{"title":"How Can Semantic Be Introduced in GIS Mobile Applications: Expectations, Theory and Reality","authors":"Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro","doi":"10.1109/iNCoS.2012.61","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.61","url":null,"abstract":"With the advent of GPS and the spread of smart phones (iPhone, Android, etc.) have proliferated applications dealing with geographic information. Many of these applications are beginning to provide semantic information through: 1) the classification of tourist attractions in categories (thesauri tourism categories Open Street Map, etc.), and 2) the representation of metadata (Linked Geo Data, Crossing, etc.). However, mobile devices do not still uses all this potential. This paper presents a comprehensive study on the main formalisms to include Semantic and Geographic Data within a mobile device, and how to get them work efficiently just in the mobile, without internet connection. The article presents several options to implement these technologies and, for every option shows the limitations of such implementation. Therefore provides a glimpse into the various options available to implement semantic geographic applications on mobile devices. To mark the goal, the study shows a case study where ontologies have been used to provide semantics to a travel assistant that runs on mobile devices. The goal is an application able to offer personalized touristic routes different for every single user, that take into account, for example, the user interests and time available, and all the processes must be run within the mobile device. The main contribution of the paper is to manage and combine semantic data and geographic information within a mobile device, and doing it without internet connection, and for an end-user application.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing Security to Computer-Supported Collaborative Learning: An Overview","authors":"Jorge Miguel, S. Caballé, Josep Prieto","doi":"10.1109/iNCoS.2012.60","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.60","url":null,"abstract":"Over the last two decades, a great variety of forms of e-Learning has been widely adopted and intensively exploited in most of educational institutions. As a result, e-Learning needs have been evolving accordingly with more and more demanding pedagogical and technological requirements. Given the added pedagogical value of group work, Computer-Supported Collaborative Learning has become one of the most influencing educational paradigms devoted to improve teaching and learning by the use of modern ICT. On the other hand, recently, there has been an increasing attention and demand of new requirements related to information security, with the aim to enhance the learning efficacy by adopting a secure perspective for each and every learning process and resource, as well as the information transmitted and shared. However, the development of CSCL systems guided by security as a key and transversal requirement has been, to the best of our knowledge, little investigated. In order to fill this gap, this paper provides firstly an overview of the current developments of CSCL systems from the security perspective. Then, the paper discusses on the problems caused in collaborative learning processes by the lack of security. Finally, the main guidelines for the design of secure CSCL systems are proposed to guide developers to incorporate security as an essential requirement into the collaborative learning process.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel","authors":"Yong Wang, Aixiang Guo, Hong He, Hui Li","doi":"10.1109/iNCoS.2012.56","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.56","url":null,"abstract":"In this paper, we consider K-user multiple input and multiple output (MIMO) Y channel where each user is equipped with M antennas and the relay N antennas. A scheme that each user exchanges d pairs of messages with each of the other users simultaneously via an intermediate relay is proposed. It is accomplished by utilizing signal space alignment for network coding and interference nulling beam forming combined with receiving antenna selection technique. By using multiple antennas at both ends of wireless links, more diversity gain can be obtained if d is small, while more degrees of freedom (DOF) can be achieved if d becomes larger. The feasibility conditions and the achievable DOF are verified at last.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption","authors":"Fu Xiao-tong, Liu Wen","doi":"10.1109/INCOS.2012.58","DOIUrl":"https://doi.org/10.1109/INCOS.2012.58","url":null,"abstract":"Ring signatures are one of the signatures that can enhance the anonymity of the users who want to sign documents not only in the way of authentication but also privacy. In this paper, we propose a simple but secure designated verifier ring signature scheme from bilinear pairing. The security of the scheme is proved under the k-CAA2 assumption. Furthermore, a ring signcryption scheme is also presented from the new designated verifier ring signature scheme.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks","authors":"Yong Wang, Liu Yang, Y. Ai, Hui Li, Weidong Zhang","doi":"10.1109/iNCoS.2012.55","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.55","url":null,"abstract":"A new multi-user two-way transmission network is considered to fully utilize wireless system resource, and ensure transmission reliability, with assistant of an amplify-and-forward relay. In multiple access channel (MAC) phase, signal space alignment technique is employed, which cancel the multi-user interference. In broadcast channel (BC) phase, a new multiple-input multiple-output (MIMO) precoding matrix is designed to reduce the decoding complexity. Simulation result shows the average sum rate performance of the proposed system, and the achievable the degrees of freedom is evaluated.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Leakage-Based Precoding Scheme for Cognitive Multiuser MIMO Systems","authors":"Chuiqiang Sun, J. Ge, Xinxin Bao, Xiaoye Shi","doi":"10.1109/iNCoS.2012.33","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.33","url":null,"abstract":"In this paper, we develop linear precoding schemes for cognitive radio (CR) multiuser multiple-input multiple-output (MU-MIMO) downlink systems. A secondary user base station (SBS) with multiple secondary users (SUs) sharing the primary user (PU) spectrum is considered. In the proposed scheme, the block diagonalization (BD) algorithm is adopted to remove the co-channel interference from the SBS to the PU completely, and the matching weighted signal-to-leakage-and-noise ratio (SLNR) maximization algorithm is proposed to mitigate interference between SUs. The proposed scheme does not require a strict restriction on the number of transmit and receive antennas. Simulation results show that the proposed scheme can achieve high sum rate throughput with affordable complexity.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131446477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Relational Approach to Collaborative Fairness","authors":"M. Köppen, Rodrigo Verschae, M. Tsuru","doi":"10.1109/iNCoS.2012.92","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.92","url":null,"abstract":"In the relational approach to fairness, fairness is considered as a social choice that coincides with the maximum set of a fairness relation. Here we consider the application of this approach to achieve general fairness in collaborative systems. The approach is based on posing additional conditions on the fairness relation based on representation of collaboration among agents by a social graph, and various social types of agents. The relation can be used for the formal analysis of various collaboration scenarios by justifying tractable sizes of maximum sets of corresponding collaborative fairness relations. As an example result, the introduction of cliques of larger size appears to be in favor of achievability of collaborate fairness.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mitsuhiro Suenaga, M. Otani, Hisaharu Tanaka, Kenzi Watanabe
{"title":"Opengate on OpenFlow: System Outline","authors":"Mitsuhiro Suenaga, M. Otani, Hisaharu Tanaka, Kenzi Watanabe","doi":"10.1109/iNCoS.2012.84","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.84","url":null,"abstract":"Open gate is a user authentication gateway system for network in the environment opened to public. This system has been operating for controlling the campus-wide open network in Saga University since 2001. In this research, we propose to implement hOpengateh onto next-generation network hOpen Flowh and show how to distribute the load by access.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114914846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, J. Domingo-Ferrer
{"title":"A New Identity Based Signcryption Scheme in the Standard Model","authors":"Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, J. Domingo-Ferrer","doi":"10.1109/iNCoS.2012.43","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.43","url":null,"abstract":"Signcryption is a useful cryptographic primitive which simultaneously performs encryption and signature with cost less than the signature-then-encryption approach. Identity-based signcryption (IBSC) eliminates the complicated management of certificates in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Most IBSC schemes are constructed in the random oracle model, while it is unknown how to instantiate a really \"random\" oracle in the real world. By exploiting Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature, this paper proposes a new IBSC scheme in the standard model. It is proven that our IBSC scheme satisfies semantic security and strong unforgeability under the bilinear decision Diffie-Hellman (BDDH) assumption. The proofs do not rely on random oracles. Performance analysis shows that our scheme is also efficient and practical.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Itiner@: Ontology for Personalizing Tourist Routes in Mobile Devices","authors":"Laia Descamps-Vila, J. Conesa, A. Pérez-Navarro","doi":"10.1109/iNCoS.2012.47","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.47","url":null,"abstract":"Several applications that support users when doing tourism have appeared during the last years. These applications, though popular, have not become a reliable and dependable tourist assistant because they offer little personalization, which eventually may overwhelm users with too much information. An effective mobile application should store tourist information in a way that facilitates the identification of relevant points of interest to the user and the relevant information about them. The relevance of information depends also on the context. This paper presents an ontology that can store information about points of interest (POI), preferences and habits of users and time information. The presented ontology is aligned with the ontology Linked Geo Data to facilitate the importation of data to and from it. The ontology has been integrated into a mobile application called Itiner@ to create custom routes for each user based on his/her preferences, personal situation, means of transport, area to visit, date and duration of the visit. The main contribution of this work is to identify the relevant information to mobile touristic applications and to show how to use an ontology to improve the functionalities of geographic information system through the use of semantic information.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}