In late years, the demand for multimedia communication has been raised extensively. In this environment, to guarantee the QoS is extremely important. While various control mechanisms have already been realized about the QoS control in each protocol layer, a QoS-guaranteed TCP (QoS-TCP) has been proposed. The QoS-TCP tries to guarantee a specified bandwidth against competing background TCP traffic. Previous researches reveal that the QoS-TCP is effective in wired networks, fixed wireless networks, and wireless network with handover. Recently, a mobile router has spread quickly. Therefore, we should assume the environment where an access point (AP) and portable terminals move together, and investigate the use of QoS-TCP in such an environment. In this paper, we investigate the behavior of QoS-TCP caused by radio interference when 2 QoS-TCPs come close together.
{"title":"Influence of Interference with Moving Terminal in Wireless LAN Environment and Evaluation of Behavior of QoS-TCP","authors":"Remi Ando, T. Murase, M. Oguchi","doi":"10.1109/INCoS.2011.125","DOIUrl":"https://doi.org/10.1109/INCoS.2011.125","url":null,"abstract":"In late years, the demand for multimedia communication has been raised extensively. In this environment, to guarantee the QoS is extremely important. While various control mechanisms have already been realized about the QoS control in each protocol layer, a QoS-guaranteed TCP (QoS-TCP) has been proposed. The QoS-TCP tries to guarantee a specified bandwidth against competing background TCP traffic. Previous researches reveal that the QoS-TCP is effective in wired networks, fixed wireless networks, and wireless network with handover. Recently, a mobile router has spread quickly. Therefore, we should assume the environment where an access point (AP) and portable terminals move together, and investigate the use of QoS-TCP in such an environment. In this paper, we investigate the behavior of QoS-TCP caused by radio interference when 2 QoS-TCPs come close together.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Context-aware e-learning is an educational model that foresees the selection of learning resources to make the e-learning content more relevant and suitable for the learner in his/her situation. The research reported in this paper was purposed to improve an existing system for personalized e-learning with contextualisation features. This has been done by defining a context model, an ontology-based model to represent a teaching domain that includes contextualization information and a methodology to generate personalized and context-aware learning experiences basing on such structures.
{"title":"An Ontology-Based Approach for Context-Aware E-learning","authors":"N. Capuano, M. Gaeta, S. Salerno, G. Mangione","doi":"10.1109/INCoS.2011.53","DOIUrl":"https://doi.org/10.1109/INCoS.2011.53","url":null,"abstract":"Context-aware e-learning is an educational model that foresees the selection of learning resources to make the e-learning content more relevant and suitable for the learner in his/her situation. The research reported in this paper was purposed to improve an existing system for personalized e-learning with contextualisation features. This has been done by defining a context model, an ontology-based model to represent a teaching domain that includes contextualization information and a methodology to generate personalized and context-aware learning experiences basing on such structures.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"47 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123265699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barolli, Gjergji Mino, Elis Kulla, A. Koyama, Jiro Iwashige
Several schemes have been proposed for CAC and handover in wireless cellular networks. However, during the complexity of CAC and handover in wireless environment, many simplified models and assumptions are made. Also, the CAC and handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of CAC and handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for CAC and handover for wireless cellular networks (called FICHS), which can operate with imprecision data and non-linear functions with arbitrary complexity. To evaluated the performance of FICHS we consider CAC with priority and enforced handover. We show that FICHS has a good behavior.
{"title":"Performance Evaluation of a Fuzzy-based Integrated CAC and Handover System for Cellular Networks","authors":"L. Barolli, Gjergji Mino, Elis Kulla, A. Koyama, Jiro Iwashige","doi":"10.1109/INCoS.2011.132","DOIUrl":"https://doi.org/10.1109/INCoS.2011.132","url":null,"abstract":"Several schemes have been proposed for CAC and handover in wireless cellular networks. However, during the complexity of CAC and handover in wireless environment, many simplified models and assumptions are made. Also, the CAC and handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of CAC and handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for CAC and handover for wireless cellular networks (called FICHS), which can operate with imprecision data and non-linear functions with arbitrary complexity. To evaluated the performance of FICHS we consider CAC with priority and enforced handover. We show that FICHS has a good behavior.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with a relationship between source height and the field attenuation along random rough surfaces (RRSs). First we introduce a discrete ray tracing method (DRTM) to numerically compute field distribution along RRSs. Second we review Hata's equation which is an empirical formula obtained by many out door data, and discuss that the field distribution in urban area depends on the antenna height. Finally we show the field distribution along RRSs computed by using the DRTM. We confirm whether the field distributions above RRSs depends on the source height or not.
{"title":"Relationship between Source Height and Distance Order of Propagation Along Random Rough Surface","authors":"J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.142","DOIUrl":"https://doi.org/10.1109/INCoS.2011.142","url":null,"abstract":"This paper is concerned with a relationship between source height and the field attenuation along random rough surfaces (RRSs). First we introduce a discrete ray tracing method (DRTM) to numerically compute field distribution along RRSs. Second we review Hata's equation which is an empirical formula obtained by many out door data, and discuss that the field distribution in urban area depends on the antenna height. Finally we show the field distribution along RRSs computed by using the DRTM. We confirm whether the field distributions above RRSs depends on the source height or not.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose an elite synthesis optimization strategy for accelerating evolutionary computation (EC) searches using elites obtained from a lower dimensional space. The method projects individuals onto $n$ one-dimensional spaces corresponding to each of the $n$ searching parameter axes, approximates each landscape using Lagrange polynomial interpolation or power function least squares approximation, finds the best coordinate for the approximated shape, obtains the elite by combining the best $n$ found coordinates, and uses the elite for the next generation of the EC. The advantage of this method is that the elite may be easily obtained thanks to their projection onto each one-dimensional space and that there is a higher possibility that the elite will be located near the global optimum. We conduct experimental tests to compare our proposed approaches with previous acceleration approaches using differential evolution and ten benchmark functions. The results demonstrate that the proposed method accelerates EC convergence significantly, especially in early generations.
{"title":"Comparative Evaluations of Evolutionary Computation with Elite Obtained in Reduced Dimensional Spaces","authors":"Yan Pei, H. Takagi","doi":"10.1109/INCoS.2011.66","DOIUrl":"https://doi.org/10.1109/INCoS.2011.66","url":null,"abstract":"We propose an elite synthesis optimization strategy for accelerating evolutionary computation (EC) searches using elites obtained from a lower dimensional space. The method projects individuals onto $n$ one-dimensional spaces corresponding to each of the $n$ searching parameter axes, approximates each landscape using Lagrange polynomial interpolation or power function least squares approximation, finds the best coordinate for the approximated shape, obtains the elite by combining the best $n$ found coordinates, and uses the elite for the next generation of the EC. The advantage of this method is that the elite may be easily obtained thanks to their projection onto each one-dimensional space and that there is a higher possibility that the elite will be located near the global optimum. We conduct experimental tests to compare our proposed approaches with previous acceleration approaches using differential evolution and ten benchmark functions. The results demonstrate that the proposed method accelerates EC convergence significantly, especially in early generations.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Wu, Václav Svaton, J. Martinovič, Eliska Ochodkova, V. Snás̃el
The robot soccer game is full of challenges in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In this paper, a method to generate offensive strategies based on simulated game is presented. The experiments show that states obtained during the simulated game are suited for new strategies generation and strategies optimization.
{"title":"Generation of Offensive Strategies in Robot Soccer Game","authors":"Jie Wu, Václav Svaton, J. Martinovič, Eliska Ochodkova, V. Snás̃el","doi":"10.1109/INCOS.2011.96","DOIUrl":"https://doi.org/10.1109/INCOS.2011.96","url":null,"abstract":"The robot soccer game is full of challenges in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In this paper, a method to generate offensive strategies based on simulated game is presented. The experiments show that states obtained during the simulated game are suited for new strategies generation and strategies optimization.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In response to the increasing demand for asynchronous mass data exchange even by mobile users, the DTN-related technologies are considered promising for an efficient use of limited network resources and low-cost deployment at the expense of communication delays. The authors previously proposed a Virtual Segment concept aiming at a practical network infrastructure combining Internet-connected broadband wireless network devices, which have high data transmission rates but limited coverage areas, with a store-carry-forward networking by vehicles that is capable of bridging the gaps in broadband service areas in an asynchronous fashion. In this paper, as an extended framework to combine and integrate the wired/wireless communication networks with the transportation networks, Global Information Logistics Infrastructure (GILI) is briefly discussed. A case study of the GILI in a field experiment using school buses is reported with examining its potential. For this experiment, we develop a remote maintenance tool, as an example of store-carry-forward based asynchronous applications, which is shown to be useful in our framework.
为了应对移动用户对异步海量数据交换日益增长的需求,dtn相关技术被认为有希望有效利用有限的网络资源和以通信延迟为代价的低成本部署。作者之前提出了一个虚拟分段的概念,其目标是将互联网连接的宽带无线网络设备与能够以异步方式弥合宽带服务区域差距的车辆的存储-forward网络相结合的实际网络基础设施,该设备具有高数据传输速率但覆盖范围有限。本文简要讨论了全球信息物流基础设施(Global Information Logistics Infrastructure, GILI)作为有线/无线通信网络与运输网络相结合和集成的扩展框架。报告了在使用校车的实地实验中对GILI进行的案例研究,并审查了其潜力。在这个实验中,我们开发了一个远程维护工具,作为基于存储结转的异步应用程序的一个示例,它在我们的框架中被证明是有用的。
{"title":"Store-Carry-Forward Based Networking Infrastructure: Vision and Potential","authors":"S. Yamamura, Akira Nagata, M. Tsuru","doi":"10.1109/INCoS.2011.150","DOIUrl":"https://doi.org/10.1109/INCoS.2011.150","url":null,"abstract":"In response to the increasing demand for asynchronous mass data exchange even by mobile users, the DTN-related technologies are considered promising for an efficient use of limited network resources and low-cost deployment at the expense of communication delays. The authors previously proposed a Virtual Segment concept aiming at a practical network infrastructure combining Internet-connected broadband wireless network devices, which have high data transmission rates but limited coverage areas, with a store-carry-forward networking by vehicles that is capable of bridging the gaps in broadband service areas in an asynchronous fashion. In this paper, as an extended framework to combine and integrate the wired/wireless communication networks with the transportation networks, Global Information Logistics Infrastructure (GILI) is briefly discussed. A case study of the GILI in a field experiment using school buses is reported with examining its potential. For this experiment, we develop a remote maintenance tool, as an example of store-carry-forward based asynchronous applications, which is shown to be useful in our framework.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the design of electronic cash systems, we usually focus on preventing customers' malicious behaviors. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insider attacks by the untrusted authorities also need to be handled carefully. Miyazaki and Sakurai cite{MS99} first evaluated security of offline anonymous electronic cash systems against the insider attacks by untrusted authorities. They analyzed the security of the existing electronic cash systems and categorized the systems into four types. In this paper, we reconsider the security of offline anonymous electronic cash systems including more recent systems based on the classification of Miyazaki and Sakurai.
{"title":"Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited","authors":"T. Nishide, K. Sakurai","doi":"10.1109/INCoS.2011.146","DOIUrl":"https://doi.org/10.1109/INCoS.2011.146","url":null,"abstract":"In the design of electronic cash systems, we usually focus on preventing customers' malicious behaviors. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insider attacks by the untrusted authorities also need to be handled carefully. Miyazaki and Sakurai cite{MS99} first evaluated security of offline anonymous electronic cash systems against the insider attacks by untrusted authorities. They analyzed the security of the existing electronic cash systems and categorized the systems into four types. In this paper, we reconsider the security of offline anonymous electronic cash systems including more recent systems based on the classification of Miyazaki and Sakurai.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In keeping with green IT, we propose reusing obsolete older-model PCs as a grid to create a high performance environment consisting of ordinary PCs. However, such a grid has continuous energy requirements, which is undesirable in terms of environmental concerns, due to the increased CO2 emissions from generating the required electricity. Therefore, this study aims to realize a grid powered by solar power to overcome the disadvantage, while reusing obsolete older model PCs. In this paper, we propose a means of operating a grid system powered by photovoltaics using weather reports to operate the system effectively and validate the proposal through simulations.
{"title":"A Study on Operation of Photovoltaic Grid System Using Weather Forecast","authors":"Kenichi Fujii, M. Yamagiwa, M. Uehara","doi":"10.1109/INCoS.2011.41","DOIUrl":"https://doi.org/10.1109/INCoS.2011.41","url":null,"abstract":"In keeping with green IT, we propose reusing obsolete older-model PCs as a grid to create a high performance environment consisting of ordinary PCs. However, such a grid has continuous energy requirements, which is undesirable in terms of environmental concerns, due to the increased CO2 emissions from generating the required electricity. Therefore, this study aims to realize a grid powered by solar power to overcome the disadvantage, while reusing obsolete older model PCs. In this paper, we propose a means of operating a grid system powered by photovoltaics using weather reports to operate the system effectively and validate the proposal through simulations.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The applications for Mobile Ad-hoc Networks (MANETs) are increasing and many research is done in this field. Real world experiments are an important way to test the behavior and performance of MANETs. We implemented a MANET test bed, to test these networks. In this paper, we compare the experimental results of our indoor MANET test bed for different environments, in a horizontal plane and a vertical plane. We analyze Better Approach To Mobile Ad-hoc Network (BATMAN) routing protocol and evaluate the system in terms of throughput and packet loss. From our experiments, we show that, when nodes are mobile, the performance of the communication decreases for both planes. However the performance in the horizontal plane is better than in the vertical plane.
{"title":"Comparison of Experimental Results of a MANET Testbed in Different Environments Considering BATMAN Protocol","authors":"Elis Kulla, M. Hiyama, Makoto Ikeda, L. Barolli","doi":"10.1109/INCoS.2011.69","DOIUrl":"https://doi.org/10.1109/INCoS.2011.69","url":null,"abstract":"The applications for Mobile Ad-hoc Networks (MANETs) are increasing and many research is done in this field. Real world experiments are an important way to test the behavior and performance of MANETs. We implemented a MANET test bed, to test these networks. In this paper, we compare the experimental results of our indoor MANET test bed for different environments, in a horizontal plane and a vertical plane. We analyze Better Approach To Mobile Ad-hoc Network (BATMAN) routing protocol and evaluate the system in terms of throughput and packet loss. From our experiments, we show that, when nodes are mobile, the performance of the communication decreases for both planes. However the performance in the horizontal plane is better than in the vertical plane.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}