A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8.

Slides:



Advertisements
Similar presentations
CAPACITY CONSTRAINED NETWORK VORONOI DIAGRAM (CCNVD)
Advertisements

Clustering k-mean clustering Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein.
Greedy Algorithms.
O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
A K-Main Routes Approach to Spatial Network Activity Summarization
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Algorithms + L. Grewe.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
1 K-clustering in Wireless Ad Hoc Networks using local search Rachel Ben-Eliyahu-Zohary JCE and BGU Joint work with Ran Giladi (BGU) and Stuart Sheiber.
Presented by: GROUP 7 Gayathri Gandhamuneni & Yumeng Wang.
Proportion Priors for Image Sequence Segmentation Claudia Nieuwenhuis, etc. ICCV 2013 Oral.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Critical Analysis Presentation: T-Drive: Driving Directions based on Taxi Trajectories Authors of Paper: Jing Yuan, Yu Zheng, Chengyang Zhang, Weilei Xie,
SASB: Spatial Activity Summarization using Buffers Atanu Roy & Akash Agrawal.
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Cascading Spatio-Temporal Pattern Discovery P. Mohan, S.Shekhar, J. Shine, J. Rogers CSci 8715 Presented by: Atanu Roy Akash Agrawal.
Network Optimization Models: Maximum Flow Problems In this handout: The problem statement Solving by linear programming Augmenting path algorithm.
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
1 A Dynamic Clustering and Scheduling Approach to Energy Saving in Data Collection from Wireless Sensor Networks Chong Liu, Kui Wu and Jian Pei Computer.
Time-Variant Spatial Network Model Vijay Gandhi, Betsy George (Group : G04) Group Project Overview of Database Research Fall 2006.
Scalable Network Distance Browsing in Spatial Database Samet, H., Sankaranarayanan, J., and Alborzi H. Proceedings of the 2008 ACM SIGMOD international.
UCSC 1 Aman ShaikhICNP 2003 An Efficient Algorithm for OSPF Subnet Aggregation ICNP 2003 Aman Shaikh Dongmei Wang, Guangzhi Li, Jennifer Yates, Charles.
Evaluating Performance for Data Mining Techniques
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Distributed Asynchronous Bellman-Ford Algorithm
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Project presentation 1. Agenda Motivation Problem Statement Related Work Proposed Solution Hierarchical routing theory 2.
Network Aware Resource Allocation in Distributed Clouds.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
1 Motivation Web query is usually two or three words long. –Prone to ambiguity –Example “keyboard” –Input device of computer –Musical instruments How can.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 28, 2014.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
1 Distributed Computing Optical networks: switching cost and traffic grooming Shmuel Zaks ©
Cole Kelleher Benjamin Post CSCI 5980 Assessment of Advanced GIS Tools for E-911 Services.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Group 8: Denial Hess, Yun Zhang Project presentation.
A Power Assignment Method for Multi-Sink WSN with Outage Probability Constraints Marcelo E. Pellenz*, Edgard Jamhour*, Manoel C. Penna*, Richard D. Souza.
A Method for Distributed Computation of Semi-Optimal Multicast Tree in MANET Eiichi Takashima, Yoshihiro Murata, Naoki Shibata*, Keiichi Yasumoto, and.
Presented by: Daniel Hess, Yun Zhang. Motivation Problem statement Major contributions Key concepts Validation methodology Assumptions Recommended changes.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
1 Knowledge Discovery from Transportation Network Data Paper Review Jiang, W., Vaidya, J., Balaporia, Z., Clifton, C., and Banich, B. Knowledge Discovery.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
Real Time Sensor Networks – challenges and solutions Information Prioritization Proposed scheme: Design techniques for priority assignment to an information.
1 Approximate XML Query Answers Presenter: Hongyu Guo Authors: N. polyzotis, M. Garofalakis, Y. Ioannidis.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Computer Sciences Department1.  Property 1: each node can have up to two successor nodes (children)  The predecessor node of a node is called its.
Other Clustering Techniques
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
Decision Maths 1 Shortest path algorithm Dijkstra’s Algorithm A V Ali :
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Scalable Learning of Collective Behavior Based on Sparse Social Dimensions Lei Tang, Huan Liu CIKM ’ 09 Speaker: Hsin-Lan, Wang Date: 2010/02/01.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Given a set of data points as input Randomly assign each point to one of the k clusters Repeat until convergence – Calculate model of each of the k clusters.
Dr. Chen, Data Mining  A/W & Dr. Chen, Data Mining Chapter 3 Basic Data Mining Techniques Jason C. H. Chen, Ph.D. Professor of MIS School of Business.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
St. Edward’s University
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Decision Maths Dijkstra’s Algorithm.
Algorithms (2IL15) – Lecture 7
Chapter 6 Network Flow Models.
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Data Mining CSCI 307, Spring 2019 Lecture 24
Discrete Optimization
Presentation transcript:

A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8

Outline  Motivation  Key Concepts  Problem Statement  Challenges  Related Work  Contributions  Algorithm  Validation  Assumption and Future Work

Motivation  Pedestrian Fatalities  Crime Activities

Key Concepts  Activity Set  Summary Path  Activity Coverage  Active Edge, Active Node, Inactive Node  Active Node Ratio

Problem Statement  Given: A spatial network G = (N, E) with weight function w(u, v) ≥ 0 for each edge A set of activities and their locations A desired number of summary paths, called K  Find: A summary path set of size K, called P A partitioning of activities across these summary paths  Objective: Maximize the activity coverage of each summary path for the group it represents.  Constraints: Each summary path is a shortest path between its end-nodes.

Challenges  Computational Complexity SNAS is computationally challenging because of the large number of K subsets of shortest paths in a spatial network.  If disjoint paths ? Less computation  If overlapping paths ? NP-complete Problem

Related Work  Previous work has focused on either geometry or subgraph-based approaches (only one path), and cannot summarize activities using multiple paths.  Geometry-based K-means  Network-Based Variable-Distance Clumping Method (NT-VCM)

Contributions  It shows that SNAS is NP-complete.  It proposes new techniques for improving the performance of K Main Routes: Network Voronoi activity Assignment and Divide and conquer Summary Path Re-computation. Their correctness are demonstrated. The computation cost of KMR can be calculated.  It presents a case study comparing KMR with geometry-based summarization techniques on pedestrian fatality data.  It tests the performance and scalability of KMR using both synthetic and real world data sets and demonstrates the computational efficiency of the performance-tuning strategies.

K-Main Routes (KMR) Algorithm  Select K paths as initial summary paths Repeat:  Phase 1 Form K clusters by assigning each activity to its closest summary path  Phase 2 Re-compute summary path of each cluster When summary paths do not change, terminate. Using performance-tuning decisions:  Inactive node pruning  1 Network Voronoi Activity assignment (NOVA_TKDE)  2 Divide and Conquer Summary Path Re-computation (D-SPAE_TKDE)

K-Main Routes (KMR) Algorithm

Validation  Use the real and synthetic data  Compare and optimize the computational cost in performance- tuning decisions such as Network Voronoi Activity assignment and Divide and Conquer Summary Path Re-computation  Observe the trends about number of nodes, routes, activities and active node ratio on seven versions of KMR  Use one case study – Orlando Crime stat

Effect of Number of Nodes  Computational savings increase as the number of nodes  Real data Number of routes K= 30 Number of activities = 602 for nodes Active node ratio = 0.07  Synthetic data Number of routes K= 2 Number of activities =1200 Active node ratio = 0.2

Effect of the Number of Routes  Computational savings increase as the number of routes  Real data Number of nodes = Number of activities = 369 Active node ratio =  Synthetic data Number of nodes = 1000 Number of activities =1200 Active node ratio = 0.2

Effect of the Number of Activities and Active Node Ratio  Computational savings increase with number of activities and active node ratio.  Synthetic data Number of nodes = 1000 Number of routes K= 2 Number of activities =1200 Active node ratio = 0.2

Case Study

Assumption and Further Work  The performance which activities are around the nodes  Handle the accidents in height (overpass)  Can be applied to more domains (disaster)  Distance based instead of coverage based  The accidents from static to dynamic  Overlapping paths