Processing Approximate Moving Range Queries in Mobile Sensor Environments

Size: px
Start display at page:

Download "Processing Approximate Moving Range Queries in Mobile Sensor Environments"

Transcription

1 Processing Approximate Moving Range Queries in Mobile Sensor Environments Antoniya Petkova 1 Kien A. Hua 1 Alexander Aved 2 School of EECS University of Central Florida Orlando, USA 1 {apetkova, kienhua}@cs.ucf.edu 2 aaved@mail.ucf.edu Abstract The ubiquity of mobile devices has led to a rising demand for location-based services and applications. A major part of these services is based on the location-detection capabilities of the mobile devices. Utilization of location data reported by the devices is associated with a certain amount of uncertainty due to the device s mobility. In this paper, we examine an environment, which consists of mobile objects with no location-detection capabilities, and location-aware mobile sensors randomly scattered, that can sense the presence of mobile devices. These sensors can detect the identities of mobile objects that come within their sensing ranges but cannot infer their exact locations. The sensor readings are periodically reported to a database server. This system supports processing of mobile location-dependent range queries over mobile objects. The answer set of each query carries a certain degree of uncertainty due to the approximate nature of the reported object location data. We exploit scenarios of sensor range overlap to reduce the uncertainty inherent in the query result. Our work is validated through an extensive simulation study that provides assessment of the query results accuracy. Keywords- moving range queries over mobile objects; location databases; moving objects; sensors; uncertainty I. INTRODUCTION Due to rapid development and commercialization of wireless network technologies, localization technologies such as the GPS [10], smart mobile devices, radio frequency identifiers (RFID), and sensor networks, mobile communication has not only become ubiquitous, but indistinguishable from our everyday life in the modern world. This rapidly growing trend has resulted in an even greater demand for applications that integrate geographic location and services to satisfy various consumer needs. Such location-based services (LBS) range from military systems to everyday commercial systems such as vehicle navigation, taxi tracking, or environment monitoring. They allow users to query their environment and use the spatial data for various purposes [20]. To support such queries, today s solutions typically rely on location information reported by each participating mobile unit. The scalability of this strategy is limited due to the communication and computation bottleneck at the server. To mitigate this effect, Resident Domain [2] and Safe Region [19] techniques, and many variants (e.g., [23], [8], [12]) have been proposed. In this paper, we consider an environment that involves moving objects without localization and communication capabilities and mobile sensors equipped with GPS devices. The sensors have the ability to sense the presence of moving objects within their sensing ranges and can identify them, but cannot pinpoint their exact locations. RFID (Radio Frequency Identification) is an example of such sensing technology. Periodically, the sensors report their detected objects to the server. This proposed mobile sensor environment is more cost effective and more scalable then the conventional approach. The deployment cost of current solutions is typically proportional to the number of participating mobile units since each participating object is equipped with GPS, a computing device, and a communication device. In contrast, the deployment cost of the proposed environment is determined by the area of the application terrain, and is independent of the number of participants (i.e., moving objects). We focus on processing Approximate Moving Range (AMR) queries over moving objects in this environment. The continuous query is issued for one of the location-unaware mobile objects. The result at any point in time consists of the identities of all moving objects currently detected in the query range with a probability greater than some predefined threshold. The proposed query processing technique utilizes information gathered from the sensors and estimates the likelihood that a detected object is in the range of the query. In practice, not all applications demand exactness in the location information of the objects of interest. For instance, parents want to know if their child is still waiting at school; a student wants to know if a particular book has been returned to the library; a passenger wants to know if the next bus is arriving soon; or a military unit wants to know if a convoy is currently contained within a friendly area. None of these queries needs the exact location of the object of interest. We note that a different type of uncertainty has also been studied in LBS. The location information received at the server might not be accurate due to multiple factors, such as the object having moved since its last location update, delay in location data updates, transmission disruption, noise, or other issues associated with the unreliability of the physical transmission medium. Many probabilistic methods have been devised [3, 5, 6, 7, 11, 16, 17, 18, 21, 22] to address this problem. They compensate location deviations in the database to make discrepancies transparent to the user. The distinction between these studies and our work is as follows.

2 These techniques operate on location information obtained from individual objects through location updates, whereas our proposed technique deals with the presence of particular objects as detected by mobile sensors. Due to this difference, while existing techniques focus on estimating the true location of an object given its possibly outdated location, our challenge is to estimate the relative locations of objects given sensor readings. To simplify our study, we are not concerned with uncertainty due to the periodic nature of location data updates, transmission delays, signal disruptions, or limited server capacity. The remainder of this paper is organized as follows. We formally define the problem and introduce the framework in Section 2. The solution is presented in Section 3. The findings of our simulation study are presented and analyzed in Section 4. Finally, we conclude the paper in Section 5. II. PROBLEM DEFINITION In this section, we first present the uncertainty model for moving objects on which we base our study. Its purpose is to describe the imprecision of the data collected from the environment and to quantify the uncertainty that the query answers carry. A. Uncertainty Model In this subsection, we introduce a location uncertainty model to capture the uncertainty in a moving objects environment. The model distinguishes between two types of mobile objects, targets and sensors, deployed in a twodimensional area. We use a moving point with 2D Euclidean coordinates as an abstraction of a target object T i, T i {T 1,,T n } in the environment. The physical extent of the target in the 2D plane is irrelevant [9]. Each sensor, S j, S j {S 1,,S m }, is represented as a square centered at c j, such that c j {c 1,, c m }, and having a range r (i.e., the size of its sensing area). This representation accounts for the physical sensing device and its square detection range. Throughout the paper, S j is also used to represent the set of targets detected by the sensor. For simplicity, we assume all sensors have equal sensing ranges. Unlike existing works [4, 6, 8, 21], the targets in our model are not location-aware and they cannot communicate location information to the server. On the other hand, all sensor entities are equipped with locationdetection devices. They can sense the presence of moving objects within their sensing ranges but cannot identify their exact locations. Periodically, they send an update to the server that comprises their identity and location, together with the identities of all targets detected within their sensing ranges. Thus, a sensor S j can be modeled by the following tuple: < sid, loc t, r>, where sid stands for the sensor s id, loc t represents the location of the sensing object at time t, and r is the size of its sensing range. Even though the server does not have precise information regarding the targets locations, it can fuse the data reported by all sensors and approximate the targets locations. The extrapolation yields the whereabouts of the targets. Note that a target has to be detected by at least one sensor in order for the server to have any information about its current whereabouts. The extrapolated approximate target location has a rectangular shape with size bounded by the size of the sensor s range. A target T i detected by a sensor S j can be found, with certain probability, at any one location within S j. Thus, the scope of uncertainty for every object detected by a reader is determined by the recorded location of the sensor and its range size. In addition, each sensor is associated with a 2D probability density function, which describes at which positions within its sensing range the detected objects are more likely to be found. Hence, a target T i can be modeled with the tuple < tid, U tid >, where tid = i and represents the id of the target. U i denotes the uncertainty region of T i. When data from the sensors is received at the server, initially U i = S j. That is, the initial uncertainty region of a target object T i is the sensing region of the sensor that detected it. If T i has been detected by more than one sensor, the target s uncertainty region is updated to U i = S i S z, where z is the number of sensors that sensed T i in their sensing ranges. Thus, the location uncertainty of an object can be greatly reduced as multiple sensors detect that object. Similarly to [3, 6], we define an uncertainty region and an uncertainty probability density function to help quantify the location uncertainty of the moving objects in the proposed environment: Definition 1: An uncertainty region of an object T i at time t is defined as follows: f x S j, S j S z, if T i if T i S j T i Sk, j k. (1) S i T i S z Definition 2: The uncertainty probability density function (pdf) of an object T i, denoted by f i (x,y) is defined as follows: 0; 1, x, y if T U f i i. (2) i 0, otherwise Definition 1 implies that the uncertainty region of a target is either the sensing area of one sensor, in the case when the object was detected only by that sensor, or in the overlap area of multiple sensors, in the case when all of these sensors have detected the object in their sensing regions. Definition 2 is a general description of an uncertainty pdf. The pdf has the property that S j fi x, y dxdy 1. (3) The precise pdf formula may vary according to the specifications of different applications. Popular distributions like Gaussian and uniform have been studied in the context of uncertainty regions in [3, 6, 17, 21]. In this paper, we present a general uncertainty framework that can be adopted for different probability distributions. B. Approximate Moving Range Queries Based on the presented framework, in this paper we consider a new kind of probabilistic range query, Approximate Moving Range (AMR) query. Each query is pinned to one of the uncertain objects in the environment. However, due to the lack of precise location information about the moving objects in the environment, an AMR query is affixed to the

3 S 3 Q k U k uncertainty region of the query point. Each query has a rectangular area that denotes its range. For simplicity, all query regions have the same range. Each query is concerned with finding which moving objects are located within its range. More formally, given a rectangular object, Q k, where Q k {Q 1,,Q l } with a query point O k, such that O k U k, and having a range R, we can define the following type of query: Definition 3: An Approximate Moving Range query over uncertain mobile objects can be modeled as a tuplet <qid, R, U k, τ>, where qid is the id of the query point O k (a moving point in the database), R represent the size of the range of the query, U k denotes the uncertainty region associated with the query point, and τ stands for the qualifying threshold. An AMR returns a set of objects {T i, i[1,n] p i τ, i [1,n]}, (4) where p i is the qualifying probability of T i for satisfying the corresponding AMR. Let us consider the example illustrated in Fig. 1. The query object Q k is pinned to a moving point O k, O k {T 1,,T n }, which is bound by an uncertainty region U k. Due to the uncertainty of the query point O k reflected by the uncertainty region U k, the range of the query object Q k has to be expanded to compensate for the variation in the location of O k. The query region is extended by a value equal to half of the sizes of the sides of the rectangular uncertainty region, accordingly (see Fig. 1), which yields the query s new range, called uncertainty query range, R_new k. Note that this is different from the uncertainty region of the query point. Thus, the qualification probability of a target object T i of being in the answer set of query Q k has to be evaluated with respect to the new query range. III. S 1 O k AMR QUERY PROCESSING Uncertainty region of query point O k Uncertainty query range R_new k Figure 1. Determining the uncertainty region U k of query point O k; expanding the range of query Q k to compensate for the variance in the location of the query point O k. This section presents the AMR query evaluation technique in the context of the uncertainty model described in Section 2. The user poses an AMR query Q k to the server S 2 by specifying the id of the target object that is to be tracked. We refer to this object as the query point O k associated with Q k. Since the server has no records of the exact coordinates of O k, the query has to be pinned to the uncertainty region U k associated with O k. Thus, U k is used in the process of query evaluation. Similarly, since the server is aware only of the whereabouts of each target object in the monitored environment that has been detected by a sensor, it uses the objects uncertainty regions to decide their membership in the result set of a particular AMR query. This section consists of three subsections presenting different aspects of the query processing method. Section 3A describes the data structures stored on the central server. Section 3B presents the algorithm for object detection and finally, Section 3C describes the AMR query evaluation algorithm. A. Data Structures To support AMR queries, the database server maintains the following information: TargetObjects: This table contains the identities of all target objects in the monitored environment. It has the following schema: TargetObjects (tid, x 1, y 1, x 2, y 2 ), where tid represents the id of the target object, and (x 1, y 1 ) and (x 2, y 2 ) specify the coordinates of the upper left point and the lower right point of the uncertainty region of the target, respectively. SensorObjects: This table maintains the current locations of the sensors. That is, for each sid, we record its latest location. The table has the following schema: SensorObjects (sid, x, y, r), where sid denotes the sensor s identity in the database, the ordered pair (x, y) contains the coordinates of the sensor center point in the monitored terrain, and r denotes the side of the square range of the sensor. QueryObjects: This table maintains the identities of the target points, which act as query points. In addition, the table also contains the uncertainty ranges of each query. B. Object Detetection Due to the lack of location-detection capabilities in the target objects scattered throughout the monitored terrain, the server extrapolates their approximate locations by fusing location data received from the mobile sensors. If a target object T i is detected by only one sensor, the sensor region becomes the uncertainty region of the object, that is, U i = S j. However, if T i is detected by multiple objects, U i can shrink significantly and thus decrease the uncertainty associated with the target s location. When a user submits a query by specifying the identity of a target object in the monitored environment, this object becomes the query point O k. In addition to the query id, the user also specifies the query range and a threshold value, which is used for evaluating an objects membership in the result set of the query. When the server receives this request, it tries to locate the query point O k using object location

4 information reported by the sensors. If the object has been detected by at least one sensor, its uncertainty region U k is calculated. If the server finds that the object has not been detected by any sensor, it repeats this procedure in the next iteration of the process until either it finds at least one sensor which detected the object or the query expires. C. Query Evaluation The query evaluation technique is presented in Fig. 2. For each iteration, the server computes the new result for each of the currently active queries in QueryObjects as follows: 1) Step 1: The server performs a spatial join between TargetObjects and SensorObjects to determine the set of mobile sensors that detect each mobile object. That is, DetecSet contains all the moving objects, and for each object the list of sensor detecting it. 2) Step 2: The server processes each moving object T i (in DetectSet) with uncertainty area U i as follows: a) Step 3: If the object T i is in the overlap area of multiple sensors, its uncertainty area U i is the intersection of the corresponding sensing areas; otherwise, its uncertainty area is the entire sensing range of the sole sensor that detects T i. We note that every target object in DetectSet must have at least one detecting sensor. b) Step 4: If T i is a query object (i.e., it appears in QueryObjects), the server adds its uncertainty area U i to the UQueries set; otherwise, U i is added to the UTarget set. c) Step 5: The server scans UQueries and computes the uncertainty query range for each of the active queries, as illustrated in Fig. 1, to compensate for the uncertainty in the location of the query object. d) Step 6: The spatial join between UQueries and UTargets is performed to find targets whose uncertainty area overlaps with some uncertainty query range. If this overlap area is more than τ, the target is added to the result of the corresponding query. e) Step 7: The result of the above spatial join is the new results of the currently active AMR queries. These new results are transmitted to the user in Step 8. We note in Step 6 that if the uncertainty area U i of a moving object T i fully overlaps with the uncertainty query region R_new k, then T i is assumed to be in the result set of Q k with a qualification probability p i = 1. In case, U i overlaps with Q k only partially, then T i is in Q k only if p i U R _ new i k f i x, ydxdy. (5) Due to the dynamic nature of the mobile environment, maintaining spatial indexes is very expensive. Non-indexbased spatial join algorithms, such as Partition-based Spatial Merge [15] and Spatial Hash-Joins [13], can be used to find the intersections between targets and sensors or between the uncertainty regions of objects and an uncertainty query range. They are phased algorithms involving a partition phase followed by a merge phase; and each phase involves Algorithm AMRproc input: TargetObjects, SensorObjects, QueryObjects output: AMRresult set for each iteration of query processing 1: spatial join between TargetObjects and SensorObjects DetectSet = SPJ obj.loc( TargetObjects, SensorObjects) 2: iterate through DetectSet 3: if (T i S j,,t i S z) do U i = S i S z only sequential access to the data sets. We note that the complexity of this approach is proportional to the number of objects, instead of having logarithmic computational complexity as in index-based techniques. IV. SIMULATION STUDY In this section, we present simulation results that show the effectiveness of the proposed Approximate Moving Range query processing technique. A. Experimental Setup // determine uncertainty area else U i = S i 4: if ( T i.id is in QueryObjects) // if object is a query point UQueries(qid, U, R, R_new, τ) U i else UTargets (tid, U) U i 5: UQueries(qid, U, R, R_new, τ) calculate R_new 6: spatial join between UQueries and UTargets if ( x, ydxdy U R _ new i k 7: AMRresult Result of spatial join 8: return AMRresult f ) i Figure 2. AMR query processing technique To evaluate the Approximate Moving Range query model we propose in this work, we designed a simulator of a moving object environment, such that the objects (both the targets and the sensors) move in accordance with the Random Waypoint Model (RWP)[1]. Thus, each mobile object chooses a destination, proceeds to move to the destination, and finally pauses for a random amount of time. As mobile objects move into (and out of) the detection range of sensors, the sensors report the identities of sensed objects to the database server. Since the location and sensing ranges of all sensors are known to the database server, it calculates the uncertainty area for each mobile object every step of the simulation. We also assume the detected targets have an equal probability of being at any one spatial point within a sensor s range, or in other words, are uniformly distribution. We use the precision and recall metrics to demonstrate the performance of our model, measured against the ground truth, for various simulation scenarios. The precision provides an indication of the accuracy, or quality, of our result and recall indicates the portion of mobile objects that were correctly identified by the query. TP TP Precision Recall. (6) TP FP TP FN

5 TP: The number of objects correctly determined as belonging to the result set; FN: The number of objects, which were not included in the result set but should have been; FP: The number of objects, which are incorrectly determined as belonging to the result set. B. Simulation Results To validate the query model we present three sets of simulation results such that the focus falls on a single parameter or a combination of parameters used to configure our experimental setup: 1) Effect of Qualification Threshold: We vary the uncertainty threshold with the following percentage values: 65, 75, 85 and 95. That is, for a mobile object to be included in the query result with an uncertainty level of 65%, 65% of the uncertainty region of this object must overlap with the query uncertainty range. The graphs depicted in Fig. 3 show that the variance in the threshold parameter affects both precision and recall. More specifically, it affects the performance of the technique when the size of the sensor range is relatively large. This can be explained with the fact that as the size of the sensor range and the value of the qualification query grow in parallel, the probability that a sensor will overlap with a query region only partially, grows. When the size of a sensor range is larger, there is a higher probability that the overlap between an object s uncertainty area and a query region is not big enough to pass the threshold. 2) Effect of Query Range: The range, of the continuous query is varied in increments of 10 units: 10, 20, 30 and 40 meters. Based on the experimental results presented in Fig. 4 we can conclude that when the range of the query grows in parallel with the range of the sensors, the values of recall and precision improve. It is worth noting that the best performance of the technique is observed when the sensor range remains small while the size of the query range grows. This trend can be justified with the observation that whenever the sensors have smaller ranges, the target objects detected by them have smaller uncertainty regions. The smaller the sensor range, the smaller the location uncertainty of the target objects detected by the sensor. When several sensors with small ranges overlap, the uncertainty region of an object found in this overlap area is significantly smaller than in the case of sensors with larger ranges. However, this observation is valid only down to some lower bound on the sensor region size, after which the range of the sensor is too small to detect a significant number of target objects. Thus, many targets remain undetected and therefore the server has no knowledge of their whereabouts. 3) Effect of Coverage The simulation results for recall and precision under various values of percentage of area coverage are presented in Fig. 5, graphs a) and b), respectively. This coverage parameter indicates how well the mobile sensors cover the 1,000 1,000 simulated space. For example, if we have 50,000 mobile sensors, each with a sensing range of 2 2 spatial units, the coverage is computed as follows: 2 50, % Our simulator was run with coverage parameter values of 25%, 50%, 75% and 100%. Based on the graphs in Fig. 5, we can deduce that the best results are again the ones based on a configuration that involves sensors with a smaller sensing range. The reason for this occurrence is that when the ranges of the sensors are small, the system would need more sensors to get a good coverage. The greater the number of sensors scattered throughout the monitored environment, the greater the chance for overlap of the ranges of multiple sensors. V. CONCLUSION In this paper, we introduced a new class of locationbased query called Approximate Moving Range (AMR) query, and presented a probabilistic technique for processing such queries. We consider a mobile sensors environment, in which each sensor is modeled as a moving rectangle representing its sensing range. Each sensor can detect the identities of location-unaware objects within its sensing range. The AMR query is pinned to a moving object with no location-detection capabilities. By fusing location information on moving objects detected by the individual mobile sensors, the database server can evaluate the AMR queries. To assess the effectiveness of the proposed query processing technique, we performed an extensive simulation study. The results show that the query processing technique is very effective and can generate reliable results. This technique is also highly cost effective and scalable. Since only the mobile sensors need to be equipped with location positioning and communication devices, the overall application cost is not dependent on the number of moving objects. Furthermore, the computation environment is more scalable then the standard approach, in which every node must repeatedly communicate with the server. REFERENCES [1] C. Bettstetter, Mobility modeling in wireless networks: categorization,smooth movement, and border effects, SIGMOBILE Mob. Comput.Commun. Rev., vol. 5, no. 3, pp , [2] Y. Cai and K. A. Hua, "An Adaptive Query Management Technique for Efficient Realtime Monitoring of Spatial Regions in Mobile Database Systems," in IEEE International Performance, Computing, and Communication Conference, 2002, pp [3] J. Chen and R. Cheng, Efficient Evaluation of Imprecise Location- Dependent Queries, IEEE 23rd International Conference on Data Engineering, 2007, pp [4] R. Cheng, K.Y. Lam, Sunil Prabhakar, and B. Liang, An Efficient Location Update Mechanism for Continuous Queries over Moving Objects, Information Systems, 2007, pp [5] R. Cheng and S. Prabhakar, Sensors, Uncertainty Models and Probabilistic Queries, Encyclopedia of Database Technologies and Applications, 2005, pp

6 Figure 3. Effect of qualification threshold on recall (left) and precision (right) for different sensor ranges. Figure 4. Effect of query range on recall (left) and precision (right) for different sensor ranges. Figure 5. Effect of coverage on recall (left) and precision (right) for different sensor ranges. [6] R. Cheng, S. Prabhakar, and D. Kalashnikov. Querying Imprecise Data in Moving Object Environments, Technical Report number , Purdue University, October [7] B.S.E. Chung, W. Lee, and A.L.P. Chen, Processing probabilistic spatio-temporal range queries over moving objects with uncertainty, Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, 2009, pp [8] B. Gedik and L. Ling, MobiEyes: A Distributed Location Monitoring Service Using Moving Location Queries, IEEE Transactions on Mobile Computing, vol. 5, Aug. 2006, pp [9] R.H. Guting and M. Schneider, Moving Objects Databases, Morgan Kaufmann Publishers, [10] B. Hoffmann-Wellenhof, H. Lichtenegger, and J. Collins. GPS theory and practice. Springer-Verlag, New York, [11] D. Kalashnikov, S. Prabhakar, W.G. Aref, and S.E. Hambrusch, Efficient Evaluation of Continuous Range Queries on Moving Objects, Proc. of 13th Intl. Conference on Database and Expert Systems Applications, [12] F Liu, K. A. Hua, and T. Do, A P2P Technique for Continuous knn Query in Road Networks, in DEXA 07 [13] M. Lo and C. Ravishankar, "Spatial Hash-Joins," ACM SIGMOD Record, Vol. 25, Issue 2 (June 1996), pp [14] K. Mouratidis, M.L. Yiu, D. Papadias, and N. Mamoulis, Continuous nearest neighbor monitoring in road networks, 2006 [15] J. Patel and D. DeWitt, "Partition-based Spatial-Merge Join," in Proc. of 1996 ACM SIGMOD Conference, Montreal, Canada, June [16] M. Pelanis, S. Šaltenis, and C.S. Jensen, Indexing the past, present, and anticipated future positions of moving objects, ACM Transactions on Database Systems (TODS), vol. 31, Mar. 2006, pp [17] D. Pfoser and C.S. Jensen, Capturing the Uncertainty of Moving- Object Representations, Springer Berlin / Heidelberg. Advances in Spatial Databases, vol. 1651/1999, Jan. 1999, pp [18] E. Pitoura and G. Samaras, Locating Objects in Mobile Computing, IEEE Transactions on Knowledge and Data Engineering, vol. 13, Jul. 2001, pp [19] S. Prabhakar, Y. Xia, D. V. Kalashnikov, W. G. Aref, and S. E. Hambrusch, "Query Indexing and Velocity Constrained Indexing: Scalble Techniques for Continuous Queries on Moving Objects," in IEEE Transactions on Computers, 51(10): , October, [20] J.H. Schiller and A. Voisard, Location-based services, San Francisco, CA: Morgan Kaufmann Publishers, [21] A.P. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, Querying the Uncertain Position of Moving Objects, Springer Berlin / Heidelberg. Temporal Databases - Research and Practice, vol. 1399/1998, 1998, pp [22] O. Wolfson, A. P. Sistla, S. Chamberlain, and Y. Yesha. Updating and querying databases that track mobile units. Distributed and Parallel Databases, 7(3): , [23] J. Zhang, M. Zhu, D. Papadias, Y. Tao, and D. Lee, Location-based Spatial Queries, in SIGMOD 03

Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee

Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee Chi-Yin Chow 1, Mohamed F. Mokbel 1, Joe Naps 1, and Suman Nath 2 1 Department of Computer Science and Engineering, University

More information

Probabilistic Spatial Queries on Existentially Uncertain Data

Probabilistic Spatial Queries on Existentially Uncertain Data Probabilistic Spatial Queries on Existentially Uncertain Data Xiangyuan Dai 1, Man Lung Yiu 1, Nikos Mamoulis 1, Yufei Tao 2, and Michail Vaitis 3 1 Department of Computer Science, University of Hong Kong,

More information

A System for Discovering Regions of Interest from Trajectory Data

A System for Discovering Regions of Interest from Trajectory Data A System for Discovering Regions of Interest from Trajectory Data Muhammad Reaz Uddin, Chinya Ravishankar, and Vassilis J. Tsotras University of California, Riverside, CA, USA {uddinm,ravi,tsotras}@cs.ucr.edu

More information

Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework

Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency,

More information

MobiPLACE*: A Distributed Framework for Spatio-Temporal Data Streams Processing Utilizing Mobile Clients Processing Power.

MobiPLACE*: A Distributed Framework for Spatio-Temporal Data Streams Processing Utilizing Mobile Clients Processing Power. MobiPLACE*: A Distributed Framework for Spatio-Temporal Data Streams Processing Utilizing Mobile Clients Processing Power. Victor Zakhary, Hicham G. Elmongui, and Magdy H. Nagi Computer and Systems Engineering,

More information

SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments *

SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments * HARIM JUNG, YONG SUNG KIM AND YON DOHN CHUNG Department of Computer Science

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

On Reducing Communication Cost for Distributed Moving Query Monitoring Systems

On Reducing Communication Cost for Distributed Moving Query Monitoring Systems The Ninth 9th International Conference on on Mobile Data Management On Reducing Communication Cost for Distributed Moving Query Monitoring Systems Fuyu Liu Kien A. Hua Fei Xie School of EECS University

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Indoor A New Data Management Frontier

Indoor A New Data Management Frontier Indoor A New Data Management Frontier Christian S. Jensen Hua Lu Bin Yang Department of Computer Science, Aalborg University, Denmark {csj, luhua}@cs.aau.dk School of Computer Science, Fudan University,

More information

DSTTMOD: A Discrete Spatio-Temporal Trajectory Based Moving Object Database System

DSTTMOD: A Discrete Spatio-Temporal Trajectory Based Moving Object Database System DSTTMOD: A Discrete Spatio-Temporal Trajectory Based Moving Object Database System Xiaofeng Meng 1 Zhiming Ding 2 1 Information School Renmin University of China, Beijing 100872, China xfmeng@mail.ruc.edu.cn

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

Spatiotemporal Access to Moving Objects. Hao LIU, Xu GENG 17/04/2018

Spatiotemporal Access to Moving Objects. Hao LIU, Xu GENG 17/04/2018 Spatiotemporal Access to Moving Objects Hao LIU, Xu GENG 17/04/2018 Contents Overview & applications Spatiotemporal queries Movingobjects modeling Sampled locations Linear function of time Indexing structure

More information

must uncertainty interval of object 2 uncertainty interval of object 1

must uncertainty interval of object 2 uncertainty interval of object 1 Tracking Moving Objects Using Database Technology in DOMINO Ouri Wolfson 1, Prasad Sistla 1, Bo Xu 1, Jutai Zhou 1, Sam Chamberlain 2, Yelena Yesha 3, and Naphtali Rishe 4 1 University of Illinois at Chicago

More information

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Welcome to DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH 116 Fall 2017 First Grading for Reading Assignment Weka v 6 weeks v https://weka.waikato.ac.nz/dataminingwithweka/preview

More information

Fosca Giannotti et al,.

Fosca Giannotti et al,. Trajectory Pattern Mining Fosca Giannotti et al,. - Presented by Shuo Miao Conference on Knowledge discovery and data mining, 2007 OUTLINE 1. Motivation 2. T-Patterns: definition 3. T-Patterns: the approach(es)

More information

The Area Code Tree for Nearest Neighbour Searching

The Area Code Tree for Nearest Neighbour Searching The Area Code Tree for Nearest Neighbour Searching Fatema Rahman and Wendy Osborn Department of Mathematics and Computer Science University of Lethbridge Lethbridge, Alberta T1K 3M4 Canada Email: (f.rahman,wendy.osborn)@uleth.ca

More information

Computational Geometry for Imprecise Data

Computational Geometry for Imprecise Data Computational Geometry for Imprecise Data November 30, 2008 PDF Version 1 Introduction Computational geometry deals with algorithms on geometric inputs. Historically, geometric algorithms have focused

More information

Efficient Range Query Processing on Uncertain Data

Efficient Range Query Processing on Uncertain Data Efficient Range Query Processing on Uncertain Data Andrew Knight Rochester Institute of Technology Department of Computer Science Rochester, New York, USA andyknig@gmail.com Manjeet Rege Rochester Institute

More information

Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index *

Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index * Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index * I-Fang Su 1, Chang-Ming Tsai 2, Yuan-Ko Huang 3, Chieh-Ling Huang 2, Jwu-Jenq Chen 2, and Yu-Chi Chung 2, a 1 Department

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Processing Range-Monitoring Queries on Heterogeneous Mobile Objects

Processing Range-Monitoring Queries on Heterogeneous Mobile Objects Processing Range-Monitoring Queries on Heterogeneous Mobile Objects Ying Cai Department of Computer Science Iowa State University Ames, IA 50011, U.S.A E-mail: yingcai@cs.iastate.edu Kien A. Hua Computer

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Continuous Query Processing in Spatio-temporal Databases

Continuous Query Processing in Spatio-temporal Databases Continuous uery rocessing in Spatio-temporal Databases Mohamed F. Mokbel Department of Computer Sciences, urdue University mokbel@cs.purdue.edu Abstract. In this paper, we aim to develop a framework for

More information

A Robust Wipe Detection Algorithm

A Robust Wipe Detection Algorithm A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,

More information

Location Traceability of Users in Location-based Services

Location Traceability of Users in Location-based Services Location Traceability of Users in Location-based Services Yutaka Yanagisawa Hidetoshi Kido Tetsuji Satoh, NTT Communication Science Laboratories, NTT Corporation Graduate School of Information Science

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs : A Distributed Adaptive-Learning Routing Method in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2, shenh,

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial

More information

Textural Features for Image Database Retrieval

Textural Features for Image Database Retrieval Textural Features for Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington Seattle, WA 98195-2500 {aksoy,haralick}@@isl.ee.washington.edu

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

Modeling Historical and Future Spatio-Temporal Relationships of Moving Objects in Databases

Modeling Historical and Future Spatio-Temporal Relationships of Moving Objects in Databases Modeling Historical and Future Spatio-Temporal Relationships of Moving Objects in Databases Reasey Praing & Markus Schneider University of Florida, Department of Computer & Information Science & Engineering,

More information

Mobility Data Management and Exploration: Theory and Practice

Mobility Data Management and Exploration: Theory and Practice Mobility Data Management and Exploration: Theory and Practice Chapter 4 -Mobility data management at the physical level Nikos Pelekis & Yannis Theodoridis InfoLab, University of Piraeus, Greece infolab.cs.unipi.gr

More information

Indexing Probabilistic Nearest-Neighbor Threshold Queries

Indexing Probabilistic Nearest-Neighbor Threshold Queries Indexing Probabilistic Nearest-Neighbor Threshold Queries Yinian Qi 1, Sarvjeet Singh 1, Rahul Shah 2, and Sunil Prabhakar 1 1 Department of Computer Science, Purdue University {yqi, sarvjeet, sunil}@cs.purdue.edu

More information

Efficiency of Hybrid Index Structures - Theoretical Analysis and a Practical Application

Efficiency of Hybrid Index Structures - Theoretical Analysis and a Practical Application Efficiency of Hybrid Index Structures - Theoretical Analysis and a Practical Application Richard Göbel, Carsten Kropf, Sven Müller Institute of Information Systems University of Applied Sciences Hof Hof,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

Distributed Processing of Moving K-Nearest-Neighbor Query on Moving Objects

Distributed Processing of Moving K-Nearest-Neighbor Query on Moving Objects Distributed Processing of Moving K-Nearest-Neighbor Query on Moving Objects Wei Wu Wenyuan Guo School of Computing National University of Singapore Kian-Lee Tan Abstract A moving k-nearest-neighbor (MKNN)

More information

Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization

Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization 10 th World Congress on Structural and Multidisciplinary Optimization May 19-24, 2013, Orlando, Florida, USA Inclusion of Aleatory and Epistemic Uncertainty in Design Optimization Sirisha Rangavajhala

More information

Introduction to Trajectory Clustering. By YONGLI ZHANG

Introduction to Trajectory Clustering. By YONGLI ZHANG Introduction to Trajectory Clustering By YONGLI ZHANG Outline 1. Problem Definition 2. Clustering Methods for Trajectory data 3. Model-based Trajectory Clustering 4. Applications 5. Conclusions 1 Problem

More information

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION Xue-Min Lu 1,3, Sendo Wang 2 1 Master Student, 2 Associate Professor

More information

Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets

Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets Mahady Hasan, Muhammad Aamir Cheema, Xuemin Lin, Ying Zhang The University of New South Wales, Australia {mahadyh,macheema,lxue,yingz}@cse.unsw.edu.au

More information

A Novel Method to Estimate the Route and Travel Time with the Help of Location Based Services

A Novel Method to Estimate the Route and Travel Time with the Help of Location Based Services A Novel Method to Estimate the Route and Travel Time with the Help of Location Based Services M.Uday Kumar Associate Professor K.Pradeep Reddy Associate Professor S Navaneetha M.Tech Student Abstract Location-based

More information

Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints

Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints Lan Sun, Ying-jie Wu, Zhao Luo, Yi-lei Wang College of Mathematics and Computer Science Fuzhou University Fuzhou,

More information

Controlling the spread of dynamic self-organising maps

Controlling the spread of dynamic self-organising maps Neural Comput & Applic (2004) 13: 168 174 DOI 10.1007/s00521-004-0419-y ORIGINAL ARTICLE L. D. Alahakoon Controlling the spread of dynamic self-organising maps Received: 7 April 2004 / Accepted: 20 April

More information

Geometric and Thematic Integration of Spatial Data into Maps

Geometric and Thematic Integration of Spatial Data into Maps Geometric and Thematic Integration of Spatial Data into Maps Mark McKenney Department of Computer Science, Texas State University mckenney@txstate.edu Abstract The map construction problem (MCP) is defined

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Computing Continuous Skyline Queries without Discriminating between Static and Dynamic Attributes

Computing Continuous Skyline Queries without Discriminating between Static and Dynamic Attributes Computing Continuous Skyline Queries without Discriminating between Static and Dynamic Attributes Ibrahim Gomaa, Hoda M. O. Mokhtar Abstract Although most of the existing skyline queries algorithms focused

More information

Learning the Three Factors of a Non-overlapping Multi-camera Network Topology

Learning the Three Factors of a Non-overlapping Multi-camera Network Topology Learning the Three Factors of a Non-overlapping Multi-camera Network Topology Xiaotang Chen, Kaiqi Huang, and Tieniu Tan National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy

More information

Mixture Models and EM

Mixture Models and EM Mixture Models and EM Goal: Introduction to probabilistic mixture models and the expectationmaximization (EM) algorithm. Motivation: simultaneous fitting of multiple model instances unsupervised clustering

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Sharing Location Dependent Experiences in MANET

Sharing Location Dependent Experiences in MANET Sharing Location Dependent Experiences in MANET Kihwan Kim Ying Cai Wallapak Tavanapong Department of Computer Science Iowa State University Ames, IA 511-14, USA Email: {khkim,yingcai,tavanapo}@cs.iastate.edu

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Detect tracking behavior among trajectory data

Detect tracking behavior among trajectory data Detect tracking behavior among trajectory data Jianqiu Xu, Jiangang Zhou Nanjing University of Aeronautics and Astronautics, China, jianqiu@nuaa.edu.cn, jiangangzhou@nuaa.edu.cn Abstract. Due to the continuing

More information

Indexing the Positions of Continuously Moving Objects

Indexing the Positions of Continuously Moving Objects Indexing the Positions of Continuously Moving Objects Simonas Šaltenis Christian S. Jensen Aalborg University, Denmark Scott T. Leutenegger Mario A. Lopez Denver University, USA SIGMOD 2000 presented by

More information

A Graph Theoretic Approach to Image Database Retrieval

A Graph Theoretic Approach to Image Database Retrieval A Graph Theoretic Approach to Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington, Seattle, WA 98195-2500

More information

Incremental Nearest-Neighbor Search in Moving Objects

Incremental Nearest-Neighbor Search in Moving Objects Incremental Nearest-Neighbor Search in Moving Objects Katerina Raptopoulou, Apostolos N. Papadopoulos, Yannis Manolopoulos Department of Informatics, Aristotle University 54124 Thessaloniki, GREECE {katerina,apostol,manolopo}@delab.csd.auth.gr

More information

Optimizing Moving Queries over Moving Object Data Streams

Optimizing Moving Queries over Moving Object Data Streams Optimizing Moving Queries over Moving Object Data Streams Dan Lin 1,BinCui 2,, and Dongqing Yang 2 1 National University of Singapore lindan@comp.nus.edu.sg 2 Peking University, China {bin.cui,dqyang}@pku.edu.cn

More information

Max-Count Aggregation Estimation for Moving Points

Max-Count Aggregation Estimation for Moving Points Max-Count Aggregation Estimation for Moving Points Yi Chen Peter Revesz Dept. of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA Abstract Many interesting problems

More information

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50

Mobility Models. Larissa Marinho Eglem de Oliveira. May 26th CMPE 257 Wireless Networks. (UCSC) May / 50 Mobility Models Larissa Marinho Eglem de Oliveira CMPE 257 Wireless Networks May 26th 2015 (UCSC) May 2015 1 / 50 1 Motivation 2 Mobility Models 3 Extracting a Mobility Model from Real User Traces 4 Self-similar

More information

Aggregate-Max Nearest Neighbor Searching in the Plane

Aggregate-Max Nearest Neighbor Searching in the Plane CCCG 2013, Waterloo, Ontario, August 8 10, 2013 Aggregate-Max Nearest Neighbor Searching in the Plane Haitao Wang Abstract We study the aggregate nearest neighbor searching for the Max operator in the

More information

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University

More information

On Indexing High Dimensional Data with Uncertainty

On Indexing High Dimensional Data with Uncertainty On Indexing High Dimensional Data with Uncertainty Charu C. Aggarwal Philip S. Yu Abstract In this paper, we will examine the problem of distance function computation and indexing uncertain data in high

More information

Framework for replica selection in fault-tolerant distributed systems

Framework for replica selection in fault-tolerant distributed systems Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Efficient Index Based Query Keyword Search in the Spatial Database

Efficient Index Based Query Keyword Search in the Spatial Database Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1517-1529 Research India Publications http://www.ripublication.com Efficient Index Based Query Keyword Search

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

A Jini Based Implementation for Best Leader Node Selection in MANETs

A Jini Based Implementation for Best Leader Node Selection in MANETs A Jini Based Implementation for Best Leader Node Selection in MANETs Monideepa Roy, Pushpendu Kar and Nandini Mukherjee Abstract MANETs provide a good alternative for handling the constraints of disconnectivity

More information

ProUD: Probabilistic Ranking in Uncertain Databases

ProUD: Probabilistic Ranking in Uncertain Databases Proc. 20th Int. Conf. on Scientific and Statistical Database Management (SSDBM'08), Hong Kong, China, 2008. ProUD: Probabilistic Ranking in Uncertain Databases Thomas Bernecker, Hans-Peter Kriegel, Matthias

More information

An Efficient Approach for Color Pattern Matching Using Image Mining

An Efficient Approach for Color Pattern Matching Using Image Mining An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,

More information

C-NBC: Neighborhood-Based Clustering with Constraints

C-NBC: Neighborhood-Based Clustering with Constraints C-NBC: Neighborhood-Based Clustering with Constraints Piotr Lasek Chair of Computer Science, University of Rzeszów ul. Prof. St. Pigonia 1, 35-310 Rzeszów, Poland lasek@ur.edu.pl Abstract. Clustering is

More information

Clustering Algorithms for Data Stream

Clustering Algorithms for Data Stream Clustering Algorithms for Data Stream Karishma Nadhe 1, Prof. P. M. Chawan 2 1Student, Dept of CS & IT, VJTI Mumbai, Maharashtra, India 2Professor, Dept of CS & IT, VJTI Mumbai, Maharashtra, India Abstract:

More information

Efficient Evaluation of Continuous Range Queries on Moving Objects

Efficient Evaluation of Continuous Range Queries on Moving Objects To Appear in Proc. of 3th Intl. Conference on Database and Expert Systems Applications - DEXA Efficient Evaluation of Continuous Range Queries on Moving Objects D. V. Kalashnikov S. Prabhakar W. G. Aref

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Extended R-Tree Indexing Structure for Ensemble Stream Data Classification

Extended R-Tree Indexing Structure for Ensemble Stream Data Classification Extended R-Tree Indexing Structure for Ensemble Stream Data Classification P. Sravanthi M.Tech Student, Department of CSE KMM Institute of Technology and Sciences Tirupati, India J. S. Ananda Kumar Assistant

More information

Exploring Gaussian and Triangular Primary Membership Functions in Non-Stationary Fuzzy Sets

Exploring Gaussian and Triangular Primary Membership Functions in Non-Stationary Fuzzy Sets Exploring Gaussian and Triangular Primary Membership Functions in Non-Stationary Fuzzy Sets S. Musikasuwan and J.M. Garibaldi Automated Scheduling, Optimisation and Planning Group University of Nottingham,

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Introduction to Indexing R-trees. Hong Kong University of Science and Technology

Introduction to Indexing R-trees. Hong Kong University of Science and Technology Introduction to Indexing R-trees Dimitris Papadias Hong Kong University of Science and Technology 1 Introduction to Indexing 1. Assume that you work in a government office, and you maintain the records

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Context Aware Routing in Sensor Networks

Context Aware Routing in Sensor Networks Context Aware Routing in Sensor Networks Melanie Hartmann 1, Holger Ziekow 2, and Max Mühlhäuser 1 1 Telecooperation Department Darmstadt University of Technology Hochschulstraße 10, D-64289 Darmstadt,

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervised Learning and Clustering Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2008 CS 551, Spring 2008 c 2008, Selim Aksoy (Bilkent University)

More information

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles 2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

More information

Dynamic Nearest Neighbor Queries in Euclidean Space

Dynamic Nearest Neighbor Queries in Euclidean Space D Dynamic Nearest Neighbor Queries in Euclidean Space Sarana Nutanong 1, Mohammed Eunus Ali 2, Egemen Tanin 3, and Kyriakos Mouratidis 4 1 City University of Hong Kong, Hong Kong, China 2 Department of

More information

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,

More information

Unsupervised Distributed Clustering

Unsupervised Distributed Clustering Unsupervised Distributed Clustering D. K. Tasoulis, M. N. Vrahatis, Department of Mathematics, University of Patras Artificial Intelligence Research Center (UPAIRC), University of Patras, GR 26110 Patras,

More information

CS 231A Computer Vision (Fall 2012) Problem Set 3

CS 231A Computer Vision (Fall 2012) Problem Set 3 CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest

More information

Logical Templates for Feature Extraction in Fingerprint Images

Logical Templates for Feature Extraction in Fingerprint Images Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Ranking Clustered Data with Pairwise Comparisons

Ranking Clustered Data with Pairwise Comparisons Ranking Clustered Data with Pairwise Comparisons Alisa Maas ajmaas@cs.wisc.edu 1. INTRODUCTION 1.1 Background Machine learning often relies heavily on being able to rank the relative fitness of instances

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS D. Satyanarayana Department of Electrical and Computer Engineering University of Buraimi Al Buraimi, Sultanate of Oman Sathyashree.

More information

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research

More information

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique Research Paper Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique C. Sudarsana Reddy 1 S. Aquter Babu 2 Dr. V. Vasu 3 Department

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information