8,298 research outputs found
Scalable Mining of Common Routes in Mobile Communication Network Traffic Data
A probabilistic method for inferring common routes from mobile communication network traffic data is presented. Besides providing mobility information, valuable in a multitude of application areas, the method has the dual purpose of enabling efficient coarse-graining as well as anonymisation by mapping individual sequences onto common routes. The approach is to represent spatial trajectories by Cell ID sequences that are grouped into routes using locality-sensitive hashing and graph clustering. The method is demonstrated to be scalable, and to accurately group sequences using an evaluation set of GPS tagged data
A survey of machine learning techniques applied to self organizing cellular networks
In this paper, a survey of the literature of the past fifteen years involving Machine Learning (ML) algorithms applied to self organizing cellular networks is performed. In order for future networks to overcome the current limitations and address the issues of current cellular systems, it is clear that more intelligence needs to be deployed, so that a fully autonomous and flexible network can be enabled. This paper focuses on the learning perspective of Self Organizing Networks (SON) solutions and provides, not only an overview of the most common ML techniques encountered in cellular networks, but also manages to classify each paper in terms of its learning solution, while also giving some examples. The authors also classify each paper in terms of its self-organizing use-case and discuss how each proposed solution performed. In addition, a comparison between the most commonly found ML algorithms in terms of certain SON metrics is performed and general guidelines on when to choose each ML algorithm for each SON function are proposed. Lastly, this work also provides future research directions and new paradigms that the use of more robust and intelligent algorithms, together with data gathered by operators, can bring to the cellular networks domain and fully enable the concept of SON in the near future
Caching-Aided Collaborative D2D Operation for Predictive Data Dissemination in Industrial IoT
Industrial automation deployments constitute challenging environments where
moving IoT machines may produce high-definition video and other heavy sensor
data during surveying and inspection operations. Transporting massive contents
to the edge network infrastructure and then eventually to the remote human
operator requires reliable and high-rate radio links supported by intelligent
data caching and delivery mechanisms. In this work, we address the challenges
of contents dissemination in characteristic factory automation scenarios by
proposing to engage moving industrial machines as device-to-device (D2D)
caching helpers. With the goal to improve reliability of high-rate
millimeter-wave (mmWave) data connections, we introduce the alternative
contents dissemination modes and then construct a novel mobility-aware
methodology that helps develop predictive mode selection strategies based on
the anticipated radio link conditions. We also conduct a thorough system-level
evaluation of representative data dissemination strategies to confirm the
benefits of predictive solutions that employ D2D-enabled collaborative caching
at the wireless edge to lower contents delivery latency and improve data
acquisition reliability
PowerSpy: Location Tracking using Mobile Device Power Analysis
Modern mobile platforms like Android enable applications to read aggregate
power usage on the phone. This information is considered harmless and reading
it requires no user permission or notification. We show that by simply reading
the phone's aggregate power consumption over a period of a few minutes an
application can learn information about the user's location. Aggregate phone
power consumption data is extremely noisy due to the multitude of components
and applications that simultaneously consume power. Nevertheless, by using
machine learning algorithms we are able to successfully infer the phone's
location. We discuss several ways in which this privacy leak can be remedied.Comment: Usenix Security 201
- …