18 research outputs found

    Scalable Mining of Common Routes in Mobile Communication Network Traffic Data

    Get PDF
    A probabilistic method for inferring common routes from mobile communication network traffic data is presented. Besides providing mobility information, valuable in a multitude of application areas, the method has the dual purpose of enabling efficient coarse-graining as well as anonymisation by mapping individual sequences onto common routes. The approach is to represent spatial trajectories by Cell ID sequences that are grouped into routes using locality-sensitive hashing and graph clustering. The method is demonstrated to be scalable, and to accurately group sequences using an evaluation set of GPS tagged data

    Autonomous Accident Monitoring Using Cellular Network Data

    Get PDF
    Mobile communication networks constitute large-scale sensor networks that generate huge amounts of data that can be refined into collective mobility patterns. In this paper we propose a method for using these patterns to autonomously monitor and detect accidents and other critical events. The approach is to identify a measure that is approximately time-invariant on short time-scales under regular conditions, estimate the short and long-term dynamics of this measure using Bayesian inference, and identify sudden shifts in mobility patterns by monitoring the divergence between the short and long-term estimates. By estimating long-term dynamics, the method is also able to adapt to long-term trends in data. As a proof-of-concept, we apply this approach in a vehicular traffic scenario, where we demonstrate that the method can detect traffic accidents and distinguish these from regular events, such as traffic congestions

    Knowing Your Population: Privacy-Sensitive Mining of Massive Data

    Full text link
    Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications. Mining telecommunication traffic and transactions data for such purposes is controversial, in particular raising issues of privacy. However, our hypothesis is that privacy-sensitive uses are possible and often beneficial enough to warrant considerable research and development efforts. Our work contends that peoples behavior can yield patterns of both significant commercial, and research, value. For such purposes, methods and algorithms for mining telecommunication data to extract commonly used routes and locations, articulated through time-geographical constructs, are described in a case study within the area of transportation planning and analysis. From the outset, these were designed to balance the privacy of subscribers and the added value of mobility patterns derived from their mobile communication traffic and transactions data. Our work directly contrasts the current, commonly held notion that value can only be added to services by directly monitoring the behavior of individuals, such as in current attempts at location-based services. We position our work within relevant legal frameworks for privacy and data protection, and show that our methods comply with such requirements and also follow best-practice

    Development of origin–destination matrices using mobile phone call data

    Get PDF
    In this research, we propose a methodology to develop OD matrices using mobile phone Call Detail Records (CDR) and limited traffic counts. CDR, which consist of time stamped tower locations with caller IDs, are analyzed first and trips occurring within certain time windows are used to generate tower-to-tower transient OD matrices for different time periods. These are then associated with corresponding nodes of the traffic network and converted to node-to-node transient OD matrices. The actual OD matrices are derived by scaling up these node-to-node transient OD matrices. An optimization based approach, in conjunction with a microscopic traffic simulation platform, is used to determine the scaling factors that result best matches with the observed traffic counts. The methodology is demonstrated using CDR from 2.87 million users of Dhaka, Bangladesh over a month and traffic counts from 13 key locations over 3 days of that month. The applicability of the methodology is supported by a validation study

    Scalable and Energy Efficient Software Architecture for Human Behavioral Measurements

    Get PDF
    Understanding human behavior is central to many professions including engineering, health and the social sciences, and has typically been measured through surveys, direct observation and interviews. However, these methods are known to have drawbacks, including bias, problems with recall accuracy, and low temporal fidelity. Modern mobile phones have a variety of sensors that can be used to find activity patterns and infer the underlying human behaviors, placing a heavy load on the phone's battery. Social science researchers hoping to leverage this new technology must carefully balance the fidelity of the data with the cost in phone performance. Crucially, many of the data collected are of limited utility because they are redundant or unnecessary for a particular study question. Previous researchers have attempted to address this problem by modifying the measurement schedule based on sensed context, but a complete solution remains elusive. In the approach described here, measurement is made contingent on sensed context and measurement objectives through extensions to a configuration language, allowing significant improvement to flexibility and reliability. Empirical studies indicate a significant improvement in energy efficiency with acceptable losses in data fidelity

    A Picture of Present Ubicomp Research Exploring Publications from Important Events in the Field

    Get PDF
    In this work we use a dataset of papers published in top conferences focused on ubiquitous computing (ubicomp) to provide an overview and analysis of recent ubiquitous computing research performed internationally and in Brazil. The contributions of this study are twofold. First, we extracted useful information from our dataset such as representativeness of authors and institutions, and the formation of communities. Second, we analyzed all papers published between 2010 and 2011 in all top international conferences, creating a taxonomy of recent ubicomp research performed internationally. Afterthat we mapped SBCUP papers (Brazilian ubicomp conference) according to this taxonomy, which enables the comparison of international and national research. This study is useful to guide novices in the field and it also provides experienced researchers with facts enabling the discussion of ubicomp research.Key words: Ubiquitous computing, scientific network, collaboration network, Pervasive, Percom, Ubicomp, SBCUP, taxonomy, characterization

    Group Mobility Detection and User Connectivity Models for Evaluation of Mobile Network Functions

    Get PDF
    Group mobility in mobile networks is responsible for dynamic changes in user accesses to base stations, which eventually lead to degradation of network quality of service (QoS). In particular, the rapid movement of a dense group of users intensively accessing the network, such as passengers on a train passing through a densely populated area, significantly affects the perceived network QoS. For better design and operation of mobile network facilities and functions in response to this issue, monitoring group mobility and modeling the access patterns in group mobility scenarios are essential. In this paper, we focus on fast and dense group mobility and mobile network signaling data (control-plane data), which contains information related to mobility and connectivity. Firstly, we develop a lightweight method of group mobility detection to extract train passengers from all users\u27 signaling data without relying on precise location information about users, e.g., based on GPS. Secondly, based on the same signaling data and the results obtained by the detection method, we build connected/idle duration models for train users and non-train users. Finally, we leverage these models in mobile network simulations to assess the effectiveness of a dynamic base station switching/orientation scheme to mitigate QoS degradation with low power consumption in a group mobility scenario. The obtained models reveal that train users consume 3.5 times more resources than non-train users, which proves that group mobility has a significant effect on mobile networks. The simulation results show that the dynamic scheme of base station improves users\u27 perceived throughput, latency and jitter with small amount of additional power consumption in case of a moderate number of train users, but its ineffectiveness with larger number of train users is also shown. This would suggest that group mobility detection and the obtained connection/idle duration models based solely on control-plane data analytics are usable and useful for the development of mobility-aware functions in base stations
    corecore