Jie Wu, Václav Svaton, J. Martinovič, Eliska Ochodkova, V. Snás̃el
The robot soccer game is full of challenges in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In this paper, a method to generate offensive strategies based on simulated game is presented. The experiments show that states obtained during the simulated game are suited for new strategies generation and strategies optimization.
{"title":"Generation of Offensive Strategies in Robot Soccer Game","authors":"Jie Wu, Václav Svaton, J. Martinovič, Eliska Ochodkova, V. Snás̃el","doi":"10.1109/INCOS.2011.96","DOIUrl":"https://doi.org/10.1109/INCOS.2011.96","url":null,"abstract":"The robot soccer game is full of challenges in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In this paper, a method to generate offensive strategies based on simulated game is presented. The experiments show that states obtained during the simulated game are suited for new strategies generation and strategies optimization.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barolli, Gjergji Mino, Elis Kulla, A. Koyama, Jiro Iwashige
Several schemes have been proposed for CAC and handover in wireless cellular networks. However, during the complexity of CAC and handover in wireless environment, many simplified models and assumptions are made. Also, the CAC and handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of CAC and handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for CAC and handover for wireless cellular networks (called FICHS), which can operate with imprecision data and non-linear functions with arbitrary complexity. To evaluated the performance of FICHS we consider CAC with priority and enforced handover. We show that FICHS has a good behavior.
{"title":"Performance Evaluation of a Fuzzy-based Integrated CAC and Handover System for Cellular Networks","authors":"L. Barolli, Gjergji Mino, Elis Kulla, A. Koyama, Jiro Iwashige","doi":"10.1109/INCoS.2011.132","DOIUrl":"https://doi.org/10.1109/INCoS.2011.132","url":null,"abstract":"Several schemes have been proposed for CAC and handover in wireless cellular networks. However, during the complexity of CAC and handover in wireless environment, many simplified models and assumptions are made. Also, the CAC and handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of CAC and handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for CAC and handover for wireless cellular networks (called FICHS), which can operate with imprecision data and non-linear functions with arbitrary complexity. To evaluated the performance of FICHS we consider CAC with priority and enforced handover. We show that FICHS has a good behavior.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with a relationship between source height and the field attenuation along random rough surfaces (RRSs). First we introduce a discrete ray tracing method (DRTM) to numerically compute field distribution along RRSs. Second we review Hata's equation which is an empirical formula obtained by many out door data, and discuss that the field distribution in urban area depends on the antenna height. Finally we show the field distribution along RRSs computed by using the DRTM. We confirm whether the field distributions above RRSs depends on the source height or not.
{"title":"Relationship between Source Height and Distance Order of Propagation Along Random Rough Surface","authors":"J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.142","DOIUrl":"https://doi.org/10.1109/INCoS.2011.142","url":null,"abstract":"This paper is concerned with a relationship between source height and the field attenuation along random rough surfaces (RRSs). First we introduce a discrete ray tracing method (DRTM) to numerically compute field distribution along RRSs. Second we review Hata's equation which is an empirical formula obtained by many out door data, and discuss that the field distribution in urban area depends on the antenna height. Finally we show the field distribution along RRSs computed by using the DRTM. We confirm whether the field distributions above RRSs depends on the source height or not.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Severe damages hits at the Northern part of Japan on March 11, 2011. A massive 9.0 magnitude earthquake caused network disconnection over the wide area of Japan, and it brought serious damages with blackouts, fire, tsunami and nuclear plant crisis. Recorded as 9.0 on the Richter scale, it was the most powerful quake ever to hit Japan. At this disaster, our project team held network relief activities in some coast cities in Iwate prefecture. The satellite system and 3G system is provided as the network relief activities. In this paper, our network relief activities in evacuated places or disaster headquarters are introduced. Then, with the consideration of the activities, the policies under large scale disaster are discussed for the proposal data transmission methods of Cognitive Wireless Network.
{"title":"Cognitive Wireless Network for Large Scale Disaster","authors":"Noriki Uchida, Kazuo Takahata, Y. Shibata","doi":"10.1109/INCoS.2011.64","DOIUrl":"https://doi.org/10.1109/INCoS.2011.64","url":null,"abstract":"Severe damages hits at the Northern part of Japan on March 11, 2011. A massive 9.0 magnitude earthquake caused network disconnection over the wide area of Japan, and it brought serious damages with blackouts, fire, tsunami and nuclear plant crisis. Recorded as 9.0 on the Richter scale, it was the most powerful quake ever to hit Japan. At this disaster, our project team held network relief activities in some coast cities in Iwate prefecture. The satellite system and 3G system is provided as the network relief activities. In this paper, our network relief activities in evacuated places or disaster headquarters are introduced. Then, with the consideration of the activities, the policies under large scale disaster are discussed for the proposal data transmission methods of Cognitive Wireless Network.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Wakahara, Noriyasu Yamamoto, Natthaphong Udomkarn, Damri Samretwit, Wei-Yong Zhao
With the widespread of the Internet in recent years, various e-Learning systems are introduced in the universities. However, they are not necessarily used because of high cost, contents copyright and time-consuming contents making problems. In fact, the blended learning combined with traditional learning and e-Learning is often introduced in the universities. Then, the similar blended system is often utilized in the seminar laboratories. This paper presents a new blended seminar support system. In this system, the sound in the seminar is saved in the database and the seminar reports are made by using the bulletin board system with the meaning tags. Then, the communication information in the seminar is structured and the seminar report is systematically created by using the above information and meta data. The prototype system is designed and the configuration of this system and the display of user interface are also presented.
{"title":"A New Research Support System","authors":"T. Wakahara, Noriyasu Yamamoto, Natthaphong Udomkarn, Damri Samretwit, Wei-Yong Zhao","doi":"10.1109/INCoS.2011.29","DOIUrl":"https://doi.org/10.1109/INCoS.2011.29","url":null,"abstract":"With the widespread of the Internet in recent years, various e-Learning systems are introduced in the universities. However, they are not necessarily used because of high cost, contents copyright and time-consuming contents making problems. In fact, the blended learning combined with traditional learning and e-Learning is often introduced in the universities. Then, the similar blended system is often utilized in the seminar laboratories. This paper presents a new blended seminar support system. In this system, the sound in the seminar is saved in the database and the seminar reports are made by using the bulletin board system with the meaning tags. Then, the communication information in the seminar is structured and the seminar report is systematically created by using the above information and meta data. The prototype system is designed and the configuration of this system and the display of user interface are also presented.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In response to the increasing demand for asynchronous mass data exchange even by mobile users, the DTN-related technologies are considered promising for an efficient use of limited network resources and low-cost deployment at the expense of communication delays. The authors previously proposed a Virtual Segment concept aiming at a practical network infrastructure combining Internet-connected broadband wireless network devices, which have high data transmission rates but limited coverage areas, with a store-carry-forward networking by vehicles that is capable of bridging the gaps in broadband service areas in an asynchronous fashion. In this paper, as an extended framework to combine and integrate the wired/wireless communication networks with the transportation networks, Global Information Logistics Infrastructure (GILI) is briefly discussed. A case study of the GILI in a field experiment using school buses is reported with examining its potential. For this experiment, we develop a remote maintenance tool, as an example of store-carry-forward based asynchronous applications, which is shown to be useful in our framework.
为了应对移动用户对异步海量数据交换日益增长的需求,dtn相关技术被认为有希望有效利用有限的网络资源和以通信延迟为代价的低成本部署。作者之前提出了一个虚拟分段的概念,其目标是将互联网连接的宽带无线网络设备与能够以异步方式弥合宽带服务区域差距的车辆的存储-forward网络相结合的实际网络基础设施,该设备具有高数据传输速率但覆盖范围有限。本文简要讨论了全球信息物流基础设施(Global Information Logistics Infrastructure, GILI)作为有线/无线通信网络与运输网络相结合和集成的扩展框架。报告了在使用校车的实地实验中对GILI进行的案例研究,并审查了其潜力。在这个实验中,我们开发了一个远程维护工具,作为基于存储结转的异步应用程序的一个示例,它在我们的框架中被证明是有用的。
{"title":"Store-Carry-Forward Based Networking Infrastructure: Vision and Potential","authors":"S. Yamamura, Akira Nagata, M. Tsuru","doi":"10.1109/INCoS.2011.150","DOIUrl":"https://doi.org/10.1109/INCoS.2011.150","url":null,"abstract":"In response to the increasing demand for asynchronous mass data exchange even by mobile users, the DTN-related technologies are considered promising for an efficient use of limited network resources and low-cost deployment at the expense of communication delays. The authors previously proposed a Virtual Segment concept aiming at a practical network infrastructure combining Internet-connected broadband wireless network devices, which have high data transmission rates but limited coverage areas, with a store-carry-forward networking by vehicles that is capable of bridging the gaps in broadband service areas in an asynchronous fashion. In this paper, as an extended framework to combine and integrate the wired/wireless communication networks with the transportation networks, Global Information Logistics Infrastructure (GILI) is briefly discussed. A case study of the GILI in a field experiment using school buses is reported with examining its potential. For this experiment, we develop a remote maintenance tool, as an example of store-carry-forward based asynchronous applications, which is shown to be useful in our framework.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we provide an extension of maxmin fairness to the case of multiple objectives and different agent preferences by the definition of the maxmin multi-fairness relation. This generic relation is based on a formal modification of maxmin fairness according to its implicit comparisons and includes maxmin fairness as a special case. The application of this multi-fairness relation to a selfish, to a collaborative and to a mixed community of agents is presented, as well as a case study on a specific task of fair division of indivisible goods by numerical simulations. All studies demonstrate the suitability of the proposed relation for investigative tasks in shared resource problems, as they are abundant in network design and control.
{"title":"A Generic Approach to Multi-fairness and Its Application to Wireless Channel Allocation","authors":"M. Köppen, Kaori Yoshida, M. Tsuru","doi":"10.1109/INCoS.2011.23","DOIUrl":"https://doi.org/10.1109/INCoS.2011.23","url":null,"abstract":"In this paper we provide an extension of maxmin fairness to the case of multiple objectives and different agent preferences by the definition of the maxmin multi-fairness relation. This generic relation is based on a formal modification of maxmin fairness according to its implicit comparisons and includes maxmin fairness as a special case. The application of this multi-fairness relation to a selfish, to a collaborative and to a mixed community of agents is presented, as well as a case study on a specific task of fair division of indivisible goods by numerical simulations. All studies demonstrate the suitability of the proposed relation for investigative tasks in shared resource problems, as they are abundant in network design and control.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128231314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The applications for Mobile Ad-hoc Networks (MANETs) are increasing and many research is done in this field. Real world experiments are an important way to test the behavior and performance of MANETs. We implemented a MANET test bed, to test these networks. In this paper, we compare the experimental results of our indoor MANET test bed for different environments, in a horizontal plane and a vertical plane. We analyze Better Approach To Mobile Ad-hoc Network (BATMAN) routing protocol and evaluate the system in terms of throughput and packet loss. From our experiments, we show that, when nodes are mobile, the performance of the communication decreases for both planes. However the performance in the horizontal plane is better than in the vertical plane.
{"title":"Comparison of Experimental Results of a MANET Testbed in Different Environments Considering BATMAN Protocol","authors":"Elis Kulla, M. Hiyama, Makoto Ikeda, L. Barolli","doi":"10.1109/INCoS.2011.69","DOIUrl":"https://doi.org/10.1109/INCoS.2011.69","url":null,"abstract":"The applications for Mobile Ad-hoc Networks (MANETs) are increasing and many research is done in this field. Real world experiments are an important way to test the behavior and performance of MANETs. We implemented a MANET test bed, to test these networks. In this paper, we compare the experimental results of our indoor MANET test bed for different environments, in a horizontal plane and a vertical plane. We analyze Better Approach To Mobile Ad-hoc Network (BATMAN) routing protocol and evaluate the system in terms of throughput and packet loss. From our experiments, we show that, when nodes are mobile, the performance of the communication decreases for both planes. However the performance in the horizontal plane is better than in the vertical plane.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127947571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the design of electronic cash systems, we usually focus on preventing customers' malicious behaviors. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insider attacks by the untrusted authorities also need to be handled carefully. Miyazaki and Sakurai cite{MS99} first evaluated security of offline anonymous electronic cash systems against the insider attacks by untrusted authorities. They analyzed the security of the existing electronic cash systems and categorized the systems into four types. In this paper, we reconsider the security of offline anonymous electronic cash systems including more recent systems based on the classification of Miyazaki and Sakurai.
{"title":"Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited","authors":"T. Nishide, K. Sakurai","doi":"10.1109/INCoS.2011.146","DOIUrl":"https://doi.org/10.1109/INCoS.2011.146","url":null,"abstract":"In the design of electronic cash systems, we usually focus on preventing customers' malicious behaviors. However, since authorities such as banks and certificate authorities may have important secret data of customers, the insider attacks by the untrusted authorities also need to be handled carefully. Miyazaki and Sakurai cite{MS99} first evaluated security of offline anonymous electronic cash systems against the insider attacks by untrusted authorities. They analyzed the security of the existing electronic cash systems and categorized the systems into four types. In this paper, we reconsider the security of offline anonymous electronic cash systems including more recent systems based on the classification of Miyazaki and Sakurai.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with reducing computation time of electromagnetic field by using Horner method. Recently, authors have proposed discrete ray tracing method (DRTM) to analyze electromagnetic wave of propagation characteristics along random rough surface (RRS). The DRTM enables us to save much computation time of electromagnetic field in comparison with the conventional ray tracing method (RTM). However, we need many computation times to analyze electromagnetic field because a lot of diffractions occur above RRSs. In this paper, we introduce an approximation by using Horner method for diffraction function which is simple and effective to DRTM analyses.
{"title":"Application of Horner Method to Approximate Fresnel Function","authors":"Yuuki Kimura, J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.56","DOIUrl":"https://doi.org/10.1109/INCoS.2011.56","url":null,"abstract":"This paper is concerned with reducing computation time of electromagnetic field by using Horner method. Recently, authors have proposed discrete ray tracing method (DRTM) to analyze electromagnetic wave of propagation characteristics along random rough surface (RRS). The DRTM enables us to save much computation time of electromagnetic field in comparison with the conventional ray tracing method (RTM). However, we need many computation times to analyze electromagnetic field because a lot of diffractions occur above RRSs. In this paper, we introduce an approximation by using Horner method for diffraction function which is simple and effective to DRTM analyses.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}