CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady.

Slides:



Advertisements
Similar presentations
Instructors: Connie Hutchison & Christopher McCoy
Advertisements

RADAR: An In-Building RF-based User Location and Tracking System.
Data Communication lecture10
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
Google Docs is a free, web-based office suite offered by Google within its Google Drive service. It was formerly a storage service as well, but has since.
Programming with Alice Computing Institute for K-12 Teachers Summer 2011 Workshop.
Important concepts in software engineering The tools to make it easy to apply common sense!
A wonderful informal assessment tool! Created by Joell Wilkins using the Apple app, so please note Android apps might be different. This powerpoint may.
TEMPLATE DESIGN © The computation of the confidence over K multiple scans is computed as if all scene points came from.
Demand Management and Forecasting
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
1 CEN4500 Experiment 2: Bluetooth Device Discovery and Analysis Dr. Ahmed Helmy Introduced by Sungwook Moon Jeeyoung Kim Wei-jen Hsu.
Installation Walk-Through Step 1 – Download the Installation Files
The Examination of Residuals. Examination of Residuals The fitting of models to data is done using an iterative approach. The first step is to fit a simple.
Examining data using Microsoft Access Queries Using Criteria and Calculations SESSION 3.2 This section covers specifying an exact match condition in a.
CS 350, slide set 5 M. Overstreet Old Dominion University Spring 2005.
OPERATING TERMS OF THE COMPUTER Exit Ticket AB Re-teach.
Tarun Bansal, Bo Chen and Prasun Sinha
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
MUzima INSTALLATION BY RUTH KEITANY 10/29/20151 mUzima Installation.
Advanced Topics- Functions Introduction to MATLAB 7 Engineering 161.
Stat 112: Notes 2 Today’s class: Section 3.3. –Full description of simple linear regression model. –Checking the assumptions of the simple linear regression.
Path loss & shadowing By eng : mahmoud abdel aziz.
Lesson 1 Operating Systems, Part 1. Objectives Describe and list different operating systems Understand file extensions Manage files and folders.
Performance Study of Localization Techniques in Zigbee Wireless Sensor Networks Ray Holguin Electrical Engineering Major Dr. Hong Huang Advisor.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Enzymes Activity: Chew on This!
Google Classroom Getting started with Google LMS..
CSC 480 Software Engineering PSP Project 1 August 20, 2004.
Chapter 13 Lesson 1 Motion GLE: SWBAT Distinguish between speed and velocity Summarize the difference between the speed and velocity based on.
Manual Computer-Based Homework Assignment Tracking Signals Turner Industries Due on, or before February 19th.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
How To Make Easysite Forms By Joshua Crawley Contact:
Evaluation of count scores for weight matrix motifs Project Presentation for CS598SS Hong Cheng and Qiaozhu Mei.
Solid Modeling SolidWorks Layout ENGR 1182 SolidWorks 01.
Orders – Create Responses Boeing Supply Chain Platform (BSCP) Detailed Training July 2016.
ACT Science Reasoning Basic Format 1. Expectations this AFTERNOON 1.NO CELL PHONES 2.STAY IN YOUR ASSIGNED SEAT 3.NO TALKING WITHOUT PERMISSION 4.HAVE.
Keys and adding, deleting and modifying records in an array ● Record Keys ● Reading and Adding Records ● Partition or Sentinels Marking Space in Use ●
Microsoft Access 2007 Introduction to Database. What is a Database? Database--A Collection of Tables Usually Associated With a General Topic Database.
Development Environment
Component 1.6.
Mobile Testing - Bug Report
BUS 308 mentor innovative education/bus308mentor.com
Jacob R. Lorch Microsoft Research
Always Connected introduces Tigo SMART 3.0 This guide is interactive!
Design Your Own Android App
Chapter P Introduction What is Statistics?
Arab Open University 2nd Semester, M301 Unit 5
Chapter Topics 2.1 Designing a Program 2.2 Output, Input, and Variables 2.3 Variable Assignment and Calculations 2.4 Variable Declarations and Data Types.
Lab connect Session: LAB 3
Indoor Positioning Services + Location Based Recommendations
iOS LifeRhythm Data Collection
Information from Samples
vInspect Application Training
Inferences about Population Means
Always Connected introduces Tigo SMART 3.1 This guide is interactive!
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Two methods to observe tutorial
I Can See—Can’t You? 2.7H Date: 10/08/18
Sensor Controller for Obstacle Detection System
RADAR: An In-Building RF-based User Location and Tracking System
Spreadsheets, Modelling & Databases
COMP/ELEC 429/556 Fall 2017 Homework #2
Experiment: Networking Data Analytics
Nir Zaidman and Michael Tahar
SFTP file transfers for Imports and Exports.
Spatial Databases: Spatio-Temporal Databases
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
2.3. Measures of Dispersion (Variation):
Chapter 1: Creating a Program.
Presentation transcript:

CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady Instructor: Ahmed Helmy   [Note: typically experiments are done in groups, usually the same groups as the project group. One report is to be submitted per group. Several groups can work together especially when more than one device is needed, but will submit different reports (and can refer to and credit one another).] Introduction The goal of this experiment is to gain hands-on experience in collecting Bluetooth encounter traces using classic Bluetooth and Low Energy Bluetooth. The experiment consists of two parts: 1- simple trace collection and 2- collecting encounters scenarios between two specific devices.  Three applications are needed: a. Classic Bluetooth Scanner, b. Bluetooth Low Energy Advertiser and c. Scanner.

Encounter Bluetooth Collection Application: 1) Classic Bluetooth: This is an application for scanning other Bluetooth encounters. The classic Bluetooth scanner will scan for other Bluetooth encounters and will save the following data into a file: Time of encounter Scanner Bluetooth MAC Address Scanned Device Bluetooth MAC Address Name of the scanned device Received Signal Strength Indicator (RSSI) You do not need an advertiser to send a Bluetooth signal. Just turn on the Bluetooth Device. The Device will scan and send its Bluetooth data. Note that the other device MAC is an actual MAC address of the other devices. (EncountersScanner/BluetoothData.txt)

2) Bluetooth Low Energy (BLE) Applications: There are two applications: 1- the advertiser: for sending Bluetooth Advertisement, and 2- the scanner for scanning for Bluetooth encounter.   i- Advertising Application: Can send advertisements using transmission powers: high, medium, low, ultra-low. Advertisement include the transmission power (Tx-power), anonymous MAC address (not the actual device MAC), and the device name. Note: assign a distinguishable name for your device Bluetooth ii- Scanning Application: The scanning application has a similar interface as the classic Bluetooth applications, but it scans for BLE advertisements. The scanner will record the following encountered device data: Time Encountered Device Name (Enc. Name) Encountered Device MAC Address (Enc. MAC) The transmission power of the received Advertisement( Tx power) The Received Signal Strength indicator (RSSI) The information will be saved in (AScanningTXLab1/BluetoothData.txt)

Manual Logging (ground truth!) Both of the scanners has manual logging to log the time, either for the experiment or for the encounter. For example, start experiment one: Click number one, when you finish click one again. The data will be saved in txt file  "record.txt" under the folder generated by the scanner.

Part I: Bluetooth encounter trace collection This part is to introduce you to the encounter collection for both classic Bluetooth and BLE. Your goal is to compare and contrast the scanning result for both of them.   1.     Spend some time (around 10 days) running scanners around the campus. 2.     Answer the following questions: 1) How many encounters have been recorded in each scanner. (plot over time, days, hrs) 2) How many unique encounters. (plot over time) 3) What is the average number of scanned records; (how many records have been scanned per minutes in each scanner) 4) What is the max, min, mean of RSSI collected by scanners. (plot the distribution)

Part II: Scanning Scenarios for Two specific devices This part needs two devices and two users to perform the operation. (Several groups can team together if there is need for that). Also, the layout of the place needs to be known. We recommend the computer science hallway. The scenarios is described below:   Scenarios: -       1st Scenario: Two users walking next to each other. -       2nd Scenarios: Two users walking in different/opposite directions, but encounter for sometime. When you start the experiment, use a manual log (‘1’ for example). Then, when you end click it again (to toggle it off). Also, when encountering in the second scenarios (use manual log to click when you encounter and when you end). Classic Bluetooth Experiment: The two users have to run the scanner application on each scenario. Filter the scanned data to include the other user device only. Compare the data from each user for each scenario and plot them.

Part II: Scanning Scenarios for Two specific devices (continued) BLE Experiment: One user runs the advertisement App, the other user will run the BLE scanner app. Each scenario has to be run for four times. (one time for each transmission power). Each five minutes, click the advertisement button since the advertisement will stop after five minutes. Also, filter the collected data to include only the device that sent the advertisement. (You can filter using the device name, and not the MAC address ) Compare the collected data, and plot the received RSSI on each experiment.   Questions: -Can you deduce the scenario from the collected data? For example, by looking at the encounter data only, can you tell if the users are moving next to each other, or if the users just encounter each other, and for how long? - How can you use the transmission power and RSSI sent in the BLE to estimate the encounters between two users?

Part III: Distance Estimation from RSSI There are several models that have been used to estimate the distance from the RSSI. In this experiment, place the devices within a specific distance from each other: 0.5m, 1m, …[X]. Plot the RSSI against the distance. Select a model [log shadowing model, Android beacon Library, or a regression model]. Compute the Mean Absolute Error of predicted distances.

Log Shadowing Model: The popular model that describe the relationship of distance to the RSSI. Where d=distance, A=The average RSSI, when devices are one meter apart. n=path loss exponent. n=2. [free space].

Android Beacons Library: A,B and C are constants, r =RSSI, and t is the average RSSI, when devices are one meter apart. New (Most Recent Version)-2017 Old (Previous Research)-2015

Part IV: Constructing a Mobility Scenario from scanned RSSI and TX power Assume Z, X and Y are location points. The distance between X to Z or Y should be more than M meters. Z---------------------- X-----------------------Y   Place the Scanner on X, and use the advertiser to preform the following mobility scenarios. Scenario 1: Walk in normal speed from points (Z to Y), without stopping. Scenario 2: In this scenario, stop at X for a period of time P; Let P= M minutes. Then, move to Y] - Run the above experiment several times using Classic Bluetooth. Then, run it using the BLE using a different TX_power setting. - Explain how you can infer the scenarios using the RSSI. - Is classic Bluetooth or BLE more accurate to construct the scenario? In case of BLE, which value of TX_power is more accurate for tracking purposes?

Part V: Make your extension to the experiment (extra points)  Come up with other scenarios, and estimate the encounters' duration between devices. Can you come with an algorithm that deduces the scenarios of face-to-face encounters out of Bluetooth encounter data? Some real encounters might not be recorded by Bluetooth scanning, can you come up with an algorithm that estimates the encounters that are not reported in the Bluetooth encounter data using the data that collected by the Bluetooth device.