首页 > 最新文献

2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)最新文献

英文 中文
An architecture for adhesive mobile crowdsourcing application 粘性移动众包应用程序的架构
Hazleen Aris
Continual increase in household items prices has prompted the need to have a mechanism that enables comparison of prices to be made between different stores. Through the comparison, consumers are able to find stores that sell items at lower prices, hence helping them to save on their household expenditures. The success of this mechanism strongly relies on the timeliness and comprehensiveness of the prices information. Due to the large number of stores available and the nature of items prices that keep changing from time to time, ensuring the timeliness and comprehensiveness of the information is very challenging. Mobile crowdsourcing was therefore identified as the most suitable method to be used in addressing the challenge, because in mobile crowdsourcing, the information will be contributed by the consumers through their mobile devices. Hence, the sources of information are unlimited, both temporally and spatially. A critical success factor of this mechanism, which also holds true in any crowdsourcing-based application, is the volume of participating crowd, in this case, the consumers. Without their participation, the objective of any crowdsourcing activities cannot be achieved. Therefore, in this paper, an adhesive architecture for mobile crowdsourcing is proposed, which took into consideration the elements that can help in attracting consistent participation from the crowd.
家庭用品价格的持续上涨促使人们需要建立一种能够在不同商店之间进行价格比较的机制。通过比较,消费者能够找到售价较低的商店,从而帮助他们节省家庭开支。这一机制的成功在很大程度上取决于价格信息的及时性和全面性。由于可供选择的商店数量众多,而且商品价格不时变化,因此确保信息的及时性和全面性非常具有挑战性。因此,移动众包被认为是应对这一挑战的最合适方法,因为在移动众包中,信息将由消费者通过其移动设备提供。因此,信息来源在时间和空间上都是无限的。这一机制成功的关键因素是参与人群的数量,这里指的是消费者。没有他们的参与,任何众包活动的目标都无法实现。因此,本文提出了移动众包的粘合剂架构,其中考虑到了有助于吸引群众持续参与的要素。
{"title":"An architecture for adhesive mobile crowdsourcing application","authors":"Hazleen Aris","doi":"10.1109/ICMU.2015.7061031","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061031","url":null,"abstract":"Continual increase in household items prices has prompted the need to have a mechanism that enables comparison of prices to be made between different stores. Through the comparison, consumers are able to find stores that sell items at lower prices, hence helping them to save on their household expenditures. The success of this mechanism strongly relies on the timeliness and comprehensiveness of the prices information. Due to the large number of stores available and the nature of items prices that keep changing from time to time, ensuring the timeliness and comprehensiveness of the information is very challenging. Mobile crowdsourcing was therefore identified as the most suitable method to be used in addressing the challenge, because in mobile crowdsourcing, the information will be contributed by the consumers through their mobile devices. Hence, the sources of information are unlimited, both temporally and spatially. A critical success factor of this mechanism, which also holds true in any crowdsourcing-based application, is the volume of participating crowd, in this case, the consumers. Without their participation, the objective of any crowdsourcing activities cannot be achieved. Therefore, in this paper, an adhesive architecture for mobile crowdsourcing is proposed, which took into consideration the elements that can help in attracting consistent participation from the crowd.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A post-haiyan community level mobility model 后海燕时代的社区流动模式
J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki
For the past decade, there has been an increase in the frequency and impact of natural disasters. Information and communications technology (ICT) can be used to minimize the impact of disasters in many ways. However, before deployment, disaster-related ICT systems need to be tested and validated using the appropriate modeling and simulation tools. In this study, we propose a post-disaster mobility model at the community level based on real-world data during the aftermath of Typhoon Haiyan. The construction of an appropriate model is challenging because of the large amount of heterogeneous data collected. Nevertheless, a mobility model from these disaster big data will be useful in evaluating the effectiveness of different ICT-based disaster application systems.
在过去十年中,自然灾害的频率和影响都有所增加。信息和通信技术(ICT)可以在许多方面用于尽量减少灾害的影响。然而,在部署之前,与灾害相关的ICT系统需要使用适当的建模和仿真工具进行测试和验证。在本研究中,我们提出了一个基于实际数据的海燕台风灾后社区层面的灾后流动性模型。由于收集了大量异构数据,因此构建适当的模型具有挑战性。然而,从这些灾难大数据中提取的移动性模型将有助于评估不同的基于信息通信技术的灾难应用系统的有效性。
{"title":"A post-haiyan community level mobility model","authors":"J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki","doi":"10.1109/ICMU.2015.7061034","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061034","url":null,"abstract":"For the past decade, there has been an increase in the frequency and impact of natural disasters. Information and communications technology (ICT) can be used to minimize the impact of disasters in many ways. However, before deployment, disaster-related ICT systems need to be tested and validated using the appropriate modeling and simulation tools. In this study, we propose a post-disaster mobility model at the community level based on real-world data during the aftermath of Typhoon Haiyan. The construction of an appropriate model is challenging because of the large amount of heterogeneous data collected. Nevertheless, a mobility model from these disaster big data will be useful in evaluating the effectiveness of different ICT-based disaster application systems.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Outage performance of secure multicasting in the presence of multiple eavesdroppers 存在多个窃听者时安全组播的中断性能
Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori
Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.
近年来,在无线通信网络中应用多天线来实现信息安全已成为人们日益关注的问题。在本文中,我们考虑了在多个多天线窃听器存在的情况下,普通机密数据从单天线发射器传输到多个多天线接收器。接收方和窃听方都采用最大比合并(MRC)技术将多天线接收到的信号进行合并。对于所考虑的系统,我们分别导出其连接中断概率和保密中断概率来表征其可靠性水平和安全水平。数值结果分析了可靠性和安全性能与接收方和窃听方天线(或节点)数量之间的权衡。
{"title":"Outage performance of secure multicasting in the presence of multiple eavesdroppers","authors":"Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori","doi":"10.1109/ICMU.2015.7061056","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061056","url":null,"abstract":"Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploring UX issues in Quantified Self technologies 探索量化自我技术中的用户体验问题
Je-ho Oh, Uichin Lee
The Quantified Self is a movement that promotes the use of technology for self-tracking various kinds of personal information, such as physical activities and energy consumption. In this paper, we study the user reviews of quantified self tools, as reported on a quantified self community website. We perform a content analysis to categorize tracking tools, and to explore user experience (UX) issues related to quantified self technologies. From this analysis, we find various tracking categories, including body state (e.g., physical and physiological), psychological state and traits, activities (e.g., exercise, eating, sleep), social interactions, and environmental and property states. Furthermore, we find the key UX issues associated with quantified self technologies, which include data controllability, data integration, data accuracy, data visualization, input complexity, sharing/privacy, design/aesthetics, and engagement. The UX issues reported in this paper have significant implications for the design of quantified self technologies.
量化自我(Quantified Self)是一项促进使用技术来自我跟踪各种个人信息的运动,例如身体活动和能源消耗。在本文中,我们研究了量化自我工具的用户评论,这些评论来自于一个量化自我社区网站。我们执行内容分析来对跟踪工具进行分类,并探索与量化自我技术相关的用户体验(UX)问题。从这个分析中,我们发现了各种跟踪类别,包括身体状态(例如,身体和生理),心理状态和特征,活动(例如,运动,饮食,睡眠),社会互动以及环境和财产状态。此外,我们发现了与量化自我技术相关的关键用户体验问题,包括数据可控性、数据集成、数据准确性、数据可视化、输入复杂性、共享/隐私、设计/美学和参与度。本文报告的用户体验问题对量化自我技术的设计具有重要意义。
{"title":"Exploring UX issues in Quantified Self technologies","authors":"Je-ho Oh, Uichin Lee","doi":"10.1109/ICMU.2015.7061028","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061028","url":null,"abstract":"The Quantified Self is a movement that promotes the use of technology for self-tracking various kinds of personal information, such as physical activities and energy consumption. In this paper, we study the user reviews of quantified self tools, as reported on a quantified self community website. We perform a content analysis to categorize tracking tools, and to explore user experience (UX) issues related to quantified self technologies. From this analysis, we find various tracking categories, including body state (e.g., physical and physiological), psychological state and traits, activities (e.g., exercise, eating, sleep), social interactions, and environmental and property states. Furthermore, we find the key UX issues associated with quantified self technologies, which include data controllability, data integration, data accuracy, data visualization, input complexity, sharing/privacy, design/aesthetics, and engagement. The UX issues reported in this paper have significant implications for the design of quantified self technologies.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Comparing nape vs. T4 placement for a mobile Wireless Gait Analysis sensor using the Dynamic Gait Index test 使用动态步态指数测试比较移动无线步态分析传感器的颈背与T4放置
B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie
A comprehensive and quantified gait analysis is warranted for patients with balance disorders to prevent injury such as falls. We report here a custom-designed wireless-gait-analysis-sensor (WGAS) to perform functional gait analysis targeted for clinically evaluating balance disorders. We report here our first efforts to determine the optimal placements of the WGAS in normal subjects for movement differentiation, while minimizing outliers and data artifacts with improved sensor technology. Normal subjects performed a gold-standard Dynamic Gait Index (DGI) tests for fall risk assessment, while the WGAS was adhered to either the T4 or the nape area. Our WGAS consists of a 3-axis linear accelerometer and gyroscopes, and the real-time gait data was transmitted wirelessly to a nearby PC and statistical analysis was done on each of the 7 DGI test on 3 volunteers repeated five times for either placement. The data suggests T4 is the preferred WGAS placement for gait analysis.
一个全面的和量化的步态分析是必要的平衡障碍的患者,以防止伤害,如跌倒。我们在此报告了一种定制设计的无线步态分析传感器(WGAS),用于进行针对临床评估平衡障碍的功能性步态分析。我们在这里报告了我们的第一次努力,以确定WGAS在正常受试者中用于运动分化的最佳位置,同时通过改进的传感器技术最小化异常值和数据伪像。正常受试者进行金标准动态步态指数(DGI)测试以评估跌倒风险,同时将WGAS粘附在T4或颈背区域。我们的WGAS由一个3轴线性加速度计和陀螺仪组成,实时步态数据被无线传输到附近的PC上,并对3名志愿者的7 DGI测试进行统计分析,每个测试重复5次。数据表明T4是步态分析的首选WGAS位置。
{"title":"Comparing nape vs. T4 placement for a mobile Wireless Gait Analysis sensor using the Dynamic Gait Index test","authors":"B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie","doi":"10.1109/ICMU.2015.7061033","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061033","url":null,"abstract":"A comprehensive and quantified gait analysis is warranted for patients with balance disorders to prevent injury such as falls. We report here a custom-designed wireless-gait-analysis-sensor (WGAS) to perform functional gait analysis targeted for clinically evaluating balance disorders. We report here our first efforts to determine the optimal placements of the WGAS in normal subjects for movement differentiation, while minimizing outliers and data artifacts with improved sensor technology. Normal subjects performed a gold-standard Dynamic Gait Index (DGI) tests for fall risk assessment, while the WGAS was adhered to either the T4 or the nape area. Our WGAS consists of a 3-axis linear accelerometer and gyroscopes, and the real-time gait data was transmitted wirelessly to a nearby PC and statistical analysis was done on each of the 7 DGI test on 3 volunteers repeated five times for either placement. The data suggests T4 is the preferred WGAS placement for gait analysis.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of an energy-efficient lighting system driven by wireless sensor networks 无线传感器网络驱动的节能照明系统的设计与实现
Motoi Okada, H. Aida, H. Ichikawa, M. Miki
A wireless sensor network is a technology that aims to collect real world information by wireless communication which connects many computer to network, and it is expected its practical realization. On the other hand, research on the office environment also has attracted a great deal of attention in recent years. It has been reported that light environment affects the productivity of user. In this paper, we propose wireless sensor network-driven intelligent lighting system (WSN-ILS below). WSN-ILS provides a light environment to each user by innetwork processing in wireless sensor network. WSN-ILS achieves energy-efficient light environment by performing an individual control to each lighting from sensor node. WSN-ILS has two schemes to control lighting from the sensor node. We will examine effectiveness of the WSN-ILS on an existing equipment.
无线传感器网络是一种将多台计算机连接到网络上,通过无线通信来采集真实世界信息的技术,其实用化有望实现。另一方面,近年来对办公环境的研究也引起了人们的极大关注。据报道,光环境影响用户的生产力。在本文中,我们提出了无线传感器网络驱动的智能照明系统(WSN-ILS)。WSN-ILS在无线传感器网络中通过网络内处理为每个用户提供一个光环境。WSN-ILS通过对来自传感器节点的每个照明执行单独控制来实现节能光环境。WSN-ILS有两种从传感器节点控制照明的方案。我们将检验WSN-ILS在现有设备上的有效性。
{"title":"Design and implementation of an energy-efficient lighting system driven by wireless sensor networks","authors":"Motoi Okada, H. Aida, H. Ichikawa, M. Miki","doi":"10.1109/ICMU.2015.7061052","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061052","url":null,"abstract":"A wireless sensor network is a technology that aims to collect real world information by wireless communication which connects many computer to network, and it is expected its practical realization. On the other hand, research on the office environment also has attracted a great deal of attention in recent years. It has been reported that light environment affects the productivity of user. In this paper, we propose wireless sensor network-driven intelligent lighting system (WSN-ILS below). WSN-ILS provides a light environment to each user by innetwork processing in wireless sensor network. WSN-ILS achieves energy-efficient light environment by performing an individual control to each lighting from sensor node. WSN-ILS has two schemes to control lighting from the sensor node. We will examine effectiveness of the WSN-ILS on an existing equipment.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks 适应节点行为的信任评估方法,用于移动特设网络的安全路由选择
Sayaka Umeda, Sonoko Takeda, H. Shigeno
In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.
在移动 ad-hoc 网络(MANETs)中,存在一些自私的节点,它们会丢弃接收到的数据包,因为节点的资源有限。作为安全机制之一,安全路由协议应运而生。在安全路由协议中,每个节点都能检测到自私节点,并通过查询信任值来决定安全路径。在这里,信任值表示节点或路径的可靠性。在这些现有的路由协议中,为了获得稳定的信任值,假定所有节点都保持相同的行为。然而,由于移动节点的资源会随着时间的推移而减少,因此存在行为变化的自私节点。因此,由于很难实时准确地计算行为变化节点的信任值,因此存在两个问题。一个是对自私节点的判断失误,另一个是无法选择安全路径。本文提出的 TEAB 是一种适应节点行为的信任评估方法。我们引入了自适应时间窗口,即评估信任值的时间段。每个节点对每个邻居使用一个可变的时间窗口,减少过去行为的不良影响。这样,每个节点都能在包括行为变化节点在内的环境中正确计算信任值。此外,在使用 TEAB 的安全路由协议中,每个节点都可以选择仅由合作节点组成的安全通信路径。仿真结果表明,每个节点都能正确检测到自私节点,并开始通过使用 TEAB 的安全路径进行通信。
{"title":"Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks","authors":"Sayaka Umeda, Sonoko Takeda, H. Shigeno","doi":"10.1109/ICMU.2015.7061057","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061057","url":null,"abstract":"In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Vinteraction: Vibration-based information transfer for smart devices 交互:智能设备基于振动的信息传递
Takuro Yonezawa, J. Nakazawa, H. Tokuda
According to the spread of smart devices such as smartphones and smart tablets, opportunities to communicate between them will be more increased. Though we usually use WiFi and Bluetooth, it is still burden task for end-users. Many previous techniques to collaborate devices easily has been also proposed, they are not always best solution in some situations. This paper proposes a new interaction method called Vinteracion, which leverages combination of vibrator and accelerometer to send information from smart device to the other smart device. Vinteraction enables users to use touch interaction like Near Field Communication, which provides easy and intuitive way. We present an algorithm and implementation of vibration-based communication that can be adapted to any combination of smart devices. We also present several applications which leverages Vinteraction effectively. Through an evaluation by using popular six products, we confirmed that Vinteraction is easy to use transfer method with current products with reasonable performance.
随着智能手机和智能平板电脑等智能设备的普及,它们之间的交流机会将会更多。虽然我们通常使用WiFi和蓝牙,但对于最终用户来说仍然是一项负担。以前也提出了许多轻松协作设备的技术,但它们并不总是在某些情况下的最佳解决方案。本文提出了一种新的交互方法,称为Vinteracion,它利用振动器和加速度计的组合将信息从智能设备发送到另一个智能设备。v交互使用户能够使用近场通信等触摸交互,提供了简单直观的方式。我们提出了一种基于振动的通信算法和实现,可以适应任何智能设备的组合。我们还介绍了几个有效利用v交互的应用程序。通过对目前流行的6款产品进行评估,我们确认了Vinteraction是一种易于使用的传输方法,与现有产品的性能合理。
{"title":"Vinteraction: Vibration-based information transfer for smart devices","authors":"Takuro Yonezawa, J. Nakazawa, H. Tokuda","doi":"10.1109/ICMU.2015.7061059","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061059","url":null,"abstract":"According to the spread of smart devices such as smartphones and smart tablets, opportunities to communicate between them will be more increased. Though we usually use WiFi and Bluetooth, it is still burden task for end-users. Many previous techniques to collaborate devices easily has been also proposed, they are not always best solution in some situations. This paper proposes a new interaction method called Vinteracion, which leverages combination of vibrator and accelerometer to send information from smart device to the other smart device. Vinteraction enables users to use touch interaction like Near Field Communication, which provides easy and intuitive way. We present an algorithm and implementation of vibration-based communication that can be adapted to any combination of smart devices. We also present several applications which leverages Vinteraction effectively. Through an evaluation by using popular six products, we confirmed that Vinteraction is easy to use transfer method with current products with reasonable performance.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121539777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Applicability of a layered architecture adopting distributed data processing to M2M communications 采用分布式数据处理的分层体系结构在M2M通信中的适用性
M. Katoh, I. Sato, Ken-ichi Fukuda
We show that a layered architecture distributing M2M application to multiple processing entities in the M2M network is applicable for ubiquitous era. This paper firstly introduces a layered architecture of M2M system, where we put layers for the decomposition of application and the association of de-composited subroutines. Next, we categorize the association of subroutines into two patterns (sequential and random order), and model schemes on state managements (centralization and distribution). Then, we clarify the condition that the performance can be improved by distributed management in terms of processing time for two association patterns. Next, the deployment of de-composited subroutines on processing entities is discussed, where we show basic rules to reduce carried traffic. Finally, we address the requirements of messaging between two processing entities in M2M network to provide QoS such as time limitation.
研究表明,将M2M应用程序分布到M2M网络中的多个处理实体的分层体系结构适用于泛在时代。本文首先介绍了M2M系统的分层体系结构,在该体系结构中,我们对应用程序进行分层分解,并将分解后的子程序进行关联。接下来,我们将子例程的关联分为两种模式(顺序和随机顺序),并对状态管理模式(集中和分布)进行建模。然后,我们从处理时间的角度阐明了分布式管理可以提高两种关联模式的性能的条件。接下来,讨论在处理实体上部署分解子例程,其中我们展示了减少携带流量的基本规则。最后,我们解决了M2M网络中两个处理实体之间的消息传递需求,以提供诸如时间限制之类的QoS。
{"title":"Applicability of a layered architecture adopting distributed data processing to M2M communications","authors":"M. Katoh, I. Sato, Ken-ichi Fukuda","doi":"10.1109/ICMU.2015.7061050","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061050","url":null,"abstract":"We show that a layered architecture distributing M2M application to multiple processing entities in the M2M network is applicable for ubiquitous era. This paper firstly introduces a layered architecture of M2M system, where we put layers for the decomposition of application and the association of de-composited subroutines. Next, we categorize the association of subroutines into two patterns (sequential and random order), and model schemes on state managements (centralization and distribution). Then, we clarify the condition that the performance can be improved by distributed management in terms of processing time for two association patterns. Next, the deployment of de-composited subroutines on processing entities is discussed, where we show basic rules to reduce carried traffic. Finally, we address the requirements of messaging between two processing entities in M2M network to provide QoS such as time limitation.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demand map-based data dissemination scheme for location dependent data in VANETs VANETs中位置相关数据的需求地图数据分发方案
Yuya Niimi, S. Ishihara
In this paper, we described the design of Demand map-based data distribution scheme and preliminary simulation results. The soft-state sketch is used for the data structure of elements of Dmap information to make the size of Dmap on memory small and the system scalable. We are working on developing detailed design of the Dmap and Dmap-based data dissemination.
在本文中,我们描述了基于需求图的数据分发方案的设计和初步的仿真结果。Dmap信息元素的数据结构采用软状态草图,使Dmap在内存上的大小较小,系统具有可扩展性。我们正在开发Dmap的详细设计和基于Dmap的数据传播。
{"title":"Demand map-based data dissemination scheme for location dependent data in VANETs","authors":"Yuya Niimi, S. Ishihara","doi":"10.1109/ICMU.2015.7061047","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061047","url":null,"abstract":"In this paper, we described the design of Demand map-based data distribution scheme and preliminary simulation results. The soft-state sketch is used for the data structure of elements of Dmap information to make the size of Dmap on memory small and the system scalable. We are working on developing detailed design of the Dmap and Dmap-based data dissemination.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1