Neng Zhang, Jianfeng Guan, Changqiao Xu, Hongke Zhang
{"title":"TSS: A Primary User Mobility Model in Cognitive Internet","authors":"Neng Zhang, Jianfeng Guan, Changqiao Xu, Hongke Zhang","doi":"10.1109/IMIS.2013.99","DOIUrl":"https://doi.org/10.1109/IMIS.2013.99","url":null,"abstract":"Realistic mobility models are important to understand the performance of routing protocols in Cognitive Internet (CI), especially when behaviors and activities of Primary User (PU) are taken into consideration. Currently, PU mobility models are commonly simplistic spectrum handoff or traditional mobility models that do not reflect realistic space-time characteristics in CI. Hence, the effect involved in PUs mobility should tightly integrated with spectrum available time and PUs appearance behavior. In this paper we propose a novel PU mobility model named TSS, combined with spectrum usage and spatio-temporal characteristics. In this model, we describe the PUs appearance behaviors that are visited often by the nodes to capture location visiting preferences, and spectrum available time with different mobility parameters to create periodical spectrum reuse of nodes at the same location. Lastly, we present numerical and simulation results that illustrate the performance evaluation of PU.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Innovative Differential Evolution Algorithm for OFDM Reducing PAPR","authors":"Shu-Hong Lee, Ho-Lung Hung","doi":"10.1109/IMIS.2013.113","DOIUrl":"https://doi.org/10.1109/IMIS.2013.113","url":null,"abstract":"In this paper, tone injection (TI) based on differential evolution algorithm (DE) is proposed to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals. TI is a distortionless PAPR reduction technique, but its high search complexity for finding optimal TI scheme requires an exhaustive search over all combinations of possible permutations of the expanded constellation, which is a potential problem for practical applications. In this work we present a novel convex optimization approach to numerically determine the near-optimal tone injection (TI) solution based on a differential evolution algorithm (DETI). DETI is compared to different TI schemes for PAPR reduction and search complexity performances. The simulation results show that the proposed DETI method provides good PAPR reduction and bit error-rate (BER) performances. Finally, the DETI algorithm not only reduces the PAPR significantly, but also decreases the computational complexity. The simulation results show that it achieves more or less the same PAPR reduction as that of exhaustive search.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Jeong, Sang-Kug Ye, Jiyoung Lim, I. You, WooSeok Hyun, Hee-Kyoung Song
{"title":"A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices","authors":"H. Jeong, Sang-Kug Ye, Jiyoung Lim, I. You, WooSeok Hyun, Hee-Kyoung Song","doi":"10.1109/IMIS.2013.105","DOIUrl":"https://doi.org/10.1109/IMIS.2013.105","url":null,"abstract":"This paper presents a remote control computer system using speech recognition technologies of mobile devices for the blind and physically disabled population. These people experience difficulty and inconvenience using computers through a keyboard and/or mouse. The purpose of this system is to provide a way that the blind and physically disabled population can easily control many functions of a computer via speech. The configuration of the system consists of a mobile device such as a smartphone, a PC server, and a Google server that are connected to each other. Users can command a mobile device to do something via speech such as directly controlling computers, writing emails and documents, calculating numbers, checking the weather forecast, and managing a schedule. They are then immediately executed. The proposed system also provides the blind people with a function via TTS (text to speech) of the Google server if they want to receive contents of the document stored in a computer.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Target Coverage Problem of Angle Rotatable Directional Sensor Networks","authors":"Maoyou Wu, Wei-Fu Lu","doi":"10.1109/IMIS.2013.107","DOIUrl":"https://doi.org/10.1109/IMIS.2013.107","url":null,"abstract":"In this paper, we study the target coverage problem of directed sensor networks with rotatable angles. The main purpose of this problem is to maximize number of targets to be covered while minimize number of activated directional sensors. Coverage problem is well-studied for omni-directional sensors, however, it is still a challenge task for directional sensor. The directed sensor nodes used in the previous works are composed of fixed number of sensors, and the orientations of sensors are fixed. In this study, we consider the directed sensors with arbitrary sensing orientations. Our algorithm constructs sectors of sensors based on targets within the sensing distance of sensors to gain higher coverage rate and lower ratio of active sensors. To evaluate the performance of proposed algorithm, several simulations are conducted. Experimental results show that our algorithm can contribute to increase the coverage rate of targets and decrease the ratio of activated directional sensors obviously than previous algorithms, thus gain better coverage performance and longer lifetime for directed sensor networks.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Chiang Lin, Charlotte Wang, Z. Wu, Yu-Fang Chung
{"title":"Detect Rare Events via MICE Algorithm with Optimal Threshold","authors":"Sung-Chiang Lin, Charlotte Wang, Z. Wu, Yu-Fang Chung","doi":"10.1109/IMIS.2013.21","DOIUrl":"https://doi.org/10.1109/IMIS.2013.21","url":null,"abstract":"Class imbalanced classifications are important issues in machine learning since class imbalanced problems usually happen in real applications such as intrusion detection, medical diagnostic/monitoring, oil-spill detection, and credit card fraud detection. It is hard to identify rare events correctly if a learning algorithm is just established based on optimal accuracy, as all samples will be classified into the major group. Many algorithms were proposed to deal with class imbalance problems. In this paper, we focus on MICE algorithm proposed by [15] and improve the algorithm by choosing the optimal threshold based on the posterior probabilities. In addition, we illustrate the reason why the logistic transformation works in MICE. The empirical results show that choosing the optimal threshold vis posterior probabilities can improve the performance of the MICE algorithm.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Pointer Forwarding Based Mobility Management for Cost-Optimized Proxy Mobile IPv6 Networks","authors":"S. Park, Jongpil Jeong","doi":"10.1109/IMIS.2013.15","DOIUrl":"https://doi.org/10.1109/IMIS.2013.15","url":null,"abstract":"In this paper, we propose optimized mobility management schemes based on pointer forwarding for Proxy Mobile IPv6 (PMIPv6) networks with the aim of reducing the overall network traffic caused by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for individual mobile user based on the mobility and service patterns. We show that there is an optimal threshold of the forwarding chain length given a set of parameters characterizing the specific mobility and service patterns of a mobile user. We also describe that our schemes yield significantly better performance than schemes that be applicable a static threshold to all mobile users. A comparative analysis shows that our pointer forwarding schemes outperform routing-based mobility management protocols for PMIPv6 networks.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-Aware I/O Schedule for Virtual Machines in Cloud Computing Environment","authors":"Xiaodong Liu, W. Tong, Chao Shen","doi":"10.1109/IMIS.2013.54","DOIUrl":"https://doi.org/10.1109/IMIS.2013.54","url":null,"abstract":"In the virtualization based cloud computing environment, multiple computers are allowed to run as virtual machines (VM) in a single physical computer. Since multiple VMs share the same network interface card (NIC). The I/O operation of one virtual machine is affected by others. The quality of service (QoS) of the network is hardly guaranteed. This paper presents credit based fairing scheduling algorithm for I/O virtualization (VCF), an efficient scheduling strategy with bandwidth guarantee that is implemented in the xen hyper visor layer. Our proposed scheme uses a credit based strategy to guarantee the reserved bandwidth of each VM. At the same time, VCF is aware of bandwidth requirement inside a VM using monitoring and prediction strategy. Thereby, VCF can also allocate the bandwidth according to the actual requirement of the VM, which can improve the bandwidth utilization. The proposed techniques are implemented on the xen virtual machine monitor and evaluated with micro-benchmarks on Linux operation system.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"30 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. I. S. Jose, R. Higuera, J. J. D. Dios, J. M. Pastor
{"title":"A Service-Oriented Auto Managed System for Transportation Applications","authors":"J. I. S. Jose, R. Higuera, J. J. D. Dios, J. M. Pastor","doi":"10.1109/IMIS.2013.86","DOIUrl":"https://doi.org/10.1109/IMIS.2013.86","url":null,"abstract":"In this paper we summarize our work on the design of an auto-managed system for the tracking and location of products in transportation routes. Manufacturers, retailers and customers require tracking of goods in production and distribution lines. Companies usually control the quality of their production during the manufacturing phase, but products can also be controlled along the distribution and transportation phases, before they are delivered to customers. A service-oriented four-layer system is proposed in order to provide an efficient solution for the Real-Time Monitoring (RTM) of goods. Several Web Services are defined, so that customers can easily access information about the shipment of their orders. Finally, a sample Web Application is developed to access those Web Services.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GEMD Data Hiding by Pixel Segmentation Strategy","authors":"W. Kuo, Sheng-Yi Chang","doi":"10.1109/IMIS.2013.33","DOIUrl":"https://doi.org/10.1109/IMIS.2013.33","url":null,"abstract":"In recent years, the more popularity of Internet has been brought convenience in use, the more leakage risk of information security is increased. From the data security opinion, a data hiding method does not only maintain good stego-image quality but also keep the security. In order to increase the embedding capacity and maintain the above advantages, the GEMD data hiding method by pixel segmentation strategy will be proposed in this paper. According to experimental results, we can show that our proposed method improves higher embedding capacity efficiently and still have good stego-image quality and security.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122787711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical Overview of SmartMesh IP","authors":"T. Watteyne, L. Doherty, J. Simon, K. Pister","doi":"10.1109/IMIS.2013.97","DOIUrl":"https://doi.org/10.1109/IMIS.2013.97","url":null,"abstract":"Smart Mesh IP is the latest protocol stack from the Linear Technology's Dust Networks group, who specialize in standards-based intelligent wireless sensor networking solutions. This paper presents a technical overview of this protocol stack, the System-on-Chip built around it, and the \"ecosystem\" to integrate a low-power mesh network in a larger system and the Internet. A descendant of long-standing protocols such as Wireless HART, the new IEEE802.15.4e Time slotted Channel Hopping standard delivers high reliability and ultra-low power. Combined with 6LoWPAN, the Smart Mesh IP protocol stack combines the industrial performance of IEEE802.15.4e with the ease-of-use of IPv6. After presenting the historical context of this technology, this paper discusses the different design choices which had to be made when designing this protocol stack, before covering typical use cases and real-world example deployments.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}