Avatar Path Clustering in Networked Virtual Environments Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai Adaptive Computing and Networking Lab.

Slides:



Advertisements
Similar presentations
Clustering.
Advertisements

Hierarchical Clustering, DBSCAN The EM Algorithm
Learning Trajectory Patterns by Clustering: Comparative Evaluation Group D.
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
Image Indexing and Retrieval using Moment Invariants Imran Ahmad School of Computer Science University of Windsor – Canada.
Context-aware Query Suggestion by Mining Click-through and Session Data Authors: H. Cao et.al KDD 08 Presented by Shize Su 1.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ What is Cluster Analysis? l Finding groups of objects such that the objects in a group will.
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang Adaptive Computing and Networking (ACN) Laboratory Department of Computer Science and Information Engineering.
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang Adaptive Computing and Networking (ACN) Laboratory Department of Computer Science and Information Engineering.
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach,
Cluster Analysis.  What is Cluster Analysis?  Types of Data in Cluster Analysis  A Categorization of Major Clustering Methods  Partitioning Methods.
Cluster Analysis.
Cluster Analysis: Basic Concepts and Algorithms
What is Cluster Analysis?
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Ranking by Odds Ratio A Probability Model Approach let be a Boolean random variable: document d is relevant to query q otherwise Consider document d as.
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
Ulf Schmitz, Pattern recognition - Clustering1 Bioinformatics Pattern recognition - Clustering Ulf Schmitz
Chapter 3: Cluster Analysis  3.1 Basic Concepts of Clustering  3.2 Partitioning Methods  3.3 Hierarchical Methods The Principle Agglomerative.
1 Dynamic Programming 2012/11/20. P.2 Dynamic Programming (DP) Dynamic programming Dynamic programming is typically applied to optimization problems.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Unsupervised Learning Reading: Chapter 8 from Introduction to Data Mining by Tan, Steinbach, and Kumar, pp , , (
Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.
Presented by Tienwei Tsai July, 2005
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology A novel genetic algorithm for automatic clustering Advisor.
Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa)‏ www-kdd.isti.cnr.it Anna Monreale Fabio Pinelli Roberto Trasarti Fosca Giannotti A. Monreale,
Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games (P2P-NVE 2007 workshop) Jehn-Ruey Jiang and Hung-Shiang Chen Adaptive Computing.
College of Engineering WiFi and WCDMA Network Design Robert Akl, D.Sc. Department of Computer Science and Engineering Robert Akl, D.Sc. Department of Computer.
Mining Shifting-and-Scaling Co-Regulation Patterns on Gene Expression Profiles Jin Chen Sep 2012.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 CSE 980: Data Mining Lecture 17: Density-based and Other Clustering Algorithms.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games (P2P-NVE 2007 workshop) Jehn-Ruey Jiang and Hung-Shiang Chen Presenter: Shun-Yun.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 New Unsupervised Clustering Algorithm for Large Datasets.
Unsupervised learning introduction
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
ICDE, San Jose, CA, 2002 Discovering Similar Multidimensional Trajectories Michail VlachosGeorge KolliosDimitrios Gunopulos UC RiversideBoston UniversityUC.
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
黃福銘 (Angus). Angus Fuming Huang Academia Sinica, Institute of Information Science, ANTS Lab Jae-Gil Lee Jiawei Han UIUC Kyu-Young Whang KAIST ACM SIGMOD’07.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
Machine Learning Queens College Lecture 7: Clustering.
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach,
1 Scalable AOI-cast for Peer-to-Peer Networked Virtual Environments Jehn-Ruey Jiang, Yu-Li Huang, and Shun-Yun Hu CSIE, National Central University, Taiwan.
Clustering Patrice Koehl Department of Biological Sciences National University of Singapore
Clustering/Cluster Analysis. What is Cluster Analysis? l Finding groups of objects such that the objects in a group will be similar (or related) to one.
Other Clustering Techniques
CLUSTERING DENSITY-BASED METHODS Elsayed Hemayed Data Mining Course.
1 CSC 594 Topics in AI – Text Mining and Analytics Fall 2015/16 8. Text Clustering.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Data Mining: Cluster Analysis This lecture node is modified based on Lecture Notes for Chapter.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Fixed telephone network planning. Group Member:  Afnan Salem –  Isra Yuosef –  Samar Faisal –  Nehal Mahmoud –  Weam.
Clustering Microarray Data based on Density and Shared Nearest Neighbor Measure CATA’06, March 23-25, 2006 Seattle, WA, USA Ranapratap Syamala, Taufik.
CLUSTERING GRID-BASED METHODS Elsayed Hemayed Data Mining Course.
DATA MINING: CLUSTER ANALYSIS (3) Instructor: Dr. Chun Yu School of Statistics Jiangxi University of Finance and Economics Fall 2015.
CSE4334/5334 Data Mining Clustering. What is Cluster Analysis? Finding groups of objects such that the objects in a group will be similar (or related)
Clustering (2) Center-based algorithms Fuzzy k-means Density-based algorithms ( DBSCAN as an example ) Evaluation of clustering results Figures and equations.
Data Mining: Basic Cluster Analysis
Semi-Supervised Clustering
CSE 4705 Artificial Intelligence
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Clustering Uncertain Taxi data
Parametric calibration of speed–density relationships in mesoscopic traffic simulator with data mining Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2009/10/20.
Introduction Secondary Users (SUs) Primary Users (PUs)
Department of Computer Science University of York
Continuous Density Queries for Moving Objects
Presentation transcript:

Avatar Path Clustering in Networked Virtual Environments Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai Adaptive Computing and Networking Lab Department of Computer Science and Information Engineering National Central University 2010/12/08

Outline Introduction Related Work Proposed Algorithms Experiments and Performance Conclusion 2

Introduction Networked virtual environments (NVEs)  virtual worlds full of numerous virtual objects to simulate a variety of real world scenes  allowing multiple geographically distributed users to assume avatars to concurrently interact with each other via network connections.  E.G., MMOGs: World of Warcraft (WoW), Second Life (SL) 3

Avatar Path Clustering Because of similar personalities, interests, or habits, users may possess similar behavior patterns, which in turn lead to similar avatar paths within the virtual world. We would like to group similar avatar paths as a cluster and find a representative path (RP) for them. 4

Related Work Path Similarity Clustering  Partitioning  Hierarchical  Density-based 5

Related Work Path Similarity Clustering  Partitioning  Hierarchical  Density-based 6

Path Similarity Average Distance of Corresponding Points (ADOCP) [Z.Fu et al. 2005] 7 For measuring pairwise similarity of vehicle motion paths in real traffic video of a cross road scene. It is suitable for paths of similar beginnings and stops.

Path Similarity (2) Longest Common Subsequence (LCSS) [M.Vlachos et al. 2002] for discovering similar multidimensional trajectories Adaptive Computing and Networking Laboratory Lab 8 Time X position or y position A=((a x,1,a y,1 ),…, (a x,n,a y,n )) B=((b x,1,b y,1 ),…, (b x,m,b y,m )) Similarity(A, B)= LCSS(A, B)/min(|A|, |B|)

Related Work Path Similarity Clustering  Partitioning  Hierarchical  Density-based 9

Partitioning Adaptive Computing and Networking Laboratory Lab 10 Cluster Number : K=3 The method classifies the data into k clusters satisfying the following requirements: (1) each cluster must contain at least one object, and (2) each object must belong to exactly one cluster. E.G.: The k-means algorithm first randomly selects k data objects, each of which initially represents a cluster mean. Each remaining data object is then assigned to the cluster to which it is the most similar. Afterwards, the new mean for each cluster is re- computed and data objects are re-assigned.

Hierarchical Adaptive Computing and Networking Laboratory Lab 11 Hierarchical methods seek to build a hierarchy of clusters of data objects, and they are either agglomerative ("bottom-up") or divisive ("top-down").

Density-based Adaptive Computing and Networking Laboratory Lab 12 Density-based methods typically regard clusters as dense regions of data objects in the data space that are separated by regions of low density. E.G.: DBSCAN processes data objects one by one and regards an object as a core object to be grown into a cluster if the number of the object’s nearby objects within a specified radius r exceeds a threshold t.

Proposed Algorithms Pre-processing ADOCP-DC algorithm LCSS-DC algorithm 13

Dividing paths into path segments by hotspots Pre-processing 14 Hotspot: an area that has attracted a large portion of avatars to stay long

Avatar Path Clustering Algorithms Average Distance of Corresponding Points-Density Clustering(ADOCP-DC ) Longest Common Subsequence-Density Clustering (LCSS-DC ) 15

ADOCP-DC Algorithm Corresponding point 16

ADOCP-DC Algorithm 17

SeqA:C60.C61.C62.C63.C55.C47.C39.C31.C32 LCSS-DC - path transfers sequence 18

SeqB :C60.C61.C62.C54.C62.C63.C64 LCSS AB :C60.C61.C62. C63 LCSS-DC - path similarity SeqA :C60.C61.C62.C63.C55.C47.C39.C31.C32 19

SeqA :C60.C61.C62.C63.C55.C47.C39.C31.C32 SeqB :C60.C61.C62.C54.C62.C63.C64 LCSS AB :C60.C61.C62. C63 LCSS-DC - similar path thresholds 20

LCSS-DC Algorithm 21

Experiments Both methods are applied to the SL avatar trace data of Freebies Island. Each record includes avatar location data in the region within 24 hours. 22

Experiment Results Avatar Path Clustering for SE Freebies 23

Performance - Accuracy Silhouette [L. Kaufman et al. 1990] 24 The value of Silhouette between from 1 to -1, the greater the Silhouette coefficient of the path, the higher path similarity in the cluster, and the lower path similarity with other cluster, which represents clustering result is better.

Performance - coverage the number of clustering paths the total of numbers of paths Coverage= 25

Accuracy Analysis in ADOCP-DC Algorithm ADOCP-DC Clustering radius 16(AOI radius) Number of corresponding points >=10 Minimum number of clusters >=150 26

Coverage Analysis in ADOCP-DC Algorithm ADOCP-DC Clustering radius 16(AOI radius) Number of corresponding points >=10 Minimum number of clusters >=150 27

Algorithm LCSS-DC Cell diameter 32(AOI radius) THa 0.74 THb 0.56 Minimum number of clusters Accuracy Analysis in LCSS-DC

Algorithm LCSS-DC Cell diameter 32(AOI radius) THa 0.68 THb 0.65 Minimum number of clusters Coverage Analysis in LCSS-DC

Conclusion Two schemes for avatar path clustering:  Average Distance of Corresponding Points-Density Clustering (ADOCP-DC)  Longest Common Subsequence-Density Clustering (LCSS- DC) Applying the schemes to the SL trace data to evaluate the schemes’ silhouette degree and coverage ratio Future work:  Avatar Behavior Analysis  NVE Redesign  Load Balancing Based on Path Clustering 30

Thank You! 31