Wei Sun’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (45)


Moving object map analytics: A framework enabling contextual spatial-temporal analytics of Internet of Things applications
  • Conference Paper

July 2016

·

50 Reads

·

11 Citations

Wei Sun

·

Jun Zhu

·

Ning Duan

·

[...]

·

Jing Chang Huang

Moving objects, for example vehicles, vessels, people, are being instrumented with Internet of Things devices such as GPS, environmental sensors, mobile cameras that produce big streaming data with spatial-temporal features enabling application innovations in many industries for autonomous driving, usage based insurance, fleet management, etc. We introduce an analytics framework to streamline the insights discovery from such big data on top of geographic map by pulling together a list of commonly required high performance functions with service-oriented architecture. Supported by a service composition approach, comprehensive applications intelligently managing moving objects could be built effectively. Example applications in connected vehicle domains are presented to illustrate the effectiveness of such a framework.


Controlling the use of computing resources in a database as a service

May 2015

·

15 Reads

A method and apparatus controls use of a computing resource by multiple tenants in DBaaS service. The method includes intercepting a task that is to access a computer resource, the task being an operating system process or thread; identifying a tenant that is in association with the task from the multiple tenants; determining other tasks of the tenant that access the computing resource; and controlling the use of the computing resource by the task, so that the total amount of usage of the computing resource by the task and the other tasks does not exceed the limit of usage of the computing resource for the tenant.


Adjusting wheel diameter
  • Patent
  • Full-text available

October 2014

·

17 Reads

A method and apparatus for adjusting wheel diameter by acquiring a current wheel diameter distribution vector; calculating similarity scores between the current wheel diameter distribution vector and known wheel diameter distribution vector clusters to determine a potential wear rate of the current wheel diameter distribution vector; calculating similarity scores between candidate target wheel diameter distribution vectors and the known wheel diameter distribution vector clusters to determine a potential wear rates of the candidate target wheel diameter distribution vectors; and selecting a target wheel diameter distribution vector from the candidate target wheel diameter distribution vectors, such that the reduction of potential wear rate achieved by switching the current wheel diameter distribution vector to the target wheel diameter distribution vector meets a predetermined condition. Future potential wear rates and the amount of grinding required during train maintenance can be optimized through changing wheel diameter distribution vectors.

Download

Tuning parameter of Kalman filter in a wheel inspection

August 2014

·

19 Reads

An apparatus for tuning a parameter of a Kalman filter in a wheel inspection for a vehicle is disclosed. The apparatus includes an association module that associates wheel inspection data of the vehicle with locations of corresponding wheels in the vehicle; an evaluation module that evaluates a wheel stable score of the vehicle based on the wheel inspection data and the association, where the wheel stable score indicates reliability of the wheel inspection; and a parameter tuning module that tunes a measurement error covariance of the Kalman filter according to the evaluated wheel stable score.


Mining generalized spatial association rule

August 2014

·

16 Reads

A system, method and computer program product for mining a rule including spatial information and non-spatial information by using a SAR (Spatial Association Rule) mining tool. The computing system is configured to construct an expanded spatial predicate transaction table for reference spatial objects and a generalized taxonomy for task-relevant spatial objects. The computing system is configured to run the SAR mining tool with the constructed expanded spatial predicate transaction and the generalized taxonomy. The computing system outputs, from the SAR mining tool, a set of generalized spatial association rules for the reference spatial objects. The generalized spatial association rule includes the spatial information and non-spatial information, associated with both the reference spatial objects and the task-relevant spatial objects.


Database system and method of optimizing cross database query

July 2014

·

13 Reads

A database system and a method of optimizing cross-database query. The database system includes a plurality of databases. At least two of the databases are stored with one or more data collections composed of tables with the same structure. A federated view of the data collection is created on each of the databases. A request routing layer for routing, in response to a query request crossing the data collections, the query request crossing the data collections to one of the at least two databases according to a predetermined routing rule, so as to query by using the federated view of the database.


Method and apparatus for resource transfer

July 2013

·

8 Reads

A method and apparatus for transferring resources from a server to a client, wherein the resources are for an object in an application. According to the present invention, resources needed by the object are determined. Resources which have usages that are less than a threshold according to statistics are removed from the determined resources. The remainder of the determined resources, which are needed by the object, is transferred to the client. According to the present invention, users do not have to wait for a long time before they can see a web page.


Multi-tenancy data storage and access method and apparatus

July 2013

·

16 Reads

A method, apparatus, and a computer program product for storing and accessing multi-tenancy data. The method includes the steps of: creating a plurality of table sets in one or more databases, wherein each table set is used to store data of a group of tenants selected from a plurality of tenants; accessing data of a tenant in a table set in response to receiving a data access request from the tenant; and recording relationships between the tenants and the table sets in a multi-tenancy metadata repository, wherein the step of accessing the data of the tenant comprises the steps of finding the table set by querying the metadata repository and accessing the data of the tenant in the table set based on the result received from the query of the metadata repository.


An Approach to Optimize Police Patrol Activities Based on the Spatial Pattern of Crime Hotspots

December 2012

·

265 Reads

·

6 Citations

Criminal activities are a major risk factor for the well-being of society in many countries. Police patrol service is a critical instrument to combat the criminal activities with violent aspects. The police resource allocation for street patrolling is one of the most important tactical management activities, and it is important to continuously improve the patrolling strategies. Previous research mainly focuses on determining the important scores of locations based on hotspots analysis or identifying important routes based on the topology of road networks. There are several limitations in the current patrol planning studies. First, the patterns in the distribution of hotspots were rarely considered in the patrol planning. Second, some existing patrol optimization algorithms can lead to a predictable patroller. Third, the overall performance of multiple patrol activities is often not optimized. Finally, more efficient algorithms are needed for a real-time solution that serves large jurisdictions. To deal with these limitations, this chapter aims to integrate a spatial pattern identification approach with an efficient route optimization algorithm to produce randomized optimal patrol routes. A case study is provided to illustrate our approach, which shows that the proposed approach can improve the overall effectiveness of multiple unpredictable patrol activities and it is efficient enough to be used as a real-time solution.


Point pattern analysis utilizing controlled randomization for police tactical planning

July 2012

·

13 Reads

·

1 Citation

Law enforcement agencies often rely on crime pattern identification techniques to support their tactical planning. K-function analysis has been one of the most popular crime pattern identification approaches. It has been integrated with point randomization procedures to identify the level of clustering in crimes. One limitation of this integration is that it can only differentiate between a complete random pattern and a clustered point pattern. It is well known that crimes only occur in populated area and the distribution of human population is spatially heterogeneous. A complete random pattern of crimes rarely occurs. The current K-function offers little insights on the clustering levels of crimes given our prior knowledge on the distribution of processes that may have influenced the occurrence of crimes. This study integrates two controlled point randomization procedures with K-function analysis to analyze crime patterns. These two approaches are compared against the complete random pattern and results indicate that the controlled point randomization procedures can reveal detailed information on the underlying processes for point patterns. It can also take into account the underlying processes for the crimes.


Citations (30)


... They generate data streams that are usually an unbounded sequence of tuples that are most likely to be out-of-order and having a high data rate. A vast number of devices are being embedded into the very fabric of smart cities in such a way that they will revolutionize operational functioning and planning, through management, control and optimization of traditional services such as intelligent fleet management (Sun et al., 2016), smart parking (Mainetti et al., 2015) and digital health (Banos et al., 2016). This is already causing a shift from traditional GIS platforms towards IoT-GIS platforms in which IoT devices are linked by means of communication technologies that are crucial to enable smart cities functioning in real-time from routinely sensed data (Batty et al., 2012;Song et al., 2017). ...

Reference:

Developing an Analytics Everywhere Framework for the Internet of Things in Smart City Applications
Moving object map analytics: A framework enabling contextual spatial-temporal analytics of Internet of Things applications
  • Citing Conference Paper
  • July 2016

... Most of the previous cluster detection methods assumed that the disease case counts follow a specific distribution, such as Bernoulli ordinal, Poisson, Normal, Gaussian and Exponential, which restrict the distribution of the dataset. Numerous methods have been developed for detecting spatio-temporal clusters in public health, especially the parametric approach [17][18][19][20][21][22][23][24]. However, these methods are vulnerable to outliers and noise and are not applicable to non-traditional data sources, such as pharmacy sales, water quality data and social media [25], because of their unstructured and large dataset. ...

Detecting Irregularly Shaped Significant Spatial and Spatio-Temporal Clusters
  • Citing Article
  • April 2012

... The first procedure was to perform a preliminary global statistical (PGS) test to determine if there is a cluster of SHC reports. Many techniques have been used, including Average Nearest Neighbour (ANN) (Al-Sabbagh, 2022), and spatial autocorrelation (Li et al., 2012). The ANN is a clustering indicator formed by comparing the observed distribution of events to a random distribution of those events. ...

An Approach to Optimize Police Patrol Activities Based on the Spatial Pattern of Crime Hotspots
  • Citing Chapter
  • December 2012

... Unit tests in this context means testing each web service and their corresponding interfaces, i.e., each operation o↵ered and invoked by the service (Mayer and Lübke, 2006;Li et al., 2008a). A side problem associated to the testing of BPEL processes is the generation of test cases. ...

BPEL4WS unit testing: Framework and implementation
  • Citing Article
  • January 2008

International Journal of Business Process Integration and Management

... Then, the confidence measure of pattern A and B is the probability that the pattern B occurs when the pattern A occurs. The threshold value is given by the user to determine the strong spatial association rules (Koperski and Han, 1995;Han and Fu, 1995;Dong et al., 2012). Basically, the spatial database is used to accumulate and control the spatial objects. ...

Discovery of generalized spatial association rules
  • Citing Conference Paper
  • July 2012

... Pada beberapa kasus seperti kriminalitas, menggunakan point marker untuk menandai posisi dari keberadaan kasus pembunuhan. Pada kasus seperti studi alam, menggunakan point marker untuk melakukan penandaan kuantitatif yang akan dianalisis seperti jumlah curah hujan [2]. ...

Point pattern analysis utilizing controlled randomization for police tactical planning
  • Citing Conference Paper
  • July 2012

... Most of the previous cluster detection methods assumed that the disease case counts follow a specific distribution, such as Bernoulli ordinal, Poisson, Normal, Gaussian and Exponential, which restrict the distribution of the dataset. Numerous methods have been developed for detecting spatio-temporal clusters in public health, especially the parametric approach [17][18][19][20][21][22][23][24]. However, these methods are vulnerable to outliers and noise and are not applicable to non-traditional data sources, such as pharmacy sales, water quality data and social media [25], because of their unstructured and large dataset. ...

Detect irregularly shaped spatio-temporal clusters for decision support
  • Citing Article
  • July 2011

... Optimizing patrol routes for security teams involves the development of efficient and effective routes that maximize coverage and minimize response times [24]. The related literature focuses on methodologies such as graph theory and algorithms, geospatial analysis, simulation, and modeling [25]. ...

Police Patrol service optimization based on the spatial pattern of hotspots
  • Citing Article
  • July 2011

... This kind of monitoring can be referred to under the term workflow monitoring. Its focus is on the workflow state rather than underlying technical measurements [13]. In contrast, [14] and this paper aim to provide a nonintrusive workflow monitoring approach combined with active SL management. ...

Visualized Monitoring of Virtual Business Process for SOA
  • Citing Article
  • January 2008

... Abdul et al. [21] they can provide great opportunities to harness the power of cloud infrastructure enabling the tenants to increase the consolidation of data layer operational entities to be dedicated, isolated, and shared. The use of infrastructure can also be done in other ways by applying a multitenant management pattern [22], [23] such as the model-view-controller (MVC), model-view-presenter (MVP), and model-view-view-model (MVVM). Each pattern includes some different aspects of the tenant management systematics. ...

A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing
  • Citing Article
  • January 2008