Cloud Computing and Security

Moving distance measurement is an indispensable component for the indoor localization and user trace tracking, which is of great importance to a wide range of applications in the era of mobile computing. The maturity of inertial sensors in smartphones and the ubiquity of WiFi technology ensure the accuracy for indoor distance measurement. Despite its importance, moving distance estimation in the indoor environment for mobile devices is still lacking a cost-effective and precise solution. The state-of-the-art work mostly use build-in sensors, e.g. accelerometer, gyroscope, rotation vector sensor and etc. in the mobile devices for the movement distance measurement. Wireless signal is considered to estimate a humans moving distance as well in prior work. However, both methods suffer from complex deployment and inaccurate estimation results. In this paper, we propose a multi-modal approach to measure moving distance for the user. We mainly innovate in proposing a fusion estimation method leveraging sensors and wireless signals to accurately estimate the human’s moving distance indoor. We implement a prototype with smartphones and commercial WiFi devices. Then we evaluate it in distinct indoor environments. Experimental results show that the proposed method can estimate target’s moving distance with an average accuracy of 90.7%, which sheds light on sub-meter level distance measurements in indoor environments.

[1]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[2]  D. Bochtis,et al.  Conceptual model of a future farm management information system , 2010 .

[3]  V Latora,et al.  Small-world behavior in time-varying graphs. , 2009, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[5]  Yong Deng,et al.  A new measure of identifying influential nodes: Efficiency centrality , 2017, Commun. Nonlinear Sci. Numer. Simul..

[6]  Michael E. Tipping,et al.  Fast Marginal Likelihood Maximisation for Sparse Bayesian Models , 2003 .

[7]  Cecilia Mascolo,et al.  Analysing information flows and key mediators through temporal centrality metrics , 2010, SNS '10.

[8]  Jerry Brito,et al.  Bitcoin Financial Regulation: Securities, Derivatives, Prediction Markets, and Gambling , 2015 .

[9]  Yuval Elovici,et al.  Unknown Malcode Detection Using OPCODE Representation , 2008, EuroISI.

[10]  Chen Bo,et al.  Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions , 2016 .

[11]  J. Wolfert,et al.  Organizing information integration in agri-food: A method based on a service-oriented architecture and living lab approach , 2010 .

[12]  Kari Koskinen,et al.  Software architecture for farm management information systems in precision agriculture , 2010 .

[13]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[14]  Igor Santos,et al.  On the automatic categorisation of android applications , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[15]  C. G. Sørensena,et al.  Functional requirements for a future farm management information system , 2015 .

[16]  George Eastman House,et al.  Sparse Bayesian Learning and the Relevance Vector Machine , 2001 .

[17]  T. Kutter,et al.  The role of communication and co-operation in the adoption of precision farming , 2011, Precision Agriculture.

[18]  Tony Lewis,et al.  Evolution of farm management information systems , 1998 .

[19]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[20]  Hang Dong,et al.  Malware detection method of android application based on simplification instructions , 2014 .

[21]  W. B. Cavnar,et al.  N-gram-based text categorization , 1994 .

[22]  Vlado Keselj,et al.  N-gram-based detection of new malicious code , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[23]  Li Ting,et al.  Description of Android Malware Feature Based on Dalvik Instructions , 2014 .

[24]  A. Barabasi,et al.  Impact of non-Poissonian activity patterns on spreading processes. , 2006, Physical review letters.

[25]  Antonio Mauro Saraiva,et al.  An infrastructure for the development of distributed service-oriented information systems for precision agriculture , 2007 .

[26]  Mason A. Porter,et al.  Eigenvector-Based Centrality Measures for Temporal Networks , 2015, Multiscale Model. Simul..

[27]  Kazuo Yano,et al.  Importance of individual events in temporal networks , 2012, ArXiv.

[28]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[29]  Min Zhao,et al.  SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging , 2009, Journal in Computer Virology.

[30]  Reza Ehsani,et al.  Machine-to-machine communication for agricultural systems: An XML-based auxiliary language to enhance semantic interoperability , 2011 .

[31]  Kari Koskinen,et al.  A service infrastructure for the representation, discovery, distribution and evaluation of agricultural production standards for automated compliance control , 2012 .

[32]  Min Yang,et al.  Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM , 2018 .

[33]  Matthias Rothmund,et al.  Original papers: Mobile farm equipment as a data source in an agricultural service architecture , 2009 .

[34]  Gerrit Hoogenboom,et al.  A web-based data exchange system for crop model applications , 2004 .