EnLoc: Energy-Efficient Localization for Mobile Phones
|
|
|
- Andrea Lane
- 10 years ago
- Views:
Transcription
1 EnLoc: Energy-Efficient Localization for Mobile Phones Ionut Constandache (Duke), Shravan Gaonkar (UIUC), Matt Sayler (Duke), Romit Roy Choudhury (Duke), Landon Cox (Duke) Abstract A growing number of mobile phone applications utilize physical location to express the context of information. Most of these location-based applications assume GPS capabilities. Unfortunately, GPS incurs an unacceptable energy cost that can reduce the phone s battery life to less than nine hours. Alternate localization technologies, based on WiFi or GSM, improve battery life at the expense of localization accuracy. This paper quantifies this important tradeoff that underlies a range of emerging services. Driven by measurements from Nokia N95 phones, we develop an energy-efficient localization framework called EnLoc. The framework characterizes the optimal localization accuracy for a given energy budget, and develops predictionbased heuristics for real-time use. Evaluation on traces from real users demonstrates the possibility of achieving good localization accuracy for a realistic energy budget. I. INTRODUCTION Mobile phones are powerful platforms for sensing, sharing, and querying people-centric information. A variety of applications are on the rise, many of which utilize location to express the context of information. Most of these location based applications assume GPS capabilities. While GPS offers good location accuracy of around 10m, it incurs a serious energy cost that can drain a fully charged phone battery in 8.5 hours [1]. We make a few observations in light of this energy-accuracy profile. (1) In real life, the phone battery must be shared with voice calls, SMS, s and pictures. The energy budget for localization alone is a small fraction of the battery capacity. If this fraction is assumed to be 25%, continuous GPS localization is available for less than 2.5 hours. (2) One may argue that continuous GPS is unnecessary, and can be activated only on demand. While this may suffice for some services (e.g. geo-tagging a photo), many emerging applications rely on the feasibility of continuous localization over reasonably long time scales. Examples include GeoLife [2], Micro-Blog [1], TrafficSense [3] and Pothole Patrol [4]. (3) Continuous localization over long time scales results in higher average error. For an energy budget of K GPS readings and a duration of T > K time units, at (T K) time units location can only be estimated, and hence, it is more erroneous than an actual GPS reading. When averaged over all, actual and estimated readings, the average localization error is higher than the GPS instantaneous error ( 10m). (4) WiFi and GSM-based localizations are not obvious replacements to GPS. While these schemes are less energyhungry, they incur higher (instantaneous) localization error (around 40m and 400m respectively). This permits a greater number of location readings, each of which is less accurate. Whether this results in lower average error than few, but accurate, GPS readings, is an open question. This paper investigates the space of energy-efficient localization for mobile phones and expands on the following contributions: Identify the space of energy-accuracy tradeoff. Measurements on Nokia N95 phones quantify this tradeoff. Analysis of the optimal localization accuracy for a given energy budget. For a given mobility trace, an offline dynamic program (DP) computes the maximum location accuracy achievable using GPS, WiFi, GSM and combinations thereof. When results show that the theoretical optimal may not suffice for high-accuracy applications, we explore the usefulness of prediction. Exploit habitual activity of individuals and behavior of populations to predict location. Predictions incorporated into the DP offer offline optimal solutions. Online heuristics permit energy-efficient localization in real time. Evaluate heuristics in real life situations. Performance is compared with the theoretical optimum using a custom trace-based simulator and mobility traces collected in the UIUC campus. Results confirm the feasibility of achieving good localization over a day s energy budget. II. ENERGY MEASUREMENTS We used a software monitor to measure fine-grained power consumption in Nokia N95 phones. This section reports the accuracy and energy measurements that motivate EnLoc. A. Localization Using WiFi and GSM As an alternative to GPS hardware and its unavailability indoors, project Place Lab [5] proposed using WiFi and GSM sensors for localization. Specifically, authors create a wireless map of a region by war-driving in the area. The wireless map is composed of sampled GPS locations, WiFi access points and GSM towers audible at these locations. This wireless map is then distributed to phones. When a phone travels through the mapped area, it estimates its own location by matching its list of audible WiFi APs/GSM towers to the wireless map. Place Lab experiments in downtown Seattle exhibit a median positioning error of 13 to 40m with WiFi, and around 94 to 196m with GSM. When performed in Champaign, IL, and Durham, NC, WiFi accuracy ranged between 25 to 40m, while GSM ranged between 300 to 400m.
2 Fig. 1. Power consumption in mw for Nokia N95 phones, sampled at 30s intervals: (a) GPS measurement (b) WiFi measurement (c) GSM measurement. B. Energy Measurements for GPS, WiFi, and GSM We measured the energy consumption on Nokia N95 phones for each localization sensor. We charged the phone battery to full capacity and turned on only the location sensor we intended to measure. An energy monitoring program probed the location sensor at a chosen interval T probe. Figure 1(a) shows GPS power consumptions as a function of time, for T probe = 30 seconds. We see periodic spikes on top of a baseline energy consumption at approximately 400 mw. The spikes correspond to a GPS sensor read operation and a write operation into the phone s file system for logging the location data. The baseline corresponds to the power consumed by the GPS receiver. Similar measurements are reported in Figure 1(b) and (c) for WiFi and GSM. Observe that while the baseline power consumption for WiFi is low (55 mw), it exhibits a high spike (of around 1100) for every probe. GSM based samples exhibit similar characteristics, however, their power consumption is less. When power consumption is translated to net battery life, we found that GPS allowed for 9 hours, while WiFi and GSM sustained for 40 and 60 hours, respectively. Viewed against corresponding localization accuracies of 10m, 40m, and 400m, the energy-accuracy tradeoff is evident. III. ENLOC: FRAMEWORK DESIGN A. Average Location Error The energy-efficient localization problem can be defined as follows. Given an energy budget B and time duration T, design a strategy that will minimize the average localization error (ALE). Formally, denote L reported (t i ) and L actual (t i ) to be the reported and actual locations of the phone at time t i. Assuming T discrete time-points, the ALE is: δ avg = T ( Lreported (t i ) L actual (t i ) ) i=1 Assuming GPS to be the ground truth, a GPS reading at time t j implies that L reported (t j ) is same as L actual (t j ). Similarly, a WiFi reading at t j implies that L reported (t j ) L actual (t j ) is in the order of 40m. The problem then is to minimize δ avg for a given energy budget. We model this energy-accuracy tradeoff as an optimization problem. T B. Problem Formulation Our goal is to determine a schedule with which the location sensors should be triggered such that the average localization error (ALE) is minimized for a given energy budget. The schedule is a set of time instants, {t 1, t 2, t 3,..} and the corresponding sensors {s 1, s 2, s 3,..}, where s i [GP S, W if i, GSM]. The optimal schedule should trigger a reading of sensor s i at time t i to minimize ALE. We developed a dynamic programming (DP) solution to the problem above. The DP takes as input an entire user trace (i.e., GPS, WiFi and GSM readings at all time-points along the user s path) and outputs a sensor reading schedule that achieves the minimum ALE. In the interest of space we omit the details of the dynamic program and only present our main findings. C. Optimal Localization Error To obtain the best localization accuracy, we executed the DP on mobility traces collected on the UIUC campus. We war-drove the campus [5] and generated a wireless map of the area. Then, we distributed phones to students to gather mobility traces. A custom simulator integrated the traces with the wireless map, and executed the dynamic program. We specified an energy budget of 25% of the phone battery and the duration of operation was 24 hours. For intermediary time points, at which sensor readings are not performed, we report the last known location. We assumed that sensors can be sampled every 30 seconds. OptGPS OptWiFi OptGSM OptComb Trace Trace Trace TABLE I OPTIMAL PERFORMANCE FOR DIFFERENT TRACES We evaluate four optimal schemes, namely, Optimal GPS/WiFi/GSM/Combined. As the name suggests, Optimal GPS corresponds to the minimum ALE achieved when only GPS readings are used. Table I reports results from three mobility traces. Observe that Opt WiFi outperforms Opt GPS indicating that greater number of less accurate readings is better for localization. Also, Opt Combined outperforms the others, and is close to Opt WiFi in many of the traces. However, it is surprising that the offline optimal error (with
3 knowledge of the entire trace) was typically more than 60m. Online versions of these schemes (that do not have the entire trace) will naturally perform worse. Reporting the last known location between consecutive location readings is a source of this inefficiency; we address this through mobility prediction. D. Prediction Opportunity In reality, human behavior/mobility is amenable to prediction [6], [7], [8]. Driving on straight highways, turns on one way streets, habitual office hours, are examples of prediction opportunities. EnLoc attempts to exploit them. Simple Linear Predictor: We begin by considering a basic linear predictor. The location of a phone at time t k, denoted L(t k ), can be a linear extrapolation of the two previously sampled locations, L(t i ) and L(t j ). This can be effective when a phone moves on a straight road. However, if the phone s movement is not straight, or if L(t i ) and L(t j ) were highly erroneous, linear prediction may be unsuitable. We have modified the DP to incorporate linear prediction (LP) and compute the minimum average error values. Human Mobility Patterns: While linear prediction is a general approach, recognizing individual human behavior may facilitate better predictions. The intuition is that humans have habitual activity patterns, and sampling the activity at a few uncertainty points may be sufficient for predicting the rest. For instance, given that a person goes to lunch at either 12:00pm, 12:50pm, or 1:00pm, the phone may trigger GPS readings just after these times. Learning that the person has started out for lunch, her subsequent locations can be predicted (i.e., locations along the habitual path from office to the cafe). Similarly, GPS readings between 12:30am to 7:00am can be obviated if the person habitually sleeps in this time window. Deviations: To cope with deviations from habitual paths, we hypothesize that statistical behavior of large populations provide useful hints. Knowing that most of the vehicles take a left turn at a traffic intersection can be valuable for prediction. In general, if a probability map can be generated for a given area, an individual s mobility in that area can be predicted. We extended our DP to incorporate probability maps and extract the optimal localization schedule for a given trace. Intuitively, the DP is expected to schedule location readings at points where the individual s behavior differs from the population s statistical behavior. IV. ENLOC: SYSTEM DESIGN This section attempts to translate the above ideas into a working system, called EnLoc. The system exploits both habitual mobility patterns and population-driven probability maps. EnLoc is an online solution, and unlike the DP, does not assume knowledge of the user s entire trace. Exploiting Habitual Mobility A study with 100, 000 people has shown that individuals exhibit habitual space-time movements, with reasonably small variation [6]. To visualize this, we collected GPS-based mobility traces of several people and plotted them over Google Maps. Figure 2(a) shows a simplified example. One may envision the Google maps plot as a tree, with branches at certain points we call this the logical mobility tree (LMT). The vertices of this tree are the branching points on the person s actual mobility paths. Uncertainty arises at these branching points (e.g., at a traffic intersection where a person may go straight or turn right), and hence, the vertices of the LMT are also called uncertainty points. The edges of the LMT represent physical paths that connect consecutive uncertainty points. Each edge is associated with (1) the starting time of that physical movement, (2) the average velocity on that path, and (3) the duration of travel on that physical path. Figure 2(b) shows the LMT corresponding to the physical mobility in Figure 2(a). Our key idea is to schedule location readings right after the uncertainty points on the LMT. Such a location reading will resolve the uncertainty since the phone will be placed in one of the paths emanating from that uncertainty point. Thus, the phone s location can be reasonably predicted until it encounters the next uncertainty point, at which time, another location reading will be necessary. Observe that the LMT in Figure 2(b) is a spatial representation of a person s mobility profile. In reality, a person traverses the same edge on the LMT at many different times. Each of these possibilities translates into a distinct edge in the LMT. Figure 2(c) shows a hand-constructed example of such a space-time LMT representation. To accurately know when the phone leaves a particular node of the LMT, EnLoc will need to sample all the edges emanating from that node. However, energy-budget limitations will allow only a fraction of the emanating edges to be sampled. EnLoc designs a heuristic to sample a subset of the edges branching out of a node. We explain this with the example of Figure 2(c) which is not derived from an actual mobility trace. Assume that current time is 8:00am, and the phone is located at home, H. Also assume that the remaining energy budget is B remaining. The heuristic begins by identifying all the paths from H to the leaves of the tree, i.e., P 1 = home coffee, and P 2 = home walmart. Then, the number of location readings N i, necessary to track the phone with certainty, is computed for each path P i. Thus N 1 = = 10 readings. Observe that 4 readings are necessary to track the phone leaving Home, and 6 readings for going from Office to Coffee. These 6 readings include the 5 edges from Office to Coffee (the latest being 6:10pm), as well as the 6:00pm edge from Office to Gym. If the 6:00pm edge is not included, EnLoc may not know if the phone has started moving towards the Gym. Similarly, N 2 = = 15 readings. Now, the heuristic computes M = max(n i ), a pessimistic estimate of the number of readings necessary in the future; M = 15 for this example. Then, the heuristic computes F = eh M, where e H is the number of emanating edges from Home. In this example, F = The phone is allocated F B remaining amount of energy for detecting its departure from home. Assuming B remaining is 10, there
4 Fig. 2. Personal mobility profile: (a) An anonymous user s movement over two weeks (b) A spatial logical mobility tree (LMT) (c) A spatio-temporal LMT. are approximately 2 GPS readings available. The heuristic randomly chooses 2 time-points out of the 4, and samples the phone s location. Once that phone is found to be on one of the paths going out of Home, the heuristic predicts the phone s location based on the habitual velocity on that edge. At the next uncertainty point, the phone recomputes F using the scheme above. Addressing Deviation from Habits Users may deviate from their habitual paths. Even though deviations are not the common case, they are important because several applications may be triggered due to deviation. Microblogging [1] may be more active when people go for vacations; location-specific information may be necessary when people are driving down unfamiliar paths. To addresses the case of deviation, EnLoc exploits mobility of large populations as a potential indicator of the individual s mobility. The basic idea is as follows: consider a person approaching a traffic intersection from Street A. Since the person has not visited this street in the past, it is difficult to predict how she will behave at the imminent intersection. Now, if a large fraction of the population is known to take a left turn onto Street B, then the person s movement can be guessed accordingly. EnLoc develops mobility maps of large populations and exploits them for prediction. EnLoc detects a deviation when a scheduled location reading discovers the phone in an unexpected location (i.e., not on the LMT). At this time, EnLoc switches to the Deviation Mode of operation. In this mode, the residual energy budget is divided into equally time-spaced WiFi readings across the remainder of the day. Now, once the first location sample has been obtained, EnLoc uses the population activity map to predict the phone s movement. The velocity and turns at different intersections are estimated from the activity map. Incorrect predictions obviously incur location error. The error accumulates until the next reading, when EnLoc makes a new prediction using the new location as the starting point. Without loss of generalization, let us consider 4-way traffic intersections. EnLoc computes 4 probabilities for each intersection, i.e., an user entering the intersection from Street A, either turns left, turns right, continues straight, or takes a U- turn. One may envision this as a 4 4 matrix, where element ij denotes the probability that the user entering street i exits through street j. We generated the probability maps for UIUC campus using Google maps. First, we identified all roads that border the campus. Further, we identified roads that intersect the bordering roads, and enter the campus. We call these feeder roads. We also identified all parking lots within the campus and their capacities. Now, we simulated vehicles that enter the campus through a feeder road, and drive to a pre-specified parking lot. The pre-specified parking lot is randomly chosen from the distribution of parking lot sizes. For each vehicle, we obtained its driving direction through Google Map APIs, and parsed it to extract the vehicle s movement through each traffic intersection (i.e., left/right/straight/u-turn). Simulation of thousands of vehicles produces the probability matrix for each intersection. A phone that is installed with this matrix should be able to predict/localize itself in the UIUC campus. V. PERFORMANCE EVALUATION We evaluate EnLoc using traces collected on UIUC campus. The energy budget was set to 25% of the battery capacity and the duration of operation was 24 hours. An ideal evaluation of EnLoc should characterize the average localization error (ALE) over a person s complete mobility pattern (i.e., habitual and deviant paths). However, we found that the actual deviations extended far beyond the war-driven/probability-mapped UIUC campus. Therefore, we evaluated population-based prediction using portions of traces that were within the campus. Then, we evaluated the habitual mobility profile-based prediction by pruning the deviations from a user s LMT. We believe that the localization error will be close to the average of these two cases. Deviant Paths At each traffic intersection, the mobility of the phone was predicted based on the maximum probability at the intersection. The error was computed whenever the prediction was inconsistent with the actual user s movement. Section III-C and Table II describe the schemes examined in this section. Opt-LP-GPS/WiFi/GSM Opt-LP-Comb OptMap Heu-Eq-GPS/WiFi/GSM EnLoc-Eq-Map Optimal GPS/WiFi/GSM + Lin. Pred (LP) Optimal+Combined GPS,WiFi,GSM + LP Optimal using map predictor Heuristic+Equally-spaced GPS/WiFi/GSM+LP Heuristic+Equally-spaced GPS on Map TABLE II OPTIMAL AND HEURISTIC SCHEMES Figure 3(a) reports the optimal localization error averaged over all mobility traces. Figure 3(b) present the performance
5 Fig. 3. ALE (a) Deviant Path Optimal Schemes, (b) Deviant Path Heuristics, (c) Individual Mobility Profile. of online heuristics. We make the following observations. As mentioned earlier, OptWiFi consistently outperforms OptGPS. This trend holds for linear prediction as well. We conclude that, if scheduled carefully, WiFi offers better energyefficient localization than GPS/GSM. Linear prediction performs well even for mobility traces that take frequent turns. We examined the optimal schedule for staircase like movements. When the distances between consecutive turns were short, the linear predictor approximated the movement with a straight line cutting diagonally through the staircase. If the trace has long stretches of straight lines, the Opt-LP schemes naturally predict well, scheduling 2 consecutive readings at the beginning of each straight line. When using probability maps, the optimal ALE is small. This is because the number of mis-predictions (at the intersections) are typically fewer than the number of location readings permitted by the budget. As a result, Opt-Map schedules a location reading wherever there is a mis-prediction. We assumed that the velocity of the phone can be perfectly predicted, and hence, errors arise only after mis-predictions. Consistent with our earlier observation, Heu-Eq-WiFi outperforms both Heu-Eq-GPS and Heu-Eq-GSM. However, note that EnLoc-Eq-Map outperforms Heu-Eq-WiFi, indicating that heuristics based on probability maps are effective for achieving energy-efficient localization. Habitual Mobility We present the localization error when a person s mobility profile is utilized for prediction. We use an anonymous student s mobility profile derived from 30 days of traces. We processed her mobility traces and manually generated the logical mobility tree (LMT). For each day, we executed the Mobility Profile Heuristic. Figure 3(c) shows that for the allocated energy budget of 25% for 24-hours the average localization error averages around 12m. VI. LIMITATIONS AND FUTURE WORK We discuss the key limitations of our current approach: We assumed that while moving along a predicted path, the location of the phone is accurately tracked. In reality, varying speeds or pauses cause this prediction to be imprecise. Our evaluation results do not account for these errors. Nonetheless, with accelerometers available on modern phones, speed variations may be estimated and used for accurate prediction [9]. Moreover, compasses may be able to dynamically sense the movement/orientation of a person, and obviate EnLocspecified GPS readings. For instance, a GPS reading scheduled after an intersection can be eliminated if the compass provides the orientation of the user, indicating that the user took a left turn. Since compasses/accelerometers can be less energyhungry, they may present opportunities for dynamic, adaptive localization (as opposed to the static schedule in EnLoc). EnLoc does not proactively identify deviations from habitual paths. Techniques are necessary to quickly detect departures without investing excessive energy. Phone sensors may again be effective here. If the phone behaves differently from its habitual behavior at that time, EnLoc may suspect deviation and schedule a sensor reading. We are investigating these possibilities in our ongoing work. Probability maps may be harder to generate for places unlike university campuses (a town or city). Location updates gathered over time from many mobile phones and statistics from transportation departments may be useful. Lastly, the mobility profile used in EnLoc are those of graduate students, and may be less diverse (more predictable) than that of a traveling salesman. Thus, the reported errors may be optimistic. However, we believe that the algorithms/results presented in this paper validate the intuition that individual mobility profiling and large population statistics are an effective tool for energy-efficient localization. REFERENCES [1] S. Gaonkar, J. Li, R. R. Choudhury, L. Cox, and A. Schmidt, Microblog: Sharing and querying content through mobile phones and social participation, in ACM MobiSys, [2] T. Sohn, K. A. Li, G. Lee, I. E. Smith, J. Scott, and W. G. Griswold, Place-its: A study of location-based reminders on mobile phones, in Ubicomp, [3] J. Yoon, B. Noble, and M. Liu, Surface street traffic estimation. in MobiSys 07, 2007, pp [4] J. Eriksson, L. Girod, B. Hull, R. Newton, H. Balakrishnan, and S. Madden, The pothole patrol: Using a mobile sensor network for road surface monitoring, in ACM MobiSys, [5] Y.-C. Cheng, Y. Chawathe, A. LaMarca, and J. Krumm, Accuracy characterization for metropolitan-scale wi-fi localization, in MobiSys, [6] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, Understanding individual human mobility patterns, Nature, vol. 453, [7] H. Lee, M. Wicke, B. Kusy, and L. Guibas, Localization of mobile users using trajectory matching, in ACM MELT, [8] I. Burbey and T. Martin, Predicting future locations using predictionby-partial-match, in ACM MELT, 08. [9] A. Ofstad, E. Nicholas, R. Szcodronski, and R. R. Choudhury, Aampl: Accelerometer augmented mobile phone localization, in ACM MELT Workshop (in conjunction with Mobicom), 2008.
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
MOBILITY DATA MODELING AND REPRESENTATION
PART I MOBILITY DATA MODELING AND REPRESENTATION 1 Trajectories and Their Representations Stefano Spaccapietra, Christine Parent, and Laura Spinsanti 1.1 Introduction For a long time, applications have
Towards Mobile Phone Localization without War-Driving
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceedings This paper was presented as part of the
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University [email protected] [email protected] ABSTRACT Depending
Comparative Study of GPS Positioning For Vehicles with Algorithms in Global and Local Position
Comparative Study of GPS Positioning For Vehicles with Algorithms in Global and Local Position Manoher Kumar bishwas MCA Final Year Veltech Technical University Avadi,Chnnai-62 [email protected]
Improving Energy Efficiency of Location Sensing On Mobile Phone Using Machine Learning Techniques
Improving Energy Efficiency of Location Sensing On Mobile Phone Using Machine Learning Techniques D.A.Parthiban 1, J.SenthilMurugan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai,
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking By Bill Dussell Director, Integrated Products Trimble Navigation 15-December-2003 1997 2003, Trimble Navigation Limited.
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
Risk Management for IT Security: When Theory Meets Practice
Risk Management for IT Security: When Theory Meets Practice Anil Kumar Chorppath Technical University of Munich Munich, Germany Email: [email protected] Tansu Alpcan The University of Melbourne Melbourne,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Machine Tool Inspection & Analyzer solutions
Machine Tool Inspection & Analyzer solutions Introduction IBS Precision Engineering machine tool inspection series offers a range of products to provide peace of mind and control to machine operators by
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
WAIT-TIME ANALYSIS METHOD: NEW BEST PRACTICE FOR APPLICATION PERFORMANCE MANAGEMENT
WAIT-TIME ANALYSIS METHOD: NEW BEST PRACTICE FOR APPLICATION PERFORMANCE MANAGEMENT INTRODUCTION TO WAIT-TIME METHODS Until very recently, tuning of IT application performance has been largely a guessing
Zorba Asset Tracking Solution
Asset Tracking Solution State-of-the art fleet management and vehicle tracking solution to increase your productivity. Affordable installation and operating costs Easy to install and operate User friendly
A Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour
A Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour Adnan K. Shaout and Adam E. Bodenmiller The Electrical and Computer Engineering Department The University of Michigan-Dearborn
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Data Structures for Moving Objects
Data Structures for Moving Objects Pankaj K. Agarwal Department of Computer Science Duke University Geometric Data Structures S: Set of geometric objects Points, segments, polygons Ask several queries
Big Data Analytics in Mobile Environments
1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,
The Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
Runtime Hardware Reconfiguration using Machine Learning
Runtime Hardware Reconfiguration using Machine Learning Tanmay Gangwani University of Illinois, Urbana-Champaign [email protected] Abstract Tailoring the machine hardware to varying needs of the software
Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR:
Estimation of Human Mobility Patterns and Attributes Analyzing Anonymized Mobile Phone CDR: Developing Real-time Census from Crowds of Greater Dhaka Ayumi Arai 1 and Ryosuke Shibasaki 1,2 1 Department
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
A Low Cost Vehicle Monitoring System for Fixed Routes Using Global Positioning System (GPS)
A Low Cost Vehicle Monitoring System for Fixed Routes Using Global Positioning System (GPS) Mark Darren Savuriar, Chandrasekharan Nataraj, Chitturi Venkatratnam, Sardar Ali School of Engineering Asia Pacific
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
VEHICLE ROUTING PROBLEM
VEHICLE ROUTING PROBLEM Readings: E&M 0 Topics: versus TSP Solution methods Decision support systems for Relationship between TSP and Vehicle routing problem () is similar to the Traveling salesman problem
Study and Calculation of Travel Time Reliability Measures
Center for Applied Demography & Survey Research University of Delaware Study and Calculation of Travel Time Reliability Measures by David P. Racca Daniel T. Brown Prepared for the Delaware Department of
People centric sensing Leveraging mobile technologies to infer human activities. Applications. History of Sensing Platforms
People centric sensing People centric sensing Leveraging mobile technologies to infer human activities People centric sensing will help [ ] by enabling a different way to sense, learn, visualize, and share
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Keywords: Mobility Prediction, Location Prediction, Data Mining etc
Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Mining Approach
CRASHING-RISK-MODELING SOFTWARE (CRMS)
International Journal of Science, Environment and Technology, Vol. 4, No 2, 2015, 501 508 ISSN 2278-3687 (O) 2277-663X (P) CRASHING-RISK-MODELING SOFTWARE (CRMS) Nabil Semaan 1, Najib Georges 2 and Joe
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Using Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
Special Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
Adaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
NEMDE INTERCONNECTOR NON-PHYSICAL LOSS MODEL CHANGES - BUSINESS SPECIFICATION
NEMDE INTERCONNECTOR NON-PHYSICAL LOSS MODEL CHANGES - BUSINESS SPECIFICATION PREPARED BY: DOCUMENT NO: 173-0190 VERSION NO: 1.03 EFFECTIVE DATE: 01/07/2010 ENTER STATUS: Market Operations Performance
Load Balancing in Distributed Data Base and Distributed Computing System
Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located
RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS
RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS ABSTRACT Emanuel Herteliu 1 Mihai Liviu Despa 2 This paper tackles the subject of risk management in the specific context of
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
TRACKING AND SECURITY SYSTEM
TRACKING AND SECURITY SYSTEM WHAT IS PERGO? Pergo is the security system software and hardware developed in Turkey by Turkish engineers, which has special capabilities to identify the location of any attached
Advanced Car Parking System with GSM Supported Slot Messenger
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735Volume 10, Issue 1, Ver II (Jan - Feb 2015), PP 14-18 wwwiosrjournalsorg Advanced Car Parking System
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Mining Mobile Group Patterns: A Trajectory-Based Approach
Mining Mobile Group Patterns: A Trajectory-Based Approach San-Yih Hwang, Ying-Han Liu, Jeng-Kuen Chiu, and Ee-Peng Lim Department of Information Management National Sun Yat-Sen University, Kaohsiung, Taiwan
Visualization Method of Trajectory Data Based on GML, KML
Visualization Method of Trajectory Data Based on GML, KML Junhuai Li, Jinqin Wang, Lei Yu, Rui Qi, and Jing Zhang School of Computer Science & Engineering, Xi'an University of Technology, Xi'an 710048,
A Determination of g, the Acceleration Due to Gravity, from Newton's Laws of Motion
A Determination of g, the Acceleration Due to Gravity, from Newton's Laws of Motion Objective In the experiment you will determine the cart acceleration, a, and the friction force, f, experimentally for
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
Mobile Node Localization Using Cooperation and Static Beacons
Mobile Node Localization Using Cooperation and Static Beacons Troy Johnson Department of Computer Science Central Michigan University Mount Pleasant, MI 8859 [email protected] Patrick Seeling Department
A PPM-like, tag-based branch predictor
Journal of Instruction-Level Parallelism 7 (25) 1-1 Submitted 1/5; published 4/5 A PPM-like, tag-based branch predictor Pierre Michaud IRISA/INRIA Campus de Beaulieu, Rennes 35, France [email protected]
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT
MOBILE DATA FORECASTING TOOLS AND METHODOLOGY TO IMPROVE ACCURACY AND OPTIMIZE PROFIT STRATEGIC WHITE PAPER As wireless network operators are faced with enormous CAPEX and OPEX decisions, effective and
Revenue Management for Transportation Problems
Revenue Management for Transportation Problems Francesca Guerriero Giovanna Miglionico Filomena Olivito Department of Electronic Informatics and Systems, University of Calabria Via P. Bucci, 87036 Rende
MCTA: Target Tracking Algorithm based on
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
Resource Library. Consumer Location-Based Analytics Deliver Actionable Insights. From Platt Retail Institute s. Bringing Research to Retail SM
From Platt Retail Institute s Resource Library Bringing Research to Retail SM See the entire PRI Resource Library at www.plattretailinstitute.org/library. Consumer Location-Based Analytics Deliver Actionable
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Discrete-Event Simulation
Discrete-Event Simulation Prateek Sharma Abstract: Simulation can be regarded as the emulation of the behavior of a real-world system over an interval of time. The process of simulation relies upon the
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Backbone Capacity Planning Methodology and Process
Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
Vehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
BENEFIT OF DYNAMIC USE CASES TO EARLY DESIGN A DRIVING ASSISTANCE SYSTEM FOR PEDESTRIAN/TRUCK COLLISION AVOIDANCE
BENEFIT OF DYNAMIC USE CASES TO EARLY DESIGN A DRIVING ASSISTANCE SYSTEM FOR PEDESTRIAN/TRUCK COLLISION AVOIDANCE Hélène Tattegrain, Arnaud Bonnard, Benoit Mathern, LESCOT, INRETS France Paper Number 09-0489
