共查询到20条相似文献,搜索用时 15 毫秒
1.
The optimization of logistics in large building complexes with many resources, such as hospitals, require realistic facility management and planning. Current planning practices rely foremost on manual observations or coarse unverified assumptions and therefore do not properly scale or provide realistic data to inform facility planning. In this paper, we propose analysis methods to extract knowledge from large sets of network collected WiFi traces to better inform facility management and planning in large building complexes. The analysis methods, which build on a rich set of temporal and spatial features, include methods for quantification of area densities, as well as flows between specified locations, buildings or departments, classified according to the feature set. Spatio-temporal visualization tools built on top of these methods enable planners to inspect and explore extracted information to inform facility-planning activities. To evaluate the proposed methods and visualization tools, we present facility utilization analysis results for a large hospital complex covering more than 10 hectares. The evaluation is based on WiFi traces collected in the hospital’s WiFi infrastructure over two weeks observing around 18000 different devices recording more than a billion individual WiFi measurements. We highlight the tools’ ability to deduce people’s presences and movements and how they can provide respective insights into the test-bed hospital by investigating utilization patterns globally as well as selectively, e.g. for different user roles, daytimes, spatial granularities or focus areas. 相似文献
2.
Prasan Kumar Sahoo Chih-Yung Chang Sheng-Wen Chang 《Journal of Network and Computer Applications》2008,31(4):535-558
Bluetooth technology is specially designed for the wireless personal area networks to replace cable. Several challenges exist in Bluetooth scatternet formation and routing, since nodes can arrive and depart at arbitrary times. In this paper, novel route maintenance algorithms are proposed for the Bluetooth ad hoc networks, where nodes can enter or exit from the piconets time to time. Our protocols guarantee the connectivity among nodes and reconstruct the routes dynamically by considering location information of the nodes. Besides, it is proposed how to reduce the number of hops and to form the shortest route between the source and the destination due to addition of new nodes to a piconet. Performance analysis of our protocols show that they outperform in terms of end to end transmission delay, bandwidth consumption and average hop counts as compared to similar Bluetooth routing protocols that we have considered. 相似文献
3.
为了能实时监测教室人数,方便各大高校的日常教学及管理活动,提出了一种基于蓝牙4.0技术、用于统计教室人数的智能系统。本系统以基于蓝牙低功耗技术的 CC2540射频单片机为核心,通过控制红外光电传感器和温湿度传感器进行数据的采集,并通过 WiFi 模块将采集到的数据传输给远程上位机、手机等终端设备,也可以通过 WiFi 模块查询教室的信息。实际测试结果表明,该设计可靠性高、功耗低、准确度高,可广泛应用于各大高校的日常教学活动中。 相似文献
4.
5.
6.
为解决新能源汽车的安全监控和能量优化控制问题,提出了一种具有远程监控和标定功能的新能源汽车电控系统设计方案.该系统主要针对新能源汽车电控系统的网络通信功能硬件电路进行设计,利用云平台实现电控单元与手机间的无线数据通信,通过LTE/WiFi模块可实现电控单元与云平台间的数据交互.电控单元通过WiFi或蓝牙模块与手机建立连接后,通过车辆监控客户端对电控单元发送的数据进行解析和存储,实时掌握车辆状况. 相似文献
7.
Ad hoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network share the responsibility for routing, access, and communications. The mobile ad hoc network can be considered as a short-lived collection of mobile nodes communicating with each other. Such networks are more vulnerable to security threats than traditional wireless networks because of the absence of the fixed infrastructure. For providing secure communications in such networks, lots of mechanisms have been proposed since the early 1990s, which also have to deal with the limitations of the mobile ad hoc networks, including high power saving and low bandwidth. Besides, public key infrastructure (PKI) is a well-known method for providing confidential communications in mobile ad hoc networks. In 2004, Varadharajan et al. proposed a secure communication scheme for cluster-based ad hoc networks based on PKI. Since the computation overheads of the PKI cryptosystem are heavy for each involved communicating node in the cluster, we propose an ID-based version for providing secure communications in ad hoc networks. Without adopting PKI cryptosystems, computation overheads of involved nodes in our scheme can be reduced by 25% at least. 相似文献
8.
We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating
multiple pseudonyms. We show that it is possible to remotely issue certificates that can be used to test the distinctness of identities. Our certification protocols are based on geometric
techniques that establish location information in a fault-tolerant and distributed fashion. They do not rely on a centralized
certifying authority or infrastructure that has direct knowledge of entities in the system, and work in Euclidean or spherical
geometry of arbitrary dimension. They tolerate corrupt entities, including corrupt certifiers, collusion by either certification
applicants or certifiers, and either a broadcast or point-to-point message model.
The second author was supported in part by the NSF Grant CCR-0209138. 相似文献
9.
ShuiYuan Yu 《中国科学F辑(英文版)》2009,52(10):1936-1946
After entering the peripheral auditory system, a sound undergoes many significant changes. The excitation pattern describes these changes psychoacoustically as inner expression. This study investigates the relations between excitation patterns and their phonetic qualities for Chinese steady-state vowels. First, the peak positions of the envelope of excitation patterns were measured on a database. The results demonstrated that each Chinese vowel has its own special position for the representative peak of the... 相似文献
10.
With more and more wireless devices being mobile, there is a constant challenge to provide reliable and high quality communication services among these devices. In this paper, we propose a link availability-based QoS-aware (LABQ) routing protocol for mobile ad hoc networks based on mobility prediction and link quality measurement, in addition to energy consumption estimate. The goal is to provide highly reliable and better communication links with energy-efficiency. The proposed routing algorithm has been verified by NS-2 simulations. The results have shown that LABQ outperforms existing algorithms by significantly reducing link breakages and thereby reducing the overheads in reconnection and retransmission. It also reduces the average end-to-end delay for data transfer and enhances the lifetime of nodes by making energy-efficient routing decisions. 相似文献
11.
The emergence of the virtual network enterprise represents a dynamic response to the crisis of the vertical bureaucracy type of business organisation. However, its key performance criteria—interconnectedness and consistency—pose tremendous challenges as the completion of the distributed tasks of the network must be integrated across the barriers of missing face-to-face clues and cultural differences. The social integration of the virtual network involves the creation of identities of the participating nodes, the building of trust between them, and the sharing of tacit and explicit knowledge among them. The conventional organisation already doing well in these areas seems to have an edge when going virtual. The paper argues that the whole question of management and control must be reconsidered due to the particular circumstances in the ‘Network Society’. The paper outlines a suggestion for an exploratory, socio-technical research approach combining the dimensions of context, subject and action with the twin objectives of contributing to the enhancement of collaborative capabilities in virtual teams as well as improving the insights into the nature of virtual work. 相似文献
12.
Wireless Body Area Networks (WBANs) are envisaged to play crucial role in psychological, medical and non-medical applications. This paper presents iM-SIMPLE; a reliable, and power efficient routing protocol with high throughput for WBAN. We deploy sensor nodes on human body to measure the physiological parameters such as blood pressure, temperature, glucose, lactic acid, EMG, acceleration, pressure, and position. Data from sensors is forwarded to intermediate node, from where it is transmitted to sink. An end user can access the required information available at sink via internet. To minimize energy consumption of the network, we utilize multi-hop mode of communication. A cost function is introduced to select the forwarder; node with high residual energy and least distance to sink has minimum cost function value and is selected. Residual energy parameter balances the energy consumption among the sensor nodes, and least distance improves packet delivery to sink because of reduced less path loss. We formulate the minimum energy consumption and high throughput problems as an Integer Linear Program. In order to support mobility, we also consider two body postures. Simulation results confirm the performance advantage of iM-SIMPLE compared to contemporary schemes in terms of maximizing stability period and throughput of the network. 相似文献
13.
With the help of various positioning tools, individuals’ mobility behaviors are being continuously captured from mobile phones, wireless networking devices and GPS appliances. These mobility data serve as an important foundation for understanding individuals’ mobility behaviors. For instance, recent studies show that, despite the dissimilarity in the mobility areas covered by individuals, there is high regularity in the human mobility behaviors, suggesting that most individuals follow a simple and reproducible pattern. This survey paper reviews relevant results on uncovering mobility patterns from GPS datasets. Specially, it covers the results about inferring locations of significance for prediction of future moves, detecting modes of transport, mining trajectory patterns and recognizing location-based activities. The survey provides a general perspective for studies on the issues of individuals’ mobility by reviewing the methods and algorithms in detail and comparing the existing results on the same issues. Several new and emergent issues concerning individuals’ mobility are proposed for further research. 相似文献
14.
The current study investigates the joint effects of interpersonal relationships and digital media use on adolescents’ sense of identity. Questionnaires were administered to a sample of 2079 students (57% female) between the ages of 11 and 19 years (M = 15.4 years) attending one of seven secondary schools in Bermuda. Using structural equation modeling, the author found that mothers and friends play an important role in adolescents’ lives, with both relationships contributing in positive ways to respondents’ self-concept clarity. Further, the results showed that mother relationship quality affected adolescents’ self-concept clarity both directly and indirectly, through the positive impact it had on friendship quality. Friends also played a mediating role in relation to aspects of adolescents’ digital media use. Specifically, the negative association detected between online identity expression/exploration and self-concept clarity was mediated partially by low friendship quality. Going online to communicate with one’s friends appeared to play a more positive role in adolescents’ sense of identity. The results showed that online peer communication affected self-concept clarity indirectly through its positive impact on friendship quality. 相似文献
15.
Routing in Delay Tolerant Networks is very challenging because of frequent disconnections. One cause of disconnection is node movement. Disconnections can be overcome by finding a set of sequential opportunistic encounters between pairs of mobile nodes. These encounters can be used for message forwarding and delivery. In this context, understanding user mobile behaviour is essential to design effective and efficient network protocols. This paper presents a generic methodology to model and find periodic encounter patterns by using the auto-persistence function and detection techniques derived from it. From the studies on four real mobility traces, we are able to detect strong weekly periodic encounter patterns with an accuracy of up to 100%. The experimental results show that periodic encounter patterns in real mobility traces do not last long, e.g., years, because they are interrupted by unexpected events from time to time. Nonetheless our experimental results show that those periodic encounters can still last up to a few months. Furthermore, we show that, for some of the mobility traces, the network formed by periodic encounters forms a small-world structure. 相似文献
16.
将宏观移动性管理的主机标识协议(HIP)应用于分布式移动性管理(DMM)构架,并将聚合服务器(RVS)与DMM中的移动性接入路由MAR功能集成于分布式接入网关(D-GW)。采用扩展HIP协议数据包头的参数,在注册D-GW的HIP BEX消息中携带切换前D-GW的主机标识符的二元组(HIT,IP地址),新D-GW根据此二元组信息向前一个D-GW注册并建立的隧道,将缓存在前D-GW中的数据转给新D-GW。这一切换机制可有效地保证数据完整性,仿真结果表明该方法能有效减少总的信令开销,同时基于HIP的移动性管理使节点的安全性得到了保证。 相似文献
17.
数据关联是视觉传感网络联合监控系统的基本问题之一. 本文针对存在漏检条件下视觉传感网络的数据关联问题, 提出高阶时空观测模型并在此基础上建立了数据关联问题的动态贝叶斯网络描述. 给出了数据关联精确推理算法并分析了其计算复杂性, 接着根据不同的独立性假设提出两种近似推理算法以降低算法运算量, 并将提出的推理算法嵌入到EM算法框架中,使该算法能够应用于目标外观模型未知的情况. 仿真和实验结果表明了所提方法的有效性. 相似文献
18.
This study investigates members’ satisfaction with interest-based social network communities from an identity-reconstruction perspective. Drawing upon the self-discrepancy theory and the regulatory focus theory, we theoretically modeled the factors (relating to identity reconstruction) that influence members’ satisfaction with social network communities and further investigated whether these influences on satisfaction are contingent upon how much the virtual identity is reconstructed. Data (n = 1063) were collected from six interest-based social network communities. Results support most main effects and further support two moderating effects. The effect of bridging social capital on satisfaction and the effect of privacy concern on satisfaction are contingent upon identity reconstruction. 相似文献
19.
完全加权正负关联模式在文本挖掘、信息检索等方面具有重要的理论和应用价值.针对现有挖掘算法的不足,构建完全加权正负关联模式评价框架SPRMII(support-probability ratio-mutual information-interest),提出完全加权项集双兴趣度阈值剪枝策略,然后基于该剪枝策略提出一种新的基于SPRMII框架的完全加权正负关联模式挖掘算法AWAPM_SPRMII(all-weighted association patterns mining based on SPRMII).该算法克服了传统挖掘算法缺陷并采用新剪枝方法从完全加权数据库中挖掘有趣的频繁项集和负项集,通过项集权重维数比的简单计算和SPRMII评价框架,从这些项集中挖掘有效的完全加权正负关联规则.理论分析和实验表明,该算法有效,具有良好的扩展性,与现有经典挖掘算法比较,获得了良好的挖掘性能. 相似文献
20.
在分析研究具有代表性的关联知识挖掘算法的基础上,提出了挖掘频繁模式的一个新的数据库存储结构AFP-树,并在此结构上设计了一个频繁模式挖掘算法。理论研究已经阐明了AFP-树的有效性和相关算法的高效性。 相似文献