+ All Categories
Home > Technology > Discovery of Convoys in Network Proximity Log

Discovery of Convoys in Network Proximity Log

Date post: 28-Nov-2014
Category:
Upload: coldbeans-software
View: 703 times
Download: 1 times
Share this document with a friend
Description:
Presentation for RUSMART 2013 This paper describes an algorithm for discovery of convoys in database with proximity log. Traditionally, discovery of convoys covers trajectories databases. This paper presents a model for context-aware browsing application based on the network proximity. Our model uses mobile phone as proximity sensor and proximity data replaces location information. As per our concept, any existing or even especially created wireless network node could be used as presence sensor that can discover access to some dynamic or user-generated content. Content revelation in this model depends on rules based on the proximity. Discovery of convoys in historical user’s logs provides a new class of rules for delivering local content to mobile subscribers
21
Discovery of Convoys in Network Proximity Log Dmitry Namiot Lomonosov Moscow State University [email protected] Manfred Sneps-Sneppe ZNIIS, M2M Competence Center [email protected] RUSMART 2013
Transcript
Page 1: Discovery of Convoys in Network Proximity Log

Discovery of Convoys in Network Proximity Log

Dmitry Namiot Lomonosov Moscow State [email protected]

Manfred Sneps-Sneppe ZNIIS, M2M Competence [email protected]

RUSMART 2013

Page 2: Discovery of Convoys in Network Proximity Log

• Discovery of convoys in database with proximity log. • Traditionally, discovery of convoys covers trajectories databases. This paper presents a model for context-aware browsing application based on the network proximity. • Can we restore trajectories by proximity time series? • How can we use proximity based trajectories in mobile services?

About

Page 3: Discovery of Convoys in Network Proximity Log

Contents

Introduction

Context and location awareness

Trajectories

Discovery process

Conclusion

Page 4: Discovery of Convoys in Network Proximity Log

Introduction

Our model uses mobile phone as proximity sensor and proximity data replaces location information

As per our concept, any existing or even especially created wireless network node could be used as presence sensor that can discover access to some dynamic or user-generated content.

Content revelation in this model depends on rules based on the proximity.

Page 5: Discovery of Convoys in Network Proximity Log

Proximity vs. Location

• Can we replace location with proximity?• And proximity here is the network proximity. • In other words: use mobile user’s position relatively network nodes (e.g. Wi-Fi access points). It is some metric lets us compare network environments• It may be more accurate than location-based computing (especially for indoor) • We can use dynamic nodes as our base (e.g. hotspot right on the mobile phone)

Page 6: Discovery of Convoys in Network Proximity Log

Proximity <> Location

• Open Wi-Fi Access Point right in the mobile

• Our data could be linked to this mobile hotspot

• In general, we do not need location for presenting data associated with proximity info

Page 7: Discovery of Convoys in Network Proximity Log

Spot Expert (SpotEx)

• We can the traditional indoor positioning schema on the first stage: detection of Wi-Fi networks? This detection already provides some information about the location – just due to local nature of Wi-Fi network.

• As the second step we can add the ability to describe some rules (if-then operators, or productions) related to the Wi-Fi access points.

Page 8: Discovery of Convoys in Network Proximity Log

SpotEx

• Our rules will simply use the fact that the particularly Wi-Fi network is detected. And based on this conclusion we will open (read – make them visible) some user-defined messages to mobile terminals.

• Actually it is a typical example for the context aware computing. The visibility for user-defined text (content) depends on the network context.

• This approach uses Wi-Fi proximity

• Any Wi-Fi hot spot works here just as presence sensor.

Page 9: Discovery of Convoys in Network Proximity Log

SpotExSo, our service contains the following components:

• database (store) with productions (rules) associated with Wi-Fi networks

• rule editor. Web application (including mobile web)that lets users add (edit) rule-set, associated with some Wi-Fi network

• mobile applications, that can detect Wi-Fi networks, check the current conditions against the database and execute productions

Page 10: Discovery of Convoys in Network Proximity Log

SpotEx – use cases

The most obvious use cases:• Some shop can deliver deals/discount/coupons right to mobile terminals as soon as the user is near some predefined point of sale.

We can describe this feature as “automatic check-in” for example. Rather than directly (manually or via some API) set own presence at some place (e.g. similar to Foursquare, Facebook Places, etc.) with SpotEx mobile users can pull data automaticallyand anonymously

Page 11: Discovery of Convoys in Network Proximity Log

SpotEx – use cases

• Campus admin can deliver news and special announces

• Hyper local news in Smart City projects could be tight (linked) to the public available networks and delivered information via that channel, etc.

• The most interesting (by our opinion, of course) use case: Wi-Fi hot spot being opened right on the mobile phone

Page 12: Discovery of Convoys in Network Proximity Log

SpotEx productions

Each rule looks like a production (if-then operator). The conditional part includes the following objects:

Wi-Fi network identity, signal strength (optionally), time of the day (optionally), client ID (MAC-address)History of visits

Page 13: Discovery of Convoys in Network Proximity Log

SpotEx productions

In other words it is a set of operators like:

IF network_SSID IS ‘mycafe’ AND time is 1pm – 2pm THEN { present the coupon for lunch }

It is like expert system. We can use well known algorithm for the processing: ReteConditional part contains predicates with proximity data. For example, rank of hot spots, etc.

Page 14: Discovery of Convoys in Network Proximity Log

Discovery of convoys

• Discovery of convoys in historical user’s logs provides a new class of rules for delivering local content to mobile subscribers• Simply, we should be able to provide a new set of predicates for our rules:

If IN_GROUP_OF (N, t) Then …N – describes a size of groupt – observed time interval

• A new set of use cases for proximity marketing

Page 15: Discovery of Convoys in Network Proximity Log

Convoys

• Convoy is a group of moving object where included objects are in density connection the consecutive time points

• Objects are density-connected if a sequence of objects exists that connects the two objects and the distance between consecutive objects does not exceed the given value.

Page 16: Discovery of Convoys in Network Proximity Log

More about convoys

• A group of objects form a traveling company, if members of the group are density-connected for themselves during some given time and the size of the group is not less than the given threshold.

• The moving cluster - a shared set of objects exists across some finite time, but objects may leave and join a cluster during the cluster’s life time

Page 17: Discovery of Convoys in Network Proximity Log

More about convoys

• Dynamic convoys allows dynamic members under constraints imposed by some parameters (actually, by user-defined parameters).

• An evolving convoy captures the relationship between different stages of convoys, so that convoys in some stage has more (fewer) members than its previous stage.

• Flock is a set of objects that travel within a range while keeping the same motion.

Page 18: Discovery of Convoys in Network Proximity Log

Group behavior

• Anyway, all patterns covering capturing Anyway, all patterns covering capturing “collaborative” or “group” behavior between moving “collaborative” or “group” behavior between moving objects. objects. • The difference between all the above mentioned The difference between all the above mentioned patterns is the way they define the relationship patterns is the way they define the relationship between the moving objects.between the moving objects.• In our paper we avoid restrictions on the sizes and In our paper we avoid restrictions on the sizes and shapes of the discovered trajectory patterns. shapes of the discovered trajectory patterns. • It is due to nature our data and the way they are It is due to nature our data and the way they are collectedcollected

Page 19: Discovery of Convoys in Network Proximity Log

Proximity ring

• Wi-Fi access point with omni-directional antenna

• Having proximity info only we cannot distinguish two groups that actually reached our access point from the opposite directions

• Convoy is a group of objects (mobile phones in this particular case) with the similar proximity track within the given time interval.

Page 20: Discovery of Convoys in Network Proximity Log

Proximity convoys

• It is consistent movement where the key metric is the relative proximity of an access point.

• Two proximity tracks (sequences of proximity records) are similar on some time interval if for the each sequential measurement in the first track we can get a sequential measurement from the second track for approximately the same timestamp where two networks snapshots have at least one pair of comparable Wi-Fi measurements.

Page 21: Discovery of Convoys in Network Proximity Log

About us

International team: Russia - Latvia International team: Russia - Latvia ((Moscow – Moscow – Riga – VentspilsRiga – Ventspils). ). Big history of developing Big history of developing innovative telecom and software services, innovative telecom and software services, international contests awards international contests awards

Research areas are: Research areas are:

open API for telecom, open API for telecom, web access for telecom data, web access for telecom data, Smart Cities, Smart Cities, M2M applications, context-aware computingM2M applications, context-aware computing..


Recommended