TRACE ANALYSIS AND MINING FOR SMART CITIES By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang.

Slides:



Advertisements
Similar presentations
OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
Advertisements

Alessandro Vespignani Science, Vol July 2009 (Prepared by Hasan T Karaoglu)
Adapting Ocean Surveys to the Observed Fields Characteristics Maria-João Rendas I3S, CNRS-UNSA.
Human Centred Design of a smart phone alert application for drivers Annie Pauzié, Ifsttar/LESCOT, France
Data Mining Glen Shih CS157B Section 1 Dr. Sin-Min Lee April 4, 2006.
1. Abstract 2 Introduction Related Work Conclusion References.
University of Buffalo The State University of New York Spatiotemporal Data Mining on Networks Taehyong Kim Computer Science and Engineering State University.
IBM TJ Watson Research Center © 2010 IBM Corporation – All Rights Reserved AFRL 2010 Anand Ranganathan Role of Stream Processing in Ad-Hoc Networks Where.
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Geocaching (Treasure Hunting) game using Wireless and Mobile Network Equipment/Technology: One or more of the followings :GPS, Wi-Fi, GSM, Bluetooth, Qcode.
Opportunities & Challenges Using Passively Collected Data In Travel Demand Modeling 15 th TRB Transportation Planning Applications Conference Atlantic.
Unconstrained Endpoint Profiling (Googling the Internet)‏ Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Smarter Cities Technology Centre Understanding urban dynamics from digital traces Francesco Calabrese Advisory Research Staff Member Smarter Cities Technology.
Data Mining – Intro.
Geographic Information System Geog 258: Maps and GIS February 17, 2006.
Top-k Monitoring in Wireless Sensor Networks Minji Wu, Jianliang Xu, Xueyan Tang, and Wang-Chien Lee IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,
Data Mining: A Closer Look
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Sensys 2009 Speaker:Lawrence.  Introduction  Overview & Challenges  Algorithm  Travel Time Estimation  Evaluation  Conclusion.
Data Mining Techniques
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Prof. Dong-Soo Han’s Intelligent Service Integration Laboratory (I.S.I Lab.), CS KAIST, 2010.
Ch. 1. The Third ICT Wave The Third ICT Wave.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya W.M.D Jeewantha Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya.
Introduction to Data Mining Group Members: Karim C. El-Khazen Pascal Suria Lin Gui Philsou Lee Xiaoting Niu.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
Relationship Between in-situ Information and ex-situ Metrology in Metal Etch Processes Jill Card, An Cao, Wai Chan, Bill Martin, Yi-Min Lai IBEX Process.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Chapter 11 Business Intelligence Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 11-1.
BioSumm A novel summarizer oriented to biological information Elena Baralis, Alessandro Fiori, Lorenzo Montrucchio Politecnico di Torino Introduction text.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Siyuan Liu *#, Yunhuai Liu *, Lionel M. Ni *# +, Jianping Fan #, Minglu Li + * Hong Kong University of Science and Technology # Shenzhen Institutes of.
Enterprise Model Distributed Real-Time Data Mining Advanced Statistical Theory Ranked Hypothesis Active RT Monitoring Confirmed, Rejected Adaptive RT Workflow.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Huiming Yin, P.E., PhD Liang Wang Paul Maurin Heqin Xu, P.E., PhD Dept. of Civil Engineering & Engineering Mechanics Columbia University Jan 16, 2012 Dynamic.
Geography is part of our everyday lives. Geography Matters!
Location-based Social Networks 6/11/20161 CENG 770.
Copyright  2007 McGraw-Hill Pty Ltd PPTs t/a Marketing Research 2e by Lukas, Hair, Bush and Ortinau Slides prepared by Judy Rex 19-1 Chapter Nineteen.
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
Data Mining - Introduction Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
The Application of Data Mining in Telecommunication by Wang Lina February 2003.
Collage Score Card & Software defect prediction
A brief introduction to IoT gateway
GSM+GPS Based School Kids Tracking System
Stefan Poslad, PhD School of Electronic Engineering & Computer Science
Contextual Intelligence as a Driver of Services Innovation
Knowledge management in transition from e-learning to ubiquitous learning: innovations and personalization issues Research team: Maiga Chang Jon Dron Sabine.
Internet of Things and its applications
Place Identification in Location Based Urban VANETs
Spring 2015 CSE 40437/60437 Prof. Dong Wang Summary
Green Software Engineering Prof
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Mining Spatio-Temporal Reachable Regions over Massive Trajectory Data
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Data Warehousing and Data Mining
Course Project Topics for CSE5469
Course Summary ChengXiang “Cheng” Zhai Department of Computer Science
Internet of Things (IoT)
Welcome to The World of Internet of Things
Unconstrained Endpoint Profiling (Googling the Internet)‏
Presentation transcript:

TRACE ANALYSIS AND MINING FOR SMART CITIES By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang

SCOPE Analysis and mining of sensed data from dynamic cities is an inevitable step toward making a city smart The trace data can then be input for mining to characterize knowledge about mobility, people, and the city. Finally, applications can exploit the knowledge mined to make them smarter in different domains of a smart city.

TRACE DATA The main source of Trace data are 1.Mobile phones (GPS, WiFi, GSM, and Bluetooth) 2. Vehicles (GPS) 3.Smart Cards (Bank cards and transportation cards) 4.Floating sensors (RFID)

CHALLENGES 1.Mobility Low-level human activities like step size and orientation is taken into account but its not enough. The number of locations and frequency of visits should also be taken into consideration for accurate outcomes. Transient prediction as simple as predicting the next visited places with knowledge of historical traces has poor results.

CHALLENGES 2.HUMAN BEHAVIOR Low- level human activities, such as walking, sitting, and standing, may be detected from trace data. A major challenge for recognizing human behavior is mining high-level semantics from low-level activities such as where he/she has visited, who he/she has contacted, what he/she has done, and where he/she will go, based on his/her trace data.

CHALLENGES 3.Social Relations A social relation refers to a relationship among individuals. It includes direct and indirect inter- actions, ranging from low-level face-to-face interaction to high-level interactions like reading books or following traditions. A major challenge for trace-based social analysis is to find potential social relation in trace data and construct a corresponding social network.

CHALLENGES 4.CITY DYNAMICS City Dynamics reflects urban dynamic information in many fields such as energy consumption, traffic flow, epidemic spread, and urban growth. A major challenge for those steps is cross-domain inference, which comes from the heterogeneous nature of trace data. There are many kinds of trace sources (traces of mobile devices, vehicles, smart cards, and floating sensors) and localization systems (GPS, Wi-Fi, GSM, Bluetooth, and payment records)

METHODS FOR TRACE ANALYSIS AND MINING Clustering Clustering can be used to depict the group of similar traces and patterns for mining hotspots. Classification Classification is used to predict the individual activity, social event and region semantics. Ranking Ranking is used to find list of recommending places on the basis of mobility patterns in descending order.

METHODS FOR TRACE ANALYSIS AND MINING Physical Statistical Model PSM is used to evaluate human mobility based on patterns from step length, no of visiting places, visiting frequency and order of visiting patterns.

APPLICATION OF SMART CITIES Smart Transportation (Traffic analysis, dynamic dispatch, intelligent navigation) Smart Urban Planning (Guiding, monitoring and evaluating urban plan) Smart Public health (Reducing health problems, epidemics and monitoring behavior of patients) Smart Public Security (Detecting misbehavior, social events and tracking critical people)

CONCLUSION Analysis and mining of Trace data is used to detect human behavior and city dynamics. It helps understand human behavior, social events, geographical importance to make city smarter. But still it is still challenging to unify trace data into complex and ever changing real world.

ANALYSIS OF UNIVERSITY SCORE'S & SOFTWARE DEFECT PREDICTION By Meetkumar Patel Srivats Srinivasan

ANALYSIS OF UNIVERSITY SCORE'S Purpose – There is a huge amount of data which is unsegregated ( ). Ability to find a college that is a good fit for the student. Scope – Integration of the data sets Data cleaning Web development and queries. Result – Statistical report’s(State wise/department wise). Performance of the University.

SOFTWARE DEFECT PREDICTION Purpose – To find what are the major factors that result to a software defect. Background – NASA Metrics Data Program, have been trying to predict a software's defect using different algorithm's, and to develop a algorithm which has a 100% success rate. The data comes from McCabe and Halstead measure. There is a total of 22 attributes which are used for the prediction. Scope – Finding patterns. Result – Statistical report’s.

REFERENCES Trace analysis and mining for smart cities: issues, methods, and applications By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang The home of the U.S. Government’s open data ( Promise Software engineering Repository (