{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T20:19:44Z","timestamp":1769372384368,"version":"3.49.0"},"reference-count":28,"publisher":"Walter de Gruyter GmbH","issue":"4","license":[{"start":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T00:00:00Z","timestamp":1476835200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Traffic incidents in big cities are increasing alongside economic growth, causing traffic delays and deteriorating road safety conditions. Thus, developing a universal freeway automatic incident detection (AID) algorithm is a task that took the interest of researchers. This paper presents a novel automatic traffic incident detection method based on the extreme learning machine (ELM) algorithm. Furthermore, transfer learning has recently gained popularity as it can successfully generalise information across multiple tasks. This paper aimed to develop a new approach for the traffic domain-based domain adaptation. The ELM was used as a classifier for detection, and target domain adaptation transfer ELM (TELM-TDA) was used as a tool to transfer knowledge between environments to benefit from past experiences. The detection performance was evaluated by common criteria including detection rate, false alarm rate, and others. To prove the efficiency of the proposed method, a comparison was first made between back-propagation neural network and ELM; then, another comparison was made between ELM and TELM-TDA.<\/jats:p>","DOI":"10.1515\/jisys-2016-0028","type":"journal-article","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T06:02:12Z","timestamp":1476856932000},"page":"601-612","source":"Crossref","is-referenced-by-count":1,"title":["Extreme Learning Machine-Based Traffic Incidents Detection with Domain Adaptation Transfer Learning"],"prefix":"10.1515","volume":"26","author":[{"given":"Chaimae","family":"Elhatri","sequence":"first","affiliation":[{"name":"LIIAN Laboratory , Department of Computer Sciences , Faculty of Science Dhar-Mahraz , Sidi Mohamed Ben Abdellah University , Fez 3000 , Morocco"}]},{"given":"Mohammed","family":"Tahifa","sequence":"additional","affiliation":[{"name":"LIIAN Laboratory , Department of Computer Sciences , Faculty of Science Dhar-Mahraz , Sidi Mohamed Ben Abdellah University , Fez 3000 , Morocco"}]},{"given":"Jaouad","family":"Boumhidi","sequence":"additional","affiliation":[{"name":"LIIAN Laboratory , Department of Computer Sciences , Faculty of Science Dhar-Mahraz , Sidi Mohamed Ben Abdellah University , Fez 3000 , Morocco"}]}],"member":"374","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"key":"2025120523365022543_j_jisys-2016-0028_ref_001_w2aab3b7b5b1b6b1ab1b6b1Aa","doi-asserted-by":"crossref","unstructured":"L. Bruzzone and M. Marconcini, Domain adaptation problems: a DASVM classification technique and a circular validation strategy, IEEE Trans. Pattern Anal. Mach. Intell.32 (2010), 770\u2013787.10.1109\/TPAMI.2009.57","DOI":"10.1109\/TPAMI.2009.57"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_002_w2aab3b7b5b1b6b1ab1b6b2Aa","doi-asserted-by":"crossref","unstructured":"H. Hardy and Y. N. Cheah, Question classification using extreme learning machine on semantic features, J. ICT Res. Appl.7 (2013), 36\u201358.10.5614\/itbj.ict.res.appl.2013.7.1.3","DOI":"10.5614\/itbj.ict.res.appl.2013.7.1.3"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_003_w2aab3b7b5b1b6b1ab1b6b3Aa","doi-asserted-by":"crossref","unstructured":"G. B. Huang, L. Chen and C. K. Siew, Universal approximation using incremental constructive feedforward networks with random hidden nodes, IEEE Trans. Neural Netw.17 (2006), 879\u2013892.10.1109\/TNN.2006.875977","DOI":"10.1109\/TNN.2006.875977"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_004_w2aab3b7b5b1b6b1ab1b6b4Aa","doi-asserted-by":"crossref","unstructured":"G. B. Huang, H. Zhou, X. Ding and R. Zhang, Extreme learning machine for regression and multiclass classification, IEEE Trans. Syst. Man Cybernet. Pt. B Cybernet.42 (2012), 513\u2013529.10.1109\/TSMCB.2011.2168604","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_005_w2aab3b7b5b1b6b1ab1b6b5Aa","doi-asserted-by":"crossref","unstructured":"G. B. Huang, Q. Y. Zhu and C. K. Siew, Extreme learning machine: a new learning scheme of feedforward neural networks, in: Proceedings of the 2004 IEEE International Joint Conference on Neural Networks, 2, pp. 985\u2013990, IEEE, 2004.","DOI":"10.1109\/IJCNN.2004.1380068"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_006_w2aab3b7b5b1b6b1ab1b6b6Aa","doi-asserted-by":"crossref","unstructured":"G. B. Huang, Q. Y. Zhu and C. K. Siew, Extreme learning machine: theory and applications, Neurocomputing70 (2006), 489\u2013501.10.1016\/j.neucom.2005.12.126","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_007_w2aab3b7b5b1b6b1ab1b6b7Aa","unstructured":"Z. Huang, Y. Yu, J. Gu and H. Liu, An efficient method for traffic sign recognition based on extreme learning machine, IEEE Trans. Cybernet. (2016), 1\u201314. Available online at http:\/\/www.ntu.edu.sg\/home\/egbhuang\/pdf\/ELM-Traffic-Sign-Recognition.pdf."},{"key":"2025120523365022543_j_jisys-2016-0028_ref_008_w2aab3b7b5b1b6b1ab1b6b8Aa","unstructured":"D. Krajzewicz, G. Hertkorn, C. R\u00f6ssel and P. Wagner, SUMO (Simulation of Urban MObility) \u2013 an open-source traffic simulation, in: Proceedings of the 4th Middle East Symposium on Simulation and Modelling (MESM20002), pp. 183\u2013187, 2002."},{"key":"2025120523365022543_j_jisys-2016-0028_ref_009_w2aab3b7b5b1b6b1ab1b6b9Aa","doi-asserted-by":"crossref","unstructured":"X. Li, W. Mao and W. Jiang, Extreme learning machine based transfer learning for data classification, Neurocomputing174 (2016), 203\u2013210.10.1016\/j.neucom.2015.01.096","DOI":"10.1016\/j.neucom.2015.01.096"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_010_w2aab3b7b5b1b6b1ab1b6c10Aa","doi-asserted-by":"crossref","unstructured":"T. Liu, Y. Yang, G. B. Huang, Y. K. Yeo and Z. Lin, Driver distraction detection using semi-supervised machine learning, IEEE Trans. Intell. Transport. Syst.17 (2016), 1108\u20131120.10.1109\/TITS.2015.2496157","DOI":"10.1109\/TITS.2015.2496157"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_011_w2aab3b7b5b1b6b1ab1b6c11Aa","doi-asserted-by":"crossref","unstructured":"Y. U. Liu, Y. U. Lei, Q. I. Yi, J. Wang and H. Wen, Traffic incident detection algorithm for urban expressways based on probe vehicle data, J. Transport. Syst. Eng. Inform. Technol.8 (2008), 36\u201341.10.1016\/S1570-6672(08)60031-8","DOI":"10.1016\/S1570-6672(08)60031-8"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_012_w2aab3b7b5b1b6b1ab1b6c12Aa","doi-asserted-by":"crossref","unstructured":"J. Lu, S. Chen, W. Wang and B. Ran, Automatic traffic incident detection based on nFOIL, Expert Syst. Appl.39 (2012), 6547\u20136556.10.1016\/j.eswa.2011.12.050","DOI":"10.1016\/j.eswa.2011.12.050"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_013_w2aab3b7b5b1b6b1ab1b6c13Aa","doi-asserted-by":"crossref","unstructured":"J. Lu, S. Chen, W. Wang and H. van Zuylen, A hybrid model of partial least squares and neural network for traffic incident detection, Expert Syst. Appl.39 (2012), 4775\u20134784.10.1016\/j.eswa.2011.09.158","DOI":"10.1016\/j.eswa.2011.09.158"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_014_w2aab3b7b5b1b6b1ab1b6c14Aa","unstructured":"S. J. Pan, J. T. Kwok and Q. Yang, Transfer learning via dimensionality reduction, in: AAAI, 8, pp. 677\u2013682, 2008."},{"key":"2025120523365022543_j_jisys-2016-0028_ref_015_w2aab3b7b5b1b6b1ab1b6c15Aa","doi-asserted-by":"crossref","unstructured":"S. J. Pan and Q. Yang, A survey on transfer learning, IEEE Trans. Knowl. Data Eng.22 (2010), 1345\u20131359.10.1109\/TKDE.2009.191","DOI":"10.1109\/TKDE.2009.191"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_016_w2aab3b7b5b1b6b1ab1b6c16Aa","doi-asserted-by":"crossref","unstructured":"R. Rossi, M. Gastaldi, G. Gecchele and V. Barbaro, Fuzzy logic-based incident detection system using loop detectors data, Transport. Res. Proc.10 (2015), 266\u2013275.10.1016\/j.trpro.2015.09.076","DOI":"10.1016\/j.trpro.2015.09.076"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_017_w2aab3b7b5b1b6b1ab1b6c17Aa","doi-asserted-by":"crossref","unstructured":"D. Srinivasan, W. H. Loo and R. L. Cheu, Traffic incident detection using particle swarm optimization, in: Proceedings of the 2003 IEEE Swarm Intelligence Symposium, SIS\u201903, IEEE, pp. 144\u2013151, 2003.","DOI":"10.1109\/SIS.2003.1202260"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_018_w2aab3b7b5b1b6b1ab1b6c18Aa","doi-asserted-by":"crossref","unstructured":"W. Wang, S. Chen and G. Qu, Incident detection algorithm based on partial least squares regression, Transport. Res. Pt. C Emerg. Technol.16 (2008), 54\u201370.10.1016\/j.trc.2007.06.005","DOI":"10.1016\/j.trc.2007.06.005"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_019_w2aab3b7b5b1b6b1ab1b6c19Aa","doi-asserted-by":"crossref","unstructured":"D. E. Rumelhart, G. E. Hinton and R. J. Williams, Learning representations by back-propagating errors, Nature323 (1986), 533\u2013536.10.1038\/323533a0","DOI":"10.1038\/323533a0"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_020_w2aab3b7b5b1b6b1ab1b6c20Aa","doi-asserted-by":"crossref","unstructured":"E. W. Xiang, B. Cao, D. H. Hu and Q. Yang, Bridging domains using world wide knowledge for transfer learning, IEEE Trans. Knowl. Data Eng.22 (2010), 770\u2013783.10.1109\/TKDE.2010.31","DOI":"10.1109\/TKDE.2010.31"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_021_w2aab3b7b5b1b6b1ab1b6c21Aa","unstructured":"J. Xu, H. Zhou and G. B. Huang, Extreme learning machine based fast object recognition, in: 15th International Conference on Information Fusion (FUSION), IEEE, pp. 1490\u20131496, 2012."},{"key":"2025120523365022543_j_jisys-2016-0028_ref_022_w2aab3b7b5b1b6b1ab1b6c22Aa","doi-asserted-by":"crossref","unstructured":"F. Yuan and R. L. Cheu, Incident detection using support vector machines, Transport. Res. Pt. C Emerg. Technol.11 (2003), 309\u2013328.10.1016\/S0968-090X(03)00020-2","DOI":"10.1016\/S0968-090X(03)00020-2"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_023_w2aab3b7b5b1b6b1ab1b6c23Aa","doi-asserted-by":"crossref","unstructured":"L. Zhang and D. Zhang, Domain adaptation extreme learning machines for drift compensation in E-nose systems, IEEE Trans. Instrum. Measure.64 (2015), 1790\u20131801.10.1109\/TIM.2014.2367775","DOI":"10.1109\/TIM.2014.2367775"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_024_w2aab3b7b5b1b6b1ab1b6c24Aa","doi-asserted-by":"crossref","unstructured":"L. Zhang and D. Zhang, Domain adaptation transfer extreme learning machines, in: Proceedings of ELM-2014, vol. 1, pp. 103\u2013119, Springer, 2015.","DOI":"10.1007\/978-3-319-14063-6_10"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_025_w2aab3b7b5b1b6b1ab1b6c25Aa","doi-asserted-by":"crossref","unstructured":"L. Zhang and D. Zhang, Robust visual knowledge transfer via extreme learning machine based domain adaptation, IEEE Trans. Image Process.25 (2016), 4959\u20134973.10.1109\/TIP.2016.2598679","DOI":"10.1109\/TIP.2016.2598679"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_026_w2aab3b7b5b1b6b1ab1b6c26Aa","doi-asserted-by":"crossref","unstructured":"L. Zhang and D. Zhang, Visual understanding via multi-feature shared learning with global consistency, IEEE Trans. Multimed.18 (2016), 247\u2013259.10.1109\/TMM.2015.2510509","DOI":"10.1109\/TMM.2015.2510509"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_027_w2aab3b7b5b1b6b1ab1b6c27Aa","doi-asserted-by":"crossref","unstructured":"L. Zhang, W. Zuo and D. Zhang, LSDT: latent sparse domain transfer learning for visual adaptation, IEEE Trans. Image Process.25 (2016), 1177\u20131191.10.1109\/TIP.2016.2516952","DOI":"10.1109\/TIP.2016.2516952"},{"key":"2025120523365022543_j_jisys-2016-0028_ref_028_w2aab3b7b5b1b6b1ab1b6c28Aa","doi-asserted-by":"crossref","unstructured":"W. Zong and G. B. Huang, Face recognition based on extreme learning machine, Neurocomputing74 (2011), 2541\u20132551.10.1016\/j.neucom.2010.12.041","DOI":"10.1016\/j.neucom.2010.12.041"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/26\/4\/article-p601.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0028\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0028\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:37:20Z","timestamp":1764977840000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0028\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,19]]},"references-count":28,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,10,4]]},"published-print":{"date-parts":[[2017,9,26]]}},"alternative-id":["10.1515\/jisys-2016-0028"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2016-0028","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2016,10,19]]}}}