Mobile User Movement Prediction Using Bayesian Learning for Neural Networks. Presented by: Sherif Akoush American University in Cairo

Size: px
Start display at page:

Download "Mobile User Movement Prediction Using Bayesian Learning for Neural Networks. Presented by: Sherif Akoush American University in Cairo"

Transcription

1 Mobile User Movement Prediction Using Bayesian Learning for Neural Networks Presented by: Sherif Akoush American University in Cairo Map Middle East 2007

2 Outline Overview Motivations Objectives Background Information The Proposed System Experiments Questions

3 Overview Humans tend to act (move) according to some patterns Several machine learning techniques are available that can be extract patterns from historical data (Neural Networks Bayesian Belief Networks) In wireless networks, users must have to access services while roaming Location Management Handoff Management

4 Motivations Extracting users movements patterns using a powerful machine learning technique to aid in location management How much predictable is our life? One of the most critical issues regarding wireless networks is mobility management (location and handoff management)

5 Objectives Apply Bayesian learning for Neural Networks in movement prediction Hybrid machine learning model First time in movement prediction Build a solid inference model that can be used in location management in wireless cellular networks Efficient (intelligent) location management Intelligent Decisions Better Bandwidth Utilization Reducing Update Cost Services prediction Quality of Service Apply for other wireless networks (Ad-Hoc, Mobile IP, WiMax)

6 Wireless Cellular Networks A B C VLR contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR AB 1 MSC acts like a normal switching node, and in addition provides all the functionality needed to handle a mobile subscriber, including registration, authentication, location updating, inter-msc handovers, and call routing to a roaming subscriber ABCD HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the subscriber D BTS houses the radio tranceivers that define a cell and handles the radio interface protocols with the mobile station. BSC manages the radio interface channels (setup, teardown, frequency hopping, etc.) as well as handovers CD 2 The OMC provides remote monitoring of the network performance and permits remote reconfiguration and fault management activity as well as alarm and event monitoring.

7 Bur Dubai Deira

8 Bur Dubai Based on movement prediction, check directly the cell in which the user is expected to be

9 Neural Networks Neural networks are powerful models capable of learning (by examples) relationships in complex data sets Neural networks may be considered as a black box that produces output (prediction) for a given input How the output depends on the input is controlled by several parameters (weights) that is adjusted in the learning process of the network The learning process is able to adjust these weights so that to minimize the error between the expected (target) and the actual output of the input We set the model parameters such as number of hidden nodes, connections between the nodes, initial values of weights, learning rates, weight decay After learning, the network should be able to generalize

10 Problems in Neural Networks The choice of model parameters is essentially arbitrary Trial-and-error and heuristic procedures No meaningful semantics, that we could compare with our beliefs. Over-fitting No models comparison Single weight vector No confidence for output

11 Bayesian learning for Neural Networks Objective choice of type of weight decay terms or regularizes Bayesian MLP returns theoretically all possible solutions and integrates them out (Average). Solution for Overfitting Underfitting problems. Prior knowledge represents what is our belief for the weights parameters before seeing the data. Use of hyperparameters Infer what the free parameters might be, given the data Confidence intervals for the results (error bars) Objective models comparison

12 The Proposed Model

13 The Proposed Model

14 Experiments Input Data Data from Reality Mining Project at MIT. This dataset contains over 500,000 hours (~60 years) of continuous data on daily human behavior. The dataset has already been used by researchers in a wide range of fields (including epidemiology, sociology, physics, artificial intelligence, and organizational behavior). The dataset includes call logs, Bluetooth devices in proximity, cell tower IDs, application usage, and phone status (such as charging and idle).

15 Input Data (For Location Prediction) Cellspan Oid Endtime Starttime person_oi d Celltower_oid /26/2004 8:58:34 PM 7/26/2004 8:58:14 PM /26/2004 8:59:37 PM 7/26/2004 8:58:34 PM /26/2004 9:00:13 PM 7/26/2004 8:59:37 PM /26/2004 9:01:34 PM 7/26/2004 9:00:13 PM Cellname Oid Name person_oid celltower_oid 643 ML Office Greg's apt Jon's apartment

16 Input Data (For Services Prediction) Callspan oid endtime starttime person_oid description direction duration /3/04 7:07 PM 8/3/04 7:07 PM 29 Packet Data Outgoing /3/04 7:07 PM 8/3/04 7:07 PM 29 Packet Data Outgoing /5/04 4:52 PM 8/5/04 4:40 PM 29 Voice Call Outgoing /6/04 10:37 PM 8/6/04 10:37 PM 29 Short Message Incoming /6/04 11:08 PM 8/6/04 11:06 PM 29 Voice Call Outgoing /6/04 11:54 PM 8/6/04 11:53 PM 29 Voice Call Outgoing /7/04 2:15 AM 8/7/04 2:15 AM 29 Voice Call Outgoing /7/04 2:20 AM 8/7/04 2:18 AM 29 Voice Call Outgoing /7/04 2:23 AM 8/7/04 2:23 AM 29 Short Message Incoming /7/04 4:06 AM 8/7/04 4:06 AM 29 Short Message Outgoing 0

17 Training One month training The following month as a test Cluster cells with the same semantics 5 cells history Minute resolution

18 Compare Results With Other Neural Networks Models Hidden nodes Epochs / No of Sampes Cell History Prediction Accuracy (exact) Bayes % Bayes % Bayes % Bayes % Bayes % Bayes % Resilient % Resilinet % Levenberg-Marquadt % One Step Secant % Elman / RP train %

19 Vary Number of Hidden Nodes Prediction Accuracy (Exact) 15 hidden nodes 25 hidden nodes 45% 47% No big difference!

20 Vary Number of Samples No of Samples Prediction Accuracy % 44% 46% 48% 50% 51% 53% Results show that generally prediction accuracy increases proportionally with the number of samples generated

21 Prediction Accuracy for Weekends vs. Weekdays Mon Tues Wed Thurs Fri Sat Sun 37% 49% 58% 61% 66% 61% 39% Days towards the end of week are the highest predictable in contrast to the start of week where prediction is low

22 Test prediction accuracy for wider window Window 1 st Month 2 nd Month 3 rd Month Prediction 52% 56% 44% Results show that prediction accuracy remains almost the same for the 3 months, which strengthen the idea that humans tend to repeat their behaviors

23 Page 6 Neighbor Cells We tried to see the outcome of searching nearby cells in case of the system hasn't found the user in the predicted cell Window Prediction Accuracy (exact) Paging 6 Neighbor Cells Bayes 4 1 st Month 52% 69% 2 nd Month 56% 70% 3 rd Month 44% 60% Results are very promising. Prediction accuracy increases on average 65% in relative to checking only the one predicted cell

24 Services Prediction Starttime Endtime Service Direction 8/3/2004 7:07:26 PM 8/3/2004 7:07:26 PM Packet Data Outgoing 8/3/2004 7:07:26 PM 8/3/2004 7:07:26 PM Packet Data Outgoing 8/3/2004 4:37:52 PM 8/3/2004 4:26:53 PM Voice Call Outgoing 8/3/2004 7:07:26 PM 8/3/2004 7:07:26 PM Packet Data Outgoing 8/5/2004 4:52:37 PM 8/5/2004 4:40:39 PM Voice Call Outgoing 8/5/2004 9:02:34 PM 8/5/2004 9:02:30 PM Voice Call Outgoing 8/6/2004 9:39:56 PM 8/6/2004 9:39:05 PM Voice Call Outgoing 8/6/ :37:18 PM 8/6/ :37:18 PM Short Message Incoming Window 1 st Month 2 nd Month 3 rd Month Service Prediction 48% 62% 93%

25 Thank You Questions?

26 Finding the Posterior Distribution The posterior distribution for the model parameters given the observed data is found by combining the prior distribution with the likelihood for the parameters given the data. This is done using Bayes' Rule: Prior X Likelihood Evidence

27 Finding the Posterior Distribution The denominator is just the required normalizing constant, and can often be filled in at the end, if necessary (evidence of the model). we can rewrite: P(parameters data) ~ P(parameters)P(data parameters) Posterior ~ Prior X Likelihood We make predictions by integrating with respect to the posterior:

28 The Computational Challenge A big challenge in making Bayesian modeling work is computing the posterior distribution. We have to drawn random samples and average those samples. It is important that these samples represent the true posterior probability Markov Chains Monte Carlo Methods (MCMC) sampling methods

29 MCMCStuff Toolbox MCMCstuff toolbox is a collection of Matlab functions for Bayesian inference with Markov chain Monte Carlo (MCMC) methods. Some of the most computationally critical parts have been coded in C for faster computation Provides different sampling methods to implement MCMC such as Metropolis-Hastings sampling, Hybrid Monte Carlo sampling, Gibbs sampling and Reversible jump Markov chain Monte Carlo sampling.

30 The Proposed Model Network Sub-System. The network subsystem resides at the core of the wireless network. Bayesian Neural Network is used as the users movements prediction model. Historical information is used to train the model. Predict the next cell where the user is expected to be. We can also use this model to predict the services the users are expected to user in advance.

31 The Proposed Model Mobile Host Sub-System. An application that is installed on every mobile phone. The purpose of this application is to check if the predicted cell (predicted by the network subsystem) is the same as the actual cell. If the actual movement of the user agrees with the predicted scenario, nothing is done. Otherwise, the mobile station initiates a location update to the core network as the predicted cell is not the same as the actual cell.

32 Input Data Person Characteristics Value Phonenumber_oid survey_position survey_neighborhoo d survey_hours survey_regular Survey_Hangouts survey_predictable_li fe 264 Student Boston 10am-8pm* Somewhat Restaurant/bar; friends Very survey_sick_recently survey_travel Survey_Data_Plan survey_provider Survey_Calling_plan survey_minutes survey_texts Survey_Like_Intros survey_ml_community No Often - week/month Unlimited T-mobile National 1000* Very often Occasionally Very close survey_forget_phon e Never survey_run_out_of_ batteries Rarely - once/month survey_how_often_g et_sick occasionally (2-4 times a year)

33 Experiments Compare Results from Bayesian Neural Network with Results from traditional neural networks. (backpropagation learning) Accuracy, Speed and Complexity. Vary number of hidden nodes. Vary number of samples generated by Markov Chain Monte Carlo methods (MCMC). Prediction accuracy for weekends against weekdays. Test prediction accuracy for wider window. Page 6 neighbor cells. Services prediction.

34 Wireless Networks Wireless mobile networks are flexible data communication systems which use wireless media to transmit and receive data over the air, minimizing the need for wired connections Ability to provide mobile users with access to services and resources while roaming Location management Handoff management Different types and architectures Wireless Cellular Networks (2G 3G) Ad-Hoc networks WiMax Mobile IP

35 Neural Networks in Movement Prediction

36 1) Prediction-based location management using multilayer neural networks Predict the future location of the mobile object in wireless networks. 93% prediction accuracy for uniform movement. 40% to 70% for regular movement. 2% to 30% for random movement patterns. Model with 3 layers (input-hidden-output). The number of neurons is chosen through experimentation or by trial. Example input: {p1, p2, p3} = {(d1, ds1), (d2, ds2), (d3, ds3)} = {(North, 2), (East, 1), (East, 3)}. d is direction of movement. ds is distance traveled. Output is the next direction and distance traveled.

37 2) A User Pattern Learning Strategy for Managing Users Mobility in UMTS Networks Present a user pattern learning strategy using neural networks to reduce the location update signaling cost by increasing the intelligence of the location procedure in 3G cellular networks. Artificial Neural Network model which learns the movement patterns of roaming users. This strategy associates to each user a list of cells where he is likely to be with a given probability in each time interval. Users are divided into three categories Users who have a very high probability of being where the system expects them to be. users who have a certain likelihood of being where the system expects them to be. Users whose position at a given moment is unpredictable.

38 3) Person Movement Prediction Using Neural Networks Location prediction of person movements in office building. Next location prediction accuracy of 92%. NN model is composed of three layers (input-hidden-output). Number of input neurons depends on the room history length which is optimally 2. Number of neurons in the hidden layer is N+1, where N is the number of neurons in the input layer. The output layer predicts the next location of the user. Tested prediction with other models: Bayesian Networks, Markov Models, Hidden Markov Models. No model outperforms in all prediction cases. Future research direction: use a hybrid model to improve prediction accuracy.

39 4) The Prediction of Bus Arrival Time Using Automatic Vehicle Location Systems Data Develop and apply a model to predict bus arrival time using Automatic Vehicle Location data. Identify the prediction interval of bus arrival time and the probability of a bus being on time. Inputs to the neural networks are: Bus arrival time. Dwell time. Schedule adherence. Traffic congestion. The optimal number of neurons in the Hidden layer is 15 according to experiments. Output of the neural net is the Prediction of the bus arrival time at the following stops.

40 Bayesian Belief Networks in Movements Prediction

41 1) Managing Uncertainty: Modeling Users in Location- Tracking Applications This paper presents a user model based on his characteristics and preferences to facilitate more precise estimation of the user's location. The technique used can cut required bandwidth in half without losing any precision in location estimation compared with standard models. The location prediction is done using Bayesian Belief Network. The model is tested in predicting the location of taxicabs. variables that used in the model: Temporal variables represent when events occur: daymonth-year. Spatial variables represent possible user's locations: town-highway-building. Environmental variables represent things such as weather conditions, road conditions, and special events. Behavioral variables represent things such as typical speeds, resting patterns, preferred work areas, and common reactions in certain situations. The user model proposed takes all these variables and builds a set of causality relationships among them.

42 2) Opportunity Knocks: a System to Provide Cognitive Assistance with Transportation Services This system is to aid below average cognitive people in public transportations. The proposed system is based on Hierarchical Dynamic Bayesian Network. Model time The top level estimates the current goal. The middle layer represents segments of a trip and mode of transportations. The lowest layer estimates the person s location on the street map.

43 3) Modeling Transportation routines using Dynamic Mixed Networks This research describes the application of Hybrid Dynamic Mixed Networks to a real-world problem of inferring car travel activity of individuals. Hybrid Dynamic Mixed Network is extension of Dynamic Bayesian Network to include both discrete and continuous variables in the model. The major query in the model is to predict where a traveler is likely to go and what his/her route to the destination is likely to be, given the current location of the traveler s car. Extends the location prediction model with higher variables such as time of day and day of week affecting the user goal.

44 Movement Prediction Prediction attempts to form patterns from historical data that permit it to predict the next events given the available input data We are creatures of habits We follow regular routines We move with destination in mind Location Prediction based on historical movements Intelligent Decisions Better Bandwidth Utilization Reducing Update Cost Services Prediction Quality of Service

45 BTS houses the radio tranceivers that define a cell and handles the radio interface protocols with the mobile station. BSC manages the radio interface channels (setup, teardown, frequency hopping, etc.) as well as handovers The OMC provides remote monitoring of the network performance and permits remote reconfiguration and fault management activity as well as alarm and event monitoring. HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the subscriber MSC acts like a normal switching node, and in addition provides all the functionality needed to handle a mobile subscriber, including registration, authentication, location updating, inter-msc handovers, and call routing to a roaming subscriber VLR contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR

46 Add-Hoc Network Self-configuring network of mobile routers and associated hosts Distributed Architecture No centralized Access-Point Nodes might suddenly disappear from, or show up in, the network Dynamic Network Topology The routers are free to move randomly and organize themselves at random Predict Future Network Topology based on the movements patterns of nodes

47 WiMax (Worldwide Interoperability for Microwave Access ) Description Wireless technology that provides highthroughput broadband connections over long distances 50 km at 70Mbit/s e (Full Mobility) Location Management Handover Management Next Cell Prediction

48 Mobile IP Provides an efficient, scalable mechanism for node mobility within the Internet Nodes may change their point-of-attachment to the Internet without changing their IP address Predict Next Point of Attachment based on the movements history of the node

49 Representing the Prior and Posterior Distributions by Samples The complex distributions we will often use as priors, or obtain as posteriors, may not be easily represented or understood using formulas. A very general technique is to represent a distribution by a sample of many values drawn randomly from it. We can then: Visualize the distribution by viewing these sample values, or lowdimensional projections of them. Make Monte Carlo estimates for probabilities or expectations with respect to the distribution, by taking averages over these sample values. Obtaining a sample from the prior is often easy. Obtaining a sample from the posterior is usually more difficult but this is nevertheless the dominant approach to Bayesian computation.

50 Priors Objective Priors Non-informative priors that attempt to capture ignorance Subjective Priors Priors should capture our beliefs as well as possible. They are subjective but not arbitrary Hierarchical Priors Multiple levels of priors Empirical Priors Learn some of the parameters of the prior from the data ( Empirical Bayes")

51 The Challenge of Specifying Models and Priors The first challenge in making the Bayesian approach work is to choose a suitable model and prior. This can be especially difficult for the complex, high-dimensional problems that are traditional in machine learning. A suitable model should encompass all the possibilities that are thought to be at all likely. Unrealistically limited forms of functions (eg, linear) or distributions should be avoided. A suitable prior should avoid giving zero or tiny probability to real possibilities, but should also avoid spreading out the probability over all possibilities, however unrealistic. Unfortunately, the effort in doing a good job can easily get out of hand. One strategy is to introduce latent variables into the model, and hyperparameters into the prior. Both of these are devices for modeling dependencies in a tractable way.

52 Bayesian Methodology* We formulate our knowledge about the situation probabilistically: We define a model that expresses qualitative aspects of our knowledge (eg, forms of distributions, independence assumptions). The model will have some unknown parameters. We specify a prior probability distribution for these unknown parameters that expresses our beliefs about which values are more or less likely, before seeing the data. We gather data. We compute the posterior probability distribution for the parameters, given the observed data. We use this posterior distribution to: Make predictions by averaging over the posterior distribution. *Slides extracted from : Radford Neal. Tutorial: Bayesian Methods for Machine Learning. Neural Information Processing Systems Conference

53 Inference at a Higher Level: Model Comparison So far, we've assumed we were able to start by making a definite choice of model. What if we're unsure which model is right? We can compare models based on the marginal likelihood (the evidence) for each model, which is the probability the model assigns to the observed data. This is the normalizing constant in Bayes' Rule that we previously ignored (the denominator in Bayes formula): Here, M 1 represents the condition that model M 1 is the correct one (which previously we just assumed). Similarly, we can compute P(data M 2 ), for some other model (which may have a different parameter space). We might choose the model that gives higher probability to the data, or average predictions from both models with weights based on their marginal likelihood, multiplied by any prior preference we have for M 1 versus M 2.

54 Model Comparison Compare model classes, e.g. m and m, using posterior probabilities given Data Model classes that are too simple are unlikely to generate the data set. Model classes that are too complex can generate many possible data sets, so again, they are unlikely to generate that particular data set at random. We can also base prediction from different models not just from one model (weighted by their posterior probabilities)

55 Hyperparameters The priors we give to weights, such as wij ~ Gaussian(0; σ u2 ) affect the nature of functions drawn from the network prior. Here are samples of three functions (of one input) drawn using Gaussian priors for networks 2 of 1000 hidden units using two different σ u A larger σ u produces wigglier" functions. Usually, we won't know exactly how wiggly the function should be. So we make σ u a variable hyperparameter, and give it a prior distribution that spans a few orders of magnitude.

56 Markov Chain Monte Carlo Sampling Methods In the MCMC, samples are generated using a Markov chain that has the desired posterior distribution as its stationary distribution. The strategy is to start with arbitrary values θ, let the Markov chain run until it has practically reached convergence, say after T iterations, and use the next k observed values of the chain as an approximate posterior sample A = { θ1, θ2..., θk}. The more difficult problem is to determine how many steps are needed to converge to the stationary distribution within an acceptable error. Metropolis-Hastings sampling Hybrid Monte Carlo sampling Gibbs sampling Reversible jump Markov chain Monte Carlo sampling MCMCStuff toolbox in Matlab

MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE

MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE MINING OPERATIONAL DATA FOR IMPROVING GSM NETWORK PERFORMANCE Antonio Leong, Simon Fong Department of Electrical and Electronic Engineering University of Macau, Macau Edison Lai Radio Planning Networks

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION The most important part of any project i.e., implementation. It describes the various functionalities step by step under each module with their outputs.

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

Approximate Bayesian Computation. Alireza Shafaei - April 2016

Approximate Bayesian Computation. Alireza Shafaei - April 2016 Approximate Bayesian Computation Alireza Shafaei - April 2016 The Problem Given a dataset, we are interested in. The Problem Given a dataset, we are interested in. The Problem Given a dataset, we are interested

More information

Overview. Monte Carlo Methods. Statistics & Bayesian Inference Lecture 3. Situation At End Of Last Week

Overview. Monte Carlo Methods. Statistics & Bayesian Inference Lecture 3. Situation At End Of Last Week Statistics & Bayesian Inference Lecture 3 Joe Zuntz Overview Overview & Motivation Metropolis Hastings Monte Carlo Methods Importance sampling Direct sampling Gibbs sampling Monte-Carlo Markov Chains Emcee

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

Understanding Carrier Wireless Systems

Understanding Carrier Wireless Systems Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding

More information

Theoretical Concepts of Machine Learning

Theoretical Concepts of Machine Learning Theoretical Concepts of Machine Learning Part 2 Institute of Bioinformatics Johannes Kepler University, Linz, Austria Outline 1 Introduction 2 Generalization Error 3 Maximum Likelihood 4 Noise Models 5

More information

10-701/15-781, Fall 2006, Final

10-701/15-781, Fall 2006, Final -7/-78, Fall 6, Final Dec, :pm-8:pm There are 9 questions in this exam ( pages including this cover sheet). If you need more room to work out your answer to a question, use the back of the page and clearly

More information

Random projection for non-gaussian mixture models

Random projection for non-gaussian mixture models Random projection for non-gaussian mixture models Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract Recently,

More information

Computer vision: models, learning and inference. Chapter 10 Graphical Models

Computer vision: models, learning and inference. Chapter 10 Graphical Models Computer vision: models, learning and inference Chapter 10 Graphical Models Independence Two variables x 1 and x 2 are independent if their joint probability distribution factorizes as Pr(x 1, x 2 )=Pr(x

More information

An Introduction to Markov Chain Monte Carlo

An Introduction to Markov Chain Monte Carlo An Introduction to Markov Chain Monte Carlo Markov Chain Monte Carlo (MCMC) refers to a suite of processes for simulating a posterior distribution based on a random (ie. monte carlo) process. In other

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50 Mobility Models Larissa Marinho Eglem de Oliveira CMPE 257 Wireless Networks May 26th 2015 (UCSC) May 2015 1 / 50 1 Motivation 2 Mobility Models 3 Extracting a Mobility Model from Real User Traces 4 Self-similar

More information

Summary: A Tutorial on Learning With Bayesian Networks

Summary: A Tutorial on Learning With Bayesian Networks Summary: A Tutorial on Learning With Bayesian Networks Markus Kalisch May 5, 2006 We primarily summarize [4]. When we think that it is appropriate, we comment on additional facts and more recent developments.

More information

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of

More information

A Fast Learning Algorithm for Deep Belief Nets

A Fast Learning Algorithm for Deep Belief Nets A Fast Learning Algorithm for Deep Belief Nets Geoffrey E. Hinton, Simon Osindero Department of Computer Science University of Toronto, Toronto, Canada Yee-Whye Teh Department of Computer Science National

More information

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: ) E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Overview of Part Two Probabilistic Graphical Models Part Two: Inference and Learning Christopher M. Bishop Exact inference and the junction tree MCMC Variational methods and EM Example General variational

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66

UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66 UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66 PERFORMANCE EVALUATION OF QUALITY OF SERVICE OF CDMA20001X MOBILE RADIO NETWORK *Ifeagwu, E N., Obi, P.I. and

More information

Can I roam in another country using your service? At the current moment, P1 W1MAX service is limited to the use within our coverage in Malaysia.

Can I roam in another country using your service? At the current moment, P1 W1MAX service is limited to the use within our coverage in Malaysia. What is P1 W1MAX? P1 W1MAX offers you competitively priced wireless high speed internet access. A new experience that will change how we live, learn and play. Can I roam in another country using your service?

More information

UNIT II NETWORKING

UNIT II NETWORKING UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection

More information

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions

More information

Measurements in the wireless

Measurements in the wireless Contents Measurements in the wireless Lecture slides for S-38.3183 6.4.2006 Mika Ilvesmäki Motivation Wireless environment spesifics Wireless trace collection Wireless measurement methods Mobility measurements

More information

Tie strength, social capital, betweenness and homophily. Rik Sarkar

Tie strength, social capital, betweenness and homophily. Rik Sarkar Tie strength, social capital, betweenness and homophily Rik Sarkar Networks Position of a node in a network determines its role/importance Structure of a network determines its properties 2 Today Notion

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

ECE 6504: Advanced Topics in Machine Learning Probabilistic Graphical Models and Large-Scale Learning

ECE 6504: Advanced Topics in Machine Learning Probabilistic Graphical Models and Large-Scale Learning ECE 6504: Advanced Topics in Machine Learning Probabilistic Graphical Models and Large-Scale Learning Topics Bayes Nets: Inference (Finish) Variable Elimination Graph-view of VE: Fill-edges, induced width

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Technical description of international mobile roaming May 2010

Technical description of international mobile roaming May 2010 Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of

More information

Today. Lecture 17: Reality Mining. Last time

Today. Lecture 17: Reality Mining. Last time Today We will introduce the idea of a relational database, discuss its underlying data model and present a slightly simplified view of how to access its information Lecture 17: As with all new technologies

More information

Data Mining. Neural Networks

Data Mining. Neural Networks Data Mining Neural Networks Goals for this Unit Basic understanding of Neural Networks and how they work Ability to use Neural Networks to solve real problems Understand when neural networks may be most

More information

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

CSE 586 Final Programming Project Spring 2011 Due date: Tuesday, May 3

CSE 586 Final Programming Project Spring 2011 Due date: Tuesday, May 3 CSE 586 Final Programming Project Spring 2011 Due date: Tuesday, May 3 What I have in mind for our last programming project is to do something with either graphical models or random sampling. A few ideas

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

THE Global System for Mobile Communications (GSM)

THE Global System for Mobile Communications (GSM) IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 6, DECEMBER 1998 851 Database and Location Management Schemes for Mobile Communications Anna Hać, Senior Member, IEEE, and Bo Liu Abstract Signaling traffic

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Optimising 3G Migration

Optimising 3G Migration Optimising 3G Migration Sub-Regional Seminar on IMT-2000 Warsow,, 2-42 4 October 2001 Marie FROMENT Marketing Manager Alcatel Mobile Network Division marie.froment@alcatel.fr Optimising 3G Migration Outline

More information

Level-set MCMC Curve Sampling and Geometric Conditional Simulation

Level-set MCMC Curve Sampling and Geometric Conditional Simulation Level-set MCMC Curve Sampling and Geometric Conditional Simulation Ayres Fan John W. Fisher III Alan S. Willsky February 16, 2007 Outline 1. Overview 2. Curve evolution 3. Markov chain Monte Carlo 4. Curve

More information

Learning the Structure of Deep, Sparse Graphical Models

Learning the Structure of Deep, Sparse Graphical Models Learning the Structure of Deep, Sparse Graphical Models Hanna M. Wallach University of Massachusetts Amherst wallach@cs.umass.edu Joint work with Ryan Prescott Adams & Zoubin Ghahramani Deep Belief Networks

More information

Probabilistic Abstraction Lattices: A Computationally Efficient Model for Conditional Probability Estimation

Probabilistic Abstraction Lattices: A Computationally Efficient Model for Conditional Probability Estimation Probabilistic Abstraction Lattices: A Computationally Efficient Model for Conditional Probability Estimation Daniel Lowd January 14, 2004 1 Introduction Probabilistic models have shown increasing popularity

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilistic Graphical Models Lecture 17 EM CS/CNS/EE 155 Andreas Krause Announcements Project poster session on Thursday Dec 3, 4-6pm in Annenberg 2 nd floor atrium! Easels, poster boards and cookies

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Model learning for robot control: a survey

Model learning for robot control: a survey Model learning for robot control: a survey Duy Nguyen-Tuong, Jan Peters 2011 Presented by Evan Beachly 1 Motivation Robots that can learn how their motors move their body Complexity Unanticipated Environments

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

QualNet 4.5 Cellular Model Library

QualNet 4.5 Cellular Model Library QualNet 4.5 Cellular Model Library February 2008 Scalable Network Technologies, Inc. 6701 Center Drive West, Suite 520 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Nested Sampling: Introduction and Implementation

Nested Sampling: Introduction and Implementation UNIVERSITY OF TEXAS AT SAN ANTONIO Nested Sampling: Introduction and Implementation Liang Jing May 2009 1 1 ABSTRACT Nested Sampling is a new technique to calculate the evidence, Z = P(D M) = p(d θ, M)p(θ

More information

Scalable Selective Traffic Congestion Notification

Scalable Selective Traffic Congestion Notification Scalable Selective Traffic Congestion Notification Győző Gidófalvi Division of Geoinformatics Deptartment of Urban Planning and Environment KTH Royal Institution of Technology, Sweden gyozo@kth.se Outline

More information

Modeling time series with hidden Markov models

Modeling time series with hidden Markov models Modeling time series with hidden Markov models Advanced Machine learning 2017 Nadia Figueroa, Jose Medina and Aude Billard Time series data Barometric pressure Temperature Data Humidity Time What s going

More information

Global modelling of air pollution using multiple data sources

Global modelling of air pollution using multiple data sources Global modelling of air pollution using multiple data sources Matthew Thomas SAMBa, University of Bath Email: M.L.Thomas@bath.ac.uk November 11, 015 1/ 3 OUTLINE Motivation Data Sources Existing Approaches

More information

Bayesian hierarchical modelling of traffic flow with application to Malta s road network

Bayesian hierarchical modelling of traffic flow with application to Malta s road network .... Bayesian hierarchical modelling of traffic flow with application to Malta s road network Luana Chetcuti Zammit Dr. Maria Attard, Dr K. Scerri University of Malta October 2013 1 / 17 Analysis of Traffic

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Approximate (Monte Carlo) Inference in Bayes Nets. Monte Carlo (continued)

Approximate (Monte Carlo) Inference in Bayes Nets. Monte Carlo (continued) Approximate (Monte Carlo) Inference in Bayes Nets Basic idea: Let s repeatedly sample according to the distribution represented by the Bayes Net. If in 400/1000 draws, the variable X is true, then we estimate

More information

Probabilistic Learning Classification using Naïve Bayes

Probabilistic Learning Classification using Naïve Bayes Probabilistic Learning Classification using Naïve Bayes Weather forecasts are usually provided in terms such as 70 percent chance of rain. These forecasts are known as probabilities of precipitation reports.

More information

Short-Cut MCMC: An Alternative to Adaptation

Short-Cut MCMC: An Alternative to Adaptation Short-Cut MCMC: An Alternative to Adaptation Radford M. Neal Dept. of Statistics and Dept. of Computer Science University of Toronto http://www.cs.utoronto.ca/ radford/ Third Workshop on Monte Carlo Methods,

More information

Cellular Networks and Mobility

Cellular Networks and Mobility Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Hierarchical routing in traffic networks

Hierarchical routing in traffic networks Hierarchical routing in traffic networks Bogdan Tatomir ab Henrik Dibowski c Leon Rothkrantz ab a Delft University of Tehnology, Mekelweg 4, 2628 CD Delft b DECIS Lab, Delftechpark 24, 2628 XH Delft, The

More information

Note Set 4: Finite Mixture Models and the EM Algorithm

Note Set 4: Finite Mixture Models and the EM Algorithm Note Set 4: Finite Mixture Models and the EM Algorithm Padhraic Smyth, Department of Computer Science University of California, Irvine Finite Mixture Models A finite mixture model with K components, for

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

INDIAN INSTITUTE OF MANAGEMENT CALCUTTA WORKING PAPER SERIES. WPS No. 644/ August A Markov-based Diurnal Mobility Model for 3G Cellular Networks

INDIAN INSTITUTE OF MANAGEMENT CALCUTTA WORKING PAPER SERIES. WPS No. 644/ August A Markov-based Diurnal Mobility Model for 3G Cellular Networks INDIAN INSTITUTE OF MANAGEMENT CALCUTTA WORKING PAPER SERIES WPS No. 644/ August 2009 A Markov-based Diurnal Mobility Model for 3G Cellular Networks by Samir K Sadhukhan SSA, IIM Calcutta, Diamond Harbour

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

Warm-up as you walk in

Warm-up as you walk in arm-up as you walk in Given these N=10 observations of the world: hat is the approximate value for P c a, +b? A. 1/10 B. 5/10. 1/4 D. 1/5 E. I m not sure a, b, +c +a, b, +c a, b, +c a, +b, +c +a, b, +c

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

08 An Introduction to Dense Continuous Robotic Mapping

08 An Introduction to Dense Continuous Robotic Mapping NAVARCH/EECS 568, ROB 530 - Winter 2018 08 An Introduction to Dense Continuous Robotic Mapping Maani Ghaffari March 14, 2018 Previously: Occupancy Grid Maps Pose SLAM graph and its associated dense occupancy

More information

Discussion on Bayesian Model Selection and Parameter Estimation in Extragalactic Astronomy by Martin Weinberg

Discussion on Bayesian Model Selection and Parameter Estimation in Extragalactic Astronomy by Martin Weinberg Discussion on Bayesian Model Selection and Parameter Estimation in Extragalactic Astronomy by Martin Weinberg Phil Gregory Physics and Astronomy Univ. of British Columbia Introduction Martin Weinberg reported

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

The birth of public bus transportation system

The birth of public bus transportation system Link Travel Time Prediction using Origin Destination Matrix and Neural Network Model AYOBAMI EPHRAIM ADEWALE University of Tartu adewale@ut.ee May 28, 2018 Abstract Origin Destination matrix have been

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

arxiv: v1 [stat.ml] 29 Nov 2016

arxiv: v1 [stat.ml] 29 Nov 2016 Probabilistic map-matching using particle filters Kira Kempinska 1, Toby Davies 1 and John Shawe-Taylor 2 arxiv:1611.09706v1 [stat.ml] 29 Nov 2016 1 Department of Security and Crime Science, University

More information

MCMC Methods for data modeling

MCMC Methods for data modeling MCMC Methods for data modeling Kenneth Scerri Department of Automatic Control and Systems Engineering Introduction 1. Symposium on Data Modelling 2. Outline: a. Definition and uses of MCMC b. MCMC algorithms

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

1 Wireless Network Architecture

1 Wireless Network Architecture CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects

More information

Introduction. RRM Frameworks. Common Radio Resource Management

Introduction. RRM Frameworks. Common Radio Resource Management Introduction There has been a lot of progress in the development of new wireless broadband technologies recently. 4G technologies such as mobile WiMAX and LTE are almost at the end of their commercial

More information

CS281 Section 9: Graph Models and Practical MCMC

CS281 Section 9: Graph Models and Practical MCMC CS281 Section 9: Graph Models and Practical MCMC Scott Linderman November 11, 213 Now that we have a few MCMC inference algorithms in our toolbox, let s try them out on some random graph models. Graphs

More information

Bayesian Spatiotemporal Modeling with Hierarchical Spatial Priors for fmri

Bayesian Spatiotemporal Modeling with Hierarchical Spatial Priors for fmri Bayesian Spatiotemporal Modeling with Hierarchical Spatial Priors for fmri Galin L. Jones 1 School of Statistics University of Minnesota March 2015 1 Joint with Martin Bezener and John Hughes Experiment

More information

Implementation of Artificial Neural Network for Mobile Movement Prediction

Implementation of Artificial Neural Network for Mobile Movement Prediction Indian Journal of Science and Technology, Vol 7(6), 858 863, June 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Implementation of Artificial Neural Network for Mobile Movement Prediction J. Venkata

More information