You are on page 1of 11

G Model

AAP-3927; No. of Pages 11 ARTICLE IN PRESS


Accident Analysis and Prevention xxx (2015) xxxxxx

Contents lists available at ScienceDirect

Accident Analysis and Prevention


journal homepage: www.elsevier.com/locate/aap

A Big-Data-based platform of workers behavior: Observations from


the eld
S.Y. Guo , L.Y. Ding, H.B. Luo, X.Y. Jiang
School of Civil Engineering and Mechanics and Institute of Construction Management, Huazhong University of Science and Technology, Wuhan, China

a r t i c l e i n f o a b s t r a c t

Article history: Behavior-Based Safety (BBS) has been used in construction to observe, analyze and modify workers
Received 28 June 2015 behavior. However, studies have identied that BBS has several limitations, which have hindered its
Received in revised form effective implementation. To mitigate the negative impact of BBS, this paper uses a case study approach
25 September 2015
to develop a Big-Data-based platform to classify, collect and store data about workers unsafe behav-
Accepted 29 September 2015
ior that is derived from a metro construction project. In developing the platform, three processes were
Available online xxx
undertaken: (1) a behavioral risk knowledge base was established; (2) images reecting workers unsafe
behavior were collected from intelligent video surveillance and mobile application; and (3) images with
Keywords:
Big Data
semantic information were stored via a Hadoop Distributed File System (HDFS). The platform was imple-
Behavior-Based Safety mented during the construction of the metro-system and it is demonstrated that it can effectively analyze
Behavior observation semantic information contained in images, automatically extract workers unsafe behavior and quickly
Intelligent video surveillance retrieve on HDFS as well. The research presented in this paper can enable construction organizations
Mobile application with the ability to visualize unsafe acts in real-time and further identify patterns of behavior that can
HDFS jeopardize safety outcomes.
2015 Elsevier Ltd. All rights reserved.

1. Introduction it has been dependent upon peoples observations; it can be a


time-consuming and an expensive process (Cameron and Duff,
The frequent occurrence of accidents cannot be ignored in con- 2007). Moreover, insufcient samples, particular the identica-
struction; most occur because of workers unsafe behavior (e.g. tion of common unsafe behaviors (Laitinen et al., 1999) and the
Heinrich et al., 1950; Lingard and Rowlinson, 2005). To the reduce passive participation of workers have contributed to its demise
incidents and improve safety management, it is therefore necessary (DePasquale and Geller, 2000; Han et al., 2011).
to focus attention on the unsafe behavior of workers (Choudhry, With this in mind, this paper proposes and implements a Big-
2012). Research undertaken by Lingard and Rowlinson (2005), for Data-based platform to identify patterns of unsafe behavior so that
example, has suggested that unsafe behavior can be controlled organizations can implement strategies and techniques to improve
by implementing a series of safety measures, and by the workers the safety of their construction sites. A behavioral risk knowledge
themselves. base is built to classify and code the observed behavior. Then, intel-
Behavior-Based Safety (BBS) is an approach that can be used to ligent video surveillance and a mobile application are used to collect
modify the behavior of people so that they undertake work more image data on site. Thus, large and complicated images from behav-
safely (Geller, 2001). As a result, BBS has been widely adopted ior observation can be transferred into specic information, which
by several industries (Chen and Tian, 2012), such as oil and gas can be recognized by machines, so as to guarantee the data can be
(e.g. Ismail et al., 2012), manufacturing (e.g. Yeow and Goomas, nally stored on Hadoop Distributed File System (HDFS).
2014; Nielsen et al., 2015), nuclear (e.g. Cox et al., 2004), and
construction (e.g. Lingard and Rowlinson, 1998; Li et al., 2015).
Yet while it has been effective in some instances (e.g. Krause et al., 2. Behavior Based Safety
1999; Yeow and Goomas, 2014), it still has widely criticized as
BBS or Applied Behavior Analysis (ABA) (e.g. Williams and
Geller, 2000), is derived from Skinners behavioral science the-
ory (Skinner, 1953) has been widely applied in construction to
Corresponding author. improve safety management on-site and better educated subcon-
E-mail address: gsy.yu@foxmail.com (S.Y. Guo). tractors (e.g. Lingard and Rowlinson, 1998; Chen and Tian, 2012;

http://dx.doi.org/10.1016/j.aap.2015.09.024
0001-4575/ 2015 Elsevier Ltd. All rights reserved.

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
2 S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx

Table 1
Camera function and its application in construction.

Function Functional explanation Application in construction

Intrusion detection Analyzing, positioning and tracking objects entering Workers enter into dangerous lifting area
prohibited area
Stay identication Tracking over-stayed objects in protected area Workers stay too long at the edge of the foundation pit
Reverse detection Monitoring objects moving against the rules Crane-driving and excavator-driving violators
Trafc analysis Numbering the amount of people entering into a monitoring None
area automatically
Congestion detection Identifying the congestion situation in monitoring area Cross operation in the same area when mounting and
dismounting scaffolding and formwork
Line-crossing detection Detecting objects crossing the warning line Workers cross dangerous area such as the edge of foundation
pit and the sides of the gangway, etc.
Departure identication Identifying people or objects leaving a given area No conductors guardianship in operating radius of working
excavator
Appearance identication Identifying people or objects entering into a given area in the Workers go up and down the foundation pit by establishing
picture (emphasize its sudden appearance but external channel in private
appearance)
Disappearance Identifying people or objects disappearing from a given area Workers dont replace the reghting apparatus after using it
identication suddenly
Objects-leaving Identifying remnants in given area Workers place material on steel support
identication
Objects-taking away An object in the picture is taken away Workers remove their helmets on worksite
identication
Scene-changing The angle of camera is turned, leading to change of scene None
identication

Note: As auxiliary functions, trafc analysis and identication of scene changes cannot indentify some kind of unsafe behaviors specically.

Han and Lee, 2013; Choudhry, 2014; Li et al., 2015). Noteworthy, extract value from very large volumes and a wide variety of data,
a detailed review of BBS in construction and its limitations can be by enabling high velocity capture, discovery, and/or analysis (Gantz
found in studies such as Zhang and Fang (2013) and Li et al. (2015). and Reinsel, 2011).
Essentially, however, BBS focuses on what workers do, analyzes In construction, a large number of workers behavioral data is
why they do it, and then applies a research-supported interven- generated on site every day, which is rarely, or not all used to exam-
tion technique to improve behavioral processes (Geller, 2005). BBS ine unsafe acts. According to Heinrichs (1950) for every 300 unsafe
intervention adds goal setting and/or feedback to alter response acts there are 29 minor injuries and 1 major injury: since this obser-
probability (e.g. DePasquale and Geller, 2000; Cameron and Duff, vation there has been limited empirical evidence that has been able
2007). As workers move toward a goal of safety compliance level, to observe and quantify repeated patterns of unsface behavior. If
the positive feedback they receive can contribute to improving unsafe acts through the observation process can be controlled, then
safety performance. The BBS process contains the following steps the potential for accidents can be signicantly reduced; behavior
(Geller, 2001): (1) unsafe behavior is listed, which requires close observation in this instance therefore becomes a valuable tool. With
attention on site; (2) workers unsafe behavior is observed and its this in mind, Big Data-based technologies can be used to observe,
frequency is recorded; (3) feedback is given and their unsafe behav- to collect and store image data reecting workers unsafe behavior.
ior is modied. Despite studies highlighting the limitations of BBS, The development of image recognition provides support for
it has also has been proven demonstrated as being an effective collecting unstructured data. Camera-based behavior analysis tech-
approach for improving safety management in construction (e.g. nology, for example, a branch of image recognition research, can
Geller, 2001; McSween, 2003; Turnbeaugh, 2010). For example, assist with the discovery of abnormal behavior and extract their
Krause et al. (1999) study that compared workers casualty gures feature images from video sequences. Several studies have exam-
from 73 companies over a ve year period, found that workgroups ined how video cameras can be used in construction (e.g. Chi and
that had been subjected to an intervention through BBS recorded Caldas, 2011). For example, the use of video monitoring system
fewer accidents. Yeow and Goomas (2014) proposed an outcome- was been found to contribute to the improvement of productiv-
and-Behavior-Based Safety incentive program (OBBSIP) to reduce ity and safety on construction site (e.g. Aguilar and Hewage, 2013;
accidents in a uid manufacturing plant, the results demonstrated Teizer et al., 2013). A functional of explanation and the application
the number of accident were signicantly reduced by 75% using of cameras in the construction can be seen in Table 1.
BBS. Camera technology has been utilized in transportation (e.g.
A pertinent issue observed by Lingard and Rowlinson (1998), Hu et al., 2014), commerce (e.g. Lablack and Djeraba, 2008) and
however, is that BBS is over reliant on workers observations and security (e.g. Ko, 2008). However the application of direct image
validation of unsafe behaviors. However, in many instances they are recognition has its limitations, such as sematic gap between low
unwilling to report their co-workers (Saba and Mohamed, 2008). level image features and high level semantics tends to exist (Zhang
Thus, a reliable and objective technique that can readily determine et al., 2012). To address limitation, the derived semantic informa-
unsafe behaviors is required to support BBS. tion extracted by people can be labelled so as to quickly understand
the expression of images. This is widely used in image retrieval (e.g.
3. Big Data and behavior observation Harmandas et al., 1997; Hu et al., 2003), as it can avoid analyzing
visual elements of images. Using a Java version of Google File Sys-
Big Data is capable of transforming the way in which organiza- tem (GFS) (Ghemawat et al., 2003), Hadoop Distributed File System
tions can visualize, function, and perform its routines and practices (HDFS) provides a distributed le system satisfying the demand of
(Mayer-Schnberger and Cukier, 2013). According to International huge amounts of data storage. It can potentially provide high reso-
Data Corporation (IDC), Big-Data describes a new generation of lution images of unsafe behaviors on-site, which can be produced
technologies and architectures that are designed to economically efciently.

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx 3

Data Classification and Coding Data Collection Data Storage

Expert
Expert Standard for Monitoring
Monitoring Mobile
Mobile Behavioral
Behavioral Risk
Risk
Accident
Accident Case
Case Experience
Experience Differentiating Work Video
Video Application
Application Visualization
Visualization

Behavior Analysis JHA&VSM


Safety
Safefty Standard
Standard
List
List ofof
Critical Video-capture Hadoop
Hadoop Distributed
Distributed File
File System
System
Critical Metro Construction Video-capture ofof Photographs
Photographs ofof
Unsafe Unsafe (HDFS)
(HDFS)
Unsafef WBS Unsafef Behavior
Behaviorr Unsafe
Unsafef Behavior
Behaviorr
Behavior
Behavior
Operating
Operating
Instruction
Instruction

Data Flow
Data
Data
Work Flow Source
Source

Data
Data Data Behavioral
Behavioral Risk
Risk Classification Structured Unstructured
Unstructured Data
Data Classififcation Behavioral
Behavioral Risk
Risk Recognition
Recognition Structured Data
Data Data
Storage
Storage and
and Coding
Coding
Data
Data
Types Process
Process
Types

Fig. 1. Big-Data-based platform for workers behavior observation.

3.1. A Big-Data-based platform semantic information, so behavioral risk visualization can be real-
ized.
To overcome the limitations of traditional behavior observation,
a Big-Data-based platform is developed using an array of advanced 4. Research approach
technologies. The Big-Data platform is presented in Fig. 1 and com-
prises of three parts. To test and determine the effectiveness of the developed Big-
Data classication: Critical unsafe behavior is listed from safety Data-based platform, a case study approach (Yin, 2013) was
standards, operating instructions, accident cases and expert expe- adopted. The selected case for this study is a underground metro
rience. Combined with a Work Breakdown Structure (WBS) constuction project that is being undertaken in Wuhan (Hubei
classication standards, workers unsafe behavior during construc- Province) China. Wuhan is the fth largest city in China with
tion are classied and encoded. a population of approximately 10.4 million in 2015. As a result
Data collection: Data derived from images is collected through of increasing trafc congestion and population and the need to
intelligent monitoring videos and photographs taken by site man- improve transportation infrastructure, the city has developed a
agers (or workers). Video capture of unsafe behavior is recognized strategy to increase the length of its underground metro system.
and recorded by camera-based behavior analysis technology. This For this project 15 stations and 8 tunnels from two lines (Line 3
technology can obtain data automatically by recognizing abnor- and 6) were selected as data was made readily available from the
mal behaviors and extracting images from surveillance videos; the company responsible with constructing these metro lines.
extraction of which marries with the way in Big Data is collected.
Photographs of unsafe behavior are then matched with unsafe acts 4.1. Data classication and coding
in the knowledge database by means of Job Hazard Analysis (JHA)
and Vector Space Model (VSM). JHA is a process of identifying The primary task of BBS is to conrm the checklist of unsafe
potential hazards for each step of an activity and proposing safety behavior, which is the basis for its observation. Choudhry (2014)
rules to prevent potential incidents related to these hazards (Wang dened ve different types of unsafe behavior: (1) personal pro-
and Boukamp, 2011), so as to determine factors that can inuence tective equipment (PPE), (2) housekeeping, (3) access to heights,
unsafe behavior. In addition, VSM can transfer the analysis of texts (4) plant and equipment, and (5) scaffolding. Similarly, Han and
into the calculation of vectors and express the semantic similarity Lee (2013) identied unsafe behavior using achecklist which
with spatial similarity (Salton et al., 1975). So keywords reecting was derived from OSHA accident statistics. In the case of the
these factors, which are included in observers description, can be metro construction project, workers unsafe behavior were clas-
recognized by the mobile application. At this point, it is envisaged sied into different types according to safety standards, operating
that behavioral risk recognition is realized. instructions, accident cases and expert experience. The projects
Data storage: Collected multi-source isomerous data (structured established WBS, was encoded to form the behavioral risk knowl-
data and unstructured data) is stored by HDFS; it is designed to edge base.
store very large data sets reliably, and to stream those data sets Several safety standards and operating instructions in China
at high bandwidth to user applications (Shvachko et al., 2010). were used as references to list partial unsafe behavior, such as
Recorded images of unsafe behavior are marked by complete Standard for Construction Safety Assessment of Metro Engineering

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
4 S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx

Table 2
Example of the lifting classication for unsafe behavior.

Name Code Possible injury Affecting factors

Whether the weight of suspended objects 001 Crane accident Action: lifting
exceed machines rated load is not Object-worked-on: heavy object
veried Location: none
Resource: crane
Nearby object: none
Nearby action: none

Transporting workers by hanging object 002 High falling Action: lifting


Object-worked-on: worker
Location: none
Resource: crane
Nearby object: none
Nearby action: none

Placing other oating objects on the 003 Object striking Action: lifting
hanging object Object-worked-on: oating object
Location: none
Resource: crane
Nearby object: none
Nearby action: none

Lifting combustible and explosive goods 004 Explosion Action: lifting


such as oxygen bottles without safety Object-worked-on: explosives
measures Location: none
Resource: crane
Nearby object: none
Nearby action: none

Lifting objects underground without 005 Crane accident Action: lifting


verifying the situation Object-worked-on: objects underground
Location: none
Resource: crane
Nearby object: none
Nearby action: none

Not taking warning during lifting, 006 Object strikes Action: lifting
unwanted workers get into the Object-worked-on: object
dangerous areas Location: none
Resource: crane
Nearby object: worker
Nearby action: none

The main hook and auxiliary hook work 007 Crane accident Action: lifting
simultaneously when operating a crane Object-worked-on: object
Location: none
Resource: main and auxiliary hook
Nearby object: none
Nearby action: none

Walking with objects which are 500 mm 008 Crane accident Action: walking with objects
above the ground Object-worked-on: object
Location: none
Resource: crane
Nearby object: none
Nearby action: none

(GB 50715-2011) and Quality and Safety Check Points of Urban Rail From the datasources presented above, a total of 522 unsafe
Transit Engineering (2011) as laws and regulations must be adhered behaviors were identied and classied into themes: re ght-
to. In addition, records of 1731 accidents as as a result of work- ing (01), scaffolding (02), foundation pit supporting (03), formwork
ers unsafe behaviors were gleaned from government records from engineering (04), tunnel construction by shield method (05), tunnel
2008 to 2014 were examined to identify common recurring unsafe construction by mining method (06), safety protection (07), tower
acts. After analysing accident mechanisms, workers unsafe behav- crane (08), gantry crane (09), building material elevator (10), lift-
ior were extracted and used to develop a checklist. For instance, ing (11), construction equipment (12), construction in tunnel track
a safety accident occured during the construction of the Kunming area (13), manual hole digging pile (14), blasting (15), construc-
(Yunnan province) metro line 2 in August 2011, whereby a worker tion of electricity (16). An example of the partial unsafe behavior
inhailed unknown harmful gases; this led to a fatality and two peo- of lifting classication is presented in Table 2.
ple being critically injured. The unsafe behavior exacted in this In the case of the metro-system construction work is catogerised
instance was in the process of munual insertion of pile founda- in accordance with that advocated by Standard for Differentiating
tion, workers do not check whether there are harmful gases before Unit Work, Division Work and Subdivision Work of Rail Transportation
they begin to work. To complement the data derived from the (QGD-004-2005) as: (1) unit work; (2) subunit work; (3) division
government and safety reports derived from the metro project, work; (4) subdivision work; (5) subentry work. The partial WBS
common unsafe beahviors from safety management data (daily for a metro station is presented in Fig. 2. A typical metro station
safety check documents) on 98 construction sites from Shenyang, contains six subunit works. Specically, the main structure con-
Wuhan, Zhengzhou, and Shenzhen were also collected. struction of open-cut metro station includes three division works:

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx 5

Metro
Metro Station
Station
Construction
Construction
01
01

Main
Main Structure
Structure Outdoor
Outdoor Building
Building
Construction
Construction of
of Open-
Open-
Environment
Environment
Cut
Cut Metro
Metro Station
Station 06
06
01
01

Foundation
Foundation Waterproof
Waterproof Main
Main Structure
Structure
Enclosure and
Enclosure and Engineering
Engineering 03
03
Treatment
Treatment 01
01 02
02

Foundation
Foundation Foundation
Foundation
Earthwork
Earthwork
Enclosure
Enclosure Treatment
Treatment
02
02
01
01 03
03

Precipitation
Precipitation and
and Earth
Earth Excavation
Excavation Support
Support Erection
Erection Earth
Earth Backfill
Backfi
f ll
Drainage
Drainage 002
002 003
003 004
004
001
001

Fig. 2. The partial WBS of unit work of metro station.

foundation enclosure and treatment, waterproof engineering and according to preset rules and then, images with sematic informa-
main structure, foundation enclosure. Foundation enclosure and tion upload promptly to the storage system.
treatment includes three subdivision works: foundation enclo-
sure, earthwork and foundation treatment. Earthwork includes
4.2.2. A mobile application taking on-site photographs
four subentry works: precipitation and drainage, earth excavation,
Besides intelligent video surveillance, additional methods are
support erection and earth backll. By this way, work tasks are
needed to collect data. During daily safety checks, managers iden-
subdivided in metro construction.
tify potential safety risks by taking photographs. Some of these
Classied unsafe behavior is encoded by the following rule:
photographs may identify workers unsafe acts, but they only
XX-XX-XX-XX-XXX-XX-XXX (unit work-subunit work-division work-
reect individuals observations and may be misinterpreted others.
subdivision work-subentry work-behavior type-unsafe behavior). For
Therefore, the mechanism to determine workers unsafe behavior
instance, the unsafe behavior Not taking warning during lifting,
from on-site photographs requires an in-built intelligence function
unwanted workers get into the dangerous areas arose during the
that is able to ascertain semantics to comrm the inappropriate
earth excavation using an open-cut method is recorded in 01-01-
behaviors.
01-02-002-11-006. Behavioral risk knowledge base is formed by
Workers unsafe behavior may arise in different phases of con-
coding items to conduct behavior observation.
struction (Goh and Chua, 2009). Thus in alignment with BBS,
to identify unsafe behaviors the following steps are undertaken:
4.2. Data collection (1) determining workers action(s); (2) determining object(s) and
resource(s) undertaken during work activities; (3) identifying
4.2.1. Intelligent video surveillance location(s) of work. Factors extracted include action(s), object(s)-
The video surveillance process is automated, but its use requires worked-on, resource(s), location(s), nearby object(s) and nearby
extensive human intervention for analyzing and monitoring its action(s). Thus, to describe workers unsafe behavior, the following
result; intelligence is required to automate this task. The core semantic structure is used (Goh and Chua, 2009): Action(s) exe-
of intelligent video surveillance is camera-based behavior anal- cuted on object(s)-worked-on using resource(s) at location(s) with
ysis technology. This technology usually contains motion/object nearby object(s) and nearby action(s). Fig. 4 illustrates the unsafe
detection, object classication, object tracking, behavior and activ- behavior of workers undertaking the activity of welding next to
ity analysis and understanding, person identication, and camera an excavator that is in operation. Here the semantic structure is
handoff and data fusion (Brmond et al., 2006). Thus, workers par- Digging (action) executed on soil (object-worked-on), using excava-
tial unsafe behavior can be recognized automatically from images tor (resource) in the excavation pit (location) with workers (nearby
taken by cameras. The process of camera-based behavior analysis object) doing welding work (nearby action)., so the potential safety
involves the following steps: (1) behavior analysis function of the risk brought by this behavior can be clearly seen.
camera is selected; (2) abnormal cases (unsafe behavior) is dened; Training observers (i.e. site managers or workers) are asked to
(3) observation areas on the worksite are debugged; (4) workers describe collected photographs in accordance with the semantic
unsafe behavior is tracked; (5) multiple-frame images are exacted. structure identied above. Then affecting factors are extracted from
The behavior observation system for metro construction work- the text and semantic information is labelled on each photograph.
ers has been developed based on the intelligent video surveillance All of the 522 unsafe behaviors are dened according to the
(Fig. 3). Its hardware environment consists of a Webcam, Power proposed semantic structure. The steps to undertaken via the VSM
Over Ethemet (POE) module and Switch, while its software environ- process are: (1) all the keywords contained in the listed 522 unsafe
ment consists of camera-based behavior analysis technology. The behaviors can be viewed as a document vector space. The fourth
system identies workers unsafe behavior captured by webcams column of Table 2 identies several keywords extracted from the

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
6 S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx

Fig. 3. The composition of intelligent video surveillance.

input (voice input method considers workers educational level).


The voice-recognition technology is used to transfer voice infor-
mation into written messages. After the observed photograph is
matched with one of the listed unsafe behaviors, its correspond-
ing code is determined according to current construction progress.
Then the photograph is uploaded with semantic information to the
storage system.

4.3. Data storage

To meet the demand for storing large amounts of behavior data,


Fig. 4. An example of photograph analysis. HDFS is used to store data from intelligent video surveillance and
the mobile application, behavioral risk knowledge base, schedule
unsafe acts; (2) the weight of each keyword is calculated by TF-IDF management information and semantic information of identied
method. A detailed description of TF-IDF method can be found in images (Fig. 5).
Salton and Buckley (1988); (3) document vectors of listed unsafe Intelligent video surveillance and mobile application include
behavior from behavioral risk knowledge base are determined; (4) unstructured (video screenshot and site photograph) and struc-
query vector of keywords exacted from photograph description are tured data (e.g. time and location). The behavioral risk knowledge
determined; (5) the photograph is matched with the right unsafe base contains a list of unsafe behaviors and the WBS from the
behavior by calculating the angles between the query vector and metro construction. Schedule management information is struc-
different document vectors by means of the Cosine Law. The doc- tured data and includes the actual project progress. The semantic
ument vector of listed unsafe behavior k and the query vector of information of identied images contains structured data listed as
observers photograph description l in the vector space are shown unsafe behavior, behavior type, possible injury and code, which are
as:




V = W1 , W2 , . . ., Wi , Wi+1 , . . ., Wj , Wj+1 , . . ., Wk , Wk+1 , . . ., Wl , Wl+1 , . . ., Wm , Wm+1 , . . ., Wn (1)

          

i j k l m n

V (dk ) = W1 , W2 , . . ., WN (2)
abstracted from behavioral risk knowledge base. In addition, the
 time to obtain these images links with the data of the actual
queryVectorl = W1 , W2 , . . ., WN (3)
progress, so the current phase in the WBS can be made explicit.
i n means the component vectors of the six affecting factors in
the vector space, V (dk ) means the corresponding vector of listed 4.3.1. Process for data storage
unsafe behavior k, queryVectorl means the corresponding query HDFS adopts the master-slave structure, with the NameNode
vector of observers photograph description l, N means the Nth key- as the master node and the DataNode as the slave node, one
word of vector space. Eq. (4) is the formula of the Cosine Law. By NameNode can manipulate several DataNodes. The role of the
calculating, the larger cosine between query and document vector, NameNode is to store the meta data information in the HDFS
the higher similarity between an observers photograph description and manage the block information in the DataNodes. The Meta
and listed unsafe behavior can be determined. data information includes attribute information (the name of image
  les, the collection time, location, the collector and the weather)
queryVectorl , dk
cos(queryVectorl , dk ) =    (4) and le directory derived from the behavioral risk knowledge base.
 queryVectorl   dk 
Due to the default block size of the HDFS, which is designed to store
  large les at 64 M, the data of unsafe behavior images may merge to
Therein, queryVectorl , dk means inner product of the
  data blocks in 64 M. Thus the block information needs to be stored
queryVectorl and dk ,  queryVectorl  means mold of the
  in the NameNode. The DataNode is used to store the data blocks
queryVectorl ,  dk  means mold of the dk . and offer service to the client.
Ranking the possible matched unsafe behavior with their cosine Every DataNode stores a couple of data blocks. The client
value from large to small, after the given query vector is identi- includes the ports of uploading and retrieving. The NameNode will
ed, and enables each document vector to be calculated. The largest allocate free DataNodes, calling data blocks to store these struc-
value that is calculated identies the unsafe behavior. The mobile tured and unstructured data, after the gathered unsafe behavior
application provides two input forms: (1) voice and (2) character images with complete semantic information have been entered

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx 7

Fig. 5. The framework of data sources and storage in HDFS.

into the uploading ports. When a user needs to query the data the dangerous areas, the following examples are presented using
stored, the rst step is to obtain the meta data conforming to the the intelligent video surveillance and mobile application.
query conditions in the NameNode from the retrieving port, and Fig. 6 illustrates the application of intelligent video surveillance
then read image data with complete semantic information from at the Shuangdun Station on metro line 3. Fig. 6(a) denotes the
the data blocks in the DataNode. The NameNode maintains the webcam as the front data acquisition equipment; Fig. 6(b) identi-
mapping information between the DataNode and the data block. ed the spot of POE module and the switches, so as to guarantee
The HDFS guarantees the normal use of the stored data by using a the data transmission and electric power supply. After the camera
disaster tolerance. The default backup factor of the HDFS is 3; for is directed at the lifting area, the system backstage is set (Fig. 6c).
every data block, in addition to this DataNode, another DataNode The behavior analysis engine of the camera is adjusted to the intru-
in this frame, and a DataNode in another frame will retain copies sion detection function; the ruled case is dened as unsafe behavior
of the data block. When the DataNode is in outage, tasks can be above and pre-dened dangerous areas (the red circle position)
distributed to data blocks in other DataNodes. within the scope of monitor. Fig. 6(d) identies the process there-
after that the system recognized workers entry into dangerous
5. Implementation areas automatically and exacted multi-photographs by observing
workers motion.
Metro construction in Wuhan is experiencing a period of In Fig. 7 the collection process of the photographs reecting
rapid development; eight lines are being constructed simulta- the same unsafe behavior via the mobile application is denoted.
neously, workers on site are subjected to a dynamic and changing Fig. 7(a) identies the observer takes the photograph reecting this
work environment that is exacerbated by complex geological and unsafe behavior; Fig. 7(b) presents a description process is inputted
hydrological conditions. The schedule demands being placed upon voice or typing characters.
workers juxtaposed with the work environment provides a situ- The description of the photograph above was Lifting executed
ation where unsafe behaviors are likely to occur due to prevailing on object using crane at the foundation side with worker nearby,
demands and constraints. To demonstrate a possible unsafe behav- with the factors being extracted were lifting, object, foundation
ior Not taking warning during lifting, unwanted workers get into side, crane and worker.

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
8 S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx

Table 3
The computed result about the weight of vectors and Cosine value.

queryVector d1 d2 d3 d4 d5 d6 d7 d8

The weight of the 1st component 0.5713 0.9522 0.9522 0.9522 0.9522 0.9522 0.7141 0.9522 0
The weight of the 2nd component 0.6970 0 0 0 0 0 0.8713 1.1617 1.1617
The weight of the 3rd component 0.5924 0 0 0 0 0 0 0 0
The weight of the 4th component 0.5781 0.9635 0.9635 0.9635 0.9635 0.9635 0.7226 0 0.9635
The weight of the 5th component 0.0206 0 0 0 0 0 0.0257 0 0
The weight of the 6th component 0 0 0 0 0 0 0 0 0
Cosine value 0.6642 0.6642 0.6642 0.6642 0.6642 0.8751 0.7032 0.7399

The value of the best match is given in bold.

Fig. 7. The interface design of the mobile application.

The query vector of this description is dened by calculating


the corresponding weights of each keyword by means of TF-IDF.
Document vectors of unsafe behavior in Table 1 were respectively
supposed as d1 d8 , then its components in six dimensions
were calculated. So the similarity of documents is judged by
their cosine value. The computed result presented in Table 3 is
cos(queryVector, d6 ) = 0.8751, which is the maximum. Therefore,
the best match is d6 named Not taking warning during lifting,
unwanted workers get into the dangerous areas. In addition, the
analysis of the other 514 unsafe behaviors via mobile application
provided a similar conclusion.
With complete semantic information, images collected using
intelligent video surveillance and a mobile application the infor-
mation obtained can be stored in the HDFS. To search and retrieve
information from the HDFS is a straightforward process. For exam-
ple, Fig. 8 illustrates the HDFS interface. Here in Fig. 8a the search
area can lter data according to different limitations such as time,
location, weather, collector, image type (video screenshot or site
photograph), behavior type (matched unsafe behavior) and possi-
ble injury. In Fig. 8b data is searched according to the limitations.
For example, under the limitation of time-9th October it can be
seen that there were a total of 23,867 images, but only 2197 of
them were effectively exacted because of unavoidable informa-
tion loss in the process of uploading and storage. In Fig. 8(c) the
limitation of behavior type is added by lifting. Behavior data can
be retrieved with complete semantic information, including iden-
tication (ID), time, image, collector, source, location, description
(in voice or characters only contained in on-site photographs col-
Fig. 6. The application of intelligent video surveillance on site. lected by the mobile application), unsafe behavior, behavior type

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx 9

Fig. 8. The interface of HDFS.

and possible injury. As a result, the visualization of behavior risk is (1) The development of behavioral risk knowledge base is a novel
realized. idea for construction. It can not only be used as a reference
for behavior observation, but also as a tool to proactively man-
6. Enabling BBS by a Big-Data-based platform age safety site. More specically, when combined with a WBS,
workers unsafe behavior can be dynamically classied and
Observation is an integrated function of BBS, however, as noted coded when the construction stage changes.
above this activity can lead to subjective and bias decisions being (2) Methods for effectively collecting data are improved. Dif-
made. To improve its effectiveness, a Big-Data-based platform is ferent ways of monitoring usage can be realized by using
developed. The contribution of this platform is threefold: camera behavior analysis technology to observe unsafe acts

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
10 S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx

and determine by pre-set rules. In this instance, machines reecting workers unsafe behavior with complete semantic infor-
replace manual observation, to solve time-consuming prob- mation. The number of images reecting unsafe acts exacted from
lems and labor-intensive activities previously undertaken. The intelligent surveillance video is signicantly higher than from the
mobile application was developed to facilitate the capturing of on-site photographs. Though with the accumulation of such data,
the photographs during manual observation, to improve data cannot guarantee the complete collection of workers unsafe behav-
sparseness of intelligent video surveillance and ensure suf- ior.
cient samples of behavioral data. JHA and VSM are used as The developed platform has used advanced technologies to
effective methods to determine the unsafe behavior in accord ensure the use of Big Data can be used by other construction
with photographs. projects in China. With the collection of more data, workers behav-
(3) The behavioral data storage by HDFS improves the operating ioral patterns can be identied so as to lay good foundation for
efciency of developed platform, and ensures fast reading and behavior modication in future research.
writing of data services so as to guarantee retrieval of behavioral
data for managers to make timely decisions. Thus unsafe acts
Acknowledgements
can be visualized in real-time.
The presented work has been supported by the National Science
However, several limitations exist and thus need to be acknowl- Foundation of China (NSFC) through grant 71471072. The authors
edged. For camera-based behavior analysis technology, a single gratefully acknowledge NSFCs support. The authors would also
camera over a period of time only recognizes a specic kind like to thank Wuhan Metro Group Co., Ltd. and Wuhan Municipal
of unsafe behavior, so different periods of construction need to Construction Group Co., Ltd. for supporting this study. The authors
change preset rules frequently. JHA and VSM are used to match would like to thank the three anonymous reviewers for their con-
photographs description with the corresponding unsafe behav- structive and helpful comments.
ior. However, since the language usage of individuals can differ,
dening the photograph description may confuse observers cog-
References
nitive conditioning to a certain behavior. While this platform can
assist with the collection and storage of workers behavioral data Aguilar, G.E., Hewage, K.N., 2013. IT based system for construction safety
observed from the eld, it ignores internal factors, such as emo- management and monitoring: C-RTICS 2. Autom. Constr. 35, 217228.
tions, attitudes and mood states, which can also inuence an Beijing MTR Construction Administration Corporation, 2005. Standard for
Differentiating Unit Work, Division Work and Subdivision Work of Rail
individuals behavior. Transportation, Retrieved from: http://wenku.baidu.com/view/
Future research should consider how a single camera can iden- 1acc38134431b90d6c85c7dc.html?re=view.
tify a variety of unsafe behaviors and the integration with motion Brmond, F., Thonnat, M., Zniga, M., 2006. Video-understanding framework for
automatic behavior recognition. Behav. Res. Methods 38 (3), 416426.
perception technology that can automatically determine more Cameron, I., Duff, R., 2007. A critical review of safety initiatives using goal setting
types of unsafe acts. Also, a synonyms library should be built to and feedback. Constr. Manag. Econ. 25 (5), 495508.
eliminate data omissions caused by different words with synony- Chen, D., Tian, H., 2012. Behavior based safety for accidents prevention and
positive study in china construction project. Proc. Eng. 43, 528534.
mous meanings. In contrast to BBS, People-Based Safety (PBS) goes
Chi, S., Caldas, C.H., 2011. Automated object identication using optical video
beyond observable behavior to address the human dynamics of cameras on construction sites. Comput.-Aided Civil Infrastruct. Eng. 26 (5),
workplace safety. Thus data collection should not only be derived 368380.
Choudhry, R.M., 2012. Implementation of BBS and the impact of site-level
from observations on site, but also from questionnaires and inter-
commitment. J. Prof. Issues Eng. Educ. Pract. 138 (4), 296304.
views to obtain a better understanding of unobservable factors such Choudhry, R.M., 2014. Behavior-based safety on construction sites: a case study.
as peoples emotions, and cognitive disposition. Accid. Anal. Prevent. 70, 1423.
Cox, S., Jones, B., Rycraft, H., 2004. Behavioural approaches to safety management
within UK reactor plants. Saf. Sci. 42 (9), 825839.
DePasquale, J.P., Geller, E.S., 2000. Critical success factors for behavior-based safety:
7. Conclusion
a study of twenty industry-wide applications. J. Saf. Res. 30 (4), 237249.
Gantz, J., Reinsel, D., 2011. Extracting value from chaos. IDC iView, 112.
People are the main participants of construction; their behav- Geller, E.S., 2001. Keys to Behavior-based Safety. Government Institutes.
Geller, E.S., 2005. Behavior-based safety and occupational risk management.
ioral safety needs to be given utmost attention to reduce the
Behav. Modif. 29 (3), 539561.
rate of accidents and incidents. BBS is an effective approach to Ghemawat, S., Gobioff, H., Leung, S.T., 2003. The google le system. SIGOPS Oper.
decrease workers unsafe behavior, through this has been predomi- Syst. Rev. 37 (5), 2943.
nantly undertaken using observation. By combining the traditional Goh, Y.M., Chua, D.K.H., 2009. Case-based reasoning for construction hazard
identication: case representation and retrieval. J. Constr. Eng. Manag. ASCE
behavior observation with advanced technologies, a Big-Data- 135 (11), 11811189.
based platform for workers behavior observation was developed Han, S., Lee, S., 2013. A vision-based motion capture and recognition framework
to overcome the limitations associated with traditional BBS. The for behavior-based safety management. Autom. Constr. 35, 131141.
Han, S., Lee, S., Pena-Mora, F., 2011. Application of dimension reduction techniques
behavioral risk knowledge base was formed, which can provide for motion recognition: construction worker behavior monitoring. In:
the basis of behavior observation to eliminate the misunderstand- Proceedings of the 2011 ASCE International Workshop on Computing in Civil
ing of the same behavior with different observers. Intelligence Engineering, pp. 1922.
Harmandas, V., Sanderson, M., Dunlop, M.D., 1997. Image retrieval by hypertext
video surveillance and a mobile application are both used to links. In: Proceedings of the ACM SIGIR Forum, pp. 296303.
collect workers unsafe behavior; data acquisition is more compre- Heinrich, H.W., Petersen, D., Roos, N., 1950. Industrial Accident Prevention.
hensive and convenient when these technologies are used. They McGraw-Hill, New York.
Hu, B., Dasmahapatra, S., Lewis, P., Shadbolt, N., 2003. Ontology-based medical
provide the possibility to further analyze workers unsafe behavior,
image annotation with description logics. In: Proceedings of the Tools with
and are more intuitive as they are expressed by visual language. Articial Intelligence in 15th IEEE International Conference, pp. 7782.
Moreover, HDFS provides a solution with characteristics of high Hu, H.Y., Qu, Z.W., Li, Z.H., 2014. Multi-level trajectory learning for trafc behavior
detection and analysis. J. Chin. Inst. Eng. 37 (8), 9951006.
fault-tolerance and high throughput to solve data storage issues
Ismail, F., Hashim, A.E., Zuriea, W., Ismail, W., Kamarudin, H., Baharom, Z.A., 2012.
that may arise from using Big Data. Behaviour based approach for quality and safety environment improvement:
The developed platform has been applied during the con- Malaysian experience in the oil and gas industry. Proc.-Soc. Behav. Sci. 35,
struction of a metro project. The data collected by intelligent 586594.
Ko, T., 2008. A survey on behavior analysis in video surveillance for homeland
video surveillance and mobile applications in daily observations security applications. In: Proceedings of 37th IEEE Applied Imagery Pattern
amounted to over 300GB, containing over 150.000 of image data Recognition Workshop, New York, pp. 8491.

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024
G Model
AAP-3927; No. of Pages 11 ARTICLE IN PRESS
S.Y. Guo et al. / Accident Analysis and Prevention xxx (2015) xxxxxx 11

Krause, T., Seymour, K., Sloat, K., 1999. Long-term evaluation of a behavior-based Saba, F., Mohamed, Y., 2008. Implementing incident prevention (leading
method for improving safety performance: a meta-analysis of 73 interrupted indicators) program in an industrial construction company. In: Proceedings of
time-series replications. Saf. Sci. 32 (1), 118. the Congres Annuel, pp. 1013.
Lablack, A., Djeraba, C., 2008. Analysis of human behaviour in front of a target Salton, G., Buckley, C., 1988. Term-weighting approaches in automatic text
scene. In: Proceedings of 19th International Conference on Pattern retrieval. Inform. Process. Manag. 24 (5), 513523.
Recognition, New York, pp. 38313834. Salton, G., Wong, A., Yang, C.-S., 1975. A vector space model for automatic
Laitinen, H., Marjamki, M., Pivrinta, K., 1999. The validity of the TR safety indexing. Commun. ACM 18 (11), 613620.
observation method on building construction. Accid. Anal. Prevent. 31 (5), Shvachko, K., Kuang, H., Radia, S., Chansler, R., 2010. The hadoop distributed le
463472. system. In: Proceeding of 26th IEEE Mass Storage Systems and Technologies
Li, H., Lu, M., Hsu, S.-C., Gray, M., Huang, T., 2015. Proactive behavior-based safety (MSST) Symposium, Incline Village, pp. 110.
management for construction safety improvement. Saf. Sci. 75, Skinner, B.F., 1953. Science and Human Behavior. Simon and Schuster.
107117. Teizer, J., Cheng, T., Fang, Y., 2013. Location tracking and data visualization
Lingard, H., Rowlinson, S., 1998. Behavior-based safety management in Hong technology to advance construction ironworkers education and training in
Kongs construction industry. J. Saf. Res. 28 (4), 243256. safety and productivity. Autom. Constr. 35, 5368.
Lingard, H., Rowlinson, S.M., 2005. Occupational Health and Safety in Construction Turnbeaugh, T.M., 2010. Improving business outcomes: behavior-based safety
Project Management. Taylor & Francis. techniques can inuence organizational performance. Prof. Saf. 55 (3), 4149.
Mayer-Schnberger, V., Cukier, K., 2013. Big Data: A Revolution that will Transform Wang, H.H., Boukamp, F., 2011. Ontology-based representation and reasoning
How We Live, Work, and Think. Houghton Mifin Harcourt. framework for supporting job hazard analysis. J. Comput. Civil Eng. 25 (6),
McSween, T.E., 2003. Values-based Safety Process: Improving Your Safety Culture 442456.
with Behavior-based Safety. John Wiley and Sons. Williams, J.H., Geller, E.S., 2000. Behavior-based intervention for occupational
Ministry of Housing and Urban-Rural Development of the Peoples Republic of safety: critical impact of social comparison feedback. J. Saf. Res. 31 (3),
China, 2011a. Quality and Safety Check Points of Urban Rail Transit 135142.
Engineering, Retrieved from: http://www.zgjsjl.org.cn/uploadle/2011 12/ Yeow, P.H.P., Goomas, D.T., 2014. Outcome-and-behavior-based safety incentive
temp 11121215128737.pdf. program to reduce accidents: a case study of a uid manufacturing plant. Saf.
Ministry of Housing and Urban-Rural Development of the Peoples Republic of Sci. 70, 429437.
China, 2011b. Standard for Construction Safety Assessment of Metro Yin, R.K., 2013. Case Study Research: Design and Methods. SAGE Publications.
Engineering (GB 50715-2011), Retrieved from: http://www.spsp.gov.cn/page/ Zhang, D., Islam, M.M., Lu, G., 2012. A review on automatic image annotation
CN/2011/GB%2050715-2011.shtml. techniques. Pattern Recognit. 45 (1), 346362.
Nielsen, K.J., Kines, P., Pedersen, L.M., Andersen, L., Andersen, D.R., 2015. A Zhang, M.Z., Fang, D.P., 2013. A continuous behavior-based safety strategy for
multi-case study of the implementation of an integrated approach to safety in persistent safety improvement in construction industry. Autom. Constr. 34,
small enterprises. Saf. Sci. 71, 142150. 101107.

Please cite this article in press as: Guo, S.Y., et al., A Big-Data-based platform of workers behavior: Observations from the eld. Accid.
Anal. Prev. (2015), http://dx.doi.org/10.1016/j.aap.2015.09.024

You might also like