On the Analysis of Periodic Mobility Behaviour

Size: px
Start display at page:

Download "On the Analysis of Periodic Mobility Behaviour"

Transcription

1 On the Analysis of Periodic Mobility Behaviour Zhiyu Wang, Mario A. Nascimento and M.H. MacGregor Department of Computing Science University of Alberta, Canada {zhiyu, mn, ABSTRACT Encounters between devices can be very useful for message routing in mobile networks where there is no fixed infrastructure. In this context, understanding user mobile behaviour is essential to design effective and efficient network protocols. This paper presents a generic methodology to model and find periodic encounter patterns. Using this methodology and the Nokia-MDC datasets, we are able to find strong weekly and daily periodic behaviours that last up to a few months. The experimental results show that combining periodic behaviour from different network types, e.g., Bluetooth, GSM, and WLAN networks, is capable of providing communications to a large-scale network. Furthermore, we also investigate whether the network formed by periodic encounters has a small-world structure. Keywords Mobility, Periodicity, Connectivity, Small-world. INTRODUCTION Current wireless services mostly depend on network infrastructure. In many scenarios, ad-hoc networks can provide new opportunities for communication by removing the need for network infrastructure. However, communications in such networks could be unreliable because there may not be a complete path between the source and the destination(s) from time to time. Therefore, we seek to explore useful characteristics and to discover new techniques to allow communication in ad-hoc networks. Mobile devices are carried by people and/or animals. They typically do not move randomly and often exhibit periodically repeated movements. For example, people often use the same route daily to commute to/from work. As a result, each mobile node may encounter a set of other nodes periodically, for instance at approximately the same time every weekday. Such periodic encounters can be used to establish communication routes in mobile networks. Thus, in this paper we propose a methodology to find periodic behaviour within the Nokia-MDC datasets [7] and examine connectivity among mobile nodes with periodic behaviour. Nonetheless, our methodology is applicable to other mobile traces as well. In summary, this paper has three main contributions: ) we observe strong weekly and daily periodic behaviour within the datasets; 2) we evaluate the persistence of detected periodic behaviour; 3) we also discuss why, unlike other networks formed by periodic encounters, the one yielded by the NOKIA-MDC datasets does not lead to a small-world. The remainder of this paper is structured as follows. A brief introduction about the datasets and their preparation is discussed in Section 2. In Section 3, we present detection techniques and experimental results. Section 4 presents discoveries regarding the small-world structure. Finally, conclusions are presented in Section DATASETS AND PREPARATION The Nokia-MDC datasets include mobility datasets for different network types. The three types of datasets are Bluetooth, GSM and WLAN. Bluetooth traces track direct encounters between mobile nodes. Both GSM and WLAN traces record associations between mobile nodes and either access points or cellular towers. Even though access points and cellular towers are stationary, they can link mobile nodes. that never directly encounter. Therefore, we also include stationary devices as nodes in the network where associations are considered to be encounters as well. In the Nokia-MDC datasets, encounters are grouped by user, where each encounter has a corresponding timestamp. From that, we need to define the duration of each encounter. In Figure, mobile node A encounters nodes B and C at timestamp T i. At the next timestamp, A only meets node C. We assume that A stops seeing B right before T i+. Therefore, the encounter for node pair {A,B} starting at T i has a duration of T i+ T i time units. Similarly, the encounter for node pair {A,C} starting at T i has a duration of T i+2 T i time units. Using this approach, there are two complete encounters, {A, B} and {A, C}, starting at T i. Ti Ti+ Ti+2 Time This material was prepared for the Mobile Data Challenge 22 (by Nokia) Workshop; June 8-9, 22; Newcastle, UK. The copyright belongs to the authors of this paper.. B,C C Figure : Encounter history of mobile node A Given a granularity, e.g., hour or day, a mobile trace can be broken into consecutive disjoint intervals. Then we D

2 create an encounter series for every unique pair of nodes where the length of the series equals the number of pairs of intervals after partitioning the trace at a chosen granularity. For a pair of nodes, if they have an encounter during a specific interval, we record a in that interval, otherwise, a is recorded. Given a monitoring duration σ and a granularity τ, the encounter series for a pair of nodes {x,y}, is defined as: s x,y = {d,..., d n} where n = σ τ and d j = {, } j [, n] In this paper, our analyses focus on hour and day granularity. Table presents the summary of the datasets and encounter series. Network Hourly Daily Type NN NS ANE ANE Bluetooth GSM WLAN NN=Number of Nodes NS=Number of Series ANE=Average Number of Encounters Table : Overall summary of all traces 3. PERIODICITY Using binary encounter series as input, our objective is to find periodic behaviour. In this section, we present our detection techniques and observations on the Nokia-MDC datasets. By examining the cumulated re-appearance probabilities of nodes to specific locations [4, 6, ] and the cumulated probabilities of users to return to a certain location after a certain amount of time [], previous work revealed periodic behaviour within user mobility. However, finding a route in a mobile network, using a store-and-forward approach, needs more than that. First, we need to find out which pairs of nodes exhibit periodic behaviours. Second, among encounters between two users, we need to know which encounters are periodic encounters, and which encounters are just occasional or even random encounters. A route may fail if an occasional or random encounter is selected and therefore should be avoided. Recent studies aimed at detecting pair-wise periodic encounters. One study reported spectral analyses of periodicities of association patterns from access points [8]. Another presented spectral analyses of mobility traces to quantize the regularity and periodicity of access points nodal encounters [9]. The fundamental tool used in both works is Discrete Fourier Transformation. However, one of the main problems from using Discrete Fourier Transformation is the artifact that affects the accuracy of period detection. For example, the most significant period could be 7 days and 8 hours instead of integers as 7 days or 8 days. How to correctly interpret fractional period is itself a non-trivial (and a domaindependent issue). In addition to spectral analyses, techniques from data mining can also retrieve locally/partially periodic behaviour that persists only for a very short period of time, whose long-term persistence is unknown [2]. Targeting at long-term periodic behaviour within real mobility ANE= NS where S contains all encounter series. s x,y S d i s x,y d i traces, our methods extract the specific encounter patterns (both period and phase) for pairs of nodes that meet each other periodically whereas other work has stopped short of this. Our fundamental tool is the auto-persistence function [, 2]. It calculates the conditional probabilities of the different combinations of two values in a binary time series that are separated by a given lag k, i.e., that is k positions away in encounter series. There are, of course, four combinations of two binary values. We concentrate on the combination where two intervals k-lags away from each other have value, i.e., containing encounters. We define the auto-persistence function (APF) as: AP F (k) = P (d t+k = d t = ) () where k is the lag between the two intervals, and t represents the interval number. As an empirical counterpart to the auto-persistence function, the auto-persistence graph (APG) is defined as: AP G(k) = n n k n k t= I{d t+k =, d t = } n t= I{dt = } (2) where n is the size of encounter series, k is the lag, and I is the binary indication function, whose value equals if and only if the condition is satisfied. As an example, Figure 2 shows the APG for an encounter series derived from WLAN traces with a day granularity. Three peaks can be found at lags 7, 4 and 2. These lags represent exactly 7 days, 4 days and 2 days, which appear at multiples of the minimum lag of 7 days. This repetition in the APG comes from the underlying periodicity in the encounter series. If an encounter series has periodic behaviour with length p, then this encounter series also has periodic behaviour with length 2p, 3p and so on. APG Time Lag Figure 2: APG for a real encounter series 3. Periodic behaviour The duration of the Nokia-MDC datasets is 328 hours, which covers 548 days. After transforming a mobility trace into encounter series for every encountering node pair, we obtain two sets of encounter series. One with 548 values is the daily encounter series, and the other with 328 values is the hourly encounter series. We applied our detection techniques to both daily and hourly encounter series. Unfortunately, none of the encounter series exhibits periodic behaviour for the full duration of the series. However, this does not mean that there is no periodic behaviour that lasts for shorter periods. We will discuss the reason for this shortly. To discover short-term periodic behaviour, we break the traces into disjoint segments with the same length. For example, each daily encounter series could be broken down into 9 segments where each segment is 3 days in length.

3 Number of deteciotn Bluetooth GSM WLAN Segment length (days) (a) daily CDF.2. Bluetooth Gsm Wlan Empirical CDF Period length (days) (b) 35-day segments Figure 3: Detected periodic behaviour For daily and hourly encounter series, we apply our detection techniques to segments with length varying from day to 548 days or 24 hours to 328 hours with a day or 24 hour increment. As shown in Figure 3(a), 35-day segments in the daily encounter series have the largest number of detected periodic encounters. Similarly, even though not shown here, we observed that 2-hour segments in the hourly encounter series return the largest number of detected periodic series. To understand these periodic behaviours in daily encounter series, Figure 3(b) provides more details about detected periodic behaviour by presenting the Cumulative Distribution Function (CDF) of their period. The results indicate that there is a strong weekly encounter behaviour in Figure 3(b) in daily encounter series. Similarly, a 24 hour pattern could also be seen in the hourly encounter series. Theoretically, our detection techniques require the length of each segment to be a minimum of four times the period length. For example, if there is a 7-day periodic behaviour, our techniques need a minimum of 28-day segment to detect such periodicity. With a 28-day segment, the APG can calculate correlations within encounter series from lag up to lag 4 where two peaks can be observed at lag 7 and 4. However, because the APG stops at lag 4, we do not know whether the curve at lag 4 is going to climb or drop at the next lags, i.e., lag 5, 6 and so on. In other words, we can not decide whether the peak at lag 4 is caused by the repetition of underlying periodicity. Therefore, instead of using 28-day segments, our detection techniques requires longer segments. Because 35 days is the next duration greater than 28 that perfectly accommodate 7-day periodicities, 35-day segments have the largest number of detected periodic encounters even though they do not match to any commute schedule. 3.2 Persistence of periodic behaviour Once the period length is known, we can extract periodic encounters from the original segments using alignment. For alignment, each segment is split into disjoint sub-segments where the length of each sub-segment equals the period length previously detected. Then, we stack all sub-segments vertically to examine the probability that encounters appear at a particular column. When the probability of encounters in a column is greater than a user-defined threshold, we consider that encounter as a periodic encounter. After finding all periodic encounters, we examine how long those periodic encounters reliably appear in the future. We call this time range the projected persistence. After extracting periodic encounters, we evaluate their projected persistence by using the remaining encounter series right after the segment. For example, if the very first Segment I I 2 I 3 I 4 I 5 I 6 I Figure 4: Projected persistence evaluation Time 35-day segment has periodic encounters, we use the remaining 53 days to evaluate the persistence of detected periodic encounters. Similarly, if the second 35-day segment has periodic encounters, we use the remaining 478 days to evaluate persistence. We first partition the remaining encounter series into disjoint intervals, I, whose size equals the previously detected period. To evaluate projected persistence, we introduce two thresholds: ) the matching probability of periodic encounters within an interval, θ, and 2) the acceptable number of intervals without periodic encounters,. Given an interval, θ measures the probability that this interval has periodic encounters. For example, if detected periodic encounters take place every Monday and Friday, and a given interval only has an encounter on Monday, then θ = /2 = for the given interval. Because of unexpected events, periodic encounters may get interrupted. Therefore, is used to tolerate the number of intervals that suffer from missing periodic encounters because of interruptions. a) = θ threshold 35-day 2-hour days hours 39.9 days hours 29. days hours days hours 4.59 days hours b) θ = threshold 35-day 2-hour 4.59 days hours 7.29 days 8.6 hours days 3.78 hours days hours Table 2: Projected persistence Using Figure 4 as an example, let us assume that from the very first 35-day segment, we detected periodic encounters repeating every 7 days. Since the period length is 7 days, we partition the remaining encounter series into intervals whose size equals 7 days and calculate θ for each interval. Given thresholds at θ = and =, only I satisfies the θ threshold; therefore, the projected persistence is 7 days. If thresholds are θ = and =, by treating I 2 as the tolerated non-periodic interval, I 4 is the interval furthest in the future for which the thresholds are satisfied, therefore, the projected persistence is 28 days. Similarly, if thresholds are θ = and = 2, the projected persistence is 42 days. Table 2 shows the average projected persistence for both 35-day and 2-hour segments. On one hand, as θ increases, the average persistence decreases because we are looking for intervals with highly persistent and stable periodic encounters. On the other hand, as increases, we have longer projected persistence because we are more tolerant of interruptions in the patterns. This explains why we did not detect any long-term periodic behaviour in the full-length traces: their persistence gets interrupted by unexpected events from time to time. As shown in Table 2, for a certain value of, periodic behaviour can last up to a few months on average, i.e., =64.7

4 b8953 b22786 b9896 b b6825 b75539 b976 b5896 b b8237 b b397 b28724 b378 b b34366 b b563 b2234 b93936 b7738 b48985 b3925 b76924 b67694 b99353 b b3643 b b7834 b b745 b366 b9696 b3659 b498 b3622 b85622 b6656 b5746 b669 b b75383 b2786 b258 b7474 b b2554 b3763 b53887 b94865 b684 g288 g33 g42 g6245 g2752 g952 g g g5 g4647 g2335 g3468 g548 g839 g2295 g74 g37 g468 g2265 g89 g769 g778 g4447 g g539 g g849 g96 g532 g299 g9582 g5 g6348 g22468 g7577 g6396 g5 g592 g9768 g258 g253 g432 g698 g5263 g g885 g43 g3269 g9426 g6445 g636 g22425 g2334 g994 g9972 g7442 g554 g522 g35 27 g746 g9396 g7538 g g g5336 g296 g989 g262 g9753 g g3275 g7563 g298 g27 g7788 g224 g345 g974 g2954 g985 g2349 g3598 g249 g478 g753 g26 g2846 g638 g2 g g23623 g3439 g5666 g4297 g3588 g446 g55 g23 g375 g989 g g g343 g3285 g g499 g9397 g3542 g2329 g5279 g5326 g5597 g47 g2892 g6239 g53 g535 g9854 g2 g929 g23594 g32 g4398 g666 g45 g7388 g782 g8263 g5955 g56 g7346 g2755 g454 w892 w48532 w7625 w639 w22569 w938 w3376 w799 w6989 w5938 w w5599 w w62755 w2276 w76948 w8846 w4623 w434 w7892 w77254 w4782 w6497 w425 w62268 w5234 w69 w833 w28 w94388 w234 w w86655 w3495 w3846 w567 w7594 w3467 w94586 w7479 w76633 w7678 w7474 w485 w46637 w42 w4926 w999 w24228 w2775 w3249 w225 w235 w785 w3435 w9 w23354 w6623 w33 w w8525 w4533 w72886 w59 w37 w2854 w242 w26864 w64985 w97226 w354 w2249 w25539 w7248 w8342 w498 w598 w5524 w944 9 w7865 w99386 w2692w938 w6865 w86 w55799 w7523 w5996 w6425 w795 w8958 w3886 w98735 w593 w388 w9537 w9793 w288 w874 w3773 w2825 w923 w882 w2544 w5685 w2497 w786 w553 w8246 w67427 w5478 w882 w9384 w2393 w5674 w32927 w7534 w375 w647 w9429 w754 w2336 w2432 w6 w639 w28396 w532 w675 w22495 w7828 w952 w28359 w9978 w947 w3978 w2545 w2392 w34572 w8587 w w573 w97679 w84 w76494 w296 w86989 w7692 w w498 w8386 w34543 w228 w3643 w9335 w26568 w389 w2664 w34589 w96278 w586 w3544w373 w62 w28265 w2 w3537 w232 w379 w448 w23237 w3223 w9732 w9549 w923 w5375 w9833w999 w2897 w52244 w495 w8488 w7567 w77732 w675 w6263 w8227 w528 w68946 w963 w566 w3463 w35964 w884 w8975 w588 w65547 w378 w69976 w9369 w2 w29892 w966 w77 w4322 w358 w5343 w22997 w2553 w79 w68 w543 w923 w24596 w822 w793 w77 w79893 w9855 w5294 w674 w832 w4829 w2588 w84 w7968 w46872 w6343 w53 w9752 w27586 w745 w66 w42 7 w324 w3422 w4939 w3823 w823 w48775 w7658 w7947 w8793 w989 w26774 w957 w9466 w8568 w943 w26872 w7659 w83772 w2847 w6444 w9367 w658 w554 w52276 w96469 w645 w43849 w54728 w2667 w3447 w2666 w8357 w753 w9347 w33849 w939 w69794 w677 w734 w9765 w4357 w2294 w933 w872 w754 w2598 w7689 w2663 w72392 w58475 w838 w44 w8228 w86954 w w26845 w93538 w8266 w67293 w8479 w696 w73983 w6826 w28949 w76952 w5834 w762 5 w565 w26334 w8688 w858 w959 w2653 w53633 w7242 w6263 w5964 w2859 w95739 w2383 w7333 w284 w82 w3337 w3356 w485 w572 w9267 w2888 w597 w3895 w696 w2475 w6533 w93656 w3596 w45756 w27589 w6626 w74645 w2247 w8446 w869 w7456 w w727 w967 w94247 w365 w6394 w25 w7535 w892 w3284 w85778 w547 w3769 w5537 w78594 w523 w6632 w92578 w79755 w6962 w972 w562 w48594 w75346 w865 w582 w6 w37 g388 g3 g386 g989 w6623 g972 w4926 g389 g982 w46637 g6 w235 w8525 g5346 w4533 w745 g3573 w9 6 g285 w42 g6 w9466 b745 b563 w6626 w365 w6263 w485 w2888 w582 w3895 w9267 w523 w53633 w6533 w44 w79755 w7689 w67293 w547 w572 w7242 w93538 w696 w5537 w77 w872 w76948 w865 g89 g345 g7563 g636 g262 g985 w823 w86954 w7456 w2475 w48594 w3769 g5385 g263 g2283 b7834 g7844 g698 g298 g3275 b684 g6445 w753 w3284 w27589 w933 w9765 w24596 g942g7897 g522 w562 w78594 w85778 w762 w75346 g4379 g2349 w2598 w892 w6632 w8228 g2265 w799 g554 g3658 g2659 g974g4442 g482 b5746 g224 w3447 w2247 w869 g438 g2239 w3356 b94865 g8589 g2398 g27 w858 5 g39 w7535 w2294 w92578 w6444 w284 b2234 g746 g989 g553 w4939 w2847 w74645 g249 g522 w28949 w3337 w6826 g2954 w9347 w52276 w25 w26872 g4343 b b3643 g22425 w8266 b75383 g92 g9396 w48775 w94247 w727 w754 g28869g42 w6989 w597 g53 g2335 g38 w76952w45756 w69794 w5834 w2666 w2653 g3468 w4357 w3596 w23354 w72886 g33 w72392 g586 g956 w565 w43849 w8688 b2786 g778 g385 b53887 w554g33 w838w677 w959 w82 w33849 w658 g37 w8357 w9367 w645 g226 g29 w989 g3837 w7947 w33 w93656 w58475 w54728 w939 g8657 w26774 w957 w26845 w2667 g3665 w7658 w7659 w83772 w734 w3823 w26334w427 w2663 g948 b8237 g398 w943 w95739 b9896g4447 g2334 g4344 7w22387 w8568 g253 g84 w5674 w566 g4425 g3653 g253 g9469 g468 w59 g562 g247 w4322 g6348 g9582 g22468 g33 g979 g5 w29892 w52244 w448 g2752 w8488 w8246 g7937 w5478 w923 w8587 w884 w86989 g299 g288 g839 g952 g5983 g22647 g5 w77732 w9793 w2553 w3643 w495 g2476 w379g7577 b26644 b725 w9384 w944 w6865 g256 w32927 w675 w966 w76633 w598 g2229 g7667 w79 w84 g54 g825 w3467 w8227 w3537 w8386 w938w67427 w5524 g9825 w375 g4647 b99353 w785 w2692 w8958 g6245 w2 g7538 w2897 w528 w96278 w76494 w99386 w7534 g2965 w64985 w2825 w354 w37 w8793 w8975 w3773 w35964 g6543 g2687 w225 w9833w498 w882 w232 w2545 g293 g43w532 w7479 w77254 w w588 w3223 g35 w86 w98735w2854 g435 w7692 b38424 w69 w34543 w999 w7248 w593 w543 w389 w2336w23237 w9369 g457 w55799 b7474 w42 w97226 w6795 g4337 g5263b9696 g9768 g7442 w3544 w7828 g952 w7474 w5996 w3886 b6656 g539 w874 g592 b48985 w9335 w2775 w485 w5343 w923 w2392 w8846 g7 w228 w9732 w3463 w754 g296 g885 g448 w28265 w7397 w24228 w34572 w68 w68946 w586 w5375 g8352 w62268 g5336 b67694 b366 9 w373 w7865 g8 g28 w3978 w94388 w425 w4782 w2 w9529 w9549 w6263 w34589 w5234 g788g4349 g3269 w242 g9972 b3622 b3763 g6542 g2295 g769 g44 g258 g9753 w3249 w234 w28 w6497 w26568 w69976 w2664 w882 w498 w5685 w999 w77 w923 w647 g3654 g3 g838 g2758 w94586 w86655 w4623 w639 w963 w22997 g548 w7594 g532 g994 g544 w833 w567 g74w28359 w7523 w573 w358 b258 g96w25539 g5 w378 g89 w22495 w296 w2432 w2393 w288 w675 g43 g574 g24 g6435 w947 g2 w8342 w3846 w9537 w7567 g74 w65547 g849 w6425 w6 w9978 w28396 w87894 w97679 w62 w3495 w7678 g687 w2544 b34366 w9429 w2497 w553 w786 b24249 w795 g22 w388 w6343 g4942 g43 w84g8685 g43 g24 w53 w27586 w66 g6288 g5955g936 g529 w324 w5294 w2588 w46872 g7346 g45 w26864 g934 g232 w832 w79893 g6234 g649 w7968 g8263 g6237 g724 g56 g666 w674 w4829 w9855 w9752 g9854g782 g5856 g53 b669 g454 b22263 g2755 g6239 w2249 w3422 g2329 g2776 b93575g929 b4957 g4398 g3542 g5279 g23 g g375 g989 g g2563 g536 g88 g6386 g2233 g282 g5666 g4266 g4426 g26 79 g9537 g254 g638 g2846 w62755 w22569 w2276 w639 g478 w822 w793 w892 w5938 w5857 g753 g499 g23 w96469 g55 g23623 b22786 g2892 g9397 b8953 b557 b7738 g535 b3659 g5597 g23594 g g2289 g239 g7423 g2295 g539 g337 g243 g2964 g343 g32 g777 g4297 g22875 w696 b397 w8479 w8446 g98 g7893 g5326 g999 g3439 b28724 w2859 g378 g47 23 g982 g35 g6396 b378 b6825 w7333 w5964 g9426 g377 w972 b5896 w73983 g7788 b976 b886 w6962 w967 b75539 g7388 w2383 w7648 b498 g432 g3598 w6 68 g3588 g3285 g446 w6394 g2 w3746 b2554 w7625 w5599 w4973 w w446 w48532 w655 b9263 w36882 w43624 b3925 b76924 w7892 w938 w228 w5994 w434 b93936 (a) Bluetooth network (b) GSM network (c) WLAN network (d) Integrated network Figure 5: Connectivity in different network types days (segment length plus projected persistence). Due to human factors, the limitation of hardware features, services running behind different network platforms and other causes, the persistence of periodic behaviour could be affected. For example, even though a person stays at the same place, it does not mean that he/she will always connect to the same cellular tower. However, determining the causes of such short-term periodic behaviour is beyond the scope of this paper. 3.3 Network connectivity We have also built graphs based solely on periodic encounter series. The connectivity graph G = V, E is an undirected graph, which is defined as follows. Given a set of encounter series with periodic behaviour, P, V is the set of nodes participating in P. For a pair of nodes u and v, the edge e u,v E if and only if s u,v P. Using 35-day segments, the connectivity graphs shown in Figure 5 represent connectivities among nodes with periodic behaviour from different network types. In this figure, connection graphs derived from Bluetooth, GSM and WLAN traces consist of several star shapes. In the Nokia-MDC datasets, we have a total of 38 participants whose encounters are recorded. As a result, the center of each cluster is one of the participants whereas leaf nodes are external MAC addresses whose encounter series is unknown, except for one encounter with a non-leaf node. All three graphs are composed of multiple isolated clusters where nodes from different network types cannot communicate with each other. In real life there are various co-existing network types. For example, in the Nokia-MDC datasets we have cellular networks, wireless local area networks and Bluetooth encounters. Mobile nodes could exhibit different periodic behaviour within each network type. As shown in Figure 5(d), integrating periodic encounter series from different network types presents a better connected graph, which could substantially improve the effectiveness, and likely efficiency, of communication overall. Nonetheless, there still exist isolated clusters. How to provide services between different clusters in large-scale networks requires further research. 3.4 Modelling Periodicity To utilize periodic encounter for routing in mobile networks, our detection techniques provide three important information: ) the pair of mobile nodes who exhibits periodic behaviour, 2) the period length of each periodic behaviour and 3) the phases containing periodic encounters. If we combine detected periodicities from all mobile nodes in the network, a connectivity network, i.e., a graph model, can be created to represent all periodic encounters. During an encounter, messages can be exchanged between the two encountering nodes. Further, mobile nodes can relay messages among themselves serving as temporary storages. Therefore, the problem to be solved is to establish a route between a source and a destination (unicast), a set of destinations (multicast) or all destinations (broadcast) with respect to minimize network constraints such as the energy cost, the delivery delay and nodes storage space, where only change to different constraints in the network is in the assignment of weights for the edges. With the connectivity network, all these problems can be converted to classical graph problems such as the shortest path problem, the minimum weighted Steiner tree problem and the minimum spanning tree problem. For instance, our initial proposal [3] for the unicast problem required a Shortest Path solution on a connectivity graph (that could be obtained by using the methodology presented in this paper). 4. SMALL-WORLD In this section, we examine the properties of the connectivity graphs by focusing on Figure 5(d). In that graph, we have several clusters. Since some analyses can only be performed on connected graphs, we present results for the largest cluster in the graph. 4. Degree Distribution The largest cluster shown in Figure 5(d) has N = 225 nodes. We rank nodes in descending order based on their degree. Plotting the sorted nodes in Figure 6(a), the first 38 nodes follow the power-law distribution. This number matches the total number of participants in the Nokia-MDC datasets whereas all other nodes are external nodes whose complete mobility is unknown. This strongly suggests that by building a network using nodes with periodic behaviour, we can obtain a scale-free network rather than a random network. To show that networks formed by nodes with periodic behaviour can have a small-world structure, we present our studies of another dataset, the USC traces [5]. In that connectivity graph, the largest cluster contains 496 nodes. As shown in Figures 6(a) and 6(b), the node degree distribution follows the power-law distribution. Therefore, they come from a scale-free network. We also calculate the average path length for that network. Its value at 3.34 is a good indication of the small-world structure, where 3.34

5 4.2 The small-world network The average node degree in the network is d = 2.5. To investigate the small-world structure, we find that the average path length, L, between any pair of nodes is 3.2. This average path length is approximately equal to the logarithm of the number of nodes in the network, 3.2 log(225) = 3.3. This is a good indication that the network has a smallworld structure [4]. In addition, we calculate the Clustering Coefficients (CC) for all nodes in the network. There are two types of CC, local and global, which measure the number of triangles with respect to the number of open triplets in the graph [3, 4]. In other words, CCs measure how close the graph is to a clique. Our calculations show that 99% of the nodes in the Nokia-MDC datasets are external nodes whose local CC equals zero as shown in Figure 6(b). Therefore, the global CC of the network equals the relatively small value of.5. If we consider a node in a random graph, the probability that two of its neighbours are connected is equal to the probability that two randomly selected nodes are connected. Consequently the global CC of a random graph equals d. Since the global CC for the network in the N Nokia-MDC datasets is very close to the one from a random graph, 2.5 =.2, we conclude that the network does not 225 have a small-world structure even though the average path length still satisfies the small-world phenomenon. One possible reason is that the traces of external nodes are unknown where we may lose periodic encounter series among them. As a result, the graph still consists of multiple star-shaped components. Node degree Nokia MDC USC Node Rank (a) Node degree rank Percentage of Nodes.2. Nokia MDC USC.2 Local Clustering Coefficient (b) Local clustering coefficient Figure 6: Comparison between Nokia-MDC and USC datasets in log-log scale log(496) = In addition, given the average node degree of 9.44, its global CC,.39, is much greater than the one from a random graph 9.44 =.39. Therefore, we 496 conclude the network formed by the periodic nodes in the USC traces have a small-world structure. 5. CONCLUSIONS In this paper we investigate the problem of finding encounter patterns that could be used to further improve communications in a mobile network setting. We proposed techniques to determine periodic encounters among mobile devices that can be used in any mobility trace/dataset. Using the Nokia-MDC as a sample instance, we were able to identify strong weekly and daily patterns (with different lags and phases). In addition we were also able to determine how stable and persistent a pattern is, which explains why one is not able to find a pattern that lasts the whole duration of the mobility trace. To understand the properties of networks formed by periodic encounter series, our studies show that networks are scale-free networks, and some of them satisfy a small-world structure where messages between any pair of nodes can be delivered through a very small number of hops in the network. 6. ACKNOWLEDGEMENTS Research partially supported by NSERC s DIVA Strategic Network. 7. REFERENCES [] M. C. Gonzalez, C. A. Hidalgo, and A. L. Barabasi. Understanding individual human mobility patterns. NATURE, 453:479, 28. [2] J. Han, G. Dong, and Y. Yin. Efficient mining of partial periodic patterns in time series database. In Proc. Int. Conf. on Data Engineering, pages 6 5, 999. [3] S. Holland, P. W.; Leinhardt. Transitivity in structural models of small groups. Comparative Group Studies, (2):7 24, 97. [4] W.-J. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy. Modeling spatial and temporal dependencies of user mobility in wireless mobile networks. IEEE/ACM Transactions on Networking, 7(5): , 29. [5] W. jen Hsu and A. Helmy. CRAWDAD data set usc/mobilib (v ). Downloaded from July 28. [6] W. jen Hsu and A. Helmy. On nodal encounter patterns in wireless lan traces. IEEE Transactions on Mobile Computing, 9(): , 2. [7] J. K. et al. The mobile data challenge: Big data for mobile computing research. In Proc Mobile Data Challenge by Nokia Workshop, in conjunction with Int. Conf. on Pervasive Computing, Newcastle, June 22. [8] M. Kim and D. Kotz. Periodic properties of user mobility and access-point popularity. Personal Ubiquitous Computation, : , 27. [9] S. Moon and A. Helmy. Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis. In Proceedings of IEEE Global Telecommunications Conference, pages 5, 2. [] C. Song, Z. Qu, N. Blumm, and A.-L. Barabà asi. Limits of predictability in human mobility. Science, 327(5968):8 2, 2. [] Startz and Richard. Binomial Autoregressive Moving Average Models With an Application to U.S. Recessions. Journal of Business and Economic Statistics, 26(): 8, 28. [2] C. Wang and W. K. Li. On the autopersistence functions and the autopersistence graphs of binary autoregressive time series. Journal of Time Series Analysis, 32(6): , 2. [3] Z. Wang, M. A. Nascimento, and M. H. MacGregor. Towards end-to-end routing for periodic mobile objects. In Proceedings of DIVANet, pages 6 68, 2. [4] D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, (393):44 442, 998.

Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model)

Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model) Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model) Wei-jen Hsu, Dept. of CISE, U. of Florida Thrasyvoulos Spyropoulos, INRIA, Sophia-Antipolis, France

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Capturing User Friendship in WLAN Traces

Capturing User Friendship in WLAN Traces Capturing User Friendship in WLAN Traces Wei-jen Hsu and Ahmed Helmy Department of Electrical Engineering University of Southern California {weijenhs, helmy}@usc.edu http://nile.usc.edu/mobilib/ Motivation

More information

From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks

From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks Dan Braha 1, 2 and Yaneer Bar-Yam 2 1 University of Massachusetts Dartmouth, MA 02747, USA 2 New England Complex Systems Institute

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Modeling users mobility among WiFi access points

Modeling users mobility among WiFi access points Modeling users mobility among WiFi access points Minkyong Kim minkyong@cs.dartmouth.edu Department of Computer Science Dartmouth College David Kotz dfk@cs.dartmouth.edu Department of Computer Science Dartmouth

More information

Exploring Social Interactions via Multi-Modal Learning

Exploring Social Interactions via Multi-Modal Learning Eploring Social Interactions via Multi-Modal Learning Aarti Munjal Dept. of Electrical Engineering and Computer Science Colorado School of Mines Golden, Colorado 80401 amunjal@mines.edu Thyago Mota Dept.

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks

Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks 1564 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 5, OCTOBER 2009 Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks Wei-Jen Hsu, Member, IEEE, Thrasyvoulos Spyropoulos,

More information

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Wendy Foslien, Honeywell Labs Valerie Guralnik, Honeywell Labs Steve Harp, Honeywell Labs William Koran, Honeywell Atrium

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

Mining Frequent and Periodic Association Patterns

Mining Frequent and Periodic Association Patterns Mining Frequent and Periodic Association Patterns Guanling Chen, Heng Huang, and Minkyong Kim {glchen, hh, minkyong}@cs.dartmouth.edu Dartmouth College Computer Science Technical Report TR25-55 July, 25

More information

IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis

IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis Wei-jen Hsu and Ahmed Helmy arxiv:cs/0508009v1 [cs.ni] 2 Aug 2005 Department of Electrical Engineering,

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Critique #2. Ø Due on 2/13 (Tuesday)

Critique #2. Ø Due on 2/13 (Tuesday) Critique #2 Ø M. Sha, G. Hackmann and C. Lu, Real-world Empirical Studies on Multi- Channel Reliability and Spectrum Usage for Home-Area Sensor Networks, IEEE Transactions on Network and Service Management,

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

Introduction to Trajectory Clustering. By YONGLI ZHANG

Introduction to Trajectory Clustering. By YONGLI ZHANG Introduction to Trajectory Clustering By YONGLI ZHANG Outline 1. Problem Definition 2. Clustering Methods for Trajectory data 3. Model-based Trajectory Clustering 4. Applications 5. Conclusions 1 Problem

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Using a Divide and Conquer Method for Routing in a PC Vehicle Routing Application. Abstract

Using a Divide and Conquer Method for Routing in a PC Vehicle Routing Application. Abstract Using a Divide and Conquer Method for Routing in a PC Vehicle Routing Application Brenda Cheang Department of Management Information Systems University College Dublin Belfield, Dublin 4, Ireland. Sherlyn

More information

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50 Mobility Models Larissa Marinho Eglem de Oliveira CMPE 257 Wireless Networks May 26th 2015 (UCSC) May 2015 1 / 50 1 Motivation 2 Mobility Models 3 Extracting a Mobility Model from Real User Traces 4 Self-similar

More information

Structure of Association Rule Classifiers: a Review

Structure of Association Rule Classifiers: a Review Structure of Association Rule Classifiers: a Review Koen Vanhoof Benoît Depaire Transportation Research Institute (IMOB), University Hasselt 3590 Diepenbeek, Belgium koen.vanhoof@uhasselt.be benoit.depaire@uhasselt.be

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

User Manual for the Time-variant Community Mobility Model

User Manual for the Time-variant Community Mobility Model User Manual for the Time-variant Community Mobility Model Release Version: TVCM-1.1-beta Release Date: May 31, 2007 Authors: Wei-jen Hsu, Dept. of Computer and Information Science and Engineering, U. of

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Movement Activity Estimation and Forwarding Effects for Opportunistic Networking Based on Urban Mobility Traces

Movement Activity Estimation and Forwarding Effects for Opportunistic Networking Based on Urban Mobility Traces RESEARCH ARTICLE for Opportunistic Networking Based on Urban Mobility Traces Karin Anna Hummel 1 and Andrea Hess 2 1 ETH Zurich, Computer Engineering and Networks Laboratory, Communication Systems Group,

More information

Exploiting Social Interactions in Mobile Systems

Exploiting Social Interactions in Mobile Systems Exploiting Social Interactions in Mobile Systems Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan, Stefan Saroiu, Krishna P. Gummadi, and Eyal de Lara University of Toronto, Google, and MPI for Software

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Exploiting Social Interactions in Mobile Systems

Exploiting Social Interactions in Mobile Systems Exploiting Social Interactions in Mobile Systems Andrew G. Miklas 1, Kiran K. Gollu 1,KelvinK.W.Chan 2,StefanSaroiu 1, Krishna P. Gummadi 3, and Eyal de Lara 1 1 University of Toronto 2 Google 3 MPI for

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

IJMIE Volume 2, Issue 6 ISSN:

IJMIE Volume 2, Issue 6 ISSN: Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Globecom 2012 - Wireless Networking Symposium Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Xiaoyan Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang Department of Computer

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Stable Statistics of the Blogograph

Stable Statistics of the Blogograph Stable Statistics of the Blogograph Mark Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov Rensselaer Polytechnic Institute Department of Computer Science Abstract. The primary focus

More information

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMS(TPDS), VOL. N, NO. N, MONTH YEAR 1 Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Zhen Xiao,

More information

Mobile Sensing for Data-Driven Mobility Modeling

Mobile Sensing for Data-Driven Mobility Modeling Mobile Sensing for Data-Driven Mobility Modeling Kashif Zia Katayoun Farrahi Department of Computing Goldsmiths, University of London, UK Arshad Muhammad Dinesh Kumar Saini Abstract The use of mobile sensed

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

An Empirical Study of Lazy Multilabel Classification Algorithms

An Empirical Study of Lazy Multilabel Classification Algorithms An Empirical Study of Lazy Multilabel Classification Algorithms E. Spyromitros and G. Tsoumakas and I. Vlahavas Department of Informatics, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan

More information

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications Zhenhai Duan, Kartik Gopalan, Xin Yuan Abstract In this paper we present a detailed study of the behavioral characteristics

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research

More information

Homework 4: Clustering, Recommenders, Dim. Reduction, ML and Graph Mining (due November 19 th, 2014, 2:30pm, in class hard-copy please)

Homework 4: Clustering, Recommenders, Dim. Reduction, ML and Graph Mining (due November 19 th, 2014, 2:30pm, in class hard-copy please) Virginia Tech. Computer Science CS 5614 (Big) Data Management Systems Fall 2014, Prakash Homework 4: Clustering, Recommenders, Dim. Reduction, ML and Graph Mining (due November 19 th, 2014, 2:30pm, in

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Basic Concepts And Future Directions Of Road Network Reliability Analysis

Basic Concepts And Future Directions Of Road Network Reliability Analysis Journal of Advanced Transportarion, Vol. 33, No. 2, pp. 12.5-134 Basic Concepts And Future Directions Of Road Network Reliability Analysis Yasunori Iida Background The stability of road networks has become

More information

Verification and Validation of X-Sim: A Trace-Based Simulator

Verification and Validation of X-Sim: A Trace-Based Simulator http://www.cse.wustl.edu/~jain/cse567-06/ftp/xsim/index.html 1 of 11 Verification and Validation of X-Sim: A Trace-Based Simulator Saurabh Gayen, sg3@wustl.edu Abstract X-Sim is a trace-based simulator

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

On the 95-percentile billing method

On the 95-percentile billing method On the 95-percentile billing method Xenofontas Dimitropoulos 1, Paul Hurley 2, Andreas Kind 2, and Marc Ph. Stoecklin 2 1 ETH Zürich fontas@tik.ee.ethz.ch 2 IBM Research Zürich {pah,ank,mtc}@zurich.ibm.com

More information

Clustering Part 4 DBSCAN

Clustering Part 4 DBSCAN Clustering Part 4 Dr. Sanjay Ranka Professor Computer and Information Science and Engineering University of Florida, Gainesville DBSCAN DBSCAN is a density based clustering algorithm Density = number of

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

Enabling Distributed Simulation of OMNeT++ INET Models

Enabling Distributed Simulation of OMNeT++ INET Models Enabling Distributed Simulation of OMNeT++ INET Models Mirko Stoffers, Ralf Bettermann, James Gross, Klaus Wehrle Communication and Distributed Systems, RWTH Aachen University School of Electrical Engineering,

More information

A mining method for tracking changes in temporal association rules from an encoded database

A mining method for tracking changes in temporal association rules from an encoded database A mining method for tracking changes in temporal association rules from an encoded database Chelliah Balasubramanian *, Karuppaswamy Duraiswamy ** K.S.Rangasamy College of Technology, Tiruchengode, Tamil

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science ul. Piotrowo

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Use of KNN for the Netflix Prize Ted Hong, Dimitris Tsamis Stanford University

Use of KNN for the Netflix Prize Ted Hong, Dimitris Tsamis Stanford University Use of KNN for the Netflix Prize Ted Hong, Dimitris Tsamis Stanford University {tedhong, dtsamis}@stanford.edu Abstract This paper analyzes the performance of various KNNs techniques as applied to the

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Efficient Pattern Mining from Temporal Data through Correlation based Periodicity Detection

Efficient Pattern Mining from Temporal Data through Correlation based Periodicity Detection International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-47-53 ISSN: 2249-6645 Efficient Pattern Mining from Temporal Data through Correlation based Periodicity Detection Jency Premalatha

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Benchmarking the UB-tree

Benchmarking the UB-tree Benchmarking the UB-tree Michal Krátký, Tomáš Skopal Department of Computer Science, VŠB Technical University of Ostrava, tř. 17. listopadu 15, Ostrava, Czech Republic michal.kratky@vsb.cz, tomas.skopal@vsb.cz

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

ADAPTIVE K MEANS CLUSTERING FOR HUMAN MOBILITY MODELING AND PREDICTION Anu Sharma( ) Advisor: Prof. Peizhao Hu

ADAPTIVE K MEANS CLUSTERING FOR HUMAN MOBILITY MODELING AND PREDICTION Anu Sharma( ) Advisor: Prof. Peizhao Hu ADAPTIVE K MEANS CLUSTERING FOR HUMAN MOBILITY MODELING AND PREDICTION Anu Sharma( axs3617@rit.edu ) Advisor: Prof. Peizhao Hu ABSTRACT Human movement follows repetitive trajectories. There has been extensive

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A Novel Algorithm for Associative Classification

A Novel Algorithm for Associative Classification A Novel Algorithm for Associative Classification Gourab Kundu 1, Sirajum Munir 1, Md. Faizul Bari 1, Md. Monirul Islam 1, and K. Murase 2 1 Department of Computer Science and Engineering Bangladesh University

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Chapter 2 Mobility Model Characteristics

Chapter 2 Mobility Model Characteristics Chapter 2 Mobility Model Characteristics Abstract The salient characteristics of mobility models of mobile nodes in mobile ad hoc networks are described. We have described how the different mobility models

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information