{"title":"Customer-Oriented Design of Mobile Phones for Optimal Controllability","authors":"Taeil Kim, E. Jung","doi":"10.1109/MUE.2010.5575089","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575089","url":null,"abstract":"Among numerous factors that have an effect on the controllability for the use of mobile phones, the effects of product size and control location were investigated to find the form factors which most affect customer preference while controlling the mobile phones. Moreover we made an effort to find an improve-ment of preference according to control location. An experiment was conducted, in which preference scores were measured. It was found that the effect of product width was larger than that of thickness. The optimal control location was almost the same re-gardless of the hand length. The contour plot was derived by supported vector machine(SVM). The difference in sensitivity was found between the horizontal transfer and the vertical trans-fer of control location. The preferable control area was suggested by the contour plot and sensitivity analysis. The results of the study would be valuable to suggest the guidelines of control layout and packaging of mobile phones.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chan-Myung Kim, Yong-hwan Kim, Youn-Hee Han, Heon-Jong Lee, Y. Jeong
{"title":"An Energy-Efficient Self-Deployment Scheme in Intelligent Mobile Sensor Networks","authors":"Chan-Myung Kim, Yong-hwan Kim, Youn-Hee Han, Heon-Jong Lee, Y. Jeong","doi":"10.1109/MUE.2010.5575091","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575091","url":null,"abstract":"In traditional static wireless sensor networks, it is sometimes impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. If each sensor has the locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon generated by the location information of neighbor sensors is efficient for expanding the coverage area. In this paper, we present an improved potential-field-based selfdeployment scheme to utilize the attractive force generated from the centroid of a sensor's local Voronoi polygon as well as the repulsive force usually used in the traditional potential-fieldbased scheme. Simulation results show that our scheme can achieve higher coverage and less movement in shorter time than the traditional potential-field-based scheme.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117149918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of HTTP QoS in a UMTS Network","authors":"Ira Weissberger, I. Kostanic, C. Otero","doi":"10.1109/MUE.2010.5575064","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575064","url":null,"abstract":"This paper presents a methodology for evaluating the quality of service (QoS) provided by a Universal Mobile Telecommunications System (UMTS) network for data services that use HTTP. Data collected from drive testing were used as the means to evaluate different drive routes of varying quality. The methodology presented in this paper can be easily modified to work with different networks.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Linear Prediction Based Fractional-Pixel Motion Estimation Algorithm","authors":"K. Ng, L. Po, Shenyuan Li, K. Wong, Liping Wang","doi":"10.1109/MUE.2010.5575049","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575049","url":null,"abstract":"In modern video coding standards, for example H.264, fractional-pixel motion estimation (ME) is implemented. Many fast integer-pixel ME algorithms have been developed to reduce the computational complexity of integer-pixel ME. With these advancements, fractional-pixel ME becomes the new bottleneck in the implementation of video encoders. For example, the conventional hierarchical fractional-pixel search (HFPS) at quarter-pixel accuracy requires computing the distortions of at least 16 fractional-pixel positions. This computation is comparable to or even higher than advanced fast integer-pixel ME process. Fast fractional-pixel ME algorithms were therefore developed, in which initial search point is first predicted before applying fast refinement search. Parabolic error surface model and fractional-pixel motion vector information of neighboring blocks are commonly used for initial search point prediction but they have problems of unsolvable solution and uncorrelated motion vectors, respectively. To tackle these problems, a center-biased fast fractional-pixel ME algorithm using linear prediction based search with intrinsic center-biased characteristic is developed in this paper. Experimental results show that the proposed algorithm is fast and robust.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cycle-Based Limitation for Cryptographic Keys to Be Used in Multimedia Subscription Services","authors":"M. Dunte","doi":"10.1109/MUE.2010.5575065","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575065","url":null,"abstract":"If the results of the latest studies of ABI Research for Internet usage are to be believed, worldwide twelve million TV consumers will be using Internet Protocol Television (IPTV) instead of the traditional TV broadcasting by the end of 2010. Furthermore, analysts of Informa Telecoms & Media are forecasting the worldwide grow in revenue of IPTV to be ten billion US dollar by 2010. The revolution that is described by these figures implies on the one hand an enormous increase in sales values but on the other hand causes problems in handling the data volume. Moreover, IPTV will be attracting criminal attacks like Pay-TV has in traditional broadcasting. Therefore, not only efficient encoding of media data has to be applied to save transmission capacity, but also security mechanisms should be established to prevent unauthorised access. Interesting and promising encryption schemes which can be seamlessly integrated have been proposed in the past. Unfortunately, most of these outstanding solutions missed to cover key generation and management. This paper will unveil methods for both qualitative and cycle-based conditional access (CA).","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaehyun Jeon, Semin Kim, J. Choi, H. Min, Yong Man Ro
{"title":"Semantic Detection of Adult Image Using Semantic Features","authors":"Jaehyun Jeon, Semin Kim, J. Choi, H. Min, Yong Man Ro","doi":"10.1109/MUE.2010.5575099","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575099","url":null,"abstract":"Recently, in the fields of internet and social networking, the classification and filtering of naked images has been receiving a significant amount of attention. In this paper, we propose a novel naked image classification which can make effective use of semantic features of a naked image. In addition, a novel measurement, termed accumulated distance ratio (ADR), is proposed in order to systematically analyze the effect of semantic features on improving classification performance, compared to the approach relying on low-level visual features. Extensive experiments have been carried out to assess the effectiveness of semantic features in naked image classification with realistic and challenging data set. The experimental result of the proposed approach using semantic features, for challenging data set, shows improvement up to 14% than the approach using low-level visual feature. Further, the proposed ADR measure has proven to be useful measure for analyzing the effect of semantic features for naked image classification.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Load Balancing and Network Monitoring in iATA Protocol for Mobile Appliances","authors":"I. Ong, Hyotaek Lim","doi":"10.1109/MUE.2010.5575090","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575090","url":null,"abstract":"The explosive growth of mobility services and excessive demand for large storage today have popularized the use of virtual storage technology in mobile appliances. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed as an alternative solution to transfer storage commands, status and data over TCP/IP network in a relatively cost-effective way. To improve the protocol scalability and data availability, Load Balancing (LB) and Network Monitoring (NM) mechanisms are implemented to collect system resources state and current network status on each associate node. Based on the collected information, a dynamic weight factor is computed at each node and sent to a referral server (rserver) which will assign the most appropriate node with least weight to serve the client. With this approach, clients can be avoided from connecting to a heavily loaded node that may cause delays in subsequent I/O operations. Writes replication is applied on remaining nodes underneath. A client initially connected to node IP A for write operations will have no hindrance to run the relevant read operations at node IP B in new connections. When a node crashed, data remains recoverable from other nodes. We have conducted several benchmark tests and results are evaluated and verified in later section.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Accuracy-Control Method for Online Trajectory Extraction in Wireless Sensor Networks","authors":"Chao-Chun Chen, Da-Chung Mao","doi":"10.1109/MUE.2010.5575088","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575088","url":null,"abstract":"Trajectory extraction has been studied in many research areas, such as traditional spatio-temporal databases, advanced vehicle information systems, and military surveillance. However, extracting object trajectories from current sensor information system cannot satisfy the accuracy requirements from many application demands. In this paper, we propose the Fast Accuracy-Control Method (FACM) to generate approximate moving object trajectories satisfying the user-specified error bound from the imprecise locations which come from low-cost sensor devices. Inside FACM, three measurements for the trajectory error are design to guard the accuracy of the trajectory. The constructed trajectory of FACM satisfies the given error bound constraint. We conducted experiments on a broad variety of synthetic and real-world trajectories for moving objects. The experimental results reveal that FACM indeed achieves the user specified error constraint on the estimated locations.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Heikkinen, Tomas Lindén, T. Ojala, Hannu Kukka, Marko Jurmu, S. Hosio
{"title":"Lessons Learned from the Deployment and Maintenance of UBI-Hotspots","authors":"T. Heikkinen, Tomas Lindén, T. Ojala, Hannu Kukka, Marko Jurmu, S. Hosio","doi":"10.1109/MUE.2010.5575054","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575054","url":null,"abstract":"We provide an experience report of the deployment and maintenance of urban computing infrastructure called UBI-hotspot. It is effectively a large interactive public display embedded with other computing resources such as access points of different wireless networks. We have installed a network of 12 UBI-hotspots in key indoor and outdoor locations around downtown Oulu, Finland. We describe the remote monitoring and management tools we have adopted for the maintenance of the UBI-hotspots. We conclude with a discussion on our lessons learned which should be valuable for other researchers planning similar deployments in public urban spaces.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124730640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermark Embedding by Geometric Warping after Novel Image Moment-Based Normalization","authors":"M. Schlauweg, Dima Pröfrock, E. Müller","doi":"10.1109/MUE.2010.5575079","DOIUrl":"https://doi.org/10.1109/MUE.2010.5575079","url":null,"abstract":"Previous works have shown that the geometric structure of images and videos is a suitable embedding domain for watermark information. Using geometric warping data can be embedded very robust against even strong lossy compression. But, since the promising previous approach is based on a fixed pixel raster, the watermark extraction is fragile when rotation, scaling, translation, or shearing with unknown parameters is applied. To improve the previous work the image or video frame geometry has to be automatically resynchronized before watermark extraction. For that, in this paper, the geometric warping-based watermarking is extended by a novel image moment-based geometric normalization. The improved system is tested extensively and it is shown that the watermark data is robust against strong lossy image and video compression, noise, changes of luminance and contrast as well as scaling, rotation, translation, and shearing.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}