2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Performance Evaluation on Simplified Computer for the Elderly People 老年人简易计算机的性能评价
Jeichen Hsieh, Chang-Chan Huang
{"title":"Performance Evaluation on Simplified Computer for the Elderly People","authors":"Jeichen Hsieh, Chang-Chan Huang","doi":"10.1109/IMIS.2013.126","DOIUrl":"https://doi.org/10.1109/IMIS.2013.126","url":null,"abstract":"Simplified computers become more important than ever before in our modern life. However, this new-form computer actually has many ergonomic problems according to previous user experiences. As the coming era of the elderly, the elderly people have many chances to use simplified computers. It is also why many related ergonomic studies have been the trends of current research focuses. In this study, we use the usability engineering methods to study the design principle of simplified computers. The experimental equipment includes ACER Iconia Tab, and ASUS Eee transform-Pad, and experimental software includes Game software, Social networking software, Chinese short article and Web site browser, together with the combination of both subjective interface usability attitude inventory and objective inventory survey to enhance our research results. Our conclusions are that elderly people have poor performance in operating social networking software, Chinese type-in and browsing the worldwide web site, because of their less usage experiences. Next, when Elderly people are using transform-Pad, they have better performance on game software than on social networking software, Chinese type-in and browsing the website.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tree-Based Genetic Algorithm with Binary Encoding for QoS Routing 基于二进制编码的树遗传算法的QoS路由
V. Maniscalco, S. G. Polito, Antonio Intagliata
{"title":"Tree-Based Genetic Algorithm with Binary Encoding for QoS Routing","authors":"V. Maniscalco, S. G. Polito, Antonio Intagliata","doi":"10.1109/IMIS.2013.26","DOIUrl":"https://doi.org/10.1109/IMIS.2013.26","url":null,"abstract":"Mobile ad Hoc Networks (MANETs) are one of the most important technologies supporting Ubiquitous and Pervasive Computing (UPC). As many UPC applications pose Quality of Service (QoS) constraints, their implementation in MANETs becomes dependent on the MANET algorithms for QoS routing. In this paper Genetic Algorithms (GAs) for QoS routing in MANETs are considered. GAs can solve the NP search of QoS routes with multiple constraints, and then address the UPC QoS requirements. The focus is on tree-based GAs, which represent the set of paths from source to destination as a tree and encode them through the crossed junctions. They encode single paths in the chromosome. We investigate on the effects of binary encoding schema on tree-based GAs. To this purpose we design a GA with binary encoding that maps classes of paths in single chromosomes. These classes are both collectively exhaustive and mutually exclusive. The GA with binary encoding uses an adaptive mutation probability for deeper exploration of the search space, and local search on classes of paths. Simulation results compare the GA with binary encoding with two applications of GAMAN, the main existing tree-based GA. They show that the binary encoding allows the GA to converge faster although it introduces additional computational costs.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Evaluating Video Streaming in Network Architectures for the Internet of Things 评估物联网网络架构中的视频流
P. Martinez-Julia, Elena Torroglosa-García, Jordi Ortiz Murillo, A. Gómez-Skarmeta
{"title":"Evaluating Video Streaming in Network Architectures for the Internet of Things","authors":"P. Martinez-Julia, Elena Torroglosa-García, Jordi Ortiz Murillo, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2013.76","DOIUrl":"https://doi.org/10.1109/IMIS.2013.76","url":null,"abstract":"In this paper we discuss the experimentation results we obtained from performing video streaming in Internet of Things (IoT) scenarios built on top of Content Centric Networking (CCN) architecture. More precisely, we used the Dynamic Adaptive Streaming over HTTP (DASH) mechanism to split videos into multiple pieces, also offering multiple bit-rates. Such pieces are then streamed by a DASH client from a typical HTTP server through a CCN network. HTTP/CCN adapters are used to translate the HTTP requests to CCN interests and HTTP responses to CCN content objects. The results are promising, the experiment demonstrated that CCN can fit into IoT environments and that its integrated caching mechanisms will highly reduce the necessary time to retrieve content, specifically streamed video, therefore increasing network efficiency.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Toward Automated Reduction of Human Errors Based on Cognitive Analysis 基于认知分析的人为错误自动减少研究
Daisuke Miyamoto, Takeshi Takahashi
{"title":"Toward Automated Reduction of Human Errors Based on Cognitive Analysis","authors":"Daisuke Miyamoto, Takeshi Takahashi","doi":"10.1109/IMIS.2013.147","DOIUrl":"https://doi.org/10.1109/IMIS.2013.147","url":null,"abstract":"Following the immense development of cyber society where various activities including e-commerce take place, the demands for security is rapidly growing. Among major causes of security flaws is human error, which is unintentionally caused by humans. To cope with that, we intend to build a human error database that automatically develops further. We conducted a survey on human factors and concluded that the root causes of human errors are related to the internal mental processes, and the cognitive-psychological methodology is a feasible for the estimation of them. Based on that this paper proposes a framework that consists of data collection methods and data structure. It also explores the usability of the data by presenting use cases of human error prevention and incident handling.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Friend Recommendation for Location-Based Mobile Social Networks 基于位置的移动社交网络的朋友推荐
Cheng-Hao Chu, Wan-Chuen Wu, Cheng-Chi Wang, Tzung-Shi Chen, Jen-Jee Chen
{"title":"Friend Recommendation for Location-Based Mobile Social Networks","authors":"Cheng-Hao Chu, Wan-Chuen Wu, Cheng-Chi Wang, Tzung-Shi Chen, Jen-Jee Chen","doi":"10.1109/IMIS.2013.68","DOIUrl":"https://doi.org/10.1109/IMIS.2013.68","url":null,"abstract":"Along with the rapid growth of Internet, many social websites are founded, and gradually begin to influence the people's life. Such as Facebook, the social network site provides the personalized recommendation system with friends-of-friends method to recommend new friends to users. The intuition is derived from the idea that it is more probable a person will know a friend of their friends rather than a random person. However, this approach does not consider any insights into human cognitive components such as social interactions. Thus, we propose a brand-new friend recommendation approach. The main concept is to recommend friends who have the similar interests or another thing with self to users. Besides utilizing the information on social networks, such as interests, the concept of real-life location and dwell time is further added in our approach. In this paper, we develop two comparison methods to provide quality friend recommendation. First method combines the existing landmark and user's dwell time at certain landmark to make the Voronoi diagram, and analyzes location similarity between users. Second methods is to analyze the interest lists from each social network accounts by using pattern matching and finding longest common subsequence. Through this two comparison methods, we assess the acceptable degree between two, and successfully implement the friend recommendation system.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125708668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Macroeconomic Condition and Capital Structure Adjustment Speed -- Evidence from the Indonesian Stock Market 宏观经济条件与资本结构调整速度——来自印尼股市的证据
Shyh-Weir Tzang, Kuei-Yuan Wang, Relia Novita Rahim
{"title":"Macroeconomic Condition and Capital Structure Adjustment Speed -- Evidence from the Indonesian Stock Market","authors":"Shyh-Weir Tzang, Kuei-Yuan Wang, Relia Novita Rahim","doi":"10.1109/IMIS.2013.141","DOIUrl":"https://doi.org/10.1109/IMIS.2013.141","url":null,"abstract":"This paper presents the impact of the macroeconomic condition on the speed of adjustment of capital structure for non-financial firms listed in the Indonesian Stock Exchange from 1992 to 2010. Based on a two-stage OLS and integrated partial adjustment approach, the paper finds that Indonesian firms adjust their leverage faster in bad economic condition and the adjustment speed of the over-levered firms is higher than the under-levered firms. By controlling the variable of GDP growth rate, the over-levered firms exhibit a faster adjustment on their capital structure measured by book value but an insignificant adjustment measured by market value. By controlling the variable of inflation rate, the over-levered firms show a faster adjustment in their capital structure measured by book value when the GDP growth rate is high. In contrast with previous literature, the results provide different interpretations about the adjustment speed toward target leverage measured by book and market debt ratios.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud 基于OpenFlow的虚拟交换机监控系统在云端的实现
Chao-Tung Yang, Jung-Chun Liu, Wei-Sheng Chen, Fang-Yie Leu, W. Chu
{"title":"Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud","authors":"Chao-Tung Yang, Jung-Chun Liu, Wei-Sheng Chen, Fang-Yie Leu, W. Chu","doi":"10.1504/IJAHUC.2017.10001124","DOIUrl":"https://doi.org/10.1504/IJAHUC.2017.10001124","url":null,"abstract":"As a next generation networking protocol, the OpenFlow mechanism speeds up network performance by separating the control plane and the data plane. It can be implemented for QoS functions: users in need of network resources or with higher priority defined by the system are allotted with ample resources. In addition to the communication protocol, another two elements are needed to implement a complete OpenFlow system: the switch, either being physical or virtual, which supports OpenFlow, and the controller, which sends flow setting packets to control the switch flow table. With OpenFlow, users are not restricted to functions provided by the specific switch or router, such as RIP, OSPF, EGP routing protocol, firewall, QoS, Anti Virus, and NAT, since it provides a standard Application Programming Interface to let users have the freedom to define their needed functions instead of predefined functions bundled in the manufacturer's proprietary operating system. The main goal of this paper is to create an OpenFlow switch monitoring system, which can monitor all hosts and traffic pass through switches under the controller, and provide a simple web page by which the network administrator can modify the priority of each flow and manage the whole network with ease.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Study on FDI Technological Spillover Effect in Central China 中部地区FDI技术溢出效应研究
Kewei Bi
{"title":"A Study on FDI Technological Spillover Effect in Central China","authors":"Kewei Bi","doi":"10.1109/IMIS.2013.135","DOIUrl":"https://doi.org/10.1109/IMIS.2013.135","url":null,"abstract":"This paper used the industry actual data (2000-2009) as samples to measure FDI technology spillover effect in Central China, it used panel data to analysis technology spillover effect of FDI with measurement methods. The results showed that: in Central China, the FDI technology spillover effect is positive and overstep other areas. Finally, this paper bases on our current condition to describe the focus of how to attract foreign investment in Central China.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123607115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Emotion-Object-Interaction Framework for Exploration of Design Patterns of Massive Interpersonal Persuasion 情感-客体-交互框架探讨大规模人际说服的设计模式
T. Yamakami
{"title":"An Emotion-Object-Interaction Framework for Exploration of Design Patterns of Massive Interpersonal Persuasion","authors":"T. Yamakami","doi":"10.1109/IMIS.2013.100","DOIUrl":"https://doi.org/10.1109/IMIS.2013.100","url":null,"abstract":"Social media has been growing since the emergence of Web 2.0. Interpersonal diffusion has big potential for a new kind of media marketing. As the stay time in social media increases, it is crucial to make use of social media for marketing utilities. In order to cope with this need, it is important to create a framework for diffusion using a user experience diffusion mechanism. The large social graph capability of social networks has significant potential. However, the difficulty of controlling the behavior of social interaction presents challenges to coining a systematic methodology to deal with it. For facilitating the automation of user experience diffusion, the author proposes a framework called the \"Emotion-Object-Interaction framework.\" The author discusses the best practices of the Emotion-Object-Interaction framework using the examples of social network services and mobile social games. The proposed framework focuses on the emotion of first user, then on symbolization of the emotion and interaction with it. This simple scheme provides a general framework for mass interpersonal persuasion.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Local Virtual Force Algorithm for Sensing Deployment in Wireless Sensor Network 一种用于无线传感器网络传感部署的混合局部虚拟力算法
Cheng-Chih Yang, J. Wen
{"title":"A Hybrid Local Virtual Force Algorithm for Sensing Deployment in Wireless Sensor Network","authors":"Cheng-Chih Yang, J. Wen","doi":"10.1109/IMIS.2013.109","DOIUrl":"https://doi.org/10.1109/IMIS.2013.109","url":null,"abstract":"Coverage and uniformity are considered as important performance metrics for sensing deployment in Wireless Sensor Network (WSN). Virtual Force Algorithm (VFA) is one of main approaches for coverage performance improving in dynamic deployment, but it lacks uniformity investigation in previous studies. A Hybrid Local Virtual Force Algorithm (HLVFA) is proposed in this paper. Under a probabilistic sensor detection model, a sensor node has ability to detect its neighbors' location and local uniformity. Coverage and uniformity oriented virtual forces are considered, and then a mobile node's local optimal location can be estimated for maximum coverage area and better uniformity. Simulation results show that HLVFA has better performances than improved VFA.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"483 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124043548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信