{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:08:22Z","timestamp":1774444102764,"version":"3.50.1"},"reference-count":54,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T00:00:00Z","timestamp":1536278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Traffic prediction is a critical task for intelligent transportation systems (ITS). Prediction at intersections is challenging as it involves various participants, such as vehicles, cyclists, and pedestrians. In this paper, we propose a novel approach for the accurate intersection traffic prediction by introducing extra data sources other than road traffic volume data into the prediction model. In particular, we take advantage of the data collected from the reports of road accidents and roadworks happening near the intersections. In addition, we investigate two types of learning schemes, namely batch learning and online learning. Three popular ensemble decision tree models are used in the batch learning scheme, including Gradient Boosting Regression Trees (GBRT), Random Forest (RF) and Extreme Gradient Boosting Trees (XGBoost), while the Fast Incremental Model Trees with Drift Detection (FIMT-DD) model is adopted for the online learning scheme. The proposed approach is evaluated using public data sets released by the Victorian Government of Australia. The results indicate that the accuracy of intersection traffic prediction can be improved by incorporating nearby accidents and roadworks information.<\/jats:p>","DOI":"10.3390\/sym10090386","type":"journal-article","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T11:47:41Z","timestamp":1536320861000},"page":"386","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Intersection Traffic Prediction Using Decision Tree Models"],"prefix":"10.3390","volume":"10","author":[{"given":"Walaa","family":"Alajali","sequence":"first","affiliation":[{"name":"School of Computer Science, Guangzhou University, Guangzhou 510006, China"},{"name":"School of Information Technology, Deakin University, Geelong, VIC 3220, Australia"}]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin 541004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC 3122, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9807-2293","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2949","DOI":"10.1109\/TITS.2015.2411675","article-title":"Low-dimensional models for compressed sensing and prediction of large-scale traffic data","volume":"16","author":"Mitrovic","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/j.future.2017.08.014","article-title":"Enhancing network capacity by weakening community structure in scale-free network","volume":"87","author":"Cai","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MNET.2016.1500104NM","article-title":"Social influence analysis in social networking Big Data: Opportunities and challenges","volume":"31","author":"Peng","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.ins.2016.08.023","article-title":"Social influence modeling using information theory in mobile social networks","volume":"379","author":"Peng","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e3901","DOI":"10.1002\/cpe.3901","article-title":"Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures","volume":"29","author":"Chen","year":"2017","journal-title":"Concurr. Comput.-Pract. Exp."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.future.2013.12.014","article-title":"Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks","volume":"39","author":"Zheng","year":"2014","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","first-page":"117","article-title":"Collaborative Target Tracking in Wireless Sensor Networks","volume":"23","author":"Xing","year":"2014","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.compeleceng.2016.10.005","article-title":"Achieving reliable and secure services in cloud computing environments","volume":"59","author":"Liu","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_9","first-page":"865","article-title":"Traffic flow prediction with big data: A deep learning approach","volume":"16","author":"Lv","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TITS.2016.2568920","article-title":"Looking at intersections: A survey of intersection monitoring, behavior and safety analysis of recent studies","volume":"18","author":"Shirazi","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_11","unstructured":"National Highway Traffic Safety Administration (2018, January 15). Crash Factors in Intersection-Related Crashes: An On-Scene Perspective, Available online: http:\/\/www-nrd.nhtsa.dot.gov\/Pubs\/811366.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Anantharam, P., Thirunarayan, K., Marupudi, S., Sheth, A.P., and Banerjee, T. (2016, January 12\u201317). Understanding city traffic dynamics utilizing sensor and textual observations. Proceedings of the 30th Conference on Artificial Intelligence (AAAI-2016), Phoenix, AZ, USA.","DOI":"10.1609\/aaai.v30i1.9902"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.trc.2017.02.024","article-title":"Deep learning for short-term traffic flow prediction","volume":"79","author":"Polson","year":"2017","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.trc.2015.02.019","article-title":"A gradient boosting method to improve travel time prediction","volume":"58","author":"Zhang","year":"2015","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.enbuild.2017.04.038","article-title":"Trees vs. Neurons: Comparison between random forest and ANN for high-resolution prediction of building energy consumption","volume":"147","author":"Ahmad","year":"2017","journal-title":"Energy Build."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chen, T., and Guestrin, C. (2016, January 13\u201317). Xgboost: A scalable tree boosting system. Proceedings of the 22th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939785"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.knosys.2015.10.028","article-title":"Traffic big data prediction and visualization using fast incremental model trees-drift detection (FIMT-DD)","volume":"93","author":"Wibisono","year":"2016","journal-title":"Knowl.-Based Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1061\/(ASCE)0733-947X(1995)121:3(249)","article-title":"Short-term prediction of traffic volume in urban arterials","volume":"121","author":"Hamed","year":"1995","journal-title":"J. Transp. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"179","DOI":"10.3141\/1678-22","article-title":"Application of subset autoregressive integrated moving average model for short-term freeway traffic volume forecasting","volume":"1678","author":"Lee","year":"1999","journal-title":"Transp. Res. Rec."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1061\/(ASCE)0733-947X(2003)129:6(664)","article-title":"Modeling and forecasting vehicular traffic flow as a seasonal ARIMA process: Theoretical basis and empirical results","volume":"129","author":"Williams","year":"2003","journal-title":"J. Transp. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Min, X., Hu, J., and Zhang, Z. (2010, January 19\u201322). Urban traffic network modeling and short-term traffic flow forecasting based on GSTARIMA model. Proceedings of the 13th International IEEE Annual Conference on Intelligent Transportation Systems, Madelra Island, Portugal.","DOI":"10.1109\/ITSC.2010.5625123"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TITS.2013.2290285","article-title":"Spatiotemporal patterns in large-scale traffic speed prediction","volume":"15","author":"Asif","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2744","DOI":"10.1109\/TITS.2015.2419614","article-title":"Urban traffic flow prediction system using a multifactor pattern recognition model","volume":"16","author":"Kim","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhan, H., Gomes, G., Li, X.S., Madduri, K., Sim, A., and Wu, K. (2018). Consensus Ensemble System for Traffic Flow Prediction. IEEE Trans. Intell. Transp. Syst., 1\u201312.","DOI":"10.1109\/TITS.2018.2791505"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1061\/(ASCE)0733-947X(2003)129:2(161)","article-title":"Traffic prediction using multivariate nonparametric regression","volume":"129","author":"Clark","year":"2003","journal-title":"J. Transp. Eng."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2014","DOI":"10.1109\/TITS.2016.2515105","article-title":"High-order Gaussian process dynamical models for traffic flow prediction","volume":"17","author":"Zhao","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3393","DOI":"10.1109\/TITS.2015.2453116","article-title":"Time-aware multivariate nearest neighbor regression methods for traffic flow prediction","volume":"16","author":"Bellotti","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2000","DOI":"10.1109\/TII.2017.2682855","article-title":"Research on traffic flow prediction in the big data environment based on the improved RBF neural network","volume":"13","author":"Chen","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2457","DOI":"10.1109\/TITS.2014.2315794","article-title":"Accurate and interpretable Bayesian MARS for traffic flow prediction","volume":"15","author":"Xu","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lei, Y., Qiu, G., Zheng, L., and Huang, J. (2014). Fast Near-Duplicate Image Detection Using Uniform Randomized Trees. ACM Trans. Multimed. Comput. Commun. Appl., 10.","DOI":"10.1145\/2602186"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2035","DOI":"10.1007\/s00500-015-1902-3","article-title":"Flexible neural trees based early stage identification for IP traffic","volume":"21","author":"Chen","year":"2017","journal-title":"Soft Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Alajali, W., Zhou, W., and Wen, S. (2018, January 8\u201312). Traffic Flow Prediction for Road Intersections Safety. Proceedings of the 2nd IEEE International Conference on Smart City Innovations (IEEE SCI 2018), Guangzhou, China.","DOI":"10.1109\/SmartWorld.2018.00151"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"6164","DOI":"10.1016\/j.eswa.2008.07.069","article-title":"Online-SVR for short-term traffic flow prediction under typical and atypical traffic conditions","volume":"36","author":"Jeong","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TITS.2013.2267735","article-title":"Supervised weighting-online learning algorithm for short-term traffic flow prediction","volume":"14","author":"Jeong","year":"2013","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","article-title":"Significant permission identification for machine learning based android malware detection","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.cose.2017.11.012","article-title":"JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones","volume":"76","author":"Meng","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.cose.2017.11.013","article-title":"Twitter spam detection: Survey of new approaches and comparative Study","volume":"76","author":"Wu","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1007\/s00500-017-2487-9","article-title":"Finger vein secure biometric template generation based on deep learning","volume":"22","author":"Liu","year":"2018","journal-title":"Soft Comput."},{"key":"ref_39","first-page":"357","article-title":"Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis","volume":"53","author":"Yuan","year":"2017","journal-title":"CMC-Comput. Mater. Contin."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.010","article-title":"TouchWB: Touch behavioral user authentication based on web browsing on smartphones","volume":"117","author":"Meng","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/COMST.2016.2615098","article-title":"Identifying propagation sources in networks: State-of-the-art and comparative studies","volume":"19","author":"Jiang","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1109\/TC.2013.2295802","article-title":"A sword with two edges: Propagation studies on both positive and negative information in online social networks","volume":"64","author":"Wen","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/SURV.2013.100913.00195","article-title":"Modeling the propagation of worms in networks: A survey","volume":"16","author":"Wang","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., and Chen, K. (2017). Privacy-preserving outsourced classification in cloud computing. Clust. Comput.","DOI":"10.1007\/s10586-017-0849-9"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","article-title":"Multi-key privacy-preserving deep learning in cloud computing","volume":"74","author":"Li","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","article-title":"Secure attribute-based data sharing for resource-limited users in cloud computing","volume":"72","author":"Li","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Gao, C.Z., Cheng, Q., Li, X., and Xia, S.B. (2018). Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust. Comput.","DOI":"10.1007\/s10586-017-1649-y"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.future.2016.09.013","article-title":"Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks","volume":"68","author":"Luo","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.ins.2018.02.058","article-title":"Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack","volume":"444","author":"Gao","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_50","unstructured":"(2018, January 15). VicTraffic, Available online: https:\/\/traffic.vicroads.vic.gov.au\/."},{"key":"ref_51","unstructured":"(2018, January 15). Victorian Government Data Directory, Available online: https:\/\/www.data.vic.gov.au\/."},{"key":"ref_52","unstructured":"(2018, January 15). Scikit-learn. Available online: http:\/\/scikit-learn.org\/stable\/."},{"key":"ref_53","unstructured":"(2018, January 15). XGBoost. Available online: https:\/\/github.com\/dmlc\/xgboost."},{"key":"ref_54","unstructured":"(2018, January 15). Moa: Massive Online Analysis. Available online: https:\/\/moa.cms.waikato.ac.nz\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/9\/386\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:19:21Z","timestamp":1760195961000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/9\/386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,7]]},"references-count":54,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["sym10090386"],"URL":"https:\/\/doi.org\/10.3390\/sym10090386","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,7]]}}}