P. Addesso, M. Mauro, M. Longo, G. D. Corte, A. Robustelli
The paper presents an architectural proposal that integrates a vehicle parking system, which offers a series of specific services (billing, targeted marketing, etc.), into the 3GPP IP Multimedia Subsystem (IMS), with a specific focus on the localization of the vehicle in indoor areas. The vehicle is equipped with a device hosting an ad-hoc software client exploiting the Wi-Fi network card. The solution takes advantage of the widespread adoption of the 802.11x WLAN technology in order to provide a value added service using already installed infrastructure. The testing area is an indoor parking lot and the IT infrastructure includes several Wi-Fi Access Points appropriately located inside the parking area, some user equipments interacting with them, a Location Server able to provide an estimate of a vehicle's position and a Presence Server offering specific location-based services on behalf of the IMS infrastructure.
{"title":"An Indoor Localization System within an IMS Service Infrastructure","authors":"P. Addesso, M. Mauro, M. Longo, G. D. Corte, A. Robustelli","doi":"10.1145/2536853.2536926","DOIUrl":"https://doi.org/10.1145/2536853.2536926","url":null,"abstract":"The paper presents an architectural proposal that integrates a vehicle parking system, which offers a series of specific services (billing, targeted marketing, etc.), into the 3GPP IP Multimedia Subsystem (IMS), with a specific focus on the localization of the vehicle in indoor areas. The vehicle is equipped with a device hosting an ad-hoc software client exploiting the Wi-Fi network card. The solution takes advantage of the widespread adoption of the 802.11x WLAN technology in order to provide a value added service using already installed infrastructure. The testing area is an indoor parking lot and the IT infrastructure includes several Wi-Fi Access Points appropriately located inside the parking area, some user equipments interacting with them, a Location Server able to provide an estimate of a vehicle's position and a Presence Server offering specific location-based services on behalf of the IMS infrastructure.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of smartphones' core factor of success is the vast amount of available mobile applications. Despite this numerous number of apps there cannot exist one for every single use case. If a user does not find an app fulfilling the requirements, he rarely is able to write one of its own because of (1) missing programming skills, (2) too much time effort for simple tasks and (3) expenses on particular systems. This work proposes a mobile workflow engine on Android to empower users without much technical knowledge to build their solution in a platform-neutral and standardized language called XProc which is the W3C recommendation for data processing via XML technologies. For this purpose one of the XProc implementations is ported to Android and extended with smartphone specific features and services such as location, short messages, mobile UI, etc. Also a trigger mechanism has been implemented to activate workflows based on the user's context like time, location and reception of a short messages. A performance measurement done in this work demonstrates no execution drawback compared to native development after a workflow is compiled to its object representation.
{"title":"A Data Mashup Engine for Smartphones Based on XProc","authors":"H. Hofstätter, Amin Andjomshoaa, A. Tjoa","doi":"10.1145/2536853.2536942","DOIUrl":"https://doi.org/10.1145/2536853.2536942","url":null,"abstract":"One of smartphones' core factor of success is the vast amount of available mobile applications. Despite this numerous number of apps there cannot exist one for every single use case. If a user does not find an app fulfilling the requirements, he rarely is able to write one of its own because of (1) missing programming skills, (2) too much time effort for simple tasks and (3) expenses on particular systems. This work proposes a mobile workflow engine on Android to empower users without much technical knowledge to build their solution in a platform-neutral and standardized language called XProc which is the W3C recommendation for data processing via XML technologies. For this purpose one of the XProc implementations is ported to Android and extended with smartphone specific features and services such as location, short messages, mobile UI, etc. Also a trigger mechanism has been implemented to activate workflows based on the user's context like time, location and reception of a short messages. A performance measurement done in this work demonstrates no execution drawback compared to native development after a workflow is compiled to its object representation.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123990289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smartphones, tablets and other mobile devices are quickly becoming a common part of our lives. With the popularity growth of these devices, the amount of mobile malware and other cyber-attacks rises. Many security solutions exist for various mobile platforms, however firewall functionality is missing in the majority of these applications. The reason is lack of network traffic filtration support in the most of modern mobile operating systems. This leaves the end user devices protected only by security infrastructure of the internet service provider. This paper proposes an enhanced security model and architecture, which enables network traffic filtration for devices without support of such feature in the operating system. It requires minimal changes in the existing infrastructure and allows multiple deployment scenarios. The usage of this architecture is not limited to mobile devices only, but can be used also in fixed networks.
{"title":"Enhancing security in mobile data networks through end user and core network cooperation","authors":"Martin Nagy, I. Kotuliak","doi":"10.1145/2536853.2536875","DOIUrl":"https://doi.org/10.1145/2536853.2536875","url":null,"abstract":"Smartphones, tablets and other mobile devices are quickly becoming a common part of our lives. With the popularity growth of these devices, the amount of mobile malware and other cyber-attacks rises. Many security solutions exist for various mobile platforms, however firewall functionality is missing in the majority of these applications. The reason is lack of network traffic filtration support in the most of modern mobile operating systems. This leaves the end user devices protected only by security infrastructure of the internet service provider. This paper proposes an enhanced security model and architecture, which enables network traffic filtration for devices without support of such feature in the operating system. It requires minimal changes in the existing infrastructure and allows multiple deployment scenarios. The usage of this architecture is not limited to mobile devices only, but can be used also in fixed networks.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126185142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we report our trial to make a better form of personal identification number(PIN) authentication for a mobile device. We think that mobile users should be given a more secure alternative authentication because PIN authentication has well-known flaws. However, proposed alternative schemes change the authentication method drastically and that may discomfort mobile users. Our approach is to just change the input operation of PIN authentication by allowing more than one number at a time using a multi-touch enabled screen. We implemented a web-based prototype system and conducted an informal user study using it. The results of the study indicate that PIN input time, input errors and secret memorability of the proposed scheme were no worse than those of conventional PIN authentication. We also discuss the mathematical security level and other advantages of the scheme.
{"title":"Extended PIN Authentication Scheme Allowing Multi-Touch Key Input","authors":"Tetsuji Takada, Yuki Kokubun","doi":"10.1145/2536853.2536944","DOIUrl":"https://doi.org/10.1145/2536853.2536944","url":null,"abstract":"In this paper, we report our trial to make a better form of personal identification number(PIN) authentication for a mobile device. We think that mobile users should be given a more secure alternative authentication because PIN authentication has well-known flaws. However, proposed alternative schemes change the authentication method drastically and that may discomfort mobile users. Our approach is to just change the input operation of PIN authentication by allowing more than one number at a time using a multi-touch enabled screen. We implemented a web-based prototype system and conducted an informal user study using it. The results of the study indicate that PIN input time, input errors and secret memorability of the proposed scheme were no worse than those of conventional PIN authentication. We also discuss the mathematical security level and other advantages of the scheme.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recommender systems, deployed on the web and in mobile devices, help users in finding services and products that are addressing their needs, based on their profile. On the other hand, such systems help also organizations in promoting their products or services to a targeted market. Users in mobility in smart urban spaces are surrounded with products and services, such as mobile device applications. In this paper, we are presenting the result of a survey, where participants had to give their opinions on recommendation modalities in several scenarios of context-aware service recommendation in urban environments. These results are followed by an analysis and a discussion.
{"title":"Analysis of a context-aware recommender system model for smart urban environment","authors":"Charles Gouin-Vallerand, J. A. D. L. Cruz","doi":"10.1145/2536853.2536931","DOIUrl":"https://doi.org/10.1145/2536853.2536931","url":null,"abstract":"Recommender systems, deployed on the web and in mobile devices, help users in finding services and products that are addressing their needs, based on their profile. On the other hand, such systems help also organizations in promoting their products or services to a targeted market. Users in mobility in smart urban spaces are surrounded with products and services, such as mobile device applications. In this paper, we are presenting the result of a survey, where participants had to give their opinions on recommendation modalities in several scenarios of context-aware service recommendation in urban environments. These results are followed by an analysis and a discussion.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122492628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel approach of inferring the trajectories of moving objects in a library, a conference hall, or a large shopping mall, where GPS, Wi-Fi or cellular localization is not readily available or is deemed too expensive. Our solution is a distributed one whereby each object records all the other objects it encounters as well as the time of contact and such contact histories collectively enable the probabilistic inference of each object's whereabouts in the past as long as the map of the area is known.
{"title":"Probabilistic Inference of Multi-Object Trajectories","authors":"Pengcheng Wang","doi":"10.1145/2536853.2536915","DOIUrl":"https://doi.org/10.1145/2536853.2536915","url":null,"abstract":"This paper presents a novel approach of inferring the trajectories of moving objects in a library, a conference hall, or a large shopping mall, where GPS, Wi-Fi or cellular localization is not readily available or is deemed too expensive. Our solution is a distributed one whereby each object records all the other objects it encounters as well as the time of contact and such contact histories collectively enable the probabilistic inference of each object's whereabouts in the past as long as the map of the area is known.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chrisa Tsinaraki, Giannis Skevakis, Ioanna Trochatou, S. Christodoulakis
We describe MoM-NOCS, a Framework and a System that support communities with common interests in nature to capture and share multimedia observations of nature objects or events using mobile devices. The observations are automatically associated with contextual metadata that allow them to be visualized on top of 2D or 3D maps. The observations are managed by a multimedia management system, and annotated by the same and/or other users with common interests. Annotations made by the crowd support the knowledge distillation of the data and data provenance processes in the system. The Framework offers rich functionality for visualizing the observations made by the crowd as function of time. We have designed the MoM-NOCS to be complementary and interoperable with systems that are managed by Natural History museums like MMAT [8] and biodiversity metadata management systems like BIOCASE [4] and GBIF [6] so that they can link to interesting observations in our system, and the statistics on the observations that they manage can be visualized by our software.
{"title":"MoM-NOCS: Management of Mobile Multimedia Nature Observations using Crowd Sourcing","authors":"Chrisa Tsinaraki, Giannis Skevakis, Ioanna Trochatou, S. Christodoulakis","doi":"10.1145/2536853.2536887","DOIUrl":"https://doi.org/10.1145/2536853.2536887","url":null,"abstract":"We describe MoM-NOCS, a Framework and a System that support communities with common interests in nature to capture and share multimedia observations of nature objects or events using mobile devices. The observations are automatically associated with contextual metadata that allow them to be visualized on top of 2D or 3D maps. The observations are managed by a multimedia management system, and annotated by the same and/or other users with common interests. Annotations made by the crowd support the knowledge distillation of the data and data provenance processes in the system. The Framework offers rich functionality for visualizing the observations made by the crowd as function of time. We have designed the MoM-NOCS to be complementary and interoperable with systems that are managed by Natural History museums like MMAT [8] and biodiversity metadata management systems like BIOCASE [4] and GBIF [6] so that they can link to interesting observations in our system, and the statistics on the observations that they manage can be visualized by our software.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127450260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For wireless systems, it is of vital importance to use the scarce radio resources in an efficient way. In a typical system, each layer adds its own header, resulting in prohibitive signaling overhead. Several header compression schemes have been proposed to reduce this overhead. All compression schemes must be kept simple to cope with high load. Unfortunately, existing compression schemes cover, each, no more than two layers taking advantage of header format knowledge. We propose a header compression scheme that can cover all layers, from the 802.11 MAC layer up to the Application layer, without required knowledge of the headers format. We compare our proposal to a general simple compression scheme, and show that our proposal processing time is 60% faster. We show that on average, in a typical scenario, with high SNR, we reduce the header overhead by 70 bytes.
{"title":"General all-Layers combined with Efficient WLAN MAC Layer Headers Compression","authors":"David Levy, I. Kotuliak","doi":"10.1145/2536853.2536858","DOIUrl":"https://doi.org/10.1145/2536853.2536858","url":null,"abstract":"For wireless systems, it is of vital importance to use the scarce radio resources in an efficient way. In a typical system, each layer adds its own header, resulting in prohibitive signaling overhead. Several header compression schemes have been proposed to reduce this overhead. All compression schemes must be kept simple to cope with high load. Unfortunately, existing compression schemes cover, each, no more than two layers taking advantage of header format knowledge. We propose a header compression scheme that can cover all layers, from the 802.11 MAC layer up to the Application layer, without required knowledge of the headers format. We compare our proposal to a general simple compression scheme, and show that our proposal processing time is 60% faster. We show that on average, in a typical scenario, with high SNR, we reduce the header overhead by 70 bytes.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometric gait authentication using Personal Mobile Device (PMD) based accelerometer sensors offers a user-friendly, unobtrusive, and periodic way of authenticating individuals on PMD. In this paper, we present a technique for gait cycle extraction by incorporating the Piecewise Linear Approximation (PLA) technique. We also present two new approaches to classify gait features extracted from the cycle-based segmentation by using Support Vector Machines (SVMs); a) pre-computed data matrix, b) pre-computed kernel matrix. In the first approach, we used Dynamic Time Warping (DTW) distance to compute data matrices, and in the later DTW is used for constructing an elastic similarity measure based kernel function called Gaussian Dynamic Time Warp (GDTW) kernel. Both approaches utilize the DTW similarity measure and can be used for classifying equal length gait cycles, as well as different length gait cycles. To evaluate our approaches we used normal walk biometric gait data of 51 participants. This gait data is collected by attaching a PMD to the belt around the waist, on the right-hand side of the hip. Results show that these new approaches need to be studied more, and potentially lead us to design more robust and reliable gait authentication systems using PMD based accelerometer sensor.
{"title":"An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers","authors":"Muhammad Muaaz, R. Mayrhofer","doi":"10.1145/2536853.2536895","DOIUrl":"https://doi.org/10.1145/2536853.2536895","url":null,"abstract":"Biometric gait authentication using Personal Mobile Device (PMD) based accelerometer sensors offers a user-friendly, unobtrusive, and periodic way of authenticating individuals on PMD. In this paper, we present a technique for gait cycle extraction by incorporating the Piecewise Linear Approximation (PLA) technique. We also present two new approaches to classify gait features extracted from the cycle-based segmentation by using Support Vector Machines (SVMs); a) pre-computed data matrix, b) pre-computed kernel matrix. In the first approach, we used Dynamic Time Warping (DTW) distance to compute data matrices, and in the later DTW is used for constructing an elastic similarity measure based kernel function called Gaussian Dynamic Time Warp (GDTW) kernel. Both approaches utilize the DTW similarity measure and can be used for classifying equal length gait cycles, as well as different length gait cycles. To evaluate our approaches we used normal walk biometric gait data of 51 participants. This gait data is collected by attaching a PMD to the belt around the waist, on the right-hand side of the hip. Results show that these new approaches need to be studied more, and potentially lead us to design more robust and reliable gait authentication systems using PMD based accelerometer sensor.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ouiame Filali Marzouki, Mohammed Khalidi, S. Bennani
Mobile learning seems to meet the growing need for communication, collaboration and obtaining relevant information at the appropriate time. It introduces new activities from real world through the use of mobile and wireless technologies in educational contexts. Thus, reviewing irregular verbs on a bus or organizing a training schedule on Smartphones is becoming more common today. Mobile learning development has been slowed in the early 2000s by both technical limitations and lack of teaching models. In this paper we propose a solution to educational issues by adopting the Method for Engineering Learning Systems MISA. Our work aims to identify key characteristics and dimensions for developing the appropriate content for mobility. These elements are the basis for customization of MISA method. Indeed, the different steps of MISA are governed by operating principles which ensure greater consistency and flexibility. Integrating mobile learning specifications in the development of these principles, we can adapt this method to design a mobile educational system.
{"title":"Mobile Education: Effective Integration of new mobile technologies into existing learning systems using MISA Method","authors":"Ouiame Filali Marzouki, Mohammed Khalidi, S. Bennani","doi":"10.1145/2536853.2536862","DOIUrl":"https://doi.org/10.1145/2536853.2536862","url":null,"abstract":"Mobile learning seems to meet the growing need for communication, collaboration and obtaining relevant information at the appropriate time. It introduces new activities from real world through the use of mobile and wireless technologies in educational contexts. Thus, reviewing irregular verbs on a bus or organizing a training schedule on Smartphones is becoming more common today. Mobile learning development has been slowed in the early 2000s by both technical limitations and lack of teaching models. In this paper we propose a solution to educational issues by adopting the Method for Engineering Learning Systems MISA. Our work aims to identify key characteristics and dimensions for developing the appropriate content for mobility. These elements are the basis for customization of MISA method. Indeed, the different steps of MISA are governed by operating principles which ensure greater consistency and flexibility. Integrating mobile learning specifications in the development of these principles, we can adapt this method to design a mobile educational system.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}