SAFETY CENTRIC SERVICES IN SMART CITIES By YAWEI PANG ...
-
Upload
khangminh22 -
Category
Documents
-
view
3 -
download
0
Transcript of SAFETY CENTRIC SERVICES IN SMART CITIES By YAWEI PANG ...
SAFETY CENTRIC SERVICES IN SMART CITIES
By
YAWEI PANG
A DISSERTATION PRESENTED TO THE GRADUATE SCHOOLOF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT
OF THE REQUIREMENTS FOR THE DEGREE OFDOCTOR OF PHILOSOPHY
UNIVERSITY OF FLORIDA
2019
ACKNOWLEDGMENTS
First and foremost, I would like to express my sincere appreciation to my advisor, Prof.
Yuguang Fang, for his invaluable guidance and strong support during my PhD study at
University of Florida. I have learned so much from him about being a serious thinker and
researcher.
I also would like to thank Dr. Dapeng Wu, Dr. Shigang Chen, and Dr. Xiaolin Li
for serving on my supervisory committee. I appreciate this opportunity to learn invaluable
suggestions from them.
I would like to extend my thanks to all my colleagues and friends in Wireless Information
and Networked Things Laboratory (WINET) for providing me a family-like environment and
for their collaboration and insightful advice. In particular, I would like to acknowledge my
appreciation to Dr. Haichuan Ding, Yaodan Hu, Lan Zhang, Kaichen Yang, Xianhao Chen, and
Di Han for many valuable discussions.
I owe a special gratitude to my parents and girlfriend. Thank you for supporting me all
the way to today, even in my most difficult time. I love you!
Last but not least, I would like to give special thanks to the funding source, US National
Science Foundation grants under CNS-1409797, CNS-1343356, and CNS-1718708.
4
TABLE OF CONTENTS
page
ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
CHAPTER
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.1 Safety and Challenge of Modern Cities . . . . . . . . . . . . . . . . . . . . . 111.2 Safety Service Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.3 Dissertation Contribution and Organization . . . . . . . . . . . . . . . . . . . 16
2 RELATED WORK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1 Safety Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192.2 Vehicle as Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3 PRELIMINARIES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1 Radio Frequency Identification . . . . . . . . . . . . . . . . . . . . . . . . . . 233.2 Video Summarization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243.3 Matching Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253.4 Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4 L-TRACK:CHILDREN TRACKING IN THEME PARKS . . . . . . . . . . . . . . . 29
4.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324.2.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364.3.1 Reader Association . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374.3.2 Maximum Power Limitation . . . . . . . . . . . . . . . . . . . . . . . 374.3.3 QoS Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374.3.4 EE Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.4 Matching Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384.4.1 Preference Establishment . . . . . . . . . . . . . . . . . . . . . . . . . 384.4.2 Dynamic Updating Matching Algorithm . . . . . . . . . . . . . . . . . 41
4.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434.5.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434.5.2 Results and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5
5 SPATH: A SAFE WALKING NAVIGATION SERVICE . . . . . . . . . . . . . . . . 50
5.1 Backgroud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
5.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535.2.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
5.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595.4 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.4.1 Computing Resource Optimization . . . . . . . . . . . . . . . . . . . . 615.4.2 Task Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625.4.3 Fast Iterative Matching (FIM) algorithm . . . . . . . . . . . . . . . . . 63
5.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655.5.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655.5.2 Results and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
6 VISS: VEHICLE BASED INTELLIGENT SURVEILLANCE SYSTEM . . . . . . . . . 70
6.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
6.2.1 Architecture Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 736.2.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
6.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786.4 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
7 SUMMARY AND CONCLUSIONS . . . . . . . . . . . . . . . . . . . . . . . . . . 86
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
BIOGRAPHICAL SKETCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
6
LIST OF TABLES
Table page
4-1 Table of parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
5-1 Symbols and definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
6-1 Symbols and description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
7
LIST OF FIGURES
Figure page
1-1 Overview of safety centric platform. . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1-2 Architecture of safety centric platform. . . . . . . . . . . . . . . . . . . . . . . . . 15
3-1 Illustration of RFID communication. . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3-2 Illustration of matching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3-3 Illustration of crossover and mutation. . . . . . . . . . . . . . . . . . . . . . . . . 28
4-1 System architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4-2 Whole process of data processing and transmissions. . . . . . . . . . . . . . . . . . 34
4-3 A snapshot of mobile device location with N=70. . . . . . . . . . . . . . . . . . . . 43
4-4 Comparison to the optimal solution. . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4-5 Comparison of different matching algorithms. . . . . . . . . . . . . . . . . . . . . . 47
4-6 Comparison of different power allocation approaches. . . . . . . . . . . . . . . . . . 48
4-7 EE under different density of mobile devices. . . . . . . . . . . . . . . . . . . . . . 48
4-8 EE under different computation capability of mobile device. . . . . . . . . . . . . . 49
5-1 System architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
5-2 Illustration of SPATH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
5-3 Illustration of video summarizations and transmissions. . . . . . . . . . . . . . . . . 55
5-4 The comparison of different schemes. . . . . . . . . . . . . . . . . . . . . . . . . . 68
5-5 Impact of available computing power. . . . . . . . . . . . . . . . . . . . . . . . . . 68
5-6 Impact of data size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
5-7 Impact of bandwidth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
6-1 System architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6-2 Illustration of working process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
6-3 Evaluation results for network size. . . . . . . . . . . . . . . . . . . . . . . . . . . 83
6-4 Impact of target regions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
6-5 Impact of participants. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
8
Abstract of Dissertation Presented to the Graduate Schoolof the University of Florida in Partial Fulfillment of theRequirements for the Degree of Doctor of Philosophy
SAFETY CENTRIC SERVICES IN SMART CITIES
By
Yawei Pang
August 2019
Chair: Yuguang FangMajor: Electrical and Computer Engineering
Smart cities are the future to handle population shifts and the increased demand of
services. However, safety becomes one of the most important concerns with respect to the fact
that more than 1 million crimes happened in U.S. every year. In this dissertation, we propose
a safety centric platform leveraging redundant computing and communication capabilities of
mobile devices or autonomous vehicles to enable local processing, which reduces the service
latency, eliminates potential network congestion, and improves resource utilization. Our
current contributions are mainly threefold. In the first work, we design a children tracking
service for theme parks based on radio-frequency identification (RFID) technology. In order to
guarantee efficient children tracking, we further optimize the utilization of available computing
resource for service provisioning. In the second work, we design another service, SPATH (the
Safest PATH), to provide a safe walking navigation in smart cities. To support this service,
wireless cameras, existing cellular infrastructure, and vehicles are utilized to process and
transmit surveillance videos, which can be viewed by users to check the current safety status.
Furthermore, video summarizing technology is applied to extract valuable information from
a video file to avoid network congestion. Since the quality of service for this application is
strongly correlated with the latency for video delivery, we address a latency minimization
problem by jointly considering the computing resource allocation and task assignment. In
the third work, we design a Vehicle based Intelligent Surveillance System (VISS) to improve
public safety in smart cities. VISS recruits vehicles as the mobile monitoring nodes to expand
9
geographical monitoring regions. Cooperating with slowly moving or parked vehicles with
sufficient computing capability, VISS can extract potential victims from the monitoring video
files and recruit mobile monitoring nodes to monitor potential victims as long as possible. To
measure the performance of VISS, coverage problems with limited budget are investigated by
considering recruitment of mobile monitoring nodes.
10
CHAPTER 1INTRODUCTION
1.1 Safety and Challenge of Modern Cities
The world we currently live in is highly urbanized with an estimated more than 54% of
the global population lives in urban centers today. This growing trend is likely to maintain for
the next ten years with roughly 95% of urban sprawl taking place in the developing countries.
By 2050, the population dwelling in the urban areas will be expected to rise to 66% of the
global population [1]. The speed of urban expansion as well as migration to city areas seems
faster than the growth of city infrastructure, spaces and services, which may lead to insufficient
provision of infrastructure and services thus may affect the safety quality of citizens living in
urban areas, especially for children and women.
The crime reports revealed by the Federal Bureau of Investigation (FBI) from its Uniform
Crime Reporting (UCR) program shows increasing rates of nationwide violent crimes and
homicide. Specifically, the rate of violent crime reached 386.3 per 100,000 in 2016 [2]. Other
data from the UCR and the National Crime Victimization Survey (NCVS) suggest higher crime
rates in city areas that are densely populated than in suburban or rural areas in general [3].
According to the report, around 50% of robberies happened in urban areas. Given that
residents in city areas were exposed to the highest crime rates, how to utilize technology to
improve the safety quality of residents of urban areas is a challenging problem.
In light of this, scholars and technology companies propose new and advanced services
to improve the safety quality and well-beings of citizens in urban areas. For instance, crime
hotspots is a popular tools used by researchers and police to improve the safety of cities.
The term hotspots, which refers to areas where crimes frequently take place, are used by
scholars and police in various ways [4, 5]. In [4], Paulsen has observed the increasing usage of
crime hotspots that prompts police officers to locate areas with safety concerns within their
beats using crime maps and then make adjustment to their patrol strategies correspondingly.
The author investigates the effects of crime maps on officers? perceptions of crime patterns
11
and their subsequent patrol activities. Bogomolov et al. have made an attempt to predict
crime hotspots to improve the public safety by using human behavioral data that stem
from various sources including mobile network activity, demography, along with open data
pertaining to crime events in [5]. Safe navigation services are proposed to help citizens find
the safe and shot path to their destinations [6, 7, 8, 9]. Pedestrian safety services have been
introduced to solve the distracted walking problem, since pedestrian often perform multiple
task simultaneously such as talking over the mobile phone, listening to music, or browsing the
news while walking [10, 11, 12, 13, 14]. Driving safety service are offered to reduce motor
vehicle crashes [15, 16, 17, 18].
1.2 Safety Service Platform
There are serval drawbacks for new and advanced public safety related services. First,
different safety services focus on the different areas, thus each new service is based on facilities
that are newly deployed. Thus, the high maintenance cost of these facilities compel the service
providers provide the services to users with high fees. For example, in order to avoid children
missing in the public areas such as theme parks or shopping malls, parents buy locators, the
GPS (Global Positioning System) based tracking services, to monitor their children. The cost
for a locator itself starts from 50 dollars up to serval hundreds dollars, and the tracking plans
start from $30 up [19]. The cost is very high for most families. Second, actually, some services
utilize the same data, since these services are belonging to different systems, the data may
need to be processed many times, which means the data are transmitted and computed more
than once. Thus, a large amount of computing and communication resources are wasted.
For example, most cities have video surveillance system for traffic control or target vehicle
searching service. Since two services are used for different purposes, they do not cooperate
with each other. When there is a target vehicle to be located, all related videos need to be
processed again to find the target vehicle. Third, some data from one public safety subsystem
can be utilized by another system. All these useful data is wasted since the difference between
subsystems makes them not to cooperate to work together. For example. The amber alert
12
system is a message distributed system to ask the public for help in finding abducted children.
Amber alerts distribute related vehicle information via commercial and public radio stations,
television stations or text messages. Video surveillance for the traffic control is also a powerful
system to find the target vehicle. Actually, video surveillance can help to improve the efficiency
of the Amber alert system
On the other hand, as the era of Internet of Things with various kinds of applications
starts to emerge, the Internet is evolving and becoming an integral part of our lives. The time
has now come when everything is connected to everything else. All the smart devices like
autonomous vehicles, smart phones, and other electronics exist in everyone’s life. According
to the report, there were around 1.56 billion smartphones sales worldwide only in 2018 [20].
Actually, all these smart devices have plentiful computing and communication capabilities.
However, the average time spend by users on their smartphones is nearly 3 hours, which means
there is a mass of redundant computation and communication capabilities of smart devices can
be reused [21].
Therefore, in spite of all the facts mentioned above, we propose a system by leveraging
redundant computation and communication capabilities of mobile devices or autonomous
vehicles to support public safety related services (as shown in Figure 1-1). To the best of
our knowledge, the definition of a platform, integrating all safety centric services, leveraging
redundant computation and communication capabilities of mobile devices or autonomous
vehicles to enable local processing is novel. The proposed system can reduce the service delay,
eliminate potential network congestion, and improve resource utilization. Figure 1-2 shows key
components of this platform and the corresponding function of key components are as follows.
IoT node: For safety centric services, there are generally three IoT nodes: RFID, sensor,
and camera. RFID technology offers automatic identification of objects to which the tags are
attached. Passive RFID tags are not battery powered, which leverages the power from reader’s
interrogation signal to communicate with the reader. Sensors play an important roles in safety
services with their availability, which are smaller, cheaper, and intelligent. Cameras can be
13
Figure 1-1. Overview of safety centric platform.
static street cameras or dash cameras on vehicles with communication capacity. All IoT nodes
communicate with edge nodes with short-range communication technology, such as Bluetooth,
WiFi, or mmWave.
Edge node: This can be an autonomous vehicle or mobile device such as smartphone,
which have sufficient computing, communication, and storage capability. Edge nodes can help
reduce energy consumption on IoT devices, save network bandwidth, filter massive redundant
data, and reduce latency for specific safety services or achieve application-specific requirements.
The communication among the edge nodes via harvested bands. Computing results would be
uploaded to the cloud for further proceed or serve remote users. For local users, the system
can offer the same service through localized protocols.
Controller: The controller periodically monitors the status of edge nodes and collects
status information for decision making. Controller decides whether an edge node is qualified for
14
Figure 1-2. Architecture of safety centric platform.
an offloading task in terms of certain status, such as CPU, RAM, available bandwidth, and free
memory. Furthermore, a controller could use prediction techniques to forecast the connectivity,
location, and link quality of a mobile edge node.
Cloud: The major function of the cloud is to execute further computing for heavy tasks.
Sometimes, a computation-intensive task might not be performed on edge nodes due to
resource constraints; therefore, the cloud would execute these tasks and return the result to
users. The cloud also collects the results of the offloaded tasks, which have been executed on
edge nodes, and returns it to the user’s application.
15
User end: This is an application installed on the user’s mobile device, which has multiple
interface that can be used for safe navigation, children tracking, or other safety services.
The proposed framework is characterized by a flexible and scalable structure that permits
its use in potential safety centric services. Each special service may utilize different components
of the system. The general process to provide the safety service to users includes following
steps.
Step1) Users submit their requests to the system.
Step2) The controller collect information of IoT nodes and edge computing nodes, such as
the available computing resource on edge computing nodes.
Step3) Based on the collected information and objective of services, the controller
distributes the control messages to IoT nodes or edge nodes. For example, if the IoT nodes
need to offload the computing task to edge nodes, the controller makes decision how to offload
data collected from IoT nodes to edge nodes for computing (such as object identification or
image feature detection and extraction).
Step4) Related data is transmitted from IoT nodes to edge computing nodes and the data
is processed.
Step5) Edge computing units send analysis result back to the controller or upload result to
the Cloud for further processing.
Step6) The system sends the corresponding result to the users. Furthermore, the system
can offer the same service to local users through localized protocols.
1.3 Dissertation Contribution and Organization
Utilizing the safety centric platform to support safety related services brings in significant
challenges. In this dissertation, I mainly contribute three unique challenges of safety centric
services in a smart city.
Children tracking service: We propose a children tracking application under the
architecture of safety centric platform. With the designed application, the locations of children
can be tracked with simple carry-on devices, namely, RFID tags. We utilize the mobile devices
16
carried by park employees and/or visitors as local processing units to avoid the potential
congestion problem. With the help of remote control center, each reader is matched with a
mobile device for data processing. EE of mobile devices is critical in our scenario because of
the energy limitation of associated mobile devices. We formulate an Energy efficiency (EE)
optimization problem by jointly considering the resource allocation and user association.
We adopt dynamic update matching algorithm to provide an suboptimal solution. Through
extensive simulations, we show that our proposed schemes are effective in improving the EE
performance of associated mobile devices.
Safe walking navigation service: We propose a safe walking navigation application,
SPATH (the Safest PATH). In this design, wireless cameras, existing cellular infrastructure,
and vehicles with underutilized computing resources are utilized to process and transmit
surveillance videos, which can be viewed by users to check the current safety status of
different walking paths. Noting the long-distance transmission of a large volume of videos
may cause network congestion, video summarizing technology, which is realized by utilizing
the underutilized computing capability in vehicles, is applied to extract valuable information
from a video file while effectively compressing its data size. Since the quality of service for
this application is strongly correlated with the latency of delivering videos, we formulate a
latency minimization problem by jointly considering the computing resource allocation and
computing task assignment. A Fast Iterative Matching (FIM) is proposed with low complexity
to effectively solve the optimization problem. Simulation results demonstrates the effectiveness
and efficiency of proposed solution.
Intelligent surveillance service: We propose a Vehicle based Intelligent Surveillance
System (VISS) to improve public safety in smart cities. Video surveillance systems as the
popular tools to improve public safety have been widely used in many cities. However, blind
areas and high cost for maintenance and deployment make the city contain public safety
uncovered holes. Vehicle based monitoring systems, utilizing vehicles installed dash cameras
to monitor target regions, is the potential solution improving the public safety. With the
17
consideration of video data size, limited budget ,and safety status difference, a Vehicle based
Intelligent Surveillance System (VISS) is designed to improve public safety in smart cities.
First, VISS recruit vehicles as the mobile monitoring nodes to expand geographical monitoring
regions. Cooperating with slowly moving or parked vehicles with sufficient computing
capability, VISS can extract potential victims from the monitoring video files and recruit mobile
monitoring node to monitor potential victims as long as possible. Thanks to the high mobility
of vehicles, VISS has an opportunity to achieve potential victims searching and monitoring with
lower budget. To measure the performance of VISS, two optimization problems, i.e., spatial
coverage maximization problem and temporal coverage problem, are formulated by considering
mobile monitoring nodes recruitment and computing resource allocation. A heuristic algorithm
is proposed with low complexity to effectively solve the optimization problems. Simulation
results demonstrated the effectiveness and efficiency of VISS.
The rest of this dissertation is organized as follows. Chapter 2 overviews the related
works. Chapter 3 describes the corresponding concepts in this dissertation. Chapter 4 discusses
the L-TRACK service for public areas in smart cities. Chapter 5 presents the SPATH service
in smart cities. Chapter 6 gives the VISS service in smart cities. Chapter 7 summarizes this
dissertation.
18
CHAPTER 2RELATED WORK
2.1 Safety Services
The role of Smart Cities in ensuring public safety and improving citizens’ quality of life has
gained increasing attention. Using cutting-edge technology (e.g., the Internet of Things) to
effectively combat crime and increase the interconnectivity among citizens can transform Smart
Cities into Safe Cities. Accordingly, this section summarizes related work on safety services.
Children Tracking Services
We classify the existing applications for tracking children into three types. The Type-I
applications [22, 23, 24, 25, 26] rely on GPS technology. In [22], Gupta et al. design a system
utilizing GPS, SMS (Short Messaging Service) and smartphones. Smartphones as the locators
are carried by the children, so they can send location information to the parents through the
Internet. SMS plays as a backup option in the system. Once children enter the area where
there is no Internet connection, the location information can be sent as a short message
through the cellular networks. Even though the proposed system in [22] can easily track the
children, it has several drawbacks. First, the large size of a smartphone makes it inconvenient
to carry around for children. Second, the smartphone has energy limitation. Third, there is a
high risk of losing the smartphone, which results in the failure of the system.
The Type-II applications [27, 28, 29, 30] employ the Bluetooth technology. A tracking
system using Bluetooth MANET (Mobile Ad hoc NETwork) has been proposed in [28]. In the
scenario of Morii et al., every target child has an android terminal, which can autonomously
configure a wireless network based on autonomous clustering technique. Android terminals in
the cluster communicate with each other to collect group information. As a result, each parent
can check whether his/her child becomes alone or not. In addition, parents also receive the
current locations of their children. In [28], they design two-tier networks to support the system.
The first tier is a Bluetooth MANET, which can easily form a group. The second tier is the
mesh networks that deliver the data from the group to the Internet. However, this system still
19
has its own limitations, such as large device size, limited device energy, and heavy reliance
on the Internet. In [27], Liu et al. propose a BLE tag based system that utilizes the limited
communication range between the locator and the receiver. The devices (e.g., smartphones)
carried by users keep receiving signals from BLE tags as long as the children stay in the safety
range (e.g., communication range) of the users (e.g., parents of the children). Once losing the
communications from the locators, the users’ devices get an alert. To overcome the weakness
that the system may fail to work when children disappear from the range, Liu and Li [27]
design a collaborative approach to finding the lost children. However, the limited energy
problem of BLE tags remains unsolved.
The Type-III applications construct RFID networks to track children. According to the
scheme of Lin et al. [31], RFID readers are deployed in key areas to monitor tags (which
are attached to children) passing by. Depending on the location, readers can choose to
either directly transmit data to nearby storage node or rely on packet passing nodes (e.g.,
visitors or employees) to deliver the data. The major problem of this RFID system is that the
packet nodes may lead to a long delay in sending the data to the nearby storage node. To
overcome this weakness, Chen in [32] creates a scenario in which RFID readers are placed in
the landmarks of a theme park, making it easier to keep monitoring the children when they
play around the landmarks. The wireless sensor networks would subsequently transmit the data
to the gateway. However, the coverage is a serious problem in this scenario.
Pre-crime Warning Applications
Early works on the pre-crime warning applications, such as [6, 7, 8, 9], are focused on
utilizing historical crime data and crowdsourced feedbacks to assess the safety status. In [6],
Galbrun et al. develop a crime probability model based on the historical crime data in Chicago
and Philadelphia. They estimate the possible crime hot spots with Gaussian kernel density
estimation. In order to measure the safety status of the navigation path, crime activity density
is proposed, which is quantified by aggregating crime probability of each point on the walking
20
path. Moreover, they design an algorithm to offer candidate paths for users with a different
tradeoff between distance and safety.
By observing the drawbacks of the approach in [6], Goel et al. improve the safety model
with two types of data, namely static and dynamic [7]. The static data is open data including
historical crime data, road quality information, locations of police stations, and schedule of
public transport, etc. Information in static data can be used to measure whether a navigation
path is safe to walk or not. However, the static data may not accurately capture the actual
situation as the information may be outdated. Therefore, the authors build a dynamic dataset
to adapt to the information change. Dynamic data includes feedback from users in near real
time, which is gathered in a crowdsourced manner. Users can report the safety status of any
point on their walking path. Following the design of Goel et al., Mata et al. identify the crime
level of the walking path with the official crime data and the useful information from online
social media as in [8]. Criminal data repository is first built from tweets related to crime
events. Then, the crime records are classified based on crime type, time, and location. Finally,
a safe route is obtained from the estimation of crime rates.
Different from previous works, Garvey et al. [9] integrate pre-crime warning and post-crime
service. In order to overcome the inaccuracy of the estimation of safety status, they develop
the PASSAGE, a safety application. In [9], Garvey et al. also offer possible walking path of
a user by applying estimation model of crime points and allows the user to add friends or
relatives as the guardians, who receive the current location of the user.
2.2 Vehicle as Resource
Today, the global automotive industry is being transformed with the advancement of
computation and communication technologies. Now drivers have more and more options of
smart cars for everyday use. Generally speaking, the function of a smart car can be improved
with the following devices in place: computing devices, GPS devices, communication devices,
sensing devices, radar devices, cameras, and storage devices. which can be used to improve
21
driving safety by sensing and processing the driving environment. As such, it is reasonable to
view a vehicle such as a smart car as a resource.
In [33], Zhang et al. propose a system architecture, where vehicles are service providers for
smartphones. When infrastructure-based cloud does not have enough resource to support the
service for users, residual computing in vehicles is allocated to accomplish mobile application
offloading. In [34, 35], Ding et al. design a V-CCHN (Vehicular Cognitive Capability Harvesting
Network) architecture, which utilizes CR routers enabled vehicles to handle the explosively
growing wireless data traffic. The V-CCHN involves several new features, such as the capacity
of reconfiguring agile communication interfaces to interoperate with other devices and mobility
to realize data exchange within proximity, to fully exploit available vehicles. For more details of
this architecture, readers are referred to [34].
22
CHAPTER 3PRELIMINARIES
3.1 Radio Frequency Identification
The technology of Radio Frequency Identification (RFID) can automatically detect a
person or an object via radio waves within a wide range of distance (e.g., from a few inches to
hundreds of feet) [36]. As an automatic data capture system, RFID can largely improve system
efficiency. Without direct contact, RFID is able to communicate via RF signals. With silicon
chips (where data is kept) being tagged to people, animals or non-living objects, RFID provides
an electronic product code (EPC) which is a unique identification number for each identified
target [37]. Overall, there are three main categories of the RFID tags.
Active tag: It has a power support system for the circuitry and antenna of the tag.
The strength an active RFID tag is manifested in the long-distance (e.g., over a hundred
feet) readability and the incorporation of other sensors powered by alternative current (AC).
Nonetheless, the main weakness lies in the limited lifespan of an active RFID tag. Specifically,
the tag is very costly and large in size. It may also increase the maintenance expense in the
case of battery replacement. Further, battery outages in this type of tag may entail high
chances of misreads [38].
Semi-passive tag: In order to deliver identification information, semi-passive tags reflect
RF singnal back to the tag reader. With a battery to power ICs, this type of tags give birth
to various innovative products. For instance, with a built-in sensor, the tag can transmit
information such as lighting, temperature and humidity in real time. By using the battery only
to power a simple IC and sensor, the semi-passive tags are able to keep a balance between
cost, size, and range [38].
Passive tag: Instead of having a power source, the passive tag is powered by the reader.
It relies on the power drawn from the inductive coupling with reader antenna. However,
a noticeable problem is that a passive tag is only readable within a few feet of distance.
Nevertheless, the advantages of a passive tag are evident: First, its life cycle can be extended
23
to more than 20 years as the tag can function properly in the absence of a battery. Moreover,
the passive tag is much cheaper (costs only 10 cents) and physically smaller compared to an
active tag, hence it is commonly applied to consumer products and a wide range of areas [38].
Figure 3-1. Illustration of RFID communication.
Passive tags send radio waves that contain EPC/information to the reader, which
then sends continuous waves (CW) to provide power for the tag and allow the chip in the
tag to function [39]. Passive tag can transmit information to the reader via radio waves
without having direct contact with the reader. This is made possible by the technology called
backscattering (as shown in Figure 3-1). When tuned to a certain frequency, passive tag
is capable to take in most energy at the same frequency level. However, when there is an
impedance mismatch at this frequency, the antenna will reflect back some of the energy (as
tiny waves) toward the reader [40]. The RFID technology has demonstrated considerable
value across fields. For example, it enables the automation of supply chain management, asset
tracking, animal monitoring medical applications, warehouse and access control in contactless
manner [41].
3.2 Video Summarization
The creation of video content has experienced a tremendous increase within the past
few years, causing a series of problems in relation to information congestion and content
management. With the growing number of videos released on the web, there is a need to
24
efficiently extract useful information from the videos. As such, technologies focusing on video
content processing deserve greater attention from the scholars [42, 43].
The various stages of video summary algorithms based on key frames are as described
below [44, 45].
Step 1) Data Input. The format of the videos can be diverse. A typical format is AVI
(Audio Video Interleave).
Step 2) Frame Division. This step involves processing the video which can be achieved
through frame division. In this step, the recorded video is split into multiple frames, which may
take up a lot of memory space. The number of frames is determined by the size of the video.
Moreover, the frame rate is about 20 to 30 frames per second.
Step 3) Feature Extraction. This step is to extract visual features of the key frames
through feature extraction. These features include color, edge and motion features. Features
are extracted based on different frames’ characteristics, which are determined by the frame
difference values.
Step 4) Frame Selection. It starts with naming the first frame as a key frame. If the
difference between the current frame and the previous key frame is sufficiently large, the
current frame will be named as the key frame hence be selected. Such selection process is
applied for all video frames.
3.3 Matching Theory
There are two major approaches to solve the optimization problems. One is the
centralized algorithms which use highly complex computation to obtain optimal outcomes.
The other is distributed approaches which use less complex computation to achieve suboptimal
solutions. Matching game is one of the distributed approaches that are commonly used
to address issues regarding optimization. Studies on Matching Theory examine the ways
through which agents from different groups can be linked with one another according to
their preferences. The theory was brought up by David Gale and Lloyd Shapley in 1962 in an
attempt to solve the two-sided matching problem [46]. Afterwards researchers have applied this
25
theory to a broad range of fields and managed to address matching problems such as allocating
students to college dorms, passengers to airport shuttles and organs to patients in hospital.
Taken together, many real-life cases of large scope can be modeled as matching problems
based on the preferences of agents [47].
Figure 3-2. Illustration of matching.
An instance involves two finite and disjoint sets denoted byM = m1, ..., mi, ..., mp and
W = w1, ..., wj, ..., wq, respectively. wj ∈ W has a positive integer capacity, denoted by Nj
, indicating the number of posts that wj has. The agents are the wj and mi. Each agent has
a preference list in which she/it ranks agents in opposite set in strict order. For example, if mi
prefers wj to wk, we write it as wj ≻miwk. Given preferences, we give the following formal
matching definition.
Definition 1. [48] A one-to-one matching µ is a mapping from the setM to W, such that
µ(mi) = wj if only if µ(wj) = mi. Moreover, µ(mi) ∈ W and µ(wi) ∈M.
Once a matching µ is established, we need to check the stability of µ. If no agent (mi
or wj) wants to change its current paired assignment, a matching is stable. The definition of
stability is provided in Definition 2.
26
Definition 2. [47] A matching µ is said to be stable if it admits no blocking pairs. A pair
(mi, wj) is a blocking pair if the following the conditions hold: (1) mi is either unassigned or
prefers wj to µ(mi); (2) wj is either unassigned or prefers mi to µ(wj)
Matching theory also provides tractable solution to the problem of multiple agents in two
distinct groups. Each agent wants to match with one or multiple agents in the opposite group.
Mathematically, the many to one matching can be defined as follows.
Definition 3. [49] Given two distinct setM and W, a matching µ is a mapping function from
M∪W into 2M∪W , such that: µ(mi) ⊆ W and |µ(mi)| ≤ 1 for all mi ∈M; µ(wj) ⊆M and
|µ(wj)| ≤ Nj for all wj ∈ W, where Nj is the capacity of agent wj ∈ W; µ(mi) = wj if and
only if wj ⊆ µ(mi) for all (mi, wj) ∈ M×W
3.4 Genetic Algorithm
During 1960s to1970s, Holland along with other researchers first proposed the concept of
Genetic Algorithm (GA) which are inspired by the evolutionist theory [50]. According to the
evolutionist theory, all species on the earth face natural selection. While the strong species
gain greater chance to survive and preserve their genes through reproduction, the weak ones
are eliminated in the natural selection process. As a result, species with the preferable genetic
combination make up the majority of the population over the long term. Meanwhile, random
genetic changes may take place during the chronic process of evolution. If the changes are
beneficial for survival, such changes will be retained as new species evolve from their ancestors.
On the other hand, changes that do not increase the chance of survival are discarded in the
natural selection process.
Chromosomes, a key term in the Genetic Algorithm (GA), are made of genes that control
core features of the chromosome. Originally genes are used to indicate binary digits, whereas
their current implementations are commonly used to denote variables [51]. Generally speaking,
with the mapping technique called encoding, a chromosome is mapped to a particular solution
in the feasible solution set. A population composed of multiple chromosomes is randomly
27
Figure 3-3. Illustration of crossover and mutation.
initialized. Within a population, two operations of GA namely crossover and mutation are used
to generate new solutions.
As the most critical operator of GA, the crossover combines two chromosomes (known as
parents) to produce new chromosomes (known as offspring) [52]. Those chromosomes with
superior genes are more likely to be selected as parents to pass on their good genes to the
next generation. With the repetition of crossover operator, chromosome containing good genes
would become dominant in the population hence result in convergence to a local optima.
Another operation of GA is called mutation. Operating at the gene units, mutation is
specialized in preserving genes diversity. Mutation allows changes of characteristics to take
place randomly in chromosomes. Since the probability of mutation is quite small, the newly
produced chromosome will be similar to its parent. To sum up, both operations play an
important part in GA. Whilst crossover is capable to retain good genes in the population,
mutation can introduce slight changes to the population.
28
CHAPTER 4L-TRACK:CHILDREN TRACKING IN THEME PARKS
4.1 Background
Losing a beloved child is no doubt the worst thing for every parent. In some cases, parents
find that their children are lost while they are talking with others for a few seconds. Based
on the statistical data for Missing and Exploited Children released by the National Center, we
learn that roughly 800,000 children are missing every year in the United States, which means
roughly 2,000 children are reported missing every day [53]. Some incidents occur when parents
take their children to public places, especially the markets, shopping malls, and theme parks.
For example, in large theme parks like Walt Disney World, there are tens of thousands of
visitors every day. It may be just a turn-around and the next thing you realize is that your child
is missing. To make matters worse, finding a missing child in a huge park is almost impossible.
To prevent parents from losing their beloved children, researchers have developed many
systems and approaches. The most popular one is to place the GPS (Global Positioning
System) locators on their children. The Paw tracker, Trax GPS Tracker, and HEREO GPS
watch [54] are the popular products based on GPS. The main issues of using GPS systems
are high cost and energy limitation of a locator. When a GPS locator works in a continuous
mode, it consumes energy rapidly. Thus, Bluetooth Low Energy (BLE) is emerging as the
alternative approach to solve the children missing problem. In the BLE tracking systems,
the locator can directly communicate with a user’s device (e.g., smartphone). As mentioned
in [55, 56], a Bluetooth tracker company named Chipolo can help parents locate their children
by attaching BLE tags to children’s shoes or clothes. Even though the energy consumption has
been reduced using BLE tags, the energy problem still limits the popularity of BLE tracking
systems. Another drawback of the systems relying on BLE is that if the children go out of
the communication range, their parents may not locate their children any more. Given the
weakness mentioned above, it is imperative to design a new children tracking system, which is
energy efficient and robust to dynamically changing environments.
29
Nowadays, RFID technology [57, 58], especially the passive RFID, which relies on the
backscatter technology, has emerged as a promising approach due to its low cost and less
restriction on energy. In [31], Lin et al. construct an RFID based opportunistic network to
locate children. They use distributed nodes to store the location data of tags. In their design,
the system relies on moving people, who acts as carry-and-forward nodes to transmit data.
When users query the information of tags, the control center can find the corresponding
information in the distributed storage nodes. Chen et. al in [32] have proposed another system
that combines RFID networks with wireless sensor networks for tracking children in theme
parks. In their design, the readers rely on the wireless sensor networks for data transmissions.
However, there are several challenges facing RFID based children tracking system.
Firstly, potential congestion would reduce quality of service. Most of RFID based children
tracking systems adopt the centralized design. In this design, a reader would transmit collected
data to the remote control center (such as a base station) for processing and storage. For
example, the proposed system in [32] is designed in the centralized fashion. In their design,
reading data would be relayed back to the remote control center through multi-hop wireless
sensor networks. Actually, the remote control center would be congested due to all of devices
waiting for transmitting and computing data in its coverage. Secondly, unnecessary waste of
communication resource is another problem. Most of the situations, the readers would operate
in the continuous model. The continuously reading may incur significant traffic. Notice that it
is not necessary to transmit reading data all the time to remote control center since children
might stay in the same place, such as waiting in line for a spot of interest in a theme park.
Thirdly, full coverage of children activity area is critical. In the design of Lin et al. [31] and
Chen et. al [32], they both propose to simply place the fixed readers in key points. Without
full coverage of children activity area, the system may have the blind area. As a result, it is
critical to design an efficient and effective RFID based children tracking system.
Inspired by previous works, we propose a new children tracking system based on UHF
RFIDs (as shown in Fig 4-1). Similar to previous works, we propose to fasten the passive
30
Figure 4-1. System architecture.
RFID tags on children. When the children play in a theme park, their tags would be read
by the nearby fixed readers with wireless communication capability. These fixed readers are
deployed by a service provider, such as the theme park, to cover the whole activity area of
children. The service provider obtains the locations of children by aggregating the readings of
these readers. To avoid the potential congestion problem in the centralized design, we utilize
the mobile devices carried by the park employees and visitors as the local processing units.
In so doing, raw reading data is not sent to the remote control center for data processing.
With the help of remote control center, the reader finds a mobile device (e.g., smartphone)
for data processing. Then, the associated mobile device/local processing unit delivers the
processed data to users. In practice, some of the users may locate in the communication
range of associated mobile devices. Thus, the associated mobile devices directly transmit the
data to the users in the transmission range. For the users out of the communication range of
associated mobile devices, the remote control center serves as the relay for data transmissions.
Since mobile devices have limited energy, if they consume too much of their energy quickly,
there are not enough number of local processing units that support the service for users. To
fully exploit the mobile devices for service provisioning, we formulate an energy efficiency (EE)
optimization problem by jointly considering power allocation and user association. We address
31
the EE optimization problem by adopting the dynamic updating matching algorithm. As such,
the main contributions of this chapter are summarized as follows:
First, we propose a novel RFID system to track children in public areas. With the
designed system, the locations of children can be tracked with simple carry-on devices, namely,
RFID tags. We utilize the mobile devices carried by park employees and/or visitors as local
processing units to avoid the potential congestion problem. With the help of remote control
center, each reader is matched with a mobile device for data processing.
Second, EE of mobile devices is critical in our scenario because of the energy limitation of
associated mobile devices. We formulate an EE optimization problem by jointly considering the
resource allocation and user association. Since the formulated EE problem is NP-complete, we
adopt dynamic update matching algorithm to provide an suboptimal solution.
Finally, through extensive simulations, we show that our proposed schemes are effective in
improving the EE performance of associated mobile devices.
4.2 Architecture
4.2.1 Overview
Fig. 4-1 gives a high-level overview of our proposed system. RFID tags are attached to
the visitors of theme parks. We call the tag attached on child is the target tag and the tag
placed on a normal visitor is the interference tag. In addition, we also deploy RFID reference
tags which can help readers locate target tags more easily. RFID readers are deployed in theme
parks to make sure that every point of the children’s activity area is covered at least by one
reader. We also assume that readers are equipped with communication radio interface with
other mobile devices, which can be done with certain customization. When children travel
in the theme parks, the attached tags will be scanned by the nearby fixed RFID readers. As
we mentioned in the previous section, we employ the wireless communication readers. Then,
readers send the scanned data to local processing units for data processing. Local processing
units are the mobile devices carried by park employees and visitors. Actually, visitors can access
this system via an application which is downloaded and installed on their mobile devices.
32
Parents can track their children through this application. If the smartphone of a visitor has
enough power, the visitor can apply as the local processing unit to perform processing and get
monetary compensation. Finally, local processing units send the processed data to devices of
users.
We divide the time into discrete fixed time period, called slot. At the beginning of the
slot, readers first scan its coverage area to read data from tags in the area. The reader utilizes
power control to tune the transmission power level in order to read the tags since power
control not only helps improve the location accuracy of target tags, but also avoids the reading
collision problem among readers. We group readers into clusters. In each cluster, one central
reader acts as the cluster head to gather reading data of all other readers. The cluster head
also has ability to buffer the reading data. Then, the cluster heads gather all the raw reading
data from their cluster members.
The raw reading data will go through two stages before being delivered to the users.
The first stage is the processing stage, which includes reference tag elimination, target tag
location estimation, and so on. In the beginning of processing stage, all cluster heads request
the remote control center help them find the local processing units. At the same time, the
remote control center requires information of all mobile devices registered as the candidates
of local processing units. The reader-mobile device association process will be finished at the
remote control center. Then readers send the raw reading data to the associated mobile device
(e.g., d1 in the Fig. 4-2 ). The raw reading data will be locally processed by the associated
mobile devices. Then, the processed data is passed to the second stage, the delivery stage.
In this system, we assume both readers and mobile devices have limited device to device
communication range. In the delivery stage, the associated mobile devices directly transmit the
processed data to the nearby end users (e.g., d2 and d3 in the Fig. 4-2) in its communication
range. For the end users out of the communication range of the associated mobile device
(such as d4 in the Fig. 4-2), the remote control center serves as the rely nodes for data
transmissions. In addition, in the subsequent development of this chapter, when we say the
33
reader, we mean the head of a reader cluster. The whole process are summarized in the
Fig. 4-2.
Figure 4-2. Whole process of data processing and transmissions..
4.2.2 System Model
We denote the set of the readers as R = 1, 2, · · · , j, · · · , R, the j-th reader by rj. We
also denote the mobile devices by D = 1, 2, · · · , i, · · · , D, the i-th mobile device by di. To
evaluate the performance of our system, we first elaborate a few important concepts we will
use in the subsequent development.
Link Data Rate
In our scenario, orthogonal channels are adopted in the transmissions among mobile
devices and transmissions from mobile devices to remote control center. Thus, transmissions
among different channels are interference free. According to the Shannon-Hartly theorem, the
data rate of the link between mobile device di and mobile device dk or remote control center B
is
ci,× = Wi× log2
(
1 +pi,×hi,×
N0Wi,×
)
. (4-1)
where × indicates a target node (either dk or base station B), and pi,× denotes the transmission
power of mobile device di, hi,× is the channel gain from mobile device di to dk or base station
34
B, and N0 is the power spectral density of Additive White Gaussian Noise (AWGN). Then, we
can get the total achieved data rate via the mobile device di is
Ci =∑
k∈Ti∪B
Wi,k log2
(
1 +pi,khi,k
N0Wi,k
)
. (4-2)
where Ti is the set of neighboring nodes, which means the end users within i’s transmission
range. For example, in the Fig. 4-2, the set of neighboring nodes of mobile device d1 is
d2,d3 since only these destinations/end users in its communication range. |Ti| is the
cardinality of the set Ti. Actually, Ti is determined by the reader association selection xj,i.
That is, when mobile device di associates with different reader ri, the set Ti is different.
Power Consumption
The total power consumption of each mobile device di includes two parts, which are the
aggregated power consumption for data processing EPi and the power consumption for data
transmissions, respectively. We define fi as the computation ability of mobile device di. The
power consumption of mobile device di for data processing can be calculated as[59]
EPi = κ(fi)
3 (4-3)
where κ is the coefficient depending on the chip architecture. Power consumption for data
transmissions can be characterized by[60]
ETRi =
∑
k∈Ti∪B
ηpi,k + P ciri (4-4)
Here, P ciri is denoted as the circuit power consumption and η is the power amplifier efficiency.
The power consumptions of the infrastructure nodes and fixed readers are assumed not to be
considered as all of them are powered by more powerful external power source.
Matching Matrix
We introduce an R × D reader association matrix. Element xj,i in the matrix indicates
whether or not the reader rj is associated with mobile device di. That is, fixed reader rj
transmits the raw data to mobile device di for processing when xj,i = 1; otherwise, xj,i = 0.
35
Table 4-1. Table of parameters
Parameter DescriptionR Set of readersD Set of mobile devicesrj j-th fiexd readerdi i-the mobile devicePi,× Transmission power of the mobile device dihi,× Channel gainN0 Power spectral density of additive white Gaussian noise
T ji Set of connected devices within di’s transmission range
EPi Power consumption for data processing of di
P ciri Circuit power consumption
η Power amplifier efficiency
To improve the clarity, notations of key parameters are summarized in Table 4-1
4.3 Problem Formulation
Given the model described before, we target at the problem on maximizing the energy
efficiency of associated mobile devices. In our design, sufficient number of available local
processing units can provide long and stable service for users. However, if all mobile devices
consume their energy quickly, there are few mobile devices would act as local processing units
to support users. Thus, improving energy efficiency of mobile devices can maintain quality of
experience and make the whole system stable [61]. Hence, we consider a joint EE optimization
problem for reader association decision and resource allocation. We first formulate the EE
function for each mobile device di, which is given by
EEi =Ci
EPi + ETR
i
(4-5)
where Ci is the total achieved data rate via mobile device di to users (mobile devices carried
by parents). That is to say, data from readers is processed on mobile device di, and then the
processed data is sent to users. To process data Cj,i for users, mobile device di consumes a
certain amount of power, which includes the power consumption for data processing EPi and
the power consumption for data transmissions ETRi .
Furthermore, we need to consider several constraints for the EE optimization problem.
36
4.3.1 Reader Association
The fixed reader rj can only associate with one mobile device for data processing. This
constraint can be captured as follows
∑
i∈N
xj,i = 1 (4-6)
4.3.2 Maximum Power Limitation
In our scenario, we assume each mobile device can just utilize transmission power below
the maximum Pmax, that is,
pi,k ≤ Pmax (k ∈ Ti ∪ B) (4-7)
4.3.3 QoS Requirement
In order to guarantee the QoS requirement for the users, we introduce the constraint as
Wi,k log2
(
1 +pi,khi,k
N0Wi,k
)
≥ cmin (k ∈ Ti ∪ B) (4-8)
where cmin is denoted as the QoS threshold.
37
4.3.4 EE Optimization
Based on the constraints we mentioned above, we have the following optimization problem
maxxj,i,pi,k
∑
i∈N
∑
j∈M xj,iωiCj,i
|∑j∈M xj,i|EPi +
∑
i∈M xj,iETRj,i
(4-9)
s.t.
Cj,i =∑
k∈Tj,i∪B
Wi,k log2
(
1 +pi,khi,k
N0Wi,k
)
ETRi =
∑
k∈Tj,i
ηpi,k + P ciri
EPi = κ(fi)
3
0 ≤ pi,k ≤ Pmax (k ∈ Tj,i ∪B)
Wi,k log2
(
1 +pi,khi,k
N0Wi,k
)
≥ cmin (k ∈ Tj,i ∪ B)
∑
i∈N
xj,i = 1
xj,i ∈ 0, 1
where ωi is a balancing weighting factor related to the residual energy of mobile device di
and the stable time. Actually, if a mobile device has more residual energy and does not move
frequently, it would be a better choice to be a local processing unit. Here, Tj,i is device di’s
neighboring nodes that request the data from reader rj . Clearly, our formulated optimization
problem (4-9) is a mixed-integer nonlinear programming problem, which is NP-complete as
proved in [62]. In the next section, we adopt matching theory to find the feasible solution to
the EE maximization problem.
4.4 Matching Approach
4.4.1 Preference Establishment
We first establish each player’s preference list. Notice that mobile devices’ preference lists
cannot be set up since the neighboring nodes set Tj,i for each device di is unknown before the
reader mapping decisions between readers and devices have been made. We consider the case
of two adjacent time slots. Assume the network condition changes slightly because the time
38
slot is short. That is to say, only a small number of readers’ or mobile devices’ preferences are
changed. Under this assumption, we can set up mobile devices’ preference lists of the current
time slot according to the knowledge from previous slot.
Preference Establishment
The basic idea to establish the preference of a mobile device is to use knowledge from
previous time period to obtain the set of neighboring nodes. We first set up the preference
list of rj . All readers establish their preference lists according to their benefit functions .
The benefit of reader rj depends on the achievable data transmission rate, which can be
characterized as µCj,i, where µ is the benefit factor. Without loss of generality, we set µ = 1.
Thus, the preference list of rj over device di at time slot t is VRj (t) = (V R
j,i(t)), where V Rj,i(t) is
abtained according to
V Rj,i(t) = ωi
∑
k∈Tj,i(t−1)∪B
Wi,klog2
(
1 +pi,k(t)hi,k(t)
N0Wi,k
)
(4-10)
We now introduce the preference establishment of a mobile device. Mobile device di
sets up its preference based on its transmission cost function. The cost function is the power
consumption for transmissions and processing, which is ν(EPi + ETR
j,i ). Similarly, we also
assume ν = 1 for ease of presentation. Then the preferences of di over device rj at time slot t
is VDi (t) = (V D
i,j (t)) and V Di,j (t) can be captured according to
V Di,j (t) = κ(fi)
3 +∑
k∈Tj,i∪B
ηpi,k(t) + P ciri (4-11)
We model di’s preference and rj ’s preference according to local maximum achievable EE
with the set of neighboring nodes Tj,i(t−1) at time slot t. Thus, we develop the following Fast
Iterative Power Allocation algorithm (FIPA) to obtain the transmission power between device
di and neighboring nodes set Tj,i, which is obtained from the formulated local power allocation
39
problem
maxpi,k
UEEi (t) =
Ci[pi,k(t)]
Ei[pi,k(t)](4-12)
s.t.
Ci[pi,k(t)] = ωi
∑
k∈Tj,i(t−1)∪B
Wi,k log2
(
1 +pi,k(t)hi,k(t)
N0Wi,k
)
Ei[pi,k(t)] = κ(fi)3 +
∑
k∈Tj,i(t−1)∪B
ηpi,k(t) + P ciri
0 ≤ pi,k ≤ Pmax (k ∈ Ti ∪ B)
Wi,k log2
(
1 +pi,khi,k
N0Wi,k
)
≥ cmin (k ∈ Ti ∪ B)
Since the problem formulated in (4-12) is a nonlinear fractional programming, we first
employ fractional programming theory to transform it to an equivalent convex programming.
Thus, based on what Dinkelback has elaborated in [63] and more recent studies [64] [65], we
have the following proposition:
Proposition 4.1. [63] Define the function Q as
Q(λ) = maxpi,k
Ci(pi,k)− λEi(pi,k). (4-13)
Then, the optimal power allocation p∗i,k is achieved if and only if there is λ∗ such that Q(λ∗) =
Ci(p∗i,k)− λ∗Ei(p
∗i,k) = 0.
From this result, we develop the FIPA algorithm.
FIPA Algorithm
The equivalent optimization problem is given by
maxpi,k
Ci(pi,k)− λ∗Ei(pi,k) (4-14)
s.t.
0 ≤ pi,k ≤ Pmax (k ∈ Ti ∪ B)
ci,k ≥ cmin (k ∈ Ti ∪ B)
40
Then we utilize FIPA algorithm based on the well-known Dinkelbach algorithm [63] to get the
specific values of λ∗. At the nth iteration, with the value of λ(n − 1) from the (n − 1)th
iteration, pi,k(n) are obtained by
pi,k(n) = [1
ηλ(n− 1)ln2− N0Wi,k
hi,k
]+. (4-15)
where [x]+ = maxx, 0. Then, if pi,k(n) > Pmax, we set value of pi,k(n) to Pmax. If
pi,k(n) < Pmini,k (which is obtained from (4-8)), we set value of pi,k(n) to Pmin
i,k . Finally, if
Ci[pi,k(n)]− λ(n− 1)Ei[pi,k(n)] < ∆ holds, the algorithm stops. Otherwise, update n = n+1,
λ = Ci[pi,k(n)]/Ei[pi,k(n)], and go to the next iteration. We can also use more efficient
algorithms developed in [64] [65], but we choose Dinkelbach’s algorithm for the ease of
presentation.Algorithm 4.1. FIPA Algorithm
1: procedure PIFA(∆,λ(0),N ,n)2: Calculate each Pmin
i,k according to (4-8)3: while n ≤ N do4: Obtain pi,k(n) by (4-15)5: if pi,k(n) < Pmin
i,k then6: Set pi,k(n) = Pmin
i,k
7: end if8: if pi,k(n) > Pmax then9: Set pi,k(n) = Pmax
10: end if11: if Ci[pi,k(n)]− λ(n− 1)Ei[pi,k(n)] ≥ ∆ then12: Set λ(n) = Ci[pi,k(n)]/Ei[pi,k(n)];13: else14: pi,k(t) = pi,k(n)15: end if16: Update n = n+ 117: end while18: end procedure
4.4.2 Dynamic Updating Matching Algorithm
When the preference establishment is completed, we can start with the matching. We
propose the Dynamic Updating Matching (DUM) algorithm, which proceeds iteratively.The
DUM algorithm has two stages. At the first stage, readers conduct the matching based on
41
the preference list VRj . In each iteration, reader ri proposes to its most preferred device di.
After this, di is removed from preference list VRj . Then device di decides whether to accept or
reject the proposal based on its preference list over the reader rj . If there are more than one
proposal, device di chooses to keep the reader rj that it favors the most, and rejects the rest.
The proposing and accepting/rejecting iterations run for as many rounds as needed until all
readers are matched or all readers’ preferences that are fully examined. We also consider the
case all readers’ preferences are fully examined but some readers are still unmatched. We let
device di increase its accepting capacity and reader rj updates its preference list based on the
current matching. Then readers conduct the new matching based on the new preference lists.Algorithm 4.2. DUM Algorithm
1: procedure DUM(pi,k(t)) ⊲ Matching Construction;2: Each rj sets up its preference VR
j according to (4-10)
3: Each di sets up its preference VDi according to (4-11)
4: Construct unmatched set Run, set Run=R ⊲ Matching;5: while Run 6= ∅ do6: for each rj ∈ Run do7: Proposes to the first di in its preference list and remove di from VR
j ;8: end for9: for di ∈ D do10: if di receives one proposal then11: di keeps the proposal;12: Remove rj from Run;13: else14: di keeps the most preferred proposal from rj∗, and rejects the rest;15: di removes rj∗ from the Run, and add the rejected readers into the Run;16: end if17: end for18: end while ⊲ State Update;19: if Run 6= ∅ then20: Update preference list VD
i ;21: Update preference list VR
i ;22: Go to step 6;23: end if24: end procedure
42
Figure 4-3. A snapshot of mobile device location with N=70.
4.5 Performance Evaluation
4.5.1 Simulation Setup
This section presents EE of the proposed solution. There are R readers placed in the
grid topology and D mobile devices randomly distributed in the area. A snapshot of mobile
device locations with D = 70 and reader locations with R = 49 is shown in Fig. 4-3. The
big diamond is the remote control center, the stars are the RFID readers, and the dots are the
mobile devices. We assume the communication range between mobile devices is up to 100 m.
The mobile devices are assumed to have an circuitry power consumption Pcir = 50mW . We
also set the effective switched capacitance κ = 10−28[59]. The channel fading is modeled by
complex normal distribution, CN (0, 1)[66].
To evaluate the performance, the proposed matching algorithm is compared with classical
stable marriage matching (SMM) algorithm and one heuristic algorithm. The heuristic
algorithm is called reader-greedy algorithm, which readers are always matched with the mobile
devices most preferred according to readers’ preferences. In addition, for the purpose of
43
comparing the impact of our proposed power allocation approach, we also introduce random
power allocation approach and greedy power allocation approach. In particular, greedy power
allocation approach allocates the maximum transmission power Pmax for every transmission
link of associated mobile devices. Random power allocation approach employs transmission
power distributed in the range [0, Pmax]
4.5.2 Results and Analysis
Performance comparison with the optimal solution
Figure 4-4 shows EE performance of our proposed algorithm and the optimal solution,
which serves as a benchmark for comparison. The optimal solution is obtained by the
exhaustive enumeration method. Considering the high computational complexity of the
exhaustive enumeration method, a small-scale network size is set to evaluate the performance
of the proposed algorithm. We set the number of readers R is to be varied in [26] and the
number of mobile devices is 5. As it is shown, the performance of proposed algorithm achieves
more than 80% of the optimum one. Hence, we can conclude that DUM can attain an
approximated optimal energy efficiency by comparing with the exhaustive enumeration scheme.
Furthermore, although there is gap between DUM and the optimal matching scheme, DUM
can obtain a suboptimal performance with lower computational complexity.
Performance comparison of different matching algorithms
In Fig. 4-5, we evaluate the energy efficiency versus different network size. Since the
readers are deployed in grid topology and have the fixed reading range, the number of readers
varies with the network size. We assume that the number of readers R is varied in [949].
We set the density of mobile devices to be fixed, Ω = 0.005 devices/m2. Simulation results
demonstrate that the EE of the proposed matching approach first increases fast and then
grows slowly. The reason is that with the network size increasing, both readers and mobile
devices have a wider variety of expanded matching candidates. In the three approaches, the
proposed matching algorithm achieves the best energy efficiency, which indicates that it can
exploit more benefits from the diverse choices than the other two algorithms. The performance
44
of stable marriage matching algorithm is not as good as the proposed algorithm since it
cannot update preference timely and ignores the benefits from the previous matching. The
performance of the reader-greedy approach is not as good as the other two algorithms since
it cannot fully exploit the diverse matching candidates and ignores the benefits from power
allocation process of data transmissions.
Comparison of power allocation approaches
Figure 4-6 shows the EE of diffident power allocation strategies. We employ the same
values of R and Ω as in the previous simulation. We set the maximum allocated power to
Pmax = 30dBm. The result demonstrates that proposed power allocation approach achieves
the best EE and outperforms the random power allocation approach and the greedy power
allocation approach by 375% and 452% for R = 25, respectively. The random power allocation
gets the second best performance since it has higher probability to take full advantage
of the available power. We also find that benefits from the increasing power is not able
to compensate for the EE loss. The greedy power allocation approach achieves the worst
performance due to two reasons. The first is that the power allocation is fully ignored since
it employs the fixed power. The second is that increasing transmission power has higher
probability for passing the point for the optimum EE. Thus, increasing transmission power does
not really improve the EE, rather causes significant EE loss.
EE with respect to the density of mobile devices
In Fig. 4-7, EE of different algorithms with respect to the varied density of mobile devices
are evaluated. In this evaluation study, the density of mobile devices varying within [5 35] and
the step size is 5. We set the number of readers to R = 36. The result demonstrates that the
impact of the density of mobile devices is evident only at lower values. When the density of
mobile devices is not large, the EE grows almost linearly with the increasing density of mobile
devices. Then, the EE stays nearly constant even when the density of mobile devices continues
to increase. The reason is that when the density of mobile devices is small, the system gains
more benefits from the density of mobile devices. Once density of mobile devices exceeds the
45
point for the optimum EE, the reader can always be matched with perfect mobile devices to
obtain the best EE.
EE with respect to the computation capability of mobile device
We evaluate the energy efficiency versus different computation ability of mobile devices.
In this evaluation study, the computation capability of mobile devices varies within [0.5 0.9]
GHz and the step size is 0.05. We set the number of readers to R = 16. The results are shown
in Fig. 4-8. It can be seen that three matching algorithms demonstrate the same relationship
between energy efficiency and the computation capability of mobile devices. The result shows
that the EE decreases nearly constant when the computation capability of mobile devices
stays at low values. Then, the EE decreases evidently with the computation capability of
mobile devices continues to increase. The reason is that when the computation capability of
mobile devices is low, the system loses less benefits from the computation capability of mobile
devices. That is to say the energy consumption of computing process is not dominant when
the computation capability is low. Once the computation capability of mobile devices is high,
computing process becomes the major source of energy consumption. Thus, the EE decreases
evidently.
46
Figure 4-4. Comparison to the optimal solution.
Figure 4-5. Comparison of different matching algorithms.
47
Figure 4-6. Comparison of different power allocation approaches.
Figure 4-7. EE under different density of mobile devices.
48
CHAPTER 5SPATH: A SAFE WALKING NAVIGATION SERVICE
5.1 Backgroud
Public safety is one of the most important concerns in the United States. According
to the annual compilation of crimes reported by the law enforcement agencies, there were
estimated 1,247,321 violent crimes committed in 2017. Moreover, there were estimated
319,356 robberies all the year round [67]. That is to say, nearly 38 robberies were reported
every hour. In fact, most robberies occur in urban areas, especially at night. To improve
public safety in cities, technology companies have already taken steps to design safety related
applications. Recently, Mobile Software AS designs a new application, bsafe [68], which
allows a user to add contacts as the guardians. When an imminent danger is perceived, a
user can activate this application, which automatically sends alert to the recorded guardian.
Similarly, Safe Apps Ltd. launches a StaySafe [69], which involves a new safety feature, called
timed sessions. A user can set check-in intervals as their estimated session time. Once the
user misses the session time deadline, this application will notify the corresponding contacts.
However, all those applications are the post-crime services. Thus, how to offer a pre-crime
warning is still an open problem.
Open crime dataset is considered by many researchers recently to identify the safest and
shortest path for users [6, 7, 8, 9]. In [6], Galbrun et al. utilize a crime probability model based
on the existing crime data to measure the safety status of a walking path. Given historical
crime locations, the estimated density of crime at a point can be quantified with Gaussian
Kernel Density Estimation (KDE). Then, the estimated crime density of a walking path can
be measured by aggregating crime occurring points on walking path. Goel et al. improve
Galbrun’s model in [7]. They design a safety model based on both the static and dynamic
information. The static information is composed of crime related dataset belongs to different
administrations. Dynamic information involves feedback received from users (crowdsourced).
Users update the safety status of any point on their walking paths. Different from previous
50
works, Garvey et al. [9] integrate pre-crime warning and post-crime support to design a novel
safety application called PASSAGE. PASSAGE not only recommends safe paths to a user but
also allows the user to share her current walking location with a friend.
Figure 5-1. System architecture.
However, the previous models suffer from the following limitations: (a) The historical
crime data may be outdated; (b) The crime estimation model is not adapted well to small time
scale; (c) Crowdsourced data cannot guarantee sufficient feedback; (d) User feedback based
on personal experience is not accurate. In order to overcome these limitations, we propose
to utilize street cameras with high resolution and wireless communication capability as the
“remote eye” since street cameras has been widely deployed for many applications in smart
cities. For example, Moscow has installed 160,000 outdoor cameras to support several public
services such as trash removal, traffic management and crime monitoring [70]. Chicago has
developed two public safety related programs, which has deployed over 32,000 cameras in the
city in order to respond to traffic-related issues, monitor large crowds such as parades, and
validate calls for fires or EMS [71].
Even though utilizing street cameras can overcome the limitations of previous design,
long latency caused by the transmissions of large volumes of videos will impose restrictions
on the use of these cameras. Edge computing provides a popular solution to this issue, which
pairs data source with powerful edge servers [72, 73, 74]. Such servers are deployed at the
proximity of data source to perform task computing or processing, data storage, and caching.
51
For example, Rodrigues et al. [74] present a method by utilizing virtual machine migration
and transmission power control to minimize service delay. As a result, their approach based
on simultaneously lowering the time for transmission and the time for processing does reduce
service delay significantly, particularly when the application involves with transmitting a
large amount of data. Furthermore, in order to deal with communication and computing
demands at edge more efficiently and conveniently, recent works propose a novel idea, which
leverages vehicles as a service [75, 33, 34, 76, 77, 78]. Apart from the edge computing
characteristics, such as proximity to end users, computing, and storage, employing vehicles
as a service distinguishes itself from dense geographical distribution of communication and
computing devices and support for mobility [75]. In [34], Ding et al. propose a V-CCHN
(Vehicular Cognitive Capability Harvesting Network) architecture. In this work, Cognitive
Radio (CR) router enabled vehicles are employed to utilize harvested spectrum resources to
opportunistically transmit large volume of data. Furthermore, with the built-in computing
capability of CR routers, vehicles serve as edge cloud servers for local data processing and
aggregation to solve network congestion problems and reduce long latency caused by the
long-distance transmissions for large volumes of data.
Inspired by all previous works, we propose SPATH to effectively find the safest walking
path in smart cities (as shown in Figure 5-1). The potential walking path of a user is divided
into several road segments. To indicate the estimated safety status, each road segment is
labeled by a numerical value, namely crime index. We utilize the historical crime data and
kernel density estimation to estimate the crime index of each road segment. Wireless street
cameras are employed to capture the street view of each road segment to provide fresh
on-time street safety status. Based on the crime index, the captured videos are transmitted
through the cellular infrastructure to users for identifying the safety status. It is reasonable
to consider the slowly moving and parked vehicles (such as connected and autonomous
vehicles) have plentiful and underutilized computing resources, which can be used to provide
public services [75, 79, 34]. In order to handle the huge volume data of captured videos
52
while avoiding potential network congestion, vehicles are treated as local computing units to
summarize captured videos, which can effectively extract valuable information while reducing
the data size of captured videos significantly [80]. The rationality of studying this problem
is that utilizing the local computing units could reduce the latency for video delivery, which
further improves the quality of safety. Thus, we formulate a latency minimization problem
involving computing resource allocation and computing task assignment. Furthermore, we
design a Fast Iterative Matching (FIM) algorithm with low complexity to effectively solve the
latency minimization problem. The main contributions of this chapter are listed as follows.
First, a new application, SPATH, has been proposed to identify the safety status of a
user’s walking path. With the designed application, the videos of street cameras first are
summarized on local computing units and then are transmitted to users for reviewing. We
utilize vehicles with underutilized computing resources to reduce the latency for video analytics.
Second, quality of safety for users is correlated with overall latency for video delivery and
video analytics, and thus we formulate a latency minimization problem by jointly considering
computing resource allocation and computing task assignment. Furthermore, due to the
hardness of the original optimization problem, we develop a novel FIM algorithm, which can
significantly reduce the complexity, to provide a suboptimal solution for the optimization
problem.
Finally, simulation results show that the FIM algorithm outperforms other algorithms with
low complexity. In addition, our proposed scheme can effectively reduce the latency.
5.2 System Architecture
5.2.1 Overview
In this chapter, we consider a scenario in Fig. 5-2. When a user launches the SPATH,
the controller will activate the camera nodes to capture videos according to the user’s walking
path information and search for available vehicles near the activated camera nodes as the local
computing units. Then, the controller gathers communication, computing, and safety related
information (crime index) to make the task assignment decision and computing resource
53
Figure 5-2. Illustration of SPATH.
optimization. According to the control information, camera nodes transmit the pending
videos to associated local computing units via appropriate communications technologies for
video summarization analysis. Finally, the summarized videos are delivered to the user via the
existing cellular infrastructure. The user could scan all the summarized videos to identify the
safety status of the walking path. If the user considers the walking path is not safe enough,
she can select alternative paths and make service request again. In this chapter, we ignore the
latency for request and control information message because of the small size of request and
control information packet.
The architecture of our SPATH is shown in Fig. 5-3, which consists of four components:
application, local computing units, camera nodes, and the controller.
Camera node: This can be a new wireless camera or a traditional street camera with
communication radio interface and it can offload its captured videos to nearby computing units
within the scope of a certain distance via D2D communications [81].
54
Local computing unit: This can be a moving or parking vehicle with sufficient
computing and storage capability and it can perform video summarization task. Each vehicle
can be matched with several camera nodes to summarize videos.
Controller: This is a static facility, which can be a base station or a roadside unit (RSU)
or an access point (AP). It collects communication and computing information from camera
nodes and vehicles. Based on the collected information and the crime index for each video
task, it makes the task assignment decision and optimizes the computing resource.
Application: Application is installed on the user’s mobile device. A user can use it
to navigate, scan the summarized videos of the walking path, and make service request for
alternative paths.
Controller
Camera
Computing capacity
Figure 5-3. Illustration of video summarizations and transmissions..
5.2.2 System Model
Denote the set of the camera nodes as C = c1, c2, · · · , ci, · · · , cn, the i-th camera
node by ci. Local computing units are indexed as V = v1, v2, · · · , vj, · · · , vm, the j-th
local computing unit by vj . In this chapter, we consider a widely used task model to describe
video summarization task Di, i.e., Di=(αi,βi,I(ci)), where αi stands for required CPU cycle
of the task Di, and βi denotes the data size of computing task Di to be delivered toward the
comping unit and I(ci) is the crime index of each task. Crime index indicates the significance
55
of each task since the larger crime index, the higher probability of observing a crime incident.
Then, we discuss communication, computing, and crime index model, which will be used in the
subsequent development.
Communication Model
In this chapter, we consider adopt orthogonal channels to support the data transmissions
between camera nodes and local computing units. We assume camera nodes communicate
with local computing units via D2D links and computing units transmit summarized videos
to the user via cellular links. The data rate for the camera nodes offloading tasks to the
associated computing units can be obtained as follows:
ri,j = Wi,j log2
(
1 +pihi,j
N0
)
, (5-1)
where Wi,j indicates the allocated bandwidth and hi,j denotes the channel gain between the
camera ci and the computing unit vj. Furthermore, pi is the transmission power of camera
node ci, and N0 is the noise power. We assume the mobility of local computing units is low
and the offloading time is relative short, thus hi,j is a constant.
The transmission latency for transmitting the task Di from camera node ci to computing
unit vj is therefore given by
tTi =βi
Wi,j log2
(
1 +pihi,j
N0
) . (5-2)
Similar to previous works such as [82], this chapter ignores the transmission latency of
delivering summarized video from computing units to the user end, since the data size of
summarized videos is much smaller than the original videos.
Computing Model
In this chapter, we consider the difference of computing resource among local computing
units and denote the computing resource of local computing units as F = f0, f1, · · · , fj, · · · , fm.
We assume several camera nodes can share the computing resource of a local computing unit
56
during the video summarization process. Thus, the computing time of task Di can be written
as
tCi =αi
κi,jfj, (5-3)
where κi,j is the proportion of computing resource that computing unit vj allocated to
complete task Di.
Crime Index Model
Crime index is a numerical value, which is used to label each road segment to indicate
the estimated safety status. In this chapter, crime index is measured based on the historical
criminal activity probability and the estimated criminal activity probability. Thus, crime index
is proportional to the probability that a crime incident on each road segment is observed. In
general, the road segment with higher crime index are more dangerous because of the higher
probability of observing a crime incident. For example, road segments in the urban area of
Chicago [6] has a higher crime index since these road segments not only have been observed
with a large number of criminal activities according to the historical data, but also have a
high probability of observing a crime incident in the future based on the criminal activity
probability estimation. In this chapter, we apply Gaussian kernel density estimation to model
the estimated criminal activity probability density. Given n points of crime locations are marked
as (qx,1, qy,1), (qx,2, qy,2), · · · , (qx,n, qy,n), the density of crime at a location (lx, ly) can be
quantified as follows [6]:
f(lx, ly) =1
nσ2
n∑
i=1
1
2πexp
(
−‖lx − qx,i‖2 + ‖ly − qy,i‖22σ2
)
, (5-4)
where σ is a parameter that controls the smoothness of the density estimation, which can
be determined by the Scott’s rule [83]. We denote the set of the road segments as S =
s1, s2, · · · , sk, · · · , sK, the k-th road segments by sk. Therefore, we can obtain the crime
57
index of road segment sk by
I(sk) = − log(
ǫ(1 − P hsk) + (1− ǫ) (1− Psk)
)
, (5-5)
where Psk =∫ eU
x,k
eLx,k
∫ eUy,k
eLy,k
f(lx, ly)dlxdly is the estimated criminal activity probability and
eLx,k,eUx,k,e
Ly,k, e
Uy,k are edge positions for road segments sk. P
hsk
denotes the historical criminal
activity probability. ǫ is the weighting factor. Therefore, for each camera node ci located in the
road segment sk, the crime index can be written as
I(ci) = I(sk), (5-6)
which means all camera nodes located in the same road segment sk has the same crime index.
The main notations adopted in this chapter are presented in Table 6-1
Table 5-1. Symbols and definitions
Symbol DefinitionC Set of camera nodesB Set of local computing unitsS Set of road segmentsDi Video summarization task for camera node cici i-th camera nodevj j-th computing unitsk k-th road segmentpi Transmission power for camera cihi,j Channel gainfj Computing resource of local computing unit vjN0 Noise powerαi Amount of the taskβi Data size of computing taskWi,j BandwithtTi Transmission latency for video summarization task Di
tCi Computing latency for video summarization task Di
f(lx, ly) Probability density of crimes at location (lx, ly)I(sk) Crime index of road segment skǫ Weighting factor
58
5.3 Problem Formulation
By leveraging communication, computing, and storage (CCS) capability, together with the
crime index model proposed in the previous section, we design our SPATH by formulating a
latency minimization problem considering computing task assignment and computing resource
optimization. We first discuss several constraints for the latency minimization problem.
Task Assignment
To be specific, we define the integral decision matrix x = (xi,j) with xi,j ∈ 0, 1, where
xi,j = 1 indicates camera node ci is associated with computing unit vj for video summarization
while xi,j = 0 otherwise. Since we assume the captured video cannot be split, the camera node
ci can only be matched with one computing unit. This matching constraint can be written as
follows:
∑
j∈V
xi,j ≤ 1. (5-7)
Maximum Computing Power Limitation
In this chapter, we consider the total amount of computing resource assigned to each task
placed on computing unit vj cannot exceed its limitation, that is,
∑
i∈C
xi,jκi,j ≤ 1. (5-8)
Maximum Communication Channel Limitation
We consider each computing unit has limited available frequency sub-channels to
communicate with camera nodes, we introduce the constraint as
∑
i∈C
xi,j ≤ Q. (5-9)
Safety Guarantee
We consider that if a camera node is associated with a computing unit for video
summarization, the status of this road segment is safest for a user since the user can obtain
59
the fresh safety information. Thus, we redefine the crime index of selected camera node is
I(ci) = 0. In order to guarantee the safety of a user, we introduce the crime index requirement
for a user’s walking path as
∑
i∈C
(1− xi,j)I(ci) ≤ Ith. (5-10)
Latency Minimization
Under the above setup, we pursue a latency minimization problem by jointly considering
computing resource allocation and computing task assignment, which is formulated as
OPT :minx,κ
∑
i∈C
xi,j(tTi + tCi ) (5-11)
s.t.
∑
i∈C
xi,jκi,j ≤ 1
∑
i∈C
xi,j ≤ Q
∑
i∈C
(1− xi,j)I(ci) ≤ Ith
∑
j∈V
xi,j ≤ 1
xi,j ∈ 0, 1
It is clear that the proposed latency minimization problem is a mixed integer non-linear
programming (MINLP) problem since it contains both binary variables x and continuous
variables κ. In the next section, we adopt matching theory with low complexity to find an
approximate solution to the proposed optimization problem because of the hardness of the
original optimization problem.
5.4 Algorithm
In this section, a FIM algorithm is proposed to solve the optimization problem, since the
MINLP optimization problem has a high complexity with the increasing number of camera
nodes and computing units. The objective function can be rewritten as follows:
60
g(κ,x) =∑
i∈C
xi,j(βi
ri,j+
αi
κi,jfj). (5-12)
We consider the original problem can be decoupled into two sub-problems, computing
resource optimization problem and task assignment problem. Given xi,j = xi, which means
xi,j is fixed, the original latency minimization problem in (6-8) is converted as a computing
resource optimization problem, which is a convex problem. Therefore, optimal solution, κ∗i,j , of
computing resource optimization can be obtained by adopting the Karush-Kuhn-Tucker (KKT)
conditions. With the optimal solution, κ∗i,j , obtained from the computing resource optimization
problem, the latency minimization problem is converted as task assignment problem, which is
an integer programming problem. Then, we adopt the matching theory to obtain the solution.
5.4.1 Computing Resource Optimization
We consider the OPT with the following OPT-RA when xi = xi, a fixed value.
OPT-RA :minκ
g(κ, x) =∑
i∈C
xi,j(βi
ri,j+
αi
κi,jfj) (5-13)
s.t.
∑
i∈C
xi,jκi,j ≤ 1
Therefore, the Hessian matrix of the OPT-RA can be derived as follows:
H =
∂2g
∂2κ1,j
∂2g
∂κ1,j∂κ2,j. . . ∂2g
∂κ1,j∂κn,j
∂2g
∂κ2,j∂κ1,j
∂2g
∂2κ2,j. . . ∂2g
∂κ2,j∂κn,j
......
. . ....
∂2g
∂κn,j∂κ1,j
∂2g
∂κn,j∂κ2,j. . . ∂2g
∂2κn,j
(5-14)
61
Further, we can obtain each specific element of the Hessian matrix is:
∂2g
∂κp,j∂κq,j
=
2αi
κ3
i,jfjif p = q
0 otherwise
(5-15)
It is observed that all parameters in (5-15) are positive since 2αi
κ3
i,jfj≥ 0. We conclude that
OPT-RA is convex because the Hessian matrix H is a positive definite matrix [84]. Since the
constraints are linear, optimal solution of OPT-RA can be obtained with the KKT conditions.
We introduce the Lagrange function of OPT-RA according to the previous analysis,
which can be written as follows:
L(κ,γ) =∑
i∈C
xi,j(βi
ri,j+
αi
κi,jfj) +
∑
j∈V
γj(∑
i∈Cj
κi,j − 1), (5-16)
where γ = (γ1, · · · , γm) are the Lagrange multipliers corresponding to the inequality
constraints. Since Slater’s condition holds for OPT-RA, then the KKT conditions provide
necessary and sufficient conditions for optimality [85]. If κ∗ and γ∗ is the optimal point with
zero duality gap, then the gradient for L(κ,γ) must vanish at point κ∗. Therefore, we can
obtain:
∇(∑
i∈C
xi,j(βi
ri,j+
αi
κ∗i,jfj
)) +∑
j∈V
γ∗j∇(
∑
i∈Cj
κ∗i,j − 1) = 0, (5-17)
γ∗j (∑
i∈C
xi,jκi,j − 1) = 0.
Moreover, we can derive the optimal value of κ∗i,j form (5-17), which can be written as follows:
κ∗i,j =
√αi
∑
i∈C
√
xi,jαi
. (5-18)
5.4.2 Task Assignment
After obtaining the optimal computing resource allocation, we develop an algorithm based
on the matching theory [86] to solve the task assignment problem.
62
To better describe a matching, the preference lists of agents should be defined. Each
agent holds a preference list to opposite group. All the actions, such as proposal, acceptance,
and rejection are according to the preference list. In this chapter, we establish each agent’s
preference list as follows.
Preferences of camera nodes
From the camera node’s perspective, each camera node seeks the minimum of its
transmission time to a local computing unit. Therefore, we propose a utility function for a
camera node to form its preference list among computing units as follows:
φCi,j =
βi
Wi,j log2
(
1 +pihi,j
N0
) . (5-19)
Thus, the preference list ≻Ci,j of camera node ci can be constructed by using (5-19).
Preferences of computing units
The preference list of local computing units can be established according to the time
cost of the video summarization for a matched camera node. The utility function for a local
computing unit can be calculated as follows:
φVi,j =
αi
κi,jfj. (5-20)
According to the above utility function, the preference list for computing unit vj among camera
nodes in the opposite group can be constructed as ≻Vj,i.
5.4.3 Fast Iterative Matching (FIM) algorithm
We now introduce our proposed FIM algorithm, which is illustrated Algorithm 0. The
FIM algorithm operates in an iterative way until achieving the stability. Initially, each camera
node forms its preference list ≻Ci,j . The whole FIM algorithm consists of two major phases: one
is for matching and the other is for optimizing. At the beginning of matching in each round,
each camera node ci proposes to its most preferred computing unit vj and removes vj from its
preference list ≻Ci,j. When receiving ci’s proposal, vj may face two conditions: either enough
available communication channels for the transmission of ci’s video have been found or there
63
are not enough available channels to support the ci’s video transmission. Computing nodes
vj first forms its preference list ≻Vi,j with the optimized computing resource, which can be
calculated by (5-18). If vj finds enough available communication channels to support the video
transmission, it accepts the most preferred proposal and the matched camera node is removed
from unmatched set Cun. If vj does not find enough communication channels to support its
video transmission, it discards the worst camera node and the discarded camera node is added
to the unmatched set Cun. At the end of each round, if the constraint (5-10) is not satisfied,
then camera nodes conduct next iteration. When there are no available communication
channels for all computing units in the new iteration, all computing units discard the camera
nodes with the smallest crime index. The matching and optimizing process iterates until safety
related constraint (5-10) is satisfied, or all cameras are matched.Algorithm 5.1. FIM Algorithm
1: procedure FIM(≻Ci,j)
2: Set Qj = Q for all vj ⊲ Matching Construction;3: Construct set Cun,set Cun=C;4: for each ci ∈ Cun do ⊲ Matching;5: Proposes to the first vj in its preference list and remove vj from ≻C
i,j ;6: end for7: for vj ∈ V do8: Forms its preference list ≻V
j,i with the κ∗i,j by (5-18).
9: if Qj > 0 then10: vj keeps the most preferred cpi among proposals;11: Removes c∗i from Cun12: Qj = Qj − 113: else14: vj rejects the worst cdi and keeps the rest;15: Add cdi to Cun16: end if17: end for18: if constraint (5-10) is not satisfied then ⊲ Constraint Check;19: if Qj > 0 for any vj then20: Go back to step 4;21: else22: for vj ∈ V do23: Discards cdi with the smallest safety index24: Go back to step 4;25: end for
64
26: end if27: end if28: end procedure
5.5 Performance Evaluation
In this section, we evaluate the performance of the proposed scheme in three aspects:
(i) The comparison among different task assignment schemes; (ii) The impact of available
computing power; (iii) The impact of key parameters, such as the data size of videos and
the bandwidth of communication channels. We introduce the simulation setup at first. Then
extensive simulations are provided and analyzed.
5.5.1 Simulation Setup
We consider that the camera nodes are placed in the grid topology and a group of
local computing units are randomly deployed. We assume the communication range of local
computing units is up to 100 m. The data size and computing amount of tasks follow uniform
distribution with a mean value of 5 MB and 1 Gigacycles, respectively [87]. The computing
resources of computing units are distributed within the range [10, 20] GHz. The channel fading
of the communication links is modeled by the complex normal distribution, CN (0, 1) [88].
The FIM, proposed in this chapter, is compared with two task assignment schemes:
Greedy assignment scheme: each camera node sends the proposal to match with the
most powerful computing unit in its communication range. If a computing unit has enough
communication channels to support all camera nodes, it will hold all video summarization
task. If the received proposals have reached the limitation, the computing unit will accept the
proposal according to the safety index. The computing resource allocation for each computing
unit is according to (5-18).
Random assignment scheme: camera nodes match with computing units randomly. If the
communication limitation is reached, computing units are matched with camera nodes with
respect to the safety index. The computing resource optimization is carried out according to
(5-18).
65
5.5.2 Results and Analysis
Comparison among different task assignment schemes
The performance comparison among our FIM, greedy scheme, and random scheme is
illustrated in Fig. 5-4. We let the number of camera nodes vary in [5, 25]. The density of
the computing nodes is set to be a constant value with respect to the number of camera
nodes. Results in Fig. 5-4 demonstrate that the proposed FIM achieves significantly better
performance over the other two schemes. This is because the available number of computing
units for each camera node is increasing with the network size increases. Therefore, FIM
algorithm could exploit more benefits from the diverse choices. However, greedy and random
schemes ignore the possible gain from the increasing number of computing units. Moreover,
resource optimization for FIM can enhance the gain from diverse choices, since the matching
choice is based on the result of resource optimization. Noticing that resource optimization
can also achieve performance gain for greedy and random schemes. However, the benefit of
resource optimization does not compensate for the loss of matching scheme.
Impact of available computing power
We further compare the performance of the FIM algorithm with two heuristic schemes
under different available computing power. We set the number of camera nodes to 15 and
the computing power in each local unit to be varying in [2, 10] Gigacycles. Figure 5-5 shows
that FIM scheme achieves significantly higher performance gain over the other two schemes,
particularly when the number of computing units is small. Noticing that FIM is introduced
to adjust the matching choice according to available computing power when computing
resource is insufficient, it is not surprising that a more significant performance gain can be
observed when the computing power is smaller. Moreover, the latency of all schemes is reduced
slowly when the number of computing units is large. The reason is that sufficient computing
resource makes all task assignment schemes achieve less benefit with respect to the variation of
computing resource.
66
Impact of data size
In Fig. 5-6, we investigate the latency of different task assignment schemes with respect
to the varying data size of captured videos. The parameter settings are the same as those in
Fig. 5-5 and the data size of the video varies within [1, 9] MB. The results shown in Fig. 5-6
demonstrate that three algorithms have the same relationship between latency and the data
size of videos. The result shows that the larger of the data size, the longer of the latency.
The result also demonstrates that the impact of the data size is evident, especially at large
data size. The reason is that when the data size is large, FIM algorithm not only reduces the
latency in terms of the choice of computing units but also achieves significant benefits from
the transmissions of videos.
Impact of bandwidth
We also consider the impact of the bandwidth of communication channels. In this
evaluation, The parameter settings are the same as those in Fig. 5-5 and the bandwidth of
communication channels is set to the range [0.5, 2.5] MHz. The results shown in Fig. 5-7
demonstrate that the performance gaps of three task assignment schemes are narrowing along
with the increasing of bandwidth. When the communication resource is sufficient, FIM can
only achieve benefits from computing resource and the loss of greedy and random schemes
is less for transmissions of videos. Fig. 5-7 also shows that the impact of bandwidth is more
significant when bandwidth is small. The proposed FIM can achieve 85.6% better performance
compared with random assignment scheme and 87.3% compared with greedy assignment
scheme when bandwidth is 1 MHz. The reason is that when bandwidth is small, FIM can
obtain more benefit from better communication channels.
67
Figure 5-4. The comparison of different schemes.
2 4 6 8 10
Average Computing power (Gigacycles)
0
20
40
60
80
100
Late
ncy
(s)
FIMGRERAN
Figure 5-5. Impact of available computing power.
68
1 3 5 7 9
Average Data Size (MB)
0
20
40
60
80
100
120
140
Late
ncy
(s)
FIMGRERAN
Figure 5-6. Impact of data size
0.5 1 1.5 2 2.5
Bandwidth (MHz)
0
20
40
60
80
100
120
140
Late
ncy
(s)
FIMGRERAN
Figure 5-7. Impact of bandwidth.
69
CHAPTER 6VISS: VEHICLE BASED INTELLIGENT SURVEILLANCE SYSTEM
6.1 Background
As cities and towns expand, safety in public areas such as parks, shopping streets,
and downtowns becomes more and more important. How to monitor there public area and
guarantee the safety of citizens and visitors are vital for cities. Video surveillance system is a
great security tool to keep city safe and local business thriving. Thus, more and more local
governments in the world are beginning to install surveillance cameras in public areas to help
improve the safety of cities. According to the security industry, Beijing installed more than
400k surveillance cameras in the public area to keep this supercity safe. Chicago establishes a
Homeland Security Grid, which utilizes more than 17,000 cameras and 600 miles of fiber optics
to capture street view of the city and processes the video in real time to detect dangerous
activities [89] .
Even though video surveillance system can help make public area hospitable for citizen
and visitors, drawbacks limit the use of video surveillance system. Due to the high cost of
deployment of video surveillance system, blind areas exist in most video surveillance systems.
Second, outdoor cameras can be damaged by weather or car accidents, which means the
local governments cost enormous maintenance fee to keep systems work well. Can we use the
low-cost method help to improve the safety of blind areas of video surveillance system?
With the development of sensing and communication, more and more vehicles have
installed dash cameras with communication interface. Therefore, vehicle based video
monitoring system is a potential solution to cover blind areas of fixed video surveillance
system with low maintenance cost. Actually, Substantial numbers of applications using
vehicle based monitoring system are emerging. Chen et.al. [90] design a system to utilize the
three-axis accelerometer and the GPS sensor embedded on vehicles to monitor road condition
when vehicles are traveling around the city. Li et.al. [91] apply vehicle based sensing system to
solve the large scale traffic sensing problem. They aggregate instant speed and position data,
70
which is sensed by each vehicle periodically, to monitor traffic condition. ParkNet is a system
design by Mathur et al. to solve the urban street-parking problem [92]. They utilize vehicles,
equipped with GPS receivers and a passenger-side-facing ultrasonic rangefinders, to determine
parking spot occupancy. However, utilizing vehicles to do the safety monitoring is challenging
with respect to the following consideration. First, the data size of the monitoring video is very
large, if all the vehicles upload monitoring video may cause the network congestions. Another
problem caused by the long distance transmission of video files is the long delay, which may
make the monitoring system not improve the safety. Second, recruiting a large number of
vehicles may result in large amount of payment for participants. Third, given equal attention to
each monitored area is an ineffective way to improve the public safety.
Figure 6-1. System architecture.
In order to deal with the problems mentioned above, we design a Vehicle based Intelligent
Surveillance System (VISS) to improve public safety in smart cities. In our design, vehicles
equipped dash cameras with wireless communication interface are recruited as the mobile
monitoring nodes to help monitor the blind areas of the exiting surveillance system. In order
to improve quality of safety, VISS has two major tasks. The first one is expanding the spatial
monitoring area to find potential victims. Thanks to the development of techniques for vision
based human activity recognition, VISS can extract potential victims from the monitoring
video files. The second task is that VISS recruits mobile monitoring nodes to monitor potential
71
victims as long as possible. Due to the high mobility of vehicles, VISS has an opportunity to
achieve potential victims searching and monitoring with less budget. Actually, each recruited
moving vehicle can cover multiple geographical regions, some can be used for potential victims
searching and others can be used for potential victims monitoring. On the other hand, slowly
moving or parked vehicles with sufficient computing capability are utilized as local computing
units to handle the long delay problem of video transmission. Therefore, we formulate two
optimization problems, i.e., spatial coverage maximization problem and temporal coverage
problem, involving mobile monitoring nodes recruitment and computing resource allocation. To
solve these optimization problems, a heuristic algorithm with low complexity is proposed. The
main contributions of this chapter are listed as follows.
First, a new system, VISS, has been proposed to improve public safety in smart cities.
With the designed system, two types of vehicles are utilized. Vehicles equipped dash cameras
are recruited as the mobile monitoring nodes to expand geographical monitoring regions
and extend monitoring time of potential victims. Another typed vehicles are utilized as local
computing units to detect potential victims and reduce transmission delay of videos.
Second, we formulate two optimization problems by jointly considering recruitment
decision and resource allocation. The spatial coverage maximization problem is related to
geographical regions expanding for potential victims searching. Another temporal coverage
problem is used to extend monitoring time of potential victims. In order to handle the hardness
of two optimization problems, a heuristic algorithm with low complexity is proposed to provide
a suboptimal solution.
Third, in the performance evaluation part, results demonstrate that the proposed
algorithm performs better compared to other algorithms.Furthermore, the proposed scenario
can significantly improve the spatial and temporal coverage with low budget.
6.2 System Architecture
The proposed VISS mainly include four components. We first present an overview of
VISS. Thereafter, corresponding models are explained in detail.
72
6.2.1 Architecture Overview
The overall architecture of the proposed VISS includes four parts: local computing units,
mobile monitoring nodes, controller, and data center.
Local Computing Unit
In this scenario, two types of vehicles are utilized. Slowly moving or parked vehicles with
sufficient computing capability are recruited as local computing units, which can perform video
analysis tasks to find the potential victims. Each local computing unit can be connected with
several mobile monitoring nodes to analyze videos.
Mobile Monitoring Nodes
Vehicles installed dash cameras with communication radio interface are the second typeof
vehicles, which can be the mobile monitoring nodes. If the regions of interest on their driving
path or drivers are interested to get credits to help monitor several regions of interest, vehicles
can apply to be the candidates of mobile monitoring nodes. Mobile monitoring nodes connect
with local computing units within a certain distance to offload captured videos via D2D
communications [81].
Controller
A base station or a roadside unit (RSU) belongs to the service provider can be the
controller. It collects applications of vehicles to be the mobile monitoring nodes, and monitors
the status of communication and computing resource. Based on the collected information,
controller makes recruitment decision and optimizes communication the computing resource
allocation.
Data Center
Data center is used to collect the analysis result from the local computing units and store
the result. It also can cooperate with local computing units to do the video analysis when the
workload of local computing units is too heavy.
Then, we present the working process of VISS. When public safety authority sends the
service request to the VISS, it works in the following steps.
73
Step1) public safety authority submits its request to the VISS.
Step2) Controller collects and information, such as blind areas of the fixed surveillance
system, crime data, and people distribution, to find the regions of interest. Then, the controller
spreads out the information of regions.
Step3) Vehicles interested to participate to help monitor will be registered as the
candidates of mobile monitoring nodes that submit corresponding information such as location
and credits for tasks.
Step4) Controller bases on the information of candidates, status of communication, and
computing resource to make recruitment decision and optimizes computing resource allocation
for each mobile monitoring node. Then, controller updates its database and sends the control
information to mobile monitoring nodes and local computing units.
Step5) Mobile monitoring nodes according to the control information to capture videos
and send videos to the assigned local computing units.
Step6) Local computing units first bases on the optimization information from controller
to allocate the computing resource for video tasks and do the video analysis. Second, local
computing units send analysis result back to the controller.
Step7) Controller according to the quality of analysis result pays credits for mobile
monitoring nodes, updates their trustworthiness score, and uploads the result to the data
center
Step8) The VISS sends the corresponding result to the public safety authority.
6.2.2 System Model
In the following section, the precise definition and models of VISS, which are used in the
subsequent development, are presented.
In this chapter, we assume that the VISS does the monitoring for a period of time T =
t1, · · · , to, and the set of candidates to be recruited as mobile monitoring nodes are denoted
asM = m1, m2, · · · , mi, · · · , mp, the i-th candidates of mobile monitoring node by mi.
Denotes the set of geographical regions of interests as R = r1, r2, · · · , rj, · · · , rq, the j-th
74
Controller
Monitoring node
Figure 6-2. Illustration of working process.
region by rj . Actually, there are two types of geographical regions of interests. The first type
is regions of searching potential victims and the second is regions of monitoring potential
victims. We denote these two types of regions as RV and RNV , respectively. Furthermore,
RV ∪RNV = R. We assume driving path of candidates are known and use a matrix to indicate
the path of candidates during the time period T.
Definition 4. [93] Candidate path is an i× j matrix:
L =
l11 l1,2 . . . l1,j
l21 l2,2 . . . l2,j...
.... . .
...
li,1 li,2 . . . li,j
(6-1)
where li,j ∈ T ∪ ∅. Each row vector represents the driving regions for one candidate, and
each column vector indicates all candidates that passing through a particular region.
Since we use the crowdsourcing method to monitor regions of interests, the controller
has to reward the participants (mobile monitoring nodes) by credits, which can be used to
exchange the communication and computing resources in the VISS, as incentives. We assume
the paid credits are different across participants. We denote the credit payment vector for all
75
participants as B= b1,1, b1,2, · · · , bi,j. Due to the limited budget, the overall credits paid to
participants must be limited.
Furthermore, the captured video by mobile monitoring nodes are sent to the local
computing units to analyze. Local computing units are labeled as C = c1, c2, · · · , ck, · · · , cs,
the k-th local computing unit by ck. This chapter adopts a commonly used computing task to
model captured video Vi,j, i.e., Vi,j=(αi,j,βi,j), where αi,j represents for required CPU cycle of
the video task Vi,j, and βi,j denotes the data size of Vi,j.
Definition of Spatial and Temporal Coverage
In this chapter, spatial and temporal coverage are two metrics related to quality of safety.
As we mentioned above, we are more interested in investigating how to find potential victims
fast and how to guarantee the safety of potential victims as much as possible. Spatial coverage
metric is related to the problem of finding the potential victims and temporal coverage metric
is related to the problem of monitoring potential victims. We also consider it adequate to cover
a geographic region with a single vehicle at a particular point of time.
Definition 5. [93] Spatial Coverage (SC) is the total percentage of geographical regions of
interests covered during the time period T. Formally, it can be defined as:
SC(xi,j) =
∑
j∈R∨i∈Mxi,j
|R| . (6-2)
where x = (xi,j) is an integral decision matrix with xi,j ∈ 0, 1. We assume xi,j = 1
indicates candidate node mi is recruited to monitor region rj during the time li,j while xi,j = 0
otherwise.
Definition 6. [93] Temporal coverage (TC) is the percentage of minimum covered time length
during the time period T for all geographical regions of interests covered. It can be formally
defined as:
TC(xi,j) =minj∈RV
|∪i∈Mxi,jli,j||T | . (6-3)
76
Communication and Computing Model
We assume the communication and computing process since time cost for transmission
and analysis is large. Captured video must be processed completely within limited time to
guarantee the safety of potential victims. In the transmission process, orthogonal channels
are adopted to transmit the captured video from mobile monitoring nodes to local computing
units. We consider mobile monitoring nodes communicate with local computing units though
D2D links. Local computing units send analysis result back to the controller via cellular links.
Thus, data rate between mobile monitoring node mi and connected local computing units ci
can be modeled as follows:
ri,j,k = Wi,j,k log2
(
1 +pihi,j,k
N0
)
, (6-4)
where Wi,j,k indicates the bandwidth and hi,j,k is the channel gain. Furthermore, pi is the
transmission power and N0 is the noise power. In this chapter, we utilize slowly moving or
parked vehicles as local computing units and the data transmission time is relatively short, thus
hi,j,k is a constant.
The time cost for the transmission of video task Vi,j from mobile monitoring node mi to
computing unit cj is therefore given by
DTi,j =
βi,j
Wi,j,k log2
(
1 +pihi,j,k
N0
) . (6-5)
In line with previous works as [82], the data size of analysis result significantly decreases
compared to the original data, we therefore ignore the transmission time cost of delivering
analysis result from local computing units via the controller to the data center.
This chapter takes into account the difference of computing capability among local
computing units. Accordingly, the computing capability of local computing units is denoted
as F = f1, f2, · · · , fk, · · · , fp. The computing capability on a local computing unit can be
shared by several mobile monitoring nodes. Consequently, the computing time cost of task Vi,j
can be written as
77
DCi,j =
αi,j
κi,j,kfk, (6-6)
where κi,j,k is the proportion of computing resource that computing unit ck is allocated to
complete task Vi,j.
Table 6-1. Symbols and description
Symbol DefinitionC Set of local computing unitsM Set of mobile monitoring nodesR Set of interested regionsVi,j Video captured by camera node ci at region rjmi i-th mobile monitoring noderj j-th interested regionck k-th rlocal computing unitpi Transmission power for camera cihi,j,k Channel gainfk Computing resource of local computing unit ckN0 Noise powerαi,j Amount of the taskβi,j Data size of computing taskWi,j,k Bandwith
6.3 Problem Formulation
As we mention above, the regions of interest consists of two types. The first one is the
regions with potential victims. The temporal coverage of regions with potential victims should
be maximized in order to guarantee the safety of the potential victims. The second type
is regions without potential victims. Maximizing the spatial coverage is the goal of regions
without potential victims since more potential victims can be found with the increased spatial
coverage of the whole area. Thus, with the system model, it is reasonable to formulate the
Spatial and Temporal Coverage problems as two optimization problems by jointly considering
computing resource allocation and mobile monitoring nodes selection, which is formulated as
78
STC: maxx,κ
SC(xi,j) (6-7)
minx,κ
TC(xi,j) (6-8)
s.t.
SC(xi,j) =
∑
j∈R ∨i∈Mxi,j
|R|
TC(xi,j) =minj∈RV
|∪i∈Mxi,jli,j||T |
∑
i∈M
∑
j∈R
xi,jbi,j ≤ Bth (6-9)
(DTi,j +DC
i,j)xi,j ≤ Dth i ∈M, j ∈ R (6-10)
∑
i∈M
xi,j ≤ 1
xi,j ∈ 0, 1
The constraint (6-9) is the delay requirement, which means the video files need to be
processed before the deadline to guarantee the quality of safety, and (6-10) is the budget
limit. It is evident that the proposed STC maximization problem are hard to solve. In order to
identify an approximate solution to the proposed problems, the next section adopts a heuristic
algorithm with low complexity.
6.4 Algorithm
Designing algorithms to solve STC problem is a difficult task that requires balance
between trade-offs and consideration of applications? characteristics. Since we utilize
vehicles as mobile monitoring nodes, we should develop the algorithm in respect of scale,
cost and real-time requirement. Due to the high mobility of mobile monitoring nodes, the
locations of vehicles may be constantly changing. Thus, the time window left for making
decisions is limited. Finding the optimal solutions may be time consuming, which is not
practical. Therefore, we consider a heuristic algorithm. We select genetic algorithm to
solve the recruitment part since the chromosomes can readily represent the solutions to
79
mobile monitoring selection. We apply greedy algorithm to deal with the computing resource
optimization part, which has a low complexity.
VISS Algorithm
The following procedure are performed to generate and hold a population to solve our
proposed STC problem.
Step 0 (Initialization): We randomly generate a number of chromosomes as the solutions
in the beginning.
Step 1 (Fitness assignment): At each generation, we assign a fitness value to each
solution by taking the following steps: We first generate random numbers usc and utc in [0,1].
Then, we calculate the random weight of two objectives as wsc = uscusc+utc
and wtc = utcusc+utc
respectively. Then, we calculate the fitness value of each chromosome with the weights defined
above.
Step 2 (Selection): We sort all the chromosomes according to the fitness values.By
defining the sp% as the survival probability for each generation, we allow top sp% of the
population to survive. The chromosomes service in top position of sorted population are kept
as the candidates for the best solution.
Step 3 (Crossover ): A crossover operation is applied to to generate an offspring with the
crossover probability Pc for each chromosome.
Step 4 (Mutation): We also apply a mutation operation with a mutation probability Pm.
Step 5 (Repair): We remove the infeasible solutions since they may be generated by
crossover and mutation once the constraints are violated. In VISS algorithm, we remove the
mobile monitoring nodes with the highest cost until the constraint (6-9) is reached and then
we also remove the mobile monitoring nodes without satisfying constraint (6-10).
Step 6 (Termination test): The algorithm terminates once one of the following conditions
is fulfilled: 1) Maximum number of iterations is reached. 2) The gap between solution of
previous round and current round is small enough.
The complete algorithm is shown as Algorithm 6.1.
80
Algorithm 6.1. VISS Algorithm
1: procedure VISS(MaxIte,sp,cp,size)2: POP ← INITIALIZATION3: n ← 04: solution ← ∅5: while solution[n]-solution[n-1]≥ GAP do6: while n≤ MaxIte do7: for s∈ POP do8: Calculate fitness value of s9: end for10: ORDERPOP← SORT(s) according to fitness value11: POP← Top sp% of ORDERPOP12: solution ← ORDERPOP[0]13: while |POP | ≤ size do14: for s∈ POP do15: if RANDOM(0, 1) ≤ Pc then16: s ← CROSSOVER17: end if18: if RANDOM(0, 1) ≤ Pm then19: s ← MUTATION20: end if21: end for22: end while23: Repair s according to constraint (6-9) and constraint (6-10)24: end while25: end whilereturn solution26: end procedure
6.5 Performance Evaluation
In this section, we evaluate the performance of the proposed schemes. For comparison, we
adopt two baseline algorithms, namely random solution and greedy algorithm. Specifically, the
random solution is obtained by recruiting the mobile monitoring nodes randomly. The greedy
algorithm always recruits vehicles with the shortest transmission delays. For both random
solution and greedy algorithm, they apply the same repair scheme with VISS algorithm to
satisfy constraint (6-9). In the simulation, the location of local computing units, the regions
of interest, and trajectories of mobile monitoring nodes are randomly generated. We divide the
target area into square blocks with edge length of 20 m. Without specific demonstration, the
81
recruitment cost is randomly selected. We also assume the maximum communication distance
is 100 m.
Performance comparison with respect to the network size
Fig. 6-3 depicts the evaluation results. We can observe from both figures that our
algorithm outperforms random solution and greedy algorithm. Furthermore, we find that,
with the increasing of network size, the TC and SC is small. That is because the increasing
ratio of interested regions is slower than the increasing ratio of participants. Lower candidates
density essentially reduces the cover opportunity for all regions of interests, thus more and
more regions are losing opportunities to be monitored. Furthermore, we can find that, when
the network size is small, the performance of three schemes are very similar. This is because,
with high density of participants and low number of interested regions, all three schemes have
a high probability to cover the interested regions in spatial dimension with the limited budget.
The impact of number of interested regions
Fig. 6-4 compares TC and SC with respect to the number of interested regions. As
expected, the performance of VISS algorithm is the best among three schemes. We can
find that, in SC, the performance of all three schemes reduces slowly at first. However, the
performance of all three schemes reduces fast in TC. The reason is the increasing ratio of
interested time slots is much faster than the increasing ratio of interested geography regions.
That is to say, for the same number of interested regions, the density of participants is enough
to cover most spatial regions, but the density of participants is not enough to cover most
temporal time slots.
The impact of number of participants
We observe in Fig. 6-5 VISS algorithm performs significantly better than random solution
and greedy algorithm. As a result, the TC and SC first falsely rises under three algorithms.
However, once achieving some points, the SC nearly remains stable as network number of
participants grows. This is because there are sufficient number of the candidates of mobile
82
monitoring nodes to monitor most regions with the limited budget. Basically, when the
performance of all the schemes remains stable, the limited budget becomes the major factor.
1000 2000 3000 4000 5000
Network Size (square meters )
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
1.1
Spa
tial C
over
age
VISSGRERAN
A Spatial Coverage
1000 2000 3000 4000 5000
Network Size (square meters )
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Tem
pora
l Cov
erag
e
VISSGRERAN
B Temporal Coverage
Figure 6-3. Evaluation results for network size.
83
10 15 20 25 30
Number of Target Regions
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
1.1
Spa
tial C
over
age
VISSGRERAN
A Spatial Coverage
10 15 20 25 30
Number of Target Regions
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Tem
pora
l Cov
erag
e
VISSGRERAN
B Temporal Coverage
Figure 6-4. Impact of target regions.
84
10 15 20 25 30
Number of Participants
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
1.1
Spa
tial C
over
age
VISSGRERAN
A Spatial Coverage
10 15 20 25 30
Number of Participants
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
Tem
pora
l Cov
erag
e
VISSGRERAN
B Temporal Coverage
Figure 6-5. Impact of participants.
85
CHAPTER 7SUMMARY AND CONCLUSIONS
In this dissertation, we focus on designing and implementing architectures for safety
centric IoT platform to support public safety related services in the smart cities. We start
from the overall design of the IoT platform. We first utilize the proposed architecture to solve
the children safety problem in public areas. We have proposed a novel UHF RFID system for
tracking children in the public area. In our RFID networks, readers are associated with mobile
devices for target localization. With the help of remote central center, the reader is matched
with an mobile device to transmit raw data for processing. Then, the associated mobile devices
deliver the processed data to the users. Then, safe walking navigation problem is solved under
the safety centric IoT platform. We have proposed a safety application, SPATH, to handle
safety issues in smart cities. We have utilized existing cellular infrastructures to transmit
surveillance videos from street cameras to the users to identify the safety status. To handle the
large volume of videos, we have leveraged the vehicles with underutilized computing resources
as the local computing units to summarize videos. In addition, vehicle based intelligent
surveillance system (VISS) is proposed to improve public safety in smart cities. Vehicle based
monitoring system utilizes vehicles installed dash cameras to monitor target regions. VISS
recruits vehicles as the mobile monitoring nodes to expand geographical monitoring regions.
Cooperating with slowly moving or parked vehicles with sufficient computing capability, VISS
can extract potential victims from the monitoring video files and recruit mobile monitoring
nodes to monitor potential victims as long as possible.
86
REFERENCES
[1] M. Press. Leading the Smart City Revolution with Safety First. [May 8, 2018]. [Online].Available: https://www.ul.com/newsroom/featured/leading-the-smart-city-revolution-with-safety-first/
[2] N. James, “Recent violent crime trends in the united states,” 2018.
[3] Office for Victims of Crime . 2018 National Crime Victims? Rights Week Resource Guide:Crime and Victimization Fact Sheets. [April 8, 2018]. [Online]. Available: https://ovc.ncjrs.gov/ncvrw2018/info flyers/fact sheets/2018NCVRW UrbanRural 508 QC.pdf
[4] D. J. Paulsen, “To map or not to map: Assessing the impact of crime maps on policeofficer perceptions of crime,” International Journal of Police Science & Management,vol. 6, no. 4, pp. 234–246, 2004.
[5] A. Bogomolov, B. Lepri, J. Staiano, N. Oliver, F. Pianesi, and A. Pentland, “Once upona crime: towards crime prediction from demographics and mobile data,” in Proceedings ofthe 16th international conference on multimodal interaction, 2014, pp. 427–434.
[6] E. Galbrun, K. Pelechrinis, and E. Terzi, “Urban navigation beyond shortest route: Thecase of safe paths,” Information Systems, vol. 57, pp. 160–171, 2016.
[7] N. Goel, R. Sharma, N. Nikhil, S. Mahanoor, and M. Saini, “A crowd-sourced adaptive safenavigation for smart cities,” in Multimedia (ISM), 2017 IEEE International Symposium on,2017, pp. 382–387.
[8] F. Mata, M. Torres-Ruiz, G. Guzman, R. Quintero, R. Zagal-Flores, M. Moreno-Ibarra, andE. Loza, “A mobile information system based on crowd-sensed and official crime data forfinding safe routes: A case study of mexico city,” Mobile Information Systems, vol. 2016,2016.
[9] M. Garvey, N. Das, J. Su, M. Natraj, and B. Verma, “Passage: A travel safety assistantwith safe path recommendations for pedestrians,” in Companion Publication of the 21stInternational Conference on Intelligent User Interfaces, 2016, pp. 84–87.
[10] K. Holbø, S. Bøthun, and Y. Dahl, “Safe walking technology for people with dementia: whatdo they want?” in Proceedings of the 15th International ACM SIGACCESS Conference onComputers and Accessibility, 2013, p. 21.
[11] D. C. Schwebel, D. Stavrinos, K. W. Byington, T. Davis, E. E. O Neal, and D. De Jong,“Distraction and pedestrian safety: how talking on the phone, texting, and listening tomusic impact crossing the street,” Accident Analysis & Prevention, vol. 45, pp. 266–271,2012.
[12] T. Wang, G. Cardone, A. Corradi, L. Torresani, and A. T. Campbell, “Walksafe: apedestrian safety app for mobile phone users who walk and talk while crossing roads,” inProceedings of the twelfth workshop on mobile computing systems & applications, 2012,p. 5.
87
[13] S. Jain, C. Borgiattino, Y. Ren, M. Gruteser, Y. Chen, and C. F. Chiasserini, “Lookup:Enabling pedestrian safety services via shoe sensing,” in Proceedings of the 13thAnnual International Conference on Mobile Systems, Applications, and Services, 2015, pp.257–271.
[14] J. Mwakalonge, S. Siuhi, and J. White, “Distracted walking: Examining the extent topedestrian safety problems,” Journal of traffic and transportation engineering (Englishedition), vol. 2, no. 5, pp. 327–337, 2015.
[15] H. Qin, Z. Li, Y. Wang, X. Lu, W. Zhang, and G. Wang, “An integrated network ofroadside sensors and vehicles for driving safety: Concept, design and experiments,” inPervasive Computing and Communications (PerCom), 2010 IEEE International Conferenceon, 2010, pp. 79–87.
[16] H. S. Park, M. W. Park, K. H. Won, K.-H. Kim, and S. K. Jung, “In-vehicle ar-hud systemto provide driving-safety information,” ETRI journal, vol. 35, no. 6, pp. 1038–1047, 2013.
[17] B. Aytekin and E. Altug, “Increasing driving safety with a multiple vehicle detectionand tracking system using ongoing vehicle shadow information,” in Systems Man andCybernetics (SMC), 2010 IEEE International Conference on, 2010, pp. 3650–3656.
[18] J. Wang, S. Zhu, and Y. Gong, “Driving safety monitoring using semisupervised learning ontime series data,” IEEE Transactions on Intelligent Transportation Systems, vol. 11, no. 3,pp. 728–737, 2010.
[19] Rebecca Edwards . The Best Kids GPS Trackers and Wearables. [June 7, 2019]. [Online].Available: https://www.safewise.com/resources/wearable-gps-tracking-devices-for-kids-guide/
[20] Deyan G. 60+ Smartphone Statistics in 2019. [March 28, 2019]. [Online]. Available:https://techjury.net/stats-about/smartphone-usage/
[21] Bankmycell.com. Six smartphone addiction facts and phone usage statistics. [March 28,2019]. [Online]. Available: https://www.bankmycell.com/blog/smartphone-addiction/#chapter2
[22] A. Gupta and V. Harit, “Child safety tracking management system by using gps,geo-fencing android application: An analysis,” in 2016 Second International Conference onComputational Intelligence Communication Technology (CICT), Feb 2016, pp. 683–686.
[23] R. Velayutham, M. Sabari, and M. S. Rajeswari, “An innovative approach for women andchildren’s security based location tracking system,” in 2016 International Conference onCircuit, Power and Computing Technologies (ICCPCT), March 2016, pp. 1–5.
[24] A. R. Al-Ali, F. A. Aloul, N. R. Aji, A. A. Al-Zarouni, and N. H. Fakhro, “Mobile rfidtracking system,” pp. 1–4, April 2008.
88
[25] Y. Mori, H. Kojima, E. Kohno, S. Inoue, T. Ohta, Y. Kakuda, and A. Ito, “Aself-configurable new generation children tracking system based on mobile ad hoc networksconsisting of android mobile terminals,” pp. 339–342, March 2011.
[26] J. Saranya and J. Selvakumar, “Implementation of children tracking system on androidmobile terminals,” pp. 961–965, April 2013.
[27] K. Liu and X. Li, “Finding nemo: Finding your lost child in crowds via mobile crowd sensing,”2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 1–9,October 2014.
[28] K. Morii, K. Taketa, Y. Mori, H. Kojima, E. Kohno, S. Inoue, T. Ohta, and Y. Kakuda,“A new generation children tracking system using bluetooth manet composed of androidmobile terminals,” in 2012 9th International Conference on Ubiquitous Intelligence andComputing and 9th International Conference on Autonomic and Trusted Computing, Sept2012, pp. 405–407.
[29] A. Yudhahutama and A. I. Wuryandari, “Network and application design for childrentracking and identification system with html5 and asynchronous communication (futurekindergarten project),” pp. 1–6, Nov 2013.
[30] A. Gupta and V. Harit, “Child safety tracking management system by using gps, geo-fencingandroid application: An analysis,” pp. 683–686, Feb 2016.
[31] X. Lin, R. Lu, D. Kwan, and X. S. Shen, “React: An rfid-based privacy-preserving childrentracking scheme for large amusement parks,” Computer Networks, vol. 54, no. 15, pp.2744 – 2755, 2010.
[32] C. Chen, “Design of a child localization system on rfid and wireless sensor networks,”Journal of Sensors, vol. 2010, 2010.
[33] H. Zhang, Q. Zhang, and X. Du, “Toward vehicle-assisted cloud computing forsmartphones,” IEEE Transactions on Vehicular Technology, vol. 64, no. 12, pp. 5610–5618,2015.
[34] H. Ding, C. Zhang, Y. Cai, and Y. Fang, “Smart cities on wheels: a newly emergingvehicular cognitive capability harvesting network for data transportation,” IEEE WirelessCommunications, vol. 25, no. 2, pp. 160–169, 2018.
[35] H. Ding, C. Zhang, B. Lorenzo, and Y. Fang, “Access point recruitment in a vehicularcognitive capability harvesting network: How much data can be uploaded?” IEEETransactions on Vehicular Technology, vol. 67, no. 7, pp. 6438–6445, 2018.
[36] A. Juels et al., “Rfid security and privacy: A research survey,” IEEE journal on selectedareas in communications, vol. 24, no. 2, pp. 381–394, 2006.
[37] M. Langheinrich, “A survey of rfid privacy approaches,” Personal and UbiquitousComputing, vol. 13, no. 6, pp. 413–421, 2009.
89
[38] M. A. Khan, M. Sharma, and B. R. Prabhu, “A survey of rfid tags,” International Journalof Recent Trends in Engineering, vol. 1, no. 4, p. 68, 2009.
[39] M. S. Trotter and G. D. Durgin, “Survey of range improvement of commercial rfid tagswith power optimized waveforms,” in 2010 IEEE International Conference on RFID (IEEERFID 2010), 2010, pp. 195–202.
[40] V. Chawla and D. S. Ha, “An overview of passive rfid,” IEEE Communications Magazine,vol. 45, no. 9, pp. 11–17, 2007.
[41] S. Li, L. Da Xu, and S. Zhao, “The internet of things: a survey,” Information SystemsFrontiers, vol. 17, no. 2, pp. 243–259, 2015.
[42] D. Potapov, M. Douze, Z. Harchaoui, and C. Schmid, “Category-specific videosummarization,” in European conference on computer vision, 2014, pp. 540–555.
[43] Z. Lu and K. Grauman, “Story-driven summarization for egocentric video,” in Proceedings ofthe IEEE Conference on Computer Vision and Pattern Recognition, 2013, pp. 2714–2721.
[44] S. P. Rajendra and N. Keshaveni, “A survey of automatic video summarization techniques,”International Journal of Electronics, Electrical and Computational System, vol. 2, no. 1,2014.
[45] A. G. Money and H. Agius, “Video summarisation: A conceptual framework and survey ofthe state of the art,” Journal of Visual Communication and Image Representation, vol. 19,no. 2, pp. 121–143, 2008.
[46] D. Gale and L. S. Shapley, “College admissions and the stability of marriage,” TheAmerican Mathematical Monthly, vol. 69, no. 1, pp. 9–15, 1962.
[47] K. Li, Q. Zhang, S. Kwong, M. Li, and R. Wang, “Stable matching-based selectionin evolutionary multiobjective optimization,” IEEE Transactions on EvolutionaryComputation, vol. 18, no. 6, pp. 909–923, 2013.
[48] A. E. Roth and M. Sotomayor, “Two-sided matching,” Handbook of game theory witheconomic applications, vol. 1, pp. 485–541, 1992.
[49] T. Sonmez, “Strategy-proofness in many-to-one matching problems,” Economic Design,vol. 1, no. 1, pp. 365–380, 1994.
[50] D. Whitley, “A genetic algorithm tutorial,” Statistics and computing, vol. 4, no. 2, pp.65–85, 1994.
[51] M. Srinivas and L. M. Patnaik, “Genetic algorithms: A survey,” computer, vol. 27, no. 6,pp. 17–26, 1994.
[52] J. Genlin, “Survey on genetic algorithm [j],” Computer Applications and Software, vol. 2,pp. 69–73, 2004.
90
[53] A. N. Staff. Missing Children in America: Unsolved Cases. [May 8, 2013]. [Online].Available: https://abcnews.go.com/US/missing-children-america-unsolved-cases/story?id=19126967
[54] Top 11 GPS tracker for modern family of 2016-kids smart watches. [June 03, 2016].[Online]. Available: https://www.thepawtracker.com/blogs/the-pet-tracker-blog-by-the-paw-tracker/128819843-11-kids-gps-tracker-for-the-modern-families-of-2016
[55] C. Gartenberg. Chipolo claims its new Bluetooth trackers are the smallest and thinnestin the world. [January 5, 2017]. [Online]. Available: https://www.theverge.com/circuitbreaker/2017/1/5/14180294/chipolo-bluetooth-trackers-sticker-clip-ces-2017
[56] L. Chan. Chipolo-Bluetooth Item Finder for iPhone and Android. [February 5, 2014].[Online]. Available: https://lesterchan.net/blog/2014/02/05/chipolo-bluetooth-item-finder-for-iphone-and-android/
[57] J. Chen, M. Chen, C. Chen, and Y. Chang, “Architecture design and performanceevaluation of rfid object tracking systems,” Computer Communications, vol. 30, no. 9, p.20702086, 2007.
[58] M. Bonuccelli, F. Lonetti, and F. Martelli, “Instant collision resolution for tag identificationin rfid networks,” Ad Hoc Networks, vol. 5, no. 8, p. 12201232, 2007.
[59] X. Hu, K. K. Wong, and K. Yang, “Wireless powered cooperation-assisted mobile edgecomputing,” IEEE Transactions on Wireless Communications, vol. PP, no. 99, pp. 1–1,2018.
[60] H. Gao, M. Wang, and T. Lv, “Energy efficiency and spectrum efficiency tradeoff in thed2d-enabled hetnet,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp.10 583–10 587, 2017.
[61] J. Liu, H. Ding, Y. Cai, H. Yue, Y. Fang, and S. Chen, “An energy-efficient strategy forsecondary users in cooperative cognitive radio networks for green communications,” IEEEJournal on Selected Areas in Communications, vol. 34, no. 12, pp. 3195–3207, 2016.
[62] R. W. Freund and F. Jarre, “Solving the sum-of-ratios problem by an interior-pointmethod,” Journal of Global Optimization, vol. 19, no. 1, pp. 83–102, 2001.
[63] W. Dinkelbach, “On nonlinear fractional programming,” Management Science, vol. 13,no. 7, pp. 492–498, 1967.
[64] J. Gao, L. Zhao, and X. Shen, “Network utility maximization based on incentive mechanismfor truthful reporting of local information,” IEEE Transactions on Vehicular Technology,pp. 1–1, 2018.
[65] P. He, L. Zhao, S. Zhou, and Z. Niu, “Water-filling: A geometric approach and itsapplication to solve generalized radio resource allocation problems,” IEEE Transactions onWireless Communications, vol. 12, no. 7, pp. 3637–3647, 2013.
91
[66] Y. Luo, P. Hong, R. Su, and K. Xue, “Resource allocation for energy harvesting-poweredd2d communication underlaying cellular networks,” IEEE Transactions on VehicularTechnology, vol. 66, no. 11, pp. 10 486–10 498, 2017.
[67] F. N. P. Office. 2017 crimes in the United States. [September 24, 2018]. [Online].Available: https://ucr.fbi.gov/crime-in-the-u.s/2017/crime-in-the-u.s.-2017/topic-pages/violent-crime
[68] Smartertravel.com. Best Apps to Prevent Travel Disasters. [December 06, 2017]. [Online].Available: https://www.huffingtonpost.com/smartertravel/best-apps-to-prevent-trav b5606425.html
[69] A. Bouman. Five personal safety apps that watch your back. [ October 28, 2013]. [Online].Available: https://www.pcworld.com/article/2057930/5-personal-safety-apps-that-watch-your-back.html
[70] Matt Hamblen. Moscow’s smart tech includes 160,000 outdoor cameras. [February 28,2017 ]. [Online]. Available: https://www.computerworld.com/article/3175063/moscows-smart-tech-includes-160000-cameras-to-detect-traffic-violators.html
[71] Scott Goldfine. 32K Surveillance Cameras Aim to Keep Chicago Safe. [October 31, 2018].[Online]. Available: https://www.campussafetymagazine.com/technology/surveillance-cameras-keeping-chicago-safe/
[72] T. G. Rodrigues, K. Suto, H. Nishiyama, N. Kato, and K. Temma, “Cloudlets activationscheme for scalable mobile edge computing with transmission power control and virtualmachine migration,” IEEE Transactions on Computers, vol. 67, no. 9, pp. 1287–1300,2018.
[73] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,”IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
[74] T. G. Rodrigues, K. Suto, H. Nishiyama, and N. Kato, “Hybrid method for minimizingservice delay in edge cloud computing through vm migration and transmission powercontrol,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 810–819, 2017.
[75] X. Hou, Y. Li, M. Chen, D. Wu, D. Jin, and S. Chen, “Vehicular fog computing: Aviewpoint of vehicles as the infrastructures,” IEEE Transactions on Vehicular Technology,vol. 65, no. 6, pp. 3860–3873, 2016.
[76] J. A. Guerrero-Ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges ofintelligent transportation systems with connected vehicle, cloud computing, and internet ofthings technologies,” IEEE Wireless Communications, vol. 22, no. 6, pp. 122–128, 2015.
[77] S. Abdelhamid, H. Hassanein, and G. Takahara, “Vehicle as a resource (vaar),” IEEENetwork, vol. 29, no. 1, pp. 12–17, 2015.
92
[78] L. Zhang, Z. Zhao, Q. Wu, H. Zhao, H. Xu, and X. Wu, “Energy-aware dynamic resourceallocation in uav assisted mobile edge computing over social internet of vehicles,” IEEEAccess, vol. 6, pp. 56 700–56 715, 2018.
[79] M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloudcomputing,” Journal of Network and Computer applications, vol. 40, pp. 325–344, 2014.
[80] Y. J. Lee, J. Ghosh, and K. Grauman, “Discovering important people and objects foregocentric video summarization,” pp. 1346–1353, 2012.
[81] Y. Pang, H. Ding, J. Liu, Y. Fang, and S. Chen, “A uhf rfid-based system for childrentracking,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5055–5064, 2018.
[82] C. Long, Y. Cao, T. Jiang, and Q. Zhang, “Edge computing framework for cooperativevideo processing in multimedia iot systems,” IEEE Transactions on Multimedia, vol. 20,no. 5, pp. 1126–1139, 2018.
[83] D. W. Scott, Multivariate density estimation: theory, practice, and visualization. JohnWiley & Sons, 2015.
[84] D. P. Bertsekas and A. Scientific, Convex optimization algorithms. Athena ScientificBelmont, 2015.
[85] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge university press, 2004.
[86] L. Lovasz and M. D. Plummer, Matching theory. American Mathematical Soc., 2009, vol.367.
[87] X. Lyu, H. Tian, W. Ni, Y. Zhang, P. Zhang, and R. P. Liu, “Energy-efficient admission ofdelay-sensitive tasks for mobile edge computing,” IEEE Transactions on Communications,vol. 66, no. 6, pp. 2603–2616, 2018.
[88] F. Wang, J. Xu, X. Wang, and S. Cui, “Joint offloading and computing optimizationin wireless powered mobile-edge computing systems,” IEEE Transactions on WirelessCommunications, vol. 17, no. 3, pp. 1784–1797, 2018.
[89] VinTech Systems. Top 5 Cities with the Largest Surveillance Camera Networks. [May 4,2011]. [Online]. Available: https://vintechnology.com/2011/05/04/top-5-cities-with-the-largest-surveillance-camera-networks/
[90] K. Chen, M. Lu, X. Fan, M. Wei, and J. Wu, “Road condition monitoring using on-boardthree-axis accelerometer and gps sensor,” in 2011 6th International ICST Conference onCommunications and Networking in China (CHINACOM), 2011, pp. 1032–1037.
[91] Z. Li, Y. Zhu, H. Zhu, and M. Li, “Compressive sensing approach to urban trafficsensing,” in 2011 31st International Conference on Distributed Computing Systems, 2011,pp. 889–898.
93
[92] S. Mathur, T. Jin, N. Kasturirangan, J. Chandrasekaran, W. Xue, M. Gruteser, andW. Trappe, “Parknet: drive-by sensing of road-side parking statistics,” in Proceedings ofthe 8th international conference on Mobile systems, applications, and services, 2010, pp.123–136.
[93] Z. He, J. Cao, and X. Liu, “High quality participant recruitment in vehicle-basedcrowdsourcing using predictable mobility,” in 2015 IEEE Conference on ComputerCommunications (INFOCOM), 2015, pp. 2542–2550.
94
BIOGRAPHICAL SKETCH
Yawei Pang received his B.Eng. degree in electric information engineering from Hefei
University of Technology, Hefei, China, in 2010. He received his M.S. degree in computer
science from Texas Southern University in 2015. He received his Ph.D. degree in electrical
and computer engineering from University of Florida in 2019. His research focuses on wireless
networking, edge computing, and Internet of Things. He has published papers in prestigious
journals including IEEE Internet of Things Journal and IEEE Transactions on Vehicular
Technology. He is a student member of IEEE.
95