Moustafa Fayad, A. Mostefaoui, Samir Chouali, S. Benbernou
{"title":"Fall Detection Application for the Elderly in the Family Heroes System","authors":"Moustafa Fayad, A. Mostefaoui, Samir Chouali, S. Benbernou","doi":"10.1145/3345770.3356738","DOIUrl":"https://doi.org/10.1145/3345770.3356738","url":null,"abstract":"Population aging is a considerable challenge for a global society. Indeed, it raises several concerns and gives more or fewer alarmist projections of social-economic problems, that it could engender. Technological solutions to address the issue of aging are now a necessity. Systems based on these solutions combine wearable and ambient sensors, processing software, and user interfaces. Their objective is to monitor dependent and frail elderly people in institutions and/or home. The healthcare monitoring for elderly people is a growing application axis thanks to the massive technology development. Family Heroes is a new concept of an automatic healthcare monitoring system based on the Internet of things. In this paper, we will present the global architecture of our system and the preliminary results of the fall detection using only the Kinect V2. The results show the system, in the first stage of validation, detect 70% of falls using a novel approach threshold-based on the variation of angels of the upper body during the movement cycle.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. S. Oliveira, Pedro O. S. Vaz de Melo, A. C. Viana
{"title":"Measuring Power Relations Among Locations From Mobility Data","authors":"L. S. Oliveira, Pedro O. S. Vaz de Melo, A. C. Viana","doi":"10.1145/3345770.3356744","DOIUrl":"https://doi.org/10.1145/3345770.3356744","url":null,"abstract":"Key location identification in cities is central in human mobility investigation as well as for societal problem comprehension. In this context, we propose a methodology to quantify the power of point-of-interests (POIs) in their vicinity, in terms of impact and independence - the first work in the literature (to the best of our knowledge). Different from literature, we consider the flow of people in our analysis, instead of the number of neighbor POIs or their structural locations in the city. Thus, we first modeled POI's visits using the multiflow graph model where each POI is a node and the transitions of users among POIs are a weighted direct edge. Using this multiflow graph model, we compute the attract, support and independence powers. The attract power and support power measure how many visits a POI gather from and disseminate over its neighborhood, respectively. Moreover, the independence power captures the capacity of POI to receive visitors independently from other POIs. Using a dataset describing the mobility of individuals in the Dartmouth College campus, we identify a slight dependence among buildings as well as the tendency of people to be mostly stationary in few buildings with short transit periods among them.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fingerprinting using Fine Timing Measurement","authors":"Jérôme Henry, N. Montavont","doi":"10.1145/3345770.3356736","DOIUrl":"https://doi.org/10.1145/3345770.3356736","url":null,"abstract":"The time-of-flight based ranging mechanism defined in 802.11-2016 offers a range of parameters too rich to be implemented with similar pattern among vendors, unless further guidance is formulated on what parameter sets are reasonable. We examine 802.11-2016 FTM, and show that simple FTM frame observation can easily allow for individual chipset identification. We also show that a learning machine can recognize individual machines performing FTM exchanges, even when these machines implement the same chipset or the same hardware platform. We also suggest ways to mitigate individual device patterning based on FTM exchange observation.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Coordination Framework for Experimentation in 5G Testbeds: URLLC as Use Case","authors":"A. Díaz, Delia Rico, B. García, P. Merino","doi":"10.1145/3345770.3356742","DOIUrl":"https://doi.org/10.1145/3345770.3356742","url":null,"abstract":"The coordination framework presented in this paper targets the overall supervision and E2E configuration of 5G testbeds. Features provided by the framework cover service deployment, control, management, monitoring, analytics and security in 5G testbeds to fulfil the goals of 5G Key Performance Indicators (KPIs) monitoring and validation. Moreover, this framework offers the functionalities needed for defining and automating the execution of 5G experiments. The framework is also responsible for exposing East/West interfaces to coordination entities in other testbeds, facilitating interworking. Finally, we demonstrate the applicability of the coordination framework to the validation of URLLC (Ultra-Reliable and Low-Latency Communications) KPIs.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122784413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Offloading and Resource Management Techniques in a Mobile Cloud Environment","authors":"Shichao Guan, A. Boukerche","doi":"10.1145/3345770.3365110","DOIUrl":"https://doi.org/10.1145/3345770.3365110","url":null,"abstract":"Mobile Cloud Computing (MCC) is used to extend the computing capability of mobile devices in terms of calculation, storage and energy. Offloading technologies are extensively utilized as the enabler for resource provisioning to achieve energy reservation. In this paper, we discuss an present the design and implementation of energy-aware offloading and resource management schemes for mobile cloud systems while identifying the challenging design at the system-level. We also present a guideline towards their design and present a classification of the proposed techniques based upon the offloading process and resource management technologies.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ouns Bouachir, M. Aloqaily, F. Garcia, N. Larrieu, T. Gayraud
{"title":"Testbed of QoS Ad-Hoc Network Designed for Cooperative Multi-drone Tasks","authors":"Ouns Bouachir, M. Aloqaily, F. Garcia, N. Larrieu, T. Gayraud","doi":"10.1145/3345770.3356740","DOIUrl":"https://doi.org/10.1145/3345770.3356740","url":null,"abstract":"Thanks to technological advances in information and communications, Unmanned Aerial Vehicles (UAVs) (aka drones) technology has become one of the most important service delivery inventions these days. Equipped with sensors and cameras, these technologies can perform much on-demand critical application ranging from military and environmental to rescue operations. These UAVs devices, sometimes tiny, that can replace human and manned aircraft in several tasks, have been utilized to perform various types of services and applications more efciently. However, the deployment side of such emerging technology is still facing many issues and challenges. Using multi-drones or swarm of drones, together to accomplish one operation is one of these recent challenges. Such a system requires a high level of delicacy and cooperation to achieve the required autonomy and reduce human interaction as possible. Communication is one of the biggest challenges in these systems, since the devices should keep exchanging various types of messages with different Quality of Service (QoS) requirements. In this paper, a collaborative autonomous system of swarm drones based on deep learning has been proposed and a testbed of cooperative UAVs' mission to validate the performance of the dedicated QoS communication system using Paparazzi drones The proposed system is aware of the drones' requirements in term of QoS and able to meet with their dynamic demands.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131298045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. C. Domingues, H. S. Santana, Fabrício A. Silva, Pedro O. S. Vaz de Melo, A. Loureiro
{"title":"Are We Still Friends? Evaluating Tie Persistence in Mobility Traces","authors":"A. C. Domingues, H. S. Santana, Fabrício A. Silva, Pedro O. S. Vaz de Melo, A. Loureiro","doi":"10.1145/3345770.3356743","DOIUrl":"https://doi.org/10.1145/3345770.3356743","url":null,"abstract":"The advent of mobility networks brought to the surface the need to understand how mobile entities behave, specially considering how the interactions among them are affected. With the arrival of wireless and mobile networks such as 5G, the characterization of contacts between users becomes more and more important. Thereof, protocols, algorithms and applications started to lure on this kind of information. However, we still have to understand better how these interactions change over time and what are the factors that rule them. In this work, we analyze a mobility trace containing data about Wi-Fi users in a university campus over the period of one year to understand how time and space affect their relationships. To do so, we use a set of previously studied metrics to classify contacts between users into random and social. This classification is based on the number of contacts in common between two users and their encounter regularity, i.e., how frequently they meet during their routine. Additionally, this study contributes by going one step further and classifying users into those same categories according to their contacts distribution. Then, we consider how these users and contacts evolve over time, and what is the role of location and time in this evolution. Finally, we discuss how such evolution information can be used to provide better solutions in mobile networks, such as through the ability to predict how long a contact will last, or the ability to measure how qualified a certain user is to deliver a message.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132694990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Compressed Block Acknowledgment in IEEE 802.11ax","authors":"Jan Friedrich, S. Günther, C. Lindemann","doi":"10.1145/3345770.3356735","DOIUrl":"https://doi.org/10.1145/3345770.3356735","url":null,"abstract":"IEEE 802.11ax utilizes frame aggregation and compressed block acknowledgements to reduce the MAC overhead and to increase the goodput. We analyze IEEE 802.11ax frame aggregation in error-prone environments and propose to adaptively limit the MPDU size. This results in MAC frames that are still small enough to have a high transmission success rate. A performance study using the discrete-event simulator ns-3 illustrates the benefits of the proposed approach. We find that a high retransmission rate results in a low utilization of the acknowledgment window and discuss its major negative impact on the goodput. Our delay-related studies further show that MAC mechanisms like strict ordering contribute disproportionally to increased latency due to head-of-line blocking, especially under high error rate conditions. We conclude that for decreased delays, smaller MPDUs are beneficial.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124328117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keerthiraj Nagaraj, Swapnil Sunilkumar Bhasale, J. Mcnair, A. Helmy
{"title":"Vulnerability Assessment and Classification based on Influence Metrics in Mobile Social Networks","authors":"Keerthiraj Nagaraj, Swapnil Sunilkumar Bhasale, J. Mcnair, A. Helmy","doi":"10.1145/3345770.3356737","DOIUrl":"https://doi.org/10.1145/3345770.3356737","url":null,"abstract":"In emerging 5G wireless systems, Mobile Social Networks (MSN) will play an important role for providing data services and offloading data traffic from cellular networks. MSNs are vulnerable to various security attacks because of the ways users move and collaborate. Since most protocols for MSNs are designed based on social behaviors of users, it is important to understand the impact of user behavior on network vulnerability. This can provide valuable insights into crucial factors, such as how easily a network loses its connectivity, or a network's ability to form strong communities. We present a novel vulnerability assessment and classification scheme based on structural, social and influence distribution metrics in mobile social networks. We design a vulnerability index metric (VI) to investigate the level of damage inflicted when networks are subjected to both targeted and random attacks. Then, we use influence distribution metrics and various machine learning based classifiers to determine the vulnerability levels for various network states. Finally, we define a Mean Information Diffusion index to determine the information dissemination capability of a network, given the vulnerability state. Our results revealed that campus WLAN traces, represented by the Time Variant Community model, exhibit highly vulnerable states that reduce the network's ability to disseminate information by up to 16%.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Learning of Hop Count Distributions in Ad Hoc Networks","authors":"S. Shamoun","doi":"10.1145/3345770.3356745","DOIUrl":"https://doi.org/10.1145/3345770.3356745","url":null,"abstract":"This is a study of the feasibility of learning the hop count distribution of a mobile ad hoc network using in-network data. The nodes maintain a histogram of the hop count from the source of all packets received and share the histograms with one another. This can be used to learn the distribution between all pairs of nodes or groups of nodes. The effectiveness of this method and the effect of various factors is shown by simulation. The advantage of this method over theoretical and experimental analysis of the hop count distribution is that it is not tied to specific models of node distribution, propagation, and network protocols, and can be used to learn the distribution in real time. It is useful for the dynamic optimization of methods needed for the efficient and effective operation of an ad hoc network.","PeriodicalId":285517,"journal":{"name":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132549227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}