2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
On Security-Effective and Global Mobility Management for FPMIPv6 Networks 安全有效的FPMIPv6网络全局移动管理研究
H. Chai, Jun-Dong Cho, Jongpil Jeong
{"title":"On Security-Effective and Global Mobility Management for FPMIPv6 Networks","authors":"H. Chai, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.91","DOIUrl":"https://doi.org/10.1109/IMIS.2014.91","url":null,"abstract":"In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart City Data Stream Visualization Using Glyphs 使用字形的智慧城市数据流可视化
F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López
{"title":"Smart City Data Stream Visualization Using Glyphs","authors":"F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López","doi":"10.1109/IMIS.2014.46","DOIUrl":"https://doi.org/10.1109/IMIS.2014.46","url":null,"abstract":"Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of glyphs is intended to make the most out human capability for outperforming in detecting visual patterns.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124493390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How to Find an Appropriate K for K-Anonymization 如何为K-匿名化找到一个合适的K
S. Kiyomoto, Yutaka Miyake
{"title":"How to Find an Appropriate K for K-Anonymization","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/IMIS.2014.34","DOIUrl":"https://doi.org/10.1109/IMIS.2014.34","url":null,"abstract":"Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Foreground Object Detection in Complex Scenes Using Cluster Color 基于聚类颜色的复杂场景前景目标检测
Chung-Chi Lin, W. Tsai, C. Liaw
{"title":"Foreground Object Detection in Complex Scenes Using Cluster Color","authors":"Chung-Chi Lin, W. Tsai, C. Liaw","doi":"10.1109/IMIS.2014.77","DOIUrl":"https://doi.org/10.1109/IMIS.2014.77","url":null,"abstract":"In visual surveillance systems, the image foreground object detection must face the problems of moving backgrounds, illumination changes, chaotic scenes, etc. in real word applications. The most used and accurate methods are mostly pixel-based, taking up more memory and requiring longer execution time. This paper presents a cluster color background model that possesses efficient processing and low memory requirement in complex scenes. Our proposed approach consumes 32.5% less memory and increases accuracy by at least 2.5% compared to other existing methods. Last, implementing the object detection algorithm on the 2.83GHz CPU, we can achieve 26 frames per second for the benchmark video with image size 768×576.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131946686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of Things 用楼宇自动化系统扩展EPCIS:一种新的物联网信息系统
N. Giang, S. Kim, Daeyoung Kim, Markus Jung, W. Kastner
{"title":"Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of Things","authors":"N. Giang, S. Kim, Daeyoung Kim, Markus Jung, W. Kastner","doi":"10.1109/IMIS.2014.50","DOIUrl":"https://doi.org/10.1109/IMIS.2014.50","url":null,"abstract":"Electronic Product Code Information System (EPCIS) has been a well-known information system for tracking and monitoring physical objects' life-cycle using RFID technology. However, in the Internet of Things (IoT) context, physical objects are supposed to be equipped with computing and sensing capability. Thus, people are interested not only in objects' life-cycle but also their contextual data. This emerging issue poses a new functional requirement on the traditional EPCIS such that, objects' contextual data should also be managed along with their life-cycle. Meanwhile, one of the most important IoT application lays in Building Automation Systems where smart devices are connected and automated without human intervention. These devices usually generate a large volume of data in a daily basis and thus, designing a proper data warehousing for this use case becomes a challenge. This paper aims at adding a data capturing interface to the traditional EPCIS so that it can support objects' data storage and retrieval, thus seamlessly adds significant support for Building Automation Systems application. The extended system, which is called Smart Thing Information System (STIS), exploits the oBIX standard and CoAP protocol to capture the data send from the smart devices and provides an additional lightweight query interface also based on CoAP. The system's applicability has been verified through a practical global-wide test bed between Korea and Austria.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Visions and Challenges for Sensor Network Collaboration in the Cloud 云环境下传感器网络协作的愿景与挑战
Simon Oechsner, B. Bellalta, D. Dimitrova, T. Hossfeld
{"title":"Visions and Challenges for Sensor Network Collaboration in the Cloud","authors":"Simon Oechsner, B. Bellalta, D. Dimitrova, T. Hossfeld","doi":"10.1109/IMIS.2014.3","DOIUrl":"https://doi.org/10.1109/IMIS.2014.3","url":null,"abstract":"The rapid growth in sensor network coverage, aided by the use of smartphones as capable sensing devices, leads to an enormous amount of gathered data from a multitude of different sources. However, generally data from one specific sensor network is only used by a very limited set of users and applications. This wastes a potentially greater usefulness for other, related data sinks that could use this additional input to improve their performance or services. In this paper, we outline visions and challenges for a widespread application of sensor network collaboration in the sense of sharing and exchanging information. We also describe a basic cloud-based architecture enabling this collaboration by providing the required support to store, manage and combine the gathered data. In particular, we include collaboration between sensor networks themselves to optimize performance, a facet that was up to now neglected in literature.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search 结合量子搜索的增强型量子PageRank算法
Huiquan Wang, Junjie Wu, Xuejun Yang, Pingxing Chen, X. Yi
{"title":"An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search","authors":"Huiquan Wang, Junjie Wu, Xuejun Yang, Pingxing Chen, X. Yi","doi":"10.1109/IMIS.2014.10","DOIUrl":"https://doi.org/10.1109/IMIS.2014.10","url":null,"abstract":"The Google's PageRank algorithm is one of the most famous algorithms in data mining. A quantum version of this algorithm has been proposed in 2012. It is a meaningful step towards the quantum search engine but it can not search solutions. In this paper, we integrate a special operator of quantum search into the quantum PageRank algorithm to make a new quantum algorithm. We called it the Search Rank algorithm. This new algorithm is able to search solutions and rank results according to their importance at the same time. It is the first algorithm possessing this ability as far as we know. And it outperforms all classical algorithms when searching an unsorted database.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Remote Lock System Using Bluetooth Communication 一种基于蓝牙通信的远程锁系统
H. Jeong, Jiyoung Lim, WooSeok Hyun, Woojin Lee
{"title":"A Remote Lock System Using Bluetooth Communication","authors":"H. Jeong, Jiyoung Lim, WooSeok Hyun, Woojin Lee","doi":"10.1109/IMIS.2014.63","DOIUrl":"https://doi.org/10.1109/IMIS.2014.63","url":null,"abstract":"As smartphones have recently become one of the most popular devices worldwide, various convenient applications are being released. Now smartphones not only provide the ordinary internal processes such as dialing or receiving phone calls, sending text messages, and doing mobile banking wherever we are, but they also are beginning to control various other devices that are part of our lives. Through the smartphone using mobile applications, we can remotely control a variety of external devices such as TVs, projectors for presentations, computers, and even cars. This paper presents the design and implementation of a remote lock system using wireless communications. The remote lock system is a lock system that can be controlled remotely by a dedicated Android application. The main function of the Android smartphone is equipped with Bluetooth so that a lock can be opened and managed via the application functions. The users' lock information in real time can be stored and managed in the database via a server that a server manager builds and manages. Even though users forget the password, our proposed lock system also guides them to find it easily, and provides the user's manual. Using this system, users can do a variety of management functions such as adding, deleting, modifying, and purchasing the user's own locks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122595424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Test Set Validation for Home Electrical Signal Disaggregation 家用电信号分解测试装置验证
Luc Dufour, D. Genoud, G. Rizzo, A. Jara, P. Roduit, J. Bezian, B. Ladevie
{"title":"Test Set Validation for Home Electrical Signal Disaggregation","authors":"Luc Dufour, D. Genoud, G. Rizzo, A. Jara, P. Roduit, J. Bezian, B. Ladevie","doi":"10.1109/IMIS.2014.56","DOIUrl":"https://doi.org/10.1109/IMIS.2014.56","url":null,"abstract":"In order to enable demand response schemes for residential and industrial users, it is crucial to be able to predict and monitor each component of the total power consumption of a household or of an industrial site over time. We used the cross-validation method which is a model validation technique for assessing how the results of a statistical analysis will generalize to an independent data set. It is mainly used in settings where the goal is prediction, and one wants to estimate how accurately a predictive model will perform in practice. We exploit Non-Intrusive Load Monitoring (NILM) techniques in order to provide behavior patterns of the variables identified. This work presents a review Non-Intrusive Load Monitoring (NILM) techniques and describe the results of recognition patterns used for the identification of electrical devices. The proposed method has been validated on an experimental setting and using direct measurements of appliances consumption, proving that it allows achieving a high level of accuracy in load disaggregation.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Case Study for Potential Carpooling in Beijing 北京潜在拼车案例研究
Fei Song, Rong Li, Huachun Zhou, Hongke Zhang, I. You
{"title":"A Case Study for Potential Carpooling in Beijing","authors":"Fei Song, Rong Li, Huachun Zhou, Hongke Zhang, I. You","doi":"10.1109/IMIS.2014.20","DOIUrl":"https://doi.org/10.1109/IMIS.2014.20","url":null,"abstract":"This paper focuses on providing some fundamental analysis for taxi carpooling based on real taxis' GPS traces. Since the increase of resource utilization is one essential benefit for carpooling scheme, we discussed how many get on points and mileages can be reduced. In order to analyze the situation when more taxis are employed, grey prediction algorithm is adopted and validated. The performance of using such method directly is not quite satisfied. Therefore we proposed a scheme to enhance the accuracy. The final results show: when 40k taxis are running in the system, the get on point may above 198k and 37% of them can be removed if carpooling scheme is fully deployed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信