SlideShare a Scribd company logo
1 of 27
Bichromatic Reverse Nearest Neighbours
in Mobile P2P Networks
Jessie Nghiem, Kiki Maulana
Agustinus Borgy Waluyo, David Green, David Taniar
Inspiring example   Earthquake and rescue teams




3/31/2013                                         2
Motivation

 Advances in mobile technology




3/31/2013                        3
Motivation
                                               1.   Scalability
 Limitations of Centralized Systems            2.   Bottleneck

    Moving objects          Wide-range comm.
                                               3.   Low fault-tolerance
    Interest objects        P2P comm.




3/31/2013   (a) Centralized Systems                    (b) P2P Systems    4
Ultimate Aim



                     “… to harness collaborative power of peers
            for spatial query processing in Mobile Environment”




3/31/2013                                                         5
Problem definition
  – Bichromatic Reverse Nearest Neighbour (BRNN)
                                           Query point
                                                                  Moving
                                 i0                               objects
Circle from the object
of interest to its                                                    Bichromatic
nearest moving object                 i1
                                                                      Objects of
                                                                      interest




                  io and i1 are the results of the RNN query from q
  3/31/2013                                                                        6
Related work                                                   Propose:
     –      Tao, Y., Papadias, D., Lian, X.: Reverse
            knn search in arbitrary dimensionality.
                                                            • Limitations: P2P
            In: Proceedings of the Thirtieth                  – Centralized approach
            international conference on Very large
            data bases , VLDB '04.                            – Only deal with
                                                                monochromatic RNNs
                       H-(p0)                                    Bichromatic




      Half-space pruning. Any point that lies in the
      shaded half- space H-(p0)
       is always closer to p0 than to q and cannot be the
      RNN for this reason.
3/31/2013                                                                              7
Definitions
                                   Negative half plane
Positive half plane


              Query node




                                    Peer node




                           Boundary line

  3/31/2013                                              8
Definitions
                                                              Object of interest o
• Boundary region




• If B is closed, B: boundary polygon.

• The boundary polygon B is called a
  tight polygon iff any object of interest
  oi inside B regards q as the closest
  moving object.

                                         Boundary polygon B



3/31/2013                                                                     9
How to build a tight polygon                     The next processing peer is q4
                                                     outside C

                                         p4           C(q, qq0)


                                                          TIGHT
                                                     Boundary polygon




                                                     Farthest vertex
                                          q0




P = {p0, p1, …, p4,,p5, p6, …} is a priority queue    Reflection point of q thru v0
    3/31/2013                                                                    10
Construct the
            polygon for filtering
            objects of interest




3/31/2013                    11
Exhaustive Search vs Centralized Search




            Remarkably efficient in saving energy and time

3/31/2013                                                    12
Only sends query to
            the peers that build B




3/31/2013                    13
Optimized Search versa Exhaustive Search




            Approximate accuracy rate with less mean latency


3/31/2013                                                      14
Simulation framework


                       - Based on OMNet++ and MiXiM
                       - Using network interface card
                       which follows
                       IEEE 802.15.4 standard for
                       bluetooth networks




3/31/2013                                               15
Simulation framework
Simulation model


                         Parameters        Value
                         Playground        87.1km2
                         No. of MOs        7600
                         No. of IOs        550
                         Cache Size        50
                         Expected no. of   2
                         queries/MO
                         Simulation time   30s



  3/31/2013                                        16
Simulation Results – P2P Search versa Centralized Search




3/31/2013                                             17
Optimized Search versa Exhaustive Search




3/31/2013                                  18
Simulation Results – No. of Peers Pruned and Stop Hits




3/31/2013         Optimized Search Algorithm             19
Conclusion

•   P2P Search significantly save communication cost and 43%
    processing time compared to Centralized Search
•   Optimized Search reduces the number of queried peers and then
    response time while it maintains accuracy rate approximate to that
    of Exhaustive Search.
•   A practically feasible option for a large-scale and busy network




3/31/2013                                                              20
3/31/2013   22
Problem Statement

•   Let P and O be two sets of points in the same data space.
•   Given a point p є P, a BRNN query finds all the points o є O whose
    nearest neighbours in P are p, namely, there does not exist any other
    point p0 є P such that d(o, p0) < d(o, p).




3/31/2013                                                                23
System Overview

                          Beacon message


                          Ack. message
     Query
                                                            Peers
     Node                 Query message


                          Reply message


             Communication between Query node and Peers
                    Three phases:
                       1. Initialization and Peer Discovery
                       2. Constructing a Boundary Polygon and
                          Sending Queries
                       3. Pruning Interest Objects
 3/31/2013                                                          24
Definitions

•   q, p
•   P ={p1,…. pH}
        is a priority queue of peers of q. |P| = H.
•   Boundary line (b1)


•




    3/31/2013                                         25
Lemma – How to build a tight polygon

If ∃pi є priority queue P, such that dist(q; pi) ≥ dist(q; vj), then B is a
tight polygon.


Put another way, we do not need to consider remaining peers left in the
queue P and stop creating the polygon.




3/31/2013                                                                     26
Simulation framework
                                Connection Manager
                        World
 •   Based on OMNeT++


                                 Moving object




                                 Object of interest




3/31/2013                                      27

More Related Content

What's hot

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSIJNSA Journal
 
A brief introduction to recent segmentation methods
A brief introduction to recent segmentation methodsA brief introduction to recent segmentation methods
A brief introduction to recent segmentation methodsShunta Saito
 
Naver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltcNaver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltcNAVER Engineering
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMEditor IJMTER
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compressionM.k. Praveen
 
(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot LearningMasahiro Suzuki
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
 
Bridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphsBridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphsWoen Yon Lai
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured predictionzukun
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
 

What's hot (18)

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
A brief introduction to recent segmentation methods
A brief introduction to recent segmentation methodsA brief introduction to recent segmentation methods
A brief introduction to recent segmentation methods
 
Naver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltcNaver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltc
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 
Bridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphsBridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphs
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
 
N043020970100
N043020970100N043020970100
N043020970100
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
I017425763
I017425763I017425763
I017425763
 
Dl2014 slides
Dl2014 slidesDl2014 slides
Dl2014 slides
 

Similar to Bichromatic Reverse Nearest Neighbours

Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...Michail Argyriou
 
Bx32903907
Bx32903907Bx32903907
Bx32903907IJMER
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discoveryaftab alam
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksIOSR Journals
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup ProtocolsZubin Bhuyan
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsPriyanka Jacob
 
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...Daniel Valcarce
 
PR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypointsPR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypointsjaewon lee
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Universitat Politècnica de Catalunya
 

Similar to Bichromatic Reverse Nearest Neighbours (12)

Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
 
Fuzzy causal order
Fuzzy causal orderFuzzy causal order
Fuzzy causal order
 
Bx32903907
Bx32903907Bx32903907
Bx32903907
 
Positioning seminar 2012
Positioning seminar 2012Positioning seminar 2012
Positioning seminar 2012
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discovery
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
 
PR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypointsPR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypoints
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Bichromatic Reverse Nearest Neighbours

  • 1. Bichromatic Reverse Nearest Neighbours in Mobile P2P Networks Jessie Nghiem, Kiki Maulana Agustinus Borgy Waluyo, David Green, David Taniar
  • 2. Inspiring example Earthquake and rescue teams 3/31/2013 2
  • 3. Motivation Advances in mobile technology 3/31/2013 3
  • 4. Motivation 1. Scalability Limitations of Centralized Systems 2. Bottleneck Moving objects Wide-range comm. 3. Low fault-tolerance Interest objects P2P comm. 3/31/2013 (a) Centralized Systems (b) P2P Systems 4
  • 5. Ultimate Aim “… to harness collaborative power of peers for spatial query processing in Mobile Environment” 3/31/2013 5
  • 6. Problem definition – Bichromatic Reverse Nearest Neighbour (BRNN) Query point Moving i0 objects Circle from the object of interest to its Bichromatic nearest moving object i1 Objects of interest io and i1 are the results of the RNN query from q 3/31/2013 6
  • 7. Related work Propose: – Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. • Limitations: P2P In: Proceedings of the Thirtieth – Centralized approach international conference on Very large data bases , VLDB '04. – Only deal with monochromatic RNNs H-(p0) Bichromatic Half-space pruning. Any point that lies in the shaded half- space H-(p0) is always closer to p0 than to q and cannot be the RNN for this reason. 3/31/2013 7
  • 8. Definitions Negative half plane Positive half plane Query node Peer node Boundary line 3/31/2013 8
  • 9. Definitions Object of interest o • Boundary region • If B is closed, B: boundary polygon. • The boundary polygon B is called a tight polygon iff any object of interest oi inside B regards q as the closest moving object. Boundary polygon B 3/31/2013 9
  • 10. How to build a tight polygon The next processing peer is q4 outside C p4 C(q, qq0) TIGHT Boundary polygon Farthest vertex q0 P = {p0, p1, …, p4,,p5, p6, …} is a priority queue Reflection point of q thru v0 3/31/2013 10
  • 11. Construct the polygon for filtering objects of interest 3/31/2013 11
  • 12. Exhaustive Search vs Centralized Search Remarkably efficient in saving energy and time 3/31/2013 12
  • 13. Only sends query to the peers that build B 3/31/2013 13
  • 14. Optimized Search versa Exhaustive Search Approximate accuracy rate with less mean latency 3/31/2013 14
  • 15. Simulation framework - Based on OMNet++ and MiXiM - Using network interface card which follows IEEE 802.15.4 standard for bluetooth networks 3/31/2013 15
  • 16. Simulation framework Simulation model Parameters Value Playground 87.1km2 No. of MOs 7600 No. of IOs 550 Cache Size 50 Expected no. of 2 queries/MO Simulation time 30s 3/31/2013 16
  • 17. Simulation Results – P2P Search versa Centralized Search 3/31/2013 17
  • 18. Optimized Search versa Exhaustive Search 3/31/2013 18
  • 19. Simulation Results – No. of Peers Pruned and Stop Hits 3/31/2013 Optimized Search Algorithm 19
  • 20. Conclusion • P2P Search significantly save communication cost and 43% processing time compared to Centralized Search • Optimized Search reduces the number of queried peers and then response time while it maintains accuracy rate approximate to that of Exhaustive Search. • A practically feasible option for a large-scale and busy network 3/31/2013 20
  • 21.
  • 22. 3/31/2013 22
  • 23. Problem Statement • Let P and O be two sets of points in the same data space. • Given a point p є P, a BRNN query finds all the points o є O whose nearest neighbours in P are p, namely, there does not exist any other point p0 є P such that d(o, p0) < d(o, p). 3/31/2013 23
  • 24. System Overview Beacon message Ack. message Query Peers Node Query message Reply message Communication between Query node and Peers Three phases: 1. Initialization and Peer Discovery 2. Constructing a Boundary Polygon and Sending Queries 3. Pruning Interest Objects 3/31/2013 24
  • 25. Definitions • q, p • P ={p1,…. pH} is a priority queue of peers of q. |P| = H. • Boundary line (b1) • 3/31/2013 25
  • 26. Lemma – How to build a tight polygon If ∃pi є priority queue P, such that dist(q; pi) ≥ dist(q; vj), then B is a tight polygon. Put another way, we do not need to consider remaining peers left in the queue P and stop creating the polygon. 3/31/2013 26
  • 27. Simulation framework Connection Manager World • Based on OMNeT++ Moving object Object of interest 3/31/2013 27

Editor's Notes

  1. To illustrate what the research is doing, let’s imagine a scenario. There is an earthquake. people aredisconnected from the centralized BS. A number of rescuers spread and help injured immobile victims in theaffected area. The only way of communication is asking their peer rescuers to locate victims. It is called P2P communication. In order to reduce redundancy, optimize human resources and maximize the support, a rescuer would rather go for a victim who needs him most, or in another way, who considers him as the closest. This is an example of Bichromatic RNN queries in Mobile P2P Networks. Here the term “bichromatic” means query nodes and points of interest are of two different types. In this example rescuers are moving objects playing as query points or peers. Immobile victims are static points of interest.There are many other potential practical applications of our research. For in-stance, in everyday applications, police force can communicate with each otherto distribute their team members to locations that needs them most for ex-ample, car accident sites or traffic congestion intersections.
  2. Our research is motivated from two different aspects. First,the advances in mobile technology. Recently we have experienced the fast evolution in both mobile hardware and software. Your smart phone or tablet becomes more powerful than your parents&apos; computer. Google has introduced its Nexus tablet featuring quad-core processor while LG and HTC have presented their quad-core phones running Ice Cream Sandwich (Google&apos;s Android 4.0) from the outset. It is the time to harness the computing power, intelligence and various functionalities of mobile devices
  3. Scalability, bottleneck and low fault-tolerance are critical issuesof those centralized approaches, especially in large-scale systems. In particular, those systems only contain a central point of failure, which is likely to becorrupt in several scenarios. For example, on a battle field or natural disaster,the headquarters is vulnerable to unavailability or traffic congestion
  4. Before going to the proposed algorithms, here are preliminary definitions q is the query nodep_1 is one of peers of qb1 is the boundary line or the perpendicular bisector between q and p1.b1 divides the whole plane into 2 half planes.H+(p1) is the positive half plane. Any object in this half plane is closer to q than p1. Similarly for the negative half plane H-(p1). Any object in this half plane is closer to p1 than q
  5. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  6. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  7. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  8. An RNN query returns all objects which consider the query object as their nearest neighbour.Two types: Monochromatic RNN and Bichromatic RNN.
  9. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.