skip to main content
10.1145/2674377.2674387acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-devConference Proceedingsconference-collections
research-article

Probabilistic Inference of Unknown Locations: Exploiting Collective Behavior when Individual Data is Scarce

Published:05 December 2014Publication History

ABSTRACT

In recent years there has been a proliferation in the use of large-scale, passively collected digital trace data to study the mobility and migration patterns of individuals in developing countries. Analysis of mobile phone and social media data, among other sources, has immediate policy applications that range from disease monitoring and city planning to disaster management and humanitarian relief. Unfortunately, existing methods for mining location-based information from passively collected data are generally not well suited to a large number of individuals in developing countries. This is in part due to the fact that technology use is quite heterogeneous, and that the lower intensity use patterns of many individuals produces a sparser digital trace.

In this paper, we present a method for predicting the approximate location of a mobile phone subscriber that is more appropriate to contexts where the signal generated by each individual may be intermittent, but the collective population generates a large amount of data. This method works well when, for instance, an individual is not consistently active on the network or when the phone is off. Our model uses a nonparametric approach to probabilistically interpolate locations, and has the advantage of associating a confidence with each prediction. We test this method on a large dataset of anonymized mobile phone records from Afghanistan, and find that we can correctly predict a subscriber's unknown location in 76%-95% of cases, and that on average our predicted location is off by 0.2-1.9 kilometers.

References

  1. K. W. Axhausen and T. Gärling. Activity-based approaches to travel analysis: conceptual frameworks, models, and research problems. Transport Reviews, 12(4):323--341, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  2. L. Bengtsson, X. Lu, A. Thorson, R. Garfield, and J. Von Schreeb. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: a post-earthquake geospatial study in haiti. PLoS medicine, 8(8):e1001083, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  3. J. Blumenstock and N. Eagle. Mobile divides: Gender, socioeconomic status, and mobile phone use in rwanda. In Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development, ICTD '10, pages 6:1--6:10, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Blumenstock, Y. Shen, and N. Eagle. A method for estimating the relationship between phone use and wealth. QualMeetsQuant Workshop at the 4th International IEEE/ACM Conference on Information and Communication Technologies and Development, 2010.Google ScholarGoogle Scholar
  5. J. E. Blumenstock. Inferring patterns of internal migration from mobile phone call records: Evidence from rwanda. Information Technology for Development, 18(2):107--125, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. E. Blumenstock and N. Eagle. Divided we call: Disparities in access and use of mobile phones in rwanda. Information Technology and International Development, 8(2):1--16, 2012.Google ScholarGoogle Scholar
  7. F. Calabrese, G. Di Lorenzo, L. Liu, and C. Ratti. Estimating origin-destination flows using mobile phone location data. IEEE Pervasive Computing, 10(4):36--44, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E. Frias-Martinez, G. Williamson, and V. Frias-Martinez. An agent-based model of epidemic spread using human mobility and social network information. In Privacy, security, risk and trust (passat), 2011 IEEE third international conference on social computing (socialcom), pages 57--64. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. B. Gomes, C. Phua, and S. Krishnaswamy. Where will you go? mobile data mining for next place prediction. In L. Bellatreche and M. K. Mohania, editors, Data Warehousing and Knowledge Discovery, Lecture Notes in Computer Science 8057, pages 146--158. Springer Berlin Heidelberg, Jan. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. C. González, C. A. Hidalgo, and A.-L. Barabási. Understanding individual human mobility patterns. Nature, 453(7196):779--782, June 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. Z. Huang and U. Kumar. Combining call records and road data for strategic disaster response planning. 2013.Google ScholarGoogle Scholar
  12. Y.-J. Kim and S.-B. Cho. A HMM-based location prediction framework with location recognizer combining k-nearest neighbor and multiple decision trees. In J.-S. Pan, M. M. Polycarpou, M. Wozniak, A. C. P. L. F. d. Carvalho, H. Quintián, and E. Corchado, editors, Hybrid Artificial Intelligent Systems, Lecture Notes in Computer Science 8073, pages 618--628. Springer Berlin Heidelberg, Jan. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  13. G. D. Lorenzo, J. Reades, F. Calabrese, and C. Ratti. Predicting personal mobility with individual and group travel histories. Environment and Planning B: Planning and Design, 39(5):838--857, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. X. Lu, E. Wetter, N. Bharti, A. J. Tatem, and L. Bengtsson. Approaching the limit of predictability in human mobility. Scientific Reports, 3, Oct. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. A. Monreale, F. Pinelli, R. Trasarti, and F. Giannotti. WhereNext: A location predictor on trajectory pattern mining. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '09, pages 637--646, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Ratti, R. M. Pulselli, S. Williams, and D. Frenchman. Mobile landscapes: using location data from cell phones for urban analysis. Environment and Planning B: Planning and Design, 33(5):727--748, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  17. J. C. Scott. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. Yale University Press, Feb. 1999.Google ScholarGoogle Scholar
  18. K. Shilton. Four billion little brothers': Privacy, mobile phones, and ubiquitous data collection. Commun. ACM, 52(11):48--53, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Song, Z. Qu, N. Blumm, and A.-L. Barabási. Limits of predictability in human mobility. Science, 327(5968):1018--1021, Feb. 2010.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Wesolowski, N. Eagle, A. J. Tatem, D. L. Smith, A. M. Noor, R. W. Snow, and C. O. Buckee. Quantifying the impact of human mobility on malaria. Science, 338(6104):267--270, Oct. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. H. Xiong, D. Zhang, D. Zhang, and V. Gauthier. Predicting mobile phone user locations by exploiting collective behavioral patterns. In 2012 9th International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC/ATC), pages 164--171, Sept. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Probabilistic Inference of Unknown Locations: Exploiting Collective Behavior when Individual Data is Scarce

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ACM DEV-5 '14: Proceedings of the Fifth ACM Symposium on Computing for Development
        December 2014
        142 pages
        ISBN:9781450329361
        DOI:10.1145/2674377

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 December 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ACM DEV-5 '14 Paper Acceptance Rate11of37submissions,30%Overall Acceptance Rate52of164submissions,32%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader