SlideShare une entreprise Scribd logo
1  sur  21
Discovery of Convoys in
Network Proximity Log
Dmitry Namiot Lomonosov Moscow State University
dnamiot@gmail.com
Manfred Sneps-Sneppe ZNIIS, M2M Competence Center
manfreds.sneps@gmail.com
RUSMART 2013
• Discovery of convoys in database with proximity
log.
• Traditionally, discovery of convoys covers
trajectories databases. This paper presents a model
for context-aware browsing application based on the
network proximity.
• Can we restore trajectories by proximity time
series?
• How can we use proximity based trajectories in
mobile services?
About
Contents
Introduction
Context and location awareness
Trajectories
Discovery process
Conclusion
Introduction
Our model uses mobile phone as proximity sensor
and proximity data replaces location information
As per our concept, any existing or even especially
created wireless network node could be used as
presence sensor that can discover access to some
dynamic or user-generated content.
Content revelation in this model depends on rules
based on the proximity.
Proximity vs. Location
• Can we replace location with proximity?
• And proximity here is the network proximity.
• In other words: use mobile user’s position relatively
network nodes (e.g. Wi-Fi access points). It is some
metric lets us compare network environments
• It may be more accurate than location-based
computing (especially for indoor)
• We can use dynamic nodes as our base (e.g.
hotspot right on the mobile phone)
Proximity <> Location
• Open Wi-Fi Access
Point right in the
mobile
• Our data could be
linked to this mobile
hotspot
• In general, we do not
need location for
presenting data
associated with
proximity info
Spot Expert (SpotEx)
• We can the traditional indoor positioning
schema on the first stage: detection of Wi-Fi
networks?
This detection already provides some
information about the location – just due to local
nature of Wi-Fi network.
• As the second step we can add the ability to
describe some rules (if-then operators, or
productions) related to the Wi-Fi access points.
SpotEx
• Our rules will simply use the fact that the particularly
Wi-Fi network is detected. And based on this
conclusion we will open (read – make them visible)
some user-defined messages to mobile terminals.
• Actually it is a typical example for the context
aware computing. The visibility for user-defined
text (content) depends on the network context.
• This approach uses Wi-Fi proximity
• Any Wi-Fi hot spot works here just as presence sensor.
SpotEx
So, our service contains the following components:
• database (store) with productions (rules) associated
with Wi-Fi networks
• rule editor. Web application (including mobile web)
that lets users add (edit) rule-set, associated with
some Wi-Fi network
• mobile applications, that can detect Wi-Fi networks,
check the current conditions against the database
and execute productions
SpotEx – use cases
The most obvious use cases:
• Some shop can deliver deals/discount/coupons right
to mobile terminals as soon as the user is near some
predefined point of sale.
We can describe this feature as “automatic check-in”
for example. Rather than directly (manually or via
some API) set own presence at some place (e.g.
similar to Foursquare, Facebook Places, etc.)
with SpotEx mobile users can pull data automatically
and anonymously
SpotEx – use cases
• Campus admin can deliver news and special
announces
• Hyper local news in Smart City projects could be tight
(linked) to the public available networks and delivered
information via that channel, etc.
• The most interesting (by our opinion, of course) use
case: Wi-Fi hot spot being opened right on the mobile
phone
SpotEx productions
Each rule looks like a production (if-then operator).
The conditional part includes the following objects:
Wi-Fi network identity,
signal strength (optionally),
time of the day (optionally),
client ID (MAC-address)
History of visits
SpotEx productions
In other words it is a set of operators like:
IF network_SSID IS ‘mycafe’ AND
time is 1pm – 2pm THEN
{ present the coupon for lunch }
It is like expert system. We can use well known
algorithm for the processing: Rete
Conditional part contains predicates with proximity
data. For example, rank of hot spots, etc.
Discovery of convoys
• Discovery of convoys in historical user’s logs
provides a new class of rules for delivering local
content to mobile subscribers
• Simply, we should be able to provide a new set
of predicates for our rules:
If IN_GROUP_OF (N, t) Then …
N – describes a size of group
t – observed time interval
• A new set of use cases for proximity marketing
Convoys
• Convoy is a group of
moving object where
included objects are in
density connection the
consecutive time points
• Objects are density-
connected if a sequence
of objects exists that
connects the two objects
and the distance between
consecutive objects does
not exceed the given
value.
More about convoys
• A group of objects form a traveling
company, if members of the group are
density-connected for themselves during
some given time and the size of the group
is not less than the given threshold.
• The moving cluster - a shared set of
objects exists across some finite time, but
objects may leave and join a cluster during
the cluster’s life time
More about convoys
• Dynamic convoys allows dynamic members
under constraints imposed by some parameters
(actually, by user-defined parameters).
• An evolving convoy captures the relationship
between different stages of convoys, so that
convoys in some stage has more (fewer)
members than its previous stage.
• Flock is a set of objects that travel within a range
while keeping the same motion.
Group behavior
• Anyway, all patterns covering capturingAnyway, all patterns covering capturing
“collaborative” or “group” behavior between moving“collaborative” or “group” behavior between moving
objects.objects.
• The difference between all the above mentionedThe difference between all the above mentioned
patterns is the way they define the relationshippatterns is the way they define the relationship
between the moving objects.between the moving objects.
• In our paper we avoid restrictions on the sizes andIn our paper we avoid restrictions on the sizes and
shapes of the discovered trajectory patterns.shapes of the discovered trajectory patterns.
• It is due to nature our data and the way they areIt is due to nature our data and the way they are
collectedcollected
Proximity ring
• Wi-Fi access point with
omni-directional antenna
• Having proximity info only
we cannot distinguish two
groups that actually
reached our access point
from the opposite
directions
• Convoy is a group of
objects (mobile phones in
this particular case) with
the similar proximity track
within the given time
interval.
Proximity convoys
• It is consistent movement where the key metric
is the relative proximity of an access point.
• Two proximity tracks (sequences of proximity
records) are similar on some time interval if for
the each sequential measurement in the first
track we can get a sequential measurement
from the second track for approximately the
same timestamp where two networks snapshots
have at least one pair of comparable Wi-Fi
measurements.
About us
International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow –
Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing
innovative telecom and software services,innovative telecom and software services,
international contests awardsinternational contests awards
Research areas are:Research areas are:
open API for telecom,open API for telecom,
web access for telecom data,web access for telecom data,
Smart Cities,Smart Cities,
M2M applications, context-aware computingM2M applications, context-aware computing..

Contenu connexe

Tendances

Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksijwmn
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...IOSR Journals
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silenceranjith kumar
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...IJCNCJournal
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
 
Privacy preserving collaborative spectrum sensing with multiple service provi...
Privacy preserving collaborative spectrum sensing with multiple service provi...Privacy preserving collaborative spectrum sensing with multiple service provi...
Privacy preserving collaborative spectrum sensing with multiple service provi...ieeepondy
 

Tendances (15)

Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networks
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silence
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
C04511822
C04511822C04511822
C04511822
 
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...
SWARM OPTIMIZATION BASED GRAVITATIONAL SEARCH APPROACH FOR CHANNEL ASSIGNMENT...
 
O010528791
O010528791O010528791
O010528791
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
 
Privacy preserving collaborative spectrum sensing with multiple service provi...
Privacy preserving collaborative spectrum sensing with multiple service provi...Privacy preserving collaborative spectrum sensing with multiple service provi...
Privacy preserving collaborative spectrum sensing with multiple service provi...
 

En vedette

Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015VocTEL Conference
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceRichard Blech
 
Microsoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemMicrosoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemDeepak Bhagchandani
 
Creating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE DirectCreating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE DirectQualcomm Research
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceYi-Hsueh Tsai
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardssk
 

En vedette (10)

Master defense
Master defenseMaster defense
Master defense
 
Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015
 
Linteri RetailShow 2014
Linteri RetailShow 2014Linteri RetailShow 2014
Linteri RetailShow 2014
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile Intelligence
 
Microsoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemMicrosoft - Close Proximity Communication System
Microsoft - Close Proximity Communication System
 
Creating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE DirectCreating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE Direct
 
LTE-Direct
LTE-DirectLTE-Direct
LTE-Direct
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standard
 

Similaire à Discovery of Convoys in Network Proximity Log

Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams  Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams Coldbeans Software
 
Wi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingWi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingColdbeans Software
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery inambitlick
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksJPINFOTECH JAYAPRAKASH
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportswathi78
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...IEEEGLOBALSOFTTECHNOLOGIES
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksIEEEFINALYEARPROJECTS
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd Iaetsd
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Supportchennaijp
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNpharmaindexing
 

Similaire à Discovery of Convoys in Network Proximity Log (20)

Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams  Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams
 
Wi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingWi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsing
 
Proximity as a service
Proximity as a serviceProximity as a service
Proximity as a service
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
On hyper-local web pages
On hyper-local web pagesOn hyper-local web pages
On hyper-local web pages
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
Bc044335338
Bc044335338Bc044335338
Bc044335338
 
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
 
multicast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure supportmulticast capacity in manet with infrastructure support
multicast capacity in manet with infrastructure support
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSNCOMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
 

Plus de Coldbeans Software

On Internet of Things education
On Internet of Things educationOn Internet of Things education
On Internet of Things educationColdbeans Software
 
Стандарты в цифровой экономике
Стандарты в цифровой экономикеСтандарты в цифровой экономике
Стандарты в цифровой экономикеColdbeans Software
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming modelsColdbeans Software
 
Безопасный город
Безопасный городБезопасный город
Безопасный городColdbeans Software
 
Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Coldbeans Software
 
On data model for context–aware services
On data model for context–aware servicesOn data model for context–aware services
On data model for context–aware servicesColdbeans Software
 
On Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsOn Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsColdbeans Software
 
ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS Coldbeans Software
 
Базы данных для временных рядов
Базы данных для временных рядовБазы данных для временных рядов
Базы данных для временных рядовColdbeans Software
 
Метаданные в модели REST
Метаданные в модели RESTМетаданные в модели REST
Метаданные в модели RESTColdbeans Software
 
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.Coldbeans Software
 
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowFrom Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowColdbeans Software
 
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI Coldbeans Software
 

Plus de Coldbeans Software (20)

On Internet of Things education
On Internet of Things educationOn Internet of Things education
On Internet of Things education
 
Стандарты в цифровой экономике
Стандарты в цифровой экономикеСтандарты в цифровой экономике
Стандарты в цифровой экономике
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
 
IoT education
IoT educationIoT education
IoT education
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
 
Безопасный город
Безопасный городБезопасный город
Безопасный город
 
Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform
 
On data model for context–aware services
On data model for context–aware servicesOn data model for context–aware services
On data model for context–aware services
 
On time-series databases
On time-series databasesOn time-series databases
On time-series databases
 
On Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsOn Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of Things
 
ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS
 
Базы данных для временных рядов
Базы данных для временных рядовБазы данных для временных рядов
Базы данных для временных рядов
 
Bluetooth Data Points
Bluetooth Data PointsBluetooth Data Points
Bluetooth Data Points
 
Метаданные в модели REST
Метаданные в модели RESTМетаданные в модели REST
Метаданные в модели REST
 
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
 
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowFrom Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
 
Cars as Tags
Cars as TagsCars as Tags
Cars as Tags
 
Sensing
SensingSensing
Sensing
 
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Discovery of Convoys in Network Proximity Log

  • 1. Discovery of Convoys in Network Proximity Log Dmitry Namiot Lomonosov Moscow State University dnamiot@gmail.com Manfred Sneps-Sneppe ZNIIS, M2M Competence Center manfreds.sneps@gmail.com RUSMART 2013
  • 2. • Discovery of convoys in database with proximity log. • Traditionally, discovery of convoys covers trajectories databases. This paper presents a model for context-aware browsing application based on the network proximity. • Can we restore trajectories by proximity time series? • How can we use proximity based trajectories in mobile services? About
  • 3. Contents Introduction Context and location awareness Trajectories Discovery process Conclusion
  • 4. Introduction Our model uses mobile phone as proximity sensor and proximity data replaces location information As per our concept, any existing or even especially created wireless network node could be used as presence sensor that can discover access to some dynamic or user-generated content. Content revelation in this model depends on rules based on the proximity.
  • 5. Proximity vs. Location • Can we replace location with proximity? • And proximity here is the network proximity. • In other words: use mobile user’s position relatively network nodes (e.g. Wi-Fi access points). It is some metric lets us compare network environments • It may be more accurate than location-based computing (especially for indoor) • We can use dynamic nodes as our base (e.g. hotspot right on the mobile phone)
  • 6. Proximity <> Location • Open Wi-Fi Access Point right in the mobile • Our data could be linked to this mobile hotspot • In general, we do not need location for presenting data associated with proximity info
  • 7. Spot Expert (SpotEx) • We can the traditional indoor positioning schema on the first stage: detection of Wi-Fi networks? This detection already provides some information about the location – just due to local nature of Wi-Fi network. • As the second step we can add the ability to describe some rules (if-then operators, or productions) related to the Wi-Fi access points.
  • 8. SpotEx • Our rules will simply use the fact that the particularly Wi-Fi network is detected. And based on this conclusion we will open (read – make them visible) some user-defined messages to mobile terminals. • Actually it is a typical example for the context aware computing. The visibility for user-defined text (content) depends on the network context. • This approach uses Wi-Fi proximity • Any Wi-Fi hot spot works here just as presence sensor.
  • 9. SpotEx So, our service contains the following components: • database (store) with productions (rules) associated with Wi-Fi networks • rule editor. Web application (including mobile web) that lets users add (edit) rule-set, associated with some Wi-Fi network • mobile applications, that can detect Wi-Fi networks, check the current conditions against the database and execute productions
  • 10. SpotEx – use cases The most obvious use cases: • Some shop can deliver deals/discount/coupons right to mobile terminals as soon as the user is near some predefined point of sale. We can describe this feature as “automatic check-in” for example. Rather than directly (manually or via some API) set own presence at some place (e.g. similar to Foursquare, Facebook Places, etc.) with SpotEx mobile users can pull data automatically and anonymously
  • 11. SpotEx – use cases • Campus admin can deliver news and special announces • Hyper local news in Smart City projects could be tight (linked) to the public available networks and delivered information via that channel, etc. • The most interesting (by our opinion, of course) use case: Wi-Fi hot spot being opened right on the mobile phone
  • 12. SpotEx productions Each rule looks like a production (if-then operator). The conditional part includes the following objects: Wi-Fi network identity, signal strength (optionally), time of the day (optionally), client ID (MAC-address) History of visits
  • 13. SpotEx productions In other words it is a set of operators like: IF network_SSID IS ‘mycafe’ AND time is 1pm – 2pm THEN { present the coupon for lunch } It is like expert system. We can use well known algorithm for the processing: Rete Conditional part contains predicates with proximity data. For example, rank of hot spots, etc.
  • 14. Discovery of convoys • Discovery of convoys in historical user’s logs provides a new class of rules for delivering local content to mobile subscribers • Simply, we should be able to provide a new set of predicates for our rules: If IN_GROUP_OF (N, t) Then … N – describes a size of group t – observed time interval • A new set of use cases for proximity marketing
  • 15. Convoys • Convoy is a group of moving object where included objects are in density connection the consecutive time points • Objects are density- connected if a sequence of objects exists that connects the two objects and the distance between consecutive objects does not exceed the given value.
  • 16. More about convoys • A group of objects form a traveling company, if members of the group are density-connected for themselves during some given time and the size of the group is not less than the given threshold. • The moving cluster - a shared set of objects exists across some finite time, but objects may leave and join a cluster during the cluster’s life time
  • 17. More about convoys • Dynamic convoys allows dynamic members under constraints imposed by some parameters (actually, by user-defined parameters). • An evolving convoy captures the relationship between different stages of convoys, so that convoys in some stage has more (fewer) members than its previous stage. • Flock is a set of objects that travel within a range while keeping the same motion.
  • 18. Group behavior • Anyway, all patterns covering capturingAnyway, all patterns covering capturing “collaborative” or “group” behavior between moving“collaborative” or “group” behavior between moving objects.objects. • The difference between all the above mentionedThe difference between all the above mentioned patterns is the way they define the relationshippatterns is the way they define the relationship between the moving objects.between the moving objects. • In our paper we avoid restrictions on the sizes andIn our paper we avoid restrictions on the sizes and shapes of the discovered trajectory patterns.shapes of the discovered trajectory patterns. • It is due to nature our data and the way they areIt is due to nature our data and the way they are collectedcollected
  • 19. Proximity ring • Wi-Fi access point with omni-directional antenna • Having proximity info only we cannot distinguish two groups that actually reached our access point from the opposite directions • Convoy is a group of objects (mobile phones in this particular case) with the similar proximity track within the given time interval.
  • 20. Proximity convoys • It is consistent movement where the key metric is the relative proximity of an access point. • Two proximity tracks (sequences of proximity records) are similar on some time interval if for the each sequential measurement in the first track we can get a sequential measurement from the second track for approximately the same timestamp where two networks snapshots have at least one pair of comparable Wi-Fi measurements.
  • 21. About us International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow – Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing innovative telecom and software services,innovative telecom and software services, international contests awardsinternational contests awards Research areas are:Research areas are: open API for telecom,open API for telecom, web access for telecom data,web access for telecom data, Smart Cities,Smart Cities, M2M applications, context-aware computingM2M applications, context-aware computing..