首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces OcAPO:在开放式共享工作空间中进行细粒度占用感知、经验驱动的 PDC 控制
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-28 DOI: 10.1016/j.pmcj.2024.101945
Anuradha Ravi , Dulaj Sanjaya Weerakoon , Archan Misra
<div><p>Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a <span><math><mrow><mn>1000</mn><mspace></mspace><msup><mrow><mi>m</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></math></span> open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle two key practical challenges: (a) the zone-level (i.e., occupant-experienced) temperature differs significantly, depending on occupancy levels, from that measured by the ceiling-mounted thermal sensors that drive the PDC control loop, (b) sparsely deployed sensors are unable to capture the often-significant differences in ambient temperature across neighboring zones. Using extensive real-world coarser-grained measurement data (collected over 60 days under varying occupancy conditions), (a) we first uncover the various parameters that affect the occupant-level ambient temperature, and then (b) devise a trace-based model that helps identify the optimum combination of PDC setpoints, collectively across multiple zones, while accommodating variations in the occupancy levels and weather conditions. Using this trace-based model, our <em>OcAPO</em> system can assure ambient temperature experienced by occupants within a tolerance of <span><math><mrow><mspace></mspace><mn>0</mn><mo>.</mo><mn>3</mn><mspace></mspace><mo>°</mo><mi>C</mi></mrow></math></span>. In contrast, the existing approach of occupancy-agnostic, rule-based setpoint control violates this tolerance interval more than 80% of the time. However, this initial model requires unnecessary and continual database lookups and is unable to derive finer-grained setpoints, thereby potentially missing opportunities for additional energy savings. We thus collected data for another 15 days, with finer-grained setpoint control in increments of 0.2<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> under varying occupancy conditions in the second phase. To determine PDC setpoints efficiently, we subsequently used the empirical data to train a KNN-based regression model. Additional studies on our real-world testbed demonstrate the regressor-based <em>OcAPO</em> approach is able to assure occupant-level ambient temperature within a narrow <span><math><mrow><mspace></mspace><mn>0</mn><mo>.</mo><mn>2</mn><mspace></mspace><mo>°</mo><mi>C</mi></mrow></math></span> tolerance. We also demonstrate that the regression version of <em>OcAPO</em> can reduce the opening percentage of PDC valves (an in
被动置换冷却(PDC)是一种相对较新的技术,作为一种大幅降低建筑能耗开销的手段,尤其是在热带气候条件下,该技术日益受到关注。PDC 无需使用机械风扇,而是使用冷水热交换器进行对流冷却。在本文中,我们确定并描述了影响使用 PDC 设备的 ZEB(零能耗建筑)1000 平方米开放地板区域(由多个区域组成)中居住舒适度的几个关键参数的影响,并解决了如何设置 PDC 设备温度设定点以确保居住者热舒适度并节约能源的问题。我们解决了两个关键的实际挑战:(a)根据占用水平,区域级(即居住者体验)温度与天花板安装的热传感器测量到的温度存在显著差异,而天花板安装的热传感器可驱动 PDC 控制回路;(b)稀疏部署的传感器无法捕捉相邻区域间环境温度的显著差异。利用广泛的实际粗粒度测量数据(在不同占用条件下收集了 60 天),(a) 我们首先发现了影响占用级环境温度的各种参数,然后 (b) 设计了一个基于轨迹的模型,该模型可帮助确定多个区域的 PDC 设定点的最佳组合,同时适应占用级别和天气条件的变化。利用这一基于轨迹的模型,我们的 OcAPO 系统可以确保居住者所感受到的环境温度在 0.3°C 的容差范围内。相比之下,现有的与占用无关、基于规则的设定点控制方法在 80% 以上的时间里都会违反这个容差范围。然而,这种初始模型需要进行不必要的、持续的数据库查询,而且无法推导出更精细的设定点,因此有可能错失额外的节能机会。因此,我们又收集了 15 天的数据,在第二阶段的不同占用条件下,以 0.2∘的增量进行更精细的设定点控制。为了有效确定 PDC 设定点,我们随后使用经验数据训练了一个基于 KNN 的回归模型。在我们的实际测试平台上进行的其他研究表明,基于回归器的 OcAPO 方法能够确保在 0.2°C 的较小容差范围内保持住户级环境温度。我们还证明,与基于跟踪的模型相比,回归版 OcAPO 可以在低入住率情况下将 PDC 阀门的开启百分比(间接代表能耗)降低 58.9%。
{"title":"OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces","authors":"Anuradha Ravi ,&nbsp;Dulaj Sanjaya Weerakoon ,&nbsp;Archan Misra","doi":"10.1016/j.pmcj.2024.101945","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101945","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;1000&lt;/mn&gt;&lt;mspace&gt;&lt;/mspace&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle two key practical challenges: (a) the zone-level (i.e., occupant-experienced) temperature differs significantly, depending on occupancy levels, from that measured by the ceiling-mounted thermal sensors that drive the PDC control loop, (b) sparsely deployed sensors are unable to capture the often-significant differences in ambient temperature across neighboring zones. Using extensive real-world coarser-grained measurement data (collected over 60 days under varying occupancy conditions), (a) we first uncover the various parameters that affect the occupant-level ambient temperature, and then (b) devise a trace-based model that helps identify the optimum combination of PDC setpoints, collectively across multiple zones, while accommodating variations in the occupancy levels and weather conditions. Using this trace-based model, our &lt;em&gt;OcAPO&lt;/em&gt; system can assure ambient temperature experienced by occupants within a tolerance of &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mspace&gt;&lt;/mspace&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;mspace&gt;&lt;/mspace&gt;&lt;mo&gt;°&lt;/mo&gt;&lt;mi&gt;C&lt;/mi&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. In contrast, the existing approach of occupancy-agnostic, rule-based setpoint control violates this tolerance interval more than 80% of the time. However, this initial model requires unnecessary and continual database lookups and is unable to derive finer-grained setpoints, thereby potentially missing opportunities for additional energy savings. We thus collected data for another 15 days, with finer-grained setpoint control in increments of 0.2&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;∘&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt; under varying occupancy conditions in the second phase. To determine PDC setpoints efficiently, we subsequently used the empirical data to train a KNN-based regression model. Additional studies on our real-world testbed demonstrate the regressor-based &lt;em&gt;OcAPO&lt;/em&gt; approach is able to assure occupant-level ambient temperature within a narrow &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mspace&gt;&lt;/mspace&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mspace&gt;&lt;/mspace&gt;&lt;mo&gt;°&lt;/mo&gt;&lt;mi&gt;C&lt;/mi&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; tolerance. We also demonstrate that the regression version of &lt;em&gt;OcAPO&lt;/em&gt; can reduce the opening percentage of PDC valves (an in","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101945"},"PeriodicalIF":3.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On data minimization and anonymity in pervasive mobile-to-mobile recommender systems 无处不在的移动对移动推荐系统中的数据最小化和匿名性问题
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-28 DOI: 10.1016/j.pmcj.2024.101951
Tobias Eichinger, Axel Küpper

Data minimization is a legal principle that mandates limiting the collection of personal data to a necessary minimum. In this context, we address ourselves to pervasive mobile-to-mobile recommender systems in which users establish ad hoc wireless connections between their mobile computing devices in physical proximity to exchange ratings that represent personal data on which they calculate recommendations. The specific problem is: How can users minimize the collection of ratings over all users while only being able to communicate with a subset of other users in physical proximity? A main difficulty is the mobility of users, which prevents, for instance, the creation and use of an overlay network to coordinate data collection. Users, therefore, have to decide whether to exchange ratings and how many when an ad hoc wireless connection is established. We model the randomness of these connections and apply an algorithm based on distributed gradient descent to solve the distributed data minimization problem at hand. We show that the algorithm robustly produces the least amount of connections and also the least amount of collected ratings compared to an array of baselines. We find that this simultaneously reduces the chances of an attacker relating users to ratings. In this sense, the algorithm also preserves the anonymity of users, yet only of those users who do not establish an ad hoc wireless connection with each other. Users who do establish a connection with each other are trivially not anonymous toward each other. We find that users can further minimize data collection and preserve their anonymity if they aggregate multiple ratings on the same item into a single rating and change their identifiers between connections.

数据最小化是一项法律原则,它要求将个人数据的收集限制在必要的最低限度。在此背景下,我们将研究普遍存在的移动对移动推荐系统,在该系统中,用户在物理距离很近的移动计算设备之间建立临时无线连接,交换代表个人数据的评分,并据此计算推荐结果。具体问题是:用户如何在只能与物理距离较近的其他用户子集通信的同时,最大限度地减少对所有用户的评分收集?一个主要困难是用户的流动性,例如,这妨碍了创建和使用覆盖网络来协调数据收集。因此,在建立临时无线连接时,用户必须决定是否交换评分以及交换多少评分。我们对这些连接的随机性进行建模,并应用基于分布式梯度下降的算法来解决当前的分布式数据最小化问题。我们表明,与一系列基线相比,该算法能稳健地产生最少的连接数和最少的收集评分。我们发现,这同时降低了攻击者将用户与评分联系起来的几率。从这个意义上说,该算法还保留了用户的匿名性,但仅限于那些彼此未建立临时无线连接的用户。相互之间建立了连接的用户对彼此并不是匿名的。我们发现,如果用户将对同一项目的多个评分合并为一个评分,并在连接之间更改自己的标识符,就能进一步减少数据收集并保持匿名性。
{"title":"On data minimization and anonymity in pervasive mobile-to-mobile recommender systems","authors":"Tobias Eichinger,&nbsp;Axel Küpper","doi":"10.1016/j.pmcj.2024.101951","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101951","url":null,"abstract":"<div><p>Data minimization is a legal principle that mandates limiting the collection of personal data to a necessary minimum. In this context, we address ourselves to pervasive mobile-to-mobile recommender systems in which users establish ad hoc wireless connections between their mobile computing devices in physical proximity to exchange ratings that represent personal data on which they calculate recommendations. The specific problem is: How can users minimize the collection of ratings over all users while only being able to communicate with a subset of other users in physical proximity? A main difficulty is the mobility of users, which prevents, for instance, the creation and use of an overlay network to coordinate data collection. Users, therefore, have to decide whether to exchange ratings and how many when an ad hoc wireless connection is established. We model the randomness of these connections and apply an algorithm based on distributed gradient descent to solve the distributed data minimization problem at hand. We show that the algorithm robustly produces the least amount of connections and also the least amount of collected ratings compared to an array of baselines. We find that this simultaneously reduces the chances of an attacker relating users to ratings. In this sense, the algorithm also preserves the anonymity of users, yet only of those users who do not establish an ad hoc wireless connection with each other. Users who do establish a connection with each other are trivially not anonymous toward each other. We find that users can further minimize data collection and preserve their anonymity if they aggregate multiple ratings on the same item into a single rating and change their identifiers between connections.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101951"},"PeriodicalIF":4.3,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000774/pdfft?md5=a223e1b154eb947d9484c66aff1d4dfa&pid=1-s2.0-S1574119224000774-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning energy saving through client selection 通过客户端选择实现联合学习节能
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-24 DOI: 10.1016/j.pmcj.2024.101948
Filipe Maciel , Allan M. de Souza , Luiz F. Bittencourt , Leandro A. Villas , Torsten Braun

Contemporary applications leverage machine learning models to optimize performance, often necessitating data transmission to a remote server for training. However, this approach entails significant resource consumption. A privacy concern arises, which Federated Learning addresses through a cyclical process involving in-device training (local model update) and subsequent reporting to the server for aggregation (global model update). In each iteration of this cycle, termed a communication round, a client selection component determines participant devices contributing to global model enhancement. However, existing literature inadequately addresses scenarios where optimized energy consumption is imperative. This paper introduces an Energy Saving Client Selection (ESCS) mechanism, considering decision criteria such as battery level, training time capacity, and network quality. As a pertinent use case, classification scenarios are utilized to compare the performance of ESCS against other state-of-the-art approaches. The findings reveal that ESCS effectively conserves energy while maintaining optimal performance. This research contributes to the ongoing discourse on energy-efficient client selection strategies within the domain of Federated Learning.

当代应用利用机器学习模型来优化性能,通常需要将数据传输到远程服务器进行训练。然而,这种方法需要消耗大量资源。Federated Learning 通过一个循环过程来解决隐私问题,该过程包括设备内训练(本地模型更新)和随后向服务器报告以进行汇总(全局模型更新)。在这一循环的每次迭代(称为一轮通信)中,客户端选择组件都会确定参与全局模型增强的设备。然而,现有文献对必须优化能耗的应用场景论述不足。本文介绍了一种节能客户端选择(ESCS)机制,考虑了电池电量、训练时间容量和网络质量等决策标准。作为一个相关的用例,本文利用分类场景将 ESCS 的性能与其他最先进的方法进行了比较。研究结果表明,ESCS 在保持最佳性能的同时有效地节约了能源。这项研究为联邦学习领域内正在进行的关于高能效客户端选择策略的讨论做出了贡献。
{"title":"Federated learning energy saving through client selection","authors":"Filipe Maciel ,&nbsp;Allan M. de Souza ,&nbsp;Luiz F. Bittencourt ,&nbsp;Leandro A. Villas ,&nbsp;Torsten Braun","doi":"10.1016/j.pmcj.2024.101948","DOIUrl":"10.1016/j.pmcj.2024.101948","url":null,"abstract":"<div><p>Contemporary applications leverage machine learning models to optimize performance, often necessitating data transmission to a remote server for training. However, this approach entails significant resource consumption. A privacy concern arises, which Federated Learning addresses through a cyclical process involving in-device training (local model update) and subsequent reporting to the server for aggregation (global model update). In each iteration of this cycle, termed a communication round, a client selection component determines participant devices contributing to global model enhancement. However, existing literature inadequately addresses scenarios where optimized energy consumption is imperative. This paper introduces an Energy Saving Client Selection (ESCS) mechanism, considering decision criteria such as battery level, training time capacity, and network quality. As a pertinent use case, classification scenarios are utilized to compare the performance of ESCS against other state-of-the-art approaches. The findings reveal that ESCS effectively conserves energy while maintaining optimal performance. This research contributes to the ongoing discourse on energy-efficient client selection strategies within the domain of Federated Learning.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101948"},"PeriodicalIF":4.3,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141143514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar mmDrive:使用毫米波传感器对驾驶员的注意力进行被动监测
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101949
Argha Sen, Avijit Mandal, Prasenjit Karmakar, Anirban Das, Sandip Chakraborty

Detecting risky driving has been a significant area of focus in recent years. Nonetheless, devising a practical, effective, and unobtrusive solution remains a complex challenge. Presently available technologies predominantly rely on visual cues or physical proximity, complicating the sensing. With this incentive, we explore the possibility of utilizing mmWave radars exclusively to identify dangerous driving behaviors. Initially, we scrutinize the attributes of unsafe driving and pinpoint distinct patterns in range-doppler readings brought about by nine common risky driving manoeuvres. Subsequently, we create an innovative Fused-CNN model that identifies instances of hazardous driving amidst regular driving and categorizes nine distinct types of dangerous driving actions. After conducting thorough experiments involving seven volunteers driving in real-world settings, we note that our system accurately distinguishes risky driving actions with an average precision of approximately 97% with a deviation of ±2%. To underscore the significance of our approach, we also compare it against established state-of-the-art methods.

检测危险驾驶是近年来的一个重要关注领域。然而,设计一种实用、有效、不显眼的解决方案仍然是一项复杂的挑战。目前可用的技术主要依赖于视觉线索或物理距离,这使得传感变得更加复杂。在此激励下,我们探索了专门利用毫米波雷达识别危险驾驶行为的可能性。首先,我们仔细研究了不安全驾驶的属性,并指出了九种常见的危险驾驶动作所带来的范围-多普勒读数的独特模式。随后,我们创建了一个创新的融合-CNN 模型,该模型可识别常规驾驶中的危险驾驶实例,并对九种不同类型的危险驾驶行为进行分类。在对实际驾驶环境中的七名志愿者进行全面实验后,我们注意到,我们的系统能准确区分危险驾驶行为,平均精确度约为 97%,偏差为 ±2%。为了强调我们方法的重要性,我们还将其与现有的最先进方法进行了比较。
{"title":"Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar","authors":"Argha Sen,&nbsp;Avijit Mandal,&nbsp;Prasenjit Karmakar,&nbsp;Anirban Das,&nbsp;Sandip Chakraborty","doi":"10.1016/j.pmcj.2024.101949","DOIUrl":"10.1016/j.pmcj.2024.101949","url":null,"abstract":"<div><p>Detecting risky driving has been a significant area of focus in recent years. Nonetheless, devising a practical, effective, and unobtrusive solution remains a complex challenge. Presently available technologies predominantly rely on visual cues or physical proximity, complicating the sensing. With this incentive, we explore the possibility of utilizing mmWave radars exclusively to identify dangerous driving behaviors. Initially, we scrutinize the attributes of unsafe driving and pinpoint distinct patterns in range-doppler readings brought about by nine common risky driving manoeuvres. Subsequently, we create an innovative Fused-CNN model that identifies instances of hazardous driving amidst regular driving and categorizes nine distinct types of dangerous driving actions. After conducting thorough experiments involving seven volunteers driving in real-world settings, we note that our system accurately distinguishes risky driving actions with an average precision of approximately 97% with a deviation of <span><math><mrow><mo>±</mo><mn>2</mn><mtext>%</mtext></mrow></math></span>. To underscore the significance of our approach, we also compare it against established state-of-the-art methods.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101949"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification CIU-L:用于人体识别的类递增学习和机器非学习被动传感系统
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101947
Zhongcheng Wei , Wei Chen , Yunping Zhang , Bin Lian , Jijun Zhao

With the development of passive sensing technology, WiFi-based identification research has attracted much attention in areas such as human–computer interaction and home security. Although WiFi sensing-based human identification has achieved initial success, it is currently mainly applicable to scenarios where the user’s identity category is fixed and not applicable to scenarios where the user’s identity category changes frequently. In this paper, we propose an identification system (CIU-L) in a scenario where user’s identity categories frequently change, allowing for incremental registration and unregistration of identity categories. To the best of our knowledge, this is the first attempt to register and unregister user identity information under the previous identity category constraints. CIU-L proposes a training and updating strategy in the registration phase of new user to avoid catastrophic forgetting of old user’s identity information, and trains a targeted noise for the user to be unregistered in the unregistration phase of old user, achieving precise removal of the user to be unregistered without affecting the retained users. In addition, this paper presents adequate comparative experiments of CIU-L with other systems in the user identity category fixing scenario. The experimental results show that the average difference between CIU-L and other systems in terms of Accuracy, Precision, Recall and F1-Score is within 5% of each other, while running time and storage space are saved by more than 6 times, which is more capable of meeting the needs of identity recognition in real scenarios.

随着无源传感技术的发展,基于 WiFi 的身份识别研究在人机交互和家庭安防等领域备受关注。虽然基于 WiFi 传感的人机识别取得了初步成效,但目前主要适用于用户身份类别固定的场景,不适用于用户身份类别经常变化的场景。在本文中,我们提出了一种用户身份类别频繁变化场景下的识别系统(CIU-L),允许增量注册和取消注册身份类别。据我们所知,这是首次尝试在以前的身份类别限制下注册和取消注册用户身份信息。CIU-L 在新用户注册阶段提出了一种训练和更新策略,以避免老用户身份信息的灾难性遗忘,并在老用户注销阶段对要注销的用户进行有针对性的噪声训练,在不影响保留用户的情况下实现了对要注销用户的精确删除。此外,本文还充分展示了 CIU-L 与其他系统在用户身份类别固定场景下的对比实验。实验结果表明,CIU-L 与其他系统在准确率(Accuracy)、精确率(Precision)、召回率(Recall)和 F1 分数(F1-Score)上的平均差距都在 5%以内,而运行时间和存储空间则节省了 6 倍以上,更能满足实际场景中身份识别的需求。
{"title":"CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification","authors":"Zhongcheng Wei ,&nbsp;Wei Chen ,&nbsp;Yunping Zhang ,&nbsp;Bin Lian ,&nbsp;Jijun Zhao","doi":"10.1016/j.pmcj.2024.101947","DOIUrl":"10.1016/j.pmcj.2024.101947","url":null,"abstract":"<div><p>With the development of passive sensing technology, WiFi-based identification research has attracted much attention in areas such as human–computer interaction and home security. Although WiFi sensing-based human identification has achieved initial success, it is currently mainly applicable to scenarios where the user’s identity category is fixed and not applicable to scenarios where the user’s identity category changes frequently. In this paper, we propose an identification system (CIU-L) in a scenario where user’s identity categories frequently change, allowing for incremental registration and unregistration of identity categories. To the best of our knowledge, this is the first attempt to register and unregister user identity information under the previous identity category constraints. CIU-L proposes a training and updating strategy in the registration phase of new user to avoid catastrophic forgetting of old user’s identity information, and trains a targeted noise for the user to be unregistered in the unregistration phase of old user, achieving precise removal of the user to be unregistered without affecting the retained users. In addition, this paper presents adequate comparative experiments of CIU-L with other systems in the user identity category fixing scenario. The experimental results show that the average difference between CIU-L and other systems in terms of Accuracy, Precision, Recall and F1-Score is within 5% of each other, while running time and storage space are saved by more than 6 times, which is more capable of meeting the needs of identity recognition in real scenarios.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101947"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication BmmW:基于 DNN 的 BLE 和毫米波雷达联合系统,可通过面向目标的通信进行精确 3D 定位
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-18 DOI: 10.1016/j.pmcj.2024.101944
Peizheng Li , Jagdeep Singh , Han Cui , Carlo Alberto Boano

Bluetooth Low Energy (BLE) has emerged as one of the reference technologies for the development of indoor localization systems, due to its increasing ubiquity, low-cost hardware, and to the introduction of direction-finding enhancements improving its ranging performance. However, the intrinsic narrowband nature of BLE makes this technology susceptible to multipath and channel interference. As a result, it is still challenging to achieve decimetre-level localization accuracy, which is necessary when developing location-based services for smart factories and workspaces. To address this challenge, we present BmmW, an indoor localization system that augments the ranging estimates obtained with BLE  5.1’s constant tone extension feature with mmWave radar measurements to provide 3D localization of a mobile tag with decimetre-level accuracy. Specifically, BmmW embeds a deep neural network (DNN) that is jointly trained with both BLE and mmWave measurements, practically leveraging the strengths of both technologies. In fact, mmWave radars can locate objects and people with decimetre-level accuracy, but their effectiveness in monitoring stationary targets and multiple objects is limited, and they also suffer from a fast signal attenuation limiting the usable range to a few meters. We evaluate BmmW’s performance experimentally, and show that its joint DNN training scheme allows to track mobile tags with a mean 3D localization accuracy of 10 cm when combining angle-of-arrival BLE measurements with mmWave radar data. We further assess two variations of BmmW: BmmW-Lite and BmmW-Lite+, both tailored for single-antenna BLE devices, which eliminates the necessity for bulky and expensive multi-antenna arrays and represents a cost-effective solution that is easy to integrate into compact IoT devices. In contrast to classic BmmW (which utilizes angle-of-arrival info), BmmW-Lite uses raw in-phase/quadrature (I/Q) measurements, and achieves a mean localization accuracy of 36 cm, thus facilitating precise object tracking in indoor environments even when using budget-friendly single-antenna BLE devices. BmmW-Lite+ extends BmmW-Lite by allowing the localization task to be transferred from the edge to the cloud due to device memory and power constraints. To this end, BmmW-Lite+ employs a goal-oriented communication paradigm that compresses initial BLE features into a more compact semantic format at the edge device, which allows to minimize the amount of data that needs to be sent to the cloud. Our experimental results show that BmmW-Lite+ can compress raw BLE features by up to 12% of their initial size (hence allowing to save network bandwidth and minimize energy consumption), with negligible impact on the localization accuracy.

蓝牙低功耗(BLE)因其日益普及、硬件成本低以及引入了提高测距性能的测向增强技术,已成为开发室内定位系统的参考技术之一。然而,BLE 固有的窄带特性使该技术容易受到多径和信道干扰的影响。因此,实现分米级定位精度仍具有挑战性,而这正是为智能工厂和工作空间开发定位服务所必需的。为了应对这一挑战,我们推出了 BmmW,这是一种室内定位系统,它利用毫米波雷达测量增强了通过 BLE 5.1 的恒定音调扩展功能获得的测距估计值,从而为移动标签提供分米级精度的三维定位。具体来说,BmmW 嵌入了一个深度神经网络(DNN),该网络通过 BLE 和毫米波测量进行联合训练,实际上充分利用了两种技术的优势。事实上,毫米波雷达能以分米级的精度定位物体和人员,但它们在监测静止目标和多个物体方面的效果有限,而且它们还受到快速信号衰减的影响,可用范围被限制在几米之内。我们通过实验对 BmmW 的性能进行了评估,结果表明其联合 DNN 训练方案可以在结合到达角 BLE 测量和毫米波雷达数据的情况下以 10 厘米的平均 3D 定位精度跟踪移动标签。我们进一步评估了 BmmW 的两种变体:BmmW-Lite 和 BmmW-Lite+,它们都是为单天线 BLE 设备量身定制的,无需使用笨重昂贵的多天线阵列,是一种易于集成到紧凑型物联网设备中的高性价比解决方案。与传统的 BmmW(使用到达角信息)不同,BmmW-Lite 使用原始的相位/正交(I/Q)测量,可实现 36 厘米的平均定位精度,因此即使使用经济实惠的单天线 BLE 设备,也能在室内环境中实现精确的目标跟踪。BmmW-Lite+ 对 BmmW-Lite 进行了扩展,由于设备内存和功耗的限制,它允许将定位任务从边缘转移到云端。为此,BmmW-Lite+ 采用了面向目标的通信范式,在边缘设备上将初始 BLE 特征压缩成更紧凑的语义格式,从而最大限度地减少需要发送到云端的数据量。我们的实验结果表明,BmmW-Lite+ 可以将原始 BLE 特征压缩到其初始大小的 12%(从而节省网络带宽并将能耗降至最低),而对定位精度的影响可以忽略不计。
{"title":"BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication","authors":"Peizheng Li ,&nbsp;Jagdeep Singh ,&nbsp;Han Cui ,&nbsp;Carlo Alberto Boano","doi":"10.1016/j.pmcj.2024.101944","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101944","url":null,"abstract":"<div><p>Bluetooth Low Energy (BLE) has emerged as one of the reference technologies for the development of indoor localization systems, due to its increasing ubiquity, low-cost hardware, and to the introduction of direction-finding enhancements improving its ranging performance. However, the intrinsic narrowband nature of BLE makes this technology susceptible to multipath and channel interference. As a result, it is still challenging to achieve decimetre-level localization accuracy, which is necessary when developing location-based services for smart factories and workspaces. To address this challenge, we present BmmW, an indoor localization system that augments the ranging estimates obtained with BLE<!--> <!--> <!-->5.1’s constant tone extension feature with mmWave radar measurements to provide 3D localization of a mobile tag with decimetre-level accuracy. Specifically, BmmW embeds a deep neural network (DNN) that is jointly trained with both BLE and mmWave measurements, practically leveraging the strengths of both technologies. In fact, mmWave radars can locate objects and people with decimetre-level accuracy, but their effectiveness in monitoring stationary targets and multiple objects is limited, and they also suffer from a fast signal attenuation limiting the usable range to a few meters. We evaluate BmmW’s performance experimentally, and show that its joint DNN training scheme allows to track mobile tags with a mean 3D localization accuracy of 10 cm when combining angle-of-arrival BLE measurements with mmWave radar data. We further assess two variations of BmmW: BmmW-<span>Lite</span> and BmmW-<span>Lite+</span>, both tailored for single-antenna BLE devices, which eliminates the necessity for bulky and expensive multi-antenna arrays and represents a cost-effective solution that is easy to integrate into compact IoT devices. In contrast to classic BmmW (which utilizes angle-of-arrival info), BmmW-<span>Lite</span> uses raw in-phase/quadrature (I/Q) measurements, and achieves a mean localization accuracy of 36 cm, thus facilitating precise object tracking in indoor environments even when using budget-friendly single-antenna BLE devices. BmmW-<span>Lite+</span> extends BmmW-<span>Lite</span> by allowing the localization task to be transferred from the edge to the cloud due to device memory and power constraints. To this end, BmmW-<span>Lite+</span> employs a goal-oriented communication paradigm that compresses initial BLE features into a more compact <em>semantic</em> format at the edge device, which allows to minimize the amount of data that needs to be sent to the cloud. Our experimental results show that BmmW-<span>Lite+</span> can compress raw BLE features by up to 12% of their initial size (hence allowing to save network bandwidth and minimize energy consumption), with negligible impact on the localization accuracy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101944"},"PeriodicalIF":4.3,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of micro- vs. macro-flows management in QKD-secured edge computing QKD 安全边缘计算中的微观与宏观流量管理分析
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-16 DOI: 10.1016/j.pmcj.2024.101937
Claudio Cicconetti, Marco Conti, Andrea Passarella

Quantum Key Distribution (QKD) holds the promise of a secure exchange of cryptographic material between applications that have access to the same network of QKD nodes, interconnected through fiber optic or satellite links. Worldwide several such networks are being deployed at a metropolitan level, where edge computing is already offered by the telco operators to customers as a viable alternative to both cloud and on-premise hosting of computational resources. In this paper, we investigate the implications of enabling QKD for edge-native applications from a practical perspective of resource allocation in the QKD network and the edge infrastructure. Specifically, we consider the dichotomy between aggregating all the applications on the same source–destination path vs. adopting a more flexible micro-flow approach, inspired from Software Defined Networking (SDN) concepts. Our simulation results show that there is a fundamental trade-off between the efficient use of resources and the signaling overhead, which we managed to diminish with the use of suitable hybrid solutions.

量子密钥分发(QKD)有望在可访问同一 QKD 节点网络(通过光纤或卫星链路互连)的应用程序之间安全交换加密材料。在全球范围内,有几个这样的网络正在大都市一级部署,电信运营商已经向客户提供边缘计算服务,作为云计算和内部计算资源托管的可行替代方案。在本文中,我们将从 QKD 网络和边缘基础设施资源分配的实际角度出发,研究启用 QKD 对边缘本地应用的影响。具体来说,我们考虑了在同一源-目的路径上聚合所有应用与采用更灵活的微流方法(受软件定义网络(SDN)概念的启发)之间的对立。我们的仿真结果表明,在有效利用资源和信令开销之间存在着根本性的权衡,而通过使用合适的混合解决方案,我们成功地降低了信令开销。
{"title":"Analysis of micro- vs. macro-flows management in QKD-secured edge computing","authors":"Claudio Cicconetti,&nbsp;Marco Conti,&nbsp;Andrea Passarella","doi":"10.1016/j.pmcj.2024.101937","DOIUrl":"10.1016/j.pmcj.2024.101937","url":null,"abstract":"<div><p>Quantum Key Distribution (QKD) holds the promise of a secure exchange of cryptographic material between applications that have access to the same network of QKD nodes, interconnected through fiber optic or satellite links. Worldwide several such networks are being deployed at a metropolitan level, where edge computing is already offered by the telco operators to customers as a viable alternative to both cloud and on-premise hosting of computational resources. In this paper, we investigate the implications of enabling QKD for edge-native applications from a practical perspective of resource allocation in the QKD network and the edge infrastructure. Specifically, we consider the dichotomy between aggregating all the applications on the same source–destination path vs. adopting a more flexible micro-flow approach, inspired from Software Defined Networking (SDN) concepts. Our simulation results show that there is a fundamental trade-off between the efficient use of resources and the signaling overhead, which we managed to diminish with the use of suitable hybrid solutions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101937"},"PeriodicalIF":4.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000634/pdfft?md5=66f40de1122375679c5bab3134cbf374&pid=1-s2.0-S1574119224000634-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements 使用 RSSD 和 TDOA 测量的 WSN 信号源定位高效估算器
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-11 DOI: 10.1016/j.pmcj.2024.101936
Yuanyuan Zhang , T. Aaron Gulliver , Huafeng Wu , Xiaojun Mei , Jiping Li , Fuqiang Lu , Weijun Wang

Range-based localization has received considerable attention in wireless sensor networks due to its ability to efficiently locate the unknown source of a signal. However, the localization accuracy with a single set of measurements may be inadequate, especially in dynamic and noisy environments. To mitigate this problem, received signal strength difference (RSSD) and time difference of arrival (TDOA) measurements are used to develop an efficient estimator to reduce the bias and improve localization accuracy. First, the RSSD/TDOA-based maximum likelihood (ML) localization problem is transformed into a hybrid information nonnegative constrained least squares (HI-NCLS) framework. Then, this framework is used to develop an effective bias-reduction localization approach (BRLA) with a two-step linearization process. The first step employs a linear solving method (LSM) which exploits an active set method to obtain a sub-optimal estimator. The second step uses a bias reduction method (BRM) to mitigate the correlation from linearization and a weighted instrumental variables matrix (IVM) which is weakly correlated with the noise but strongly correlated with the data matrix (DM) is used in place of the DM. Performance results are presented which demonstrate that the proposed BRLA provides better localization performance than state-of-the-art methods in the literature.

基于范围的定位由于能够有效定位未知信号源而在无线传感器网络中受到广泛关注。然而,单组测量的定位精度可能不够,尤其是在动态和高噪声环境中。为缓解这一问题,利用接收信号强度差(RSSD)和到达时间差(TDOA)测量来开发一种有效的估计器,以减少偏差并提高定位精度。首先,基于 RSSD/TDOA 的最大似然(ML)定位问题被转化为混合信息非负约束最小二乘法(HI-NCLS)框架。然后,利用这一框架开发出一种有效的减少偏差定位方法 (BRLA),其线性化过程分为两步。第一步采用线性求解方法(LSM),利用主动集方法获得次优估计值。第二步采用减少偏差法(BRM)来减轻线性化产生的相关性,并使用与噪声相关性较弱但与数据矩阵(DM)相关性较强的加权工具变量矩阵(IVM)来代替 DM。性能结果表明,与文献中最先进的方法相比,拟议的 BRLA 能够提供更好的定位性能。
{"title":"An efficient estimator for source localization in WSNs using RSSD and TDOA measurements","authors":"Yuanyuan Zhang ,&nbsp;T. Aaron Gulliver ,&nbsp;Huafeng Wu ,&nbsp;Xiaojun Mei ,&nbsp;Jiping Li ,&nbsp;Fuqiang Lu ,&nbsp;Weijun Wang","doi":"10.1016/j.pmcj.2024.101936","DOIUrl":"10.1016/j.pmcj.2024.101936","url":null,"abstract":"<div><p>Range-based localization has received considerable attention in wireless sensor networks due to its ability to efficiently locate the unknown source of a signal. However, the localization accuracy with a single set of measurements may be inadequate, especially in dynamic and noisy environments. To mitigate this problem, received signal strength difference (RSSD) and time difference of arrival (TDOA) measurements are used to develop an efficient estimator to reduce the bias and improve localization accuracy. First, the RSSD/TDOA-based maximum likelihood (ML) localization problem is transformed into a hybrid information nonnegative constrained least squares (HI-NCLS) framework. Then, this framework is used to develop an effective bias-reduction localization approach (BRLA) with a two-step linearization process. The first step employs a linear solving method (LSM) which exploits an active set method to obtain a sub-optimal estimator. The second step uses a bias reduction method (BRM) to mitigate the correlation from linearization and a weighted instrumental variables matrix (IVM) which is weakly correlated with the noise but strongly correlated with the data matrix (DM) is used in place of the DM. Performance results are presented which demonstrate that the proposed BRLA provides better localization performance than state-of-the-art methods in the literature.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101936"},"PeriodicalIF":4.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141051391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure 在没有专用基础设施的情况下利用人群轨迹数据估算交通流量
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-07 DOI: 10.1016/j.pmcj.2024.101935
Subhrasankha Dey , Martin Tomko , Stephan Winter , Niloy Ganguly

Traffic count (or link count) data represents the cumulative traffic in the lanes between two consecutive signalised intersections. Typically, dedicated infrastructure-based sensors are required for link count data collection. The lack of adequate data collection infrastructure leads to lack of link count data for numerous cities, particularly those in low- and middle-income countries. Here, we address the research problem of link count estimation using crowd-sourced trajectory data to reduce the reliance on any dedicated infrastructure. A stochastic queue discharge model is developed to estimate link counts at signalised intersections taking into account the sparsity and low penetration rate (i.e., the percentage of vehicles with known trajectory) brought on by crowdsourcing. The issue of poor penetration rate is tackled by constructing synthetic trajectories entirely from known trajectories. The proposed model further provides a methodology for estimating the delay resulting from the start-up loss time of the vehicles in the queue under unknown traffic conditions. The proposed model is implemented and validated with real-world data at a signalised intersection in Kolkata, India. Validation results demonstrate that the model can estimate link count with an average accuracy score of 82% with a very low penetration rate (not in the city, but at the intersection) of 5.09% in unknown traffic conditions, which is yet to be accomplished in the current state-of-the-art.

交通流量计数(或链路计数)数据表示两个连续信号交叉口之间车道上的累计交通流量。通常情况下,链路计数数据收集需要专用的基础设施传感器。由于缺乏足够的数据收集基础设施,许多城市,尤其是中低收入国家的城市,都缺乏链路计数数据。在此,我们探讨了利用人群轨迹数据估算链路计数的研究问题,以减少对任何专用基础设施的依赖。考虑到众包带来的稀疏性和低渗透率(即已知轨迹车辆的百分比),我们开发了一种随机队列排放模型,用于估算信号交叉口的链接计数。通过完全根据已知轨迹构建合成轨迹,解决了渗透率低的问题。所提出的模型还提供了一种方法,用于估算在未知交通条件下队列中车辆的启动损失时间所导致的延迟。在印度加尔各答的一个信号灯路口,利用实际数据对所提出的模型进行了实施和验证。验证结果表明,在未知交通状况下,该模型能够以 82% 的平均准确率估算链路数,并且渗透率非常低(不是在城市中,而是在交叉路口),仅为 5.09%,这在当前最先进的技术中尚属首次。
{"title":"Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure","authors":"Subhrasankha Dey ,&nbsp;Martin Tomko ,&nbsp;Stephan Winter ,&nbsp;Niloy Ganguly","doi":"10.1016/j.pmcj.2024.101935","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101935","url":null,"abstract":"<div><p>Traffic count (or link count) data represents the cumulative traffic in the lanes between two consecutive signalised intersections. Typically, dedicated infrastructure-based sensors are required for link count data collection. The lack of adequate data collection infrastructure leads to lack of link count data for numerous cities, particularly those in low- and middle-income countries. Here, we address the research problem of link count estimation using crowd-sourced trajectory data to reduce the reliance on any dedicated infrastructure. A stochastic queue discharge model is developed to estimate link counts at signalised intersections taking into account the sparsity and low penetration rate (i.e., the percentage of vehicles with known trajectory) brought on by crowdsourcing. The issue of poor penetration rate is tackled by constructing synthetic trajectories entirely from known trajectories. The proposed model further provides a methodology for estimating the delay resulting from the start-up loss time of the vehicles in the queue under unknown traffic conditions. The proposed model is implemented and validated with real-world data at a signalised intersection in Kolkata, India. Validation results demonstrate that the model can estimate link count with an average accuracy score of 82% with a very low penetration rate (not in the city, but at the intersection) of 5.09% in unknown traffic conditions, which is yet to be accomplished in the current state-of-the-art.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101935"},"PeriodicalIF":4.3,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000610/pdfft?md5=d66231587fa7d814a717bc910b36c35b&pid=1-s2.0-S1574119224000610-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140951446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMFogV: Proactive content migration for multi-level fog computing CMFogV:多级雾计算的主动内容迁移
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-03 DOI: 10.1016/j.pmcj.2024.101933
Marcelo C. Araújo, Luiz F. Bittencourt

The popularization of Fog Computing has provided the foundation for a computational environment better suited to applications demanding low communication latency. However, Fog environments has limited resources and restricted coverage areas, besides the user mobility that needs continuous migrations to maintain accessible and nearby content. To enable applications to harness the low latency offered by Fog, it is crucial to develop migration strategies capable of addressing the complexities of the Fog environment while ensuring content availability regardless of user location. This work proposes CMFogV, a proactive content migration strategy that leverages mobility prediction in a multi-level fog. Our results show that CMFogV is able to provide enhanced flexibility in the migration decision process across a wide diversity of scenario.

雾计算的普及为建立更适合要求低通信延迟的应用的计算环境奠定了基础。然而,雾环境的资源有限,覆盖范围受限,而且用户流动性大,需要不断迁移以保持内容的可访问性和邻近性。为使应用程序能够利用雾环境提供的低延迟,关键是要制定迁移策略,既能解决雾环境的复杂性,又能确保内容的可用性,而不受用户位置的影响。本研究提出了 CMFogV,这是一种利用多级雾中移动性预测的主动内容迁移策略。我们的研究结果表明,CMFogV 能够在多种场景下为迁移决策过程提供更高的灵活性。
{"title":"CMFogV: Proactive content migration for multi-level fog computing","authors":"Marcelo C. Araújo,&nbsp;Luiz F. Bittencourt","doi":"10.1016/j.pmcj.2024.101933","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101933","url":null,"abstract":"<div><p>The popularization of Fog Computing has provided the foundation for a computational environment better suited to applications demanding low communication latency. However, Fog environments has limited resources and restricted coverage areas, besides the user mobility that needs continuous migrations to maintain accessible and nearby content. To enable applications to harness the low latency offered by Fog, it is crucial to develop migration strategies capable of addressing the complexities of the Fog environment while ensuring content availability regardless of user location. This work proposes CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span>, a proactive content migration strategy that leverages mobility prediction in a multi-level fog. Our results show that CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span> is able to provide enhanced flexibility in the migration decision process across a wide diversity of scenario.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101933"},"PeriodicalIF":4.3,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140893235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1