
Citation: Giovanni S. Alberti, Yves Capdeboscq, Yannick Privat. On the randomised stability constant for inverse problems[J]. Mathematics in Engineering, 2020, 2(2): 264-286. doi: 10.3934/mine.2020013
[1] | Xinzheng Xu, Xiaoyang Zhao, Meng Wei, Zhongnian Li . A comprehensive review of graph convolutional networks: approaches and applications. Electronic Research Archive, 2023, 31(7): 4185-4215. doi: 10.3934/era.2023213 |
[2] | Xin Liu, Yuan Zhang, Kai Zhang, Qixiu Cheng, Jiping Xing, Zhiyuan Liu . A scalable learning approach for user equilibrium traffic assignment problem using graph convolutional networks. Electronic Research Archive, 2025, 33(5): 3246-3270. doi: 10.3934/era.2025143 |
[3] | Min Li, Ke Chen, Yunqing Bai, Jihong Pei . Skeleton action recognition via graph convolutional network with self-attention module. Electronic Research Archive, 2024, 32(4): 2848-2864. doi: 10.3934/era.2024129 |
[4] | Zhenyu Yang, Lei Wu, Peian Wen, Peng Chen . Visual Question Answering reasoning with external knowledge based on bimodal graph neural network. Electronic Research Archive, 2023, 31(4): 1948-1965. doi: 10.3934/era.2023100 |
[5] | Wenrui Guan, Xun Wang . A Dual-channel Progressive Graph Convolutional Network via subgraph sampling. Electronic Research Archive, 2024, 32(7): 4398-4415. doi: 10.3934/era.2024198 |
[6] | Nuri Park, Junhan Cho, Juneyoung Park . Assessing crash severity of urban roads with data mining techniques using big data from in-vehicle dashcam. Electronic Research Archive, 2024, 32(1): 584-607. doi: 10.3934/era.2024029 |
[7] | Jie Zheng, Yijun Li . Machine learning model of tax arrears prediction based on knowledge graph. Electronic Research Archive, 2023, 31(7): 4057-4076. doi: 10.3934/era.2023206 |
[8] | Boshuo Geng, Jianxiao Ma, Shaohu Zhang . Ensemble deep learning-based lane-changing behavior prediction of manually driven vehicles in mixed traffic environments. Electronic Research Archive, 2023, 31(10): 6216-6235. doi: 10.3934/era.2023315 |
[9] | Jian Gao, Hao Liu, Yang Zhang . Intelligent traffic safety cloud supervision system based on Internet of vehicles technology. Electronic Research Archive, 2023, 31(11): 6564-6584. doi: 10.3934/era.2023332 |
[10] | Qi Zhang, Yukai Wang, Ruyang Yin, Wenyu Cheng, Jian Wan, Lan Wu . A data-based framework for automatic road network generation of multi-modal transport micro-simulation. Electronic Research Archive, 2023, 31(1): 190-206. doi: 10.3934/era.2023010 |
Vehicle recognition has increasingly risen at present. One crucial step in resolving the traffic issues on the roads is the risky vehicle identification [1]. The punishment paperwork for transportation infractions has been available on the official websites of the transportation bureaus for the provinces or the public security traffic management bureaus of the public security. The probable connection between the car and the risk can be discovered from the driver's name, the type of vehicle, the license plate, the time, the location, and information on criminal behaviors. Finding the potential relation between vehicles and risks and creating a dynamic knowledge system to swiftly detect risky vehicles are critical problems at the moment.
The growth of transportation, healthcare, and other industries has been impacted by the rise of the knowledge graph in both positive and negative ways. The Shenzhen Traffic Planning and Design Research Center has been doing the majority of the research on the traffic knowledge graph by employing knowledge graph to mine the bus scenes. It has established a knowledge graph with public transport vehicles, bus routes, bus stops, card swiping records, and IC cards as entities, and the belonging, passing, neighboring, getting on, getting off, and getting out as a relationship.
In addition, Zou developed a traffic knowledge graph using the fusion of data from many sources. He fully considers the time element by using the dynamic part connected to time as attribute storage and the static part such as the road in traffic as entity storage [2]. To encourage the ongoing development and advancement of safety management level methods, Li created the urban rail transit knowledge graph based on the safety management of urban rail transit construction [3]. By discretizing and sermonizing the multi-source heterogeneous urban traffic big data, Zhou constructed the urban knowledge graph and introduced the graph convolutional network to further extract the features of the urban knowledge graph, which were processed as the input of the spatial-temporal convolutional neural network [4]. These studies show how the knowledge graph can be used in transportation. Transportation is fundamentally a complex knowledge network since it is a moving object made up of massive individuals in time and space dimensions. Digging out the cross relationships among the entire transport link, the road environment, and events beneath the urban space is the foundation of good urban traffic management. Additionally, it is crucial to the security of urban transportation.
Building a dynamic knowledge graph of urban road risky vehicles, on one hand, it facilitates the query and statistics of relevant data for urban road risky vehicles, on the other hand, it can provide rich knowledge and multiple information for urban road traffic situation analysis and prediction. Moreover, the knowledge graph of urban road risky vehicles is a knowledge graph of urban traffic containing time and space information. Compared with the general static knowledge graph, dynamic knowledge contained the temporal knowledge graph, which will change with time and space. The knowledge graph of urban road risky vehicles can provide knowledge with spatial-temporal information for subsequent tasks. Therefore, it is important to study the construction method of urban road risky vehicles dynamic knowledge graph for strengthening and improving the relevant fields of urban traffic knowledge graph.
Numerous types of trucks, different passenger automobiles, small cars, motorcycles, and bicycles are primarily explored as urban road vehicles. But there are fewer data on motorcycles and bicycles, mainly on trucks and buses.
This paper builds a dynamic knowledge graph model combining R-GCN and LSTM to address the issue of poor node information. Specifically, the whole model consists of several layers of the R-GCN network. The input of the model is the static urban road risky vehicle knowledge graph, and the output is the new urban road risky vehicle knowledge graph. The first layer operation of R-GCN is that the input graph data composed of nodes and edges, which changes the characteristics on node of the graph data from X to Z through the several hidden layers of the GCN, the relation between nodes remains unchanged during the transformation process, and updating the parameters of the inter-layer network is completed by LSTM. The LSTM is used to realize the dynamics of the knowledge graph and ensure the previous learning long-distance dependence, while the R-GCN focuses on resolving the directional influence of the edges in the knowledge graph. The main contributions include the following:
1) Create the static risky vehicles knowledge network using text data, and consider time as an entity attribute. This paper employed the R-GCN to realize the embedding representation of entity relations since the edges in the static risky vehicles knowledge graph are directional. In contrast to other networks, the R-GCN can completely consider relations in the knowledge graph.
2) The LSTM is utilized to update the R-GCN weight for the dynamics of the knowledge graph. This paper conducted experiments on link prediction and classification. The experiment results demonstrate that the presented method performs admirably on the link prediction compared to GCN, DynGEM, ROLAND, and RE-GCN. To further verify the proposed method, classification experiments are carried out on the risky vehicle dataset.
The remainder of this paper is structured as follows: Section 2 shows the related work. The proposed method for constructing the dynamic knowledge graph of risky vehicles is provided in Section 3. Experiments and results are described in Section 4, while Section 5 concludes this paper.
Domain information is constantly updated over time in many fields, such as risky vehicles in the transportation industry. A large number of studies have focused on various types of risky driving behaviors [5] in the transportation field such as speeding [6,7] and tailgating [8,9], risk assessment of road transport vehicles for dangerous goods based on the hierarchical fuzzy network model [10], lane change risk analysis methods of expressway vehicles [11], the violation behavior video detection methods of driving the wrong lane [12], etc. The studies are mainly for the risk type of a certain vehicle. Time is a crucial factor in the creation of knowledge graphs when research item changes with time. A time-aware knowledge representation learning method was presented by Cui et al. [13] to address the problem of learning representations for vast knowledge graphs with time labels. The related method of dynamic knowledge graph is often an extension of the static graph.
The initial correlation method to the dynamic knowledge graph is based on the matrix factorization method [14,15], whose nodes are represented by the eigenvectors of the Laplacian matrix of the graph. Li et al. update the feature vectors utilizing the previous feature vectors rather than calculating the feature vectors from the beginning for each new graph, this method is highly computationally efficient [16]. Then researchers proposed the methods based on random wandering, for example, Nyuyen et al. extended the random wandering method by specifying the step size [17], and Yu et al. used resampling of several steps in a continuous time step when the structure of the graph did not change substantially [18], and reduced the computational cost.
A popular method of the dynamic knowledge graph is a continuous point process in time. Trivedi et al. [19] took the embedded representation of nodes as input, adopted neural networks to parameterize the intensity function, and modeled the appearance of edges as a point process. Zuo et al. [20] also used a Hawks process to model the dynamics and added an attention mechanism to assess the influence of nodes' past neighbors on their present neighbors. These methods favor time-of-event prediction because the process is continuous.
The waves of deep learning have driven many supervised and unsupervised approaches. As the predecessor of deep learning, current research on neural networks pays more attention to the balance of efficiency and performance [21,22]. Currently, the most effective combination is the graph neural network and recurrent structure, the graph neural network obtains graph information and recurrent structure processes dynamics. For supervised methods, Graph Convolutional Network (GCN) [23] has been most studied, for example, modeling without any time effect, using a single model for all time steps and loss functions accumulated along the time axis. In 2022, based on the structure of GCNs (extremely high sparsity and unbalanced non-zero data distribution) and the neuromorphic characteristics of memristive crossbar circuit, Lyu et al. proposed the acceleration method including Sparse Laplace Matrix Reordering and Diagonal Block Matrix Multiplication [24]. In 2023, to balance resource cost and performance, Lyu et al. designed the multiobjective reinforcement learning (RL)-based neural architecture search (NAS) scheme, which comprehensively balances the accuracy, parameters, FLOPs, and inference latency [25].
Graph convolution network is a method that aggregates the node information by using edge information to generate a new node representation, and it can execute different learning tasks on the graph. Processing static knowledge graphs with GCN has already been very successful [26−29]. However, the processing of the dynamic knowledge graph by GCN is less studied [30−32], and the orientation of edges was not considered in the studies.
A typical unsupervised method is the Deep embedding method for dynamic graphs (DynGEM). This is a self-encoding method proposed by Goyal et al. [33] to minimize the reconstruction loss and the distance between the connected nodes in the embedding space. The depth of the architecture is commensurate with the size of the graph, and the past learned auto-encoder is used to initialize the next time of the auto-encoder training for faster learning.
In addition, Li et al. [34] introduced the Recurrent Evolution network based on Graph Convolution Network (RE-GCN) in 2021. This network learned the evolutional representation of entities and relations on each timestamp by cyclic modeling of knowledge graph sequences. A relation-aware GCN was specifically used for evolutionary units to capture the structural dependencies within the knowledge graph in each timestamp. To capture the sequence pattern of all information in parallel, the traditional knowledge graph sequence is automatically regressed and modeled by the gate loop component.
Graph neural networks (GNNs) are widely used in dynamic knowledge graphs currently [35−39]. However, these methods have limitations in model design, evaluation set, and training strategy. In 2022, You et al. [40] proposed a graph learning framework for the dynamic graph in view of the limitations, transformed static GNN into dynamic GNN, treated nodes embedding on different GNN layers as a hierarchical node state, and then updated it repeatedly over time.
These methods can create dynamic knowledge graphs, but they necessitate node information for the entire time period (including train and test sets), which are inapplicable to frequent change node sets, and do not consider the directionality of edges. Therefore, directional dynamic knowledge graph construction methods have become a research hotspot.
This section describes the dynamics of the risky vehicles triples, risk types, and the risky vehicle knowledge graph. The concept of the relational graph convolutional network is presented in Section 3.2. The model of the risky vehicle knowledge graph is introduced in Section 3.3.
Risky vehicles triples. Assume that information about risky vehicles is recorded as triples D+={(h,r,t)|h∈E,r∈R,t∈E} in a knowledge graph comprising n entities and m relations. Each triple is made up of the head entity h and tail entity t as well as the relation r between them, where E and R represent the relation set and the entity set, respectively. For instance, there are (Yue K72586, belong to, yangmou), (Yue K72586, vehicle type, a large truck) and (Yue K72586, risk type, illegal over-limit transportation more than 3 times in 1 year) and so on.
Risk types. To maintain road traffic order, prevent and reduce traffic accidents, protect personal and property safety, and legitimate rights and interests of citizens, legal persons, and other organizations, and improve traffic efficiency [41], the Road Traffic Safety Law of the People's Republic of China stipulates road vehicles. After statistical analysis, the risk types are summarized as the risks of the vehicle itself and the vehicle risks caused by the drivers, the latter is divided into direct and indirect types, in accordance with this regulation and the data related to the risk vehicles obtained from the Beijing transportation website.
The first type of risk is caused by the vehicle itself, specifically as follows. 1) Over-limit transportation. 2) Heavy goods vehicles are released after exceeding the standard loading. 3) No necessary measures were taken to prevent the goods from falling off and spreading them. 4) Driving a vehicle that has met the scrap standards on the road. 5) Speeding. 6) Driving a motor vehicle whose parts do not meet the technical standards shall leave the scene after a traffic accident. 7) The vehicle appears to be overloaded with driving. 8) Passenger vehicles other than highway passenger vehicles carry goods in violation of regulations.
The second type of vehicle risk is directly caused by the driver, listed as follows. 1) Driving over the limit without authorization. 2) Driving a motor vehicle while intoxicated. 3) Driving a motor vehicle after drinking alcohol. 4) Illegal passenger transport operation. 5) Motor vehicle that affects normal driving when changing lanes. 6) Parking in violation of prohibited line marking. 7) Unregistered motor vehicles on the road, driving three-wheeled motorcycles when the driver does not wear a safety helmet as required. 8) Driving a vehicle that is not compatible with the type of driving permit stated in the driver's license.
The third type of vehicle risk is indirectly caused by the driver, specifically as follows. 1) Drivers do not obtain the appropriate qualification documents, driving road freight transport vehicles. 2) Road transport employees do not carry the qualification documents. 3) The driver cannot provide a valid charter contract. 4) Drivers use canceled road transport operating permits to engage in road cargo transport operations. 5) Driving a motor vehicle caused a traffic accident and then fleeing, does not constitute a crime, the circumstances are less serious. 6) In violation of the provisions of road traffic safety laws and regulations, a major accident shall constitute a criminal act. 7) The driver caused a traffic accident and then fled, constituting a criminal offense. 8) Drivers do not hang number plates on the road or fail to install a motor vehicle number plate as required.
Dynamics of the knowledge graph for risky vehicles. The risk analysis of individual automobiles is not highly dynamic, and the type of risk mentioned above is typically static for a certain vehicle. For instance, the Huangzhuang Brigade of the Haidian Traffic Detachment in Beijing discovered the person Jia, whose license plate number is Beijing QXXXXX, was operating a road freight transport vehicle without the required qualification certificate at 15:30 on August 26, 2022. The knowledge graph created in this way is static, and time is assumed to be a risky vehicle attribute.
However, each entity represented by a risky vehicle has a time attribute from the entire risky vehicle dataset that indicates the moment the vehicle caused the risk (also called the timestamp). Based on the time range (April 2011−August 2022) of the risky vehicle dataset on urban roads in Beijing collected in this paper, it can be divided into 49 different time steps with an average interval of about 80 days, each contains a separately connected risky vehicles graph, and there are no edge connections between the risky vehicle graphs in different time steps. Obviously, the nodes in a given time step are associated with each other with very close timestamps, so that each node can be effectively considered as an instantaneous snapshot in time. The growth in overall information and the alteration in overall structure over time are dynamic reflections of the risky vehicle knowledge graph. The dynamics of the overall system can be converted into a dynamic knowledge graph using the knowledge graph.
For a dynamic knowledge graph G, at each time point t, G can be expressed as (At,Xt), where At and Xt represent the adjacency matrix and feature matrix, respectively, ultimately to learn is the node representation of each node at each time point in G.
Kipf and Welling proposed the relational graph convolutional network in 2017. It is a unique method of graph representation that is frequently employed in the categorization of graph nodes, prediction of graph relations, social discovery, and network similarity [23]. The GCN consists of multilayer graph convolution. Although it is similar to the perceptron, it also needs an additional neighbor aggregation step activation convolution.
The simplest GCN is equivalent to a simple neural network and can be expressed as Eq (1).
f(H(l),A)=σ(AH(l)W(l)) | (1) |
Where A is the adjacency matrix, H represents the feature matrix of nodes, W is the parameter matrix and the activation function is σ. The activation function is usually the sigmoid function. Directly employing the adjacency matrix will only calculate the feature-weighted sum of all neighbors for a node while the features of the node itself will be ignored. Generally, a unit matrix will be added. Additionally, if the adjacency matrix is not normalized, multiplying it with the feature matrix will alter the original distribution of the features, leading to unexpected issues. As a result, Eq (2) is the equation for the final layer feature propagation [23].
f(H(l),A)=σ(ˆD−12ˆAˆD−12H(l)W(l)) | (2) |
The type and direction of edges are not considered in the above GCN, but edges are oriented in the domain knowledge graph (such as traffic domain), which is solved by the relational graph convolutional network [42] proposed by Michael Schlichtkrull. The core formula is shown in Eq (3).
H(l+1)i=σ(∑r∈R∑vj∈N(r)vi1|N(r)vi|W(l)rh(l)j+W(l)oh(l)i) | (3) |
Where R denotes the set of all relations in the graph, N(r)vi denotes the set of neighbors with relations r to the node vi, Wr is the weight parameter corresponding to the neighbors with relations r, and Wo denotes the weight parameter corresponding to the node itself.
Although the weight update and evolution of the convolution cells are the most important in the dynamic knowledge graph construction model for risky vehicles, the premise is to construct the static knowledge graph for risky vehicles. In this paper, R-GCN is used for feature extraction of the risky vehicle knowledge graphs, and R-GCN parameters are updated through LSTM. The model for dynamic knowledge graph construction of risky vehicles is divided into two stages, as shown in Figure 1.
1) The relevant text information of risky vehicles was obtained from some provinces and cities, and the entities (driver names, license plates, vehicle types, time, places, risk types) were extracted from the text through the jieba algorithm, and six basic relations were defined to build a static risky vehicle knowledge graph.
2) The combination of R-GCN and LSTM can study time-varying data. It is decided to employ a 3-layer network structure to prevent the issue of low accuracy brought on by small samples. Considering that the risky vehicles knowledge graph is mainly the structure of the graph, the LSTM network was used for parameter update according to the [32].
It is possible to output the weights for each training R-GCN, which allows for observation analysis and a logical interpretation of the model-chosen weights. The memory of LSTM effectively utilizes the weight of the previous moment to update the R-GCN of the subsequent moment and realize the interaction of several R-GCN model moments.
The sigmoid function and tanh function are used throughout the construction to introduce non-linearity and ensure that the data do not diverge in the process of passing. Take the constructed static knowledge graph as input to the R-GCN. The initial R-GCN weights are obtained after the first round of training and updated the parameters of the R-GCN by the LSTM, which is a time-related dynamic process. The fusion algorithm of R-GCN and LSTM is shown in Algorithm 1.
Algorithm 1 The fusion algorithm of R-GCN and LSTM |
Input: Nodes and edges Output: Embed new nodes and edges 1: Nodes and edges vector quantization →(N,E). 2: Model initial weight of training R-GCN →WinitialR−GCN. 3: The initial weight serves as the input of the LSTM, meter, and calculate the new weight. →WnewLSTM 4: The data is input into the R-GCN composed of new weights, the network, to obtain a new graph representation. →KG=f(WnewLSTM,N,E) |
The weight update of the R-GCN network in Algorithm 1 is shown in Eq (4).
W(l)t=LSTM(W(l)t−1) | (4) |
The weight of LSTM used to update the R-GCN is included in the equation. The equation was calculated in accordance with the literature [32].
This paper adopts the risky vehicle dataset, and SBM and Bitcoin Alpha serving as the comparison datasets. The risky vehicle data mainly come from the Public Security Traffic Management Bureau of Beijing Municipal Public Security Bureau. The risky vehicle dataset is from a real and reliable source, including data from 16 municipal districts such as Haidian District and Chaoyang District in Beijing. This data can be used not only to automatically identify the vehicle's historical illegal information, but also to determine the potential risk of vehicles and risk level, and play an important role in early warning and control of urban road operation risk. The SBM dataset is synthetic data generated from a commonly used random graph model for simulating community structure and evolution following the literature [33]. Data from various trading platforms are used to create the Bitcoin Alpha dataset, which is a set of data that is traded using Bitcoin.
The data distribution of the SBM dataset and Bitcoin Alpha dataset is similar to that of the presented risky vehicle dataset, and the two datasets also have obvious dynamic features (time change), so the two datasets are selected as comparative datasets. The datasets are summarized in Table 1. The training, validation, and test datasets are divided according to the time steps. The time step depends on the data acquisition time interval, and the interval is a small-time step.
Nodes | Edges | Time step (Training/Verification/Test) |
|
Risky vehicles | 203,769 | 234,355 | 34/5/10 |
SBM | 1000 | 4,870,863 | 35/5/10 |
Bitcoin Alpha | 3777 | 24,173 | 95/13/28 |
In the experiment, the comparison models including GCN, DynGEM, ROLAND, and RE-GCN from the related work were chosen and compared on the link prediction. These methods are applicable to the construction of dynamic knowledge graphs, but they necessitate node information for the entire time period (including the training set and test set), which are not suitable for the frequent changes of node sets without considering the directionality of edges. Instead of just providing an optimal prediction result, the model will be required to use all the entities in the knowledge graph as candidates for the link prediction, so when choosing the evaluation criteria, generally choose the Mean Average Precision (MAP) and Mean Reciprocal Rank (MRR).
The MAP value is the mean average precision, which is the average accuracy value for multiple validation sets, and the calculation equation is shown in Eq (5).
MAP = 1|Q|∑q∈QAveP(q) | (5) |
In the equation, AveP is the average accuracy, Q represents the number of validation sets, MAP is the value required in this paper.
MRR is to evaluate the performance of the link prediction by ranking the correctly predicted result values in the predicted results, and the calculation equation is shown in Eq (6).
MRR=1|Q||Q|∑i=11ranki | (6) |
Where Q is the number of validation sets, ranki indicates the rank at the i.
This paper evaluates the results on the link prediction task, uses the information before it at time t to predict whether an edge exists at time t + 1. Since the historical information has been encoded in the R-GCN parameters, this paper performs edge prediction based on the head-to-tail entities. The results are shown in Table 2.
MAP | MRR | |||||
Risky vehicles | SBM | Bitcoin Alpha | Risky vehicles | SBM | Bitcoin Alpha | |
GCN | 0.0724 | 0.1987 | 0.0003 | 0.0017 | 0.0138 | 0.0031 |
DynGEM | 0.0948 | 0.1680 | 0.0525 | 0.0103 | 0.0139 | 0.1287 |
ROLAND | 0.1218 | 0.0012 | 0.0962 | 0.1036 | 0.0011 | 0.2887 |
RE-GCN | 0.11 | 0.1873 | 0.0931 | 0.009 | 0.0014 | 0.0756 |
R-GCN + LSTM (this paper) | 0.2746 | 0.2019 | 0.0023 | 0.1075 | 0.0146 | 0.0864 |
Table 2 gives the results of the present method compared with GCN, DynGEM, ROLAND, RE-GCN. On the risky vehicle datasets, the current method outperforms the other four methods, improving 0.2022, 0.1798, 0.1528 and 0.1646. It is mainly because the comparison methods are not conducive to processing the directional data. On the SBM dataset, the R-GCN+LSTM method is still better than the other four methods, mainly due to enough edge information. However, on this dataset, the ROLAND method performs extremely poorly, mainly because the method repeatedly updates the node embedding representation over time and does not take time as the entity's attribute value. However, on the Bitcoin Alpha dataset, the method is not dominant, and the accuracy is lower, but higher than the GCN method alone, mainly because the edges are not informative and not directional.
From the perspective of time complexity, the time complexity of the presented method is determined by R-GCN and LSTM, which is O(n2), where n is the size of the input layer. GCN needs to decompose the Laplace matrix and calculates the matrix multiplication in each forward propagation process. When the graph is large, the time complexity is O(n2), and n represents the number of nodes in the knowledge graph, which is very time-consuming. DynGEM uses a dynamically expandable self-coder to maintain the network structure characteristics and handle the changing network scale, so the time complexity of DynGEM is O(n2) the same as that of the self-coder, and n represents the number of nodes in the knowledge graph. ROLAND is to reuse static GNN for dynamic graph settings, and its time complexity is mainly affected by GNN time complexity, which is O(m). RE-GCN learns the evolutionary representation of entities and relationships in each time stamp by modeling the knowledge graph sequence circularly. For each evolution unit, the GCN of relationship perception is used to capture the structural dependency in the knowledge graph in each time stamp. Therefore, the time complexity is O(m(|E|ω+|R|D)+|Es|), where |E| represents the number of entities in the time stamp m, |Es| is the number of entities in the static knowledge graph, |R| represents the number of relations, and ω represents the number of layers.
To further validate the effectiveness of the present method, by performing classification experiments in the risk vehicle dataset, the paper evaluated them using accuracy, precision, recall, and F value. The results of accuracy, precision, recall, and F values are shown in Figure 2.
Figure 2 shows the accuracy of the method is not high in the classification task on the risky vehicle dataset, mainly because the collected dataset contains a large amount of data belonging to the first type of risk, that is, the data of the risk of the vehicle itself accounts for about 70% of the total data, while the second type of risk data accounts for about 25%, and the third type of risk data accounts for about 5%, which leads to inaccurate prediction of the second and third types of risk. Secondly, in different time steps, the data of the three risk types are unevenly distributed. Finally, the distinction between the specific types of the three types is not obvious, for example, "driving a motor vehicle whose parts do not meet the technical standards, leaving the scene after a traffic accident" in the first type of risk, and "escaping after causing a traffic accident, constituting a criminal act" in the third type of risk is not obvious.
The change of the loss values for training and testing in the experiment with the number of iterations is shown in Figure 3.
The variation of the loss value with the number of iterations during training and testing is shown in Figure 3. From Figure 3, it can be seen the loss value decreases with the increase of the number of iterations in both training and testing, and the loss value decreases very fast until 50 iterations. After 50 iterations, the decrease slows down and gradually leveled off after 200 iterations. After 50 iterations, the loss value of the test is higher than the loss value of the training, mainly when new data appear in the test dataset.
The large-scale knowledge graph benefits from the time-aware knowledge representation learning method outlined in related work. These methods are not useful because the risky vehicle dataset in this paper is small and the edge information is sparse. Compared with the methods based on matrix decomposition and random walk, the presented method plays an important role in dealing with the knowledge graph whose structure changes greatly with time, and the node information changes little. However, the two methods are aimed at the change of node information namely the feature vector, so it is not suitable for the dynamic knowledge graph construction of risky vehicles.
This paper explores a dynamic knowledge graph construction method for urban road risky vehicles. This method combines the relational graph convolutional network with LSTM to address the issue of dynamic and edge orientation of the knowledge graph for urban road risky vehicles. In this method, the relational graph convolutional network solves directionality, LSTM is used to realize the dynamics. The structure and implementation of the method are described. Link prediction experiments were performed on three datasets including risky vehicles, the SBM, and the Bitcoin Alpha. The results show the presented method is better for the dynamic construction of directional knowledge graphs compared with GCN, DynGEM, ROLAND, and RE-GCN methods.
The data distribution of three risk types in the risky vehicle dataset in this paper is unbalanced, and the application scope of the proposed method is small. Therefore, in future work, we will increase the risky vehicle dataset by gathering information on traffic accidents and other factors, and improve the method to accurately analyze and forecast risky vehicles.
This work is supported by National Natural Science Fund of China (61371143).
The authors declare there is no conflict of interest.
[1] |
Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6: 14410-14430. doi: 10.1109/ACCESS.2018.2807385
![]() |
[2] | Alberti GS, Capdeboscq Y (2018) Lectures on Elliptic Methods for Hybrid Inverse Problems, Paris: Société Mathématique de France. |
[3] | Ammari H (2008) An Introduction to Mathematics of Emerging Biomedical Imaging, Berlin: Springer. |
[4] | Ammari H, Garnier J, Kang H, et al. (2017) Multi-Wave Medical Imaging: Mathematical Modelling & Imaging Reconstruction, World Scientific. |
[5] | Antholzer S, Haltmeier M, Schwab J (2018) Deep learning for photoacoustic tomography from sparse data. Inverse Probl Sci Eng 27: 987-1005. |
[6] | Antun V, Renna F, Poon C, et al. (2019) On instabilities of deep learning in image reconstruction-Does AI come at a cost?. arXiv preprint arXiv:1902.05300. |
[7] | Arridge S, Hauptmann A (2019) Networks for nonlinear diffusion problems in imaging. J Math Imaging Vis DOI: https://xs.scihub.ltd/https://doi.org/10.1007/s10851-019-00901-3. |
[8] |
Bardos C, Lebeau G, Rauch J (1992) Sharp sufficient conditions for the observation, control, and stabilization of waves from the boundary. SIAM J Control Optim 30: 1024-1065. doi: 10.1137/0330055
![]() |
[9] | Berg J, Nyström K (2017) Neural network augmented inverse problems for PDEs. arXiv preprint arXiv:1712.09685. |
[10] |
Bubba TA, Kutyniok G, Lassas M, et al. (2019) Learning the invisible: A hybrid deep learning-shearlet framework for limited angle computed tomography. Inverse Probl 35: 064002. doi: 10.1088/1361-6420/ab10ca
![]() |
[11] | Burq N (2010) Random data Cauchy theory for dispersive partial differential equations. In: Proceedings of the International Congress of Mathematicians, New Delhi: Hindustan Book Agency, 3: 1862-1883. |
[12] |
Burq N, Tzvetkov N (2008) Random data Cauchy theory for supercritical wave equations II: A global existence result. Invent Math 173: 477-496. doi: 10.1007/s00222-008-0123-0
![]() |
[13] |
Burq N, Tzvetkov N (2014) Probabilistic well-posedness for the cubic wave equation. J Eur Math Soc 16: 1-30. doi: 10.4171/JEMS/426
![]() |
[14] |
Candès EJ, Romberg J (2007) Sparsity and incoherence in compressive sampling. Inverse Probl 23: 969-985. doi: 10.1088/0266-5611/23/3/008
![]() |
[15] |
Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inform Theory 52: 489-509. doi: 10.1109/TIT.2005.862083
![]() |
[16] |
Donoho DL (2006) Compressed sensing. IEEE Trans Inform Theory 52: 1289-1306. doi: 10.1109/TIT.2006.871582
![]() |
[17] | Engl HW, Hanke M, Neubauer A (1996) Regularization of Inverse Problems, Dordrecht: Kluwer Academic Publishers Group. |
[18] | Feng J, Sun Q, Li Z, et al. (2018) Back-propagation neural network-based reconstruction algorithm for diffuse optical tomography. J Biomed Opt 24: 051407. |
[19] | Foucart S, Rauhut H (2013) A Mathematical Introduction to Compressive Sensing, New York: Birkhäuser/Springer. |
[20] | Garnier J, Papanicolaou G (2016) Passive Imaging with Ambient Noise, Cambridge: Cambridge University Press. |
[21] | Goodfellow I, Bengio Y, Courville A (2016) Deep Learning, MIT Press. |
[22] | Haltmeier M, Antholzer S, Schwab J (2019) Deep Learning for Image Reconstruction, World Scientific. |
[23] |
Hamilton SJ, Hauptmann A (2018) Deep d-bar: Real-time electrical impedance tomography imaging with deep neural networks. IEEE Trans Med Imaging 37: 2367-2377. doi: 10.1109/TMI.2018.2828303
![]() |
[24] | Hasanoğlu AH, Romanov VG (2017) Introduction to Inverse Problems for Differential Equations, Cham: Springer. |
[25] |
Hauptmann A, Lucka F, Betcke M, et al. (2018) Model-based learning for accelerated, limitedview 3-d photoacoustic tomography. IEEE Trans Med Imaging 37: 1382-1393. doi: 10.1109/TMI.2018.2820382
![]() |
[26] |
Humbert E, Privat Y, Trélat E (2019) Observability properties of the homogeneous wave equation on a closed manifold. Commun Part Diff Eq, 44: 749-772. doi: 10.1080/03605302.2019.1581799
![]() |
[27] | Isakov V (2006) Inverse Problems for Partial Differential Equations, New York: Springer. |
[28] |
Jin KH, McCann MT, Froustey E, et al. (2017) Deep convolutional neural network for inverse problems in imaging. IEEE Trans Image Process 26: 4509-4522. doi: 10.1109/TIP.2017.2713099
![]() |
[29] | Kaltenbacher B, Neubauer A, Scherzer O (2008) Iterative Regularization Methods for Nonlinear ill-posed Problems, Berlin: Walter de Gruyter. |
[30] | Kirsch A (2011) An Introduction to the Mathematical Theory of Inverse Problems, New York: Springer. |
[31] | Laurent C, Léautaud M (2019) Quantitative unique continuation for operators with partially analytic coefficients. Application to approximate control for waves. J Eur Math Soc 21: 957-1069. |
[32] | Maass P (2019) Deep learning for trivial inverse problems. In: Compressed Sensing and Its Applications, Cham: Springer International Publishing, 195-209. |
[33] |
Martin S, Choi CTM (2017) A post-processing method for three-dimensional electrical impedance tomography. Sci Rep 7: 7212. doi: 10.1038/s41598-017-07727-2
![]() |
[34] |
Modin K, Nachman A, Rondi L (2019) A multiscale theory for image registration and nonlinear inverse problems. Adv Math 346: 1009-1066. doi: 10.1016/j.aim.2019.02.014
![]() |
[35] |
Paley R (1930) On some series of functions. Math Proc Cambridge 26: 458-474. doi: 10.1017/S0305004100016212
![]() |
[36] |
Paley R, Zygmund A (1930) On some series of functions, (1). Math Proc Cambridge, 26: 337-357. doi: 10.1017/S0305004100016078
![]() |
[37] |
Paley R, Zygmund A (1932) On some series of functions, (3). Math Proc Cambridge, 28: 190-205. doi: 10.1017/S0305004100010860
![]() |
[38] |
Privat Y, Trélat E, Zuazua E (2013) Optimal observation of the one-dimensional wave equation. J Fourier Anal Appl 19: 514-544. doi: 10.1007/s00041-013-9267-4
![]() |
[39] |
Privat Y, Trélat E, Zuazua E (2015) Optimal shape and location of sensors for parabolic equations with random initial data. Arch Ration Mech An 216: 921-981. doi: 10.1007/s00205-014-0823-0
![]() |
[40] |
Privat Y, Trélat E, Zuazua E (2016) Optimal observability of the multi-dimensional wave and Schrödinger equations in quantum ergodic domains. J Eur Math Soc 18: 1043-1111. doi: 10.4171/JEMS/608
![]() |
[41] |
Privat Y, Trélat E, Zuazua E (2016) Randomised observation, control and stabilization of waves [Based on the plenary lecture presented at the 86th Annual GAMM Conference, Lecce, Italy, March 24, 2015]. ZAMM Z Angew Math Mech 96: 538-549. doi: 10.1002/zamm.201500181
![]() |
[42] |
Privat Y, Trélat E, Zuazua E (2019) Spectral shape optimization for the neumann traces of the dirichlet-laplacian eigenfunctions. Calc Var Partial Dif 58: 64. doi: 10.1007/s00526-019-1522-3
![]() |
[43] |
Rellich F (1940) Darstellung der eigenwerte von δu+λu= 0 durch ein randintegral. Math Z 46: 635-636. doi: 10.1007/BF01181459
![]() |
[44] | Otmar Scherzer (2015) Handbook of Mathematical Methods in Imaging. Vol. 1, 2, 3. New York: Springer. |
[45] | Szegedy C, Zaremba W, Sutskever I, et al. (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199. |
[46] |
Tadmor E, Nezzar S, Vese L (2004) A multiscale image representation using hierarchical (BV, L2) decompositions. Multiscale Model Simul 2: 554-579. doi: 10.1137/030600448
![]() |
[47] | Tarantola A (2005) Inverse Problem Theory and Methods for Model Parameter Estimation. Philadelphia: Society for Industrial and Applied Mathematics. |
[48] |
Wei Z, Liu D, Chen X (2019) Dominant-current deep learning scheme for electrical impedance tomography. IEEE Trans Biomedical Eng 66: 2546-2555. doi: 10.1109/TBME.2019.2891676
![]() |
[49] |
Yang G, Yu S, Dong H, et al. (2018) Dagan: Deep de-aliasing generative adversarial networks for fast compressed sensing mri reconstruction. IEEE Trans Med Imaging 37: 1310-1321. doi: 10.1109/TMI.2017.2785879
![]() |
[50] |
Zhu B, Liu JZ, Cauley SF, et al. (2018) Image reconstruction by domain-transform manifold learning. Nature 555: 487-492. doi: 10.1038/nature25988
![]() |
1. | Xiyu Zhang, Chengyong Liu, Yi Xu, Beiyan Ye, Langxiong Gan, , A knowledge graph-based inspection items recommendation method for port state control inspection of LNG carriers, 2024, 313, 00298018, 119434, 10.1016/j.oceaneng.2024.119434 | |
2. | Peihan Wen, Yiming Zhao, Jin Liu, A systematic knowledge graph-based smart management method for operations: A case study of standardized management, 2023, 9, 24058440, e20390, 10.1016/j.heliyon.2023.e20390 | |
3. | Yin Junjia, Aidi Hizami Alias, Nuzul Azam Haron, Nabilah Abu Bakar, Machine learning algorithms for safer construction sites: Critical review, 2024, 2, 3029-2670, 544, 10.59400/be.v2i1.544 |
Nodes | Edges | Time step (Training/Verification/Test) |
|
Risky vehicles | 203,769 | 234,355 | 34/5/10 |
SBM | 1000 | 4,870,863 | 35/5/10 |
Bitcoin Alpha | 3777 | 24,173 | 95/13/28 |
MAP | MRR | |||||
Risky vehicles | SBM | Bitcoin Alpha | Risky vehicles | SBM | Bitcoin Alpha | |
GCN | 0.0724 | 0.1987 | 0.0003 | 0.0017 | 0.0138 | 0.0031 |
DynGEM | 0.0948 | 0.1680 | 0.0525 | 0.0103 | 0.0139 | 0.1287 |
ROLAND | 0.1218 | 0.0012 | 0.0962 | 0.1036 | 0.0011 | 0.2887 |
RE-GCN | 0.11 | 0.1873 | 0.0931 | 0.009 | 0.0014 | 0.0756 |
R-GCN + LSTM (this paper) | 0.2746 | 0.2019 | 0.0023 | 0.1075 | 0.0146 | 0.0864 |
Nodes | Edges | Time step (Training/Verification/Test) |
|
Risky vehicles | 203,769 | 234,355 | 34/5/10 |
SBM | 1000 | 4,870,863 | 35/5/10 |
Bitcoin Alpha | 3777 | 24,173 | 95/13/28 |
MAP | MRR | |||||
Risky vehicles | SBM | Bitcoin Alpha | Risky vehicles | SBM | Bitcoin Alpha | |
GCN | 0.0724 | 0.1987 | 0.0003 | 0.0017 | 0.0138 | 0.0031 |
DynGEM | 0.0948 | 0.1680 | 0.0525 | 0.0103 | 0.0139 | 0.1287 |
ROLAND | 0.1218 | 0.0012 | 0.0962 | 0.1036 | 0.0011 | 0.2887 |
RE-GCN | 0.11 | 0.1873 | 0.0931 | 0.009 | 0.0014 | 0.0756 |
R-GCN + LSTM (this paper) | 0.2746 | 0.2019 | 0.0023 | 0.1075 | 0.0146 | 0.0864 |