In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predicts user purpose and destination to present various information based on predicted purpose without user interaction. It requires the correct road where the car drives in real time, and it also need to know the route from the start point to the current point correctly. The proposal map matching method divides the trajectory into equal intervals and calculates the shortest path score for each one. Testing using GPS data for actual car trips showed that its use results in better destination prediction than with conventional methods in most cases. The results were the best for intervals of 5 minutes.
{"title":"A Map Matching Algorithm for Car Navigation Systems that Predict User Destination","authors":"K. Miyashita, T. Terada, S. Nishio","doi":"10.1109/WAINA.2008.242","DOIUrl":"https://doi.org/10.1109/WAINA.2008.242","url":null,"abstract":"In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predicts user purpose and destination to present various information based on predicted purpose without user interaction. It requires the correct road where the car drives in real time, and it also need to know the route from the start point to the current point correctly. The proposal map matching method divides the trajectory into equal intervals and calculates the shortest path score for each one. Testing using GPS data for actual car trips showed that its use results in better destination prediction than with conventional methods in most cases. The results were the best for intervals of 5 minutes.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atsushi Takeda, K. Hashimoto, G. Kitagata, S. Zabir, Tetsuo Kinoshita, N. Shiratori
In recent years, P2P networks have been evolving at a rapid pace. Authentication of nodes in P2P networks, however, remains a difficult task to conduct efficiently. In this paper, we therefore propose a new authentication method called hash-based distributed authentication method (HDAM). HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of trust and distributed hash table. Our proposal significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes.
{"title":"A New Authentication Method with Distributed Hash Table for P2P Network","authors":"Atsushi Takeda, K. Hashimoto, G. Kitagata, S. Zabir, Tetsuo Kinoshita, N. Shiratori","doi":"10.1109/WAINA.2008.203","DOIUrl":"https://doi.org/10.1109/WAINA.2008.203","url":null,"abstract":"In recent years, P2P networks have been evolving at a rapid pace. Authentication of nodes in P2P networks, however, remains a difficult task to conduct efficiently. In this paper, we therefore propose a new authentication method called hash-based distributed authentication method (HDAM). HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of trust and distributed hash table. Our proposal significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shunji Uchino, N. Abe, Hiroshi Takada, T. Yagi, H. Taki, Shoujie He
In this research, a dialog environment between human and virtual agent has been constructed. With the commercial off-the-shelf VR technologies, special devices such as data glove have to be used for the interaction. But this is difficult to manipulate objects. If there is a helper who has direct access to objects in a virtual space, we may ask him. The question, however, is how to communicate with the helper. This paper presents a solution to the question. The basic idea is to utilize speech recognition and gesture recognition systems. Experimental results have proved the effectiveness of the approach in terms of facilitating man-machine interaction and communication. The environment constructed in this research allows a user to communicate by talking and showing gestures to a personified agent in virtual environment. A user can use his/her finger to point at a virtual object and ask the agent to manipulate the virtual object.
{"title":"Virtual Reality Interaction System between User and Avatar with Distributed Processing","authors":"Shunji Uchino, N. Abe, Hiroshi Takada, T. Yagi, H. Taki, Shoujie He","doi":"10.1109/WAINA.2008.124","DOIUrl":"https://doi.org/10.1109/WAINA.2008.124","url":null,"abstract":"In this research, a dialog environment between human and virtual agent has been constructed. With the commercial off-the-shelf VR technologies, special devices such as data glove have to be used for the interaction. But this is difficult to manipulate objects. If there is a helper who has direct access to objects in a virtual space, we may ask him. The question, however, is how to communicate with the helper. This paper presents a solution to the question. The basic idea is to utilize speech recognition and gesture recognition systems. Experimental results have proved the effectiveness of the approach in terms of facilitating man-machine interaction and communication. The environment constructed in this research allows a user to communicate by talking and showing gestures to a personified agent in virtual environment. A user can use his/her finger to point at a virtual object and ask the agent to manipulate the virtual object.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131863993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel design and implementation of distributed RBAC (dRBAC) and single sign-on (SSO) system that spans over multiple administrative domains with high availability. The core idea is based on multi-agent systems (MAS) technique owing to its modularity, autonomy, distributedness, flexibility, and scalability. All agents serve their specific purposes. Leveraging agents simplifies high availability. PKI is used for trust enablement between intra- and inter-domain agent communications. The security assertion markup language (SAML) is adopted for supporting the exchange of authentication and authorization information in the architecture. The approach supports strong two-factor authentication with X.509 digital certificate. The authorization scheme is based on the privilege management infrastructure (PMI). Finally, we reported our extended implementation status and demonstrated that our proposed model is efficient and flexible to implement in the multiple SSO and PKI domains.
{"title":"An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain","authors":"S. Juntapremjitt, S. Fugkeaw, P. Manpanpanich","doi":"10.1109/WAINA.2008.175","DOIUrl":"https://doi.org/10.1109/WAINA.2008.175","url":null,"abstract":"This paper proposes a novel design and implementation of distributed RBAC (dRBAC) and single sign-on (SSO) system that spans over multiple administrative domains with high availability. The core idea is based on multi-agent systems (MAS) technique owing to its modularity, autonomy, distributedness, flexibility, and scalability. All agents serve their specific purposes. Leveraging agents simplifies high availability. PKI is used for trust enablement between intra- and inter-domain agent communications. The security assertion markup language (SAML) is adopted for supporting the exchange of authentication and authorization information in the architecture. The approach supports strong two-factor authentication with X.509 digital certificate. The authorization scheme is based on the privilege management infrastructure (PMI). Finally, we reported our extended implementation status and demonstrated that our proposed model is efficient and flexible to implement in the multiple SSO and PKI domains.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee
In this paper, we propose a new SLA model for best effort IP traffic over WDM networks. This model jointly considers two QoS metrics, workable traffic volume and availability, as SLA parameters. We devise an algorithm of integer programming to minimize operation cost for the incremental traffic.
{"title":"A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM","authors":"Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee","doi":"10.1109/WAINA.2008.104","DOIUrl":"https://doi.org/10.1109/WAINA.2008.104","url":null,"abstract":"In this paper, we propose a new SLA model for best effort IP traffic over WDM networks. This model jointly considers two QoS metrics, workable traffic volume and availability, as SLA parameters. We devise an algorithm of integer programming to minimize operation cost for the incremental traffic.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability. Recent efforts are focusing on providing seamless handover, fault tolerance, reliability and continuous end-to-end service connectivity on the move minimizing the delay and disruption period for real time applications and hence, failures that inhibit communications or result in loss of critical data will not be tolerated. The goal of this paper is to develop a Fault Tolerant HA WAII (FT- HA WAII) protocol and investigate the performance in Tree and partial Mesh routing topologies. Simulation results show that FT- HA WAII can effectively resolve the fault tolerant problem in domain based wireless access networks.
下一代无线网络的成功将在很大程度上依赖于新兴异构技术之间无缝移动支持的先进机制。目前,移动IP是互联网中最有前途的移动管理解决方案。为了提高移动IP的性能,人们提出了几种IP微移动方法,以支持服务质量、最小的数据包丢失、有限的切换延迟和可扩展性。最近的工作重点是提供无缝切换、容错、可靠性和持续的端到端移动服务连接,最大限度地减少实时应用程序的延迟和中断时间,因此,禁止通信或导致关键数据丢失的故障将是不可容忍的。本文的目标是开发一种容错HA WAII (FT- HA WAII)协议,并研究其在Tree和partial Mesh路由拓扑结构中的性能。仿真结果表明,该算法能有效地解决基于域的无线接入网中的容错问题。
{"title":"Fault Tolerant HAWAII Protocol for IP services in Wireless Networks","authors":"R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi","doi":"10.1109/WAINA.2008.200","DOIUrl":"https://doi.org/10.1109/WAINA.2008.200","url":null,"abstract":"The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability. Recent efforts are focusing on providing seamless handover, fault tolerance, reliability and continuous end-to-end service connectivity on the move minimizing the delay and disruption period for real time applications and hence, failures that inhibit communications or result in loss of critical data will not be tolerated. The goal of this paper is to develop a Fault Tolerant HA WAII (FT- HA WAII) protocol and investigate the performance in Tree and partial Mesh routing topologies. Simulation results show that FT- HA WAII can effectively resolve the fault tolerant problem in domain based wireless access networks.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scheduling strategy of subtask decomposed (sub- DC) is presented in this article, which includes two parts. The first part is layered transaction of DAG (directed acyclic graph), which all subtasks are divided into different layers according to precedence relation; The second part is task assignation, in the first, min-min scheduling strategy is used to assign subtasks of one layer to each computer of system; after subtasks of one layer are assigned, load balancing strategy is used to dynamically adjusted system load, which makes use of character of subtasks decomposed and makes one layer subtasks are assigned better reason; then layer-by-layer subtasks are assigned using the same method. The Sub-DC not only makes subtasks of each layer be executed as quickly as possible, but also makes the application be executed in shorter time. The implement result shows that the Sub-DC is better than the level-by-level scheduling strategy (sub-Lev).
{"title":"Scheduling Strategy of Subtask Decomposed","authors":"Benting Wan","doi":"10.1109/WAINA.2008.77","DOIUrl":"https://doi.org/10.1109/WAINA.2008.77","url":null,"abstract":"The scheduling strategy of subtask decomposed (sub- DC) is presented in this article, which includes two parts. The first part is layered transaction of DAG (directed acyclic graph), which all subtasks are divided into different layers according to precedence relation; The second part is task assignation, in the first, min-min scheduling strategy is used to assign subtasks of one layer to each computer of system; after subtasks of one layer are assigned, load balancing strategy is used to dynamically adjusted system load, which makes use of character of subtasks decomposed and makes one layer subtasks are assigned better reason; then layer-by-layer subtasks are assigned using the same method. The Sub-DC not only makes subtasks of each layer be executed as quickly as possible, but also makes the application be executed in shorter time. The implement result shows that the Sub-DC is better than the level-by-level scheduling strategy (sub-Lev).","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
After manufacturing and retail marketing, locating management is considered to be the next home for radio frequency identification (RFID). RFID technology has gained a great potential in locating management to achieve the flexibility, maintainability and extensibility of the system. However, the challenge will be to incorporate RFID into locating management, especially when relevant experience is limited. The RFID-based locating management system must be deployed quickly according to the requirements of the different applications and generate location data fast and efficiently. The paper investigates the issues related to effective RFID dynamical deployment and RFID data management, and introduces an appropriate architecture for dealing with the problems described above.
{"title":"RFID-Based Locating Management","authors":"X. Gu, Dong Wang, H. Sheng","doi":"10.1109/WAINA.2008.201","DOIUrl":"https://doi.org/10.1109/WAINA.2008.201","url":null,"abstract":"After manufacturing and retail marketing, locating management is considered to be the next home for radio frequency identification (RFID). RFID technology has gained a great potential in locating management to achieve the flexibility, maintainability and extensibility of the system. However, the challenge will be to incorporate RFID into locating management, especially when relevant experience is limited. The RFID-based locating management system must be deployed quickly according to the requirements of the different applications and generate location data fast and efficiently. The paper investigates the issues related to effective RFID dynamical deployment and RFID data management, and introduces an appropriate architecture for dealing with the problems described above.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prediction of functionally important amino acids in protein structures is challenging problem in the area of protein function prediction. In the quest of looking for better machine learning approaches to address this problem, we have compared a support vector machine and a neural network trained with a particle swarm algorithm (PSO) to nonlinearly combine a subset of features selected from a set of 314 features describing catalytic residues in protein structures. We compare this approach against three other approaches. Results show trade-offs for two of the approaches on the precision-recall curves. While no approach surpassed the performance of the linear kernel support vector machine (SVM) classifier, the performance of the PSO was comparable to that of a feature selected SVM.
{"title":"Comparative Study of Particle Swarm Approaches for the Prediction of Functionally Important Residues in Protein Structures","authors":"H. Firpi, Eunseog Youn, S. Mooney","doi":"10.1109/WAINA.2008.298","DOIUrl":"https://doi.org/10.1109/WAINA.2008.298","url":null,"abstract":"Prediction of functionally important amino acids in protein structures is challenging problem in the area of protein function prediction. In the quest of looking for better machine learning approaches to address this problem, we have compared a support vector machine and a neural network trained with a particle swarm algorithm (PSO) to nonlinearly combine a subset of features selected from a set of 314 features describing catalytic residues in protein structures. We compare this approach against three other approaches. Results show trade-offs for two of the approaches on the precision-recall curves. While no approach surpassed the performance of the linear kernel support vector machine (SVM) classifier, the performance of the PSO was comparable to that of a feature selected SVM.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115687558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since Semantic Web is increasing in size and variety of resources, it is difficult for users to find the information that they really need. In this paper, we propose a new approach of integrating four processes for Web resource categorization which can promote the efficiency of information retrieval. The processes can extract both the explicit relations extracted directly from the ontologies in a traditional way and the potential relations inferred from existing ontologies by focusing on some new challenges such as extracting important class names, using WordNet relations and detecting the methods of describing the Web resources. Our proposed method can achieve a notable improvement in categorizing the valuable Web resources based on incomplete ontologies for a Semantic Web search system.
{"title":"An Integrated Method for Web Resource Categorization","authors":"Minghua Pei, Kotaro Nakayama, T. Hara, S. Nishio","doi":"10.1109/WAINA.2008.100","DOIUrl":"https://doi.org/10.1109/WAINA.2008.100","url":null,"abstract":"Since Semantic Web is increasing in size and variety of resources, it is difficult for users to find the information that they really need. In this paper, we propose a new approach of integrating four processes for Web resource categorization which can promote the efficiency of information retrieval. The processes can extract both the explicit relations extracted directly from the ontologies in a traditional way and the potential relations inferred from existing ontologies by focusing on some new challenges such as extracting important class names, using WordNet relations and detecting the methods of describing the Web resources. Our proposed method can achieve a notable improvement in categorizing the valuable Web resources based on incomplete ontologies for a Semantic Web search system.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114174010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}