Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.

Slides:



Advertisements
Similar presentations
Proactive Traffic Merging Strategies for Sensor-Enabled Cars
Advertisements

An Interactive-Voting Based Map Matching Algorithm
Spatiotemporal Pattern Mining For Travel Behavior Prediction UIC IGERT Seminar 02/14/2007 Chad Williams.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Data Mining and Machine Learning Lab Mobile Location Prediction in Spatio-Temporal Context Data Mining and Machine Learning Lab Arizona State University.
IBM TJ Watson Research Center © 2010 IBM Corporation – All Rights Reserved AFRL 2010 Anand Ranganathan Role of Stream Processing in Ad-Hoc Networks Where.
Trajectory Pattern Mining NTU IM Hsieh, Hsun-Ping Trajectory Pattern Mining Reporter : Hsieh, Hsun-Ping 解巽評 (R ) Fosca Giannotti Mirco Nanni Dino.
Avatar Path Clustering in Networked Virtual Environments Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai Adaptive Computing and Networking Lab.
CENTRE Cellular Network’s Positioning Data Generator Fosca GiannottiKDD-Lab Andrea MazzoniKKD-Lab Puntoni SimoneKDD-Lab Chiara RensoKDD-Lab.
Locally Constraint Support Vector Clustering
Self-Management in Chaotic Wireless Deployments A. Akella, G. Judd, S. Seshan, P. Steenkiste Presentation by: Zhichun Li.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (II) 11th Week
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Dieter Pfoser, LBS Workshop1 Issues in the Management of Moving Point Objects Dieter Pfoser Nykredit Center for Database Research Aalborg University, Denmark.
TrafficView: A Scalable Traffic Monitoring System Tamer Nadeem, Sasan Dashtinezhad, Chunyuan Liao, Liviu Iftode* Department of Computer Science University.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
1 of 14 1 Scheduling and Optimization of Fault- Tolerant Embedded Systems Viacheslav Izosimov Embedded Systems Lab (ESLAB) Linköping University, Sweden.
Prediction-based Monitoring in Sensor Networks: Taking Lessons from MPEG Samir Goel and Tomasz Imielinski Department of Computer Science Rutgers, The State.
Department of Computer Engineering Koc University, Istanbul, Turkey
Chapter 5 Data mining : A Closer Look.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
Chapter 1 Embedded And Real-Time System Department of Computer Science Hsu Hao Chen Professor Hsung-Pin Chang.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
IDENTIFYING USERS PROFILES FROM MOBILE CALLS HABITS August 12, Beijing, China B Furletti, L. Gabrielli, C. Renso, S. Rinzivillo KddLab, ISTI – CNR,
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
6 am 11 am 5 pm Fig. 5: Population density estimates using the aggregated Markov chains. Colour scale represents people per km. Population Activity Estimation.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
GUI: GPS-Less Traffic Congestion Avoidance in Urban Area with Inter-Vehicular Communication Presenter: Zhen Jiang or
Time-focused density-based clustering of trajectories of moving objects Margherita D’Auria Mirco Nanni Dino Pedreschi.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa)‏ www-kdd.isti.cnr.it Anna Monreale Fabio Pinelli Roberto Trasarti Fosca Giannotti A. Monreale,
The probability that a person visits a location. ~ means that two locations are equivalent.  Grids -> close to the border of two different.
Business Logistics 420 Public Transportation Lecture 18: Demand Forecasting.
Trajectory Pattern Mining
Dynamic 3D Scene Analysis from a Moving Vehicle Young Ki Baik (CV Lab.) (Wed)
Trajectory Pattern Mining Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Fabio Pinelli KDD Lab (ISTI-CNR & Univ. Pisa) Presented by: Qiming Zou.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Spatial-Temporal Models in Location Prediction Jingjing Wang 03/29/12.
© 2010 IBM Corporation IBM Research - Ireland © 2014 IBM Corporation xStream Data Fusion for Transport Smarter Cities Technology Centre IBM Research.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
NextPlace: A Spatio-Temporal Prediction Framework for Pervasive Systems Salvatore Scellato1, Micro Musolesi, Cecilia Mascolo1, Vito Latora, and Andrew.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presented by Joseph T. Meyerowitz.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 A personal route prediction system base on trajectory.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Quantification in Social Networks Letizia Milli, Anna Monreale, Giulio Rossetti, Dino Pedreschi, Fosca Giannotti, Fabrizio Sebastiani Computer Science.
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
2010 IEEE Fifth International Conference on networking, Architecture and Storage (NAS), pp , 2010 作者: Filip Cuckov and Min Song 指導教授:許子衡 教授 報告學生:馬敏修.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Kalman Filter and Data Streaming Presented By :- Ankur Jain Department of Computer Science 7/21/03.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Mobility diversity and socio-economic development
An analytical framework to nowcast well-being using Big Data
Jim Henricksen, MnDOT Steve Ruegg, WSP
Introduction Secondary Users (SUs) Primary Users (PUs)
Cross-Layer Optimization for State Update in Mobile Gaming
Presentation transcript:

Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles KDD Lab - ISTI CNR Pisa, Italy

OBJECTIVE AND MOTIVATIONS ●Reference application: real-time traffic density estimation at key locations ●Possible approach: Exploit on board GPS devices ●GPS devices can transmit their position real-time to the mobility management central ●The mobility management central uses collected positions to compute the density around a specified set of locations – Vehicles closer to the location contribute to density with higher weight

ISSUES Mobility data come from large number of devices on the territory. The communications between these devices and the central server is unsustainable. GSM network GPS Devices Central Server

OUTLINE OF APPROACH: GLOBAL FUNCTION ● Density estimation of each reference point RP i based on some kernel K ● Basic case: radial function, e.g. Gaussian n V = n. vehicles V i xy = vehicle positions RP i xy = RP positions ● Error tolerance: each density is computed with approximation ε

● Level 0: Static “Safe Zones” ● Compute a “default location area” around the most frequent (dense) location, from historical data – Safe zone = default location ± ε/N ● Whenever the vehicle is inside the area, no communication occurs ● Level 1: Adaptive “Safe Zones” ● As above, but when a vehicle exits its SZ, a new one is computed, centered around the last location sent WHICH “INTELLIGENCE” TO PUT INTO THE FRAMEWORK?

● Level 2: Learn from historical data ● Try to exploit the high predictability of human mobility 1 ● Level 2.1 ● Assumption: “Average user tends to visit (or cross) everyday the same places at the same hour of the day” ● Single spatio-temporal locations need not to be linked ● Level 2.2 ● Assumption: “Average user tends to repeat the same trips everyday” ● The “regular trip” is an higher level concept, requires a coherent sequence of spatio-temporal locations 1 - C. Song, Z. Qu, N. Blumm, A.-L. Barabási. Limits of Predictability in Human Mobility. Science WHICH “INTELLIGENCE” TO PUT INTO THE FRAMEWORK?

● Level 2.1: Most Frequent Location Model ● For each user: – Discretize and align daily movements into time slots of M minutes each to obtain a complete schedule for each day; – Assign to each time slot the corresponding most frequent position – thresholds on distance and min frequency required Daily schedules Frequency based profile (x,y)(x’,y’) (x,y) (x”,y”) (x,y) (x”,y”) WHICH “INTELLIGENCE” TO PUT INTO THE FRAMEWORK?

Trajectories of the individual Extracted mobility profiles ● Level 2.2: Mobility profiles ● The central controller is provided with “Mobility profiles” individually extracted from the history of each vehicle 2 WHICH “INTELLIGENCE” TO PUT INTO THE FRAMEWORK? 2 - Roberto Trasarti, Fosca Giannotti, Mirco Nanni, Fabio Pinelli: Mining mobility user profiles for car pooling. KDD 2011

OUTLINE OF APPROACH: FLOW OF THE APPLICATION 1. Each vehicle computes its model and sends it to the Controller 2. The Controller sends to each vehicle an error ε' ● Basic solution: ε' = ε / n V in the worst-case scenario 3. Loop: 1. Each vehicle evaluates, for each RP, its kernel contribution K based on its actual position, and contribution K' based on predicted position. If |K-K'|>ε' sends a correction: ● In case of profiles: a temporal shift dt, if the vehicle is slightly late/early ● In case of frequent location or large dt: the actual position (x,y) or its Ks 2. The Controller evaluates the kernel contributions based on the model (aligned through dt, if based on profiles) or last position of each vehicle

EXPERIMENTS GPS real car users ● around 40,000 users ● locate in Tuscany ● time period of 5 weeks ● mixed territories Data by OCTOTELEMATICS Approaches compared: Level 1 (Adaptive Szs) Level 2.1 (Freq. Locations) Level 2.2 (Profiles) RPs used in experiments

Lev. 2.2 vs Lev. 1 EXPERIMENTS

Lev. 2.1 vs Lev. 1 EXPERIMENTS

Lev. 2 vs Lev. 1 EXPERIMENTS

Conclusion and Future Works SUMMARY Several approaches to the problem of computing population density over key areas have been proposed using different levels of “intelligence” Significant reduction in communications was achieved The results suggest that a high level knowledge boosts to the performances ONGOING WORKS Can the proposed framework be made privacy-preserving? Are there parts of the map more difficult to "learn"? E.g. Highways are expected to be difficult, due to high presence of occasional trips and passers-by If taken collectively, individual non-systematic behaviors might form typical paths, e.g. vehicles on the highways: how to integrate them in the framework?

Thanks! Questions? kdd.isti.cnr.it/