Carmela Comito and Domenico Talia. University of Calabria & ICAR-CNR
|
|
- Janis Williams
- 5 years ago
- Views:
Transcription
1 Carmela Comito and Domenico Talia University of Calabria & ICAR-CNR
2 Introduction & Motivation Energy-aware Experimental Performance mobile mining of data setting evaluation 2
3 Battery power is a vital resource for mobile computing Can either increase supply or reduce demand Increasing the supply of energy is difficult: Battery constrains size, weight of mobile device Battery technology improving slowly Processing requirements also increasing 3
4 Lots of effort aimed at reducing energy demand Hardware-based techniques Low-power Circuits, architectures, protocols Power management Right power at the right place at the right time Recent devices (CPU, disk,) support multiple power modes Dynamic voltage scaling Low-power network design (e.g., Bluetooth) But, lower-level efforts have not been enough! Can the higher levels of the system help?
5 Adapt resources based on system layers Adaptive Layers Application Operating System /Network Hardware Most approaches in research adapt a single layer Possible to adapt across multiple layers?
6 Applications can reduce energy, but usually at a cost! Dynamic balancing of quality and energy conservation Energy-aware adaptation: significantly reduces energy usage complements hardware power management often exhibits predictable effect Resource Monitors Applications The application periodically: measures energy supply predicts energy demand os Redirector 6
7 Defer decisions as much as possible: Applications statically expose possible tradeoffs OS dynamically advises which tradeoffs are best When demand exceeds supply: Applications adapt to conserve energy usage When supply significantly exceeds demand: Applications increase data fidelity Energy En erg y su pp ly Energy Demand Time 7
8 The main focus today is on energyaware algorithms, tasks, applications. The other side of the coin is data and costs of operating on it. Abstract energy-cost models for exchanging, accessing and transform data are primary elements for energy-aware data management at large scale. They are useful for sustainable data science. 8
9 Data is everywhere, ubiquitous Big, complex, real-time, unstructured Every life process today is data intensive. The information stored in digital data archives is enormous and its size is still growing very rapidly. 9
10 Some decades ago the main problem was the shortage of information, now the challenge is the very large volume of information to deal with and the associated complexity to process it and to extract significant and useful parts or summaries. 10
11 We evaluated the energy cost of analyzing data by using some well-known data mining techniques on mobile devices. Our interest was mainly on how the same technique consumes energy when dimension of data change. Tests with different Data set dimensions, Attribute number, Class number. 11
12 Data mining is the process of automating finding implicit, previously unknown, and potentially useful information from large volumes of data We focused on algorithms for Data clustering Association rule mining Decision tree induction 12
13 A variety of powerful mobile devices is available Smart phones, PDAs, laptops, netbooks, Wireless networks are always more end-user oriented Emergence of the ubiquitous computing paradigm Mobile users perform intelligent analysis and monitoring of data Applications Risk management Collaborative computing, 13
14 Transportation Smart cars and smart roads Onboard systems talk to the road : Map obstacles and delays Inform the road of its actions Emergency search-and-rescue operations Police Fire Ambulance Military usage Real-time feedback for the battlefield Movement of intelligence Mobile Healthcare Smart Home 14
15
16 16
17 Due to resource restrictions a mobile node can not execute a complete data mining process: execute only a step of the knowledge discovery process: preprocessing, data mining, visualization, etc adapt a given data mining algorithm to the capability of the node: light-weight version of the algorithm collaboratively execute a data mining algorithm with stationary and mobile nodes partially execute a data mining algorithm: if the resource measurements indicates that the device can not achieve the required accuracy according to the incoming data rate, it sends a data mining request to a data mining server (either stationary or mobile) to continue a current 17
18 Identify the energy consumption characteristics of some commonly used data mining algorithms running on-board a mobile device Experimentally quantified the performance of specific data mining algorithms Machine learning approach to predict energy consumption of mobile devices to perform data mining algorithms 18
19 Energy characterization of data mining algorithms running on-board mobile devices K-Means (data clustering) J48 (data classification) Apriori (association rules) Common performance parameters Number of instances (data set size) Number of attributes Algorithm-specific performance parameters K-Means: number of clusters J48: decision tree size, confidence support Apriori: Number of rules, minimum support and minimum confidence 19
20 Perform data mining algorithms over an Android smartphone Algorithm selection Data set selection Performance parameters setting Gather of statistics about the mobile device and the algorithm during its execution Battery level CPU occupancy Memory usage Execution time 20
21 Each algorithm has been executed 10 times the values reported in the experiments are the average values of CPU, energy and execution time consumed The results are obtained with two Android smartphones Sony Xperia P, a 1 GHz Dual Core ARM processor with 1 GB RAM Each test is executed with the following setting 100% battery level radio signals off (airplane mode) automatic shut-off display off 21
22 Data Sets Census ( Used with K-means Data set size: 14 Number of instances: Number of attributes: 11 Census_disc ( Used with Apriori Data set size: 19 Number of instances: Number of attributes: 11 Covertype ( Used with J48 Data set size: 14.5 Number of instances:
23
24 Method Algorithm Data Set Size RAM Memory (yte) Virtual Memory (yte) CPU (%) Battery Charge Depletion (mah) Energy Consumption (J) Time (sec) Association Rules CENSUS_DISC.arff Rule Induction Apriori 0,1 0,2 0,4 0,8 1,6 3,2 15,86 16,97 18,06 19,87 23,32 26,92 95,19 105,36 104,95 102,75 103,99 100,01 96,92 98,03 98,24 98,13 96,87 95, ,7 13,5 23, , ,82 310, , ,47 20,15 23,87 27, ,94 104,92 105,6 103, ,4 29,8 59,4 194, , , , , ,75 8,1 18,9 18,9 43, ,91 107, , , , Classification COVERTYPE.arff Trees J48 0,1 0,2 0,4 0,8 1,6 3,2 6,4 96,23 98,21 97,43 97, Clustering CENSUS.arff Instancebased/La zy Learning K-Means 0,1 0,2 0,4 0,8 1,6 3,2 6,4 16,73 17,95 19,72 23,08 26, ,56 102,05 102,16 101,86 95, ,03 97,65 97,02 97,97 97,
25 A way of grouping together data samples that are similar in some way - according to some criteria that you pick A form of unsupervised learning you generally don t have examples demonstrating how the data should be grouped together So, it s a method of data exploration a way of looking for patterns or structure in the data that are of interest
26 Choose a number of clusters k Initialize cluster centers µ1, µk Could pick k data points and set cluster centers to these points Or could randomly assign points to clusters and take means of clusters For each data point, compute the cluster center it is closest to (using some distance measure) and assign the data point to this cluster Re-compute cluster centers (mean of data points in cluster) Stop when there are no new re-assignments The computational complexity of K-means is O(nmk)
27 Number of instances and number of clusters 27
28 Number of attributes and number of instances 28
29 Find the set of all subsets of items that frequently occur in database records. In addition, ARM applications extract rules regarding how a given subset of items influence the presence of another Two key parameters Confidence (A B) = #tuples containing both A & B / #tuples containing A = P(B A) = P(A U B ) / P (A) Support (A B) = #tuples containing both A & B/ total number of tuples = P(A U B) What do they actually mean? Find all the rules A & B C with minimum confidence and support support, s, probability that a transaction contains {A, B, C} confidence, c, conditional probability that a 29
30 Apriori is arguably the most influential ARM algorithm Apriori has two phases of execution 1. Find the frequent itemsets: the sets of items that have minimum support A subset of a frequent itemset must also be a frequent itemset i.e., if {AB} is a frequent itemset, both {A} and {B} should be a frequent itemset Iteratively find frequent itemsets with cardinality from 1 to k (k-itemset) 1. Use the frequent itemsets to generate 30
31 If m is the number of instances and n the number of distinct attributes, the number of potentially frequent itemsets is O(2n) and the overall computational complexity of the algorithm is O(m2n). Performance parameters data set size (number of instances) number of attributes minimum support minimum confidence 31
32 Reducing the generation of frequent itemsets Number of instances and attributes 32
33 The objective of a classification algorithm is to use a training dataset to build a model such that the model can be used to assign unclassified observations into one of the defined classes. Decision trees are a common knowledge representation used for classification. In classification, the decision tree predicts, based on data from a specific instance, the membership class of an instance. Each node in the tree consists of a test, based on one of more attributes of the instance to be classified. The leaf nodes provide the class label. 33
34 Creates a decision tree based on a set of labeled input data. This decision tree can then be tested against unseen labeled test data to quantify how well it generalizes. Reduced-errror based pruning Post-pruning Confidence factor Online-pruning Number of instances per node
35 The computational complexity of C4.5 is O(mn2) where m is the number of instances and n the number of attributes Performance parameters Number of instances Number of attributes Confidence factor Minimum number of instances per node 35
36 Tree pruning Number of instances and number of attributes
37 Results obtained with different smart phones Sony Xperia P: 1 GHz Dual Core ARM processor and 1 GB RAM HTC Hero: 528 MHz Qualcomm processor and 288 RAM Samsung Galaxy ACE: 800 MHz Qualcomm processor and 512 RAM
38 Energy-aware adaptation is an important part of a comprehensive energy management strategy! The main goal is to converse energy without affecting usability A collaborative relationship between the operating system and applications can effectively reduce the energy usage of mobile computers. Data-intensive applications demands for energy cost models based on data characteristics. 38
39
CMPUT 391 Database Management Systems. Data Mining. Textbook: Chapter (without 17.10)
CMPUT 391 Database Management Systems Data Mining Textbook: Chapter 17.7-17.11 (without 17.10) University of Alberta 1 Overview Motivation KDD and Data Mining Association Rules Clustering Classification
More informationSmartphone Evolution and Revolution
Smartphone Evolution and Revolution 31 March 2014 By: Eylon Gersten eylon@marvell.com Is your Smartphone really smart? Short Survey what OS type of Smartphone the audience have? OS # % Android 7 54 ios
More informationA Cloud Framework for Big Data Analytics Workflows on Azure
A Cloud Framework for Big Data Analytics Workflows on Azure Fabrizio MAROZZO a, Domenico TALIA a,b and Paolo TRUNFIO a a DIMES, University of Calabria, Rende (CS), Italy b ICAR-CNR, Rende (CS), Italy Abstract.
More informationEPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD
06 January, 2019 EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD Document Filetype: PDF 165.6 KB 0 EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD Samsung GT-S7500 Galaxy Ace Plus complete Service
More informationComputing and Sustainability Systems/Architecture & Beyond. Carla Schlatter Ellis Duke University
Computing and Sustainability Systems/Architecture & Beyond Carla Schlatter Ellis Duke University 1 Scope Do less harm -- the greening of computing Energy efficiency for computing Data Centers Costs of
More informationIMPLEMENTATION AND COMPARATIVE STUDY OF IMPROVED APRIORI ALGORITHM FOR ASSOCIATION PATTERN MINING
IMPLEMENTATION AND COMPARATIVE STUDY OF IMPROVED APRIORI ALGORITHM FOR ASSOCIATION PATTERN MINING 1 SONALI SONKUSARE, 2 JAYESH SURANA 1,2 Information Technology, R.G.P.V., Bhopal Shri Vaishnav Institute
More informationTowards Energy-Aware Intrusion Detection Systems on Mobile Devices M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse
Towards Energy-Aware Intrusion Detection Systems on Mobile Devices M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse The 2013 International Conference on High Performance Computing & Simulation (HPCS
More informationClassification by Association
Classification by Association Cse352 Ar*ficial Intelligence Professor Anita Wasilewska Generating Classification Rules by Association When mining associa&on rules for use in classifica&on we are only interested
More informationResults and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets
Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationSecurity versus Energy Tradeoffs in Host-Based Mobile Malware Detection
Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford *, H. Andrés Lagar-Cavilla #, Alexander Varshavsky #, Vinod Ganapathy *, and Liviu Iftode * * Rutgers University
More informationEvent Detection through Differential Pattern Mining in Internet of Things
Event Detection through Differential Pattern Mining in Internet of Things Authors: Md Zakirul Alam Bhuiyan and Jie Wu IEEE MASS 2016 The 13th IEEE International Conference on Mobile Ad hoc and Sensor Systems
More informationSupervised and Unsupervised Learning (II)
Supervised and Unsupervised Learning (II) Yong Zheng Center for Web Intelligence DePaul University, Chicago IPD 346 - Data Science for Business Program DePaul University, Chicago, USA Intro: Supervised
More informationComprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:
More informationAssociation Rule Mining. Entscheidungsunterstützungssysteme
Association Rule Mining Entscheidungsunterstützungssysteme Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set
More informationMaking 5G NR a commercial reality
Making 5G NR a commercial reality Ultra-high fidelity media anywhere Immersive entertainment Safer, more autonomous transportation Connectivity is the new Electricity Reliable access to remote healthcare
More informationCse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University
Cse634 DATA MINING TEST REVIEW Professor Anita Wasilewska Computer Science Department Stony Brook University Preprocessing stage Preprocessing: includes all the operations that have to be performed before
More informationANU MLSS 2010: Data Mining. Part 2: Association rule mining
ANU MLSS 2010: Data Mining Part 2: Association rule mining Lecture outline What is association mining? Market basket analysis and association rule examples Basic concepts and formalism Basic rule measurements
More informationInternational Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X
Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,
More informationINTRODUCTION... 2 FEATURES OF DARWIN... 4 SPECIAL FEATURES OF DARWIN LATEST FEATURES OF DARWIN STRENGTHS & LIMITATIONS OF DARWIN...
INTRODUCTION... 2 WHAT IS DATA MINING?... 2 HOW TO ACHIEVE DATA MINING... 2 THE ROLE OF DARWIN... 3 FEATURES OF DARWIN... 4 USER FRIENDLY... 4 SCALABILITY... 6 VISUALIZATION... 8 FUNCTIONALITY... 10 Data
More informationIntroducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values
Introducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationPREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY
PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY T.Ramya 1, A.Mithra 2, J.Sathiya 3, T.Abirami 4 1 Assistant Professor, 2,3,4 Nadar Saraswathi college of Arts and Science, Theni, Tamil Nadu (India)
More informationUsing Association Rules for Better Treatment of Missing Values
Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University
More informationGet Started with the INCENTER Application
Get Started with the INCENTER Application Log in to the TireCheck INCENTER application using user account details provided. The application requires an Internet connection. Your Android smart device must
More informationCSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges
CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need
More informationThe Dangers and Complexities of SQLite Benchmarking. Dhathri Purohith, Jayashree Mohan and Vijay Chidambaram
The Dangers and Complexities of SQLite Benchmarking Dhathri Purohith, Jayashree Mohan and Vijay Chidambaram 2 3 Benchmarking SQLite is Non-trivial! Benchmarking complex systems in a repeatable fashion
More informationSMARTPHONE HARDWARE: ANATOMY OF A HANDSET. Mainak Chaudhuri Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver
SMARTPHONE HARDWARE: ANATOMY OF A HANDSET Mainak Chaudhuri Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver Outline of topics What is the hardware architecture of a How does communication
More informationA Graph-Based Approach for Mining Closed Large Itemsets
A Graph-Based Approach for Mining Closed Large Itemsets Lee-Wen Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University huanglw@gmail.com Ye-In Chang Dept. of Computer Science and
More informationParallel Approach for Implementing Data Mining Algorithms
TITLE OF THE THESIS Parallel Approach for Implementing Data Mining Algorithms A RESEARCH PROPOSAL SUBMITTED TO THE SHRI RAMDEOBABA COLLEGE OF ENGINEERING AND MANAGEMENT, FOR THE DEGREE OF DOCTOR OF PHILOSOPHY
More informationStuck in Traffic (SiT) Attacks
Stuck in Traffic (SiT) Attacks Mina Guirguis Texas State University Joint work with George Atia Traffic 2 Intelligent Transportation Systems V2X communication enable drivers to make better decisions: Avoiding
More informationAdaptive Spatiotemporal Node Selection in Dynamic Networks
Adaptive Spatiotemporal Node Selection in Dynamic Networks Pradip Hari, John B. P. McCabe, Jonathan Banafato, Marcus Henry, Ulrich Kremer, Dept. of Computer Science, Rutgers University Kevin Ko, Emmanouil
More informationCSE 634/590 Data mining Extra Credit: Classification by Association rules: Example Problem. Muhammad Asiful Islam, SBID:
CSE 634/590 Data mining Extra Credit: Classification by Association rules: Example Problem Muhammad Asiful Islam, SBID: 106506983 Original Data Outlook Humidity Wind PlayTenis Sunny High Weak No Sunny
More informationPSON: A Parallelized SON Algorithm with MapReduce for Mining Frequent Sets
2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming PSON: A Parallelized SON Algorithm with MapReduce for Mining Frequent Sets Tao Xiao Chunfeng Yuan Yihua Huang Department
More informationChapter 4 Data Mining A Short Introduction
Chapter 4 Data Mining A Short Introduction Data Mining - 1 1 Today's Question 1. Data Mining Overview 2. Association Rule Mining 3. Clustering 4. Classification Data Mining - 2 2 1. Data Mining Overview
More informationComputer Architecture Dr. Charles Kim Howard University
EECE416 Microcomputer Fundamentals & Design Computer Architecture Dr. Charles Kim Howard University 1 Computer Architecture Computer Architecture Art of selecting and interconnecting hardware components
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 17 RESEARCH ARTICLE OPEN ACCESS Classifying Brain Dataset Using Classification Based Association Rules
More informationUAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA
UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University
More informationChapter 28. Outline. Definitions of Data Mining. Data Mining Concepts
Chapter 28 Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms
More informationApriori Algorithm. 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke
Apriori Algorithm For a given set of transactions, the main aim of Association Rule Mining is to find rules that will predict the occurrence of an item based on the occurrences of the other items in the
More informationSamsung Galaxy S8 $ $ 718
Samsung Galaxy S8 5.8 curved OLED screen 12MP rear-facing camera 8MP Selfie camera Quick Wireless Charging Ask us about Bixby Vision virtual assistant $ 29.92 $ 718 :... BLU D750U Studio X 5 touchscreen
More informationOn the importance of deep learning regularization techniques in knowledge discovery
On the importance of deep learning regularization techniques in knowledge discovery Ljubinka Sandjakoska Atanas Hristov Ana Madevska Bogdanova Output Introduction Theory - Regularization techniques - Impact
More informationArchitectural Musings
Architectural Musings Rethinking Computer Systems Architecture & Evaluation Christopher Vick cvick@qti.qualcomm.com March 23, 2014 1 Introduction Vision Talk How should we analyze, reason about and evaluate
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu
More informationJune 27, Real-Time Analytics through Convergence. of User-Defined Functions. Vinay Deolalikar. HP-Autonomy Research. Sunnyvale, CA.
June 27, 2013 Outline 1 2 3 are Measurements 4 Results Example 20 Newsgroups 5 Explosive growth in unstructured data Already comprises about 80% enterprise data Growing faster than structured data Enterprises
More informationThe new maximum security smartphone No Camera - No GPS - No Recorder
The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is
More informationDistributed Pervasive Systems
Distributed Pervasive Systems CS677 Guest Lecture Tian Guo Lecture 26, page 1 Outline Distributed Pervasive Systems Popular Application domains Sensor nodes and networks Energy in Distributed Systems (Green
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationUSB Voltage and Current Tester Kit
USB Voltage and Current Tester Kit Product ID: USBAUBSCHM This diagnostic kit gives you everything you need to make sure your USB devices are getting the proper charge. It enables you to: troubleshoot
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationSMART Technologies. Introducing bluetooth low energy and ibeacon
SMART Technologies Introducing bluetooth low energy and ibeacon In real life you may call me Frederick Bousson Competence Leader Mobile @ Ordina Smartphone as life s remote control Focus on Software Development
More informationData Mining Concepts
Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms Sequential
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationClassification. Instructor: Wei Ding
Classification Decision Tree Instructor: Wei Ding Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 Preliminaries Each data record is characterized by a tuple (x, y), where x is the attribute
More informationLecture notes for April 6, 2005
Lecture notes for April 6, 2005 Mining Association Rules The goal of association rule finding is to extract correlation relationships in the large datasets of items. Many businesses are interested in extracting
More informationDevelopment of a mobile application for manual traffic counts
Development of a mobile application for manual traffic counts Mohammad Ghanim 1,* and Khalid Khawaja 2 1 Department of Civil and Architectural Engineering, Qatar University, Doha, Qatar 2 Office of Academic
More information10.1" Quad Core 3G. 1.2 GHz " 1280x800 IPS 3G. Specification: Optional: GPS OTA TABLET L10C1
10.1" Quad Core 3G TABLET L10C1 Specification: CPU: MT8389WK Quad core A7 1.2 GHz LCD Screen: 10.1 IPS 1280 x 800 Memory/Storage: 1GB DDR3/8G EMMC Camera: Dual camera (0.3M+2M) Connectivity: Wi-Fi 802.
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-
More informationJarek Szlichta
Jarek Szlichta http://data.science.uoit.ca/ Approximate terminology, though there is some overlap: Data(base) operations Executing specific operations or queries over data Data mining Looking for patterns
More informationExam Advanced Data Mining Date: Time:
Exam Advanced Data Mining Date: 11-11-2010 Time: 13.30-16.30 General Remarks 1. You are allowed to consult 1 A4 sheet with notes written on both sides. 2. Always show how you arrived at the result of your
More informationAutonomous Adaptive Sensing for Energy-Efficient IoT Applications. Frank Alexander Kraemer
Autonomous Adaptive Sensing for Energy-Efficient IoT Applications Frank Alexander Kraemer kraemer@ntnu.no Internet of Things Challenges: The scale in terms of the number of units. The constraints in terms
More informationCar Connectivity Consortium. MirrorLink and the Connected Car
Car Connectivity Consortium MirrorLink and the Connected Car 1 Agenda Landscape for Smartphone Integration into Cars Car Connectivity Consortium MirrorLink Technology Certification Applications 2 Landscape
More informationBig Data Analytics CSCI 4030
High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationData Structures. Notes for Lecture 14 Techniques of Data Mining By Samaher Hussein Ali Association Rules: Basic Concepts and Application
Data Structures Notes for Lecture 14 Techniques of Data Mining By Samaher Hussein Ali 2009-2010 Association Rules: Basic Concepts and Application 1. Association rules: Given a set of transactions, find
More informationTrack Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross
Track Join Distributed Joins with Minimal Network Traffic Orestis Polychroniou Rajkumar Sen Kenneth A. Ross Local Joins Algorithms Hash Join Sort Merge Join Index Join Nested Loop Join Spilling to disk
More informationEvent Coverage in Theme Parks Using Wireless Sensor Networks with Mobile Sinks
Event Coverage in Theme Parks Using Wireless Sensor Networks with Mobile Sinks Gürkan Solmaz and Damla Turgut Department of Electrical Engineering and Computer Science University of Central Florida - Orlando,
More information[Hatwar, 3(3): March, 2014] ISSN: Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Review on Wireless Oscilloscope Powered by Android Bhagyashree D.Hatwar *1, Prof.A.C.Wan 2 *1,2 S.S.B.T, Bambhori, Jalgaon,
More informationu Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc.
November 11, 2013 Presented by: Merhawit Habte 1. Introduc,on u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections,
More informationSoftFlash: Programmable Storage in Future Data Centers Jae Do Researcher, Microsoft Research
SoftFlash: Programmable Storage in Future Data Centers Jae Do Researcher, Microsoft Research 1 The world s most valuable resource Data is everywhere! May. 2017 Values from Data! Need infrastructures for
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/24/2014 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 High dim. data
More informationClustering and Association using K-Mean over Well-Formed Protected Relational Data
Clustering and Association using K-Mean over Well-Formed Protected Relational Data Aparna Student M.Tech Computer Science and Engineering Department of Computer Science SRM University, Kattankulathur-603203
More informationDriving the case for 700 MHz. Presentation to the GSMA
Driving the case for 700 MHz Presentation to the GSMA Shaun Collins, CEO shaun.collins@ccsinsight.com / +44 7836 699970 @shauncollins Martin Garner, SVP Internet martin.garner@ccsinsight.com / +44 7887
More informationData warehouse and Data Mining
Data warehouse and Data Mining Lecture No. 14 Data Mining and its techniques Naeem A. Mahoto Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology
More informationCMPUT 695 Fall 2004 Assignment 2 Xelopes
CMPUT 695 Fall 2004 Assignment 2 Xelopes Paul Nalos, Ben Chu November 5, 2004 1 Introduction We evaluated Xelopes, a data mining library produced by prudsys 1. Xelopes is available for Java, C++, and CORBA
More informationQualcomm Technologies, Inc.
Qualcomm Technologies, Inc. Qualcomm, Snapdragon, Adreno and Uplinq are trademarks of Qualcomm Incorporated, registered in the United States and in other countries, used with permission. Qualcomm Snapdragon
More informationUncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique
Research Paper Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique C. Sudarsana Reddy 1 S. Aquter Babu 2 Dr. V. Vasu 3 Department
More informationPanel: Enabling Consumer Visibility into Energy Usage
Panel: Enabling Consumer Visibility into Energy Usage Matthew Laherty Cisco Systems Shahram Mehraban Intel Mike Ballard Microchip Moderator Clayton Pillion Microchip Wendy Furchak Verizon Wireless A New
More informationCorrelative Analytic Methods in Large Scale Network Infrastructure Hariharan Krishnaswamy Senior Principal Engineer Dell EMC
Correlative Analytic Methods in Large Scale Network Infrastructure Hariharan Krishnaswamy Senior Principal Engineer Dell EMC 2018 Storage Developer Conference. Dell EMC. All Rights Reserved. 1 Data Center
More informationCSE4334/5334 DATA MINING
CSE4334/5334 DATA MINING Lecture 4: Classification (1) CSE4334/5334 Data Mining, Fall 2014 Department of Computer Science and Engineering, University of Texas at Arlington Chengkai Li (Slides courtesy
More informationChapter 3: Supervised Learning
Chapter 3: Supervised Learning Road Map Basic concepts Evaluation of classifiers Classification using association rules Naïve Bayesian classification Naïve Bayes for text classification Summary 2 An example
More informationA Comparative Study of Selected Classification Algorithms of Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220
More informationI/O Systems (4): Power Management. CSE 2431: Introduction to Operating Systems
I/O Systems (4): Power Management CSE 2431: Introduction to Operating Systems 1 Outline Overview Hardware Issues OS Issues Application Issues 2 Why Power Management? Desktop PCs Battery-powered Computers
More informationStructure of Association Rule Classifiers: a Review
Structure of Association Rule Classifiers: a Review Koen Vanhoof Benoît Depaire Transportation Research Institute (IMOB), University Hasselt 3590 Diepenbeek, Belgium koen.vanhoof@uhasselt.be benoit.depaire@uhasselt.be
More informationIntroduction to Parallel Computing
Introduction to Parallel Computing Chieh-Sen (Jason) Huang Department of Applied Mathematics National Sun Yat-sen University Thank Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar for providing
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/25/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 3 In many data mining
More informationCooperative Wireless Communications. Ashutosh Sabharwal
Cooperative Wireless Communications Ashutosh Sabharwal Outline Growing presence of wireless Why do we need a new paradigm Cooperative communication basics Future directions In Numbers Global cellular phone
More informationToday. Lecture 17: Reality Mining. Last time
Today We will introduce the idea of a relational database, discuss its underlying data model and present a slightly simplified view of how to access its information Lecture 17: As with all new technologies
More informationCHAPTER 5 WEIGHTED SUPPORT ASSOCIATION RULE MINING USING CLOSED ITEMSET LATTICES IN PARALLEL
68 CHAPTER 5 WEIGHTED SUPPORT ASSOCIATION RULE MINING USING CLOSED ITEMSET LATTICES IN PARALLEL 5.1 INTRODUCTION During recent years, one of the vibrant research topics is Association rule discovery. This
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationPharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah
The kinds of memory:- 1. RAM(Random Access Memory):- The main memory in the computer, it s the location where data and programs are stored (temporally). RAM is volatile means that the data is only there
More informationINTRODUCTION TO DATA MINING. Daniel Rodríguez, University of Alcalá
INTRODUCTION TO DATA MINING Daniel Rodríguez, University of Alcalá Outline Knowledge Discovery in Datasets Model Representation Types of models Supervised Unsupervised Evaluation (Acknowledgement: Jesús
More informationAdvanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors
Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Sriram Sethuraman Technologist & DMTS, Ittiam 1 Overview Imaging on Smart-phones
More informationMeasuring the Capability of Smartphones for Executing Context Algorithms
Maximilian Eibl, Martin Gaedke. (Hrsg.): INFORMATIK 2017, Lecture Lecture Notes in Notes Informatics in Informatics (LNI), Gesellschaft (LNI), Gesellschaft für Informatik, für Informatik, Bonn 2017 Bonn
More informationA Dell Technical White Paper Dell
Which UPS is Right for the Job? A Dell Technical White Paper Dell THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED
More informationServosila Robotic Heads
Servosila Robotic Heads www.servosila.com TABLE OF CONTENTS SERVOSILA ROBOTIC HEADS 2 SOFTWARE-DEFINED FUNCTIONS OF THE ROBOTIC HEADS 2 SPECIFICATIONS: ROBOTIC HEADS 4 DIMENSIONS OF ROBOTIC HEAD 5 DIMENSIONS
More informationResearch and Application of E-Commerce Recommendation System Based on Association Rules Algorithm
Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,
More informationMachine Learning Techniques for Data Mining
Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already
More informationBluetooth: What does it really do and will it be replaced?
Bluetooth: What does it really do and will it be replaced? By James Rogerson January 29, 2014Mobile phones A look at the ins and outs of Bluetooth and what its future hold Bluetooth is old and it might
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More information