R. Beuran, J. Nakata, T. Okada, L. Nguyen, Yasuo Tan, Y. Shinoda
In this paper we present the design and usage of the multi-purpose wireless network emulator that we develop, QOMET. QOMET implements a two-stage scenario-driven approach to wireless network emulation. We give here the details of the improved model and additional functionality that make it currently possible to use QOMET to convert a real- world scenario to a sequence of network-condition descriptors for a wide range of experiments. QOMET was used on a real network testbed to perform experiments involving emulated 802.11 a/b/g WLAN technology over wired networks for several types of scenarios. We shall illustrate this in the final part of the paper, with emphasis on networked robot emulation.
{"title":"A Multi-Purpose Wireless Network Emulator: QOMET","authors":"R. Beuran, J. Nakata, T. Okada, L. Nguyen, Yasuo Tan, Y. Shinoda","doi":"10.1109/WAINA.2008.111","DOIUrl":"https://doi.org/10.1109/WAINA.2008.111","url":null,"abstract":"In this paper we present the design and usage of the multi-purpose wireless network emulator that we develop, QOMET. QOMET implements a two-stage scenario-driven approach to wireless network emulation. We give here the details of the improved model and additional functionality that make it currently possible to use QOMET to convert a real- world scenario to a sequence of network-condition descriptors for a wide range of experiments. QOMET was used on a real network testbed to perform experiments involving emulated 802.11 a/b/g WLAN technology over wired networks for several types of scenarios. We shall illustrate this in the final part of the paper, with emphasis on networked robot emulation.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
RFID, Radio Frequency Identification Systems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID.
{"title":"A Critical Analysis of RFID Security Protocols","authors":"Atif Sharif, V. Potdar","doi":"10.1109/WAINA.2008.212","DOIUrl":"https://doi.org/10.1109/WAINA.2008.212","url":null,"abstract":"RFID, Radio Frequency Identification Systems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123159011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In quality control of industrial products, it is very important that not only qualities of materials and parts, design, but also a manufacturing work accords to instruction manuals for manufacturing process. Generally, most assembly process such as assembly line and cell production system have processes in everywhere to confirm quality and work in former processes. However, there are some cases that are difficult to be confirmed in later processes. For example, to fix a part by some screws, it is desirable to drive in diagonal order little by little. However, it is not easy to detect in appearance in case of this desirable procedure is violated. Therefore, we are developing a system to improve quality of industrial products. This system deals manufacturing processes as context, and grasp manufacturing process, recognizes context by tracing motions of worker's arm/hand by using terrestrial magnetism sensors and accelerometers. In this paper, as first step, we show that violation of desirable motion is distinguishable by dividing manufacturing process as context into some fundamental motion, and tracing motions by each context. Also, we discuss on fundamental conditions to introduce the system in actual manufacturing process.
{"title":"Quality Control Schemes for Industrial Production by Workers' Motion Capture","authors":"Nobuyoshi Sato, Y. Murata","doi":"10.1109/WAINA.2008.25","DOIUrl":"https://doi.org/10.1109/WAINA.2008.25","url":null,"abstract":"In quality control of industrial products, it is very important that not only qualities of materials and parts, design, but also a manufacturing work accords to instruction manuals for manufacturing process. Generally, most assembly process such as assembly line and cell production system have processes in everywhere to confirm quality and work in former processes. However, there are some cases that are difficult to be confirmed in later processes. For example, to fix a part by some screws, it is desirable to drive in diagonal order little by little. However, it is not easy to detect in appearance in case of this desirable procedure is violated. Therefore, we are developing a system to improve quality of industrial products. This system deals manufacturing processes as context, and grasp manufacturing process, recognizes context by tracing motions of worker's arm/hand by using terrestrial magnetism sensors and accelerometers. In this paper, as first step, we show that violation of desirable motion is distinguishable by dividing manufacturing process as context into some fundamental motion, and tracing motions by each context. Also, we discuss on fundamental conditions to introduce the system in actual manufacturing process.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keita Matsuo, L. Barolli, F. Xhafa, A. Koyama, A. Durresi, M. Takizawa
In this paper, we present the design and implementation of the JXTA-based e-Learning P2P system. We also show the design and implementation of a smart box environment that will be used for stimulating the learners to increase the learning efficiency. The smart box is intended to be integrated with our P2P system as a useful tool for monitoring and controlling learners' activity. Finally, it is also useful to evaluate the feasibility of our P2P platform to integrate different computational devices.
{"title":"Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment","authors":"Keita Matsuo, L. Barolli, F. Xhafa, A. Koyama, A. Durresi, M. Takizawa","doi":"10.1109/WAINA.2008.46","DOIUrl":"https://doi.org/10.1109/WAINA.2008.46","url":null,"abstract":"In this paper, we present the design and implementation of the JXTA-based e-Learning P2P system. We also show the design and implementation of a smart box environment that will be used for stimulating the learners to increase the learning efficiency. The smart box is intended to be integrated with our P2P system as a useful tool for monitoring and controlling learners' activity. Finally, it is also useful to evaluate the feasibility of our P2P platform to integrate different computational devices.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123739661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an algorithm for automatic location of alpha and theta waves in electroencephalogram. This algorithm is a part of developments that aim to process EEG and electroocculogram in order to estimate the drowsiness level of active subjects.. Our algorithm is based on a method recently developed to analyse non-stationary signals: Hilbert Huang transform (HHT). This transform proposes to decompose multi-modal signals into a sum of mono- contribution functions called intrinsic mode functions, then to use the Hilbert transform to compute the instantaneous frequency of each IMF. After a brief review of HHT principles, we propose a qualitative analysis of Hilbert transform accuracy and a method to decrease computation errors that appears when amplitude of the analysed signal is small. The last section of this paper presents the algorithm proposed to locate alpha and theta waves and preliminary results.
{"title":"EEG Analysis Using HHT: One Step Toward Automatic Drowsiness Scoring","authors":"H. Sharabaty, B. Jammes, D. Esteve","doi":"10.1109/WAINA.2008.271","DOIUrl":"https://doi.org/10.1109/WAINA.2008.271","url":null,"abstract":"This paper proposes an algorithm for automatic location of alpha and theta waves in electroencephalogram. This algorithm is a part of developments that aim to process EEG and electroocculogram in order to estimate the drowsiness level of active subjects.. Our algorithm is based on a method recently developed to analyse non-stationary signals: Hilbert Huang transform (HHT). This transform proposes to decompose multi-modal signals into a sum of mono- contribution functions called intrinsic mode functions, then to use the Hilbert transform to compute the instantaneous frequency of each IMF. After a brief review of HHT principles, we propose a qualitative analysis of Hilbert transform accuracy and a method to decrease computation errors that appears when amplitude of the analysed signal is small. The last section of this paper presents the algorithm proposed to locate alpha and theta waves and preliminary results.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In conventional networks, such as the Internet, it is assumed that there exists a fully connected path between any pair of nodes at any time. In delay tolerant networks (DTN), however, the connected path may be broken, and nodes may be partitioned into two disconnected subsets because of the movement or failure of some nodes. Thus, the data transmission requirements can not be satisfied by traditional routing schemes. How to efficiently route data in DTNs has therefore become a critical and challenging issue. To address the problem, we propose a contact-duration-based probabilistic routing scheme (PR_CD) based on the probabilistic routing scheme PRoPHET (PR). Each node in the PRCD scheme predicts the current network condition by using contact information, and then chooses appropriate relay nodes to improve the delivery rate as well as reduce the transmission latency and transmission overhead. To evaluate the efficacy of the proposed scheme, we use simulations to conduct a comprehensive study of different DTN routing mechanisms. We believe such a study is important because the ability to characterize the behavior and performance of routing schemes plays a key role in the understanding and design of DTNs.
{"title":"Performance Study of Routing Schemes in Delay Tolerant Networks","authors":"Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou","doi":"10.1109/WAINA.2008.216","DOIUrl":"https://doi.org/10.1109/WAINA.2008.216","url":null,"abstract":"In conventional networks, such as the Internet, it is assumed that there exists a fully connected path between any pair of nodes at any time. In delay tolerant networks (DTN), however, the connected path may be broken, and nodes may be partitioned into two disconnected subsets because of the movement or failure of some nodes. Thus, the data transmission requirements can not be satisfied by traditional routing schemes. How to efficiently route data in DTNs has therefore become a critical and challenging issue. To address the problem, we propose a contact-duration-based probabilistic routing scheme (PR_CD) based on the probabilistic routing scheme PRoPHET (PR). Each node in the PRCD scheme predicts the current network condition by using contact information, and then chooses appropriate relay nodes to improve the delivery rate as well as reduce the transmission latency and transmission overhead. To evaluate the efficacy of the proposed scheme, we use simulations to conduct a comprehensive study of different DTN routing mechanisms. We believe such a study is important because the ability to characterize the behavior and performance of routing schemes plays a key role in the understanding and design of DTNs.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, centroid-based document classifiers receive wide interests from text mining community because of their simplicity and linear-time complexity. However, the traditional centroid-based classifiers usually perform less effectively for Chinese text categorization. In this paper, we tackle the problem by developing a new way to calculate the class-specific weights for each term in the training phase; in the testing phase, the new documents are assigned to the centroid to which the document is most similar based on the weighted distance measurement. The experimental results demonstrate that the accuracy of our algorithm outperforms the traditional centroid-based classifiers, as well as outstanding efficiency compared with the Support Vector Machine (SVM) based classifiers for Chinese text categorization.
{"title":"A New Centroid-Based Classifier for Text Categorization","authors":"Lifei Chen, Yanfang Ye, Q. Jiang","doi":"10.1109/WAINA.2008.12","DOIUrl":"https://doi.org/10.1109/WAINA.2008.12","url":null,"abstract":"In recent years, centroid-based document classifiers receive wide interests from text mining community because of their simplicity and linear-time complexity. However, the traditional centroid-based classifiers usually perform less effectively for Chinese text categorization. In this paper, we tackle the problem by developing a new way to calculate the class-specific weights for each term in the training phase; in the testing phase, the new documents are assigned to the centroid to which the document is most similar based on the weighted distance measurement. The experimental results demonstrate that the accuracy of our algorithm outperforms the traditional centroid-based classifiers, as well as outstanding efficiency compared with the Support Vector Machine (SVM) based classifiers for Chinese text categorization.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"2018 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Hwang, B. Hwang, Ruey-Rong Su, K. R. Lai, C. Lin
A lot of wireless standards are proposed to satisfy diversified requirements for mobile users such as IEEE 802.16 and IEEE 802.11. It is feasible to integrate heterogeneous networks to provide complete wireless services. Several strategies were proposed to realize seamless handoff in the heterogeneous networks; however, most of them were only designed to meet system performance or individual QoS requirements for mobile users individually. In this paper, we propose an individual and system views (ISV) strategy integrating the individual view (IV) and system view (SV) to provide the proactive method that can choose the Internet Service Providers by MS and make the deliberated vertical handoff procedures with high throughput of UGS and call management services in heterogeneous networks. Our proposed strategy provides a complete procedure to determine the target network that has not been offered in most papers. Moreover, according to simulation results, the proposed ISV strategy is able to earn significantly lower handoff times than IV and SV and provide stable wireless network given high precedence for UGS traffic and real-time services.
{"title":"An Integrated ISV Call Management Strategy in Heterogeneous Wireless Networks","authors":"I. Hwang, B. Hwang, Ruey-Rong Su, K. R. Lai, C. Lin","doi":"10.1109/WAINA.2008.284","DOIUrl":"https://doi.org/10.1109/WAINA.2008.284","url":null,"abstract":"A lot of wireless standards are proposed to satisfy diversified requirements for mobile users such as IEEE 802.16 and IEEE 802.11. It is feasible to integrate heterogeneous networks to provide complete wireless services. Several strategies were proposed to realize seamless handoff in the heterogeneous networks; however, most of them were only designed to meet system performance or individual QoS requirements for mobile users individually. In this paper, we propose an individual and system views (ISV) strategy integrating the individual view (IV) and system view (SV) to provide the proactive method that can choose the Internet Service Providers by MS and make the deliberated vertical handoff procedures with high throughput of UGS and call management services in heterogeneous networks. Our proposed strategy provides a complete procedure to determine the target network that has not been offered in most papers. Moreover, according to simulation results, the proposed ISV strategy is able to earn significantly lower handoff times than IV and SV and provide stable wireless network given high precedence for UGS traffic and real-time services.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114246328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Cuadrado, Boni García, Juan C. Dueñas, G. HugoA.Parada
The evolution of any software product over its lifetime is unavoidable, caused both by bugs to be fixed and by new requirements appearing in the later stages of the product's lifecycle. Traditional development and architecture paradigms have proven to be not suited for these continual changes, resulting in large maintenance costs. This has caused the rise of approaches such as Service Oriented Architectures (SOA), based on loosely coupled, interoperable services, aiming to address these issues. This paper describes a case study of the evolution of an existing legacy system towards a more maintainable SOA. The proposed process includes the recovery of the legacy system architecture, as a first step to define the specific evolution plan to be executed and validated. The case study has been applied to a medical imaging system, evolving it into a service model.
{"title":"A Case Study on Software Evolution towards Service-Oriented Architecture","authors":"F. Cuadrado, Boni García, Juan C. Dueñas, G. HugoA.Parada","doi":"10.1109/WAINA.2008.296","DOIUrl":"https://doi.org/10.1109/WAINA.2008.296","url":null,"abstract":"The evolution of any software product over its lifetime is unavoidable, caused both by bugs to be fixed and by new requirements appearing in the later stages of the product's lifecycle. Traditional development and architecture paradigms have proven to be not suited for these continual changes, resulting in large maintenance costs. This has caused the rise of approaches such as Service Oriented Architectures (SOA), based on loosely coupled, interoperable services, aiming to address these issues. This paper describes a case study of the evolution of an existing legacy system towards a more maintainable SOA. The proposed process includes the recovery of the legacy system architecture, as a first step to define the specific evolution plan to be executed and validated. The case study has been applied to a medical imaging system, evolving it into a service model.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, H. Koizumi, J. Sawamoto
Currently, Business Process Modeling (BPM) is used to create current analytical model (As-Is model) of the work processes, upon which an optimized model (the To-Be model) can be based, including the optimization of system configuration. Also, there is strong interest in the eXecutableUML (xUML), which makes it possible to validate system viability before it is implemented. This paper proposes a methodology for configuring information systems that links BPM and xUML techniques, and evaluates its applicability. In the proposed method, bottlenecks are analyzed and evaluated using simulation of the work process flow in BPM and, after translating this model into UMI model elements, and after the UMI model has been created, expands it to xUMI. Then, in xUMI modeling, dynamic system evaluation is carried out with automatic generation of the code for actual implementation. The proposed method was applied to the development of an actual prototype information system and evaluated.
{"title":"An Information System Development Method Based on the Link of Business Process Modeling with Executable UML Modeling and its Evaluation by Prototyping","authors":"T. Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, H. Koizumi, J. Sawamoto","doi":"10.1109/WAINA.2008.113","DOIUrl":"https://doi.org/10.1109/WAINA.2008.113","url":null,"abstract":"Currently, Business Process Modeling (BPM) is used to create current analytical model (As-Is model) of the work processes, upon which an optimized model (the To-Be model) can be based, including the optimization of system configuration. Also, there is strong interest in the eXecutableUML (xUML), which makes it possible to validate system viability before it is implemented. This paper proposes a methodology for configuring information systems that links BPM and xUML techniques, and evaluates its applicability. In the proposed method, bottlenecks are analyzed and evaluated using simulation of the work process flow in BPM and, after translating this model into UMI model elements, and after the UMI model has been created, expands it to xUMI. Then, in xUMI modeling, dynamic system evaluation is carried out with automatic generation of the code for actual implementation. The proposed method was applied to the development of an actual prototype information system and evaluated.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}