2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)最新文献

筛选
英文 中文
An architecture for adhesive mobile crowdsourcing application 粘性移动众包应用程序的架构
Hazleen Aris
{"title":"An architecture for adhesive mobile crowdsourcing application","authors":"Hazleen Aris","doi":"10.1109/ICMU.2015.7061031","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061031","url":null,"abstract":"Continual increase in household items prices has prompted the need to have a mechanism that enables comparison of prices to be made between different stores. Through the comparison, consumers are able to find stores that sell items at lower prices, hence helping them to save on their household expenditures. The success of this mechanism strongly relies on the timeliness and comprehensiveness of the prices information. Due to the large number of stores available and the nature of items prices that keep changing from time to time, ensuring the timeliness and comprehensiveness of the information is very challenging. Mobile crowdsourcing was therefore identified as the most suitable method to be used in addressing the challenge, because in mobile crowdsourcing, the information will be contributed by the consumers through their mobile devices. Hence, the sources of information are unlimited, both temporally and spatially. A critical success factor of this mechanism, which also holds true in any crowdsourcing-based application, is the volume of participating crowd, in this case, the consumers. Without their participation, the objective of any crowdsourcing activities cannot be achieved. Therefore, in this paper, an adhesive architecture for mobile crowdsourcing is proposed, which took into consideration the elements that can help in attracting consistent participation from the crowd.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A post-haiyan community level mobility model 后海燕时代的社区流动模式
J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki
{"title":"A post-haiyan community level mobility model","authors":"J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki","doi":"10.1109/ICMU.2015.7061034","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061034","url":null,"abstract":"For the past decade, there has been an increase in the frequency and impact of natural disasters. Information and communications technology (ICT) can be used to minimize the impact of disasters in many ways. However, before deployment, disaster-related ICT systems need to be tested and validated using the appropriate modeling and simulation tools. In this study, we propose a post-disaster mobility model at the community level based on real-world data during the aftermath of Typhoon Haiyan. The construction of an appropriate model is challenging because of the large amount of heterogeneous data collected. Nevertheless, a mobility model from these disaster big data will be useful in evaluating the effectiveness of different ICT-based disaster application systems.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Outage performance of secure multicasting in the presence of multiple eavesdroppers 存在多个窃听者时安全组播的中断性能
Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori
{"title":"Outage performance of secure multicasting in the presence of multiple eavesdroppers","authors":"Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori","doi":"10.1109/ICMU.2015.7061056","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061056","url":null,"abstract":"Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploring UX issues in Quantified Self technologies 探索量化自我技术中的用户体验问题
Je-ho Oh, Uichin Lee
{"title":"Exploring UX issues in Quantified Self technologies","authors":"Je-ho Oh, Uichin Lee","doi":"10.1109/ICMU.2015.7061028","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061028","url":null,"abstract":"The Quantified Self is a movement that promotes the use of technology for self-tracking various kinds of personal information, such as physical activities and energy consumption. In this paper, we study the user reviews of quantified self tools, as reported on a quantified self community website. We perform a content analysis to categorize tracking tools, and to explore user experience (UX) issues related to quantified self technologies. From this analysis, we find various tracking categories, including body state (e.g., physical and physiological), psychological state and traits, activities (e.g., exercise, eating, sleep), social interactions, and environmental and property states. Furthermore, we find the key UX issues associated with quantified self technologies, which include data controllability, data integration, data accuracy, data visualization, input complexity, sharing/privacy, design/aesthetics, and engagement. The UX issues reported in this paper have significant implications for the design of quantified self technologies.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Comparing nape vs. T4 placement for a mobile Wireless Gait Analysis sensor using the Dynamic Gait Index test 使用动态步态指数测试比较移动无线步态分析传感器的颈背与T4放置
B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie
{"title":"Comparing nape vs. T4 placement for a mobile Wireless Gait Analysis sensor using the Dynamic Gait Index test","authors":"B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie","doi":"10.1109/ICMU.2015.7061033","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061033","url":null,"abstract":"A comprehensive and quantified gait analysis is warranted for patients with balance disorders to prevent injury such as falls. We report here a custom-designed wireless-gait-analysis-sensor (WGAS) to perform functional gait analysis targeted for clinically evaluating balance disorders. We report here our first efforts to determine the optimal placements of the WGAS in normal subjects for movement differentiation, while minimizing outliers and data artifacts with improved sensor technology. Normal subjects performed a gold-standard Dynamic Gait Index (DGI) tests for fall risk assessment, while the WGAS was adhered to either the T4 or the nape area. Our WGAS consists of a 3-axis linear accelerometer and gyroscopes, and the real-time gait data was transmitted wirelessly to a nearby PC and statistical analysis was done on each of the 7 DGI test on 3 volunteers repeated five times for either placement. The data suggests T4 is the preferred WGAS placement for gait analysis.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of an energy-efficient lighting system driven by wireless sensor networks 无线传感器网络驱动的节能照明系统的设计与实现
Motoi Okada, H. Aida, H. Ichikawa, M. Miki
{"title":"Design and implementation of an energy-efficient lighting system driven by wireless sensor networks","authors":"Motoi Okada, H. Aida, H. Ichikawa, M. Miki","doi":"10.1109/ICMU.2015.7061052","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061052","url":null,"abstract":"A wireless sensor network is a technology that aims to collect real world information by wireless communication which connects many computer to network, and it is expected its practical realization. On the other hand, research on the office environment also has attracted a great deal of attention in recent years. It has been reported that light environment affects the productivity of user. In this paper, we propose wireless sensor network-driven intelligent lighting system (WSN-ILS below). WSN-ILS provides a light environment to each user by innetwork processing in wireless sensor network. WSN-ILS achieves energy-efficient light environment by performing an individual control to each lighting from sensor node. WSN-ILS has two schemes to control lighting from the sensor node. We will examine effectiveness of the WSN-ILS on an existing equipment.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks 适应节点行为的信任评估方法,用于移动特设网络的安全路由选择
Sayaka Umeda, Sonoko Takeda, H. Shigeno
{"title":"Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks","authors":"Sayaka Umeda, Sonoko Takeda, H. Shigeno","doi":"10.1109/ICMU.2015.7061057","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061057","url":null,"abstract":"In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Vinteraction: Vibration-based information transfer for smart devices 交互:智能设备基于振动的信息传递
Takuro Yonezawa, J. Nakazawa, H. Tokuda
{"title":"Vinteraction: Vibration-based information transfer for smart devices","authors":"Takuro Yonezawa, J. Nakazawa, H. Tokuda","doi":"10.1109/ICMU.2015.7061059","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061059","url":null,"abstract":"According to the spread of smart devices such as smartphones and smart tablets, opportunities to communicate between them will be more increased. Though we usually use WiFi and Bluetooth, it is still burden task for end-users. Many previous techniques to collaborate devices easily has been also proposed, they are not always best solution in some situations. This paper proposes a new interaction method called Vinteracion, which leverages combination of vibrator and accelerometer to send information from smart device to the other smart device. Vinteraction enables users to use touch interaction like Near Field Communication, which provides easy and intuitive way. We present an algorithm and implementation of vibration-based communication that can be adapted to any combination of smart devices. We also present several applications which leverages Vinteraction effectively. Through an evaluation by using popular six products, we confirmed that Vinteraction is easy to use transfer method with current products with reasonable performance.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121539777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Applicability of a layered architecture adopting distributed data processing to M2M communications 采用分布式数据处理的分层体系结构在M2M通信中的适用性
M. Katoh, I. Sato, Ken-ichi Fukuda
{"title":"Applicability of a layered architecture adopting distributed data processing to M2M communications","authors":"M. Katoh, I. Sato, Ken-ichi Fukuda","doi":"10.1109/ICMU.2015.7061050","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061050","url":null,"abstract":"We show that a layered architecture distributing M2M application to multiple processing entities in the M2M network is applicable for ubiquitous era. This paper firstly introduces a layered architecture of M2M system, where we put layers for the decomposition of application and the association of de-composited subroutines. Next, we categorize the association of subroutines into two patterns (sequential and random order), and model schemes on state managements (centralization and distribution). Then, we clarify the condition that the performance can be improved by distributed management in terms of processing time for two association patterns. Next, the deployment of de-composited subroutines on processing entities is discussed, where we show basic rules to reduce carried traffic. Finally, we address the requirements of messaging between two processing entities in M2M network to provide QoS such as time limitation.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demand map-based data dissemination scheme for location dependent data in VANETs VANETs中位置相关数据的需求地图数据分发方案
Yuya Niimi, S. Ishihara
{"title":"Demand map-based data dissemination scheme for location dependent data in VANETs","authors":"Yuya Niimi, S. Ishihara","doi":"10.1109/ICMU.2015.7061047","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061047","url":null,"abstract":"In this paper, we described the design of Demand map-based data distribution scheme and preliminary simulation results. The soft-state sketch is used for the data structure of elements of Dmap information to make the size of Dmap on memory small and the system scalable. We are working on developing detailed design of the Dmap and Dmap-based data dissemination.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信