Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7133996
Manisha Mukherjee, J. Edwards, H. Kwon, T. L. Porta
In this paper we present a framework for Quality of Information (QoI)-aware networking. QoI quantifies how useful a piece of information is for a given query or application. Herein, we present a general QoI model, as well as a specific example instantiation that carries throughout the rest of the paper. In this model, we focus on the tradeoffs between precision and accuracy. As a motivating example, we look at traffic video analysis. We present simple algorithms for deriving various traffic metrics from video, such as vehicle count and average speed. We implement these algorithms both on a desktop workstation and less-capable mobile device. We then show how QoI-awareness enables end devices to make intelligent decisions about how to process queries and form responses, such that huge bandwidth savings are realized.
{"title":"Quality of information-aware real-time traffic flow analysis and reporting","authors":"Manisha Mukherjee, J. Edwards, H. Kwon, T. L. Porta","doi":"10.1109/PERCOMW.2015.7133996","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7133996","url":null,"abstract":"In this paper we present a framework for Quality of Information (QoI)-aware networking. QoI quantifies how useful a piece of information is for a given query or application. Herein, we present a general QoI model, as well as a specific example instantiation that carries throughout the rest of the paper. In this model, we focus on the tradeoffs between precision and accuracy. As a motivating example, we look at traffic video analysis. We present simple algorithms for deriving various traffic metrics from video, such as vehicle count and average speed. We implement these algorithms both on a desktop workstation and less-capable mobile device. We then show how QoI-awareness enables end devices to make intelligent decisions about how to process queries and form responses, such that huge bandwidth savings are realized.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"225 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134002
Mohammad Aazam, E. Huh
Lately, pervasive and ubiquitous computing services have been under focus of not only the research community, but developers as well. Different devices generate different types of data with different frequencies. Emergency, healthcare, and latency sensitive services require real-time response. Also, it is necessary to decide what type of data is to be uploaded in the cloud, without burdening the core network and the cloud. For this purpose, Fog computing plays an important role. Fog resides between underlying IoTs and the cloud. Its purpose is to manage resources, perform data filtration, preprocessing, and security measures. For this purpose, Fog requires an effective and efficient resource management framework, which we provide in this paper. Moreover, since Fog has to deal with mobile nodes and IoTs, which involves objects and devices of different types, having a fluctuating connectivity behavior. All such types of service customers have an unpredictable relinquish probability, since any object or device can quit resource utilization at any moment. In our proposed methodology for resource estimation and management, we have taken into account these factors and formulate resource management on the basis of fluctuating relinquish probability of the customer, service type, service price, and variance of the relinquish probability. Implementation of our system was done using Java, while evaluation was done on CloudSim toolkit. The discussion and results show that these factors can help service provider estimate the right amount of resources, according to each type of service customers.
{"title":"Dynamic resource provisioning through Fog micro datacenter","authors":"Mohammad Aazam, E. Huh","doi":"10.1109/PERCOMW.2015.7134002","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134002","url":null,"abstract":"Lately, pervasive and ubiquitous computing services have been under focus of not only the research community, but developers as well. Different devices generate different types of data with different frequencies. Emergency, healthcare, and latency sensitive services require real-time response. Also, it is necessary to decide what type of data is to be uploaded in the cloud, without burdening the core network and the cloud. For this purpose, Fog computing plays an important role. Fog resides between underlying IoTs and the cloud. Its purpose is to manage resources, perform data filtration, preprocessing, and security measures. For this purpose, Fog requires an effective and efficient resource management framework, which we provide in this paper. Moreover, since Fog has to deal with mobile nodes and IoTs, which involves objects and devices of different types, having a fluctuating connectivity behavior. All such types of service customers have an unpredictable relinquish probability, since any object or device can quit resource utilization at any moment. In our proposed methodology for resource estimation and management, we have taken into account these factors and formulate resource management on the basis of fluctuating relinquish probability of the customer, service type, service price, and variance of the relinquish probability. Implementation of our system was done using Java, while evaluation was done on CloudSim toolkit. The discussion and results show that these factors can help service provider estimate the right amount of resources, according to each type of service customers.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134085
T. Pfeiffenberger, P. Dorfinger, Ferdinand von Tüllenburg
Broad band communication in international disaster response actions is becoming more and more important. The information exchange between field commanders and tactical commanders lead to a better situational awareness on all layers of disaster management. After large scale disasters the communication infrastructure is often destroyed. Setting up a communication infrastructure is essential in todays disaster response actions. As organizations in disaster response actions are not consisting of IT experts, the setup and installation has to be easy. For example [1] presents such a system. Furthermore the knowledge where to deploy wireless communication gateways and wireless relay nodes is essential. Consequently the positions of field commanders can not only be based on tactical needs but also on communication needs. In this paper we present a simulation based visualization tool which helps to evaluate deployment locations for communication equipment to achieve adequate communication coverage with respect to specific disaster related information. This allows an optimal positioning of relay nodes and field commanders in the field to ensure broad band communication in disaster response actions and thus faster help for the people.
{"title":"Communication coverage awareness for self-aligning wireless communication in disaster operations","authors":"T. Pfeiffenberger, P. Dorfinger, Ferdinand von Tüllenburg","doi":"10.1109/PERCOMW.2015.7134085","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134085","url":null,"abstract":"Broad band communication in international disaster response actions is becoming more and more important. The information exchange between field commanders and tactical commanders lead to a better situational awareness on all layers of disaster management. After large scale disasters the communication infrastructure is often destroyed. Setting up a communication infrastructure is essential in todays disaster response actions. As organizations in disaster response actions are not consisting of IT experts, the setup and installation has to be easy. For example [1] presents such a system. Furthermore the knowledge where to deploy wireless communication gateways and wireless relay nodes is essential. Consequently the positions of field commanders can not only be based on tactical needs but also on communication needs. In this paper we present a simulation based visualization tool which helps to evaluate deployment locations for communication equipment to achieve adequate communication coverage with respect to specific disaster related information. This allows an optimal positioning of relay nodes and field commanders in the field to ensure broad band communication in disaster response actions and thus faster help for the people.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131694215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134100
H. Kalantarian, N. Alshurafa, M. Pourhomayoun, M. Sarrafzadeh
In recent years, several wearable devices have been proposed for monitoring nutrition intake, tracking energy expenditure, and performing activity recognition. Long device lifetimes are critical because frequent battery replacements increase user burden and yield poor long-term compliance rates. Though countless wearable devices have been proposed in recent years with varying sensors and applications, most system flows are generalizable in terms of their major components: sampling, buffering, processing, and transmission. In this paper, we discuss and evaluate energy-efficiency optimizations for wearable devices, using the NIMON nutrition-monitoring necklace as a case study.
{"title":"Power optimization for wearable devices","authors":"H. Kalantarian, N. Alshurafa, M. Pourhomayoun, M. Sarrafzadeh","doi":"10.1109/PERCOMW.2015.7134100","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134100","url":null,"abstract":"In recent years, several wearable devices have been proposed for monitoring nutrition intake, tracking energy expenditure, and performing activity recognition. Long device lifetimes are critical because frequent battery replacements increase user burden and yield poor long-term compliance rates. Though countless wearable devices have been proposed in recent years with varying sensors and applications, most system flows are generalizable in terms of their major components: sampling, buffering, processing, and transmission. In this paper, we discuss and evaluate energy-efficiency optimizations for wearable devices, using the NIMON nutrition-monitoring necklace as a case study.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134104
M. Shoaib, S. Bosch, H. Scholten, P. Havinga, Özlem Durmaz Incel
Recently, there has been a growing interest in the research community about using wrist-worn devices, such as smartwatches for human activity recognition, since these devices are equipped with various sensors such as an accelerometer and a gyroscope. Similarly, smartphones are already being used for activity recognition. In this paper, we study the fusion of a wrist-worn device (smartwatch) and a smartphone for human activity recognition. We evaluate these two devices for their strengths and weaknesses in recognizing various daily physical activities. We use three classifiers to recognize 13 different activities, such as smoking, eating, typing, writing, drinking coffee, giving a talk, walking, jogging, biking, walking upstairs, walking downstairs, sitting, and standing. Some complex activities, such as smoking, eating, drinking coffee, giving a talk, writing, and typing cannot be recognized with a smartphone in the pocket position alone. We show that the combination of a smartwatch and a smartphone recognizes such activities with a reasonable accuracy. The recognition of such complex activities can enable well-being applications for detecting bad habits, such as smoking, missing a meal, and drinking too much coffee. We also show how to fuse information from these devices in an energy-efficient way by using low sampling rates. We make our dataset publicly available in order to make our work reproducible.
{"title":"Towards detection of bad habits by fusing smartphone and smartwatch sensors","authors":"M. Shoaib, S. Bosch, H. Scholten, P. Havinga, Özlem Durmaz Incel","doi":"10.1109/PERCOMW.2015.7134104","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134104","url":null,"abstract":"Recently, there has been a growing interest in the research community about using wrist-worn devices, such as smartwatches for human activity recognition, since these devices are equipped with various sensors such as an accelerometer and a gyroscope. Similarly, smartphones are already being used for activity recognition. In this paper, we study the fusion of a wrist-worn device (smartwatch) and a smartphone for human activity recognition. We evaluate these two devices for their strengths and weaknesses in recognizing various daily physical activities. We use three classifiers to recognize 13 different activities, such as smoking, eating, typing, writing, drinking coffee, giving a talk, walking, jogging, biking, walking upstairs, walking downstairs, sitting, and standing. Some complex activities, such as smoking, eating, drinking coffee, giving a talk, writing, and typing cannot be recognized with a smartphone in the pocket position alone. We show that the combination of a smartwatch and a smartphone recognizes such activities with a reasonable accuracy. The recognition of such complex activities can enable well-being applications for detecting bad habits, such as smoking, missing a meal, and drinking too much coffee. We also show how to fuse information from these devices in an energy-efficient way by using low sampling rates. We make our dataset publicly available in order to make our work reproducible.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133302423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134020
Venkat Srinivasan, T. Kalbarczyk, Christine Julien
In this demonstration, we showcase Disseminate, a protocol and accompanying Android application for supporting device-to-device dissemination of data that fulfills shared interests of devices in pervasive computing environments. Disseminate is a novel publish-subscribe based protocol that breaks large (likely media heavy) data items into smaller chunks and opportunistically shares the chunks among co-located mobile devices. Interested devices issue subscriptions for the chunks they need and advertisements for the chunks they can share. Our publish mechanism uses a computation of a chunk's uniqueness to determine whether or not to broadcast it to the locally connected devices. The Disseminate app provides an implementation of the protocol in an Android application for sharing photographs via WiFi-Direct broadcast communication.
{"title":"Demo abstract disseminate: A demonstration of device-to-device media dissemination","authors":"Venkat Srinivasan, T. Kalbarczyk, Christine Julien","doi":"10.1109/PERCOMW.2015.7134020","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134020","url":null,"abstract":"In this demonstration, we showcase Disseminate, a protocol and accompanying Android application for supporting device-to-device dissemination of data that fulfills shared interests of devices in pervasive computing environments. Disseminate is a novel publish-subscribe based protocol that breaks large (likely media heavy) data items into smaller chunks and opportunistically shares the chunks among co-located mobile devices. Interested devices issue subscriptions for the chunks they need and advertisements for the chunks they can share. Our publish mechanism uses a computation of a chunk's uniqueness to determine whether or not to broadcast it to the locally connected devices. The Disseminate app provides an implementation of the protocol in an Android application for sharing photographs via WiFi-Direct broadcast communication.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134024
Md Abdullah Al Hafiz Khan, Sheung Lu, Nirmalya Roy, Nilavra Pathak
Acoustic sensing has influenced many applications in green building energy management, such as designing multi-modal energy disaggregation algorithms through fine-grained appliance state identifications or efficiently controlling the HVAC system based on the occupancy of the environment. In this demo paper we build a low-cost system prototype using off-the-shelf commercially available hardware (Raspberry Pi and super high gain microphone) to handle both acoustic sensing and its processing that is portable and easily deployable in any indoor environment. Our system is useful in detecting appliance noise for fine-grained energy metering and human voice for managing building energy footprint. We use the decibel strength of the sound to determine if it should be filtered out as a silence or stored in as an audio of interest. A fast fourier transform that quickly converts the sinusoidal input of the audio signals into its associated frequencies is implemented along with the Mel-Frequency Cepstral Coefficients (MFCCs) feature to distinguish between a human voice and an appliance noise. We also implement all the computations on-chip to quantify the energy-delay benefits.
{"title":"Demo abstract: A microphone sensor based system for green building applications","authors":"Md Abdullah Al Hafiz Khan, Sheung Lu, Nirmalya Roy, Nilavra Pathak","doi":"10.1109/PERCOMW.2015.7134024","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134024","url":null,"abstract":"Acoustic sensing has influenced many applications in green building energy management, such as designing multi-modal energy disaggregation algorithms through fine-grained appliance state identifications or efficiently controlling the HVAC system based on the occupancy of the environment. In this demo paper we build a low-cost system prototype using off-the-shelf commercially available hardware (Raspberry Pi and super high gain microphone) to handle both acoustic sensing and its processing that is portable and easily deployable in any indoor environment. Our system is useful in detecting appliance noise for fine-grained energy metering and human voice for managing building energy footprint. We use the decibel strength of the sound to determine if it should be filtered out as a silence or stored in as an audio of interest. A fast fourier transform that quickly converts the sinusoidal input of the audio signals into its associated frequencies is implemented along with the Mel-Frequency Cepstral Coefficients (MFCCs) feature to distinguish between a human voice and an appliance noise. We also implement all the computations on-chip to quantify the energy-delay benefits.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133429902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134083
M. Dash, Kee Kiat Koo, J. Gomes, S. Krishnaswamy, Daniel Rugeles, A. Nash
As technology to connect people across the world is advancing, there should be corresponding advancement in taking advantage of data that is generated out of such connection. To that end, next place prediction is an important problem for mobility data. In this paper we propose several models using dynamic Bayesian network (DBN). Idea behind development of these models come from typical daily mobility patterns a user have. Three features (location, day of the week (DoW), and time of the day (ToD)) and their combinations are used to develop these models. Knowing that not all models work well for all situations, we developed three combined models using least entropy, highest probability and ensemble. Extensive performance study is conducted to compare these models over two different mobility data sets: a CDR data and Nokia mobile data which is based on GPS. Results show that least entropy and highest probability DBNs perform the best.
{"title":"Next place prediction by understanding mobility patterns","authors":"M. Dash, Kee Kiat Koo, J. Gomes, S. Krishnaswamy, Daniel Rugeles, A. Nash","doi":"10.1109/PERCOMW.2015.7134083","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134083","url":null,"abstract":"As technology to connect people across the world is advancing, there should be corresponding advancement in taking advantage of data that is generated out of such connection. To that end, next place prediction is an important problem for mobility data. In this paper we propose several models using dynamic Bayesian network (DBN). Idea behind development of these models come from typical daily mobility patterns a user have. Three features (location, day of the week (DoW), and time of the day (ToD)) and their combinations are used to develop these models. Knowing that not all models work well for all situations, we developed three combined models using least entropy, highest probability and ensemble. Extensive performance study is conducted to compare these models over two different mobility data sets: a CDR data and Nokia mobile data which is based on GPS. Results show that least entropy and highest probability DBNs perform the best.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134007
Torsten Teubler, H. Hellbrück
Regarding service oriented architectures various tool chains evolved in the last decades. However, in terms of content-centric approaches tools and middleware are in an early stage. Especially tool support for name-centric services in future heterogeneous networks is not available. Future networks will cover future Internet, wireless sensor networks, mobile and ubiquitous applications. Existing content-centric networking provides powerful, flexible, but heavyweight APIs to the developers but does not cover middleware and tool chains for services. Therefore, we implement a solution for application development with name-centric services based on an existing content-centric networking protocol. We design a lightweight service description based on JSON which is short and can be easily understood. We implement a complete tool chain for automatic code generation for server and client applications. We demonstrate the workflow, the convenience for the application developer and the effectiveness of our approach in a convincing application example. A first evaluation of the code generation reveals a prediction of logical lines of code and illustrates the complexity of the problem that is now solved automatically. Our approach is proven to simplify and advance the application development process for name-centric services.
{"title":"Tool chain for application development with name-centric services","authors":"Torsten Teubler, H. Hellbrück","doi":"10.1109/PERCOMW.2015.7134007","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134007","url":null,"abstract":"Regarding service oriented architectures various tool chains evolved in the last decades. However, in terms of content-centric approaches tools and middleware are in an early stage. Especially tool support for name-centric services in future heterogeneous networks is not available. Future networks will cover future Internet, wireless sensor networks, mobile and ubiquitous applications. Existing content-centric networking provides powerful, flexible, but heavyweight APIs to the developers but does not cover middleware and tool chains for services. Therefore, we implement a solution for application development with name-centric services based on an existing content-centric networking protocol. We design a lightweight service description based on JSON which is short and can be easily understood. We implement a complete tool chain for automatic code generation for server and client applications. We demonstrate the workflow, the convenience for the application developer and the effectiveness of our approach in a convincing application example. A first evaluation of the code generation reveals a prediction of logical lines of code and illustrates the complexity of the problem that is now solved automatically. Our approach is proven to simplify and advance the application development process for name-centric services.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-23DOI: 10.1109/PERCOMW.2015.7134088
András Kokuti
This paper proposes an emergency support system (ESS) with two novel algorithms, a path finding algorithm to guide evacuees during an emergency, and a communication protocol to make the opportunistic communications (oppcoms) more effective (when observing the unnecessarily sent messages). The oppcoms uses low-cost wearable mobile nodes (i.e. smart phones) that can exchange packets at close range without help of an infrastructure. Both algorithms are based on the same idea: always to maintain the direction from hazardous areas to fire exits. The main goal of the ESS is to guide evacuees in a built environment such as in a shopping centre where fire is spreading. Our support system is evaluated with the DBES (Distributed Building Evacuation Simulator) and multiple simulations have been performed with this tool using different parameters. The results show that the enhanced emergency evacuation system can offer significant improvements for the evacuees and can achieve better results when the number of duplications is taken into account.
{"title":"Emergency support system with directional extensions","authors":"András Kokuti","doi":"10.1109/PERCOMW.2015.7134088","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134088","url":null,"abstract":"This paper proposes an emergency support system (ESS) with two novel algorithms, a path finding algorithm to guide evacuees during an emergency, and a communication protocol to make the opportunistic communications (oppcoms) more effective (when observing the unnecessarily sent messages). The oppcoms uses low-cost wearable mobile nodes (i.e. smart phones) that can exchange packets at close range without help of an infrastructure. Both algorithms are based on the same idea: always to maintain the direction from hazardous areas to fire exits. The main goal of the ESS is to guide evacuees in a built environment such as in a shopping centre where fire is spreading. Our support system is evaluated with the DBES (Distributed Building Evacuation Simulator) and multiple simulations have been performed with this tool using different parameters. The results show that the enhanced emergency evacuation system can offer significant improvements for the evacuees and can achieve better results when the number of duplications is taken into account.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}