Hyun-Soo Seo, Chang-Jin Lee, Hyo-Un Kim, D. Noh, Sang-sun Lee
We present a wireless vehicle-to-vehicle communications-based safety application to assist drivers with safe left turns at unsignalized intersections. When a potentially dangerous situation such as an oncoming vehicle from the opposite lane is detected, our system can provide the driver with a warning. Our system gives advisory or imminent warnings according to the predicted accident levels through a HMI. For a performance test of our application, we configured three test scenarios and tested our system with vehicles on a proving ground. The test results showed 93% success rates.
{"title":"A Left Turn Assist Application using Wireless Vehicle-to-Vehicle Communications at Unsignalized Intersections","authors":"Hyun-Soo Seo, Chang-Jin Lee, Hyo-Un Kim, D. Noh, Sang-sun Lee","doi":"10.1145/2536853.2536922","DOIUrl":"https://doi.org/10.1145/2536853.2536922","url":null,"abstract":"We present a wireless vehicle-to-vehicle communications-based safety application to assist drivers with safe left turns at unsignalized intersections. When a potentially dangerous situation such as an oncoming vehicle from the opposite lane is detected, our system can provide the driver with a warning. Our system gives advisory or imminent warnings according to the predicted accident levels through a HMI. For a performance test of our application, we configured three test scenarios and tested our system with vehicles on a proving ground. The test results showed 93% success rates.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sigg, Shuyu Shi, Felix Büsching, Yusheng Ji, L. Wolf
We consider the recognition of activities from passive entities by analysing radio-frequency (RF)-channel fluctuation. In particular, we focus on the recognition of activities by active Software-defined-radio (SDR)-based Device-free Activity Recognition (DFAR) systems and investigate the localisation of activities performed, the generalisation of features for alternative environments and the distinction between walking speeds. Furthermore, we conduct case studies for Received Signal Strength (RSS)-based active and continuous signal-based passive systems to exploit the accuracy decrease in these related cases. All systems are compared to an accelerometer-based recognition system.
{"title":"Leveraging RF-channel fluctuation for activity recognition: Active and passive systems, continuous and RSSI-based signal features","authors":"S. Sigg, Shuyu Shi, Felix Büsching, Yusheng Ji, L. Wolf","doi":"10.1145/2536853.2536873","DOIUrl":"https://doi.org/10.1145/2536853.2536873","url":null,"abstract":"We consider the recognition of activities from passive entities by analysing radio-frequency (RF)-channel fluctuation. In particular, we focus on the recognition of activities by active Software-defined-radio (SDR)-based Device-free Activity Recognition (DFAR) systems and investigate the localisation of activities performed, the generalisation of features for alternative environments and the distinction between walking speeds. Furthermore, we conduct case studies for Received Signal Strength (RSS)-based active and continuous signal-based passive systems to exploit the accuracy decrease in these related cases. All systems are compared to an accelerometer-based recognition system.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132784043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Christodoulakis, Michalis Foukarakis, Chrisa Tsinaraki, Eleni Kanellidi, L. Ragia
We describe SPIM (Spatial Image Management), a framework and a system that allow identification and visualization of the semantics of distant objects in nature, which exist in pictures taken by mobile devices. Semantic objects in nature are represented on 3D maps and tagged with semantic and spatial descriptors. The system functionality creates, on top of pictures, a layer that allows semantic user browsing in augmented geospatial images, semantic object identification in pictures, object interaction, contextual map visualization, and interlinking of information in digital libraries and the web. We present requirements of semantic geospatial descriptions, system functionality, matching algorithms and experimental results.
{"title":"Contextual Geospatial Picture Understanding, Management and Visualization","authors":"S. Christodoulakis, Michalis Foukarakis, Chrisa Tsinaraki, Eleni Kanellidi, L. Ragia","doi":"10.1145/2536853.2536938","DOIUrl":"https://doi.org/10.1145/2536853.2536938","url":null,"abstract":"We describe SPIM (Spatial Image Management), a framework and a system that allow identification and visualization of the semantics of distant objects in nature, which exist in pictures taken by mobile devices. Semantic objects in nature are represented on 3D maps and tagged with semantic and spatial descriptors. The system functionality creates, on top of pictures, a layer that allows semantic user browsing in augmented geospatial images, semantic object identification in pictures, object interaction, contextual map visualization, and interlinking of information in digital libraries and the web. We present requirements of semantic geospatial descriptions, system functionality, matching algorithms and experimental results.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given a set of data items broadcasting at multiple parallel channels, where each channel has the same broadcast pattern over a time period, and a set of client's requested data items, the data retrieval problem requires to find a sequence of channel access to retrieve the requested data items among the channels such that the total access latency is minimized, where both channel access (to retrieve a data item) and channel switch are assumed to take a single time slot. As an important problem of information retrieval in wireless networks, this problem arises in many applications such as e-commerce and ubiquitous data sharing, and is known two conflicts: requested data items are broadcast at same time slots or adjacent time slots in different channels. Although existing studies focus on this problem with one conflict, there is little work on this problem with two conflicts. So this paper proposes efficient algorithms from two views: single antenna and multiple antennae. Our algorithm adopts a novel approach that wireless data broadcast system is converted to DAG, and applies set cover to solve this problem. Through Experiments, this result presents currently the most efficient algorithm for this problem with two conflicts.
{"title":"Efficient Approximation Algorithm for Data Retrieval with Conflicts in Wireless Networks","authors":"Ping He, Hong Shen, Hui Tian","doi":"10.1145/2536853.2536879","DOIUrl":"https://doi.org/10.1145/2536853.2536879","url":null,"abstract":"Given a set of data items broadcasting at multiple parallel channels, where each channel has the same broadcast pattern over a time period, and a set of client's requested data items, the data retrieval problem requires to find a sequence of channel access to retrieve the requested data items among the channels such that the total access latency is minimized, where both channel access (to retrieve a data item) and channel switch are assumed to take a single time slot. As an important problem of information retrieval in wireless networks, this problem arises in many applications such as e-commerce and ubiquitous data sharing, and is known two conflicts: requested data items are broadcast at same time slots or adjacent time slots in different channels. Although existing studies focus on this problem with one conflict, there is little work on this problem with two conflicts. So this paper proposes efficient algorithms from two views: single antenna and multiple antennae. Our algorithm adopts a novel approach that wireless data broadcast system is converted to DAG, and applies set cover to solve this problem. Through Experiments, this result presents currently the most efficient algorithm for this problem with two conflicts.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Confidentiality of Voice-over-IP (VoIP) based telecommunication has been an important topic in the past and gained relevance in the recent months. However, especially in private environments, secure communication has not been established yet. In this paper we introduce a new approach to secure private and business telecommunication using available digital identities, eg. social network identities. First, we focus on the confidentiality and integrity of the media data and second on the authenticity of the caller's identity. The objective is to prevent attackers to successfully eavesdrop VoIP-based phone calls.
{"title":"Digital Identity based VoIP Authentication Mechanism","authors":"Andreas Plies, M. Massoth, I. Stengel","doi":"10.1145/2536853.2536928","DOIUrl":"https://doi.org/10.1145/2536853.2536928","url":null,"abstract":"Confidentiality of Voice-over-IP (VoIP) based telecommunication has been an important topic in the past and gained relevance in the recent months. However, especially in private environments, secure communication has not been established yet. In this paper we introduce a new approach to secure private and business telecommunication using available digital identities, eg. social network identities. First, we focus on the confidentiality and integrity of the media data and second on the authenticity of the caller's identity. The objective is to prevent attackers to successfully eavesdrop VoIP-based phone calls.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper outlines the application of ZigBee and Radio Frequency Identification (RFID) technologies using the Internet of Things (IoT) in a healthcare environment. The Internet of Things, RFID, ZigBee and Cloud computing are emerging technologies in computing, and the association between them can be used to control complex human interaction and to reduce cost and task times through connecting Smart devices to the Internet. The extraordinary growth of those technologies has made it possible to identify, locate and track objects in various environments. These technologies could allow pervasive computing systems to be more efficiently managed in terms of locating and tracking of objects in future operations. RFID technology is a non-contact identification that does not require direct line of sight to the target object. RFID is cheap (<5 p for passive tag) and reliable, but the coverage zone is limited especially for a passive tag (<11m). In the proposed system, the combination of ZigBee and RFID is designed from two aspects, firstly to provide access control and location position and secondly, to use low power output as ZigBee devices offer a larger coverage to monitor and to confirm the location of the object and continually check the position of the target objects. The proposed system uses the combination of both emerging technologies with ZigBee used to detect and locate an object and RFID used to identify the 'gate' or 'door' positions of an object at designated floor level.
{"title":"Application of ZigBee and RFID Technologies in Healthcare in Conjunction with the Internet of Things","authors":"N. Alharbe, A. Atkins, A. S. Akbari","doi":"10.1145/2536853.2536904","DOIUrl":"https://doi.org/10.1145/2536853.2536904","url":null,"abstract":"The paper outlines the application of ZigBee and Radio Frequency Identification (RFID) technologies using the Internet of Things (IoT) in a healthcare environment. The Internet of Things, RFID, ZigBee and Cloud computing are emerging technologies in computing, and the association between them can be used to control complex human interaction and to reduce cost and task times through connecting Smart devices to the Internet. The extraordinary growth of those technologies has made it possible to identify, locate and track objects in various environments. These technologies could allow pervasive computing systems to be more efficiently managed in terms of locating and tracking of objects in future operations. RFID technology is a non-contact identification that does not require direct line of sight to the target object. RFID is cheap (<5 p for passive tag) and reliable, but the coverage zone is limited especially for a passive tag (<11m). In the proposed system, the combination of ZigBee and RFID is designed from two aspects, firstly to provide access control and location position and secondly, to use low power output as ZigBee devices offer a larger coverage to monitor and to confirm the location of the object and continually check the position of the target objects. The proposed system uses the combination of both emerging technologies with ZigBee used to detect and locate an object and RFID used to identify the 'gate' or 'door' positions of an object at designated floor level.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dilawaer Duolikun, A. Aikebaier, T. Enokido, L. Barolli, M. Takizawa
Processes requested by clients are performed on servers in a cluster of servers. Here, not only QoS (quality of service) requirements like response time are satisfied but also the total electric power consumed by servers to perform processes has to be reduced. Furthermore, each process has to be reliably performed in presence of server faults. In this paper, we consider a mobile agent where a process, i.e. mobile agent, is reliably performed by moving around servers in presence of server faults. A replica of a mobile agent is first performed on one primary server while the other replicas of the agent are sent to other secondary servers. While performing the primary agent replica, the server takes checkpoints of the primary agent replica and sends the checkpoints to the secondary agent replicas. If the primary replica is faulty due to the fault of the primary server, one of the secondary replicas takes over the primary replica. The more number of agent replicas are performed, the more reliably the agent can be performed but the more amount of electric power is consumed by the servers. Hence, it is critical to discuss how to reliably and energy-efficiently perform mobile agents on multiple servers. In this paper, we discuss how to reduce the total electric power consumption in a cluster where each agent is passively replicated on multiple servers. If the primary server is faulty, one of the secondary servers gets primary. We evaluate the energy-efficient passive replication (EPR) scheme of a mobile agent in terms of total power consumption and average execution time and response time of each mobile agent in presence of server fault.
{"title":"Energy-efficient Passive Replication of a Process in Mobile Environment","authors":"Dilawaer Duolikun, A. Aikebaier, T. Enokido, L. Barolli, M. Takizawa","doi":"10.1145/2536853.2536865","DOIUrl":"https://doi.org/10.1145/2536853.2536865","url":null,"abstract":"Processes requested by clients are performed on servers in a cluster of servers. Here, not only QoS (quality of service) requirements like response time are satisfied but also the total electric power consumed by servers to perform processes has to be reduced. Furthermore, each process has to be reliably performed in presence of server faults. In this paper, we consider a mobile agent where a process, i.e. mobile agent, is reliably performed by moving around servers in presence of server faults. A replica of a mobile agent is first performed on one primary server while the other replicas of the agent are sent to other secondary servers. While performing the primary agent replica, the server takes checkpoints of the primary agent replica and sends the checkpoints to the secondary agent replicas. If the primary replica is faulty due to the fault of the primary server, one of the secondary replicas takes over the primary replica. The more number of agent replicas are performed, the more reliably the agent can be performed but the more amount of electric power is consumed by the servers. Hence, it is critical to discuss how to reliably and energy-efficiently perform mobile agents on multiple servers. In this paper, we discuss how to reduce the total electric power consumption in a cluster where each agent is passively replicated on multiple servers. If the primary server is faulty, one of the secondary servers gets primary. We evaluate the energy-efficient passive replication (EPR) scheme of a mobile agent in terms of total power consumption and average execution time and response time of each mobile agent in presence of server fault.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile location-based services (LBS) usually define locations in an absolute way, mainly coordinates. However, this absolute presentation of location rarely appears in the context of daily life. Instead, people tend to use relative location, defined on the basis of a location with relation to other locations. Research in cognitive geography also imply that relative location is closer to the human cognitive model. We suggest that this discrepancy between the understanding of "location" from the human being side and the machine side acts as a major intrinsic cause of many problems shown in today's LBS, such as usability, accessibility or privacy issues. In this paper, benefits of taking advantages of relative location information are discussed. A framework of relative location orientated social networking is proposed by analyzing location related human knowledge and activities. To reveal potential challenges, a prototype is proposed and evaluated.
{"title":"Relative Location Oriented Mobile LBS","authors":"R. Xiao, Zhanwei Wu, Kazunori Sugiura","doi":"10.1145/2536853.2536937","DOIUrl":"https://doi.org/10.1145/2536853.2536937","url":null,"abstract":"Mobile location-based services (LBS) usually define locations in an absolute way, mainly coordinates. However, this absolute presentation of location rarely appears in the context of daily life. Instead, people tend to use relative location, defined on the basis of a location with relation to other locations. Research in cognitive geography also imply that relative location is closer to the human cognitive model. We suggest that this discrepancy between the understanding of \"location\" from the human being side and the machine side acts as a major intrinsic cause of many problems shown in today's LBS, such as usability, accessibility or privacy issues. In this paper, benefits of taking advantages of relative location information are discussed. A framework of relative location orientated social networking is proposed by analyzing location related human knowledge and activities. To reveal potential challenges, a prototype is proposed and evaluated.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoko Iimura, Masahiro Oota, S. Tachimoto, Yuichi Kojo
Recently, various kinds of automatic translator services have become available. Most of them are provided as a client-server model. We developed a phone call translator service, which enables people speaking different languages to communicate with each other over the phone. In this paper, we present the system architecture of the service and describe how the system works.
{"title":"Phone call translator system in realtime","authors":"Yoko Iimura, Masahiro Oota, S. Tachimoto, Yuichi Kojo","doi":"10.1145/2536853.2536907","DOIUrl":"https://doi.org/10.1145/2536853.2536907","url":null,"abstract":"Recently, various kinds of automatic translator services have become available. Most of them are provided as a client-server model. We developed a phone call translator service, which enables people speaking different languages to communicate with each other over the phone. In this paper, we present the system architecture of the service and describe how the system works.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2013, Tsai et al. proposed a reversible data hiding scheme based on neighboring pixel differences. Although their scheme has better quality than histogram shifting based typical schemes, the hiding capacity is smaller than other schemes. In this paper, an improved Tsai et al.'s scheme is proposed by using three neighboring pixel differences and an absolute value of a difference. In our experimental results, the hiding capacity and image quality of the proposed scheme is superior to their scheme.
{"title":"An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences","authors":"Dae-Soo Kim, Geum-Dal Park, K. Yoo","doi":"10.1145/2536853.2536939","DOIUrl":"https://doi.org/10.1145/2536853.2536939","url":null,"abstract":"In 2013, Tsai et al. proposed a reversible data hiding scheme based on neighboring pixel differences. Although their scheme has better quality than histogram shifting based typical schemes, the hiding capacity is smaller than other schemes. In this paper, an improved Tsai et al.'s scheme is proposed by using three neighboring pixel differences and an absolute value of a difference. In our experimental results, the hiding capacity and image quality of the proposed scheme is superior to their scheme.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}