{"title":"Localized Paging Scheme in PMIPv6","authors":"Zhiwei Yan, Jong‐Hyouk Lee, Ye Tian","doi":"10.1109/IMIS.2013.14","DOIUrl":"https://doi.org/10.1109/IMIS.2013.14","url":null,"abstract":"In Proxy Mobile IPv6 (PMIPv6) network, proxy registrations are performed even for idle Mobile Nodes (MNs), resulting in unnecessary signaling traffic. Although there have been many IP paging techniques aimed at reducing the unnecessary location updates, they mainly focused on Mobile IP (MIP) since it has been developed before PMIPv6 was proposed. To further promote the efficiency of PMIPv6, we propose a localized paging scheme, which pages the idle MN through the Mobility Access Gateway (MAG) and the operation is transparent to the Local Mobility Anchor (LMA). In this way, the bottleneck risk at LMA can be avoided, without the huge requirements of buffer and paging singling cost. We also develop a thorough analytical model for evaluating the performance of the proposed scheme. The results demonstrate that our paging scheme can significantly reduce the signaling cost for IP paging, compared with that of a mature paging scheme managed by LMA.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130433747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Gutiérrez-Reina, S. T. Marín, J. M. León-Coca, F. Barrero, N. Bessis, E. Asimakopoulou
{"title":"An Evolutionary Computational Approach for Optimizing Broadcasting in Disaster Response Scenarios","authors":"Daniel Gutiérrez-Reina, S. T. Marín, J. M. León-Coca, F. Barrero, N. Bessis, E. Asimakopoulou","doi":"10.1109/IMIS.2013.25","DOIUrl":"https://doi.org/10.1109/IMIS.2013.25","url":null,"abstract":"Rescue teams require exchanging tactical information to efficiently adapt their behavior to the particular disaster response scenario conditions. Broadcasting is the main technique used to disseminate messages throughout nodes in ad hoc networks. Ad hoc networks are one of the most appealing networks to be used in disaster response scenario due to their decentralized and self-organizing features. While many broadcasting techniques have been presented for ad hoc networks, there are not adaptive broadcasting schemes for disaster response scenarios so far. The complexity of designing broadcasting protocols for disaster response scenarios is high due to the large number of factors affecting the communications among nodes, such as mobility, density, message collisions, etc. In this paper we propose an evolutionary computational approach for designing and optimizing a probability-based broadcast scheme using topological features of nodes. The validity of the proposed approach is shown through simulations.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121163202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks","authors":"J. Sheu, Chih-Yin Lee, Chuang Ma","doi":"10.1109/IMIS.2013.74","DOIUrl":"https://doi.org/10.1109/IMIS.2013.74","url":null,"abstract":"In Delay Tolerant Networks, the delay of packets is long due to the intermittent connections caused by the mobility of nodes. Epidemic Routing Protocol can reduce the delay time and raise the packet delivery rate by replicating and spread copies of source packets in the networks, but it inevitably exhaust memory resources and network bandwidth. In this paper, we propose a network coding with limited buffer routing protocol. When a buffer of a node is full, two packets in the buffer are chosen randomly and encoded linearly together in to a packet to save buffer space and improve the performance in many-to-one communications.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Thoughts on Tax Policy for Promoting the Development of SMEs","authors":"Deng Manyuan","doi":"10.1109/IMIS.2013.153","DOIUrl":"https://doi.org/10.1109/IMIS.2013.153","url":null,"abstract":"SMEs are an important pillar of China's economic development, But now, our tax system in SME development is lagging behind, Including tax support system is not perfect, departments regardless the difference between cost and tax on practice and the tax service system cannot keep up with other issues, create an enabling system of tax incentives for SME development, distinguish the cases of tax and fees at different situations and establish green tax services channel for SMEs.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tradition and Innovation in Japanese Long-Established Companies: Focus on E-Business","authors":"Hidekazu Sone","doi":"10.1109/IMIS.2013.156","DOIUrl":"https://doi.org/10.1109/IMIS.2013.156","url":null,"abstract":"This paper discusses tradition and innovation in Japanese long-established companies and aims to demonstrate the unique characteristics of such companies with a focus on e-business. While it is thought that long-established companies hold stubbornly to tradition and that their management practices are archaic, in actuality, they are flexible in their adaptation to change. Among those adaptations, it is necessary to examine their response to the rapid development of e-business in recent years.To begin, we will provide overview of several long-establish companies upon which our study is based, including Kongo Gumi, and Yasuda-Nenju and Chuuboku-Chaya.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Goshi Sato, K. Hashimoto, Noriki Uchida, Y. Shibata
{"title":"Network Link Selection Method for Disaster Oriented Mobile Network Based on OpenFlow Framework","authors":"Goshi Sato, K. Hashimoto, Noriki Uchida, Y. Shibata","doi":"10.1109/IMIS.2013.61","DOIUrl":"https://doi.org/10.1109/IMIS.2013.61","url":null,"abstract":"In this paper, we introduce a network link selection method for disaster oriented mobile network based on Software Defined Network framework using based on dynamic network reconfiguration method to improve the connectivity. Our network system is consisted of multiple mobile routers based on currently available wireless LANs. Those wireless networks are interconnected by OpenFlow Switch and their links are managed by OpenFlow Controller. The proper communication links can be selected based on the required network characteristic, such as electro-magnetic field strength, throughput, latency, packet loss rate and communication distance. In this paper, we designed and implemented a disaster information wireless network with currently available different wireless LANs and constructed a prototype system to evaluate the performance of the mobile router.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pellicer, Guadalupe Santa, Andrés L. Bleda, Rafael Maestre, A. Jara, A. Gómez-Skarmeta
{"title":"A Global Perspective of Smart Cities: A Survey","authors":"S. Pellicer, Guadalupe Santa, Andrés L. Bleda, Rafael Maestre, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2013.79","DOIUrl":"https://doi.org/10.1109/IMIS.2013.79","url":null,"abstract":"The technological revolution that has taken place in recent decades, driven by advances and developments in Information and Communication Technologies (ICT) has revolutionized the way people communicate, work, travel, live, etc. Cities need to evolve towards intelligent dynamic infrastructures that serve citizens fulfilling the criteria of energy efficiency and sustainability. This article provides an overview of the main smart city applications, and their implementation status in major cities around the world. We also present a study of patents on basic smart city technologies in order to show which countries and companies are making greater efforts to register the intellectual property. The relation between patented technologies and current ongoing smart city applications is also investigated.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Clustering Technique in Android Malware Detection","authors":"Aiman Ahmed Abu Samra, Osama A. Ghanem","doi":"10.1109/IMIS.2013.111","DOIUrl":"https://doi.org/10.1109/IMIS.2013.111","url":null,"abstract":"Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how we can apply clustering techniques in malware detection of Android applications. We also use machine learning techniques in auto detection of malware applications in the Android market. Our evaluation is given by clustering two categories of Android applications: business, and tools. We have extracted 18,174 Android's application files in our evaluation using clustering. We extract the features of the applications from applications' XML-files which contains permissions requested by applications. The results gives a positive indication of using unsupervised machine learning techniques in malware detection in mobile applications using a combination of the application information and xml Android Manifest files.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satoshi Tanaka, T. Yasuda, Bo-Yin Yang, Chen-Mou Cheng, K. Sakurai
{"title":"Efficient Computing over GF(2^16) Using Graphics Processing Unit","authors":"Satoshi Tanaka, T. Yasuda, Bo-Yin Yang, Chen-Mou Cheng, K. Sakurai","doi":"10.1109/IMIS.2013.151","DOIUrl":"https://doi.org/10.1109/IMIS.2013.151","url":null,"abstract":"Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine, e.g., for encryption and signature verification in multivariate cryptography. The security of multivariate cryptography definitely becomes lower if a larger field is used instead of GF(2) given the same number of bits in the key. However, we still would like to use larger fields because multivariate cryptography tends to run faster at the same level of security if a larger field is used. In this paper, we compare the efficiency of several techniques for evaluating multivariate polynomial systems over GF(216) vi their implementations on graphics processing units.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TSR: Topology Reduction from Tree to Star Data Grids","authors":"Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen","doi":"10.1109/IMIS.2013.122","DOIUrl":"https://doi.org/10.1109/IMIS.2013.122","url":null,"abstract":"To speed up data transmission of data grids, several co-allocation schemes have been proposed. However, data grids are often large in scale, heterogeneous in participating resources, and complicated in architecture and network topology, consequently increasing the analytical complexity of its data transmission behaviour. In other words, if we can reduce the data transmission topology for the grid, the analysis will be easier. Therefore, in this paper, we propose a topology reduction approach, called the Tree-to-Star Reduction method (TSR for short), which can reduce a packet delivery tree topology to a star for a data grid so that the data transmission of a co-allocation scheme can be more conveniently analyzed. Here, a delivery tree topology, as a tree topology rooted at the destination node, is a network topology for delivering all fragments of a file to the destination node.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}