2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Seamless Handoff and Performance Anomaly Reduction Schemes Based on OpenFlow Access Points 基于OpenFlow接入点的无缝切换和性能异常降低方案
Won-Suk Kim, Sang-Hwa Chung, Chang-Woo Ahn, Mi-Rim Do
{"title":"Seamless Handoff and Performance Anomaly Reduction Schemes Based on OpenFlow Access Points","authors":"Won-Suk Kim, Sang-Hwa Chung, Chang-Woo Ahn, Mi-Rim Do","doi":"10.1109/WAINA.2014.58","DOIUrl":"https://doi.org/10.1109/WAINA.2014.58","url":null,"abstract":"The enterprise WLANs that are composed of multiple access points (APs) and AP controller, provide wireless backbone networks in the building and campus. In this paper, we propose the Open Flow AP system that is a software-defined enterprise WLAN system based on the Open Flow-based AP and the Open Flow controller. Also, we propose the seamless handoff and performance anomaly reduction schemes based on the Open Flow AP system in order to improve total throughput of the networks while user experience is guaranteed. We deployed the Open Flow AP system in the lab building and performed several experiments to evaluate the efficiency of the proposed system and applications. When the proposed system is compared with the existing WLANs, it performs handoff seamlessly without reassociation and increases total throughput of the network by 26.7% when client is located in overlapped service area.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks 基于光流和神经网络的视频监控跟踪与异常行为检测
Nida Rasheed, S. Khan, A. Khalid
{"title":"Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks","authors":"Nida Rasheed, S. Khan, A. Khalid","doi":"10.1109/WAINA.2014.18","DOIUrl":"https://doi.org/10.1109/WAINA.2014.18","url":null,"abstract":"An abnormal behavior detection algorithm for surveillance is required to correctly identify the targets as being in a normal or chaotic movement. A model is developed here for this purpose. The uniqueness of this algorithm is the use of foreground detection with Gaussian mixture (FGMM) model before passing the video frames to optical flow model using Lucas-Kanade approach. Information of horizontal and vertical displacements and directions associated with each pixel for object of interest is extracted. These features are then fed to feed forward neural network for classification and simulation. The study is being conducted on the real time videos and some synthesized videos. Accuracy of method has been calculated by using the performance parameters for Neural Networks. In comparison of plain optical flow with this model, improved results have been obtained without noise. Classes are correctly identified with an overall performance equal to 3.4e-02 with & error percentage of 2.5.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Performance Analysis of a Non-preemptive Hybrid WSN Protocol in Mobile Environments 移动环境下非抢占式混合WSN协议性能分析
Israel Leyva Mayorga, M. E. Rivero-Angeles, Chadwick Carreto Arellano
{"title":"Performance Analysis of a Non-preemptive Hybrid WSN Protocol in Mobile Environments","authors":"Israel Leyva Mayorga, M. E. Rivero-Angeles, Chadwick Carreto Arellano","doi":"10.1109/WAINA.2014.83","DOIUrl":"https://doi.org/10.1109/WAINA.2014.83","url":null,"abstract":"Evolution in Wireless Sensor Networks (WSNs) has allowed new applications that led to an increase in the complexity of communication protocols. Specifically, mobile surveillance applications (where the network is set to monitor mobile objects) require the system to respond in a certain manner so adequate and reliable object tracking and status reporting takes place. Mobile objects can be either independent or controlled by the system, in the former, some sort of transmitter is attached to the mobile entity in order to perform status reporting duties, which, in the case of human beings or specimens may comprise the reporting of vital signs. In view of this, information obtained from mobile objects must be sent with minimal delay and with certain degree of reliability in order to achieve adequate emergency handling when required. Furthermore, mobile environments usually incorporate additional phenomena that creates a multi-event environment, increasing the rate of detection and transmission in the nodes, hence, delaying the report. Hybrid algorithms that allow sensor networks to perform continuous monitoring and event driven applications have proven their ability to enhance performance in different environments where emergency alarms are required while performing a permanent surveillance of the phenomena. Also, these protocols may consider priority assignment in order to reduce report delay and increase reliability in important packets, thus enhancing QoS parameters. In this work, the performance of a non-preemptive hybrid protocol for WSN is studied considering multi-event environments containing mobile targets. Results show that, by using different transmission probabilities, assigned to high and low priority data packets, mobile event reporting delay can be reduced despite the occurrence of other events within the network. As such, a better performance is obtained for critical-time applications where emergency handling is a must.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fast Efficient Fractional-Pixel Displacement for H.264/AVC Motion Compensation H.264/AVC运动补偿中快速有效的分数像素位移
Lung-Jen Wang, Chia-Tzu Shu
{"title":"A Fast Efficient Fractional-Pixel Displacement for H.264/AVC Motion Compensation","authors":"Lung-Jen Wang, Chia-Tzu Shu","doi":"10.1109/WAINA.2014.13","DOIUrl":"https://doi.org/10.1109/WAINA.2014.13","url":null,"abstract":"The fractional-pixel displacement has been proposed in the motion compensation prediction for the H.264/AVC algorithm. In this paper, a cubic convolution interpolation filter with four coefficients is presented to improve the coding efficiency of fractional-pixel displacement for H.264/AVC. Experimental results show that the proposed cubic convolution interpolation filter can be used to increase the fractional-pixel precisions and also obtain a superior performance for motion compensation.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 3DCG Distribution System with Personalized Ranking for Augmented Reality User Interface 面向增强现实用户界面的个性化排序3DCG分配系统
Hiroshi Honda, Kosuke Takano
{"title":"A 3DCG Distribution System with Personalized Ranking for Augmented Reality User Interface","authors":"Hiroshi Honda, Kosuke Takano","doi":"10.1109/WAINA.2014.42","DOIUrl":"https://doi.org/10.1109/WAINA.2014.42","url":null,"abstract":"In this paper, we present a 3DCG (three-dimensional computer graphics) distribution system for the augmented reality user interface (UI). Specifically, we create a platform for collecting and managing 3DCG content for the augmented reality UI. The platform mainly consists of local 3DCG distribution servers that are implemented as a Web service, a crawler that collects metadata of 3DCG content from local 3DCG servers, and a global 3DCG distribution system that manages the overall metadata of the 3DCG content collected from local 3DCG servers by the crawler. In addition, we present a method for personalizing additional information related to the user's selected 3DCG in the augmented reality UI based on the user's preferences and metadata-based classification. The feasibility of our system is experimentally evaluated and discussed using a 3DCG content database regarding plants and animals.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs RD-TDMA:一种针对无线传感器网络中相关争用的随机分布式TDMA调度方法
Ashutosh Bhatia, R. Hansdah
{"title":"RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs","authors":"Ashutosh Bhatia, R. Hansdah","doi":"10.1109/WAINA.2014.65","DOIUrl":"https://doi.org/10.1109/WAINA.2014.65","url":null,"abstract":"In wireless sensor networks (WSNs), contention occurs when two or more nodes in a proximity simultaneously try to access the channel. The contention causes collisions, which are very likely to occur when traffic is correlated. The excessive collision not only affects the reliability and the QoS of the application, but also the lifetime of the network. It is well known that random access mechanisms do not efficiently handle correlated-contention, and therefore, suffer from high collision rate. Most of the existing TDMA scheduling techniques try to find an optimal or a sub-optimal schedule. Usually, the situation of correlated-contention persists only for a short duration, and therefore, it is not worthwhile to take a long time to generate an optimal or a sub-optimal schedule. We propose a randomized distributed TDMA scheduling (RD-TDMA) algorithm to quickly generate a feasible schedule (not necessarily optimal) to handle correlated-contention in WSNs. In RD-TDMA, a node in the network negotiates a slot with its neighbors using the message exchange mechanism. The proposed protocol has been simulated using the Castalia simulator to evaluate its runtime performance. Simulation results show that the RD-TDMA algorithm considerably reduces the time required to schedule.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Big Data Obstacle of Lifelogging 生活记录的大数据障碍
Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones
{"title":"The Big Data Obstacle of Lifelogging","authors":"Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones","doi":"10.1109/WAINA.2014.142","DOIUrl":"https://doi.org/10.1109/WAINA.2014.142","url":null,"abstract":"Living in the digital age has resulted in a data rich society where the ability to log every moment of our lives is now possible. This chronicle is known as a human digital memory and is a heterogeneous record of our lives, which grows alongside its human counterpart. Managing a lifetime of data results in these sets of big data growing to enormous proportions, as these records increase in size the problem of effectively managing them becomes more difficult. This paper explores the challenges of searching such big data sets of human digital memory data and posits a new approach that treats the searching of human digital memory data as a machine learning problem.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Building a Confident Advanced Email System Using a New Correspondence Model 使用新的通信模型建立一个自信的高级电子邮件系统
Laurent Cailleux, A. Bouabdallah, J. Bonnin
{"title":"Building a Confident Advanced Email System Using a New Correspondence Model","authors":"Laurent Cailleux, A. Bouabdallah, J. Bonnin","doi":"10.1109/WAINA.2014.24","DOIUrl":"https://doi.org/10.1109/WAINA.2014.24","url":null,"abstract":"Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally take into account security requirements together with various other specific needs. The main drawback of these approaches lies in their inherent rigidity. They indeed grant no place for the concepts of usage and context which are fundamental for any modern communication service. The usage is determined by a user's intention of communication: private, professional, administrative, official, military. Context is clearly orthogonal to usage because a same usage may require different features depending of the context. We propose to define a correspondence model which for a given usage and context allows to dynamically derive a correspondence type encapsulating the exact set of required features. With this model, it becomes possible to define an advanced email system which may dynamically cope with multiple policies instead of a single monolithic one. By allowing a user to select the exact policy matching her needs, we argue that our approach reduces her risk-taking, providing in this way a confident advanced email system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing 基于形式测试的分布式信任评估监控方法
Jorge López, Xiaoping Che, S. Maag, Gerardo Morales
{"title":"A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing","authors":"Jorge López, Xiaoping Che, S. Maag, Gerardo Morales","doi":"10.1109/WAINA.2014.114","DOIUrl":"https://doi.org/10.1109/WAINA.2014.114","url":null,"abstract":"Communications systems are growing in use and in popularity. While their interactions are becoming more numerous, trust those interactions now becomes a priority. In this paper, we focus on trust management systems based on observations of trustee behaviors. Based on a formal testing methodology, we propose a formal distributed network monitoring approach to analyze the packets exchanged between the trust or, trustee and other points of observation in order to prove the trustee is acting in a trustworthy manner. Based on formal \"trust properties\", the monitored systems behaviors provide a verdict of trust by analyzing and testing those properties. Finally, our methodology is applied to a real industrial DNS use case scenario.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling User Interactions in Social Communication Networks with Variable Social Vector Clocks 用可变社会矢量时钟建模社会通信网络中的用户交互
T. Hsu, A. Kshemkalyani, Min Shen
{"title":"Modeling User Interactions in Social Communication Networks with Variable Social Vector Clocks","authors":"T. Hsu, A. Kshemkalyani, Min Shen","doi":"10.1109/WAINA.2014.29","DOIUrl":"https://doi.org/10.1109/WAINA.2014.29","url":null,"abstract":"Social communication networks have been widely investigated in recent years. From fine-grained temporal information's point of view, social vector clock (SVC) is a useful mechanism to track the most recent communication with all other local peers in a social network. A modification of conventional social vector clocks has been proposed to deal with the issue of poor scalability without keeping whole temporal views [1]. In this paper, we propose an idea of variable social vector clocks (VSVCs) and the corresponding incremental algorithm. Not only does it maintain the lower bound of how out-of-date each peer can be with respect to others, but it also considers the shortest friendship separation to restrict how far information may be transmitted along time respecting paths. Unless this separation is bounded to be infinite, some communication messages could be lost implicitly. We also focus on studying message inconsistency and reachable in-degree communication distribution in several social networks based on variable social vector clocks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124136102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信