Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

By Venkata Sai Pulluri ( ) Narendra Muppavarapu ( )
Copyright © 2006 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1 ~ Curve Fitting ~ Least Squares Regression Chapter.
Abstract Travel time based performance measures are widely used for transportation systems and particularly freeways. However, it has become evident that.
Preference-based Mobility Model and the Case for Congestion Relief in WLANs using Ad hoc Networks Wei-jen Hsu, Kashyap Merchant, Haw-wei Shu, Chih-hsin.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks Chan-Myung Kim
Mobility and Predictability of Ultra Mobile Users Jeeyoung Kim and Ahmed Helmy.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
March 2007 RAWDAD Community Resource for Archiving Wireless Data At Dartmouth.
13. The Weak Law and the Strong Law of Large Numbers
UNDERSTANDING PERIODICITY AND REGULARITY OF NODAL ENCOUNTERS IN MOBILE NETWORKS: A SPECTRAL ANALYSIS Sungwook Moon, Ahmed Helmy Dept. of Computer and Information.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
Boyce/DiPrima 10th ed, Ch 10.2: Fourier Series Elementary Differential Equations and Boundary Value Problems, 10th edition, by William E. Boyce and Richard.
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
9. Demo Scenario #1 Behavioral profile upon discovering friends/enemies 1)No friends and enemies: search for friends.  Turn by 90 degree and go forward.
Traffic modeling and Prediction ----Linear Models
M. Papadopouli 1,2,3, M. Moudatsos 1, M. Karaliopoulos 2 1 Institute of Computer Science, FORTH, Heraklion, Crete, Greece 2 University of North Carolina,
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Halilİbrahim Bayrakdaroğlu Dokuz Eylül University Industrial Engineering Department FORECASTING AND TIME SERIES.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
January 16th,20061 Performance Engineering of Distributed Systems and Wireless Networks Varsha Apte, CSE Dept., IIT Bombay Collaborators: Profs Bellur,
1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.
TIME SERIES by H.V.S. DE SILVA DEPARTMENT OF MATHEMATICS
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
Gender based analysis Udayan Kumar Computer and Information Science and Engineering (CISE) Department, University Of Florida, Gainesville, FL.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
1 CEN4500 Experiment 2: Bluetooth Device Discovery and Analysis Dr. Ahmed Helmy Introduced by Sungwook Moon Jeeyoung Kim Wei-jen Hsu.
Hierarchical Power Management in DTN with Traffic-Aware Optimization Hyewon Jun, etc ACM SIGCOMM, 2006.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Extract: Mining Social Features from WLAN Traces A Gender-Based Case Study Udayan Kumar and Ahmed Helmy Computer and Information Sciences and Engineering,
Survey on Broadband and Wireless Usage in Taiwan Lu Ai-Chin 26 September 2003 Taiwan Network Information Center.
Chapter 7 Forecasting n Quantitative Approaches to Forecasting n The Components of a Time Series n Measures of Forecast Accuracy n Using Smoothing Methods.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology The Weak Law and the Strong.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Math 3680 Lecture #17 Two-Sample Inference. Two-Sample Data: Matched Pairs.
Time Series Data Analysis - I Yaji Sripada. Dept. of Computing Science, University of Aberdeen2 In this lecture you learn What are Time Series? How to.
The Examination of Residuals. Examination of Residuals The fitting of models to data is done using an iterative approach. The first step is to fit a simple.
Behavioral Entropy of a Cellular Phone User Santi Phithakkitnukoon Husain Husna Ram Dantu (Presenter) Computer Science & Engineering University of North.
A Monte Carlo Approach to Estimating Impacts from Highly Intermittent Sources on Short Term Standards Clint Bowman and Ranil Dhammapala, State of Washington,
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Week 11 Introduction A time series is an ordered sequence of observations. The ordering of the observations is usually through time, but may also be taken.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
NextPlace: A Spatio-Temporal Prediction Framework for Pervasive Systems Salvatore Scellato1, Micro Musolesi, Cecilia Mascolo1, Vito Latora, and Andrew.
May 03, UFE ANALYSIS Old – New Model Comparison Compiled by the Load Profiling Group ERCOT Energy Analysis & Aggregation May 03, 2007.
A Study of Smartphone User Privacy from the Advertiser's Perspective Yan Wang 1, Yingying Chen 1, Fan Ye 2, Jie Yang 3, Hongbo Liu 4 1 Department of Electrical.
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
EOSDIS FY2009 Annual Metrics Report Prepared By: Hyo Duck Chang Adnet, Inc. Brian Krupp Adnet, Inc. Lalit Wanchoo Adnet, Inc. March 2010.
Sungwook Moon, Ahmed Helmy 1 Mobile Testbeds with an Attitude Thanks to all the NOMAD group members for their great helps (U. Kumar, Y. Wang, G. Thakur,
Pin-Yun Tarng / An Analysis of WoW Players’ Game Hours Network and Systems Laboratory nslab.ee.ntu.edu.tw IEEE/IFIP DSN 2008 Network and Systems Laboratory.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
IMPORTANCE OF STATISTICS MR.CHITHRAVEL.V ASST.PROFESSOR ACN.
Chih-Min Chao and Kuo-Hsiang Lu Department of Computer Science and Engineering National Taiwan Ocean University IEEE Sensor Networks, Ubiquitous and Trustworthy.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
A General Discussion of Probability Some “Probability Rules” Some abstract math language too! (from various internet sources)
Time-Series Forecast Models  A time series is a sequence of evenly time-spaced data points, such as daily shipments, weekly sales, or quarterly earnings.
Hydrological Forecasting. Introduction: How to use knowledge to predict from existing data, what will happen in future?. This is a fundamental problem.
Quality Is in the Eye of the Beholder: Meeting Users ’ Requirements for Internet Quality of Service Anna Bouch, Allan Kuchinsky, Nina Bhatti HP Labs Technical.
Weighted Waypoint Mobility Model and Its Impact on Ad Hoc Networks Electrical Engineering Department UNIVERSITY OF SOUTHERN CALIFORNIA USC Kashyap Merchant,
1 Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks Eyuphan Bulut, Student Member, IEEE, and Boleslaw K Szymanski, Fellow,
R. E. Wyllys Copyright 2003 by R. E. Wyllys Last revised 2003 Jan 15
#VisualHashtags Visual Summarization of Social Media Events using Mid-Level Visual Elements Sonal Goel (IIIT-Delhi), Sarthak Ahuja (IBM Research, India),
Predict Failures with Developer Networks and Social Network Analysis
Prepared by Lee Revere and John Large
Survey on Coverage Problems in Wireless Sensor Networks - 2
Presentation transcript:

Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can be useful in selection of relay nodes when the encounter rate of the nodes with the target node are similar as regular nodes are likely to provide less error in encounter probability estimation. We propose the following methods however their validation still remains a future work. Select 20% of the nodes whose highest frequency magnitude is greater than rest of nodes. Select the nodes whose sum of three highest frequency magnitudes take up at least 30% of the total sum of frequency magnitudes. Figure below shows the locations where encounter events occurred according to each group selected by above methods. It shows different locations of encounter events by the groups of nodes. This indicates that regularity does not follow the general trend of encounter events. We can further infer that there can be regularly encountering nodes even at locations where number of encounter events are small. We look at average auto correlation coefficient that are converted to frequency domain. Spikes shown in the frequency component of 18 indicates that certain pattern has repeated for 18 times over 128 days, which indicates seven days interval (weekly encounter pattern). (18/128 = 7.xx) Weekly periodicity is noticeable from both the frequently and rarely encountering pairs with latter showing much stronger periodicity. This result is different from mobility diameter study, which did not observe weekly pattern in mobility of highly mobile users. Bluetooth traces show strong daily encounter pattern but weekly pattern could not be observed due to short duration of experiment period. WLAN traces: USC, UF and Montreal Bluetooth traces: students carry PDAs (HP iPAQ & Nokia N810) Understanding the potential of mobile nodes is essential in use of them as message relays in DTN. We analyze the periodicity in encounter pattern by using power spectral analysis. Result: stronger periodicity (particularly weekly pattern) among rarely encounter pairs than frequently encounter pairs. Further utilization: we propose methods to find regularly encountering pairs. Spectral Analysis of Periodicity and Regularity for Mobile Encounters in Delay Tolerant Networks Computer and Information Science and Engineering Department UNIVERSITY OF FLORIDA UF Sungwook Moon, Ahmed Helmy {smoon, [1] MobiLib: USC WLAN trace and pointers to many WLAN trace archives available at [2] CRAWDAD: A Community Resource for Archiving Wireless Data At Dartmouth. [3] T. Henderson, D. Kotz and I. Abyzov, ”The Changing Usage of a Mature Campus-wide Wireless Network,” in Proceedings of ACM MobiCom 2004, September [4] W. Hsu, D. Dutta, and A. Helmy, "Extended abstract: Mining behavioral groups in large wireless LANs," in Proceedings of MOBICOM Longer version of technical report available at [5] W. Hsu, D. Dutta, and A. Helmy, "Profile-Cast: Behavior-Aware Mobile Networking," in Proceedings of IEEE WCNC, Las Vegas, NV, Mar [6] U. Kumar, N. Yadav and A. Helmy, “Gender-based Grouping of Mobile Student Societies”, in MODUS workshop, St. Louis, MO, April 2008 (colocated with IPSN 2008) [7] J. Kim, Y. Du, M. Chen and A. Helmy, “Comparing Mobility and Predictability of VoIP and WLAN Traces”, in CRAWDAD workshop, Montreal QC, Canada, Sep [3] Google Earth. Download from More info: 1. Introduction 2. Encounter Traces Analyzed This work is supported by NSF CAREER Award Cisco Systems, Inc. 3. Methodology How to analyze the periodicity of encounter pattern? –We use power spectral analysis. (STEP1) Process the traces to time-domain encounter traces. - Encountered pairs: nodes associated with the same access points in the same period of time (STEP2) Apply the auto correlation function (ACF) to find repetitive patterns. (STEP3) Perform discrete Fourier transform to convert the data from time domain to frequency domain, in order to observe distinctly repeated patterns including hidden patterns. What do we look at? Daily encounter rate of the entire nodes (i,j: nodes; T: total duration; d: day; E(i,j): daily encounter of pair i,j) We look at the two groups of nodes: rarely encountering pairs and frequency encountering pairs We are more interested in the statistics of rarely encountering pairs as they have more room for improvements in choosing relay nodes. 4. Periodicity of encounter 6. Future Directions Trace source Trace duration Analyzed duration Unique users Encounter pairs USC2006 Jan – May 2007 Jan – May 2008 Jan – May 128 days UF2007 Aug – Dec128 days Montreal2004 Aug – Dec128 days Bluetooth2008 Feb – Mar 2008 Nov 256 hours Figure 1. Frequency magnitude for rarely encountered pairs Figure 2. Frequency magnitude for frequently encountered pairs Figure 3. Frequency magnitude for Bluetooth encounter