2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN 考虑信息抑制方法的车载dtn路边单元位置影响
Makoto Ikeda, S. Ishikawa, Taiki Honda, L. Barolli
{"title":"Impact of Location of Road-Side Units Considering Message Suppression Method for Vehicular-DTN","authors":"Makoto Ikeda, S. Ishikawa, Taiki Honda, L. Barolli","doi":"10.1109/IMIS.2015.25","DOIUrl":"https://doi.org/10.1109/IMIS.2015.25","url":null,"abstract":"In previous work, we proposed a Message Suppression (MS) method for Vehicular Delay Tolerant Networking (Vehicular-DTN) considering Epidemic routing protocol. In this paper, we evaluate our proposed MS method considering two different topologies for different DTN routing protocols. The MS method works together with Direct Delivery, Spray and Wait and Epidemic routing protocols using additional packets. The simulations for two scenarios are conducted considering obstacles (buildings), where MS with Road side units (MSRs) are present and not present. We consider 802.11p standard and send bundle messages in a grid scenario. We use the packet delivery ratio, storage usage and end-to-end delay as evaluation metrics. Based on simulation results, we found that our proposed method with Epidemic routing on X-shaped scenario has better performance compared with other DTN routing protocols.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios 异构物联网和M2M场景中可扩展的集成方法
Alex C. Olivieri, G. Rizzo
{"title":"Scalable Approaches to Integration in Heterogeneous IoT and M2M Scenarios","authors":"Alex C. Olivieri, G. Rizzo","doi":"10.1109/IMIS.2015.55","DOIUrl":"https://doi.org/10.1109/IMIS.2015.55","url":null,"abstract":"The Internet of Things (IoT) opens new perspectives for the Machine-To-Machine communications, as it brings to settings with a large and heterogeneous set of devices. This makes integration of such diverse technologies a challenging task. A typical solution to this problem is represented by universal gateways, which provide internal semantics for protocol translation. However such approach is bound to be challenged in future IoT scenarios, as it brings substantial performance impairments in settings with very large number of devices and of technologies. We address these limitations, by proposing two novel approaches. A first is based on distributing the management of the different technologies among gateways. A second approach makes use of Web Service delegation, with gateways acting only as a connecting point between the entities and some service that can interpret the information exchanged. We implement and validate experimentally these approaches, showing that they both scale sensibly better than the traditional approach, guaranteeing acceptable performance even with a high degree of heterogeneity. Moreover, we identify the criteria which should be considered when choosing between the two proposed approaches. Our results establish a set of guidelines for integration in large and heterogeneous IoT scenarios.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of Power Consumption for Smart Devices in Web Applications Web应用中智能设备的功耗评估
Ken Nishimura, Kaoru Sugita
{"title":"Evaluation of Power Consumption for Smart Devices in Web Applications","authors":"Ken Nishimura, Kaoru Sugita","doi":"10.1109/IMIS.2015.12","DOIUrl":"https://doi.org/10.1109/IMIS.2015.12","url":null,"abstract":"In this study, we discuss about decreasing the power consumption of a smart devices in web applications. The decrease of the running cost and the improvement of availability are very important for the reduction of the power consumption in communication systems and services. We have conducted various experiments for power consumption by considering iOS and Android Operating Systems (OS). In this paper, we present experimental results to measure the performances of power consumption by playing the web contents and tapping the touch panel.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Voice-Based Transactions over VoIP Communications 通过VoIP通信可靠的基于语音的交易
G. Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno
{"title":"Reliable Voice-Based Transactions over VoIP Communications","authors":"G. Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno","doi":"10.1109/IMIS.2015.20","DOIUrl":"https://doi.org/10.1109/IMIS.2015.20","url":null,"abstract":"Nowadays, plenty of sensitive transactions are provided through call centers such as bank operations, goods purchase and contracts signing. Beside communication confidentiality, two major issues are raised within this scenario: (1) each peer should be ensured about the identity of the other, (2) each peer should be guaranteed that the other could not cheat about the communication contents. Current telecommunication (TLC) networks offer (built-in) or allow several mechanisms to enhance security and reliability of human conversations, leveraging strong authentication mechanisms and cryptography. However, in most cases these solutions require complex deployments, mainly based on proprietary technologies which are often characterized by high costs and low flexibility. In this paper we present a solution for strong peers authentication and non-repudiability of human conversations through Voice over IP (VoIP) networks. Our solution achieves low costs and high interoperability as it is built on top of open standard technologies. Authentication and key-agreement mechanism are based on X.509 digital certificates and full PKCS#11 compliant cryptographic tokens. As proof of concept, we present and discuss a prototype implementation.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi 基于RSS标准偏差的Wi-Fi室内定位AP选择
Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu
{"title":"An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi","authors":"Fong-Mao Jhuang, Chi-Fu Hung, Chiu-Ching Tuan, Yi-Chao Wu, Fang-Yie Leu","doi":"10.1109/IMIS.2015.62","DOIUrl":"https://doi.org/10.1109/IMIS.2015.62","url":null,"abstract":"This paper presents an AP selection for indoor positioning based on Wi-Fi received signal strength (RSS), which is a low cost and easy-accessible technique. However, the RSS are changeable over time by multipath effect, which may affect the accuracy of positioning. First, the system uses the box plot to remove the outlier of the RSS samples from APs to smooth the RSS. Then, the standard deviation is used to analysis the variation of RSS, and selects the Top-N APs having less interference for location estimation. We will use simulations to further verify the positioning accuracy and efficiency of the proposed strategy, but also look forward to apply on related positioning services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Knowledge-Based Framework for the Virtual Communication of Public Art 公共艺术虚拟传播的知识框架
V. Lombardo, R. Damiano, Antonio Lieto
{"title":"Knowledge-Based Framework for the Virtual Communication of Public Art","authors":"V. Lombardo, R. Damiano, Antonio Lieto","doi":"10.1109/IMIS.2015.22","DOIUrl":"https://doi.org/10.1109/IMIS.2015.22","url":null,"abstract":"This paper deals with the documentation and communication of contemporary public art. It analyzes the specific requirements of such a form of cultural heritage and presents a system that implements the visualization of implicit information in a web -- based virtual reality environment. The core of the system is a knowledge -- based (ontological) module, devised to represent the values, the realization procedures, and the access ways to public art items. The visualization system relies upon the ontological representation to provide a 3D layout that takes into account the relevant traits that characterize the contemporary public art. The issues of integration of the public art within the urban context is the object of a visualization component, implemented in interactive web -- based 3D graphics, that relies on the ontological knowledge concerning the public art, integrated with additional ontological descriptions of spatial geographic knowledge.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Privacy and Security Framework for the Cloud Network Services 一种新的云网络服务隐私和安全框架
Irish Singh, Kamta Nath Mishra, A. Alberti, Dhananjay Singh, A. Jara
{"title":"A Novel Privacy and Security Framework for the Cloud Network Services","authors":"Irish Singh, Kamta Nath Mishra, A. Alberti, Dhananjay Singh, A. Jara","doi":"10.1109/IMIS.2015.93","DOIUrl":"https://doi.org/10.1109/IMIS.2015.93","url":null,"abstract":"This paper presents an overview of security and it's issues in cloud computing. Nowadays cloud computing has tremendous usage in so many fields such as financial management, communications and collaboration, office productivity suits, accounting applications, customer relationship management, online storage management, human resource and employment. Owing to increase in use of these services by companies, several security issues have emerged and this challenges cloud computing architectures to secure, protect and process user's data. These services have certain cons like security, lock-in, lack of control, and reliability. Privacy and security are the major concerns in cloud computing services. In this paper, we have designed a novel secure framework for cloud services, as well as presented a critical analysis of CCMP (Counter with Cipher Block Message Authentication Code Protocol) protocol for secure data management of cloud services.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131416351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Qualitative Evaluation of Full Body Movements with Gesture Description Language 用手势描述语言定性评价全身运动
T. Hachaj, M. Ogiela
{"title":"Qualitative Evaluation of Full Body Movements with Gesture Description Language","authors":"T. Hachaj, M. Ogiela","doi":"10.1109/AIMS.2014.32","DOIUrl":"https://doi.org/10.1109/AIMS.2014.32","url":null,"abstract":"The motivation for writing this paper is to present the method for qualitative evaluation of full body movements with Gesture Description Language. By qualitative evaluation we understand the possibility of evaluating the similarity between the template of movement defined in GDL script (GDLs) and physical activity performed by observed user. The establishing of this methodology allows us to perform real time evaluation of movements accuracy defined as similarity to the statistically computed templates. The presented methodology can be used not only to perform advanced numerical analysis of movements but also to support multimedia visual feedback to various movements activities in computer applications. The initial evaluation presented in this paper proved that proposed method of qualitative analysis of movements has a potential to be used in practice.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信