Sou Sugimoto, Nobuyuki Ito, K. Naito, N. Chujo, T. Mizuno, K. Kaji
{"title":"Partial Matching Estimation Method of Walking Trajectories for Generating Indoor Pedestrian Networks","authors":"Sou Sugimoto, Nobuyuki Ito, K. Naito, N. Chujo, T. Mizuno, K. Kaji","doi":"10.23919/ICMU.2018.8653585","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653585","url":null,"abstract":"We propose a method that estimates the partial matching of a walking trajectory for integrate indoor walking trajectories and generate an indoor pedestrian network. Building structure information is necessary for the realization of indoor location information services (indoor LBSs). In indoor pedestrian networks and building structure information, since the shortest route calculation can be directly applied, the route from an arbitrary position to a destination can be obtained by a computer. Therefore, navigation and recommending a healthier route is possible by route recommendation. However, the generation of the indoor pedestrian network is costly, so it does not necessarily exist. Therefore, as a low-cost generation method, our final goal is to automatically generate an indoor pedestrian network structure by collecting the walking sensing data from many users and integrating the estimated 3-D walking trajectories. In the integration of such trajectories, such partial matching places as walking in the same passage are used as clues. To estimate a partially matched place, we use a stable zone (a stable walking zone) and linear walking. Since the stable walking zone detects the continuation of the state with only a slight change, the estimation accuracy becomes higher than the right and left turns. We estimate the correspondence among stable walking zones by machine learning using the walking time, the walking distance, the height, and Wi-Fi information. For machine learning, we use a support vector machine (SVM). From the results of an evaluation experiment with HASC-IPSC, an indoor walking sensing corpus, we obtained a result where the F value was 0.81.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132162043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saki Nishihara, Takuya Aoki, T. Ebihara, K. Mizutani, N. Wakatsuki
{"title":"Software Modem for Secure Near-field Communication for Smartphones Using Sound and Vibration","authors":"Saki Nishihara, Takuya Aoki, T. Ebihara, K. Mizutani, N. Wakatsuki","doi":"10.23919/ICMU.2018.8653582","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653582","url":null,"abstract":"Acoustic communication and vibrational communication are notable technologies as means for exchanging data among smartphones in close proximity; they can be easily implemented as software with the use of hardware mounted on smartphones. We proposed a hybrid (acoustic-vibrational) communication system, which enables to exchange data fast and securely by transmitting an encrypted message and the encryption key as sound and vibration, respectively. In this paper, we designed a software modem of the hybrid system, implemented the modem in smartphones, investigated some parameters of vibrational communication, and evaluated its security in experiments. The obtained results suggest that the software modem can realize fast and secure communication by selecting appropriate parameters for each device.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121424877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and Analysing Overlay Networks by Ambients with Wormholes","authors":"René Rydhof Hansen, Christian W. Probst","doi":"10.23919/ICMU.2018.8653596","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653596","url":null,"abstract":"Process calculi are a powerful mechanism to formally model distributed systems, and are especially useful for assessing trust, security, and privacy issues in mobile and ubiquitous computing and networking. However, they often only support a single modelling approach and semantics, whereas distributed systems and networks often are a conglomeration of different technologies and functionalities. In this paper we propose a novel approach to model these systems and make them amenable to formal analysis. We enhance the ambient calculus with “wormholes” as a convenient way for ambients to travel between “worlds” representing the different technologies and functionalities by means of different semantic layers. Our approach enables easy and natural modelling and analysis of multi-layer systems for ubiquitous computing and networking.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intention Understanding in Small Training Data Sets by Using Transfer Learning","authors":"Hideaki Joko, Yusuke Koji, Hayato Uchide, Takahiro Otsuka","doi":"10.23919/ICMU.2018.8653619","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653619","url":null,"abstract":"This research proposes an intention understanding method that uses transfer learning from Japanese-English translation data. It was found that the proposed method improved performance over the baseline method for small training data, with intention understanding accuracy improving by a maximum of 10.8 points when the number of data for each intention label was 1.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Flow in the Mixed Environment of Autonomous and Human-Operated Vehicles","authors":"Hiroto Furukawa, R. Kiyohara","doi":"10.23919/ICMU.2018.8653255","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653255","url":null,"abstract":"The traffic flow in the mixed environment of autonomous and human-operated vehicles may be worse. We think that this problem is caused by mixed vehicles environment which have different in their driver’s sense. In this paper, we proposed a method for solving this problem.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Barmada, Naji Alobaidi, Iman Tabatabaei Ardekani, Guillermo Ramírez-Prado, Maryam E. Sabaee
{"title":"Evaluating VANET Routing Protocols for Auckland Area","authors":"B. Barmada, Naji Alobaidi, Iman Tabatabaei Ardekani, Guillermo Ramírez-Prado, Maryam E. Sabaee","doi":"10.23919/ICMU.2018.8653258","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653258","url":null,"abstract":"This paper provides a performance evaluation for several popular Vehicular Ad-Hoc Network (VANET) protocols, namely AODV, DSR, OLSR, DSDV, GPSR, CBRP, and ZRP with Nakagami fading propagation model for Auckland area. The impact of the shape factor of the Nakagami model on the performance is investigated for each of the studied protocols, and for three types of traffic: low, medium and high traffic. Two real scenarios are considered: urban area (central of Auckland), with a maximum speed of 50 km/h, and motorway, with a maximum speed of 100 km/h. Results show that the performance of the protocols varies and depends on several factors including the number and the speed of vehicles","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Examination of Pairing Method with Camera and Acceleration Sensor","authors":"M. Nagatomo, K. Aburada, N. Okazaki, Mirang Park","doi":"10.23919/ICMU.2018.8653584","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653584","url":null,"abstract":"Received signal strength (RSS) is used for proximate device authentication in wireless communications, but it changes significantly due to environmental factors. Thus, it is difficult to obtain reliably accurate device authentication with RSS. An alternative is proximity authentication, in which an infrared camera recognizes the movement of a hand-held device. In this method, the camera cannot recognize device inclination, and the user needs to have a special camera. In this paper, we propose a method that performs authentication by pairing a PC having a common camera and a hand-held device having an accelerometer. In this method, the PC recognizes a marker on the display of the device and calculates the similarity between the displacement of the marker and the acceleration of the device. We performed experiments to determine how the similarity changes according to the distance from a device to a camera and whether an eavesdropper outside the camera range can perform pairing. As a result, we found that it is possible to set a threshold for the similarity, but the standard deviation of the similarity was large, making the method unstable.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incremental top-k keyword queries in directed road networks","authors":"M. Attique, Tae-Sun Chung","doi":"10.23919/ICMU.2018.8653256","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653256","url":null,"abstract":"In this paper, we investigate the problem of processing and monitoring of incremental top-k spatial keyword queries in directed road networks (TkSK). Unfortunately, the existing solutions focuses on static top-k keyword queries on undirected road networks. We propose a safe-exit based approach to monitor the validity of the results for incremental top-k queries where query points are randomly moving in directed road networks.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location prediction based on Smartphone Multimodal Personal Data for Proactive Support Services","authors":"Naoharu Yamada, Norihiro Katsumaru, Hiroaki Nishijima, Masatoshi Kimoto","doi":"10.23919/ICMU.2018.8653598","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653598","url":null,"abstract":"Location prediction is essential to facilitate proactive support services. However, predicting a location that the user has not visited previously based on location history is difficult to predict the location where the user has never visit. Smartphones handle a significant amount of important personal data such as location, schedule, and email data. This paper proposes a location prediction method based on personal data acquired from smartphones. Experimental results based on personal data acquired over one year demonstrate that the system can predict user location precisely.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Name Autoconfiguration for IoT Devices","authors":"Tomohiro Yanase, H. Tanaka, Hidekazu Suzuki","doi":"10.23919/ICMU.2018.8653612","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653612","url":null,"abstract":"Internet of things (IoT) devices may be directly connected to the Internet in the future. In that case, an enormous number of addresses are required, so IPv6 address is inevitable. Therefore, when a user communicates with a device assigned IPv6 address, it is common to use a user-friendly identifier such as fully qualified domain name (FQDN) instead of an IP address. However, the current IoT device often has no function of setting the FQDN in many cases. This paper proposes flexible name autoconfiguration (FNAC) which can automatically generate FQDN without altering specification of IoT device at all. In FNAC, FQDN is automatically generated based on device information that can be acquired using the communication protocol used in each IoT device, and this function is installed in a home gateway (HGW). Additionally, by setting the information such as the installation location of the IoT devices in the HGW, a user can include a label about the location in the FQDN, or change the FQDN to a more recognizable FQDN.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"73 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}