2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing最新文献

筛选
英文 中文
Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models 基于目标导向移动模型的移动Ad Hoc网络连通性分析
M. A. Rahman, A. Aravind
{"title":"Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models","authors":"M. A. Rahman, A. Aravind","doi":"10.1109/MUSIC.2012.10","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.10","url":null,"abstract":"Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Convergence Time of Wang's kWTA Network with Stochastic Output Nodes Wang的随机输出节点kWTA网络的收敛时间
K. Ho, Wei-Bin Lee, Siu-Chung Lau, J. Sum
{"title":"Convergence Time of Wang's kWTA Network with Stochastic Output Nodes","authors":"K. Ho, Wei-Bin Lee, Siu-Chung Lau, J. Sum","doi":"10.1109/MUSIC.2012.39","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.39","url":null,"abstract":"Recently, an extended Wang's kWTA network with stochastic output nodes has been studied. It is shown that this extended model converges asymptotically. In this paper, we further studies the convergence time of this model. The convergence time is defined as the time taken for the model to reach a finite region around the convergent. With this definition, an approximation of convergence time is derived and its viability is shown by simulation results.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Internet of Things in Smart Grid Power Transmission 物联网在智能电网输电中的应用
Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng
{"title":"Application of Internet of Things in Smart Grid Power Transmission","authors":"Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng","doi":"10.1109/MUSIC.2012.24","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.24","url":null,"abstract":"Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Real-Time Collaborative Video Watching on Mobile Devices with REST Services 基于REST服务的移动设备实时协同视频观看
S. Pan, Li Li, W. Chou
{"title":"Real-Time Collaborative Video Watching on Mobile Devices with REST Services","authors":"S. Pan, Li Li, W. Chou","doi":"10.1109/MUSIC.2012.13","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.13","url":null,"abstract":"In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generating OWL Ontology from Relational Database 从关系数据库生成OWL本体
Ji-Woong Choi, M. Kim
{"title":"Generating OWL Ontology from Relational Database","authors":"Ji-Woong Choi, M. Kim","doi":"10.1109/MUSIC.2012.17","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.17","url":null,"abstract":"The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Database Encryption Implementation and Analysis Using Graphics Processing Unit 基于图形处理单元的数据库加密实现与分析
Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won
{"title":"Database Encryption Implementation and Analysis Using Graphics Processing Unit","authors":"Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won","doi":"10.1109/MUSIC.2012.26","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.26","url":null,"abstract":"Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coverage-Based Placement in RFID Networks: An Overview 基于覆盖的RFID网络布局:综述
Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih
{"title":"Coverage-Based Placement in RFID Networks: An Overview","authors":"Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih","doi":"10.1109/MUSIC.2012.45","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.45","url":null,"abstract":"Radio Frequency IDentification (RFID) is a wireless technology that promises to facilitate many identification and tracking solutions. The placement problem, i.e. choosing the optimal locations for RFID readers, tags or both in a given RFID layout, is reviewed in this paper. Placement approaches are generally coverage-driven and vary according to the system's scopes and constraints. RFID coverage is associated with readers' interference, which requires applying redundancy elimination algorithms. In this paper, we propose a coverage-based categorization of RFID placement schemes based on the span of the readers' field. We also provide a comparative analysis of placement schemes based on their performance objectives, constraints, and potential applications. We finally discuss some open issues regarding RFID placement in terms of alternative objectives and systems' specifications.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Use of Artificial Neural Network in the Classification of EMG Signals 人工神经网络在肌电信号分类中的应用
M. R. Ahsan, M. Ibrahimy, O. Khalifa
{"title":"The Use of Artificial Neural Network in the Classification of EMG Signals","authors":"M. R. Ahsan, M. Ibrahimy, O. Khalifa","doi":"10.1109/MUSIC.2012.46","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.46","url":null,"abstract":"This paper presents the design, optimization and performance evaluation of artificial neural network for the efficient classification of Electromyography (EMG) signals. The EMG signals are collected for different types of volunteer hand motion which are processed to extract some predefined features as inputs to the neural network. The time and time-frequency based extracted feature sets are used to train the neural network. A back-propagation neural network with Levenberg-Marquardt training algorithm has been employed for the classification of EMG signals. The results show that the designed and optimized network able to classify single channel EMG signals with an average success rate of 88.4%.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"855 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program 基于HIPAA和QMS的体系结构要求,以应对OCR审核程序
Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene
{"title":"HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program","authors":"Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene","doi":"10.1109/MUSIC.2012.50","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.50","url":null,"abstract":"The United States legislation known as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is aimed at strengthening patient rights, increasing efficiency and decreasing administrative costs in the healthcare industry. Under HIPAA all Covered Entities are required to ensure compliance with certain privacy and security rules concerned with protecting private patient health information. Building upon the objectives of HIPAA, the American Recovery and Reinvestment Act (ARRA) of 2009, in Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, required the Department of Health and Human Services (HHS) to conduct periodic audits of Covered Entities against HIPAA Security Rule. This paper presents and evaluates a new approach which might be used by Covered Entities to achieve compliance with HIPAA by adopting the ISO 9001 guidelines. A United States based Healthcare IT Company (UHITC) with a backup office in Pakistan was taken as a case study for this approach. UHITC develops software for mobile devices along with providing third party medical billing services. In connection with its achieving ISO 9001 certification since 2004, UHITC had already developed a company-wide quality audit protocol based on the ISO 9001 standard. For purposes of conforming the ISO standards to the HIPAA audit protocol in a streamlined fashion, UHITC examined the HIPAA requirements to determine whether the existing protocol could be tailored to achieve HIPAA compliance. In order to accomplish this evaluation, the two standards were compared by cross-mapping their components. The comparison revealed that the controls mentioned in the ISO 9001 guideline meet or exceed the HIPAA Security Rule for 36% of the implementation requirements. UHITC was also able to increase customer satisfaction by achieving compliance with HIPAA Security Rule using a quality management system (QMS) model. At the next level, Compliance Attributes (CA) were derived from these requirements and classified as architectural and non-architectural in nature. A new approach to define compliance oriented software architecture using compliance tactic was also proposed.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert System 用模糊专家系统评价社会计算技术创新理念的成功
A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari
{"title":"Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert System","authors":"A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari","doi":"10.1109/MUSIC.2012.21","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.21","url":null,"abstract":"The purpose of this research is determining the Success of Innovation Ideas in Social Computing Technologies area by an intelligent system. Here two Fuzzy Expert Systems have been designed with the consideration of some effective variables on Ideas Barriers for first system and some other effective variables on Ideas Attractiveness for second system. The Innovation Ideas Success is determined on basis of these systems outputs. The rules of systems have been extracted from some entrepreneurship experts and the systems have been developed with the use of FIS tool of MATLAB software. The final result contains two anticipating models for evaluating level of barriers and level of attractiveness which determines level of success of innovative ideas in social computing technologies area based on two derived output variables from sub models. The presented steps have been run for idea of a new platform named WBB as the empirical study.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信