2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
An Efficient Protocol for Reliable Data Communication on Dataless Devices 无数据设备可靠数据通信的高效协议
Arcangelo Castiglione, Raffaele Pizzolante, B. Carpentieri, A. D. Santis
{"title":"An Efficient Protocol for Reliable Data Communication on Dataless Devices","authors":"Arcangelo Castiglione, Raffaele Pizzolante, B. Carpentieri, A. D. Santis","doi":"10.1109/IMIS.2014.75","DOIUrl":"https://doi.org/10.1109/IMIS.2014.75","url":null,"abstract":"Nowadays the Short Message Service (SMS) is virtually worldwide available, since almost all mobile phones, regardless of their supported features and cellular operators, are able to use such service. However, the SMS is not natively designed to exchange medium/large-sized amount of data and it has been shown that such facility is highly unreliable, especially when some particular conditions occur. In this work, we propose an efficient protocol which allows to emulate a reliable data channel on data less devices, by using the SMS as underlying communication facility. Such protocol overcomes the issues arising from the structure and the functioning of that facility, when it has to send/receive significant amount of data. The approach we propose enables to transfer a variable-sized amount of data through SMS messages, with the main aim of ensuring the reliability of communication as well as of minimizing other factors, such as the number of SMS messages sent and the energy required to perform such tasks. These characteristics make the protocol we propose suitable for data communication when the only network coverage available is the Global System for Mobile Communications (GSM) and consequently, the SMS is the only facility to exploit. In addition, we address both the constraints arising from the limited energy budget of mobile devices and the security issues emerging in this context.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative Power and Contention Control MAC Protocol in Multichannel Cognitive Radio Ad Hoc Networks 多信道认知无线自组网中的协作能力与竞争控制MAC协议
Chien-Min Wu, Hui-Kai Su, Maw-Lin Leou, Yi-Ching Liaw, C. Lo
{"title":"Cooperative Power and Contention Control MAC Protocol in Multichannel Cognitive Radio Ad Hoc Networks","authors":"Chien-Min Wu, Hui-Kai Su, Maw-Lin Leou, Yi-Ching Liaw, C. Lo","doi":"10.1109/IMIS.2014.39","DOIUrl":"https://doi.org/10.1109/IMIS.2014.39","url":null,"abstract":"In this paper, we will propose a Cooperative Power and Contention control MAC (CPC-MAC) protocol in Cognitive Radio Ad Hoc Networks to solve the multichannel hidden terminal Primary User (PU) problem by build appropriate number of monitor nodes in suitable positions. There are two functions in this mechanism. First, secondary user (SU) transmitter sends the RTS frame including transmission power to SU receiver, SU receiver sends CTS frame including receiving power to SU sender. Monitor nodes send position and receiving power to SU sender and SU receiver. SU transmitter selects three monitors that their receiving powers are approach to each other. SU transmitter estimates its position and sending power by deterministic propagation model. This will reduce the interference to hidden PU terminal. Second, the SU in the transmission range of the PU will send one highest priority interrupt frame in control channel to one-hop SU neighbors to protect the PU. We also compare our proposed scheme to the existing IEEE 802.11 DCF and the other MAC protocols in Cognitive Radio ad hoc networks using ns2 simulation tool. We will show that CPC-MAC will improve the system throughput and reduce the energy consumption.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129218375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and Opportunities 网络物理系统的大数据:挑战、解决方案和机遇分析
A. Jara, D. Genoud, Yann Bocchi
{"title":"Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and Opportunities","authors":"A. Jara, D. Genoud, Yann Bocchi","doi":"10.1109/IMIS.2014.139","DOIUrl":"https://doi.org/10.1109/IMIS.2014.139","url":null,"abstract":"Cyber-Physical Systems (CPS) covers from M2M and Internet of Things (IoT) communications, heterogeneous data integration from multiple sources, security / privacy and its integration into the cloud computing and Big Data platforms. The integration of Big Data into CPS solutions presents several challenges and opportunities. Big Data for CPS is not suitable with conventional solutions based on offline or batch processing. The interconnection with the real-world, in industrial and critical environments, requires reaction in real-time. Therefore, real-time will be a vertical requirement from communication to Big Data analytics. Big Data for CPS requires on the one hand, real-time streams processing for real-time control, and on the other hand, batch processing for modeling and behaviors learning. This paper describes the existing solutions and the pending challenges, providing some guidelines to address the challenges.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Facial Feature Extraction Using an Active Appearance Model on the iPhone 在iPhone上使用活动外观模型进行面部特征提取
Yong-Hwan Lee, Woori Han, Youngseop Kim, Bonam Kim
{"title":"Facial Feature Extraction Using an Active Appearance Model on the iPhone","authors":"Yong-Hwan Lee, Woori Han, Youngseop Kim, Bonam Kim","doi":"10.1109/IMIS.2014.24","DOIUrl":"https://doi.org/10.1109/IMIS.2014.24","url":null,"abstract":"Extracting and understanding human emotion plays an important role in the interaction between humans and machine communication systems. The most expressive way to display human emotion is through facial expression analysis. In this paper, we propose a novel extraction and recognition method for facial expression and emotion on mobile cameras and formulate a classification model for facial emotions using the variance of the estimated landmark points. Sixty five feature points are identified to extract the feature points from the input face and then the variance values of the point locations utilized to recognize facial emotions by comparing the results with a weighted fuzzy k-NN classification. Three types of facial emotion are recognized and classified: neutral, happy or angry. To evaluate the performance of the proposed algorithm, we assess the ratio of success using iPhone camera views. The experimental results show that the proposed method performs well in the recognition of facial emotion, and is sufficient to warrant its immediate application in mobile environments.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123979393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Improving Localization Scheme Using Mobile Anchors with Directional Antennas in Wireless Sensor Networks 一种改进的无线传感器网络定向天线移动锚点定位方案
Young-Long Chen, Tzu-Chieh Sun, Neng-Chung Wang, Shin You Shie
{"title":"An Improving Localization Scheme Using Mobile Anchors with Directional Antennas in Wireless Sensor Networks","authors":"Young-Long Chen, Tzu-Chieh Sun, Neng-Chung Wang, Shin You Shie","doi":"10.1109/IMIS.2014.90","DOIUrl":"https://doi.org/10.1109/IMIS.2014.90","url":null,"abstract":"To solve the location issue, in this paper, we proposed a Received Signal Strength for Directional Antenna (RSS-DA) scheme, it uses the mobile anchor nodes that already know the coordinates to join the Received Signal Strength (RSS) measurement in the data transmission. The number of beacons conforms to the terminated threshold in the sensor nodes, the estimated locations are used the RSS algorithm and the two-circle intersection algorithm for the calculations. Simulation results show that our proposed scheme of the sensor nodes are based in a mobile anchor node under RSS measurement, rather than the DIR localization scheme, to reduce the location error and achieve low energy consumption.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Mining for Machine Learning Based Compilation Optimization 基于机器学习的特征挖掘编译优化
Fengqian Li, F. Tang, Yao Shen
{"title":"Feature Mining for Machine Learning Based Compilation Optimization","authors":"Fengqian Li, F. Tang, Yao Shen","doi":"10.1109/IMIS.2014.26","DOIUrl":"https://doi.org/10.1109/IMIS.2014.26","url":null,"abstract":"Compilation optimization is critical for software performance. Before a product releases, the most effective algorithm combination should be chosen to minimize the object file size or to maximize the running speed. Compilers like GCC usually have hundreds of optimization algorithms, in which they have complex relationships. Different combinations of algorithms will lead to object files with different performance. Usually developers select the combination manually, but it's unpractical since a combination for one project can't be reused for another one. In order to conquer this difficulty some approaches like iterative search, heuristic search and machine learning based optimization have been proposed. However these methods still need improvements at different aspects like speed and precision. This paper researches machine learning based compilation optimization especially on feature processing which is important for machine learning methods. Program features can be divided into static features and dynamic features. Apart from user defined static features, we design a method to generate lots of static features by template and select best ones from them. Furthermore, we observe that feature value changes during different optimization phases and implement a feature extractor to extract feature values at specific phases and predict optimization plan dynamically. Finally, we implement the prototype on GCC version 4.6 with GCC plug in system and evaluate it with benchmarks. The results show that our system has a 5% average speed up for object file running speed than GCC O3 optimization level.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129715033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysts' Forecasts and Institutional Investors' Behavior 分析师预测与机构投资者行为
Mei-Hua Liao, Chia-Yun Chang
{"title":"Analysts' Forecasts and Institutional Investors' Behavior","authors":"Mei-Hua Liao, Chia-Yun Chang","doi":"10.1109/IMIS.2014.84","DOIUrl":"https://doi.org/10.1109/IMIS.2014.84","url":null,"abstract":"Numerous studies have shown that investment banking affiliations generate pressure on analysts to produce optimistic recommendations regarding affiliated stocks. By using a sample of listed companies in Taiwan, this study examined the stock trading of dealer departments, the portfolios of which contained stocks rated by an affiliated analyst. Controlling for various factors, including the dealer affiliation, we conducted a comparison to determine whether the trading behavior for a stock by an affiliated dealer department led to more optimistic analyst forecasts when paralleled to the consensus. If systematic evidence exists regarding dealer trading on the information of analysts' stock price forecasts, information processing is central to the role of the dealer. Therefore, the leakage of confidential information received by traded stocks could result in critical costs. Creating information asymmetry among investors could adversely affect the liquidity of public markets.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Impact of TDMA Frame Size on Latency in a Neighbor-Aware VANET MAC TDMA帧大小对邻居感知的VANET MAC延迟的影响
M. J. Booysen, G. Rooyen
{"title":"The Impact of TDMA Frame Size on Latency in a Neighbor-Aware VANET MAC","authors":"M. J. Booysen, G. Rooyen","doi":"10.1109/IMIS.2014.37","DOIUrl":"https://doi.org/10.1109/IMIS.2014.37","url":null,"abstract":"Despite various proposed Medium Access Control (MAC) approaches, efficient medium access in VANET remains a significant challenge for the broadcast of safety messages. A key contributing factor, especially with the high node mobility apparent in VANET, is the hidden terminal problem. Since the hidden terminal problem is fundamentally a problem of lack of awareness, increased neighbor awareness at the MAC layer has been suggested as a possible solution. An increased awareness of neighboring nodes' slot allocation requires an increased number of TDMA slots. In this paper we evaluate the impact of TDMA frame size in a neighbor-aware MAC. An analytical model is developed to support the simulation results, based on a Markovian multi-server queue. The results show that the end-to-end latency is mostly affected by the TDMA frame cycle time when supply of slots outstrips demand. However, when slots become scarce, latency is adversely affected by times spent waiting for access to available slots.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129949144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-theft Solusions for In-Vehicle Electronic Devices 车载电子设备防盗解决方案
Kyungroul Lee, Hyungjun Yeuk, Jaein Kim, Kangbin Yim
{"title":"Anti-theft Solusions for In-Vehicle Electronic Devices","authors":"Kyungroul Lee, Hyungjun Yeuk, Jaein Kim, Kangbin Yim","doi":"10.1109/IMIS.2014.98","DOIUrl":"https://doi.org/10.1109/IMIS.2014.98","url":null,"abstract":"Recently, security concerns to automobiles are rapidly increasing. When threats are found in a vehicular system, this may usually take time to acquire adequate countermeasures. Threats to a vehicle can be classified into three categories: theft of in-vehicle devices, penetration into the internal network and utilization of the external network. This paper surveys threats in each category and their countermeasures. Among these threats, an anti-theft system is researched, which tries to prevent theft of in-vehicle devices. According to a survey, the existing anti-theft system is still vulnerable and hence in-vehicle devices do not ensure safety and reliability. Therefore, this paper also proposes an enhanced anti-theft system and analyzes its security and feasibility. This study is expected to show a reference of a configuration for more enhanced anti-theft systems for in-vehicle devices.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Architecture Reconfiguration in Pervasive Environment: An AADL-based Approach 普适环境中的体系结构重构:一种基于aadl的方法
Luxi Chen, Linpeng Huang, Chen Li, Mengyao Ruan
{"title":"Architecture Reconfiguration in Pervasive Environment: An AADL-based Approach","authors":"Luxi Chen, Linpeng Huang, Chen Li, Mengyao Ruan","doi":"10.1109/IMIS.2014.11","DOIUrl":"https://doi.org/10.1109/IMIS.2014.11","url":null,"abstract":"In the pervasive environment, in order to adapt to dynamic environments and changeable requirements, the architecture reconfiguration has drawn great attention, which includes structural, behavioral, and configuration aspects. Unfortunately, traditional architecture description methods are always static, and as such fail to completely specify the reconfiguration. In this paper, AADL (Architecture Analysis and Design Language) is applied to describe the dynamic architecture. First, with features of AADL, the architecture is specified from a structural, a behavioral and a configuration view. Second, the behavioral specification is applied to trigger the mode transition to implement the architecture reconfiguration. Moreover, the reconfiguration improves the architecture such that it satisfies the reliability property requirement. The application on a smart treatment room in the special education is given out as a running example to illustrate the feasibility of our approach.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130681005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信