As society ages, a social problem of what is called “shopping refugees” who have difficulty buying daily necessities has emerged in recent years. Therefore, we developed the Shopping Refugees Support Robot which enables them to order items through Social Networking Service (SNS) by voice conversation without relying on smartphones. By store's advanced registration of item information on a web application, the elderly can acquire the information of recommended items of the day through the Robot and order their favorite items by a conversation with the Robot. The order information is notified to the store via SNS. We implemented the prototype of this system and confirmed its validity in terms of the functions and the user interface.
{"title":"Shopping Refugees Support Robot with SNS Agency Function","authors":"Toru Kobayashi, Takahiro Honda, Kenichi Arai, Tetsuo Imai","doi":"10.23919/ICMU48249.2019.9006641","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006641","url":null,"abstract":"As society ages, a social problem of what is called “shopping refugees” who have difficulty buying daily necessities has emerged in recent years. Therefore, we developed the Shopping Refugees Support Robot which enables them to order items through Social Networking Service (SNS) by voice conversation without relying on smartphones. By store's advanced registration of item information on a web application, the elderly can acquire the information of recommended items of the day through the Robot and order their favorite items by a conversation with the Robot. The order information is notified to the store via SNS. We implemented the prototype of this system and confirmed its validity in terms of the functions and the user interface.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128707504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006645
H. Maeda, S. Saiki, Masahide Nakamura, K. Yasuda
To support in-home long-term care, we are studying techniques of mind sensing, which externalizes internal states of elderly people as words through conversations with agents or robots. We previously developed the memory-aid service, where a chatbot on a mobile phone autonomously talks to elderly people, to record their conditions, events, and memorandums. During experiments with healthy elders, we found that they regularly talked to the chatbot about health status, such as weight and blood pressure. This motivated us to use the mind sensing as an affordable and practical means to record daily health status. In this paper, we present a method where individual users can declare health metrics of their interests, and record them through the mind sensing. Specifically, for each user-defined metric, the chatbot asks the user the current value of the metric at the designated time. The text conversations are then put in a data mining process to extract time-series values of the metric. The time-series data is finally visualized as a graph, with which the user can review the health status. Our preliminary experiment shows that individual health metrics can be recorded and visualized successfully even without “connected” measuring instruments.
{"title":"Recording Daily Health Status with Chatbot on Mobile Phone - A Preliminary Study","authors":"H. Maeda, S. Saiki, Masahide Nakamura, K. Yasuda","doi":"10.23919/ICMU48249.2019.9006645","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006645","url":null,"abstract":"To support in-home long-term care, we are studying techniques of mind sensing, which externalizes internal states of elderly people as words through conversations with agents or robots. We previously developed the memory-aid service, where a chatbot on a mobile phone autonomously talks to elderly people, to record their conditions, events, and memorandums. During experiments with healthy elders, we found that they regularly talked to the chatbot about health status, such as weight and blood pressure. This motivated us to use the mind sensing as an affordable and practical means to record daily health status. In this paper, we present a method where individual users can declare health metrics of their interests, and record them through the mind sensing. Specifically, for each user-defined metric, the chatbot asks the user the current value of the metric at the designated time. The text conversations are then put in a data mining process to extract time-series values of the metric. The time-series data is finally visualized as a graph, with which the user can review the health status. Our preliminary experiment shows that individual health metrics can be recorded and visualized successfully even without “connected” measuring instruments.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006670
Toshiya Miyazaki, H. Shigeno, T. Yashiro
Dynamic Route Guidance (DRG) systems determine the traveling routes of vehicles and solve traffic problems in urban areas. Ad-hoc network composed of vehicles, called VANET is being conducted and VANET-based DRG systems are proposed. In VANET-based DRG systems, a dynamic topology on VANET is one of the biggest challenges. Packet loss prevents decision of proper traveling routes. Therefore, this paper adapts the ICN concept to VANET, called IC-VANET. In IC-VANET, each vehicle acquires traffic information by multi-hop request / response type communication, and it caches contents. Then, we propose a traffic information collection and routing protocols using Virtual Nodes (VNRP) where packets are relayed via Virtual Nodes preferentially for improving data acquisition rate and communication overhead. Virtual Node (VN) is a logical node that is maintained at a specific area considering the vehicle density by inter-vehicle communication with surrounding vehicles, and it collects traffic information. We compared the proposal method with the conventional VANET method by simulation and evaluated the performance.
{"title":"Routing Protocol Using Virtual Nodes for Traffic Information Collection in Information Centric Vehicular Ad-hoc Networks","authors":"Toshiya Miyazaki, H. Shigeno, T. Yashiro","doi":"10.23919/ICMU48249.2019.9006670","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006670","url":null,"abstract":"Dynamic Route Guidance (DRG) systems determine the traveling routes of vehicles and solve traffic problems in urban areas. Ad-hoc network composed of vehicles, called VANET is being conducted and VANET-based DRG systems are proposed. In VANET-based DRG systems, a dynamic topology on VANET is one of the biggest challenges. Packet loss prevents decision of proper traveling routes. Therefore, this paper adapts the ICN concept to VANET, called IC-VANET. In IC-VANET, each vehicle acquires traffic information by multi-hop request / response type communication, and it caches contents. Then, we propose a traffic information collection and routing protocols using Virtual Nodes (VNRP) where packets are relayed via Virtual Nodes preferentially for improving data acquisition rate and communication overhead. Virtual Node (VN) is a logical node that is maintained at a specific area considering the vehicle density by inter-vehicle communication with surrounding vehicles, and it collects traffic information. We compared the proposal method with the conventional VANET method by simulation and evaluated the performance.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006649
A. Segawa, R. Kiyohara
It has been observed that some vehicles do not use inter-vehicle or inter-road communication in the mixed environment of autonomous vehicles and human-operated vehicles. Therefore, the traffic flow in mixed environments may be worse than in the case in which the environment includes only autonomous vehicles. In our previous research, we proposed a protocol for this environment. However, our evaluation was restricted to limited areas. In this paper, we evaluate our protocol for wide areas and discuss our results.
{"title":"Reducing Waiting Time at an Intersection with Autnomous and Non-autonomous Vehicles","authors":"A. Segawa, R. Kiyohara","doi":"10.23919/ICMU48249.2019.9006649","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006649","url":null,"abstract":"It has been observed that some vehicles do not use inter-vehicle or inter-road communication in the mixed environment of autonomous vehicles and human-operated vehicles. Therefore, the traffic flow in mixed environments may be worse than in the case in which the environment includes only autonomous vehicles. In our previous research, we proposed a protocol for this environment. However, our evaluation was restricted to limited areas. In this paper, we evaluate our protocol for wide areas and discuss our results.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006661
Katsuya Matsubara, Atsuya Sato
Utilizing machine learning inference in mobile platforms have been made realistic since recent smartphones may have high-performance processors and hardware accelerators of signal and image processing. However, it could bring issues. One of the most significant issues is that any machine learning inferences can be unlimitedly applied to personal data which once the application got permitted to. Furthermore, it could be quite hard to understand the behavior of a ‘pre-trained’ machine learning model and the behavior of an installed application can be transparently modified afterword by replacing a used model. This research aims to implement access control against such functionalities of machine learning inference for mobile platforms. In this paper, we describe how to verify used pre-trained models and how to implement permission control at Android Neural Networks API for Android as a target platform. And we also show an evaluation result with a prototype implementation.
{"title":"An Access Control Mechanism for Pre-trained ML Models in Mobile Apps","authors":"Katsuya Matsubara, Atsuya Sato","doi":"10.23919/ICMU48249.2019.9006661","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006661","url":null,"abstract":"Utilizing machine learning inference in mobile platforms have been made realistic since recent smartphones may have high-performance processors and hardware accelerators of signal and image processing. However, it could bring issues. One of the most significant issues is that any machine learning inferences can be unlimitedly applied to personal data which once the application got permitted to. Furthermore, it could be quite hard to understand the behavior of a ‘pre-trained’ machine learning model and the behavior of an installed application can be transparently modified afterword by replacing a used model. This research aims to implement access control against such functionalities of machine learning inference for mobile platforms. In this paper, we describe how to verify used pre-trained models and how to implement permission control at Android Neural Networks API for Android as a target platform. And we also show an evaluation result with a prototype implementation.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127272832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006655
Koki Iwai, Takanobu Ohnuma, Riku Inada, H. Shigeno
Carrier sense multiple access/collision avoidance (CSMA/CA) in wireless local area network (WLAN) is considered as a complex protocol for modeling due to its autonomous function and influence of interference with medium shared by multiple nodes. IEEE 802.11ax, a sixth generation WLAN standard, enables various flows with different modulation coding scheme (MCS) and traffic load, transmission power (TxP), clear channel assessment threshold (CCAT) to coexist in a WLAN. This variation makes modeling of WLAN system more difficult. This paper proposes a throughput model for high efficiency WLAN analysis under any traffic load and MCS condition. This model factorizes throughput into five elements. This flexible model can be applied to any complex topology. In simulation evaluation, a correlation coefficient between the results of the proposed model and simulation is observed by at most 0.981. Furthermore, The results shows that the influence on the throughput due to the change in TxP is correctly modeled and minimum TxP for maximum throughput is revealed on a condition.
{"title":"Throughput Modeling and Analysis under Power Control in High Efficiency Wireless LAN","authors":"Koki Iwai, Takanobu Ohnuma, Riku Inada, H. Shigeno","doi":"10.23919/ICMU48249.2019.9006655","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006655","url":null,"abstract":"Carrier sense multiple access/collision avoidance (CSMA/CA) in wireless local area network (WLAN) is considered as a complex protocol for modeling due to its autonomous function and influence of interference with medium shared by multiple nodes. IEEE 802.11ax, a sixth generation WLAN standard, enables various flows with different modulation coding scheme (MCS) and traffic load, transmission power (TxP), clear channel assessment threshold (CCAT) to coexist in a WLAN. This variation makes modeling of WLAN system more difficult. This paper proposes a throughput model for high efficiency WLAN analysis under any traffic load and MCS condition. This model factorizes throughput into five elements. This flexible model can be applied to any complex topology. In simulation evaluation, a correlation coefficient between the results of the proposed model and simulation is observed by at most 0.981. Furthermore, The results shows that the influence on the throughput due to the change in TxP is correctly modeled and minimum TxP for maximum throughput is revealed on a condition.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}