{"title":"Separator Design of Gesture Signals Based on Adaptive Threshold Using Wearable Sensors","authors":"Yinghui Zhou, Lei Jing, Junbo Wang, Zixue Cheng","doi":"10.1109/WAINA.2012.97","DOIUrl":"https://doi.org/10.1109/WAINA.2012.97","url":null,"abstract":"Gesture, especially finger gestures, can reflect various intentions of users in daily behaviors. Therefore, more and more researches are performed on recognition of finger gestures based on wearable sensors. Segmentation, detecting the Start and End of a gesture, is crucial for accurate recognition of the gesture. However it is hard to extract signal of each finger gesture timely and correctly from continuous signals of the sensor, since they are transient, noise sensitive, and with individual difference. In this paper, we design an adaptive separator employing Bayes theory and distribution statistic technology to overcome the difficulties. The separator can detect each segmentation from a series of gestures timely, correctly, and adaptive to each user.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"718 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114989520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying Sports Gesture Using Event-Based Matching in a Multimedia E-learning System","authors":"Kosuke Takano, K. F. Li","doi":"10.1109/WAINA.2012.281","DOIUrl":"https://doi.org/10.1109/WAINA.2012.281","url":null,"abstract":"Computer-based multimedia instructional systems are ideal for e-learning in many domains. For applications such as sport instruction, the central issue is to capture motions accurately and correctly for further processing. A Web-based tennis instruction system is under investigation and being designed and developed. To capture the motion of a tennis swing, the Nintendo Wii Remote is used as the input device. The current focus of the project is the various issues associated with motion-sensing input data: capturing, cleansing, classification and clustering of some basic tennis swings, and the subsequent swing matching and identification which can then be used to index into a multimedia database for instructional purpose. In this work, classification of a tennis swing using event-based matching is presented and illustrated with examples. Results from experiments with 50 people are analyzed. The accuracy and the suitability of the matching algorithms are evaluated and discussed.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparation of Strategies for Data Replication in VANET Environment","authors":"J. Janech, A. Lieskovsky, Emil Krsák","doi":"10.1109/WAINA.2012.179","DOIUrl":"https://doi.org/10.1109/WAINA.2012.179","url":null,"abstract":"High vehicle mobility and frequent topology changes of VANET have negative influence on performance of data distribution in such network. If cars are not connected through VANET, they are not able to access data owned by each other. Data availability in VANET is therefore lower than in standard wired networks. Most of the solutions of data distribution in VANET are focused on the packet routing. On the other hand, our solution is using database replication as the method for the distribution of a data in VANET network. We are looking at VANET as distributed database system. Replication of data in such a distributed database system can be used to reduce the impact of intermittent node connectivity in VANET and to improve access of a node to data. To solve this problem we have designed a special query language suitable for distributed database systems in VANET. We have also designed replication algorithms for data distribution at each node in VANET.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133398565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preference Sorting Based on User's Relevance Feedback","authors":"L. Deng, Yung-Hui Chen, Yi-Jen Liu","doi":"10.1109/WAINA.2012.126","DOIUrl":"https://doi.org/10.1109/WAINA.2012.126","url":null,"abstract":"Reference feedback contains the positive and negative feedback ranks. User's relevance feedback rank can derivate as the User's preference. In this paper, we addressed the user's relevance feedback technology to reflect the degree of user's preferences of what he liked. The personal preference and general preference could be considered in this paper. The dynamic re-ranking result will refer to represent the media.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130526144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Membership Models and the Design of Authentication Protocols for MANETs","authors":"Soumyadev Maity, R. Hansdah","doi":"10.1109/WAINA.2012.107","DOIUrl":"https://doi.org/10.1109/WAINA.2012.107","url":null,"abstract":"Authentication protocols are very much essential for secure communication in mobile ad hoc networks (MANETs). A number of authentication protocols for MANETs have been proposed in the literature which provide the basic authentication service while trying to optimize their performance and resource consumption parameters. A problem with most of these protocols is that the underlying networking environment on which they are applicable have been left unspecified. As a result, lack of specifications about the networking environments applicable to an authentication protocol for MANETs can mislead about the performance and the applicability of the protocol. In this paper, we first characterize networking environment for a MANET as its 'Membership Model' which is defined as a set of specifications related to the 'Membership Granting Server' (MGS) and the 'Membership Set Pattern' (MSP) of the MANET. We then identify various types of possible membership models for a MANET. In order to illustrate that while designing an authentication protocol for a MANET, it is very much necessary to consider the underlying membership model of the MANET, we study a set of six representative authentication protocols, and analyze their applicability for the membership models as enumerated in this paper. The analysis shows that the same protocol may not perform equally well in all membership models. In addition, there may be membership models which are important from the point of view of users, but for which no authentication protocol is available.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123479560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kitagata, K. Sasai, Johan Sveholm, Hideyuki Takahashi, Tetsuo Kinoshita
{"title":"Network Management System Based on Activated Knowledge Resource","authors":"G. Kitagata, K. Sasai, Johan Sveholm, Hideyuki Takahashi, Tetsuo Kinoshita","doi":"10.1109/WAINA.2012.180","DOIUrl":"https://doi.org/10.1109/WAINA.2012.180","url":null,"abstract":"Nowadays a lot of organizations work and act based on network systems. Because delay of detection and recovery of network failure causes degradation of faith and profits of the organization, the necessity and importance of stable network management and operation with high availability are increased. However, to realize the efficient support of the management task of the administrators, various knowledge and information with respect to the managed network have to be utilized and integrated in the system. In this paper, we propose the practical design method and implementation of a network management system based on activated knowledge resource in a distributed network environment. The effectiveness of our system is evaluated by experiments conducted on an experimental network environment. The activated knowledge resource oriented design is shown to reduce the burden for administrators by the support to utilize and manage various information and knowledge in an autonomic way.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Secure MJPEG Video Streaming","authors":"Lei Chen, N. Shashidhar, Qingzhong Liu","doi":"10.1109/WAINA.2012.163","DOIUrl":"https://doi.org/10.1109/WAINA.2012.163","url":null,"abstract":"In today's world, more and more applications are developed for mobile devices and ever-increasing amount of communication happens over mobile devices and mobile networks. Though providing mobility and convenience, mobile devices generally do not offer intensive computations like their wired counterparts. In this paper we propose a set of methods that aims to protect video, specifically Motion JPEG (MJPEG) video streams, using selective data encryption. More precisely, our algorithm selects the most critical pixel information of MJPEG video as the input of encryption to keep itself lightweight while choosing and encrypting additional less-important video information when the environment allows. The proposed method was originated from the fact that JPEG images are encoded using prioritized pixel information. Experiment results show that the proposed algorithm performs well in terms of frame rate and CPU load at playback.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of Active Quantity of the Subject Movement and Design of Surveillnace Camera System Using High Active Part","authors":"M. Takai","doi":"10.1109/WAINA.2012.226","DOIUrl":"https://doi.org/10.1109/WAINA.2012.226","url":null,"abstract":"This study proposes Active Quantity for measuring the movement of subject body using Motion Region, and finds how subject body moves activity so that observer can watch the action effectively. In these years, we can watch the monitoring place by remote control of surveillance camera system. The surveillance camera system can enhance a security effect. On the other hand, it spends great labor and time that observer finds a person taking suspicious movement from the enormous image data photographed by surveillance camera. The surveillance camera system which I suggest detects High Active Part with high Active Quantity so that observer can watch the movement of the subject efficiently.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125599438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizational Pattern Discovery Linked to Activities","authors":"Serguei Dobrinevski","doi":"10.1109/WAINA.2012.287","DOIUrl":"https://doi.org/10.1109/WAINA.2012.287","url":null,"abstract":"This paper presents a possible approach for relating empirically discovered organizational structures and patterns to activities and projects in large organizations. It introduces the concept of organization-activity continuum as a data source for organizational intelligence, and presents experimental evidence for the discovered structures being directly dependent on activity elements present in the analyzed data.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129274977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sornlertlamvanich, S. Kamolphiwong, R. Elz, P. Pongpaibool
{"title":"NEMO-Based Distributed Mobility Management","authors":"P. Sornlertlamvanich, S. Kamolphiwong, R. Elz, P. Pongpaibool","doi":"10.1109/WAINA.2012.156","DOIUrl":"https://doi.org/10.1109/WAINA.2012.156","url":null,"abstract":"Mobile IPv6 protocol allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. One of these extensions, Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. This paper proposes a distributed mobility solution based on NEMO for mobile IP networks. This distributed mobility solution that is simple to overcome the drawbacks of the traditional NEMO protocol which is centralized mobility management.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}