49 research outputs found

    Inferring Unusual Crowd Events From Mobile Phone Call Detail Records

    Full text link
    The pervasiveness and availability of mobile phone data offer the opportunity of discovering usable knowledge about crowd behaviors in urban environments. Cities can leverage such knowledge in order to provide better services (e.g., public transport planning, optimized resource allocation) and safer cities. Call Detail Record (CDR) data represents a practical data source to detect and monitor unusual events considering the high level of mobile phone penetration, compared with GPS equipped and open devices. In this paper, we provide a methodology that is able to detect unusual events from CDR data that typically has low accuracy in terms of space and time resolution. Moreover, we introduce a concept of unusual event that involves a large amount of people who expose an unusual mobility behavior. Our careful consideration of the issues that come from coarse-grained CDR data ultimately leads to a completely general framework that can detect unusual crowd events from CDR data effectively and efficiently. Through extensive experiments on real-world CDR data for a large city in Africa, we demonstrate that our method can detect unusual events with 16% higher recall and over 10 times higher precision, compared to state-of-the-art methods. We implement a visual analytics prototype system to help end users analyze detected unusual crowd events to best suit different application scenarios. To the best of our knowledge, this is the first work on the detection of unusual events from CDR data with considerations of its temporal and spatial sparseness and distinction between user unusual activities and daily routines.Comment: 18 pages, 6 figure

    De-anonymizable location cloaking for privacy-controlled mobile systems

    Get PDF
    The rapid technology upgrades of mobile devices and the popularity of wireless networks significantly drive the emergence and development of Location-based Services (LBSs), thus greatly expanding the business of online services and enriching the user experience. However, the personal location data shared with the service providers also leave hidden risks on location privacy. Location anonymization techniques transform the exact location of a user into a cloaking area by including the locations of multiple users in the exposed area such that the exposed location is indistinguishable from that of the other users. However in such schemes, location information once perturbed cannot be recovered from the cloaking region and as a result, users of the location cannot obtain fine granular information even when they have access to it. In this paper, we propose Dynamic Reversible Cloaking (DRC) a new de-anonymziable location cloaking mechanism that allows to restore the actual location from the perturbed information through the use of an anonymization key. Extensive experiments using realistic road network traces show that the proposed scheme is efficient, effective and scalable

    Measuring player’s behaviour change over time in public goods game

    Get PDF
    An important issue in public goods game is whether player's behaviour changes over time, and if so, how significant it is. In this game players can be classified into different groups according to the level of their participation in the public good. This problem can be considered as a concept drift problem by asking the amount of change that happens to the clusters of players over a sequence of game rounds. In this study we present a method for measuring changes in clusters with the same items over discrete time points using external clustering validation indices and area under the curve. External clustering indices were originally used to measure the difference between suggested clusters in terms of clustering algorithms and ground truth labels for items provided by experts. Instead of different cluster label comparison, we use these indices to compare between clusters of any two consecutive time points or between the first time point and the remaining time points to measure the difference between clusters through time points. In theory, any external clustering indices can be used to measure changes for any traditional (non-temporal) clustering algorithm, due to the fact that any time point alone is not carrying any temporal information. For the public goods game, our results indicate that the players are changing over time but the change is smooth and relatively constant between any two time points

    Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity

    Get PDF
    Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymizing spatial region, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct k locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of information leakage in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems.

    Making tourist guidance systems more intelligent, adaptive and personalised using crowd sourced movement data

    Get PDF
    Ambient intelligence (AmI) provides adaptive, personalized, intelligent, ubiquitous and interactive services to wide range of users. AmI can have a variety of applications, including smart shops, health care, smart home, assisted living, and location-based services. Tourist guidance is one of the applications where AmI can have a great contribution to the quality of the service, as the tourists, who may not be very familiar with the visiting site, need a location-aware, ubiquitous, personalised and informative service. Such services should be able to understand the preferences of the users without requiring the users to specify them, predict their interests, and provide relevant and tailored services in the most appropriate way, including audio, visual, and haptic. This paper shows the use of crowd sourced trajectory data in the detection of points of interests and providing ambient tourist guidance based on the patterns recognised over such data

    Entropy of a Kerr-de Sitter black hole due to arbitrary spin fields

    Full text link
    The Newman-Penrose formalism is used to derive the Teukolsky master equations controlling massless scalar, neutrino, electromagnetic, gravitino, and gravitational field perturbations of the Kerr-de Sitter spacetime. Then the quantum entropy of a non-extreme Kerr-de Sitter black hole due to arbitrary spin fields is calculated by the improved thin-layer brick wall model. It is shown that the subleading order contribution to the entropy is dependent on the square of the spins of particles and that of the specific angular momentum of black holes as well as the cosmological constant. The logarithmic correction of the spins of particles to the entropy relies on the rotation of the black hole and the effect of the cosmological constant.Comment: 28 pages, two figures, Revtex4.0. Final revised version to appear in PR

    Transformation tools enabling the implementation of nature-based solutions for creating a resourceful circular city

    Get PDF
    The linear pattern of production-consumption-disposal of cities around the world will continue to increase the emission of pollutants and stocks of waste, as well as to impact on the irreversible deterioration of non-renewable stocks of raw materials. A transition towards a circular pattern proposed by the concept of ‘Circular Cities’ is gaining momentum. As part of this urban transition, the emergent use of Nature-based Solutions (NBS) intends to shift public opinion and utilize technology to mitigate the urban environmental impact. In this paper, an analysis of the current research and practical investments for implementing NBS under the umbrella of Circular Cities is conducted. A combined appraisal of the latest literature and a survey of ongoing and completed National-European research and development projects provides an overview of the current enabling tools, methodologies, and initiatives for public engagement. It also identifies and describes the links between facilitators and barriers with respect to existing policies and regulations, public awareness and engagement, and scientific and technological instruments. The paper concludes introducing the most promising methods, physical and digital technologies that may lead the way to Sustainable Circular Cities. The results of this research provide useful insight for citizens, scientists, practitioners, investors, policy makers, and strategists to channel efforts on switching from a linear to a circular thinking for the future of cities

    Higher-Dimensional Black Holes: Hidden Symmetries and Separation of Variables

    Full text link
    In this paper, we discuss hidden symmetries in rotating black hole spacetimes. We start with an extended introduction which mainly summarizes results on hidden symmetries in four dimensions and introduces Killing and Killing-Yano tensors, objects responsible for hidden symmetries. We also demonstrate how starting with a principal CKY tensor (that is a closed non-degenerate conformal Killing-Yano 2-form) in 4D flat spacetime one can "generate" 4D Kerr-NUT-(A)dS solution and its hidden symmetries. After this we consider higher-dimensional Kerr-NUT-(A)dS metrics and demonstrate that they possess a principal CKY tensor which allows one to generate the whole tower of Killing-Yano and Killing tensors. These symmetries imply complete integrability of geodesic equations and complete separation of variables for the Hamilton-Jacobi, Klein-Gordon, and Dirac equations in the general Kerr-NUT-(A)dS metrics.Comment: 33 pages, no figures, updated references and corrected typo
    corecore