{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:52:24Z","timestamp":1761648744788,"version":"build-2065373602"},"reference-count":54,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T00:00:00Z","timestamp":1588636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["DARE Project EP\/P028764\/1"],"award-info":[{"award-number":["DARE Project EP\/P028764\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Information and Communication Technology (ICT) enabled optimisation of train\u2019s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP). Traditional mobility prediction based optimisation and encryption approaches are reactive in nature; however, Artificial Intelligence (AI) driven proactive solutions are required for near real-time optimisation. Leveraging the historical passenger data recorded via Radio Frequency Identification (RFID) sensors installed at the train stations, mobility prediction models can be developed to support and improve the railway operational performance vis-a-vis 5G and beyond. In this paper we have analysed the passenger traffic flows based on an Access, Egress and Interchange (AEI) framework to support train infrastructure against congestion, accidents, overloading carriages and maintenance. This paper predominantly focuses on developing passenger flow predictions using Machine Learning (ML) along with a novel encryption model that is capable of handling the heavy passenger traffic flow in real-time. We have compared and reported the performance of various ML driven flow prediction models using real-world passenger flow data obtained from London Underground and Overground (LUO). Extensive spatio-temporal simulations leveraging realistic mobility prediction models show that an AEI framework can achieve 91.17% prediction accuracy along with secure and light-weight encryption capabilities. Security parameters such as correlation coefficient (&lt;0.01), entropy (&gt;7.70), number of pixel change rate (&gt;99%), unified average change intensity (&gt;33), contrast (&gt;10), homogeneity (&lt;0.3) and energy (&lt;0.01) prove the efficacy of the proposed encryption scheme.<\/jats:p>","DOI":"10.3390\/s20092629","type":"journal-article","created":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T03:10:38Z","timestamp":1588821038000},"page":"2629","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5895-6959","authenticated-orcid":false,"given":"Syed Muhammad","family":"Asad","sequence":"first","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1802-9728","authenticated-orcid":false,"given":"Sajjad","family":"Hussain","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"given":"Ahmed","family":"Zoha","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7097-9969","authenticated-orcid":false,"given":"Qammer Hussain","family":"Abbasi","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4743-9136","authenticated-orcid":false,"given":"Muhammad Ali","family":"Imran","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2011.5783985","article-title":"Toward dynamic energy-efficient operation of cellular network infrastructure","volume":"49","author":"Oh","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","unstructured":"Patel, D., and Neil, G. (1991, January 5). Passenger information systems on London Underground Limited rolling stock. Proceedings of the IEEE Colloquium on Passenger Information (Trains and Trackside) (Digest No.030), London, UK."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1111\/jiec.12145","article-title":"Life Cycle Assessment of ICT: Carbon footprint and operational electricity use from the operator, national, and subscriber perspective in Sweden","volume":"18","author":"Malmodin","year":"2014","journal-title":"IEEE J. Ind. Ecol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TNET.2016.2623950","article-title":"Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment","volume":"25","author":"Wang","year":"2017","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Asad, S.M., Ozturk, M., Rais, R.N.B., Zoha, A., Hussain, S., Abbasi, Q.H., and Imran, M.A. (2019, January 10\u201312). Reinforcement Learning driven Energy Efficient Mobile Communication and Applications. Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, UAE.","DOI":"10.1109\/ISSPIT47144.2019.9001888"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/TCCN.2017.2747581","article-title":"Competitive Resource Allocation in HetNets: The Impact of Small-Cell Spectrum Constraints and Investment Costs","volume":"3","author":"Chen","year":"2017","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2408","DOI":"10.1109\/TMC.2018.2797937","article-title":"Selecting Individual and Population Models for Predicting Human Mobility","volume":"17","author":"Baumann","year":"2018","journal-title":"Trans. Mob. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TNET.2011.2172984","article-title":"SLAW: Self-Similar Least-Action Human Walk","volume":"20","author":"Lee","year":"2012","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1109\/COMST.2017.2727878","article-title":"A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks","volume":"19","author":"Klaine","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Liu, L., Shah, S.A., Zhao, G., and Yang, X. (2018). Respiration symptoms monitoring in body area networks. Appl. Sci., 8.","DOI":"10.3390\/app8040568"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2809","DOI":"10.1109\/TMC.2016.2516996","article-title":"Pattern Prediction and Passive Bandwidth Management for Hand-over Optimization in QoS Cellular Networks with Vehicular Mobility","volume":"15","author":"Fazio","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/LCOMM.2016.2623276","article-title":"Spatiotemporal Mobility Prediction in Proactive Self-Organizing Cellular Networks","volume":"21","author":"Farooq","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_13","first-page":"1018","article-title":"Limits of Predictability in Human Mobility","volume":"327","author":"Song","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1109\/ACCESS.2018.2885821","article-title":"Mobility prediction: A survey on state-of-the-art schemes and future applications","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_15","unstructured":"Park, H., and Lim, Y. (March, January 27). A markov-based prediction algorithm for user mobility at heterogeneous cloud radio access network. Proceedings of the IEEE International Conference on Big Data and Smart Computing (BigComp), Kyoto, Japan."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/SURV.2012.021312.00116","article-title":"A Survey of Self Organisation in Future Cellular Networks","volume":"15","author":"Aliu","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5204","DOI":"10.1109\/TVT.2016.2611654","article-title":"Big Data Driven Hidden Markov Model Based Individual Mobility Prediction at Points of Interest","volume":"66","author":"Lv","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/TGCN.2018.2858011","article-title":"Mobility Prediction-Based Autonomous Proactive Energy Saving (AURORA) Framework for Emerging Ultra-Dense Networks","volume":"2","author":"Imran","year":"2018","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4277","DOI":"10.1109\/TWC.2015.2418763","article-title":"Interference Prediction in Mobile Ad Hoc Networks With a General Mobility Model","volume":"14","author":"Cong","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2577","DOI":"10.1109\/TVT.2014.2345263","article-title":"A Destination and Mobility Path Prediction Scheme for Mobile Networks","volume":"64","author":"Taleb","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/THMS.2015.2451515","article-title":"Supporting Serendipitous Social Interaction Using Human Mobility Prediction","volume":"45","author":"Yu","year":"2015","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mondal, M.A., and Rehena, Z. (2019, January 18\u201319). Identifying Traffic Congestion Pattern using K-means Clustering Technique. Proceedings of the International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India.","DOI":"10.1109\/IoT-SIU.2019.8777729"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TITS.2013.2290285","article-title":"Spatiotemporal Patterns in Large-Scale Traffic Speed Prediction","volume":"15","author":"Asif","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","article-title":"Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial","volume":"21","author":"Chen","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TITS.2011.2174051","article-title":"Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg\u2013Marquardt Algorithm","volume":"13","author":"Chan","year":"2012","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ning, Y. (2014, January 25\u201326). Traffic Pattern Recognition System Design and Development Based on Smart Phones. Proceedings of the 7th International Conference on Intelligent Computation Technology and Automation, Changsha, China.","DOI":"10.1109\/ICICTA.2014.45"},{"key":"ref_27","unstructured":"Ki, Y.K., Heo, N.W., Choi, J.W., Ahn, G.H., and Park, K.S. (February, January 31). An incident detection algorithm using artificial neural networks and traffic information. Proceedings of the Cybernetics and Informatics (K&I), Lazy pod Makytou, Slovakia."},{"key":"ref_28","unstructured":"Zhany, Y., and Luo, B.-S. (2014, January 25\u201326). Development and Implementation of Traffic Pattern Recognition Software Based on iOS Framework. Proceedings of the 7th International Conference on Intelligent Computation Technology and Automation, Changsha, China."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gorbachev, R., Moroz, N., Semenikhin, K., and Starostenko, A. (2016, January 29\u201330). Identification of Rolling Stock Parameters for Adaptive Train Control. Proceedings of the 2016 International Conference on Engineering and Telecommunication (EnT), Moscow, Russia.","DOI":"10.1109\/EnT.2016.030"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Fikejz, J. (2014, January 14\u201316). Localization Of Rolling Stock Within The Railway Network Model. Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco.","DOI":"10.1109\/ICMCS.2014.6911360"},{"key":"ref_31","unstructured":"Meng, X., Jia, L., Xie, J., Qin, Y., and Xu, J. (2010, January 26\u201328). Complex characteristic analysis of passenger train flow network. Proceedings of the 2010 Chinese Control and Decision Conference, Xuzhou, China."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TASE.2007.897613","article-title":"A New Methodology for Modeling, Analysis, Synthesis, and Simulation of Time-Optimal Train Traffic in Large Networks","volume":"5","author":"Blendinger","year":"2008","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_33","unstructured":"Wang, G., Zeng, X., and Yuan, T. (2017, January 16\u201318). Study on the influence of train control system on service quality of rail transit. Proceedings of the 2017 International Conference on Service Systems and Service Management, Dalian, China."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TITS.2013.2296655","article-title":"Energy-Efficient Train Operation in Urban Rail Transit Using Real-Time Traffic Information","volume":"15","author":"Gu","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Tong, G., Fan, C., Cui, F., and Meng, X. (2006, January 20\u201323). Fuzzy Neural Network Model Applied in the Traffic Flow Prediction. Proceedings of the 2006 IEEE International Conference on Information Acquisition, Weihai, China.","DOI":"10.1109\/ICIA.2006.305923"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Zhao, E., Zhang, Y., Yao, D., Li, L., Tan, J., and Li, Z. (December, January 30). A New Training Structure for Multiple-to-Multiple Traffic Flow Prediction. Proceedings of the 2018 Chinese Automation Congress (CAC), Xi\u2019an, China.","DOI":"10.1109\/CAC.2018.8623132"},{"key":"ref_37","first-page":"25","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"23","author":"Ahmad","year":"2010","journal-title":"Computing"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Major, W., Buchanan, W.J., and Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dyn., 3068\u20133087.","DOI":"10.1007\/s11071-020-05463-3"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Adeel, A., Ahmad, J., Larijani, H., and Hussain, A. (2019). A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognit. Comput.","DOI":"10.1007\/s12559-019-09653-z"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Masood, F., Ahmad, J., Shah, S.A., Jamal, S.S., and Hussain, I. (2020). A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22.","DOI":"10.3390\/e22030274"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"350","DOI":"10.3390\/sym12030350","article-title":"A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping","volume":"12","author":"Jawad","year":"2020","journal-title":"Symmetry"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s00521-016-2405-6","article-title":"A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices","volume":"28","author":"Ahmad","year":"2017","journal-title":"Neural Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Zhang, G., Ding, W., and Li, L. (2020). Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map. Symmetry, 12.","DOI":"10.3390\/sym12030355"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MNET.2014.6963801","article-title":"Challenges in 5G: How to empower SON with big data for enabling 5G","volume":"28","author":"Imran","year":"2014","journal-title":"IEEE Netw."},{"key":"ref_45","unstructured":"Murphy, K.P. (2012). Machine Learning: A Probabilistic Perspective, The MIT Press."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Shah, S.A., Fan, D., Ren, A., Zhao, N., Yang, X., and Tanoli, S.A.K. (2018). Seizure episodes detection via smart medical sensing system. J. Ambient Intell. Humaniz. Comput.","DOI":"10.1007\/s12652-018-1142-3"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/TMC.2017.2773609","article-title":"Leveraging Intelligence from Network CDR Data for Interference Aware Energy Consumption Minimization","volume":"17","author":"Zoha","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2075","DOI":"10.1109\/JSEN.2019.2949528","article-title":"Machine Learning Driven Approach Towards the Quality Assessment of Fresh Fruits Using Non-Invasive Sensing","volume":"20","author":"Ren","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4891","DOI":"10.1109\/JSEN.2020.2965892","article-title":"Non-invasive hydration level estimation in human body using Galvanic Skin Response","volume":"20","author":"Rizwan","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2019.02.011","article-title":"An efficient monitoring of eclamptic seizures in wireless sensors networks","volume":"75","author":"Haider","year":"2019","journal-title":"Comput. Electr. Eng."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MPOT.2019.2906977","article-title":"Radar for Health Care: Recognizing Human Activities and Monitoring Vital Signs","volume":"38","author":"Fioranelli","year":"2019","journal-title":"IEEE Potentials"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Michal Gorawski, K.G. (2014). Review of Mobility Models for Performance Evaluation of Wireless Networks. Man-Machine Interactions, Springer.","DOI":"10.1007\/978-3-319-02309-0_62"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","article-title":"A secure image encryption scheme based on chaotic maps and affine transformation","volume":"75","author":"Ahmad","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","article-title":"Chaos-based diffusion for highly autocorrelated data in encryption algorithms","volume":"82","author":"Ahmad","year":"2015","journal-title":"Nonlinear Dyn."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/9\/2629\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:25:20Z","timestamp":1760361920000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/9\/2629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,5]]},"references-count":54,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,5]]}},"alternative-id":["s20092629"],"URL":"https:\/\/doi.org\/10.3390\/s20092629","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,5,5]]}}}