{"title":"A fuzzy-based collaborative localization algorithm for wireless sensor networks","authors":"M. Abdelhadi, M. Anan","doi":"10.1109/CTS.2012.6261042","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261042","url":null,"abstract":"Wireless Sensor Networks (WSNs) are being deployed in a variety of location-dependent applications, where the measurement of data is meaningless without accurate location. Many range-free algorithms were proposed in order to minimize the extra cost that appears in the ranged-based algorithms. Fuzzy logic provides a simple, fast and cost efficient way that can be used in range-free algorithms. In this paper, we propose a fuzzy-based collaborative localization algorithm for wireless sensor networks. Our proposed algorithm implements a Sugeno-type fuzzy system using a collaborative feedback communication scheme. The proposed algorithm provides more accurate localization estimation without any additional hardware implementation. The simulation results demonstrate the effectiveness of the proposed approach.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicola Capodieci, Giacomo Cabri, G. Pagani, Marco Aiello
{"title":"Adaptive game-based agent negotiation in deregulated energy markets","authors":"Nicola Capodieci, Giacomo Cabri, G. Pagani, Marco Aiello","doi":"10.1109/CTS.2012.6261067","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261067","url":null,"abstract":"In the emerging deregulated energy paradigm enabled by the Smart Grid, energy provisioning will change drastically. Energy contracts will be negotiated between a potential multitude of parties at high frequency (e.g., several times per day) based on local needs and micro-generation production facilities. In this context, this paper presents an agent-based approach to manage negotiation among the different parties. The goal of the presented work is to propose adaptive negotiation strategies for trading energy in a deregulated market. In particular, we provide strategies derived from game theory, in order to optimize energy production and supply costs by means of negotiation and adaptation. The novelty lies in the adaptation of the class of minority and stochastic games to the energy trading problem in order to model the strategy of the various parties involved. The paper presents also simulation results of a scenario with a large number of energy buyers, a small set of prosumers (energy consumers and producers using renewable micro-generation facilities) and a few large-scale traditional electricity suppliers.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an integrated framework for phase-specific media choice in virtual creative group processes","authors":"Katrin Bergener","doi":"10.1109/CTS.2012.6261101","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261101","url":null,"abstract":"In an increasingly globalized world creative work is often conducted by virtual teams all over the globe. Those virtual teams cannot meet physically to collaborate, cooperate and communicate. Virtual team work saves money, directly by cutting costs of travel and indirectly by saving time, but these effects are thwarted if the results of the group work suffer from group losses and risks inherent in creative work. Therefore, this paper focuses on how to mitigate such potential risks and losses in creative group processes by the right choice of media. The results are then combined with the creative group process in an integrated framework for media choice in specific phases of the creative group process. We believe that considering this framework when choosing media for creative group processes leads to a better process flow and thus better results, i.e. higher product quality.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biswajit Panja, A. Prakash, Priyanka Meharia, Bradley Schneider
{"title":"Security in sensor network based SCADA system for adaptive traffic signal operation","authors":"Biswajit Panja, A. Prakash, Priyanka Meharia, Bradley Schneider","doi":"10.1109/CTS.2012.6261050","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261050","url":null,"abstract":"Sensor network based SCADA (supervisory control and data acquisition) system can be used to effectively manage traffic lights in a busy urban region. However, security is a major concern in this type of system. Though security in SCADA system is studied thoroughly, however they do not provide security in the integrated traffic system. This paper proposes a secure wireless sensor based intelligent traffic system which aims to use fuzzy logic to alleviate heavy traffic conditions. This sensor based traffic system provides security, so that attackers cannot get into the SCADA system and take over the controller and then control the sensors to create a traffic disaster in a busy urban area.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive scenario visualization for user-based service development","authors":"J. V. Klooster, B. Beijnum, A. Eliëns, H. Hermens","doi":"10.1109/CTS.2012.6261096","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261096","url":null,"abstract":"Scenarios are commonly used to develop new systems in multidisciplinary projects. However, written scenarios are sequential, not dynamic and often too abstract or difficult to understand for end users. The goal of this paper hence is to extend the use of scenarios in design methodologies, using an interactive scenario visualization (ISV) approach. After discussing scenario-based design, we show that ISV can be used beneficially to develop a new ICT system and that ISV aids in reflection upon the design trajectory. Comparing two software platforms, we found it was possible to develop such ISVs inexpensively, rapidly and with good visual quality. As a case study, we demonstrate the use of a home care telemedicine system in 3D for discussion and development purposes1. An evaluation among n=22 professionals illustrates that ISVs can prove useful in design, aid in clarification of new systems, are suitable to demonstrate system functionalities, and aid in articulating feedback. Finally, we discuss generalization of the use of ISVs.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Field study of a physical game for older adults based on an autonomous, mobile robot","authors":"S. Hansen, D. M. Rasmussen, T. Bak","doi":"10.1109/CTS.2012.6261038","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261038","url":null,"abstract":"This paper presents an initial, qualitative study on how a game based on a mobile robot with an expressive head can be used by older adults as a rehabilitation application. The game is investigated in two independent field studies - one in a nursing home and one in a rehabilitation centre. An analysis of the interaction is made based on video recordings, observations and qualitative interviews using an open, exploratory approach. The primary goal of the study is to observe seniors' acceptance of the robot, to obtain knowledge about their game play patterns and get ideas about future improvements of the game.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-the-Cloud Computing: Challenges in controlling cloud resources","authors":"D. Ionescu","doi":"10.1109/CTS.2012.6261066","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261066","url":null,"abstract":"Cloud Computing is defined as a pool of virtualized computer resources deployed and scaled-out quickly through the rapid provisioning of virtual or physical machines. Virtual machine services offered by cloud utility providers led to the creation of the ecosystem of cloud services as they enable customers to use computing resources based on the dynamic behaviour of the application and of the computer resource used. As the control system approach is more and more accepted by the computer research communities the perspective of implementing an adaptive resource provisioning and optimization looked attractive enough for investing efforts and human resources to move it from the theory benches to experimental implementations.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130562644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic framework for analyzing the privacy of recommender algorithms","authors":"Qiang Tang","doi":"10.1109/CTS.2012.6261090","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261090","url":null,"abstract":"Recommender algorithms are widely used, ranging from traditional Video on Demand to a wide variety of Web 2.0 services. Unfortunately, the related privacy concerns have not received much attention. In this paper, we study the privacy concerns associated with recommender algorithms and present a cryptographic security model to formulate the privacy properties. We propose two privacy-preserving content-based recommender algorithms and prove their properties. Moreover, we show the potential weakness in some existing collaborative filtering algorithms which claim to provide privacy protection.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving methods of human interactions","authors":"Michael Bolei, S. Semwal","doi":"10.1109/CTS.2012.6261116","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261116","url":null,"abstract":"Technology provides a way to communicate, and the desire to communicate, both with other humans and with forms of technology itself, is clearly one of the strongest factors in the directions in which devices have been developing. In this paper, we specifically address the interaction technology developed facilitating human-human communication. As we survey this technical field patterns emerge just as devices or technologies were developed, and rejected. The desire to provide similar functionality on the go has led toward a degree of homogeneity of user experiences which just a few years ago were quite different. As we look at this from a complex systems point of view and review what has happened over a larger period of time, we propose that the desire to communicate has always been a main attractor and a driving force of development of technologies as we summarize how sensorial interactions have been added to technology and/or devices. Our analysis shows that rejection of technology is based on how the product is perceived, and that it is not easy to predict as an attractor, as successful products in this case can result in cascading effects and non-linear focus of similar technology.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage","authors":"P. Dasgupta","doi":"10.1109/CTS.2012.6261030","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261030","url":null,"abstract":"Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5].","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}