Mobile Crowd-Sensing for E-Health Monitoring and Hot-Spot Detection. Basem Shihada Assistant Professor of Computer Science and Electrical Engineering
|
|
- Lucinda White
- 5 years ago
- Views:
Transcription
1 Mobile Crowd-Sensing for E-Health Monitoring and Hot-Spot Detection Basem Shihada Assistant Professor of Computer Science and Electrical Engineering Bell Canada Invited Seminar Tuesday Dec. 9 th, 2014
2 Computing and Networking Trends q Bell's Law * : Every decade sees a change in the class of computing devices q 1990s saw the emergence of the laptop; q saw the mobile phones q Next decade, desktops will disappear. End-user computers will be almost entirely laptops & tablets. q Data and applications will live in the cloud. q Ubiquitous high-speed wireless connectivity is a must. q Dense, small-range wireless access points (AP) will become more important than today. q Spectrum is limited, neighboring APs will likely have to operate on the same spectrum. q Interference between neighboring APs will become the dominating factor. q Small cells connectivity and load will fluctuate rapidly, both in space and time. * Bell's Law of Computer Classes formulated by Gordon Bell in 1972, describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out.
3 NetLab: Research Domains Applications Resource & Energy Allocation
4 Cellular and Wireless Packet Networks
5 Delays in Wireless Mesh Networks The objective is to optimize buffer sizes to balance the throughput and delay requirements 1,2,3. Proposed a distributed, neighborhood buffer, that is sized for saturating the channel while minimizing queueing delays. We proved that using small buffers (1-4 packets) improves delay by up to 10x 1 We implemented our scheme in a Linux testbed WMN deployed on the 4 th floor of Building A. Showail, K. Jamshaid, and B. Shihada, "WQM: An Aggregation-aware Queue Management Scheme for IEEE n based Networks", in Proc. ACM Sigcomm Capacity Sharing Workshop (CSWS), pp , B. Shihada and K. Jamshaid, "Buffer Sizing for Balancing Throughput and Delay Requirements in Multi-hop Wireless Networks," U.S. Patent No. 8,638, A. Showail, K. Jamshaid, B. Shihada, "An Empirical Evaluation of Bufferbloat in IEEE n Wireless Networks", in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Accepted, 2014.
6 Energy Optimization in Wireless Multi-Hop Networks The objective is to minimize the energy consumption at the energycritical nodes and the overall network transmission delay 1,3. The transmission rates of energycritical nodes are adjusted according to its local packet queue size. We proved that there exists a threshold type control which is optimal 1. We implemented a decentralized algorithm to control the packets scheduling of these energy-critical nodes 2. 1 L. Xia and B. Shihada, Decentralized Transmission Scheduling in Energy-Critical Multi-Hop Wireless Networks" IEEE American Control Conference, L. Xia, B. Shihada, Max-Min Optimality of Service Rate Control in Closed Queueing Networks," IEEE Transactions on Automatic Control, Vol. 58, No. 4, pp , L. Xia, B. Shihada, and P-H. Ho, Power and Delay Optimization for Multi-Hop Wireless Networks", International Journal of Control, 2014.
7 Wireless Cognitive Radio Systems
8 CogWNet System Layers 1 1. Communication Layer 2. Decision-Making Layer (Repository and Parameter Mapper) 3. Policy Layer Application Transport Network Link Physical Requirements From CAPRI Interface ULLA Interface CCC Repository Sensory Input Form GENI Interface Configuration Sensory Input Form Configuration Shared info Command Utility Manager -KERNEL Space- Utility Registration (AAL) <<notify>> Store Flow Manager Cgwindow, Flow Type <<notify>> Store Physical Bandwidth/ Center Frequency/ delay/ BER <<notify>> Store Negotiator 2 push data 4 Push data Push data 1 -User Space- Sensory Processing <<AB. Push.data >> <<notify>> (Cross layer data) With unique identifier from each channel) (data stored from future prediction) SP 3 Action Module Data Base for Future Parameter Prediction <<Schedule Action >> <<notify>> Receive configuration parameters after Policy check AM Policy Architecture: Admin Push_data To Parameter Mapper (AB) Schedule Action From Parameter Mapper (AB) From Repository (Policy Server) Server Manager Data Base Copy of sensory data (Sensory Processing) SP2 1 (CCC) 4 Trigger Manager Detection Module Rules evaluation: <<push_data>> <<check_power>> <<Primary user signal>> <<If detected: trigger>> DM (Policy Engine) Data Base Engine Manager If detection trigger AB.pushdata Reasoner Policy Module <<PE. pushdata>> <<notify>> PM Policy Interface 3 2 TO PM Notification (Yes or No) 3 Decision Parameters from PM (AB) Action Schedule (Rep) if Policy reply is Yes Policy Query Policy Reply TM Sensory Dara (Rep) Receiver data from Repository (SP1): -Transfer sensory data to storage. -Request decision Algorithm. -Check Policy. -Schedule Action Store <<push_data>> <<Read>> Storage Parameter Mapper Reply (Config Parameters) Action Broker Algorithm Request (run) + Policy Feedback if No -Receive Running Request from AB. -Run (Algorithm) => decision Tree -Notify AB about decision (to check with policy) Parameter Mapper Decision Module 1 I. Qerm, B. Shihada, and K. Shin, "CogWnet: A Resource Management Architecture for Cognitive Radio Networks", in Proc. IEEE International Conference on Computer Communications and Networks (ICCCN), 2013.
9 Energy Efficient Cognitive Radio Utilizing Sensing Information The objective is to minimize the EPG metric subject to 1,2 : 1. Rate constraint. 2. Interference constraint. 3. Peak Power constraint. The optimal resource allocation is done while combining the soft sensing information. Soft sensing information is the knowledge we obtain about the PT before making the detection decision. We generalized the targeted scenarios into PU Exists and Absent with a certain probability 2. We proved the convexity of the problem. We utilized the calculus of variation theory to obtain an optimal and sub-optimal solutions. 1 A. AlAbbasi, Z. Rezki, and B. Shihada, "Energy Efficiency and SINR Maximization Beamformers for Spectrum Sharing with Sensing Information", IEEE Transactions on Wireless Communications, Vol. 13, No. 9, pp , A. AlAbbasi, Z. Rezki, and B. Shihada, "Energy Efficiency and SINR Maximization Beamformers for Cognitive Radio Utilizing Sensing Information", in Proc. IEEE International Symposium on Information Theory (ISIT), pp , 2014
10 Wireless Sensor Systems
11 Towards Optimal Event Detection and Localization We identify and solve the problem of Event Detection and Localization in Acyclic Flow Networks 1,2. We proved that Event Detection problem is NP hard and provide a heuristic algorithm to solve it. We presented Beacon Placement and Event Localization algorithms for Event Localization. We evaluated our algorithms in simulation. We developed a flow learning algorithm, and evaluated the algorithms on bigger graphs 1 M. Suresh, R. Stolern, E. Zechman, and B. Shihada, "On Event Detection and Localization in Acyclic Flow Networks", IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 43, No. 3, pp , M. Suresh, R. Stolern, R. Denton, E. Zechman, and B. Shihada, "Towards Optimal Event Localization in Time-Varying Acyclic Flow Networks", in Proc. International Conference on Distributed computing and Networking (ICDCN), pp , 2012.
12 Green-Frag Energy efficient scheme that combines a frame fragmentation technique with an adaptive power mechanism 1,2. Green-Frag achieves the least energy consumption in all environment situations. It is capable of selecting the best transmit power according to the channel conditions. Data CRC 12 Bytes 1 Byte Time % Normal Channel Condition Combination of Different Block Modes Bytes Bad 1m Distance between Sender and Receiver 1 A. Showail, A. El-Rasad, A. Meer, A. Daghistani, K. Jamshaid, and B. Shihada, "ifrag: Dynamic Partial Packet Recovery for Sensor Systems", ACM Journal of Wireless Networks, Vol. 20, No. 4, pp. 1-18, A. Daghistani and B. Shihada, "Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks", in Proc. IEEE International Conference on Wireless and Mobile Computing (WiMob), pp , (Received the Best Paper Award). Data 24 Bytes Block 4 25 Bytes Block 8 13 Bytes Data 48 Bytes Block 2 49 Bytes CRC 1 Byte Data 96 Bytes Block 1 97 Bytes CRC 1 Byte TailMap 1 Byte Data Frame 112 Bytes BlockMap 4 Bytes ACK Frame 6 Bytes CRC 1 Byte CRC 1 Byte Tail 14 7 Bytes 2.5m CRC 1 Byte 0 dbm 3 dbm 7 dbm 15 dbm 25 dbm
13 Smart Phone GPU
14 Energy Efficiency of Smartphone GPUs Adding GPUs to smartphones provided a big leap in the graphical experience: 3D Games, interactive and rich UI, high quality graphics applications. Smartphones resolution is rapidly increasing. Smartphone operating systems such as Android are fully hardware-accelerated. GPUs in smartphones are becoming more and more powerful by the day. Energy consumption of smartphone GPUs should be thoroughly investigated!
15 GPU Governors Total Energy Saving
16 Internet of Things: Crowdsourcing
17 What is Crowdsourcing? "The practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community rather than from traditional employees or suppliers "
18 What is Crowdsourcing? An example of crowdsourcing all know and use? It has over 17M articles written collaboratively by the community and is the most popular reference site on the internet.
19 What is Mobile CrowdSourcing? The rise of mobile devices expands Crowdsourcing to be real-time, location-based, and contextual. Mobile application users are no longer passive consumers, they can share GPS data, photos, surveys, sensor data, and much more!
20 Mobile Crowd-Sensing (MCS) Mobile Crowd-Sensing (MCS) proposes a new framework for data collection based on the power of sensors installed in smartphones, wearable devices, and sensor-equipped vehicles. Taking advantage of such sensor-enabled devices which reside at the edge of the Internet in more real life disciplines will cause an evolution in the concept of Internet of Things (IoT). MCS enables collecting massive location-based sensor data in a feasible distributed manner for monitoring a specific phenomena.
21 Successful Examples Non-profit environmental and governmental causes Crises, disasters, and emergency management Traffic, Navigation, and Transportation Management
22 And Many More...
23 Why Would People Share Information? Acquiring similar information Common good Reward system (money, phone credit...)
24 Multidisciplinary Research Data Sensing, Collection, and Streaming (Networks) Real-Time Data Analysis and Prediction (AI) Data Storage and Processing (Cloud Computing) Energy Efficiency and Awareness (Mobile Computing) Privacy, Security, and Trust Issues (Security) Architecture/Framework Design (Systems)
25 Our Project! Mobile Crowd-Sensing for Real-Time Mass Pedestrian Monitoring and Hot-Spot Detection Managing crowds in large-scale mass gatherings can be a very critical and challenging task. History have shown, failing to manage pedestrian crowds could lead to injuries and even lost lifes.
26 Previous Solutions Computer vision techniques Stationary sensors Drawbacks: 1. Limited node coverage. 2. Inability to scale to reach every part of the crowd. 3. The need pre-hand deployment, which is not efficient in the case of emergencies and evacuations. 4. High deployment and maintenance cost. 5. Provide no interactivity with the crowds in terms of offering real-time instructions or guidelines.
27 Proposed Solution Why not using the crowd themselves in monitoring? We use opportunistic mobile crowd sensing to collect information from within the crowds in a distributed manner using the crowds themselves as mobile nodes in a spatialtemporal dynamic network.
28 Proposed Solution Rather than aiming to have a precise density estimation, this project monitors the environmental conditions and surrounding of crowds, such as humidity, temperature, CO 2 emission, speed of movement, and noise, to infer the crowd level and predict any future incident.
29 Proposed Solution Our incentive for participatory sensing: The framework will perform a full circle by providing a heat map and real-time location based recommendations for participants to show less crowded areas, shortest path to reach there, and the best time to perform a certain task when there are the least crowd.
30 Methodology: Mobile Application We developed Ssense 1.0 * an android application that logs the following information every defined interval: Time, Air Pressure, Temperature, Relative Humidity, Absolute Humidity, Longitude, Latitude, Speed, GPSAccuracy, BatteryLevel * Ssense v1.0, free BSD license,
31 Methodology: Mobile Application Obtaining Ground Truth: For data collection purposes, one of three crowd levels should be dynamically chosen on every change based on the Jacob's method. An illustration is provided for volunteers to help in visualizing.
32 Methodology: Data Collection Test Case: Al Mataf- Makkah
33 Methodology: Humidity factor Out of all measured features only two were chosen that showed significant deviation from the context: Humidity and Temperature
34 Methodology: Temprature Factor Out of all measured features only two were chosen that showed significant deviation from the context: Humidity and Temperature
35 Methodology: Spatial-Temporal Modeling Our problem changes over both Time and Space. We model the crowd nodes as a spatial temporal-network where topology and attributes change over time. We model the temporal dependency in each node using first order hidden Markov model (HMM). We train the HMM to use the transition probability between different crowd levels, and the emission probability of the observed data to predict a hotspot of an overcrowd. We model the spatial dependency between nodes using Markov Random Fields (MRFs) to represent the relations between adjacent nodes. Combining both models would generate a full spatial-temporal detection framework.
36 Methodology: Temporal Dependency Modeling & Detection The problem is modeled as HMM to detect the temporal dependence in each sensor reading and detect the crowds hidden state: Hidden states = {Normal CORWD, MEDIUM CROWD, OVERCROWDED} Observation 1 (Humidity Deviation)={High, Medium, Low} Observation 2 (Temperature Deviation)={High, Low} * Assume that the two observations (Humidity and Temperature) are conditionally independent given the crowd state:
37 Methodology: HMM Supervised learning To learn the parameter of the HMM transition, emission, and initial matrices, we trained the HMM using supervised learning which uses Maximum- Likelihood Estimation (MLE).
38 Methodology: HMM Supervised learning
39 Methodology: HMM State Prediction No available tool support HMM with multiple observation variable. Therefore, we modified HMMLearn library of SciKit to support HMM models of two observation variables. When a hotspot is detected, the GPS coordinates of that node is retrieved to get the exact location of the overcrowded incident. Appropriate measures can then be taken according to the congestion location.
40 Spatial Dependency Modeling & Detection (MRF) Split targeted area into a grid of patches, each patch would represent a node in a network. When a temporal event is detected in one patch, adjacent patches in the same clique are checked before declaring a spatial-temporal event to eliminate noise, sensor errors, and outliers.
41 Future Work Building a cloud server for processing and storing the sensing data, thus taking advantage of the cloud infrastructure for our online data analysis. Include participatory sensing as well the opportunistic, where users can upload images and related information, such as how much time it took them to stand in a queue or to perform a certain task to further more identify the rush hours and pedestrian patterns. Generate real time heat maps and recommendations provided to users depending on their current location.
42 Thanks!
WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System
WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More information5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015
5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationWireless Sensor Networks CS742
Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 Ouline 1. WS(A)Ns Introduction 2. Applications 3. Energy Efficiency Section
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationNSF-RCN Workshop #2 Panel 2
NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless
More informationNetworking Cyber-physical Applications in a Data-centric World
Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationOn User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning
UNIVERSITY OF CRETE On User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning Michalis Katsarakis, Maria Plakia, Paul Charonyktakis & Maria Papadopouli University of Crete Foundation
More informationSRA A Strategic Research Agenda for Future Network Technologies
SRA A Strategic Research Agenda for Future Network Technologies Rahim Tafazolli,University of Surrey ETSI Future Network Technologies ARCHITECTURE 26th 27th Sep 2011 Sophia Antipolis, France Background
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationReliable Stream Analysis on the Internet of Things
Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live
More informationCache and Forward Architecture
Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless
More informationDistributed Sensing for Spectrum Agility: Incentives and Security Considerations
Distributed Sensing for Spectrum Agility: Incentives and Security Considerations S. Arkoulis, P. Frangoudis, G. Marias, G. Polyzos Athens University of Economics and Business {arkoulistam,pfrag,marias,polyzos}@aueb.gr
More informationMobile Millennium Using Smartphones as Traffic Sensors
Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology
More informationA SDN Approach to Spectrum Brokerage in Infrastructure-based Cognitive Radio Networks
A SDN Approach to Spectrum Brokerage in Infrastructure-based Cognitive Radio Networks Anatolij Zubow Jointly with Michael Döring, Mikolaj Chwalisz and Adam Wolisz Technical University Berlin, Germany Outline
More informationITEE Journal. Information Technology & Electrical Engineering
An Overview of QoE for 5G Networks 1 Hajra Masood, 2 Safdar Rizvi, 3 Bilal Muhammad Iqbal Department of Computer Sciences, Bahria University, Karachi, Pakistan E-mail: 1 Hajra.cs@gmail.com, 2 dr.safdar@bimcs.edu.pk,
More informationDeployable Communication Systems and IoT for Public Safety. Professor Kamesh Namuduri Electrical Engineering, University of North Texas
Deployable Communication Systems and IoT for Public Safety Professor Kamesh Namuduri Electrical Engineering, University of North Texas Outline Introduction building blocks for public-safety and challenges
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationAn Introduction to Cyber-Physical Systems INF5910/INF9910
An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More
More informationNovember, Qualcomm s 5G vision Qualcomm Technologies, Inc. and/or its affiliates.
November, 2014 Qualcomm s 5G vision 1 Mobile is the largest technology platform in history ~7 billion connections, almost as many as people on earth 1 Evolving into Internet of Everything: cars, meters,
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationPart I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis
Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,
More informationContext-Aware Network Stack Optimization
Context-Aware Network Stack Optimization Olivier Mehani 1,2 Roksana Boreli 2 Thierry Ernst 1 1 Institut National de Rercherche en Informatique et Automatique Équipe-projet Imara name.surname@inria.fr 2
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationWireless Challenges and Resolutions
Wireless Challenges and Resolutions 1 Steven Shelton Senior Network Engineer Oak Ridge National Laboratory Oak Ridge, Tennessee ows@ornl.gov 2 Wireless Challenges and Resolutions Sections Common Problems
More informationAPPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology
APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively
More informationUSE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES
5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS
More informationUsing Operator Interfaces to Optimize Performance of Industrial Wireless Networks
Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks Jim Ralston, Wireless Sales Engineer ProSoft Technology, August 2007 Abstract The performance of wireless networks can
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationResource Allocation Algorithms Design for 5G Wireless Networks
Resource Allocation Algorithms Design for 5G Wireless Networks Vincent Wong Department of Electrical and Computer Engineering The University of British Columbia November 5, 2016 0 5G Overview User Data
More informationNTT DOCOMO s Views on 5G
NTT DOCOMO s Views on 5G NTT DOCOMO, INC. NTT DOCOMO, INC., Copyright 2014, All rights reserved. 1 Network/Communication Society in 2020 and Beyond Everything Connected by Wireless Monitor/collect information
More informationDesign and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005
Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationREAL TIME PUBLIC TRANSPORT INFORMATION SERVICE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.88
More informationEnergy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks
Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,
More informationFog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016
Fog Computing ICTN6875: Emerging Technology Billy Short 7/20/2016 Abstract During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies.
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationOverview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story
Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage
More informationDistributed Pervasive Systems
Distributed Pervasive Systems CS677 Guest Lecture Tian Guo Lecture 26, page 1 Outline Distributed Pervasive Systems Popular Application domains Sensor nodes and networks Energy in Distributed Systems (Green
More informationImproving the latency of Hand-offs using Sentinel based Architecture
Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationThe challenges, opportunities and setting the framework for 5G EMF and Health
The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management
More informationWhite Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017
White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of
More informationCellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network
ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment
More informationA Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data
A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,
More informationOptimization on TEEN routing protocol in cognitive wireless sensor network
Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong
More informationGreen Partial Packet Recovery in Wireless Sensor Networks
1 Green Partial Packet Recovery in Wireless Sensor Networks Anas Daghistani, Abderrahman Ben Khalifa +, Ahmad Showail, and Basem Shihada CEMSE Division, King Abdullah University of Science and Technology
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationNetwork Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director
Network Vision: Preparing Telefónica for the next generation of services Enrique Blanco Systems and Network Global Director 19.09.2017 Mobile Access Vision Increasing 4G coverage, features and network
More informationDouble-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs
Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work
More informationVertical Handover in Vehicular Ad-hoc Networks A Survey
Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc
More informationComparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation
Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Paramvir Kaur * Sukhwinder Sharma # * M.Tech in CSE with specializationl in E-Security, BBSBEC,Fatehgarh sahib,
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationT. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Routing Protocol for Heterogeneous Wireless Mesh
More informationFrom heterogeneous wireless networks to sustainable efficient ICT infrastructures: How antenna and propagation simulation tools can help?
From heterogeneous wireless networks to sustainable efficient ICT infrastructures: How antenna and propagation simulation tools can help? Yves Lostanlen SIRADEL April 9 th 2013, Gothenburg, Sweden EUCAP
More informationScheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network
International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationBusiness Case for the Cisco ASR 5500 Mobile Multimedia Core Solution
Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationPRISM: Platform for Remote Sensing using Smartphones
PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA
More informationPervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems
Pervasive Computing Institute of Networked and Embedded Systems OpenLab 2010 Jan 14 04pm L4.1.01 MISSION STATEMENT Founded in 2007, the Pervasive Computing Group at Klagenfurt University is part of the
More informationRoute and Spectrum Selection in Dynamic Spectrum Networks
Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationAccelerating Innovation and Collaboration for the Next Stage
Accelerating Innovation and Collaboration for the Next Stage November 8, 2013 Smart Life & Smart Work in the Next Stage - ICT as an Enabler Transportation Intelligent Transportation Systems, Quick Charging
More informationDisruptive Innovation Demonstrating WiFi3 vs ac
Edgewater Wireless February 2016 Disruptive Innovation Demonstrating WiFi3 vs 802.11ac Solving WiFi interference & capacity issues just got easier with 3 channels on a single radio WiFi3 technology. It
More informationAn efficient trigger to improve intra-wifi handover performance
An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationWHITE PAPER. LTE in Mining. Will it provide the predictability, capacity and speed you need for your mine?
WHITE PAPER LTE in Mining Will it provide the predictability, capacity and speed you need for your mine? Table of Contents I. Executive Overview 3 II. Methods of LTE Deployment Today 4 III. Availability
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationFunded Project Final Survey Report
Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a
More informationHoover 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019
Hoover IP2 @Stanford 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019 The views and opinions expressed in this presentation are those of the
More informationRunning Reports. Choosing a Report CHAPTER
13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationAnalysis Range-Free Node Location Algorithm in WSN
International Conference on Education, Management and Computer Science (ICEMC 2016) Analysis Range-Free Node Location Algorithm in WSN Xiaojun Liu1, a and Jianyu Wang1 1 School of Transportation Huanggang
More informationAn Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934
More informationConverged Access: Wireless AP and RF
This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationPerformance Evaluation of Bluetooth Low Energy Communication
SCITECH Volume 7, Issue 2 RESEARCH ORGANISATION April 28, 2018 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Performance Evaluation of Bluetooth Low Energy
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationAd Hoc Networks - Applications and System Design
Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,
More informationMobile Edge Computing for 5G: The Communication Perspective
Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng
More informationWi-Fi 6 What s It All About?
WHITE PAPER Wi-Fi 6 What s It All About? By Cees Links, GM of Qorvo Wireless Connectivity Business Unit Formerly Founder & CEO of GreenPeak Technologies Is Wi-Fi Running Out of Steam? Despite that nobody
More informationDr. Evaldas Stankevičius, Regulatory and Security Expert.
2018-08-23 Dr. Evaldas Stankevičius, Regulatory and Security Expert Email: evaldas.stankevicius@tele2.com 1G: purely analog system. 2G: voice and SMS. 3G: packet switching communication. 4G: enhanced mobile
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More information