Coverage and Distinguishability in Traffic Flow Monitoring

Slides:



Advertisements
Similar presentations
Approximation algorithms for geometric intersection graphs.
Advertisements

Improved Approximation for Orienting Mixed Graphs Iftah Gamzu CS Division, The Open Univ., and CS School, Tel-Aviv University Moti Medina EE School, Tel-Aviv.
Recap: Mining association rules from large datasets
Mining Compressed Frequent- Pattern Sets Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign.
Fundamental tools: clustering
Approximations of points and polygonal chains
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Online Distributed Sensor Selection Daniel Golovin, Matthew Faulkner, Andreas Krause theory and practice collide 1.
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
A Decentralised Coordination Algorithm for Maximising Sensor Coverage in Large Sensor Networks Ruben Stranders, Alex Rogers and Nicholas R. Jennings School.
Discussion based on :-.  Polynomial time algorithms for SOP and SOP-TW that have a poly-logarithmic approximation ratio.  An O(log2 k) approximation.
[1][1][1][1] Lecture 5-7: Cell Planning of Cellular Networks June 22 + July 6, Introduction to Algorithmic Wireless Communications David Amzallag.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Data Flow Analysis Compiler Design Nov. 8, 2005.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Efficient Gathering of Correlated Data in Sensor Networks
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
Algorithms  Al-Khwarizmi, arab mathematician, 8 th century  Wrote a book: al-kitab… from which the word Algebra comes  Oldest algorithm: Euclidian algorithm.
Approximation Algorithms
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Greedy Algorithms and Matroids Andreas Klappenecker.
Connected Dominating Sets. Motivation for Constructing CDS.
1 Short Term Scheduling. 2  Planning horizon is short  Multiple unique jobs (tasks) with varying processing times and due dates  Multiple unique jobs.
Randomized Composable Core-sets for Submodular Maximization Morteza Zadimoghaddam and Vahab Mirrokni Google Research New York.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
Minimizing Delay in Shared Pipelines Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) Yoram Revah, Aviran Kadosh.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Locating network monitors: complexity, heuristics, and coverage Kyoungwon Suh Yang Guo Jim Kurose Don Towsley.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
Exercise 1: Maximum element for the following code a- what is the basic operation? b- what is C(n)? d-what is the running time?
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
TU/e Algorithms (2IL15) – Lecture 11 1 Approximation Algorithms.
Approximation Algorithms
Prof. Yu-Chee Tseng Department of Computer Science
Presented by: Mi Tian, Deepan Sanghavi, Dhaval Dholakia
A Study of Group-Tree Matching in Large Scale Group Communications
Moran Feldman The Open University of Israel
RE-Tree: An Efficient Index Structure for Regular Expressions
Haim Kaplan and Uri Zwick
Maximal Independent Set
Distributed Submodular Maximization in Massive Datasets
Analysis and design of algorithm
Framework for the Secretary Problem on the Intersection of Matroids
Effective Social Network Quarantine with Minimal Isolation Costs
Bin Fu Department of Computer Science
Homework solution Problem 2. The number of odd degree vertices in a graph is even. (recom. book: G. Harary: Graph Theory) Solution: Let G=(V,E,w) S=vVdeg(v)
Conflict-Aware Event-Participant Arrangement
Connected Dominating Sets
Coverage Approximation Algorithms
Approximation Algorithms
Minimizing the Aggregate Movements for Interval Coverage
Rule Selection as Submodular Function
Maximum Lifetime of Sensor Networks with Adjustable Sensing Range
EE5900 Advanced Embedded System For Smart Infrastructure
Speaker : Lee Heon-Jong
Maximum Flow Neil Tang 4/8/2008
Clustering.
CS 6310 Advanced Design and Analysis of Algorithms Rajani Pingili
Submodular Maximization with Cardinality Constraints
Multiple Products.
Presentation transcript:

Coverage and Distinguishability in Traffic Flow Monitoring Huanyang Zheng, Wei Chang, and Jie Wu Dept. of Computer and Info. Sciences Temple University 1

Road Map 1. Introduction 2. Model and Formulation 3. Related Work 4. Problem Analysis and Algorithms 5. Experiments 6. Conclusion

1. Introduction Traffic flow monitoring system Multiple applications Camera and WiFi based monitor Roadside Unit (RSU) deployment Multiple applications Outdoor flow rate with flow trajectory Indoor tracking with beacon messages General network (SDN) monitoring

RSU placement RSU placement problem (given traffic flows) Coverage Each traffic flow goes through at least one RSU Distinguishability The set of bypassed RSUs is unique for each flow Objective Minimize the number of placed RSUs

Example 1 f1 : {e5, e6} f2 : {e3, e5} f3 : {e3, e4} f2 and f3 are covered, but not distinguishable f1 : {e5, e6} f2 : {e3, e5} f3 : {e3, e4}

Example 2 f1 : {e5, e6} f2 : {e3, e5} f3 : {e3, e4} f1, f2 and f3 are distinguishable, but f1 is uncovered f1 : {e5, e6} f2 : {e3, e5} f3 : {e3, e4}

2. Model and Formulation Graph G = (V, E) V: street intersections, and E: streets F = {f1, f2, …, fn} is a set of n known traffic flows on G S is a subset of E on which RSUs are placed S(f) is a subset of S that covers f

Another Example S = {e3, e5} with F = {f1, f2, f3} f1: {e5, e6} S(f1) = {e5} f2: {e3, e5} S(f2) = {e3, e5} f3: {e3, e4} S(f3) = {e3} All traffic flows are covered and distinguishable

Formulation Objective is minimizing the number of RSUs Coverage Each traffic flow goes through at least one RSU Distinguishability The set of bypassed RSUs is unique for each flow minimize |S| (# of RSUs) s.t. S(f) ≠ ∅ for ∀f ∈ F (coverage) S(f) ≠ S(f′) for f ≠ f′ (distinguishability)

3. Related Work: Set Cover Problem Use minimal sets to cover all elements Greedy algorithm with max marginal coverage has a ratio of log n due to submodularity Complexity: O(p2q) p: # of sets q: # of elements

Submodularity N(S): # of covered (and distinguishable) flows under S Monotonicity: N(S) ≤ N(S’) for ∀S ⊆ S’, S’ ⊆ E Submodularity: N(S∪{e})−N(S) ≥ N(S’∪{e})−N(S’) for ∀e∈E Monotonicity enables greedy approaches Submodularity ensures bounds

4. Problem Analysis and Algorithms NP-hard: reduction from the set cover problem Counter-example of submodularity using traditional coverage Existence case: S = {e1} and S’ = {e1, e4} N(S) = N(S ∪ {e2}) = N(S’) = 1, only f1 is covered N(S’ ∪ {e2}) = 4, all flows are covered/distinguishable N(S ∪ {e2}) − N(S) = 0 < N(S’ ∪ {e2}) − N(S’) = 3

2-out-of-3 principle Key idea: place pairwise distinguishability in coverage To cover and distinguish an arbitrary pair of traffic flows (f and f′), two RSUs should be placed on streets from two different subsets of f\f′, f′\f, and f ∩ f′.

2-out-of-3 Example Subsets To satisfy S(f1) ≠ ∅, S(f2) ≠ ∅, and S(f1) ≠ S(f2) S can have {e1, e3}, {e2, e4}, or {e5, e6} cannot have {e1, e5}, {e3, e4}, or {e2, e6}

Simple Algorithm Pair-Based Greedy (PBG) Idea: place a pair of RSUs in each greedy iteration Initialize S = ∅ while there exists a pair of traffic flows do Update S to place a pair of RSUs that cover and distinguish maximum pairs of traffic flows Remove corresponding pairs of traffic flows return S Element in submodular coverage: a pair of RSUs

PBG Performance Approximation ratio: n * ln [n(n-1)/2] n is the number of traffic flows Prove by converting to set cover problems Pair conversion brings a loss ratio of n, and set cover has a ratio of ln [n(n-1)/2] with n(n-1)/2 sets Time complexity: O(n2|E|3) Each greedy iteration visits |E|2 pairs of RSUs for n2 pairs of traffic flows, with |E| iterations.

3-out-of-3 Principle To cover and distinguish an arbitrary pair of traffic flows (f and f′), each of f, f′, and f△f′ = (f\f′)∪(f′\f) should include a street with a placed RSU.

3-out-of-3 Example Subsets To satisfy S(f1) ≠ ∅, S(f2) ≠ ∅, and S(f1) ≠ S(f2) S can have {e1, e3}, {e2, e4}, or {e5, e6} cannot have {e1, e5}, {e3, e4}, or {e2, e6}

Improved Algorithm Improved Subset-Based Greedy (ISBG) Idea: in each greedy iteration, place an RSU that is in maximal subsets of f, f′, and f △ f′ Initialize S = ∅ for each pair of traffic flows (say f and f’) do Generate subsets of f, f′, and f △ f′ while there exists a subset do Update S to place an RSU that is in maximal subsets, remove corresponding subsets return S Elements in submodular coverage: each RSU

ISBG Performance Approximation ratio: ln [n(n+1)/2] n is the number of traffic flows Prove by converting to set cover problems Perfect conversion, and set cover has a ratio of ln [n(n+1)/2] with n(n+1)/2 sets Time complexity: O(n2|E|2) Each greedy iteration visits |E| RSUs for n2 pairs of traffic flows, with |E| iterations

ISBG Example 1st iteration, e1 is added to S (appears in 4 subsets) 2nd iteration, e2 is added to S Terminate when S = {e1, e2} S(f1) = {e1, e2}, S(f2) = {e1}, and S(f3) = {e2}

5. Experiments Real data-driven: Dublin 80,000 × 80,000 square foot area 628 given traffic flows on 3,657 streets

Experiments (con’t) Real data-driven: Seattle 10,000 × 10,000 square foot area 135 given traffic flows on 2,283 streets

Comparison Algorithms Coverage-Oriented Greedy (COG): greedily covers all traffic flows, and then uniform-randomly place RSUs to distinguish them. O(n2|E|2) Two Stage Placement (TSP): greedily covers all traffic flows in the 1st stage, and then, greedily distinguishes all traffic flows in the 2nd stage. O(n2|E|2) Distinguishability-Oriented Greedy (DOG): greedily distinguishes pairs of traffic flows by placing an RSU at f △ f′ until all flows are distinguishable. O(n2|E|2)

5. Experiments Dublin (left) and Seattle (right) Smaller is the better Different flow patterns in Dublin and Seattle

6. Conclusion Minimize the number of RSUs Under coverage and distinguishability requirements NP-hard, monotonicity, but non-submodularity Different from classic submodular set cover problems Approximation algorithms Different intuitions and time complexities