{"title":"Developing an ontology-supported information recommending system for scholars","authors":"Sheng-Yuan Yang, Chun-Liang Hsu, Ssu-Hsien Lu","doi":"10.1109/JCPC.2009.5420185","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420185","url":null,"abstract":"This paper focused on developing an ontology-supported information recommending system for scholars. Not only can it fast integrate specific domain documents, but also it can extract important information from them to take information integration and recommendation ranking. The core technologies include: ontology-supported webpage crawler, webpage classifier, information extractor, information recommender, and a user integration interface. The preliminary experiment outcomes proved that the reliability and validation measurements of the whole system performance can achieve the high-level outcomes of information recommendation.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of video game experience and gender differences in educational video games","authors":"A. Tawfik, Zhenyu He, Ngoc Vo","doi":"10.1109/JCPC.2009.5420089","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420089","url":null,"abstract":"Despite the emergent research of educational video games, video gaming experience and associated gender disparity are two important factors that have been overlooked when determining optimal learning environments for educational video games. For those who lack experience, educational video games may tax cognitive load and preclude informal learning benefits. This pilot study compared five males and five females when playing an educational video game. The results show males improved more in posttest scores when compared with females. When demographic information was further dissected, males were much more likely to have experience with video games when compared with females. The study and analysis of these two factors in conjunction help to discover implications for design that lead to future advancements in learning through educational video games","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"M-LT/R·W method based Mobile-Learning supporting systems","authors":"Mizuo Kansen, Masaya Sasaki, Takanobu Watanabe, Zixue Cheng","doi":"10.1109/JCPC.2009.5420221","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420221","url":null,"abstract":"In recent years, e-Learning has been used very widely because of rapid spread of computers and network. Furthermore the mobile-phone is so well spread that almost everyone owns a mobile-phone because of its simplicity. Many people carry their mobile phone anywhere with them. We can say that a mobile-phone becomes a commodity for everyone. The purpose of this paper is to propose a mobile - learning support system using LT/R ·W method. LT/R ·W method is one of techniques for getting learning diagnosis information from each answer in multiple-choice test. Using LT/R ·W method we are able to grasp the learner's understanding state not only from judging if the answer is right or wrong but also from a relationship between the level of difficulty of each question and the level of understanding of each learner. And also we are able to grasp from a relationship between the amount of time that a particular learner takes to solve each question and the amount of time to do so in general. We design the learning support system using LT/R ·W method and implement it as an “i-application (for NTT docomo's mobile phone)”. Moreover we carry out the evaluation of the system through a questionnaire to users.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Pan, Yuqing Sun, Qingzhong Li, ZhiYong Chen, Ji Bian
{"title":"The top-k skyline query in pervasive computing environments","authors":"Peng Pan, Yuqing Sun, Qingzhong Li, ZhiYong Chen, Ji Bian","doi":"10.1109/JCPC.2009.5420166","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420166","url":null,"abstract":"In pervasive computing environments, more and more applications or platforms based on mobile phone and PDA emerged. People could get what they want from these platforms anywhere. Top-k and skyline query are two methods to satisfy user's preferences. In many situations, we need to combine the two querying technologies to satisfy the user's preferences, which is called top-k skyline query. Based on a given pervasive computing scenario, we formulate a theoretical model for top-k skyline query, describe an algorithm that proceeds the skyline and top-k query synchronously. It shows better performance in experiment than algorithms proposed in [3].","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"633 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117091107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Sheng Wang, Chun-Hong Huang, Yong-Si Chen, Li Zheng
{"title":"An implementation of positioning system in indoor environment based on active RFID","authors":"Ching-Sheng Wang, Chun-Hong Huang, Yong-Si Chen, Li Zheng","doi":"10.1109/JCPC.2009.5420212","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420212","url":null,"abstract":"The Radio Frequency Identification (RFID) positioning based on the signal strength is the well know and feasible method. But the researches based on signal strength only usually make unsatisfied positioning error because of the instable of RFID signal. In this paper, we propose an indoor RFID positioning system which is based on the analysis of signal strength, the layout of sensing region, and the tracks of users. Different from the other RFID positioning systems, we use only one RFID reader with user, and the tags are layout in the positioning area systematically. The system integrates two phase work of positioning: analysis of signal strength in overlapping sensing area (Level 1), and analysis of users' movement directions with signal comparison (Level 2). The experiments show that the proposed mechanism improves the accuracy of positioning successfully.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigation and communication platform for on board unit of logistics traffic","authors":"Litao He, Z. Deng, Jianming Huang","doi":"10.1109/JCPC.2009.5420172","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420172","url":null,"abstract":"The existing theory and technology provides new means for on board system of logistics traffic. The use of navigation and communication platform will be an integral part of on board unit (OBU). Applications on OBU have been growing substantially in recent years to reduce the probability of accidents. On navigation and locating part, locating solution innovation is now driven by requirements of location based services on logistics. The fact is mass users distributing in urban canyons, indoors or in shaded areas where Global Navigation Satellite Systems (GNSS) signals can be attenuated, so the navigation platform generally need be supported by combining GNSS with wireless network and wireless sensor network. On communication part, it is necessary to establish a vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication unit beyond the consideration of the road safety. In this paper, the architecture of OBU which have an advanced navigation and communication plat are presented first. Then the fundamental location estimation combined with GNSS, 3G wireless networks and WSN is developed. Finally, the OBU semi-physical Simulation platform is developed. Navigation and communication platform in OBU for safety services is demonstrated in this paper with its seamless integration feature.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiangjian He, Jianmin Li, Daming Wei, W. Jia, Qiang Wu
{"title":"Canny edge detection on a virtual hexagonal image structure","authors":"Xiangjian He, Jianmin Li, Daming Wei, W. Jia, Qiang Wu","doi":"10.1109/JCPC.2009.5420196","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420196","url":null,"abstract":"Canny edge detector is the most popular tool for edge detection and has many applications in the areas of image processing, multimedia and computer vision. The Canny algorithm optimizes the edge detection through noise filtering using an optimal function approximated by the first derivative of a Gaussian. It identifies the edge points by computing the gradients of light intensity function based on the fact that the edge points likely appear where the gradient magnitudes are large. Hexagonal structure is an image structure alternative to traditional square image structure. Because all the existing hardware for capturing image and for displaying image are produced based on square structure, an approach that uses linear interpolation described for conversion between square and hexagonal structures. Gaussian filtering together with gradient computation is performed on the hexagonal structure. The pixel edge strengths on the square structure are then estimated before the thresholds of Canny algorithm are applied to determine the final edge map. The experimental results show the edge detection on hexagonal structure using static and video images, and the comparison with the results using Canny algorithm on square structure.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of topology-aware overlay networks for ubiquitous applications","authors":"Chuan-Feng Chiu, S. J. Hsu, S. Jan, Shao-Min Lyu","doi":"10.1109/JCPC.2009.5420186","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420186","url":null,"abstract":"In recent year, ubiquitous computing has gained more attention in academic area. With ubiquitous computing, users can process or get information anytime and anywhere. Fortunately, with the advent of peer-to-peer overlay network, the ubiquitous environment can become scalable with using the peer-to-peer overlay network as the communication middleware. Peer-to-Peer overlay network is an application model without considering underlying network topology. But there exists mis-match problem between peer-to-peer overlay network and physical network topology. This cause inefficient transmission or routing between peers in the peer-to-peer overlay network. On the other hand, the situation will have serious delay in real-time service, for example streaming service. Therefore, in this paper we propose an improvement mechanism based on physical network hop information to reduce the transmission cycles to adjust the arrangement of peer-to-peer overlay network dynamically.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenjuan Liu, Xiufen Fu, Shaocong Ouyang, Jinchuan Lin, Shaohua Teng
{"title":"Information Hiding for pervasive trusted authentication","authors":"Wenjuan Liu, Xiufen Fu, Shaocong Ouyang, Jinchuan Lin, Shaohua Teng","doi":"10.1109/JCPC.2009.5420101","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420101","url":null,"abstract":"Pervasive computing promises rich and seamless interaction with the surrounding computing environment. However, the ubiquitous environment presents a new security challenge. Authentication is a cornerstone of security. This paper proposes a secure authentication model based on Information Hiding and implements an approach for hiding and restoring the authentication information using IP header of TCP/IP packets. The proposed model, showing Information Hiding can play for authentication in a pervasive environment, may be generalized for trustworthy authentication of security devices such as firewalls. Finally we analyze the security properties of proposed model and approach, which shows that the model is feasible.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance estimation and evaluation of Bluetooth frequency hopping selection kernel","authors":"K. Morsi, Xiong Huagang, Gao Qiang","doi":"10.1109/JCPC.2009.5420142","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420142","url":null,"abstract":"Frequency Hopping Spread Spectrum (FHSS) is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only to the sending and receiving devices. Therefore, it has become one of the key security features in modern wireless networking and has been adopted in many applications, civilian and military, including wireless sensor networks and military satellites as a secure and efficient data transfer scheme. In this paper, the performance of frequency hopping selection kernel, used in the IEEE 802.15 standard (Bluetooth) to implement FH technique, will be estimated and evaluated. Theoretical analysis and simulation results verified that, compared to purely random hopping sequences, the Bluetooth hopping sequence offers noticeable residual correlations and periodic cross-correlations features. Results, also, proved that a combination of time slot synchronization and inter-piconet offset control leads to lower collision rate rather than time slot synchronization only","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}