Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00025
S. Kasap
In this study an attempt is made to improve health awareness regarding diabetic students in primary schools in Kuwait. First, a pilot test was conducted to prove the existence of the problem. The results revealed that 45% of teachers did not know the symptoms of hypoglycemia where 20% of them faced more than 6 cases of diabetic students in a school. Voice of the Customer (VOC) was then gained through a parent survey to identify the Critical to Quality (CTQ). Afterwards, teacher's current performance level was measured by distributing a Knowledge Test and the results revealed that it is 57.7% and therefore, the team decided to focus on increasing and improving health awareness of diabetes for the students and teachers. In order to do that, this research had two folds: developing a mobile application "I. Diabetic" to be used by students to assist them managing their heath condition while they are at school or out having a normal life and applying a six sigma study to increase teacher's awareness regarding diabetes and diabetic students in schools. Several Coding and Quality tools have been used and implemented in this work such as the Android Studio, Quality Function Deployment (QFD) and Failure Mode Effect Analysis (FMEA) in order to develop the mobile application and analyze and improve health awareness.
{"title":"Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in Kuwait","authors":"S. Kasap","doi":"10.1109/W-FiCloud.2018.00025","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00025","url":null,"abstract":"In this study an attempt is made to improve health awareness regarding diabetic students in primary schools in Kuwait. First, a pilot test was conducted to prove the existence of the problem. The results revealed that 45% of teachers did not know the symptoms of hypoglycemia where 20% of them faced more than 6 cases of diabetic students in a school. Voice of the Customer (VOC) was then gained through a parent survey to identify the Critical to Quality (CTQ). Afterwards, teacher's current performance level was measured by distributing a Knowledge Test and the results revealed that it is 57.7% and therefore, the team decided to focus on increasing and improving health awareness of diabetes for the students and teachers. In order to do that, this research had two folds: developing a mobile application \"I. Diabetic\" to be used by students to assist them managing their heath condition while they are at school or out having a normal life and applying a six sigma study to increase teacher's awareness regarding diabetes and diabetic students in schools. Several Coding and Quality tools have been used and implemented in this work such as the Android Studio, Quality Function Deployment (QFD) and Failure Mode Effect Analysis (FMEA) in order to develop the mobile application and analyze and improve health awareness.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"279 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00011
Sayed Chhattan Shah, Sunil Kumar
A mobile ad hoc network provides communication and network services to internet of things and cyber physical system applications. The failure of a link in mobile ad hoc network during data transmission increases communication and energy consumption cost due to route rediscovery and reselection process. It may also result into a communication failure and therefore cyber physical system application failure. To avoid link failure during data transmission, a link lifetime prediction model is required. This paper proposes two link lifetime prediction models: LLPC and LLPH. LLPC model predicts link lifetime based on current information of nodes such as mobility and residual energy whereas LLPH uses history of link lifetime intervals to predict the link lifetime. Compared to existing models, LLPC model considers node mobility as well as residual energy whereas LLPH relies on history of links rather than user's mobility patterns or social relationships.
{"title":"A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc Networks","authors":"Sayed Chhattan Shah, Sunil Kumar","doi":"10.1109/W-FICLOUD.2018.00011","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00011","url":null,"abstract":"A mobile ad hoc network provides communication and network services to internet of things and cyber physical system applications. The failure of a link in mobile ad hoc network during data transmission increases communication and energy consumption cost due to route rediscovery and reselection process. It may also result into a communication failure and therefore cyber physical system application failure. To avoid link failure during data transmission, a link lifetime prediction model is required. This paper proposes two link lifetime prediction models: LLPC and LLPH. LLPC model predicts link lifetime based on current information of nodes such as mobility and residual energy whereas LLPH uses history of link lifetime intervals to predict the link lifetime. Compared to existing models, LLPC model considers node mobility as well as residual energy whereas LLPH relies on history of links rather than user's mobility patterns or social relationships.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/w-ficloud.2018.00021
Junjie Huang, Tiejian Luo
A typical social research topic is to figure out the influential people's relationship and its weights. It is very tedious for social scientists to solve those problems by studying massive literature. Digital humanities bring a new way to a social subject. In this paper, we propose a framework for social scientists to find out ancient figures'power and their camp. The core of our framework consists of signed graph model and novel group partition algorithm. We validate and verify our solution by China Biographical Database Project (CBDB) dataset. The analytic results on a case study demonstrate the effectiveness of our framework, which gets information that consists with the literature's facts and social scientists' viewpoints.
{"title":"Computing Len for Exploring the Historical People's Social Network","authors":"Junjie Huang, Tiejian Luo","doi":"10.1109/w-ficloud.2018.00021","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00021","url":null,"abstract":"A typical social research topic is to figure out the influential people's relationship and its weights. It is very tedious for social scientists to solve those problems by studying massive literature. Digital humanities bring a new way to a social subject. In this paper, we propose a framework for social scientists to find out ancient figures'power and their camp. The core of our framework consists of signed graph model and novel group partition algorithm. We validate and verify our solution by China Biographical Database Project (CBDB) dataset. The analytic results on a case study demonstrate the effectiveness of our framework, which gets information that consists with the literature's facts and social scientists' viewpoints.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121932922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00044
Christian Franck, J. Großschädl, Yann Le Corre, Cyrille Lenou Tago
The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of "long" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 2.3 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields.
{"title":"Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers","authors":"Christian Franck, J. Großschädl, Yann Le Corre, Cyrille Lenou Tago","doi":"10.1109/W-FICLOUD.2018.00044","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00044","url":null,"abstract":"The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a \"lightweight\" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of \"long\" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 2.3 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"31 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00010
Yen-Wen Chen, Yu-Hsuan Lin
Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.
SDN (Software Defined Networking)通过驻留流表提供灵活的路由安排和特定的报文处理。流表通常使用三元内容可寻址存储器(TCAM)来实现数据包的快速匹配和转发。除了路由信息外,TCAM还提供了数据包处理规则,用于处理数据包的重定向、过滤和丢弃,以保证网络安全。包过滤规则也被放置在数据包将经过的特定SDN交换机的流表中。如果规则可以放在大多数数据包聚合的交换机上,那么它将节省总体TCAM利用率。但是,如果在数据包到达放置关联规则的交换机之前将其丢弃,则会消耗更多的链路带宽。本文提出了在SDN网络中权衡TCAM空间利用率和带宽消耗的规则放置方案。采用实际的网络拓扑进行了详尽的仿真。仿真结果表明,该方案达到了预期目标。
{"title":"Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN","authors":"Yen-Wen Chen, Yu-Hsuan Lin","doi":"10.1109/W-FICLOUD.2018.00010","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00010","url":null,"abstract":"Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114291097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00019
V. Kireev, S. A. Filippov, A. Guseva, Pyotr V. Bochkaryov, I. A. Kuznetsov, V. Migalin, S. S. Filin
The development of cloud technologies, miniaturization of computing and sensor devices has led to an explosive growth in the field of the Internet of Things. One of the promising research areas within the framework of this concept is smart homes, and, more broadly, smart cities, associated with increasing the values of such parameters of housing and utility services as energy efficiency, resistance to failures, failing and efficiency in general. This article is devoted to the development of an information system for monitoring, remote management and maintenance of engineering systems at the housing infrastructure facilities. The functions of information system include the operational status control of engineering systems on housing infrastructure objects, support, maintenance, repair, prediction and alerts on routine, unplanned and critical situations. This system is based on the concept of "Dew computing - Fog computing - Cloud computing" and is designed to collect and process Big Data, collected via the Internet of Things.
{"title":"Predictive Repair and Support of Engineering Systems Based on Distributed Data Processing Model within an IoT Concept","authors":"V. Kireev, S. A. Filippov, A. Guseva, Pyotr V. Bochkaryov, I. A. Kuznetsov, V. Migalin, S. S. Filin","doi":"10.1109/W-FICLOUD.2018.00019","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00019","url":null,"abstract":"The development of cloud technologies, miniaturization of computing and sensor devices has led to an explosive growth in the field of the Internet of Things. One of the promising research areas within the framework of this concept is smart homes, and, more broadly, smart cities, associated with increasing the values of such parameters of housing and utility services as energy efficiency, resistance to failures, failing and efficiency in general. This article is devoted to the development of an information system for monitoring, remote management and maintenance of engineering systems at the housing infrastructure facilities. The functions of information system include the operational status control of engineering systems on housing infrastructure objects, support, maintenance, repair, prediction and alerts on routine, unplanned and critical situations. This system is based on the concept of \"Dew computing - Fog computing - Cloud computing\" and is designed to collect and process Big Data, collected via the Internet of Things.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/w-ficloud.2018.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/w-ficloud.2018.00001","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00001","url":null,"abstract":"","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FiCloud.2018.00041
R. Parizi, A. Dehghantanha
Blockchain is a new trend rising fast from the community and the enterprise world. As an infrastructural technology it is finding its way into a growing number of domains like finance, medical, digital marketplace, pharmaceutical and government agencies. While blockchain technology is primarily thought as the foundation of Bitcoin, it has grown far beyond underpinning the virtual currency. It promises building better trust, transparency, and integrity without a third-party and the risk of censorship. These remarkable advantages do however come at a price. The blockchain ecosystem is riddled with human-centric and economical issues for its participants, leading to unintended consequences in decentralized networks. Gamified software engineering is a growing field that in particular taps into gamification technology, the application of game mechanics in non-game contexts, to address human-related concerns. There are currently no studies around blockchain that have been identified to have a clear view of existing research and solutions for utilizing the gamification in the emerging blockchain systems. As a first step towards filling this gap, this paper discusses and identifies two major human-based problems in the blockchain decentralized applications and development. For those problems, it proposes a preliminary gamified model to provide a basis for expanding future research and applications in this joint domain.
{"title":"On the Understanding of Gamification in Blockchain Systems","authors":"R. Parizi, A. Dehghantanha","doi":"10.1109/W-FiCloud.2018.00041","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00041","url":null,"abstract":"Blockchain is a new trend rising fast from the community and the enterprise world. As an infrastructural technology it is finding its way into a growing number of domains like finance, medical, digital marketplace, pharmaceutical and government agencies. While blockchain technology is primarily thought as the foundation of Bitcoin, it has grown far beyond underpinning the virtual currency. It promises building better trust, transparency, and integrity without a third-party and the risk of censorship. These remarkable advantages do however come at a price. The blockchain ecosystem is riddled with human-centric and economical issues for its participants, leading to unintended consequences in decentralized networks. Gamified software engineering is a growing field that in particular taps into gamification technology, the application of game mechanics in non-game contexts, to address human-related concerns. There are currently no studies around blockchain that have been identified to have a clear view of existing research and solutions for utilizing the gamification in the emerging blockchain systems. As a first step towards filling this gap, this paper discusses and identifies two major human-based problems in the blockchain decentralized applications and development. For those problems, it proposes a preliminary gamified model to provide a basis for expanding future research and applications in this joint domain.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00017
Kirill V. Plaksiy, A. Nikiforov, N. Miloslavskaya
The paper suggests a technique that allows to automate schemes that generates new criminal cases for money laundering and counter financing of terrorism (ML/CFT), which are based on ML/CFT typologies but do not appear as their exact copies. This feature hinders an automated system from making a decision about their exact coincidence or its absence while comparing case objects and links among them and links in ML/CFT typologies. Possibilities and advantages of application of Big Data for financial investigation data analysis and processing are also explored. The visualization of ML/CFT typologies with the use of graphs is considered. The article proposes a technique for generating variants of typologies (for example, "Peso" typology, "commission scheme") based on cases built on typologies. A program for implementation and verification of this technique was written and successfully tested on case graphs built on typologies.
{"title":"Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism","authors":"Kirill V. Plaksiy, A. Nikiforov, N. Miloslavskaya","doi":"10.1109/W-FICLOUD.2018.00017","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00017","url":null,"abstract":"The paper suggests a technique that allows to automate schemes that generates new criminal cases for money laundering and counter financing of terrorism (ML/CFT), which are based on ML/CFT typologies but do not appear as their exact copies. This feature hinders an automated system from making a decision about their exact coincidence or its absence while comparing case objects and links among them and links in ML/CFT typologies. Possibilities and advantages of application of Big Data for financial investigation data analysis and processing are also explored. The visualization of ML/CFT typologies with the use of graphs is considered. The article proposes a technique for generating variants of typologies (for example, \"Peso\" typology, \"commission scheme\") based on cases built on typologies. A program for implementation and verification of this technique was written and successfully tested on case graphs built on typologies.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/W-FICLOUD.2018.00033
Yuriko Oda, Fumihito Ito, Ory Yoshifuji, Youichi Oda, S. Kanai, Zong Shichun, H. Ohuchi
This project is co-created by wheelchair users worldwide by posting their experiences and ideas on the map application, also provides details of suitable alternative routes.We propose these measurement methods and constructed the evaluation model. We believe these are useful as reference values for facility development, analysis and evaluation in future cities and regional spaces.
{"title":"Proposal of Analysis and Evaluation Method of Urban Area Space Utilizing of Wheelchair Probe Information","authors":"Yuriko Oda, Fumihito Ito, Ory Yoshifuji, Youichi Oda, S. Kanai, Zong Shichun, H. Ohuchi","doi":"10.1109/W-FICLOUD.2018.00033","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00033","url":null,"abstract":"This project is co-created by wheelchair users worldwide by posting their experiences and ideas on the map application, also provides details of suitable alternative routes.We propose these measurement methods and constructed the evaluation model. We believe these are useful as reference values for facility development, analysis and evaluation in future cities and regional spaces.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}