Laboratoire d'InfoRmatique en Images et Systèmes d'information UMR 5205 03/06/2015 Vasile-Marian Scuturici and Dejene Ejigu LIRIS-UMR 5205 CNRS, INSA de.

Slides:



Advertisements
Similar presentations
Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Advertisements

Configuration management
Genoa, Italy September 2-4, th IEEE International Conference on Advanced Video and Signal Based Surveillance Combination of Roadside and In-Vehicle.
Active Appearance Models
AirPlace Kyriakos Georgiou Athina Paphitou Maria Christodoulou
Localization with RSSI Method at Wireless Sensor Networks Osman Ceylan Electronics Engineering PhD Student, Istanbul Technical University, Turkiye
Integrating Educational Technology into the Curriculum
Ying Wang EDN 303 Fall Objectives Define curriculum-specific learning Explain the difference between computer, information, and integration literacy.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Dieter Pfoser, LBS Workshop1 Issues in the Management of Moving Point Objects Dieter Pfoser Nykredit Center for Database Research Aalborg University, Denmark.
Visualization of Wireless Computer Networks Dunbar, Matt D., Kansas Applied Remote Sensing Program and University of Kansas Geography Department, and Becker,
PGDay Paper Presentation Enhanced Location Estimation in Wireless LAN environment using Hybrid method Department of Computer Science Hong Kong Baptist.
Chapter 1 Assuming the Role of the Systems Analyst
ICPCA 2008 Research of architecture for digital campus LBS in Pervasive Computing Environment 1.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Oral Defense by Sunny Tang 15 Aug 2003
Data: A collection of raw facts and figures. It may consist of numbers, characters, symbols or pictures. Information: Organized and processed form of.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Data Mining Techniques
HOW DO INFORMATION SYSTEM SUPPORT THE MAJOR BUSINESS FUNCTION?
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 5 Engineering Tools for Electrical and Computer Engineers.
Patient Location via Received Signal Strength (RSS) Analysis Dan Albano, Chris Comeau, Jeramie Ianelli, Sean Palastro Project Advisor Taib Znati Tuesday.
September 29, 2002Ubicomp 021 NIST Meeting Data Collection Jean Scholtz National Institute of Standards and Technology Gaithersburg, MD USA.
1 Location Estimation in ZigBee Network Based on Fingerprinting Department of Computer Science and Information Engineering National Cheng Kung University,
Projekt User location estimation by means of WLAN Carl-Friedrich-Gauss-Str Kamp-Lintfort Germany Dennis Vredeveld IMST GmbH IMST ipos.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
GROUP 1 Advantages of electronic system over its corresponding traditional system.
Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa)‏ www-kdd.isti.cnr.it Anna Monreale Fabio Pinelli Roberto Trasarti Fosca Giannotti A. Monreale,
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
Hybrid Approach to Collaborative Context-Aware Service Platform for Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire LIRIS-UMR-CNRS.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
SIMO SIMulation and Optimization ”New generation forest planning system” Antti Mäkinen & Jussi Rasinmäki Dept. of Forest Resource Management.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
PIMRC 2007 A lightweight approach for providing Location Based Content Retrieval Anastasios Zafeiropoulos, Emmanuel Solidakis, Stavroula Zoi, Nikolaos.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Chapter 1 An Introduction to Information Systems
Cognitive Radio: Next Generation Communication System
CoCA: A Collaborative Context- Aware Service Platform for Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire LIRIS-UMR-CNRS.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
0 / Database Management. 1 / Identify file maintenance techniques Discuss the terms character, field, record, and table Describe characteristics.
Jin Yan Embedded and Pervasive Computing Center
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
Web: ~ laoudias/pages/platform.htmlhttp://www2.ucy.ac.cy/ ~ laoudias/pages/platform.html
TIU Tracking System Introduction Intel's large and complex validation labs contain many Testing Interface Unit's(TIU) used in validating hardware. A TIU.
Lyon Research Center for Images and Intelligent Information Systems IEEE International Conference on Pervasive Services 2006 FRE 2672 INSA Lyon ICPS, 27.
Cooperative Location-Sensing for Wireless Networks Charalampos Fretzagias and Maria Papadopouli Department of Computer Science University of North Carolina.
Learning A Better Compiler Predicting Unroll Factors using Supervised Classification And Integrating CPU and L2 Cache Voltage Scaling using Machine Learning.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance IEEE Mobile Data Management 2013 Artur Baniukevic†, Christian S. Jensen‡,
Data Mining Techniques Applied in Advanced Manufacturing PRESENT BY WEI SUN.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
Data Warehouse.
Mobile Computing.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Denial-of-Service Jammer Detector Training Course Worldsensing
RFID Object Localization
Presentation transcript:

Laboratoire d'InfoRmatique en Images et Systèmes d'information UMR /06/2015 Vasile-Marian Scuturici and Dejene Ejigu LIRIS-UMR 5205 CNRS, INSA de Lyon Positioning Support in Pervasive Environments Presented at ICPS'06 IEEE International Conference on Pervasive Services June 2006, Lyon, France

03/06/2015 Topics Background  Pervasive computing  Positioning needs  Related works Background  Pervasive computing  Positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Model for indoor location detection  Learning phase  Prediction Phase Experimental results and usage scenario Conclusions and future work

03/06/2015 What is pervasive computing? Typical view of a pervasive environment crowded with varieties of ubiquitous devices surrounding a user. A computing trend towards using increasingly ubiquitous and interconnected computing devices in the environment. Enhanced by a convergence of advanced electronic, wireless technologies, and the Internet. Devices involved are very tiny, sometimes invisible, either mobile or embedded in almost any type of object imaginable.

03/06/2015 Positioning needs … PSAQL in our platform PerSE to express user intensions: USE sunrise.ppt ON BASE notebook WITH SERVICE projector PSAQL in our platform PerSE to express user intensions: USE sunrise.ppt ON BASE notebook WITH SERVICE projector To ensure neighbourhood constraint, the query can be rewritten as: USE sunrise.ppt ON BASE notebook WITH SERVICE projector IN NEIGHBOURHOOD To ensure neighbourhood constraint, the query can be rewritten as: USE sunrise.ppt ON BASE notebook WITH SERVICE projector IN NEIGHBOURHOOD Here the user assumes that the video projector is situated in the same visually and physically accessible space

03/06/2015 Positioning needs … The question is: How can the NEIGHBOURHOOD space be identified in PerSE? The question is: How can the NEIGHBOURHOOD space be identified in PerSE? Neighbourhood relation here is expressed not by the physical proximity like in coordinate positioning system but by perception of the presence in the same bounded space/room.

03/06/2015 Related works Among localization and distance measuring methods are:  Global Positioning Systems  Radio Frequency (RF) delay measurement  Association to nearest Access Point  Received RF signal strength Among localization and distance measuring methods are:  Global Positioning Systems  Radio Frequency (RF) delay measurement  Association to nearest Access Point  Received RF signal strength GPS systems are good for outdoor positioning services The others are based on triangulation or TIX methods and they assume prior knowledge of position of the access point infrastructure GPS systems are good for outdoor positioning services The others are based on triangulation or TIX methods and they assume prior knowledge of position of the access point infrastructure

03/06/2015 Topics Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Model for indoor location detection  Learning phase  Prediction Phase Experimental results and u sage scenario Conclusions and future work

03/06/2015 Modeling indoor positioning Learning phase: data is collected, classified to create the prediction model Prediction phase: Location prediction based on the real-time data values Learning phase: data is collected, classified to create the prediction model Prediction phase: Location prediction based on the real-time data values Architecture of our learning and prediction model Does not assume prior knowledge of position of APs Based on database methods Does not assume prior knowledge of position of APs Based on database methods (eg. PDA_David locatedIn Common_Room)

03/06/2015 Learning phase … Topology of the floors used in our experiments A person holding a PDA moves around the rooms in the building including meeting halls, offices, common rooms, printing rooms and corridors Our WiFi-Spotter and management program is used to track, process and store received signal strength from all n visible access points at each tracking location.

03/06/2015 … Learning phase … For each tracking point i in room k, we have a vector with the signal strength values from the APs and a label corresponding to the literal name of the place (room) where the point is situated. Sample attribute-value table showing tracked values.

03/06/2015 … Learning phase Signal strength values are classified for pattern identification using data mining tool (MCubiX implementation of the decision tree algorithm). The result from this process is our working model that can later be used for real-time location detection. The model is represented in the predictive model mark-up language – PMML - format.

03/06/2015 Prediction phase The two important input parameters for prediction are:  Decision rules obtained from the prediction model  Real-time signal strength values collected at a specific location The two important input parameters for prediction are:  Decision rules obtained from the prediction model  Real-time signal strength values collected at a specific location Sample prediction model using two APs and three rooms.

03/06/2015 Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Topics Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Model for indoor location detection  Learning phase  Prediction Phase Experimental results and u sage scenario Conclusions and future work

03/06/2015 Experimental results … The size of the PMML file containing the model generated after about 4 hours of tracking experiment using three devices is about 320 KB (200rules) and it is within the storage range of mobile devices. Using a cross validation, the results are very encouraging with the error rate below 5%, corresponding to a 95% hit rate. The size of the PMML file containing the model generated after about 4 hours of tracking experiment using three devices is about 320 KB (200rules) and it is within the storage range of mobile devices. Using a cross validation, the results are very encouraging with the error rate below 5%, corresponding to a 95% hit rate. Sample rules generated as a prediction model

03/06/2015 … Experimental results Using the Principal Component Analysis (PCA) algorithm, projection of multidimensional data from all visible APIs into 2 dimensions space shows that the data is well separable.

03/06/2015 Usage scenario … Consider a scenario where Dave is given a multimedia entertainment service on his PDA while he is in the common room for the tea break. SHARE SERVICE multimedia_player ON BASE LOCALHOST WITH SERVICE multimedia_player ON BASE ALL IN NEIGHBORHOOD The common room is also used by some friends of David. They too are also equipped with PDAs. David wants to share the seen of his video with his friends. In this case he will use the middleware PerSE to express his intention in PSAQL.

03/06/2015 … Usage scenario Location prediction combined with context information to determine David’s intension in proactively. IF BASE = LOCALHOST AND BASE_NAME = “PDA_DAVID” AND LOCATION = “CommonRoom” AND RunningAction = “USE * WITH SERVICE multimedia_player ON BASE LOCALHOST” THEN TriggerAction = “SHARE SERVICE multimedia_player ON BASE LOCALHOST WITH SERVICE multimedia_player ON BASE ALL IN NEIGHBORHOOD” The primary role of the prediction model is in this example is to detect that PDA_DAVID is in the Common_Room. It continues detecting who else is present in the room.

03/06/2015 Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Topics Background  Pervasive computing  positioning needs  Related works Background  Pervasive computing  positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Model for indoor location detection  Learning phase  Prediction Phase Experimental results and usage scenario Conclusions and future work

03/06/2015 Future works Integrating this module in to the PerSE middleware Further study on how to avoid hardware influence on the prediction model. Preliminary investigations show that type of signal tracking devices has significant effect on the data. Average values of signals measured by three different devices at the same location (Dell-Axim3 , Dell-Axim50 , HP-Hx4700  )

03/06/2015 Conclusions Indoor neighbourhood relation between users is represented:  Not by the physical proximity, but by the perception of the presence in the same physically or visually bounded place Indoor neighbourhood relation between users is represented:  Not by the physical proximity, but by the perception of the presence in the same physically or visually bounded place We have presented our positioning model for pervasive neighbourhood relationship using the room/office positioning information using database methods The result is found encouraging wit 95% hit rate

03/06/2015 Topics Background  Pervasive computing  positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Experimental results and usage scenario Conclusions and future work Background  Pervasive computing  positioning needs  Related works Model for indoor location detection  Learning phase  Prediction Phase Experimental results and usage scenario Conclusions and future work Thank You !!