SlideShare a Scribd company logo
Bichromatic Reverse Nearest Neighbours
in Mobile P2P Networks
Jessie Nghiem, Kiki Maulana
Agustinus Borgy Waluyo, David Green, David Taniar
Inspiring example   Earthquake and rescue teams




3/31/2013                                         2
Motivation

 Advances in mobile technology




3/31/2013                        3
Motivation
                                               1.   Scalability
 Limitations of Centralized Systems            2.   Bottleneck

    Moving objects          Wide-range comm.
                                               3.   Low fault-tolerance
    Interest objects        P2P comm.




3/31/2013   (a) Centralized Systems                    (b) P2P Systems    4
Ultimate Aim



                     “… to harness collaborative power of peers
            for spatial query processing in Mobile Environment”




3/31/2013                                                         5
Problem definition
  – Bichromatic Reverse Nearest Neighbour (BRNN)
                                           Query point
                                                                  Moving
                                 i0                               objects
Circle from the object
of interest to its                                                    Bichromatic
nearest moving object                 i1
                                                                      Objects of
                                                                      interest




                  io and i1 are the results of the RNN query from q
  3/31/2013                                                                        6
Related work                                                   Propose:
     –      Tao, Y., Papadias, D., Lian, X.: Reverse
            knn search in arbitrary dimensionality.
                                                            • Limitations: P2P
            In: Proceedings of the Thirtieth                  – Centralized approach
            international conference on Very large
            data bases , VLDB '04.                            – Only deal with
                                                                monochromatic RNNs
                       H-(p0)                                    Bichromatic




      Half-space pruning. Any point that lies in the
      shaded half- space H-(p0)
       is always closer to p0 than to q and cannot be the
      RNN for this reason.
3/31/2013                                                                              7
Definitions
                                   Negative half plane
Positive half plane


              Query node




                                    Peer node




                           Boundary line

  3/31/2013                                              8
Definitions
                                                              Object of interest o
• Boundary region




• If B is closed, B: boundary polygon.

• The boundary polygon B is called a
  tight polygon iff any object of interest
  oi inside B regards q as the closest
  moving object.

                                         Boundary polygon B



3/31/2013                                                                     9
How to build a tight polygon                     The next processing peer is q4
                                                     outside C

                                         p4           C(q, qq0)


                                                          TIGHT
                                                     Boundary polygon




                                                     Farthest vertex
                                          q0




P = {p0, p1, …, p4,,p5, p6, …} is a priority queue    Reflection point of q thru v0
    3/31/2013                                                                    10
Construct the
            polygon for filtering
            objects of interest




3/31/2013                    11
Exhaustive Search vs Centralized Search




            Remarkably efficient in saving energy and time

3/31/2013                                                    12
Only sends query to
            the peers that build B




3/31/2013                    13
Optimized Search versa Exhaustive Search




            Approximate accuracy rate with less mean latency


3/31/2013                                                      14
Simulation framework


                       - Based on OMNet++ and MiXiM
                       - Using network interface card
                       which follows
                       IEEE 802.15.4 standard for
                       bluetooth networks




3/31/2013                                               15
Simulation framework
Simulation model


                         Parameters        Value
                         Playground        87.1km2
                         No. of MOs        7600
                         No. of IOs        550
                         Cache Size        50
                         Expected no. of   2
                         queries/MO
                         Simulation time   30s



  3/31/2013                                        16
Simulation Results – P2P Search versa Centralized Search




3/31/2013                                             17
Optimized Search versa Exhaustive Search




3/31/2013                                  18
Simulation Results – No. of Peers Pruned and Stop Hits




3/31/2013         Optimized Search Algorithm             19
Conclusion

•   P2P Search significantly save communication cost and 43%
    processing time compared to Centralized Search
•   Optimized Search reduces the number of queried peers and then
    response time while it maintains accuracy rate approximate to that
    of Exhaustive Search.
•   A practically feasible option for a large-scale and busy network




3/31/2013                                                              20
3/31/2013   22
Problem Statement

•   Let P and O be two sets of points in the same data space.
•   Given a point p є P, a BRNN query finds all the points o є O whose
    nearest neighbours in P are p, namely, there does not exist any other
    point p0 є P such that d(o, p0) < d(o, p).




3/31/2013                                                                23
System Overview

                          Beacon message


                          Ack. message
     Query
                                                            Peers
     Node                 Query message


                          Reply message


             Communication between Query node and Peers
                    Three phases:
                       1. Initialization and Peer Discovery
                       2. Constructing a Boundary Polygon and
                          Sending Queries
                       3. Pruning Interest Objects
 3/31/2013                                                          24
Definitions

•   q, p
•   P ={p1,…. pH}
        is a priority queue of peers of q. |P| = H.
•   Boundary line (b1)


•




    3/31/2013                                         25
Lemma – How to build a tight polygon

If ∃pi є priority queue P, such that dist(q; pi) ≥ dist(q; vj), then B is a
tight polygon.


Put another way, we do not need to consider remaining peers left in the
queue P and stop creating the polygon.




3/31/2013                                                                     26
Simulation framework
                                Connection Manager
                        World
 •   Based on OMNeT++


                                 Moving object




                                 Object of interest




3/31/2013                                      27

More Related Content

What's hot

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
IJNSA Journal
 
A brief introduction to recent segmentation methods
A brief introduction to recent segmentation methodsA brief introduction to recent segmentation methods
A brief introduction to recent segmentation methods
Shunta Saito
 
Naver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltcNaver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltc
NAVER Engineering
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
Editor IJMTER
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
ABHIJEET KHIRE
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
M.k. Praveen
 
(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning
Masahiro Suzuki
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
IJCERT
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
graphhoc
 
Bridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphsBridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphs
Woen Yon Lai
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
Mumbai Academisc
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
zukun
 
N043020970100
N043020970100N043020970100
N043020970100
ijceronline
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
TELKOMNIKA JOURNAL
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
IJCNCJournal
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
IJERA Editor
 
I017425763
I017425763I017425763
I017425763
IOSR Journals
 
Dl2014 slides
Dl2014 slidesDl2014 slides

What's hot (18)

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
A brief introduction to recent segmentation methods
A brief introduction to recent segmentation methodsA brief introduction to recent segmentation methods
A brief introduction to recent segmentation methods
 
Naver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltcNaver learning to rank question answer pairs using hrde-ltc
Naver learning to rank question answer pairs using hrde-ltc
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning(DL輪読)Matching Networks for One Shot Learning
(DL輪読)Matching Networks for One Shot Learning
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 
Bridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphsBridging knowledge graphs_to_generate_scene_graphs
Bridging knowledge graphs_to_generate_scene_graphs
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
 
N043020970100
N043020970100N043020970100
N043020970100
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
I017425763
I017425763I017425763
I017425763
 
Dl2014 slides
Dl2014 slidesDl2014 slides
Dl2014 slides
 

Similar to Bichromatic Reverse Nearest Neighbours

Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Michail Argyriou
 
Fuzzy causal order
Fuzzy causal orderFuzzy causal order
Fuzzy causal order
Luis Alberto Morales Rosales
 
Bx32903907
Bx32903907Bx32903907
Bx32903907
IJMER
 
Positioning seminar 2012
Positioning seminar 2012Positioning seminar 2012
Positioning seminar 2012
Giuseppe Destino
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discovery
aftab alam
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
IOSR Journals
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
Zubin Bhuyan
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
Priyanka Jacob
 
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Daniel Valcarce
 
PR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypointsPR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypoints
jaewon lee
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Universitat Politècnica de Catalunya
 

Similar to Bichromatic Reverse Nearest Neighbours (12)

Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
Branch and-bound nearest neighbor searching over unbalanced trie-structured o...
 
Fuzzy causal order
Fuzzy causal orderFuzzy causal order
Fuzzy causal order
 
Bx32903907
Bx32903907Bx32903907
Bx32903907
 
Positioning seminar 2012
Positioning seminar 2012Positioning seminar 2012
Positioning seminar 2012
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discovery
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNsA DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
A DISTRIBUTED ALGORITHM FOR THE DEAD-END PROBLEM IN WSNs
 
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
Efficient Pseudo-Relevance Feedback Methods for Collaborative Filtering Recom...
 
PR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypointsPR-146: CornerNet detecting objects as paired keypoints
PR-146: CornerNet detecting objects as paired keypoints
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Bichromatic Reverse Nearest Neighbours

  • 1. Bichromatic Reverse Nearest Neighbours in Mobile P2P Networks Jessie Nghiem, Kiki Maulana Agustinus Borgy Waluyo, David Green, David Taniar
  • 2. Inspiring example Earthquake and rescue teams 3/31/2013 2
  • 3. Motivation Advances in mobile technology 3/31/2013 3
  • 4. Motivation 1. Scalability Limitations of Centralized Systems 2. Bottleneck Moving objects Wide-range comm. 3. Low fault-tolerance Interest objects P2P comm. 3/31/2013 (a) Centralized Systems (b) P2P Systems 4
  • 5. Ultimate Aim “… to harness collaborative power of peers for spatial query processing in Mobile Environment” 3/31/2013 5
  • 6. Problem definition – Bichromatic Reverse Nearest Neighbour (BRNN) Query point Moving i0 objects Circle from the object of interest to its Bichromatic nearest moving object i1 Objects of interest io and i1 are the results of the RNN query from q 3/31/2013 6
  • 7. Related work Propose: – Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. • Limitations: P2P In: Proceedings of the Thirtieth – Centralized approach international conference on Very large data bases , VLDB '04. – Only deal with monochromatic RNNs H-(p0) Bichromatic Half-space pruning. Any point that lies in the shaded half- space H-(p0) is always closer to p0 than to q and cannot be the RNN for this reason. 3/31/2013 7
  • 8. Definitions Negative half plane Positive half plane Query node Peer node Boundary line 3/31/2013 8
  • 9. Definitions Object of interest o • Boundary region • If B is closed, B: boundary polygon. • The boundary polygon B is called a tight polygon iff any object of interest oi inside B regards q as the closest moving object. Boundary polygon B 3/31/2013 9
  • 10. How to build a tight polygon The next processing peer is q4 outside C p4 C(q, qq0) TIGHT Boundary polygon Farthest vertex q0 P = {p0, p1, …, p4,,p5, p6, …} is a priority queue Reflection point of q thru v0 3/31/2013 10
  • 11. Construct the polygon for filtering objects of interest 3/31/2013 11
  • 12. Exhaustive Search vs Centralized Search Remarkably efficient in saving energy and time 3/31/2013 12
  • 13. Only sends query to the peers that build B 3/31/2013 13
  • 14. Optimized Search versa Exhaustive Search Approximate accuracy rate with less mean latency 3/31/2013 14
  • 15. Simulation framework - Based on OMNet++ and MiXiM - Using network interface card which follows IEEE 802.15.4 standard for bluetooth networks 3/31/2013 15
  • 16. Simulation framework Simulation model Parameters Value Playground 87.1km2 No. of MOs 7600 No. of IOs 550 Cache Size 50 Expected no. of 2 queries/MO Simulation time 30s 3/31/2013 16
  • 17. Simulation Results – P2P Search versa Centralized Search 3/31/2013 17
  • 18. Optimized Search versa Exhaustive Search 3/31/2013 18
  • 19. Simulation Results – No. of Peers Pruned and Stop Hits 3/31/2013 Optimized Search Algorithm 19
  • 20. Conclusion • P2P Search significantly save communication cost and 43% processing time compared to Centralized Search • Optimized Search reduces the number of queried peers and then response time while it maintains accuracy rate approximate to that of Exhaustive Search. • A practically feasible option for a large-scale and busy network 3/31/2013 20
  • 21.
  • 22. 3/31/2013 22
  • 23. Problem Statement • Let P and O be two sets of points in the same data space. • Given a point p є P, a BRNN query finds all the points o є O whose nearest neighbours in P are p, namely, there does not exist any other point p0 є P such that d(o, p0) < d(o, p). 3/31/2013 23
  • 24. System Overview Beacon message Ack. message Query Peers Node Query message Reply message Communication between Query node and Peers Three phases: 1. Initialization and Peer Discovery 2. Constructing a Boundary Polygon and Sending Queries 3. Pruning Interest Objects 3/31/2013 24
  • 25. Definitions • q, p • P ={p1,…. pH} is a priority queue of peers of q. |P| = H. • Boundary line (b1) • 3/31/2013 25
  • 26. Lemma – How to build a tight polygon If ∃pi є priority queue P, such that dist(q; pi) ≥ dist(q; vj), then B is a tight polygon. Put another way, we do not need to consider remaining peers left in the queue P and stop creating the polygon. 3/31/2013 26
  • 27. Simulation framework Connection Manager World • Based on OMNeT++ Moving object Object of interest 3/31/2013 27

Editor's Notes

  1. To illustrate what the research is doing, let’s imagine a scenario. There is an earthquake. people aredisconnected from the centralized BS. A number of rescuers spread and help injured immobile victims in theaffected area. The only way of communication is asking their peer rescuers to locate victims. It is called P2P communication. In order to reduce redundancy, optimize human resources and maximize the support, a rescuer would rather go for a victim who needs him most, or in another way, who considers him as the closest. This is an example of Bichromatic RNN queries in Mobile P2P Networks. Here the term “bichromatic” means query nodes and points of interest are of two different types. In this example rescuers are moving objects playing as query points or peers. Immobile victims are static points of interest.There are many other potential practical applications of our research. For in-stance, in everyday applications, police force can communicate with each otherto distribute their team members to locations that needs them most for ex-ample, car accident sites or traffic congestion intersections.
  2. Our research is motivated from two different aspects. First,the advances in mobile technology. Recently we have experienced the fast evolution in both mobile hardware and software. Your smart phone or tablet becomes more powerful than your parents&apos; computer. Google has introduced its Nexus tablet featuring quad-core processor while LG and HTC have presented their quad-core phones running Ice Cream Sandwich (Google&apos;s Android 4.0) from the outset. It is the time to harness the computing power, intelligence and various functionalities of mobile devices
  3. Scalability, bottleneck and low fault-tolerance are critical issuesof those centralized approaches, especially in large-scale systems. In particular, those systems only contain a central point of failure, which is likely to becorrupt in several scenarios. For example, on a battle field or natural disaster,the headquarters is vulnerable to unavailability or traffic congestion
  4. Before going to the proposed algorithms, here are preliminary definitions q is the query nodep_1 is one of peers of qb1 is the boundary line or the perpendicular bisector between q and p1.b1 divides the whole plane into 2 half planes.H+(p1) is the positive half plane. Any object in this half plane is closer to q than p1. Similarly for the negative half plane H-(p1). Any object in this half plane is closer to p1 than q
  5. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  6. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  7. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  8. An RNN query returns all objects which consider the query object as their nearest neighbour.Two types: Monochromatic RNN and Bichromatic RNN.
  9. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.