There have been many ambitious attempts to develop both domain and large-scale, upper level ontologies, in the belief that ontologies are the key to success in the Semantic Web, web services, and other applications. However, there has been little research conducted on how to assess the effectiveness of these ontologies and how to reuse them in different contexts. This paper analyzes a well-known upper level ontology, CYC, using its ResearchCyc version. Problems and challenges faced in using ResearchCyc are identified and suggestions proposed for overcoming them. The solutions are intended to be generalizable to other upper level ontologies. Finally, based on the investigations presented in this paper, an application to the domain of collaborative learning is provided.
{"title":"Knowledge Reuse: Its Role and Implications for Upper Level Ontologies","authors":"J. Conesa, V. Storey, V. Sugumaran, S. Caballé","doi":"10.1109/incos.2011.110","DOIUrl":"https://doi.org/10.1109/incos.2011.110","url":null,"abstract":"There have been many ambitious attempts to develop both domain and large-scale, upper level ontologies, in the belief that ontologies are the key to success in the Semantic Web, web services, and other applications. However, there has been little research conducted on how to assess the effectiveness of these ontologies and how to reuse them in different contexts. This paper analyzes a well-known upper level ontology, CYC, using its ResearchCyc version. Problems and challenges faced in using ResearchCyc are identified and suggestions proposed for overcoming them. The solutions are intended to be generalizable to other upper level ontologies. Finally, based on the investigations presented in this paper, an application to the domain of collaborative learning is provided.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The FIFO characteristic of the access category queue (AC_VI) reserved for video in the 802.11e MAC limits its performance for high quality video transmission during traffic congestions. To enhance video transmission quality, further service differentiation among the video packets is preferred. To achieve this, this paper presents a novel cross-layer design by proposing a dispersive video frame importance (DVFI) scheme from the Application layer and a dispersive random early detection (DRED) algorithm for video packet mapping among ACs. DVFI is calculated from a single frame loss induced video quality impairment, including the effects of imperfect concealment for the lost video frame itself and its error propagation to the surrounding video frames. Whereas DRED can dynamically determine the packet mapping probabilities among ACs based on the dispersive values of packet importance. Our results show the superiority of the proposed (DVFI+DRED) framework over the existing ones, including EDCA and (I/P/B+AM), and it can reach a largest gain of 3.2 dB over EDCA, and 2.6 dB over (I/P/B+AM).
{"title":"Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video Transmission","authors":"Wen-Ping Lai, En-Cheng Liou, Wei-Hao Fu","doi":"10.1109/INCoS.2011.77","DOIUrl":"https://doi.org/10.1109/INCoS.2011.77","url":null,"abstract":"The FIFO characteristic of the access category queue (AC_VI) reserved for video in the 802.11e MAC limits its performance for high quality video transmission during traffic congestions. To enhance video transmission quality, further service differentiation among the video packets is preferred. To achieve this, this paper presents a novel cross-layer design by proposing a dispersive video frame importance (DVFI) scheme from the Application layer and a dispersive random early detection (DRED) algorithm for video packet mapping among ACs. DVFI is calculated from a single frame loss induced video quality impairment, including the effects of imperfect concealment for the lost video frame itself and its error propagation to the surrounding video frames. Whereas DRED can dynamically determine the packet mapping probabilities among ACs based on the dispersive values of packet importance. Our results show the superiority of the proposed (DVFI+DRED) framework over the existing ones, including EDCA and (I/P/B+AM), and it can reach a largest gain of 3.2 dB over EDCA, and 2.6 dB over (I/P/B+AM).","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Affective or Emotion oriented computing constitutes an emerging research field that is still in its early stages. The lack of empirical results together with the complexity that attributes emotions, subjects research to a diversity of theories, models and tools. In the current paper we present a critical review of the state of the art on emotion measurement models, methods and tools and we suggest some informal rules towards their realistic use in education settings.
{"title":"Emotion Measurement in Intelligent Tutoring Systems: What, When and How to Measure","authors":"M. Feidakis, T. Daradoumis, S. Caballé","doi":"10.1109/INCOS.2011.82","DOIUrl":"https://doi.org/10.1109/INCOS.2011.82","url":null,"abstract":"Affective or Emotion oriented computing constitutes an emerging research field that is still in its early stages. The lack of empirical results together with the complexity that attributes emotions, subjects research to a diversity of theories, models and tools. In the current paper we present a critical review of the state of the art on emotion measurement models, methods and tools and we suggest some informal rules towards their realistic use in education settings.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Krömer, V. Snás̃el, J. Platoš, A. Abraham, L. Prokop, S. Mišák
Fuzzy sets and fuzzy logic can be used for efficient data mining, classification, and value prediction. We propose a genetically evolved fuzzy predictor to estimate the output of a Photovoltaic Power Plant. Photovoltaic Power Plants (PVPPs) are classified as power energy sources with unstable supply of electrical energy. It is necessary to back up power energy from PVPPs for stable electric network operation. An optimal value of back up power can be set with reliable prediction models and significantly contribute to the robustness of the electric network and therefore help in the building of intelligent power grids.
{"title":"Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output Estimation","authors":"P. Krömer, V. Snás̃el, J. Platoš, A. Abraham, L. Prokop, S. Mišák","doi":"10.1109/INCOS.2011.97","DOIUrl":"https://doi.org/10.1109/INCOS.2011.97","url":null,"abstract":"Fuzzy sets and fuzzy logic can be used for efficient data mining, classification, and value prediction. We propose a genetically evolved fuzzy predictor to estimate the output of a Photovoltaic Power Plant. Photovoltaic Power Plants (PVPPs) are classified as power energy sources with unstable supply of electrical energy. It is necessary to back up power energy from PVPPs for stable electric network operation. An optimal value of back up power can be set with reliable prediction models and significantly contribute to the robustness of the electric network and therefore help in the building of intelligent power grids.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Koyama, Ryoma Watanabe, L. Barolli, M. Takizawa
In sensor networks, small sensor nodes which are distributed in an area send various data and send them to the sink node by multi-hop transmission. The sensor networks cover various application fields such as safety management, health management, grasping of nature environment, military and so on. The sensor networks will be used as a technique for constructing ubiquitous society because of low cost and easy construction. However, since the nodes are small, the consumption power is limited. Also, they have problems with transmission power and speed. To solve these problems, various protocols are proposed. In this paper, we propose a MAC protocol for power reduction based on load estimation called R-MAC. The R-MAC estimates the network load and its behavior is adapted based on the network load. Therefore, it is possible to improve the power consumption and transmission delay. We evaluated the performance of R-MAC protocol by computer simulation and verified that R-MAC has better performance than S-MAC conventional MAC protocol. We also evaluate the performance of R-MAC for 2 scenarios and show that R-MAC has a very good and adaptive behavior.
{"title":"R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation","authors":"A. Koyama, Ryoma Watanabe, L. Barolli, M. Takizawa","doi":"10.1109/INCoS.2011.144","DOIUrl":"https://doi.org/10.1109/INCoS.2011.144","url":null,"abstract":"In sensor networks, small sensor nodes which are distributed in an area send various data and send them to the sink node by multi-hop transmission. The sensor networks cover various application fields such as safety management, health management, grasping of nature environment, military and so on. The sensor networks will be used as a technique for constructing ubiquitous society because of low cost and easy construction. However, since the nodes are small, the consumption power is limited. Also, they have problems with transmission power and speed. To solve these problems, various protocols are proposed. In this paper, we propose a MAC protocol for power reduction based on load estimation called R-MAC. The R-MAC estimates the network load and its behavior is adapted based on the network load. Therefore, it is possible to improve the power consumption and transmission delay. We evaluated the performance of R-MAC protocol by computer simulation and verified that R-MAC has better performance than S-MAC conventional MAC protocol. We also evaluate the performance of R-MAC for 2 scenarios and show that R-MAC has a very good and adaptive behavior.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, K. Utsumiya
Advanced computer technology has a potential power to completely change education style. Ubiquitous computing framework allows students to learn anywhere at any time. It also enables a teacher to electronically organize some materials on site and present them according to students' situation. In this paper, we describe an interactive teaching aid called Micro E-Board designed and implemented to solve some problems existing in currently available e-learning technology. The proposed system allows users to easily build an intuitive e-learning environment anywhere at any time based on mobile technology and prompts interactions between a teacher and students with a set of easy-to-use functions.
{"title":"Micro E-board: An Interactive Teaching Aid Using Mobile Devices","authors":"Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, K. Utsumiya","doi":"10.1109/INCoS.2011.118","DOIUrl":"https://doi.org/10.1109/INCoS.2011.118","url":null,"abstract":"Advanced computer technology has a potential power to completely change education style. Ubiquitous computing framework allows students to learn anywhere at any time. It also enables a teacher to electronically organize some materials on site and present them according to students' situation. In this paper, we describe an interactive teaching aid called Micro E-Board designed and implemented to solve some problems existing in currently available e-learning technology. The proposed system allows users to easily build an intuitive e-learning environment anywhere at any time based on mobile technology and prompts interactions between a teacher and students with a set of easy-to-use functions.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with an analysis of backscattering of electromagnetic waves from a target moving along random rough surfaces (RRSs) such as desert, hilly terrain, forest, sea surface and so on. First we introduce the discrete ray tracing method (DRTM), and second we apply this method to the backscattering problem in order to investigate the influence of the backscattering from RRSs on the radar cross section. Finally we show some numerical examples for the Doppler shifted backscattering of the total fields in comparison with that of the subtracted fields. The subtracted express reflection from the target as well as electromagnetic interaction between target and rough surface. It is numerically demonstrated that the total backscattering dominates almost everywhere except for the near region of radar, even if we employ an antenna with a very sharp directivity. We also investigate statistics of Doppler shifted backscattering from a target.
{"title":"Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough Surface","authors":"S. Nakashima, J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.79","DOIUrl":"https://doi.org/10.1109/INCoS.2011.79","url":null,"abstract":"This paper is concerned with an analysis of backscattering of electromagnetic waves from a target moving along random rough surfaces (RRSs) such as desert, hilly terrain, forest, sea surface and so on. First we introduce the discrete ray tracing method (DRTM), and second we apply this method to the backscattering problem in order to investigate the influence of the backscattering from RRSs on the radar cross section. Finally we show some numerical examples for the Doppler shifted backscattering of the total fields in comparison with that of the subtracted fields. The subtracted express reflection from the target as well as electromagnetic interaction between target and rough surface. It is numerically demonstrated that the total backscattering dominates almost everywhere except for the near region of radar, even if we employ an antenna with a very sharp directivity. We also investigate statistics of Doppler shifted backscattering from a target.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
{"title":"Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation","authors":"H. Xiong, Qianhong Wu, Zhong Chen","doi":"10.1109/INCoS.2011.151","DOIUrl":"https://doi.org/10.1109/INCoS.2011.151","url":null,"abstract":"An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose a framework for modeling, representing populating and enriching knowledge from online collaborative sessions within Web forums. The main piece of the framework is an ontology called Collaborative Session Conceptual Schema (CS2) that allows specifying collaborative sessions. The paper describes the knowledge this ontology needs to know, the alignment of the ontology with the ontologies of relevant specifications, how the ontology can be automatically populated from the data existent in forums, and how to enrich such data into useful knowledge about what is happening during the collaboration. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.
{"title":"A Framework for Dealing with Knowledge about On-line Collaborative Learning Sessions","authors":"J. Conesa, S. Caballé, D. Gañán, Josep Prieto","doi":"10.1109/INCOS.2011.18","DOIUrl":"https://doi.org/10.1109/INCOS.2011.18","url":null,"abstract":"In this paper we propose a framework for modeling, representing populating and enriching knowledge from online collaborative sessions within Web forums. The main piece of the framework is an ontology called Collaborative Session Conceptual Schema (CS2) that allows specifying collaborative sessions. The paper describes the knowledge this ontology needs to know, the alignment of the ontology with the ontologies of relevant specifications, how the ontology can be automatically populated from the data existent in forums, and how to enrich such data into useful knowledge about what is happening during the collaboration. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of information and communications technology, numerous small digital devices equipped for wireless communication have been produced. For controlling network communication easily, most use a CSMA-based protocol in the media access control layer. Although any terminal can get its new transmission opportunity easily and autonomously using a CSMA-based protocol, both packet collision probability and throughput degradation become increasingly high if the network contains hidden terminals. In this paper, we propose a new slot assignment method for a slotted CSMA-based protocol using an algorithm to find the maximum clique for addressing packet collisions with hidden terminals completely.
{"title":"A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique Extraction","authors":"Tetsuya Shigeyasu, Xiong Liu, H. Matsuno","doi":"10.1109/INCoS.2011.30","DOIUrl":"https://doi.org/10.1109/INCoS.2011.30","url":null,"abstract":"With the development of information and communications technology, numerous small digital devices equipped for wireless communication have been produced. For controlling network communication easily, most use a CSMA-based protocol in the media access control layer. Although any terminal can get its new transmission opportunity easily and autonomously using a CSMA-based protocol, both packet collision probability and throughput degradation become increasingly high if the network contains hidden terminals. In this paper, we propose a new slot assignment method for a slotted CSMA-based protocol using an algorithm to find the maximum clique for addressing packet collisions with hidden terminals completely.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}