kaklij, "Mining GPS Data for Traffic Congestion Detection and Prediction", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158203, Volume 4 Issue 9, September 2015, 876 - 880

Enter Your Email Address




Similar Articles with Keyword 'Data Mining'

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2493 - 2496

An Effective Up-Growth Algorithm for Discovering High Utility Itemset Mining

Anuja Palhade, Rashmi Deshpande

Share this Article

Downloads: 103

Survey Paper, Information Technology, India, Volume 6 Issue 3, March 2017

Pages: 1403 - 1405

Inverse Problem with Solution Using Data Mining

Ashmikumari Shah, Pooja Jardosh

Share this Article

Similar Articles with Keyword 'Traffic'

Downloads: 99

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature's Condition as Factor

Suyash Deore, Rohini Temkar

Share this Article

Downloads: 102

Research Paper, Information Technology, India, Volume 1 Issue 3, December 2012

Pages: 171 - 173

Automatic Vehicles Number Plate Identification using Image Segmentation and Comparison Techniques

Gurjinder Pal Singh, Chhailadeep Kaur

Share this Article

Similar Articles with Keyword 'Congestion'

Downloads: 112

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article

Downloads: 115

Review Papers, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1396 - 1398

Intelligent Traffic Control System using Image Processing

Parichita Basak, Ramandeep Kaur

Share this Article

Similar Articles with Keyword 'Detection'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Similar Articles with Keyword 'Jam'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article

Similar Articles with Keyword 'Prediction'

Downloads: 102

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this Article

Downloads: 107

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1896 - 1900

Determining and Exploring Dimensions in Subspace Clustering for Value Decomposition

Saranya Sagambari Devi.S

Share this Article

Similar Articles with Keyword 'Tracking'

Downloads: 105

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Similar Articles with Keyword 'Tracing'

Downloads: 105

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Downloads: 110

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson's Coefficient of Correlation - A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 315 | Monthly Hits: ⮙2

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 1

Case Studies, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 563 - 567

Online Teaching Excellence: A Case Study of EMC Institute Kishtwar during COVID-19 Lockdown

Dr. Ashaq Hussain

Share this Article

Similar Articles with Keyword 'Mining'

Downloads: 178

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 50

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article



Top