SlideShare a Scribd company logo
http://copelabs.ulusofona.pt
PERSONALIZED SENSING SYSTEM
Macaba Pedro
MsThesis – 2014
Leader Teacher: Paulo Mendes
Mestrado em Engenharia Informática e Sistemas de Informação
Overview
Introduction
Theme, Importance, Impact
Objectives
PersonalSense Framework
Tagging Module
Sensing Module
Inference Module
Networking Interface
Graphical Interface
Tests and Evaluation
Final Considerations
2Macaba Pedro - MEISI ECATI - ULHT 2014
Personalized Sensing System
3
Introduction
Theme, Importance and Impact
Study the capacity to perform classification of sensory data from mobile devices, providing
information based on the user behavior and the state of the device.
Impact in mechanisms of transfer
and data sharing;
Concept of searching for data to
meet user;
Learning user behavior based in
mobile sensory data;
Pervasive and Ubiquitous
Computing.
Large-scale, long-lived, mostly
mobile
Not so energy-constrained
Mobility is a driving factor
Security, trust and privacy are
important factors
Connection with emerging
applications;
Sharing data based in users
interests;
Information be available in the
network automatically without user
interaction;
 Sensing people behavior;
Sensing proximity interactions;
Develop an middleware
capable to analyze sensory
data from mobile devices,
implementing techniques for
data classification (Sensing
Application) whose learning
will enable the transmission of
inferred information for network
sharing (Networking
Application) based on user’s
behaviors and device state
(Data Tagging)
4
Objective
Macaba Pedro - MEISI ECATI - ULHT 2014
 Middleware activation
 Device configuration
 Reading sensory data and
classification process
 Learning process on the
inferred data
 Device state sent to the
network
5
PersonalSense Framework
Macaba Pedro - MEISI ECATI - ULHT 2014
6
Tagging Module
Macaba Pedro - MEISI ECATI - ULHT 2014
State
Events
Data Type
Interest
Sensing Module
 Maestro provide local sensors data
 PersonalSense verifies the data file
 Implement the classification process
 Analyze sensors
 Choose the best attribute
 Build the Decision Tree
7
Inference Module
Procedural Rules
Forward chaining
An action is executed when
conditions are satisfied.
Assign values to attributes
Evaluate conditions
Check if all conditions are
satisfied
Supervised Learning
Predictive Modules
8
Method – PersonalSense
Attributes assign
values - defined
Conditions evaluated
Rules are checked
Actions executed
Method – PersonalSense
A Counter to each rule to detect the
action
Use the action to keep track how many
condition in the rule are currently
satisfied
The rule is ready to fire if all conditions
have become true
The attribute is flagged as defined and
undefined
Gain information model
Value 3
Without Value 0
Value 2
Without Value 0
Value 1
Without Value 0
Result?
Dependent Variable: value
FALSETRUE
Networking Interface
Data-Centric Characteristics
 Seeks to adapt the network architecture to the
current network usage patterns
 has a founding principle that a communication
network should allow a user to focus on the data
rather than having to reference a specific, physical
location where that data is to be retrieved from.
 Security into the network at the data level
 The name of content sufficiently describes the
information
PersonalSense in Data Centric Networking
Focus on data treatment
Receive data and sent data to an application
User behavior to receive some kind of data
Use a data storage cache at each level of the
network
Decrease the transmission traffic
Increase the speed of response
Allows a simpler configuration of network devices
9Macaba Pedro - MEISI ECATI - ULHT 2014
(Smart Pin, 2009)
Graphical Interface
Configuration Interface
https://www.youtube.com/watch?v=mq_8ycNg160
10
(Smart Pin, 2009)
Utilization Interface
https://www.youtube.com/watch?
v=hQyGl3l7kyY
Final Considerations
Service integration and
communication
Automatic provision of
information in the network
relying in opportunistics
meetings between devices
Classification of data
collected from the sensory
capabilities of devices, and
knowledge acquisition and
generation of behavioral
profiles
11
(Smart Pin, 2009)
Test more mobile sensors
Test the interaction with
Maestroo and ICON in a
mobile device
Test with other classifier
algorithms
Elaboration of an
algorithm for classification
of collected sensor data
from mobile devices
Macaba Pedro - MEISI ECATI -
ULHT 2014

More Related Content

What's hot

IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
Deris Stiawan
 
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
chennaijp
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
Sakhee Khan
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
Omkar Tembe
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
Deris Stiawan
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
IJORCS
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
IJMIT JOURNAL
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
ijassn
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
ijassn
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
Ecway Technologies
 

What's hot (19)

IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 

Similar to Personalized Sensing System

Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
AIRCC Publishing Corporation
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
ijasuc
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
Trishla Thakur
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
IEEEGLOBALSOFTTECHNOLOGIES
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEEFINALYEARSTUDENTSPROJECTS
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
Sensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - formatSensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - format
John A. Serri
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
pharmaindexing
 
Network security situational awareness
Network security situational awarenessNetwork security situational awareness
Network security situational awareness
Huda Seyam
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
KristiLBurns
 

Similar to Personalized Sensing System (20)

Secure final
Secure finalSecure final
Secure final
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profile...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Sensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - formatSensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - format
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
Network security situational awareness
Network security situational awarenessNetwork security situational awareness
Network security situational awareness
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
leewayhertz.com-Federated learning Unlocking the potential of secure distribu...
 

More from Nobre Pedro

A lei da adição e do respeito
A lei da adição e do respeitoA lei da adição e do respeito
A lei da adição e do respeito
Nobre Pedro
 
O papel do professor no sucesso escolar
O papel do professor no sucesso escolarO papel do professor no sucesso escolar
O papel do professor no sucesso escolar
Nobre Pedro
 
A Importância da Internet no Evangelho
A Importância da Internet no EvangelhoA Importância da Internet no Evangelho
A Importância da Internet no Evangelho
Nobre Pedro
 
Cloud computing e serviços web 2014
Cloud computing e serviços web   2014Cloud computing e serviços web   2014
Cloud computing e serviços web 2014
Nobre Pedro
 
A internet e a evangelização
A internet e a evangelizaçãoA internet e a evangelização
A internet e a evangelização
Nobre Pedro
 
Web - Crawlers
Web - CrawlersWeb - Crawlers
Web - Crawlers
Nobre Pedro
 
Services on Opportunistic Networking
Services on Opportunistic NetworkingServices on Opportunistic Networking
Services on Opportunistic Networking
Nobre Pedro
 
Cloud computing e serviços web
Cloud computing e serviços webCloud computing e serviços web
Cloud computing e serviços web
Nobre Pedro
 

More from Nobre Pedro (8)

A lei da adição e do respeito
A lei da adição e do respeitoA lei da adição e do respeito
A lei da adição e do respeito
 
O papel do professor no sucesso escolar
O papel do professor no sucesso escolarO papel do professor no sucesso escolar
O papel do professor no sucesso escolar
 
A Importância da Internet no Evangelho
A Importância da Internet no EvangelhoA Importância da Internet no Evangelho
A Importância da Internet no Evangelho
 
Cloud computing e serviços web 2014
Cloud computing e serviços web   2014Cloud computing e serviços web   2014
Cloud computing e serviços web 2014
 
A internet e a evangelização
A internet e a evangelizaçãoA internet e a evangelização
A internet e a evangelização
 
Web - Crawlers
Web - CrawlersWeb - Crawlers
Web - Crawlers
 
Services on Opportunistic Networking
Services on Opportunistic NetworkingServices on Opportunistic Networking
Services on Opportunistic Networking
 
Cloud computing e serviços web
Cloud computing e serviços webCloud computing e serviços web
Cloud computing e serviços web
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Personalized Sensing System

  • 1. http://copelabs.ulusofona.pt PERSONALIZED SENSING SYSTEM Macaba Pedro MsThesis – 2014 Leader Teacher: Paulo Mendes Mestrado em Engenharia Informática e Sistemas de Informação
  • 2. Overview Introduction Theme, Importance, Impact Objectives PersonalSense Framework Tagging Module Sensing Module Inference Module Networking Interface Graphical Interface Tests and Evaluation Final Considerations 2Macaba Pedro - MEISI ECATI - ULHT 2014
  • 3. Personalized Sensing System 3 Introduction Theme, Importance and Impact Study the capacity to perform classification of sensory data from mobile devices, providing information based on the user behavior and the state of the device. Impact in mechanisms of transfer and data sharing; Concept of searching for data to meet user; Learning user behavior based in mobile sensory data; Pervasive and Ubiquitous Computing. Large-scale, long-lived, mostly mobile Not so energy-constrained Mobility is a driving factor Security, trust and privacy are important factors Connection with emerging applications; Sharing data based in users interests; Information be available in the network automatically without user interaction;  Sensing people behavior; Sensing proximity interactions;
  • 4. Develop an middleware capable to analyze sensory data from mobile devices, implementing techniques for data classification (Sensing Application) whose learning will enable the transmission of inferred information for network sharing (Networking Application) based on user’s behaviors and device state (Data Tagging) 4 Objective Macaba Pedro - MEISI ECATI - ULHT 2014
  • 5.  Middleware activation  Device configuration  Reading sensory data and classification process  Learning process on the inferred data  Device state sent to the network 5 PersonalSense Framework Macaba Pedro - MEISI ECATI - ULHT 2014
  • 6. 6 Tagging Module Macaba Pedro - MEISI ECATI - ULHT 2014 State Events Data Type Interest
  • 7. Sensing Module  Maestro provide local sensors data  PersonalSense verifies the data file  Implement the classification process  Analyze sensors  Choose the best attribute  Build the Decision Tree 7
  • 8. Inference Module Procedural Rules Forward chaining An action is executed when conditions are satisfied. Assign values to attributes Evaluate conditions Check if all conditions are satisfied Supervised Learning Predictive Modules 8 Method – PersonalSense Attributes assign values - defined Conditions evaluated Rules are checked Actions executed Method – PersonalSense A Counter to each rule to detect the action Use the action to keep track how many condition in the rule are currently satisfied The rule is ready to fire if all conditions have become true The attribute is flagged as defined and undefined Gain information model Value 3 Without Value 0 Value 2 Without Value 0 Value 1 Without Value 0 Result? Dependent Variable: value FALSETRUE
  • 9. Networking Interface Data-Centric Characteristics  Seeks to adapt the network architecture to the current network usage patterns  has a founding principle that a communication network should allow a user to focus on the data rather than having to reference a specific, physical location where that data is to be retrieved from.  Security into the network at the data level  The name of content sufficiently describes the information PersonalSense in Data Centric Networking Focus on data treatment Receive data and sent data to an application User behavior to receive some kind of data Use a data storage cache at each level of the network Decrease the transmission traffic Increase the speed of response Allows a simpler configuration of network devices 9Macaba Pedro - MEISI ECATI - ULHT 2014 (Smart Pin, 2009)
  • 10. Graphical Interface Configuration Interface https://www.youtube.com/watch?v=mq_8ycNg160 10 (Smart Pin, 2009) Utilization Interface https://www.youtube.com/watch? v=hQyGl3l7kyY
  • 11. Final Considerations Service integration and communication Automatic provision of information in the network relying in opportunistics meetings between devices Classification of data collected from the sensory capabilities of devices, and knowledge acquisition and generation of behavioral profiles 11 (Smart Pin, 2009) Test more mobile sensors Test the interaction with Maestroo and ICON in a mobile device Test with other classifier algorithms Elaboration of an algorithm for classification of collected sensor data from mobile devices
  • 12. Macaba Pedro - MEISI ECATI - ULHT 2014