28 results on '"Jie, Bao"'
Search Results
2. SALON
- Author
-
Yu Zheng, Yuting Ni, Jie Bao, Huajun He, Ruiyuan Li, Yue Hu, and Sijie Ruan
- Subjects
Flexibility (engineering) ,Point (typography) ,Ranking ,Computer science ,Universality (philosophy) ,Trajectory ,Data mining ,computer.software_genre ,computer - Abstract
The prevalence of positioning technologies has fostered massive trajectory data. Stay points from trajectories indicate the visiting of moving objects to locations, which provide an opportunity to understand the locations comprehensively. Many existing works rely on stay points to analyze locations. However, they are ad-hoc solutions to tackle specific problems, and it is time-consuming and tedious to develop each application. In this paper, we propose a universal StAy point-based LOcation aNalysis platform, i.e., SALON, with the characteristics of universality, efficiency and flexibility. It can retrieve stay points using flexible conditions, associate stay points with locations, extract comprehensive location profiles and visualize the analysis results to users. Based on the combination of these functions, we demonstrate three different location analysis scenarios, i.e., illegal location discovery, popular location ranking, location temporal analysis to show its characteristics.
- Published
- 2021
- Full Text
- View/download PDF
3. POI Alias Discovery in Delivery Addresses using User Locations
- Author
-
Tianfu He, Zheyi Pan, Junbo Zhang, Yu Zheng, Hui He, Chuishi Meng, Chen Guochun, Yuan Ye, Huajun He, Sijie Ruan, Yexin Li, Huimin Ren, Ruiyuan Li, and Jie Bao
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Information retrieval ,Geographic information system ,Alias ,business.industry ,Computer science ,media_common.quotation_subject ,Computer Science - Social and Information Networks ,Databases (cs.DB) ,E-commerce ,Place of interest ,Computer Science - Information Retrieval ,Computer Science - Databases ,Urban computing ,Similarity (psychology) ,Global Positioning System ,Quality (business) ,business ,Information Retrieval (cs.IR) ,media_common - Abstract
People often refer to a place of interest (POI) by an alias. In e-commerce scenarios, the POI alias problem affects the quality of the delivery address of online orders, bringing substantial challenges to intelligent logistics systems and market decision-making. Labeling the aliases of POIs involves heavy human labor, which is inefficient and expensive. Inspired by the observation that the users' GPS locations are highly related to their delivery address, we propose a ubiquitous alias discovery framework. Firstly, for each POI name in delivery addresses, the location data of its associated users, namely Mobility Profile are extracted. Then, we identify the alias relationship by modeling the similarity of mobility profiles. Comprehensive experiments on the large-scale location data and delivery address data from JD logistics validate the effectiveness.
- Published
- 2021
- Full Text
- View/download PDF
4. Distributed Spatio-Temporal k Nearest Neighbors Join
- Author
-
Jie Bao, Fuqiang Gu, Rubin Wang, Yu Zisheng, Ruiyuan Li, Liang Hong, Ruan Sijie, Chao Chen, Huajun He, Junwen Liu, Tianfu He, and Yu Zheng
- Subjects
Source code ,Theoretical computer science ,Computer science ,media_common.quotation_subject ,Concurrency ,Polygon ,Scalability ,String (computer science) ,Spark (mathematics) ,Join (sigma algebra) ,media_common ,k-nearest neighbors algorithm - Abstract
The rapid development of positioning technology produces an extremely large volume of spatio-temporal data with various geometry types such as point, line string, polygon, or a mixed combination of them. As one of the most basic but time-consuming operations, k nearest neighbors join (kNN join) has attracted much attention. However, most existing works for kNN join either ignore temporal information or consider point data only. This paper proposes a novel and useful problem, i.e., ST-kNN join, which considers both spatial closeness and temporal concurrency. To support ST-kNN join over a huge amount of spatio-temporal data with any geometry types efficiently, we propose a novel distributed solution based on Apache Spark. Specifically, our method adopts a two-round join framework. In the first round join, we propose a new spatio-temporal partitioning method that achieves spatio-temporal locality and load balance at the same time. We also propose a lightweight index structure, i.e., Time Range Count Index (TRC-index), to enable efficient ST-kNN join. In the second round join, to reduce the data transmission among different machines, we remove duplicates based on spatio-temporal reference points before shuffling local results. Extensive experiments are conducted using three real big datasets, showing that our method is much more scalable and achieves 9X faster than baselines. A demonstration system is deployed and the source code is released.
- Published
- 2021
- Full Text
- View/download PDF
5. JUST-Traj
- Author
-
Huajun He, Tianrui Li, Yu Zheng, Jie Bao, and Ruiyuan Li
- Subjects
Statement (computer science) ,SQL ,Database ,business.industry ,Computer science ,Data management ,computer.software_genre ,Variety (cybernetics) ,Spark (mathematics) ,Trajectory ,Trajectory analysis ,Internet of Things ,business ,computer ,computer.programming_language - Abstract
With the rapid development of the Internet of Things (IoT), massive trajectories have been generated. Trajectory data is beneficial for many urban applications. This demo presents a holistic trajectory data management system based on distributed platforms, such as Spark and HBase, namely JUST-Traj. It provides a variety of indexes to efficiently support spatio-temporal queries and analyses on massive trajectories. Additionally, it provides a convenient SQL engine to execute all operations (storage, queries, analyses) through a SQL-like statement. Finally, we design a web portal for developers and demonstrate different operations in the portal.
- Published
- 2021
- Full Text
- View/download PDF
6. ICFinder
- Author
-
Zheng Zhu, Huimin Ren, Yu Zheng, Ruiyuan Li, Yanhua Li, Boyang Han, Jie Bao, and Sijie Ruan
- Subjects
Truck ,Government ,Computer science ,Hazardous waste ,Cluster analysis ,Computer security ,computer.software_genre ,Economic benefits ,Trajectory data mining ,computer ,Filter (software) - Abstract
Chemical materials are useful but sometimes hazardous, which requires strict regulation from the government. However, due to the potential economic benefits, many illegal hazardous chemical facilities are running underground, which poses a significant public safety threat. However, the traditional solutions, e.g., on-field screening and the anonymous tip-offs, involve a lot of human efforts. In this paper, we propose a ubiquitous approach called ICFinder to detecting illegal chemical facilities with chemical transportation trajectories. We first generate candidate locations by clustering stay points extracted from trajectories, and filter out known locations. Then, we rank those locations in suspicion order by modeling whether it has the loading/unloading events. ICFinder is evaluated over the real-world dataset from Nantong in China, and the deployed system identified 20 illegal chemical facilities in 3 months.
- Published
- 2021
- Full Text
- View/download PDF
7. MTrajRec
- Author
-
Yanhua Li, Chuishi Meng, Yu Zheng, Huimin Ren, Ruiyuan Li, Jie Bao, and Sijie Ruan
- Subjects
business.industry ,Computer science ,Pipeline (computing) ,Real-time computing ,Global Positioning System ,Trajectory ,Multi-task learning ,Map matching ,business ,Grid ,Representation (mathematics) ,Energy (signal processing) - Abstract
With the increasing adoption of GPS modules, there are a wide range of urban applications based on trajectory data analysis, such as vehicle navigation, travel time estimation, and driver behavior analysis. The effectiveness of urban applications relies greatly on the high sampling rates of trajectories precisely matched to the map. However, a large number of trajectories are collected under a low sampling rate in real-world practice, due to certain communication loss and energy constraints. To enhance the trajectory data and support the urban applications more effectively, many trajectory recovery methods are proposed to infer the trajectories in free space. In addition, the recovered trajectory still needs to be mapped to the road network, before it can be used in the applications. However, the two-stage pipeline, which first infers high-sampling-rate trajectories and then performs the map matching, is inaccurate and inefficient. In this paper, we propose a Map-constrained Trajectory Recovery framework, MTrajRec, to recover the fine-grained points in trajectories and map match them on the road network in an end-to-end manner. MTrajRec implements a multi-task sequence-to-sequence learning architecture to predict road segment and moving ratio simultaneously. Constraint mask, attention mechanism, and attribute module are proposed to overcome the limits of coarse grid representation and improve the performance. Extensive experiments based on large-scale real-world trajectory data confirm the effectiveness and efficiency of our approach.
- Published
- 2021
- Full Text
- View/download PDF
8. Is Reinforcement Learning the Choice of Human Learners?
- Author
-
Weixiao Huang, Jun Luo, Jie Bao, Yanhua Li, Yu Zheng, Zhenming Liu, Xun Zhou, and Menghai Pan
- Subjects
Earnings ,Categorization ,Human–computer interaction ,Computer science ,020204 information systems ,Urban computing ,0202 electrical engineering, electronic engineering, information engineering ,Reinforcement learning ,020201 artificial intelligence & image processing ,02 engineering and technology ,Human learning ,Task (project management) - Abstract
Learning to make optimal decisions is a common yet complicated task. While computer agents can learn to make decisions by running reinforcement learning (RL), it remains unclear how human beings learn. In this paper, we perform the first data-driven case study on taxi drivers to validate whether humans mimic RL to learn. We categorize drivers into three groups based on their performance trends and analyze the correlations between human drivers and agents trained using RL. We discover that drivers that become more efficient at earning over time exhibit similar learning patterns to those of agents, whereas drivers that become less efficient tend to do the opposite. Our study (1) provides evidence that some human drivers do adapt RL when learning, (2) enhances the deep understanding of taxi drivers' learning strategies, (3) offers a guideline for taxi drivers to improve their earnings, and (4) develops a generic analytical framework to study and validate human learning strategies.
- Published
- 2020
- Full Text
- View/download PDF
9. Sleepy watch
- Author
-
Jie Bao, Kai Kunze, Jiawen Han, and Akira Kato
- Subjects
medicine.medical_specialty ,Daytime ,Temperature sensing ,Wearable sensing ,Computer science ,010401 analytical chemistry ,Psychomotor vigilance task ,020207 software engineering ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Weak correlation ,Alertness ,Physical medicine and rehabilitation ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Everyday life - Abstract
Daytime sleepiness, the difficulty to maintain an alert waking state during the day, is a serious problem causing vehicle accidents and adverse effects on well-being, health, and productivity. Our research aims at predicting daytime sleepiness using wearable sensing in everyday life to raise awareness and help people to manage their energy better. This study presents a first exploration of comparing body temperature (wrist, forehead, in-ear) with users alertness, measured over a reaction test: Psychomotor vigilance task (PVT) in 7 participants over 2 days in real-life conditions (168 hours in total). The results indicate a weak correlation between some body temperature measures and the PVT scores for certain subjects. This underlines that unobtrusive on-body temperature sensing can be an interesting modality to understand and explore daytime sleepiness.
- Published
- 2020
- Full Text
- View/download PDF
10. Doing in One Go
- Author
-
Cheng Long, Jie Bao, Yiheng Chen, Zhongyuan Jiang, Ruiyuan Li, Yu Zheng, Zi Xiong, Tianfu He, Shengnan Wu, Sijie Ruan, School of Computer Science and Engineering, and 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
- Subjects
Matching (statistics) ,Operations research ,Event (computing) ,Computer science ,Waybill ,Inference ,02 engineering and technology ,Delivery Performance ,Computer science and engineering::Information systems::Database management [Engineering] ,Delivery Time Inference ,Trajectory Data Mining ,020204 information systems ,Urban computing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Last mile - Abstract
The rapid development of e-commerce requires efficient and reliable logistics services. Nowadays, couriers are still the main solution to address the "last mile" problem in logistics. They are usually required to record the accurate delivery time of each parcel manually, which provides vital information for applications like delivery insurances, delivery performance evaluations, and customer available time discovery. Couriers' trajectories generated by their PDAs provide a chance to infer the delivery time automatically to ease the burdens on the couriers. However, directly using the nearest stay point to infer the delivery time is under satisfactory due to two challenges: 1) inaccurate delivery locations, and 2) various stay scenarios. To this end, we propose Delivery Time Inference (DTInf), to automatically infer the delivery time of waybills based on couriers' trajectories. Our solution is composed of three steps: 1) Data Pre-processing, which detects stay points from trajectories, and separates stay points and waybills by delivery trips, 2) Delivery Location Correction, which infers true delivery locations of waybills by mining historical deliveries, and 3) Delivery Event-based Matching, which selects the best-matched stay point for waybills in the same delivery location to infer the delivery time. Extensive experiments and case studies based on large scale real-world waybill and trajectory data from JD Logistics confirm the effectiveness of our approach. Finally, we introduce a system based on DTInf, which is deployed and used internally in JD Logistics. Ministry of Education (MOE) Nanyang Technological University Accepted version This work was also supported by the Nanyang Technological University Start-UP Grant from the College of Engineering under Grant M4082302 and by the Ministry of Education, Singapore, under its Academic Research Fund Tier 1 (RG20/19 (S)).
- Published
- 2020
- Full Text
- View/download PDF
11. What is the Human Mobility in a New City: Transfer Mobility Knowledge Across Cities
- Author
-
Tianfu He, Yanhua Li, Li Song, Yu Zheng, Hui He, Sijie Ruan, Ruiyuan Li, and Jie Bao
- Subjects
Computer science ,business.industry ,02 engineering and technology ,Data science ,Web of Things ,Urban planning ,020204 information systems ,Urban computing ,0202 electrical engineering, electronic engineering, information engineering ,Global Positioning System ,020201 artificial intelligence & image processing ,business ,Mobile device ,Generator (mathematics) - Abstract
With the advances of web-of-things, human mobility, e.g., GPS trajectories of vehicles, sharing bikes, and mobile devices, reflects people’s travel patterns and preferences, which are especially crucial for urban applications such as urban planning and business location selection. However, collecting a large set of human mobility data is not easy because of the privacy and commercial concerns, as well as the high cost to deploy sensors and a long time to collect the data, especially in newly developed cities. Realizing this, in this paper, based on the intuition that the human mobility is driven by the mobility intentions reflected by the origin and destination (or OD) features, as well as the preference to select the path between them, we investigate the problem to generate mobility data for a new target city, by transferring knowledge from mobility data and multi-source data of the source cities. Our framework contains three main stages: 1) mobility intention transfer, which learns a latent unified mobility intention distribution across the source cities, and transfers the model of the distribution to the target city; 2) OD generation, which generates the OD pairs in the target city based on the transferred mobility intention model, and 3) path generation, which generates the paths for each OD pair, based on a utility model learned from the real trajectory data in the source cities. Also, a demo of our trajectory generator is publicly available online for two city regions. Extensive experiment results over four regions in China validate the effectiveness of the proposed solution. Besides, an on-field case study is presented in a newly developed region, i.e., Xiongan, China. With the generated trajectories in the new city, many trajectory mining techniques can be applied.
- Published
- 2020
- Full Text
- View/download PDF
12. Effective Recycling Planning for Dockless Sharing Bikes
- Author
-
Jianfeng Lin, Sijie Ruan, Xianen Li, Zhihong Tian, Hui Lu, Cong Zhang, Chao Tian, Cong Liu, Jie Bao, Yanhua Li, and Tianfu He
- Subjects
Transport engineering ,021103 operations research ,Scale (ratio) ,Computer science ,ComputingMilieux_PERSONALCOMPUTING ,0211 other engineering and technologies ,0202 electrical engineering, electronic engineering, information engineering ,Urban transportation ,020201 artificial intelligence & image processing ,02 engineering and technology ,Cycling ,Task (project management) - Abstract
Bike-sharing systems become more and more popular in the urban transportation system, because of their convenience in recent years. However, due to the high daily usage and lack of effective maintenance, the number of bikes in good condition decreases significantly, and vast piles of broken bikes appear in many big cities. As a result, it is more difficult for regular users to get a working bike, which causes problems both economically and environmentally. Therefore, building an effective broken bike prediction and recycling model becomes a crucial task to promote cycling behavior. In this paper, we propose a predictive model to detect the broken bikes and recommend an optimal recycling program based on the large scale real-world sharing bike data. We incorporate the realistic constraints to formulate our problem and introduce a flexible objective function to tune the trade-off between the broken probability and recycled numbers of the bikes. Finally, we provide extensive experimental results and case studies to demonstrate the effectiveness of our approach.
- Published
- 2019
- Full Text
- View/download PDF
13. TrajGuard
- Author
-
Jie Bao, Yong Yu, Yu Zheng, Weinan Zhang, and Zheyi Pan
- Subjects
TheoryofComputation_MISCELLANEOUS ,Data sharing ,Robustness (computer science) ,Computer science ,Hash function ,Data Protection Act 1998 ,Data mining ,Trusted third party ,computer.software_genre ,Database transaction ,Private information retrieval ,computer ,Data type - Abstract
Trajectory data has been widely used in many urban applications. Sharing trajectory data with effective supervision is a vital task, as it contains private information of moving objects. However, malicious data users can modify trajectories in various ways to avoid data distribution tracking by the hashing-based data signatures, e.g., MD5. Moreover, the existing trajectory data protection scheme can only protect trajectories from either spatial or temporal modifications. Finally, so far there is no authoritative third party for trajectory data sharing process, as trajectory data is too sensitive. To this end, we propose a novel trajectory copyright protection scheme, which can protect trajectory data from comprehensive types of data modifications/attacks. Three main techniques are employed to effectively guarantee the robustness and comprehensiveness of the proposed data sharing scheme: 1) the identity information is embedded distributively across a set of sub-trajectories partitioned based on the spatio-temporal regions; 2) the centroid distance of the sub-trajectories is served as a stable trajectory attribute to embed the information; and 3) the blockchain technique is used as a trusted third party to log all data transaction history for data distribution tracking in a decentralized manner. Extensive experiments were conducted based on two real-world trajectory datasets to demonstrate the effectiveness of our proposed scheme.
- Published
- 2019
- Full Text
- View/download PDF
14. Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories
- Author
-
Yu Zheng, Chao Tian, Jie Bao, Ruiyuan Li, Tianfu He, Yanhua Li, and Sijie Ruan
- Subjects
Cover (telecommunications) ,Computer science ,Air pollution ,02 engineering and technology ,Computer security ,computer.software_genre ,medicine.disease_cause ,Beijing ,Urban planning ,020204 information systems ,Urban computing ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Large city ,computer - Abstract
Illegal vehicle parking is a common urban problem faced by major cities in the world, as it incurs traffic jams, which lead to air pollution and traffic accidents. Traditional approaches to detect illegal vehicle parking events rely highly on active human efforts, e.g., police patrols or surveillance cameras. However, these approaches are extremely ineffective to cover a large city. The massive and high quality sharing bike trajectories from Mobike offer us with a unique opportunity to design a ubiquitous illegal parking detection system, as most of the illegal parking events happen at curbsides and have significant impact on the bike users. Two main components are employed to mine the trajectories in our system: 1)~trajectory pre-processing, which filters outlier GPS points, performs map-matching and builds indexes for bike trajectories; and 2)~illegal parking detection, which models the normal trajectories, extracts features from the evaluation trajectories and utilizes a distribution test-based method to discover the illegal parking events. The system is deployed on the cloud internally used by Mobike. Finally, extensive experiments and many insightful case studies based on the massive trajectories in Beijing are presented.
- Published
- 2018
- Full Text
- View/download PDF
15. HomeFinder Revisited
- Author
-
Yu Zheng, Di Weng, Zhu Heming, Jie Bao, and Yingcai Wu
- Subjects
Visual analytics ,Computer science ,business.industry ,Process (engineering) ,020207 software engineering ,Usability ,Context (language use) ,02 engineering and technology ,User requirements document ,Task (project management) ,Reachability ,Human–computer interaction ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,Recreation - Abstract
Finding an ideal home is a difficult and laborious process. One of the most crucial factors in this process is the reachability between the home location and the concerned points of interest, such as places of work and recreational facilities. However, such importance is unrecognized in the extant real estate systems. By characterizing user requirements and analytical tasks in the context of finding ideal homes, we designed ReACH, a novel visual analytics system that assists people in finding, evaluating, and choosing a home based on multiple criteria, including reachability. In addition, we developed an improved data-driven model for approximating reachability with massive taxi trajectories. This model enables users to interactively integrate their knowledge and preferences to make judicious and informed decisions. We show the improvements in our model by comparing the theoretical complexities with the prior study and demonstrate the usability and effectiveness of the proposed system with task-based evaluation.
- Published
- 2018
- Full Text
- View/download PDF
16. Querying Massive Trajectories by Path on the Cloud
- Author
-
Sijie Ruan, Yanhua Li, Yu Zheng, Yingcai Wu, Ruiyuan Li, and Jie Bao
- Subjects
Computer science ,business.industry ,Suffix tree ,Search engine indexing ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Bottleneck ,law.invention ,law ,020204 information systems ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Trajectory ,Table (database) ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,business ,computer - Abstract
A path query aims to find the trajectories that pass a given sequence of connected road segments within a time period. It is very useful in many urban applications, e.g., 1) traffic modeling, 2) frequent path mining, and 3) traffic anomaly detection. Existing solutions for path query are implemented based on single machines, which are not efficient for the following tasks: 1) indexing large-scale historical data; 2) handling real-time trajectory updates; and 3) processing concurrent path queries. In this paper, we design and implement a cloud-based path query processing framework based on Microsoft Azure. We modify the suffix tree structure to index the trajectories using Azure Table. The proposed system consists of two main parts: 1) backend processing, which performs the pre-processing and suffix index building with distributed computing platform (i.e., Storm) used to efficiently handle massive real-time trajectory updates; and 2) query processing, which answers path queries using Azure Storm to improve efficiency and overcome the I/O bottleneck. We evaluate the performance of our proposed system based on a real taxi dataset from Guiyang, China.
- Published
- 2017
- Full Text
- View/download PDF
17. A Cloud-Based Trajectory Data Management System
- Author
-
Yu Zheng, Ruiyuan Li, Jie Bao, and Sijie Ruan
- Subjects
Database ,business.industry ,Computer science ,Data management ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Variety (cybernetics) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Trajectory ,020201 artificial intelligence & image processing ,business ,computer - Abstract
With the rapid development of location-acquisition techniques, massive trajectories are continuously generated. Many urban applications rely heavily on the data mining/analysis results of massive trajectory data. This demo presents a holistic data management system for both historical and real-time trajectory records based on a cloud platform, such as Microsoft Azure. The proposed system is able to efficiently support a variety of trajectory queries, including ID-Temporal query, Spatio-Temporal query, and Path-Temporal query. With these queries, we demonstrate that different urban applications can be realized in a much easier way.
- Published
- 2017
- Full Text
- View/download PDF
18. Mining the most influential k -location set from massive trajectories
- Author
-
Yanhua Li, Yu Zheng, Yuhong Li, Zhiguo Gong, Jie Bao, and Yingcai Wu
- Subjects
Process (computing) ,02 engineering and technology ,computer.software_genre ,Performance guarantee ,Set (abstract data type) ,Geography ,Beijing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Domain knowledge ,Resource allocation ,020201 artificial intelligence & image processing ,Data mining ,Heuristics ,Greedy algorithm ,computer - Abstract
Mining the most influential k-location set finds k locations, traversed by the maximum number of unique trajectories, in a given spatial region. These influential locations are valuable for resource allocation applications, such as selecting charging stations for electric automobiles and suggesting locations for placing billboards. This problem is NP-hard and usually calls for an interactive mining processes, e.g., changing the spatial region and k, or removing some locations (from the results in the previous round) that are not eligible for an application according to the domain knowledge. Thus, efficiency is the major concern in addressing this problem. In this paper, we propose a system by using greedy heuristics to expedite the mining process. The greedy heuristic is efficient with performance guarantee. We evaluate the performance of our proposed system based on a taxi dataset of Tianjin, and provide a case study on selecting the locations for charging stations in Beijing.
- Published
- 2016
- Full Text
- View/download PDF
19. Managing massive trajectories on the cloud
- Author
-
Jie Bao, Ruiyuan Li, Xiuwen Yi, and Yu Zheng
- Subjects
Database ,business.industry ,Computer science ,Data management ,Real-time computing ,Inference ,Cloud computing ,02 engineering and technology ,computer.software_genre ,020204 information systems ,Urban computing ,0202 electrical engineering, electronic engineering, information engineering ,Global Positioning System ,Profiling (information science) ,020201 artificial intelligence & image processing ,business ,computer - Abstract
With advances in location-acquisition techniques, such as GPS- embedded phones, an enormous volume of trajectory data is generated, by people, vehicles, and animals. This trajectory data is one of the most important data sources in many urban computing applications, e.g., traffic modeling, user profiling analysis, air quality inference, and resource allocation.To utilize large scale trajectory data efficiently and effectively, cloud computing platforms, e.g., Microsoft Azure, are the most convenient and economic way. However, traditional cloud computing platforms are not designed to deal with spatio-temporal data, such as trajectories. To this end, we design and implement a holistic cloud-based trajectory data management system on Microsoft Azure to bridge the gap between trajectory data and urban applications. Our system can efficiently store, index, and query large trajectory data with three functions: 1) trajectory ID-temporal query, 2) trajectory spatio-temporal query, and 3) trajectory mapmatching. The efficiency of the system is tested and tuned based on real-time trajectory data feeds. The system is currently used in many internal urban applications, as we will illustrate using case studies.
- Published
- 2016
- Full Text
- View/download PDF
20. ACM SIGSPATIAL GIS Cup 2013
- Author
-
Mohamed Sarwat, Jie Bao, Mohamed Ali, and Siva Ravada
- Subjects
World Wide Web ,Geographic information system ,Geography ,Geographic area ,business.industry ,Location-based service ,business ,CONTEST ,Cartography ,Fencing - Abstract
The 21st ACM SIGSPATIAL Conference on Advances in Geographic Information Systems (GIS) was held in November of 2013 in Orlando, Florida. Following the success of last year's event, we organized the second programming contest associated with the conference, called the SIGSPATIAL GIS Cup 2013. The subject of the competition was Geo-fencing, which identifies the qualified point and area pairs using a virtual perimeter for a real-world geographic area. We describe the contest details, and the results, as well as the lessons learned during the process.
- Published
- 2013
- Full Text
- View/download PDF
21. GeoRank
- Author
-
Jie Bao and Mohamed F. Mokbel
- Subjects
Database ,Computer science ,media_common.quotation_subject ,Process (computing) ,Response time ,computer.software_genre ,News aggregator ,Scalability ,Location-based service ,Relevance (information retrieval) ,Pruning (decision trees) ,Function (engineering) ,computer ,media_common - Abstract
News feed function becomes very popular in many social networking services and news aggregators, as it delivers the messages from users' subscribed sources. More recently, location has been introduced to the news feed function, which returns the news items relevant to the user's location. However, with the large number of the news items generated by the sources, existing news feed systems opt to return the top-k most recent ones, which completely overlooks the messages' spatial relevance and may end up in missing more geographically close ones. In this paper, we present GeoRank, an efficient location-aware news feed ranking system that provides top-k new feeds based on (a) spatial proximity, (b) temporal proximity, and (c) user preferences. GeoRank encapsulates spatio-temporal pruning techniques to improve its response time and efficiency. GeoRank is composed of two main modules, namely, query processor and message updater. The query processor module is triggered by the user, upon logging on to the system, to provide the top-k ranked location-based news feeds. The message updater module is a process running in the background, which keeps maintaining statistics used by the query processor module. Extensive experimental results, based on real and synthetic data sets, show the scalability and efficiency of GeoRank.
- Published
- 2013
- Full Text
- View/download PDF
22. Dissecting foursquare venue popularity via random region sampling
- Author
-
Limin Wang, Zhi-Li Zhang, Moritz Steiner, Yanhua Li, and Jie Bao
- Subjects
World Wide Web ,Geography ,Software deployment ,Geographic regions ,Snapshot (computer storage) ,Popularity ,Mobile device - Abstract
Location based social networks (LBSNs) are becoming increasingly popular with the fast deployment of broadband mobile networks and the growing prevalence of versatile mobile devices. This success has attracted great interest in studying and measuring the characteristics of LBSNs. However, it is often prohibitive, and sometimes impossible, to obtain a detailed and complete snapshot of a LBSN due to its usually massive scale and the lack of proper tools. In this work, we focus on sampling and estimating restricted geographic regions in LBSNs, such as cities or states, in Foursquare. By utilizing the geographic search APIs provided by Foursquare, we propose a random region sampling algorithm that allows us to draw representative samples of venues (i.e., places), and design unbiased estimators of regional characteristics of venues. Moreover, using a unique dataset with 2.4 million venues, that we collected from Foursquare, we further explore the factors affecting the venue popularity, and present our preliminary findings, with applications in venue recommendation and advertising in LBSNs.
- Published
- 2012
- Full Text
- View/download PDF
23. The anatomy of Sindbad
- Author
-
Amr Magdy, Ahmed Eldawy, Mohamed F. Mokbel, Mohamed Sarwat, Justin J. Levandoski, and Jie Bao
- Subjects
World Wide Web ,Android phone ,Multimedia ,Computer science ,Scalability ,Location aware ,Relevance (information retrieval) ,Recommender system ,computer.software_genre ,computer ,Social relevance ,Ranking (information retrieval) - Abstract
This paper features Sindbad; a location-based social networking system. Sindbad supports three new services beyond traditional social networking services, namely, location-aware news feed, location-aware recommender, and location-aware ranking. These new services not only consider social relevance for its users, but they also consider spatial relevance. Since location-aware social networking systems have to deal with large number of users, large number of messages, and user mobility, efficiency and scalability are important issues. To this end, Sindbad encapsulates its three main services inside the query processing engine of PostgreSQL. Usage and internal functionality of Sindbad are implemented with PostgreSQL and Google Maps API. Both a web and android phone applications are built on top of Sindbad for better interaction with the system users.
- Published
- 2012
- Full Text
- View/download PDF
24. Location-based and preference-aware recommendation using sparse geo-social networking data
- Author
-
Mohamed F. Mokbel, Jie Bao, and Yu Zheng
- Subjects
World Wide Web ,Hierarchy ,Geospatial analysis ,Computer science ,Location-based service ,Collaborative filtering ,Recommender system ,Set (psychology) ,computer.software_genre ,computer ,Selection algorithm ,Popularity - Abstract
The popularity of location-based social networks provide us with a new platform to understand users' preferences based on their location histories. In this paper, we present a location-based and preference-aware recommender system that offers a particular user a set of venues (such as restaurants) within a geospatial range with the consideration of both: 1) User preferences, which are automatically learned from her location history and 2) Social opinions, which are mined from the location histories of the local experts. This recommender system can facilitate people's travel not only near their living areas but also to a city that is new to them. As a user can only visit a limited number of locations, the user-locations matrix is very sparse, leading to a big challenge to traditional collaborative filtering-based location recommender systems. The problem becomes even more challenging when people travel to a new city. To this end, we propose a novel location recommender system, which consists of two main parts: offline modeling and online recommendation. The offline modeling part models each individual's personal preferences with a weighted category hierarchy (WCH) and infers the expertise of each user in a city with respect to different category of locations according to their location histories using an iterative learning model. The online recommendation part selects candidate local experts in a geospatial range that matches the user's preferences using a preference-aware candidate selection algorithm and then infers a score of the candidate locations based on the opinions of the selected local experts. Finally, the top-k ranked locations are returned as the recommendations for the user. We evaluated our system with a large-scale real dataset collected from Foursquare. The results confirm that our method offers more effective recommendations than baselines, while having a good efficiency of providing location recommendations.
- Published
- 2012
- Full Text
- View/download PDF
25. Sindbad
- Author
-
Mohamed F. Mokbel, Ahmed Eldawy, Jie Bao, Justin J. Levandoski, Amr Magdy, and Mohamed Sarwat
- Subjects
World Wide Web ,Social network ,Multimedia ,Computer science ,business.industry ,Scalability ,Relevance (information retrieval) ,Recommender system ,business ,computer.software_genre ,computer ,Social relevance ,Ranking (information retrieval) - Abstract
This demo presents Sindbad; a location-based social networking system. Sindbad supports three new services beyond traditional social networking services, namely, location-aware news feed, location-aware recommender, and location-aware ranking. These new services not only consider social relevance for its users, but they also consider spatial relevance. Since location-aware social networking systems have to deal with large number of users, large number of messages, and user mobility, efficiency and scalability are important issues. To this end, Sindbad encapsulates its three main services inside the query processing engine of PostgreSQL. Usage and internal functionality of Sindbad, implemented with PostgreSQL and Google Maps API, are demonstrated through user (i.e., web/phone) and system analyzer GUI interfaces, respectively.
- Published
- 2012
- Full Text
- View/download PDF
26. Towards location-based social networking services
- Author
-
Mohamed F. Mokbel, Chi-Yin Chow, and Jie Bao
- Subjects
Web search query ,Computer science ,business.industry ,computer.software_genre ,Query language ,Ranking (information retrieval) ,World Wide Web ,Query expansion ,Web query classification ,The Internet ,Web service ,business ,computer ,Active networking - Abstract
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in the location-aware hardware and software technologies, location-based social networking applications have been proposed to provide services for their users, taking into account both the spatial and social aspects. Unfortunately, none of existing location-based social networking applications is a holistic system nor equips database management systems to support scalable location-based social networking services. In this paper, we present GeoSocialDB; a holistic system providing three location-based social networking services, namely, location-based news feed, location-based news ranking, and location-based recommendation. In GeoSocialDB, we aim to implement these services as query operators inside a database engine to optimize the query processing performance. Within the GeoSocialDB framework, we discuss research challenges and directions towards the realization of scalable and practical query processing for location-based social networking services. In general, we discuss the challenges in designing location- and/or rank-aware query operators, materializing query answers, supporting continuous query processing, and providing privacy-aware query processing for our three location-based social networking services.
- Published
- 2010
- Full Text
- View/download PDF
27. PROS
- Author
-
Jie Bao, Wei-Shinn Ku, and Haiquan Chen
- Subjects
Result set ,InformationSystems_DATABASEMANAGEMENT ,Cloaking ,Service provider ,Peer-to-peer ,Computer security ,computer.software_genre ,Bottleneck ,Set (abstract data type) ,Geography ,Location-based service ,ComputingMilieux_COMPUTERSANDSOCIETY ,computer ,Implementation - Abstract
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloaked into a spatial region that contains at least k indistinguishable users. However, a centralized location anonymizer may pose serious privacy threats and could be the system bottleneck. Moreover, many cloaking methods are developed for the Euclidean space and fail to consider the features of road networks. In this demonstration, we present the technologies and implementations which protect location privacy by peer-to-peer based cloaking on road networks. We name the prototype system as PROS. With PROS, a mobile user forms a cloaked road segment set by collaborating with her peers when she needs to retrieve information from location-based service providers. Afterward, the cloaked road segment set is sent to the service provider for query processing and an inclusive query result set is returned to the query initiator after the query evaluation.
- Published
- 2009
- Full Text
- View/download PDF
28. Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, Bellevue, WA, USA, November 3-6, 2015
- Author
-
Jie Bao, Christian Sengstock, Mohammed Eunus Ali, Yan Huang 0002, Michael Gertz 0001, Matthias Renz, and Jagan Sankaranarayanan
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.