Vehicular ad hoc networks, as a special case of delay tolerant networks, have become increasingly attractive to academia and industry. Different from most of the work in this field, which has focused on short periods of transient opportunistic contacts, in our previous work, we have analyzed the position data of a large set of urban private vehicles in Changsha, China and proposed a Location based Urban Vehicular network (LUV) utilizing the stable connections among vehicles. Place serves as a central message exchange and routing component in LUV that is critical in providing relatively reliable network connections. In this paper, we present a simple threshold based approach for identifying the places or vehicle aggregation areas, in an urban environment. We perform experimental study over a real set of data gathered over three months for 8900 vehicles and show the method is effective.
{"title":"Place Identification in Location Based Urban VANETs","authors":"Heng Li, Yonghe Liu, Yi Sun, Ruiyun Yu","doi":"10.1109/MASS.2015.106","DOIUrl":"https://doi.org/10.1109/MASS.2015.106","url":null,"abstract":"Vehicular ad hoc networks, as a special case of delay tolerant networks, have become increasingly attractive to academia and industry. Different from most of the work in this field, which has focused on short periods of transient opportunistic contacts, in our previous work, we have analyzed the position data of a large set of urban private vehicles in Changsha, China and proposed a Location based Urban Vehicular network (LUV) utilizing the stable connections among vehicles. Place serves as a central message exchange and routing component in LUV that is critical in providing relatively reliable network connections. In this paper, we present a simple threshold based approach for identifying the places or vehicle aggregation areas, in an urban environment. We perform experimental study over a real set of data gathered over three months for 8900 vehicles and show the method is effective.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we study the link scheduling problem in wireless cooperative communication networks, in which receivers are allowed to combine copies of a message from different senders to combat fading. We formulate a problem called cooperative link scheduling problem (CLS), which aims to find a schedule of links that uses the minimum number of time slots to inform all the receivers. As a solution, we propose an algorithm for CLS with g(K) approximation ratio, where g(K) is so called diversity of key links. Simulation results indicate that our cooperative link scheduling approaches outperform noncooperative ones.
{"title":"Link Scheduling in Wireless Cooperative Communication Networks","authors":"Chenxi Qiu, Haiying Shen","doi":"10.1109/MASS.2015.75","DOIUrl":"https://doi.org/10.1109/MASS.2015.75","url":null,"abstract":"In this paper, we study the link scheduling problem in wireless cooperative communication networks, in which receivers are allowed to combine copies of a message from different senders to combat fading. We formulate a problem called cooperative link scheduling problem (CLS), which aims to find a schedule of links that uses the minimum number of time slots to inform all the receivers. As a solution, we propose an algorithm for CLS with g(K) approximation ratio, where g(K) is so called diversity of key links. Simulation results indicate that our cooperative link scheduling approaches outperform noncooperative ones.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Zhou, Yuanchao Shu, Peng Cheng, Zhiguo Shi, Jiming Chen
In this demo, we propose Phone meter which leverages the RF energy harvesting technologies to measure the strength of Electromagnetic Field (EMF). To this end, Phone meter combines EMF sensor with the smartphone through audio interface without any modifications to the phone. We fully implement the low-cost Phone meter and conduct extensive experiments to prove the functionality of Phone meter. Phone meter achieves about 13:7% relative error in average compared with the industrial-grade spectrum analyzer with significantly reduced the costs.
{"title":"Phonemeter: Bringing EMF Detection to Smartphones","authors":"Yang Zhou, Yuanchao Shu, Peng Cheng, Zhiguo Shi, Jiming Chen","doi":"10.1109/MASS.2015.82","DOIUrl":"https://doi.org/10.1109/MASS.2015.82","url":null,"abstract":"In this demo, we propose Phone meter which leverages the RF energy harvesting technologies to measure the strength of Electromagnetic Field (EMF). To this end, Phone meter combines EMF sensor with the smartphone through audio interface without any modifications to the phone. We fully implement the low-cost Phone meter and conduct extensive experiments to prove the functionality of Phone meter. Phone meter achieves about 13:7% relative error in average compared with the industrial-grade spectrum analyzer with significantly reduced the costs.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boutheina Dab, Ilhem Fajjari, N. Aitsaadi, A. Mellouk
To this day, Cloud computing continues its explosive growth. Nevertheless, with the exceptional evolution of demands, data centers are suffering from congestion problems. To deal with these resource limitations, first, we put forward a novel Hybrid Data Center Network (HDCN) Architecture enabling high throughput wireless (IEEE 802.11 ad) and wired (IEEE 802.3) transmissions. Secondly, we propose a new resource allocation algorithm based on Graph Coloring in HDCN denoted by GC-HDCN. The main objective is to maximize the throughput of intra-HDCN communication requests over the wireless and/or wired infrastructure. The problem is formulated as minimum graph coloring which is NP-Hard. GC-HDCN makes use of i) column generation and ii) branch and price optimization schemes to resolve the assignment of wireless channels. Based on extensive simulations with Qual Net simulator considering all the layers of the protocol stack, the results obtained show that our proposal GC-HDCN outperforms the related prominent strategies in terms of i) end-to-end delay, ii) throughput and iii) spectrum spatial reuse.
{"title":"A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks","authors":"Boutheina Dab, Ilhem Fajjari, N. Aitsaadi, A. Mellouk","doi":"10.1109/MASS.2015.19","DOIUrl":"https://doi.org/10.1109/MASS.2015.19","url":null,"abstract":"To this day, Cloud computing continues its explosive growth. Nevertheless, with the exceptional evolution of demands, data centers are suffering from congestion problems. To deal with these resource limitations, first, we put forward a novel Hybrid Data Center Network (HDCN) Architecture enabling high throughput wireless (IEEE 802.11 ad) and wired (IEEE 802.3) transmissions. Secondly, we propose a new resource allocation algorithm based on Graph Coloring in HDCN denoted by GC-HDCN. The main objective is to maximize the throughput of intra-HDCN communication requests over the wireless and/or wired infrastructure. The problem is formulated as minimum graph coloring which is NP-Hard. GC-HDCN makes use of i) column generation and ii) branch and price optimization schemes to resolve the assignment of wireless channels. Based on extensive simulations with Qual Net simulator considering all the layers of the protocol stack, the results obtained show that our proposal GC-HDCN outperforms the related prominent strategies in terms of i) end-to-end delay, ii) throughput and iii) spectrum spatial reuse.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we mainly investigate capacity scaling laws of the mobile ad hoc social networks (MAHSNs)where social networking applications are implemented over the underlying mobile ad hoc networks. We model the real-world mobility pattern of mobile social users by introducing a clustered model that defines two levels of mobility, i.e., Strong mobility and weak mobility, according to the impacts of mobility on the gain of network capacity. To address the formation of social relationships among mobile social users, we adopt a distance and density aware social model called population-distance-based model that comprehensively and practically takes account of the clustering levels of friendship degree and distribution. Under those models, we derive the capacity scaling laws for social-broadcast sessions in MAHSNs. The results provide the exploratory insights into the impacts of users' mobility patterns and the formation of social relationships on the network capacity of MAHSNs.
{"title":"Scaling Laws of Social-Broadcast Capacity for Mobile Ad Hoc Social Networks","authors":"Yu Fang, Zijiao Zhang, Cheng Wang, Zhong Li, Huiya Yan, Changjun Jiang","doi":"10.1109/MASS.2015.44","DOIUrl":"https://doi.org/10.1109/MASS.2015.44","url":null,"abstract":"In this paper, we mainly investigate capacity scaling laws of the mobile ad hoc social networks (MAHSNs)where social networking applications are implemented over the underlying mobile ad hoc networks. We model the real-world mobility pattern of mobile social users by introducing a clustered model that defines two levels of mobility, i.e., Strong mobility and weak mobility, according to the impacts of mobility on the gain of network capacity. To address the formation of social relationships among mobile social users, we adopt a distance and density aware social model called population-distance-based model that comprehensively and practically takes account of the clustering levels of friendship degree and distribution. Under those models, we derive the capacity scaling laws for social-broadcast sessions in MAHSNs. The results provide the exploratory insights into the impacts of users' mobility patterns and the formation of social relationships on the network capacity of MAHSNs.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We revisit some of the basic premises of the Content Centric networking (CCN) and Named Data Networking (NDN) architectures, which have been proposed as alternatives to the IP Internet architecture in order to support more efficient access to content available in the Internet. We address the large overhead incurred in NDN and CCN by maintaining forwarding state for each Interest traversing a router and for each content-name prefix known to each router. We introduce a new approach designed to provide orders of magnitude reduction in the complexity of the data plane to make content-centric networking much more viable at Internet scale.
{"title":"New Directions in Content Centric Networking","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/MASS.2015.86","DOIUrl":"https://doi.org/10.1109/MASS.2015.86","url":null,"abstract":"We revisit some of the basic premises of the Content Centric networking (CCN) and Named Data Networking (NDN) architectures, which have been proposed as alternatives to the IP Internet architecture in order to support more efficient access to content available in the Internet. We address the large overhead incurred in NDN and CCN by maintaining forwarding state for each Interest traversing a router and for each content-name prefix known to each router. We introduce a new approach designed to provide orders of magnitude reduction in the complexity of the data plane to make content-centric networking much more viable at Internet scale.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129273260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid growth of the smart device market, associated security issues become more threatening and diverse than ever before. Due to the limitations of the traditional explicit authentication mechanisms (e.g., Password-based, biometrics), researchers and the industry have been promoting implicit authentication (IA) that does not require explicit user action and potentially enhances user experience to further protect devices from misuse. IA typically leverages various types of behavioral data to deduce a user behavior model for authentication purpose. However, IA systems are still at their infancy and exhibit many limitations, one of which is how to determine the best retraining frequency when updating the user behavior model. Another limitation is how to gracefully degrade user privilege, when authentication fails to identify legitimate users (i.e., False negatives) for a practical IA system. To address the first problem, we propose an algorithm that utilizes Jensen-Shannon (JS)-dis(tance) to determine the optimal retraining frequency. For the second problem, we introduce a dynamic privilege mechanism, again based on JS-dis(tance), to achieve multi-level fine-grained access control. Our simulation results show that the proposed techniques can successfully detect the degradation of accuracy of the user behavior model, as well as automatically determine and adjust to the best retraining frequency. It is also shown that the dynamic privilege-based access control reduces the impact of false negatives on legitimate users and enhances system reliability and user experience compared with the traditional lock-only method in case of authentication failure.
{"title":"Retraining and Dynamic Privilege for Implicit Authentication Systems","authors":"Yingyuan Yang, Jinyuan Sun, Chi Zhang, Pan Li","doi":"10.1109/MASS.2015.69","DOIUrl":"https://doi.org/10.1109/MASS.2015.69","url":null,"abstract":"With the rapid growth of the smart device market, associated security issues become more threatening and diverse than ever before. Due to the limitations of the traditional explicit authentication mechanisms (e.g., Password-based, biometrics), researchers and the industry have been promoting implicit authentication (IA) that does not require explicit user action and potentially enhances user experience to further protect devices from misuse. IA typically leverages various types of behavioral data to deduce a user behavior model for authentication purpose. However, IA systems are still at their infancy and exhibit many limitations, one of which is how to determine the best retraining frequency when updating the user behavior model. Another limitation is how to gracefully degrade user privilege, when authentication fails to identify legitimate users (i.e., False negatives) for a practical IA system. To address the first problem, we propose an algorithm that utilizes Jensen-Shannon (JS)-dis(tance) to determine the optimal retraining frequency. For the second problem, we introduce a dynamic privilege mechanism, again based on JS-dis(tance), to achieve multi-level fine-grained access control. Our simulation results show that the proposed techniques can successfully detect the degradation of accuracy of the user behavior model, as well as automatically determine and adjust to the best retraining frequency. It is also shown that the dynamic privilege-based access control reduces the impact of false negatives on legitimate users and enhances system reliability and user experience compared with the traditional lock-only method in case of authentication failure.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sustainability and environmentalism are broad, complex topics about which South Carolina residents have varying perceptions and opinions. It is important to examine these topics not only in South Carolina, but also nationally and globally, as water circulates and is a vital source for survival that is becoming increasingly valuable. This study utilizes telephone survey data that sought to identify South Carolina residents' knowledge, attitudes and behaviors regarding nonpoint source water pollution, and watershed management. This data was collected in 2013 in five regions of South Carolina: Pee Dee, Charleston, Midlands, Grand Strand, and the Upstate. The purpose of this visualization project was to describe the process of using visualization tools for expressing residents' opinions about a several issues related to storm water management. These particular visualization tools will ease the comprehension of environmental perceptions by transferring survey data from Excel spreadsheets to illustrations that are easy to read and are more visually appealing. The visualization instruments used were a social media marketing tool, Radian6, and ESRI's geographical information system for data topography: Arc GIS. Additionally, a flip-book was developed as an educational supplement to raise awareness of the environmental impact and personal responsibility of water pollution. The successful implementation of the methodology will allow a keener observation and presentation of residents' environmental awareness. The knowledge gained can be used to strengthen storm water education efforts, both regionally and nationally.
{"title":"What's on Tap? Transforming Stormwater Survey Data into Visually Appealing Educational Tools","authors":"Claudia Salazar, Katie Buckley, C. Mobley","doi":"10.1109/MASS.2015.66","DOIUrl":"https://doi.org/10.1109/MASS.2015.66","url":null,"abstract":"Sustainability and environmentalism are broad, complex topics about which South Carolina residents have varying perceptions and opinions. It is important to examine these topics not only in South Carolina, but also nationally and globally, as water circulates and is a vital source for survival that is becoming increasingly valuable. This study utilizes telephone survey data that sought to identify South Carolina residents' knowledge, attitudes and behaviors regarding nonpoint source water pollution, and watershed management. This data was collected in 2013 in five regions of South Carolina: Pee Dee, Charleston, Midlands, Grand Strand, and the Upstate. The purpose of this visualization project was to describe the process of using visualization tools for expressing residents' opinions about a several issues related to storm water management. These particular visualization tools will ease the comprehension of environmental perceptions by transferring survey data from Excel spreadsheets to illustrations that are easy to read and are more visually appealing. The visualization instruments used were a social media marketing tool, Radian6, and ESRI's geographical information system for data topography: Arc GIS. Additionally, a flip-book was developed as an educational supplement to raise awareness of the environmental impact and personal responsibility of water pollution. The successful implementation of the methodology will allow a keener observation and presentation of residents' environmental awareness. The knowledge gained can be used to strengthen storm water education efforts, both regionally and nationally.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rachael Purta, David S. Hachen, Jeffrey Liew, A. Striegel
The ability to sense acoustic emotion from a smartphoneis advantageous for two main reasons. First, smartphonesensing is unobtrusive compared to wearing a microphone, and second, a smartphone is nearly always with the user. When sensing emotion over a long period of time, these two reasons become increasingly more important. We demonstrate the challenges of building a system for longitudinal emotion sensing on a smartphone, as well as our design approach to these challenges. Current emotion sensing systems perform all sensing and computation on the phone, but this design can lead to significant battery life constraints. We show that in terms of energy consumption, offloading feature and classification computation to a remote server is the most feasible design choice without excessive battery draining, and discuss how we address the privacy, energy, and storage concerns of such an approach.
{"title":"Toward a System for Longitudinal Emotion Sensing","authors":"Rachael Purta, David S. Hachen, Jeffrey Liew, A. Striegel","doi":"10.1109/MASS.2015.81","DOIUrl":"https://doi.org/10.1109/MASS.2015.81","url":null,"abstract":"The ability to sense acoustic emotion from a smartphoneis advantageous for two main reasons. First, smartphonesensing is unobtrusive compared to wearing a microphone, and second, a smartphone is nearly always with the user. When sensing emotion over a long period of time, these two reasons become increasingly more important. We demonstrate the challenges of building a system for longitudinal emotion sensing on a smartphone, as well as our design approach to these challenges. Current emotion sensing systems perform all sensing and computation on the phone, but this design can lead to significant battery life constraints. We show that in terms of energy consumption, offloading feature and classification computation to a remote server is the most feasible design choice without excessive battery draining, and discuss how we address the privacy, energy, and storage concerns of such an approach.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingfa Shen, Yueshen Chen, Jianhui Zhang, Landi Wang, Guojun Dai, Tian He
As an important supporting technology, floor localization in multi-floor buildings plays significant roles in many indoor Location Based Service (LBS) applications such as the fire emergency response and the floor-based precise advertising. While the majority of Received-Signal-Strength (RSS)-fingerprint-based wireless indoor localization approaches suffer from the labor-intensive and time-consuming site-survey and the low localization accuracy, barometer-based floor localization is another promising direction due to the increasing availability of the barometer-sensor-equipped smartphones. This paper is the first indoor localization work that exploits the combination of Wi-Fi RSS and barometric pressure for accurate floor localization. Compared with an art-of-the-state algorithm, B-Loc, the highlight of the proposed Bar Fi approach is that it does not need all client smartphones but only low percentage of them equipped with barometer sensors. Using crowd sourcing, Bar Fi eliminates the need of war-driving of site-survey and prior knowledge about both the Wi-Fi infrastructure and the floor plans of buildings. The key novelty of Bar Fi is a two-phase clustering method proposed to train the RSS fingerprint floor map with the aid of barometer, which consists of a barometer-based hierarchical clustering phase and a Wi-Fi-based K-Means clustering phase. The real-world evaluation shows Bar Fi achieves satisfying performance that its accuracy reaches 96.3% when the proportion of smartphones equipped with barometer sensors is 12% out of the total.
{"title":"BarFi: Barometer-Aided Wi-Fi Floor Localization Using Crowdsourcing","authors":"Xingfa Shen, Yueshen Chen, Jianhui Zhang, Landi Wang, Guojun Dai, Tian He","doi":"10.1109/MASS.2015.103","DOIUrl":"https://doi.org/10.1109/MASS.2015.103","url":null,"abstract":"As an important supporting technology, floor localization in multi-floor buildings plays significant roles in many indoor Location Based Service (LBS) applications such as the fire emergency response and the floor-based precise advertising. While the majority of Received-Signal-Strength (RSS)-fingerprint-based wireless indoor localization approaches suffer from the labor-intensive and time-consuming site-survey and the low localization accuracy, barometer-based floor localization is another promising direction due to the increasing availability of the barometer-sensor-equipped smartphones. This paper is the first indoor localization work that exploits the combination of Wi-Fi RSS and barometric pressure for accurate floor localization. Compared with an art-of-the-state algorithm, B-Loc, the highlight of the proposed Bar Fi approach is that it does not need all client smartphones but only low percentage of them equipped with barometer sensors. Using crowd sourcing, Bar Fi eliminates the need of war-driving of site-survey and prior knowledge about both the Wi-Fi infrastructure and the floor plans of buildings. The key novelty of Bar Fi is a two-phase clustering method proposed to train the RSS fingerprint floor map with the aid of barometer, which consists of a barometer-based hierarchical clustering phase and a Wi-Fi-based K-Means clustering phase. The real-world evaluation shows Bar Fi achieves satisfying performance that its accuracy reaches 96.3% when the proportion of smartphones equipped with barometer sensors is 12% out of the total.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}