Yang Zhou, Yuanchao Shu, Peng Cheng, Zhiguo Shi, Jiming Chen
In this demo, we propose Phone meter which leverages the RF energy harvesting technologies to measure the strength of Electromagnetic Field (EMF). To this end, Phone meter combines EMF sensor with the smartphone through audio interface without any modifications to the phone. We fully implement the low-cost Phone meter and conduct extensive experiments to prove the functionality of Phone meter. Phone meter achieves about 13:7% relative error in average compared with the industrial-grade spectrum analyzer with significantly reduced the costs.
{"title":"Phonemeter: Bringing EMF Detection to Smartphones","authors":"Yang Zhou, Yuanchao Shu, Peng Cheng, Zhiguo Shi, Jiming Chen","doi":"10.1109/MASS.2015.82","DOIUrl":"https://doi.org/10.1109/MASS.2015.82","url":null,"abstract":"In this demo, we propose Phone meter which leverages the RF energy harvesting technologies to measure the strength of Electromagnetic Field (EMF). To this end, Phone meter combines EMF sensor with the smartphone through audio interface without any modifications to the phone. We fully implement the low-cost Phone meter and conduct extensive experiments to prove the functionality of Phone meter. Phone meter achieves about 13:7% relative error in average compared with the industrial-grade spectrum analyzer with significantly reduced the costs.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boutheina Dab, Ilhem Fajjari, N. Aitsaadi, A. Mellouk
To this day, Cloud computing continues its explosive growth. Nevertheless, with the exceptional evolution of demands, data centers are suffering from congestion problems. To deal with these resource limitations, first, we put forward a novel Hybrid Data Center Network (HDCN) Architecture enabling high throughput wireless (IEEE 802.11 ad) and wired (IEEE 802.3) transmissions. Secondly, we propose a new resource allocation algorithm based on Graph Coloring in HDCN denoted by GC-HDCN. The main objective is to maximize the throughput of intra-HDCN communication requests over the wireless and/or wired infrastructure. The problem is formulated as minimum graph coloring which is NP-Hard. GC-HDCN makes use of i) column generation and ii) branch and price optimization schemes to resolve the assignment of wireless channels. Based on extensive simulations with Qual Net simulator considering all the layers of the protocol stack, the results obtained show that our proposal GC-HDCN outperforms the related prominent strategies in terms of i) end-to-end delay, ii) throughput and iii) spectrum spatial reuse.
{"title":"A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks","authors":"Boutheina Dab, Ilhem Fajjari, N. Aitsaadi, A. Mellouk","doi":"10.1109/MASS.2015.19","DOIUrl":"https://doi.org/10.1109/MASS.2015.19","url":null,"abstract":"To this day, Cloud computing continues its explosive growth. Nevertheless, with the exceptional evolution of demands, data centers are suffering from congestion problems. To deal with these resource limitations, first, we put forward a novel Hybrid Data Center Network (HDCN) Architecture enabling high throughput wireless (IEEE 802.11 ad) and wired (IEEE 802.3) transmissions. Secondly, we propose a new resource allocation algorithm based on Graph Coloring in HDCN denoted by GC-HDCN. The main objective is to maximize the throughput of intra-HDCN communication requests over the wireless and/or wired infrastructure. The problem is formulated as minimum graph coloring which is NP-Hard. GC-HDCN makes use of i) column generation and ii) branch and price optimization schemes to resolve the assignment of wireless channels. Based on extensive simulations with Qual Net simulator considering all the layers of the protocol stack, the results obtained show that our proposal GC-HDCN outperforms the related prominent strategies in terms of i) end-to-end delay, ii) throughput and iii) spectrum spatial reuse.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we mainly investigate capacity scaling laws of the mobile ad hoc social networks (MAHSNs)where social networking applications are implemented over the underlying mobile ad hoc networks. We model the real-world mobility pattern of mobile social users by introducing a clustered model that defines two levels of mobility, i.e., Strong mobility and weak mobility, according to the impacts of mobility on the gain of network capacity. To address the formation of social relationships among mobile social users, we adopt a distance and density aware social model called population-distance-based model that comprehensively and practically takes account of the clustering levels of friendship degree and distribution. Under those models, we derive the capacity scaling laws for social-broadcast sessions in MAHSNs. The results provide the exploratory insights into the impacts of users' mobility patterns and the formation of social relationships on the network capacity of MAHSNs.
{"title":"Scaling Laws of Social-Broadcast Capacity for Mobile Ad Hoc Social Networks","authors":"Yu Fang, Zijiao Zhang, Cheng Wang, Zhong Li, Huiya Yan, Changjun Jiang","doi":"10.1109/MASS.2015.44","DOIUrl":"https://doi.org/10.1109/MASS.2015.44","url":null,"abstract":"In this paper, we mainly investigate capacity scaling laws of the mobile ad hoc social networks (MAHSNs)where social networking applications are implemented over the underlying mobile ad hoc networks. We model the real-world mobility pattern of mobile social users by introducing a clustered model that defines two levels of mobility, i.e., Strong mobility and weak mobility, according to the impacts of mobility on the gain of network capacity. To address the formation of social relationships among mobile social users, we adopt a distance and density aware social model called population-distance-based model that comprehensively and practically takes account of the clustering levels of friendship degree and distribution. Under those models, we derive the capacity scaling laws for social-broadcast sessions in MAHSNs. The results provide the exploratory insights into the impacts of users' mobility patterns and the formation of social relationships on the network capacity of MAHSNs.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we study the link scheduling problem in wireless cooperative communication networks, in which receivers are allowed to combine copies of a message from different senders to combat fading. We formulate a problem called cooperative link scheduling problem (CLS), which aims to find a schedule of links that uses the minimum number of time slots to inform all the receivers. As a solution, we propose an algorithm for CLS with g(K) approximation ratio, where g(K) is so called diversity of key links. Simulation results indicate that our cooperative link scheduling approaches outperform noncooperative ones.
{"title":"Link Scheduling in Wireless Cooperative Communication Networks","authors":"Chenxi Qiu, Haiying Shen","doi":"10.1109/MASS.2015.75","DOIUrl":"https://doi.org/10.1109/MASS.2015.75","url":null,"abstract":"In this paper, we study the link scheduling problem in wireless cooperative communication networks, in which receivers are allowed to combine copies of a message from different senders to combat fading. We formulate a problem called cooperative link scheduling problem (CLS), which aims to find a schedule of links that uses the minimum number of time slots to inform all the receivers. As a solution, we propose an algorithm for CLS with g(K) approximation ratio, where g(K) is so called diversity of key links. Simulation results indicate that our cooperative link scheduling approaches outperform noncooperative ones.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless data traffic, especially video traffic, has been growing at a rapid pace. Innovative network architectures and protocols are needed to improve the efficiency of data delivery. The trend toward integrating advanced information technologies and communications technologies is creating unprecedented opportunities in the design of infrastructure for network-centric services. The rapid growth in cloud computing and middle box deployment is an outcome of such integration. A similar level of success can be expected if this paradigm is adopted by access networks. This paper presents a computation-capable and programmable wireless access network architecture to enable more efficient and robust content delivery. It incorporates in-network processing, caching, and communications under a unified software defined networking platform. To address the multiple resource management challenges that arise in exploiting such integration, we propose a framework to optimize the expected quality of experience of multiple video streams, subject to wireless transmission capacity and in-network computation power constraints. The evaluation results demonstrate the benefits of in-network processing and resource optimization for video content delivery.
{"title":"Improving the Expected Quality of Experience in Cloud-Enabled Wireless Access Networks","authors":"Hang Liu, Kristofer Smith","doi":"10.1109/MASS.2015.53","DOIUrl":"https://doi.org/10.1109/MASS.2015.53","url":null,"abstract":"Wireless data traffic, especially video traffic, has been growing at a rapid pace. Innovative network architectures and protocols are needed to improve the efficiency of data delivery. The trend toward integrating advanced information technologies and communications technologies is creating unprecedented opportunities in the design of infrastructure for network-centric services. The rapid growth in cloud computing and middle box deployment is an outcome of such integration. A similar level of success can be expected if this paradigm is adopted by access networks. This paper presents a computation-capable and programmable wireless access network architecture to enable more efficient and robust content delivery. It incorporates in-network processing, caching, and communications under a unified software defined networking platform. To address the multiple resource management challenges that arise in exploiting such integration, we propose a framework to optimize the expected quality of experience of multiple video streams, subject to wireless transmission capacity and in-network computation power constraints. The evaluation results demonstrate the benefits of in-network processing and resource optimization for video content delivery.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117179516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We revisit some of the basic premises of the Content Centric networking (CCN) and Named Data Networking (NDN) architectures, which have been proposed as alternatives to the IP Internet architecture in order to support more efficient access to content available in the Internet. We address the large overhead incurred in NDN and CCN by maintaining forwarding state for each Interest traversing a router and for each content-name prefix known to each router. We introduce a new approach designed to provide orders of magnitude reduction in the complexity of the data plane to make content-centric networking much more viable at Internet scale.
{"title":"New Directions in Content Centric Networking","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/MASS.2015.86","DOIUrl":"https://doi.org/10.1109/MASS.2015.86","url":null,"abstract":"We revisit some of the basic premises of the Content Centric networking (CCN) and Named Data Networking (NDN) architectures, which have been proposed as alternatives to the IP Internet architecture in order to support more efficient access to content available in the Internet. We address the large overhead incurred in NDN and CCN by maintaining forwarding state for each Interest traversing a router and for each content-name prefix known to each router. We introduce a new approach designed to provide orders of magnitude reduction in the complexity of the data plane to make content-centric networking much more viable at Internet scale.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129273260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sustainability and environmentalism are broad, complex topics about which South Carolina residents have varying perceptions and opinions. It is important to examine these topics not only in South Carolina, but also nationally and globally, as water circulates and is a vital source for survival that is becoming increasingly valuable. This study utilizes telephone survey data that sought to identify South Carolina residents' knowledge, attitudes and behaviors regarding nonpoint source water pollution, and watershed management. This data was collected in 2013 in five regions of South Carolina: Pee Dee, Charleston, Midlands, Grand Strand, and the Upstate. The purpose of this visualization project was to describe the process of using visualization tools for expressing residents' opinions about a several issues related to storm water management. These particular visualization tools will ease the comprehension of environmental perceptions by transferring survey data from Excel spreadsheets to illustrations that are easy to read and are more visually appealing. The visualization instruments used were a social media marketing tool, Radian6, and ESRI's geographical information system for data topography: Arc GIS. Additionally, a flip-book was developed as an educational supplement to raise awareness of the environmental impact and personal responsibility of water pollution. The successful implementation of the methodology will allow a keener observation and presentation of residents' environmental awareness. The knowledge gained can be used to strengthen storm water education efforts, both regionally and nationally.
{"title":"What's on Tap? Transforming Stormwater Survey Data into Visually Appealing Educational Tools","authors":"Claudia Salazar, Katie Buckley, C. Mobley","doi":"10.1109/MASS.2015.66","DOIUrl":"https://doi.org/10.1109/MASS.2015.66","url":null,"abstract":"Sustainability and environmentalism are broad, complex topics about which South Carolina residents have varying perceptions and opinions. It is important to examine these topics not only in South Carolina, but also nationally and globally, as water circulates and is a vital source for survival that is becoming increasingly valuable. This study utilizes telephone survey data that sought to identify South Carolina residents' knowledge, attitudes and behaviors regarding nonpoint source water pollution, and watershed management. This data was collected in 2013 in five regions of South Carolina: Pee Dee, Charleston, Midlands, Grand Strand, and the Upstate. The purpose of this visualization project was to describe the process of using visualization tools for expressing residents' opinions about a several issues related to storm water management. These particular visualization tools will ease the comprehension of environmental perceptions by transferring survey data from Excel spreadsheets to illustrations that are easy to read and are more visually appealing. The visualization instruments used were a social media marketing tool, Radian6, and ESRI's geographical information system for data topography: Arc GIS. Additionally, a flip-book was developed as an educational supplement to raise awareness of the environmental impact and personal responsibility of water pollution. The successful implementation of the methodology will allow a keener observation and presentation of residents' environmental awareness. The knowledge gained can be used to strengthen storm water education efforts, both regionally and nationally.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid growth of the smart device market, associated security issues become more threatening and diverse than ever before. Due to the limitations of the traditional explicit authentication mechanisms (e.g., Password-based, biometrics), researchers and the industry have been promoting implicit authentication (IA) that does not require explicit user action and potentially enhances user experience to further protect devices from misuse. IA typically leverages various types of behavioral data to deduce a user behavior model for authentication purpose. However, IA systems are still at their infancy and exhibit many limitations, one of which is how to determine the best retraining frequency when updating the user behavior model. Another limitation is how to gracefully degrade user privilege, when authentication fails to identify legitimate users (i.e., False negatives) for a practical IA system. To address the first problem, we propose an algorithm that utilizes Jensen-Shannon (JS)-dis(tance) to determine the optimal retraining frequency. For the second problem, we introduce a dynamic privilege mechanism, again based on JS-dis(tance), to achieve multi-level fine-grained access control. Our simulation results show that the proposed techniques can successfully detect the degradation of accuracy of the user behavior model, as well as automatically determine and adjust to the best retraining frequency. It is also shown that the dynamic privilege-based access control reduces the impact of false negatives on legitimate users and enhances system reliability and user experience compared with the traditional lock-only method in case of authentication failure.
{"title":"Retraining and Dynamic Privilege for Implicit Authentication Systems","authors":"Yingyuan Yang, Jinyuan Sun, Chi Zhang, Pan Li","doi":"10.1109/MASS.2015.69","DOIUrl":"https://doi.org/10.1109/MASS.2015.69","url":null,"abstract":"With the rapid growth of the smart device market, associated security issues become more threatening and diverse than ever before. Due to the limitations of the traditional explicit authentication mechanisms (e.g., Password-based, biometrics), researchers and the industry have been promoting implicit authentication (IA) that does not require explicit user action and potentially enhances user experience to further protect devices from misuse. IA typically leverages various types of behavioral data to deduce a user behavior model for authentication purpose. However, IA systems are still at their infancy and exhibit many limitations, one of which is how to determine the best retraining frequency when updating the user behavior model. Another limitation is how to gracefully degrade user privilege, when authentication fails to identify legitimate users (i.e., False negatives) for a practical IA system. To address the first problem, we propose an algorithm that utilizes Jensen-Shannon (JS)-dis(tance) to determine the optimal retraining frequency. For the second problem, we introduce a dynamic privilege mechanism, again based on JS-dis(tance), to achieve multi-level fine-grained access control. Our simulation results show that the proposed techniques can successfully detect the degradation of accuracy of the user behavior model, as well as automatically determine and adjust to the best retraining frequency. It is also shown that the dynamic privilege-based access control reduces the impact of false negatives on legitimate users and enhances system reliability and user experience compared with the traditional lock-only method in case of authentication failure.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rasool Tavakoli, Majid Nabi, T. Basten, K. Goossens
Cross-technology interference on the license-free ISM bands has a major negative effect on the performance of Wireless Sensor Networks (WSNs). Channel hopping has been adopted in the Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e to eliminate blocking of wireless links caused by external interference on some frequency channels. This paper proposes an Enhanced version of the TSCH protocol (ETSCH) which restricts the used channels for hopping to the channels that are measured to be of good quality. The quality of channels is extracted using a new Non-Intrusive Channel-quality Estimation (NICE) technique by performing energy detections in selected idle periods every timeslot. NICE enables ETSCH to follow dynamic interference well, while it does not reduce throughput of the network. It also does not change the protocol, and does not require non-standard hardware. ETSCH uses a small Enhanced Beacon hopping Sequence List (EBSL) to broadcast periodic Enhanced Beacons (EB) in the network to synchronize nodes at the start of timeslots. Experimental results show that ETSCH improves reliability of network communication, compared to basic TSCH and a more advanced mechanism ATSCH. It provides higher packet reception ratios and reduces the maximum length of burst packet losses.
{"title":"Enhanced Time-Slotted Channel Hopping in WSNs Using Non-intrusive Channel-Quality Estimation","authors":"Rasool Tavakoli, Majid Nabi, T. Basten, K. Goossens","doi":"10.1109/MASS.2015.48","DOIUrl":"https://doi.org/10.1109/MASS.2015.48","url":null,"abstract":"Cross-technology interference on the license-free ISM bands has a major negative effect on the performance of Wireless Sensor Networks (WSNs). Channel hopping has been adopted in the Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e to eliminate blocking of wireless links caused by external interference on some frequency channels. This paper proposes an Enhanced version of the TSCH protocol (ETSCH) which restricts the used channels for hopping to the channels that are measured to be of good quality. The quality of channels is extracted using a new Non-Intrusive Channel-quality Estimation (NICE) technique by performing energy detections in selected idle periods every timeslot. NICE enables ETSCH to follow dynamic interference well, while it does not reduce throughput of the network. It also does not change the protocol, and does not require non-standard hardware. ETSCH uses a small Enhanced Beacon hopping Sequence List (EBSL) to broadcast periodic Enhanced Beacons (EB) in the network to synchronize nodes at the start of timeslots. Experimental results show that ETSCH improves reliability of network communication, compared to basic TSCH and a more advanced mechanism ATSCH. It provides higher packet reception ratios and reduces the maximum length of burst packet losses.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123506551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rachael Purta, David S. Hachen, Jeffrey Liew, A. Striegel
The ability to sense acoustic emotion from a smartphoneis advantageous for two main reasons. First, smartphonesensing is unobtrusive compared to wearing a microphone, and second, a smartphone is nearly always with the user. When sensing emotion over a long period of time, these two reasons become increasingly more important. We demonstrate the challenges of building a system for longitudinal emotion sensing on a smartphone, as well as our design approach to these challenges. Current emotion sensing systems perform all sensing and computation on the phone, but this design can lead to significant battery life constraints. We show that in terms of energy consumption, offloading feature and classification computation to a remote server is the most feasible design choice without excessive battery draining, and discuss how we address the privacy, energy, and storage concerns of such an approach.
{"title":"Toward a System for Longitudinal Emotion Sensing","authors":"Rachael Purta, David S. Hachen, Jeffrey Liew, A. Striegel","doi":"10.1109/MASS.2015.81","DOIUrl":"https://doi.org/10.1109/MASS.2015.81","url":null,"abstract":"The ability to sense acoustic emotion from a smartphoneis advantageous for two main reasons. First, smartphonesensing is unobtrusive compared to wearing a microphone, and second, a smartphone is nearly always with the user. When sensing emotion over a long period of time, these two reasons become increasingly more important. We demonstrate the challenges of building a system for longitudinal emotion sensing on a smartphone, as well as our design approach to these challenges. Current emotion sensing systems perform all sensing and computation on the phone, but this design can lead to significant battery life constraints. We show that in terms of energy consumption, offloading feature and classification computation to a remote server is the most feasible design choice without excessive battery draining, and discuss how we address the privacy, energy, and storage concerns of such an approach.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}