SlideShare une entreprise Scribd logo
1  sur  25
A Framework for Energy Efficient Mobile Sensing
for Automatic User State Recognition
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn A. Jacobson,
Jason Hong, Bhaskar Krishnamachari and Norman Sadeh
OUTLINE
 Motivation
 EEMSS introduction
 System modules
 Case implementation
 Performance evaluation
 Conclusion
PEOPLE-CENTRIC MOBILE SENSING
 Health monitoring
 Keeping track of patients/elders
 Social networking
 Automated “Twittering”
 Automated profile updates
 Ringtone adjustment
 Location based services
 Mobile advertising
CHALLENGE: LIMITED BATTERY
 Battery capacity of mobile device is low
 Sensors are main source of energy usage
 Blind sensing drains battery soon
 Need intelligent sensor management
 Energy Efficient Mobile Sensing System
(EEMSS) is important
 Possibly trade some detection accuracy for
much longer device lifetime
AN EXAMPLE
Office Library
SENSOR MANAGEMENT METHODOLOGY
 Only utilize a minimum set of sensors
 Recognize state & detect state transition
 E.g.: No need for GPS when indoor
 Hierarchical management
 Sensors are activated when necessary
 E.g.: Accelerometer -> WiFi scan -> GPS
 If multiple sensors achieve the same task:
Use energy efficient ones
 How to determine sensor energy efficiency?
DETERMINE ENERGY EFFICIENCY
 Energy = Power drain × Operating duration
 Sensor power consumptions on N95 devices:
 Keep an eye on sensor operating duration
EEMSS SYSTEM ARCHITECTURE
USER STATE DESCRIPTION
 Task 1: Identify the states to be detected
 Working/meeting/walking/driving outdoor …
 Task 2: For each state define entry criteria
 Sensing thresholds from one or more sensors
 E.g.: “Outdoor” + “High travel speed” = “Vehicle”
 A state is entered when the criteria are
satisfied
 Task 3: For each state also specify the
necessary sensors to be monitored
 Detect state transition
XML BASED STATE DESCRIPTOR
DESIGN BENIFITS
 Scalable
 Add or remove a state upon user’s interest
 Different criteria for different individuals
 Real-time update
 User’s habits may change
 Sensing criteria can to be refined in real-time
CLASSIFICATION MODULE
 Classification algorithms are the key to high
state recognition accuracy
 Mobile phone is the only sensing resource
 Capability limitations
 Computing issues
 Real-time
 Computing power
REAL-TIME AUDIO RECOGNITION
 Based on microphone
sensing
 Focus on the detection of
speech
 Audio features
 Energy
 Silence ratio
 SSCH peak1
 3 outputs:
 Speech
 Loud/Noisy
 Silent
1 B. Gajic and K.K. Paliwal. “Robust speech
recognition in noisy environments based on
subband spectral centroid histograms”
SPEECH DETECTION PERFORMANCE
 Algorithm is tested on 1085 speech clips
 91.14 % are classified as speech
 Complexity of algorithm is O(N2)
 N: Number of frequency samples
 Overall processing time of a 4 seconds
sound clip on N95
 ~10 seconds
EEMSS CASE IMPLEMENTATION
 Implemented and tested on Nokia N95
 Sensors operated include:
 Accelerometer, Microphone, WiFi detector, and
GPS
 User states are featured by:
 Location, background sound, and user motion
information
 E.g.: “office + quiet + still” => User working in office
STATES INTERESTED
State Name State Features Sensors Monitored
Location Motion Background Sound
Working Office Still Quiet Accelerometer, Microphone
Meeting Office Still Speech Accelerometer, Microphone
Office_loud Office Still Loud Accelerometer, Microphone
Resting Home Still Quiet Accelerometer, Microphone
Home_talking Home Still Speech Accelerometer, Microphone
Home_entertaining Home Still Loud Accelerometer, Microphone
Place_quiet Some Place Still Quiet Accelerometer, Microphone
Place_speech Some Place Still Speech Accelerometer, Microphone
Place_loud Some Place Still Loud Accelerometer, Microphone
Walking Keep on changing Moving Slowly N/A GPS
Vehicle Keep on changing Moving Fast N/A GPS
SENSOR DUTY CYCLES
 When activated, sensors are turned on and
off periodically
 Trade-offs in sampling:
 Frequent sampling: Wastes energy and
provides redundant information
 Infrequent sampling: Saves energy but low state
detection accuracy
 Current implementation provides small
event detection delay
EEMSS PERFORMANCE EVALUATION
 We evaluate EEMSS in terms of:
 Ability to record one’s state in real time
 State recognition accuracy
 Energy efficiency
 User study at CMU & USC with 10 users
 Each user carried Nokia N95 phone as daily
used cell phone with EEMSS running
 Ground truth was manually recorded by
each user
 Fine-grained entries with time and state
records
STATE RECOGNITION RECORD
 State records of two sample users
A CMU user A USC user
STATE RECOGNITION ACCURACY
 Individual user state recognition accuracy
for all 10 participants:
STATE RECOGNITION ACCURACY
 Confusion matrix of recognizing “Walking”,
“Vehicle”, and all other states*
All other
states
Walking Vehicle
All other states 99.17% 0.78% 0.05%
Walking 12.64% 84.29% 3.07%
Vehicle 10.59% 15.29% 74.12%
* “All other states” include “Working”, “Meeting”, “Office_loud”,
“Resting”, “Home_talking”, “Home_entertaining”, “Place_quiet”,
“Place_speech”, and “Place_loud”.
DEVICE LIFETIME
 Average device lifetime comparison
 More than 75% gain compared to existing
systems
EEMSS ENERGY USAGE AT A GLANCE
 User worked in office, then walked to library
and stayed (20 min empirical interval)
CONCLUSION
 User state recognition based on mobile
sensing is popular
 Energy efficiency is required due to low
device battery capacity
 Our sensor management methodology:
 Utilizing minimum number of sensors to
accomplish sensing tasks
 Manage sensors hierarchically
 EEMSS achieves good state recognition
accuracy and energy efficiency
THANK YOU!

Contenu connexe

Tendances

Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksManoj BN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksPradipta Ghosh
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Overview of wireless sensor network
Overview of wireless sensor networkOverview of wireless sensor network
Overview of wireless sensor networkjuno susi
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbeeeSAT Publishing House
 
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksDesign and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksecwayerode
 
Simple and Complex Activity Recognition Through Smart Phones
Simple and Complex Activity Recognition Through Smart PhonesSimple and Complex Activity Recognition Through Smart Phones
Simple and Complex Activity Recognition Through Smart PhonesBarnan Das
 
IRJET- Improving Network Life Time using High Populated Harmony Search Al...
IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...
IRJET- Improving Network Life Time using High Populated Harmony Search Al...IRJET Journal
 
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMA
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMAJafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMA
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMAAssociation BIOGEN
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNEnergy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNAmairullah Khan Lodhi
 

Tendances (20)

Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
A4WSN
A4WSNA4WSN
A4WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Overview of wireless sensor network
Overview of wireless sensor networkOverview of wireless sensor network
Overview of wireless sensor network
 
Sensors
SensorsSensors
Sensors
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 
wsn networks
wsn networkswsn networks
wsn networks
 
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksDesign and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
 
Simple and Complex Activity Recognition Through Smart Phones
Simple and Complex Activity Recognition Through Smart PhonesSimple and Complex Activity Recognition Through Smart Phones
Simple and Complex Activity Recognition Through Smart Phones
 
IRJET- Improving Network Life Time using High Populated Harmony Search Al...
IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...IRJET-  	  Improving Network Life Time using High Populated Harmony Search Al...
IRJET- Improving Network Life Time using High Populated Harmony Search Al...
 
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMA
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMAJafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMA
Jafar Keshvari IZLOŽENOST BEŽIČNIM KOMUNIKACIONIM UREĐAJIMA
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNEnergy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
 

En vedette

User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002Jason Hong
 
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...Jason Hong
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Jason Hong
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Jason Hong
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Jason Hong
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
 
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...Jason Hong
 
WebQuilt: Capturing and Visualizing the Web Experience at WWW10
WebQuilt: Capturing and Visualizing the Web Experience at WWW10WebQuilt: Capturing and Visualizing the Web Experience at WWW10
WebQuilt: Capturing and Visualizing the Web Experience at WWW10Jason Hong
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
 
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014Jason Hong
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Jason Hong
 
Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000Jason Hong
 
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...Jason Hong
 
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...Jason Hong
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Jason Hong
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Jason Hong
 

En vedette (20)

User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
 
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
 
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...
Wave to Me: User Identification Using Body Lengths and Natural Gestures, at C...
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
 
WebQuilt: Capturing and Visualizing the Web Experience at WWW10
WebQuilt: Capturing and Visualizing the Web Experience at WWW10WebQuilt: Capturing and Visualizing the Web Experience at WWW10
WebQuilt: Capturing and Visualizing the Web Experience at WWW10
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014
Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector, at CHI 2014
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
 
Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000
 
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
 
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
 

Similaire à A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition, at Mobisys 2009

144 deview-2013-smartphone pm
144 deview-2013-smartphone pm144 deview-2013-smartphone pm
144 deview-2013-smartphone pmNAVER D2
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
 
Model based , real time control
Model based , real time controlModel based , real time control
Model based , real time controlanandaxlr8
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...ijcsa
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
Vlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingVlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingKarel Charvat
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring systemVikram Purohit
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANijsrd.com
 
APPLICATION OF GPS IN POWER SECTOR@1.ppt
APPLICATION OF GPS IN POWER SECTOR@1.pptAPPLICATION OF GPS IN POWER SECTOR@1.ppt
APPLICATION OF GPS IN POWER SECTOR@1.pptAmitKumarSahu56
 

Similaire à A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition, at Mobisys 2009 (20)

144 deview-2013-smartphone pm
144 deview-2013-smartphone pm144 deview-2013-smartphone pm
144 deview-2013-smartphone pm
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Model based , real time control
Model based , real time controlModel based , real time control
Model based , real time control
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
IJET-V3I2P15
IJET-V3I2P15IJET-V3I2P15
IJET-V3I2P15
 
Zuned ppt.ppt
Zuned ppt.pptZuned ppt.ppt
Zuned ppt.ppt
 
Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
Phasor Measurement Unit (PMU)
 Phasor Measurement Unit (PMU) Phasor Measurement Unit (PMU)
Phasor Measurement Unit (PMU)
 
Vlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingVlite node – new sensors solution for farming
Vlite node – new sensors solution for farming
 
Zuned ppt.ppt
Zuned ppt.pptZuned ppt.ppt
Zuned ppt.ppt
 
PPT_2
PPT_2PPT_2
PPT_2
 
E044033136
E044033136E044033136
E044033136
 
wireless sensor network ieee
wireless sensor network ieeewireless sensor network ieee
wireless sensor network ieee
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
APPLICATION OF GPS IN POWER SECTOR@1.ppt
APPLICATION OF GPS IN POWER SECTOR@1.pptAPPLICATION OF GPS IN POWER SECTOR@1.ppt
APPLICATION OF GPS IN POWER SECTOR@1.ppt
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition, at Mobisys 2009

  • 1. A Framework for Energy Efficient Mobile Sensing for Automatic User State Recognition Yi Wang, Jialiu Lin, Murali Annavaram, Quinn A. Jacobson, Jason Hong, Bhaskar Krishnamachari and Norman Sadeh
  • 2. OUTLINE  Motivation  EEMSS introduction  System modules  Case implementation  Performance evaluation  Conclusion
  • 3. PEOPLE-CENTRIC MOBILE SENSING  Health monitoring  Keeping track of patients/elders  Social networking  Automated “Twittering”  Automated profile updates  Ringtone adjustment  Location based services  Mobile advertising
  • 4. CHALLENGE: LIMITED BATTERY  Battery capacity of mobile device is low  Sensors are main source of energy usage  Blind sensing drains battery soon  Need intelligent sensor management  Energy Efficient Mobile Sensing System (EEMSS) is important  Possibly trade some detection accuracy for much longer device lifetime
  • 6. SENSOR MANAGEMENT METHODOLOGY  Only utilize a minimum set of sensors  Recognize state & detect state transition  E.g.: No need for GPS when indoor  Hierarchical management  Sensors are activated when necessary  E.g.: Accelerometer -> WiFi scan -> GPS  If multiple sensors achieve the same task: Use energy efficient ones  How to determine sensor energy efficiency?
  • 7. DETERMINE ENERGY EFFICIENCY  Energy = Power drain × Operating duration  Sensor power consumptions on N95 devices:  Keep an eye on sensor operating duration
  • 9. USER STATE DESCRIPTION  Task 1: Identify the states to be detected  Working/meeting/walking/driving outdoor …  Task 2: For each state define entry criteria  Sensing thresholds from one or more sensors  E.g.: “Outdoor” + “High travel speed” = “Vehicle”  A state is entered when the criteria are satisfied  Task 3: For each state also specify the necessary sensors to be monitored  Detect state transition
  • 10. XML BASED STATE DESCRIPTOR
  • 11. DESIGN BENIFITS  Scalable  Add or remove a state upon user’s interest  Different criteria for different individuals  Real-time update  User’s habits may change  Sensing criteria can to be refined in real-time
  • 12. CLASSIFICATION MODULE  Classification algorithms are the key to high state recognition accuracy  Mobile phone is the only sensing resource  Capability limitations  Computing issues  Real-time  Computing power
  • 13. REAL-TIME AUDIO RECOGNITION  Based on microphone sensing  Focus on the detection of speech  Audio features  Energy  Silence ratio  SSCH peak1  3 outputs:  Speech  Loud/Noisy  Silent 1 B. Gajic and K.K. Paliwal. “Robust speech recognition in noisy environments based on subband spectral centroid histograms”
  • 14. SPEECH DETECTION PERFORMANCE  Algorithm is tested on 1085 speech clips  91.14 % are classified as speech  Complexity of algorithm is O(N2)  N: Number of frequency samples  Overall processing time of a 4 seconds sound clip on N95  ~10 seconds
  • 15. EEMSS CASE IMPLEMENTATION  Implemented and tested on Nokia N95  Sensors operated include:  Accelerometer, Microphone, WiFi detector, and GPS  User states are featured by:  Location, background sound, and user motion information  E.g.: “office + quiet + still” => User working in office
  • 16. STATES INTERESTED State Name State Features Sensors Monitored Location Motion Background Sound Working Office Still Quiet Accelerometer, Microphone Meeting Office Still Speech Accelerometer, Microphone Office_loud Office Still Loud Accelerometer, Microphone Resting Home Still Quiet Accelerometer, Microphone Home_talking Home Still Speech Accelerometer, Microphone Home_entertaining Home Still Loud Accelerometer, Microphone Place_quiet Some Place Still Quiet Accelerometer, Microphone Place_speech Some Place Still Speech Accelerometer, Microphone Place_loud Some Place Still Loud Accelerometer, Microphone Walking Keep on changing Moving Slowly N/A GPS Vehicle Keep on changing Moving Fast N/A GPS
  • 17. SENSOR DUTY CYCLES  When activated, sensors are turned on and off periodically  Trade-offs in sampling:  Frequent sampling: Wastes energy and provides redundant information  Infrequent sampling: Saves energy but low state detection accuracy  Current implementation provides small event detection delay
  • 18. EEMSS PERFORMANCE EVALUATION  We evaluate EEMSS in terms of:  Ability to record one’s state in real time  State recognition accuracy  Energy efficiency  User study at CMU & USC with 10 users  Each user carried Nokia N95 phone as daily used cell phone with EEMSS running  Ground truth was manually recorded by each user  Fine-grained entries with time and state records
  • 19. STATE RECOGNITION RECORD  State records of two sample users A CMU user A USC user
  • 20. STATE RECOGNITION ACCURACY  Individual user state recognition accuracy for all 10 participants:
  • 21. STATE RECOGNITION ACCURACY  Confusion matrix of recognizing “Walking”, “Vehicle”, and all other states* All other states Walking Vehicle All other states 99.17% 0.78% 0.05% Walking 12.64% 84.29% 3.07% Vehicle 10.59% 15.29% 74.12% * “All other states” include “Working”, “Meeting”, “Office_loud”, “Resting”, “Home_talking”, “Home_entertaining”, “Place_quiet”, “Place_speech”, and “Place_loud”.
  • 22. DEVICE LIFETIME  Average device lifetime comparison  More than 75% gain compared to existing systems
  • 23. EEMSS ENERGY USAGE AT A GLANCE  User worked in office, then walked to library and stayed (20 min empirical interval)
  • 24. CONCLUSION  User state recognition based on mobile sensing is popular  Energy efficiency is required due to low device battery capacity  Our sensor management methodology:  Utilizing minimum number of sensors to accomplish sensing tasks  Manage sensors hierarchically  EEMSS achieves good state recognition accuracy and energy efficiency