首页 > 最新文献

Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media最新文献

英文 中文
Robot Enabled Service Personalisation Based On Emotion Feedback 基于情感反馈的机器人服务个性化
R. Khosla, K. Nguyen, Mei-Tai Chu, Yu-Ang Tan
In this paper, we describe the application of autonomous service personalisation used on a social robot in the context of health care, in particular for the elderly population. The intent is to design a framework where the robot can learn the user's preferences (likes and dislikes) over time based on facial expression as a form of feedback. By extracting emotional cues from facial expression, we can then compute the intensity of a given expression on the user and adapt the robot's services accordingly. To illustrate the application of this system, we use the case study of an emotion-aware music recommendation system.
在本文中,我们描述了在医疗保健环境中使用的社交机器人的自主服务个性化应用,特别是针对老年人口。其目的是设计一个框架,机器人可以根据面部表情作为一种反馈形式,随着时间的推移学习用户的偏好(喜欢和不喜欢)。通过从面部表情中提取情感线索,我们可以计算出用户给定表情的强度,并相应地调整机器人的服务。为了说明该系统的应用,我们以一个情感感知音乐推荐系统为例进行了研究。
{"title":"Robot Enabled Service Personalisation Based On Emotion Feedback","authors":"R. Khosla, K. Nguyen, Mei-Tai Chu, Yu-Ang Tan","doi":"10.1145/3007120.3007167","DOIUrl":"https://doi.org/10.1145/3007120.3007167","url":null,"abstract":"In this paper, we describe the application of autonomous service personalisation used on a social robot in the context of health care, in particular for the elderly population. The intent is to design a framework where the robot can learn the user's preferences (likes and dislikes) over time based on facial expression as a form of feedback. By extracting emotional cues from facial expression, we can then compute the intensity of a given expression on the user and adapt the robot's services accordingly. To illustrate the application of this system, we use the case study of an emotion-aware music recommendation system.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Fight Detection in Surveillance Videos 监控视频中的自动战斗检测
E. Fu, H. Leong, G. Ngai, S. Chan
Affective computing is an up-surging research area relying on multimodal multimedia information processing techniques to study human interaction. Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications, such as in a prison, a bar and so on. Research works on fight detection are often based on visual features and demand substantive computation and good video quality. In this paper, we propose an approach to detect fights in a natural and low cost manner through motion analysis. Most existing works evaluated their algorithms on public datasets manifesting simulated fights, where the fight events are acted by actors. To evaluate on real fight scenarios, we collect fight videos from YouTube to form our own dataset. Based on the two types of datasets, we process the motion information to achieve fight detection. Experimental results indicate that our approach accurately detect fights in real scenarios. More importantly, we uncover some fundamental differences between real and simulated fights and could discriminate them well.
情感计算是依托多模态多媒体信息处理技术来研究人类交互行为的新兴研究领域。情感计算下的社会信号处理旨在识别和提取有用的人类社会互动模式。打架是现实生活中常见的社会互动。斗殴检测系统在监狱、酒吧等场所有着广泛的应用。战斗检测的研究工作往往基于视觉特征,需要大量的计算量和良好的视频质量。在本文中,我们提出了一种通过运动分析以自然和低成本的方式检测打斗的方法。大多数现有的工作都是在公开的模拟战斗数据集上评估他们的算法,其中战斗事件是由演员扮演的。为了评估真实的战斗场景,我们从YouTube上收集战斗视频来形成我们自己的数据集。基于这两类数据集,对运动信息进行处理,实现战斗检测。实验结果表明,我们的方法能够准确地检测出真实场景中的打斗。更重要的是,我们发现了真实打斗和模拟打斗之间的一些根本区别,并能很好地区分它们。
{"title":"Automatic Fight Detection in Surveillance Videos","authors":"E. Fu, H. Leong, G. Ngai, S. Chan","doi":"10.1145/3007120.3007129","DOIUrl":"https://doi.org/10.1145/3007120.3007129","url":null,"abstract":"Affective computing is an up-surging research area relying on multimodal multimedia information processing techniques to study human interaction. Social signal processing under affective computing aims at recognizing and extracting useful human social interaction patterns. Fight is a common social interaction in real life. A fight detection system finds wide applications, such as in a prison, a bar and so on. Research works on fight detection are often based on visual features and demand substantive computation and good video quality. In this paper, we propose an approach to detect fights in a natural and low cost manner through motion analysis. Most existing works evaluated their algorithms on public datasets manifesting simulated fights, where the fight events are acted by actors. To evaluate on real fight scenarios, we collect fight videos from YouTube to form our own dataset. Based on the two types of datasets, we process the motion information to achieve fight detection. Experimental results indicate that our approach accurately detect fights in real scenarios. More importantly, we uncover some fundamental differences between real and simulated fights and could discriminate them well.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
When Game Theory Meets VANET's Security and Privacy 当博弈论遇到VANET的安全和隐私
Sara Bahamou, M. D. E. Ouadghiri, J. Bonnin
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.
车辆自组织网络(VANET)是在安全和隐私方面面临众多挑战的众多领域之一。这种网络中的风险与安全评估方法不一定适用于所有车载系统,因为这些分析方面一般都是基于理论思想,可能无法反映任何现实情况。VANTET应用部署的重要动机是减少交通事故和人员伤亡数量,因此这种应用具有严格的安全要求。为了涵盖所有可能的安全需求,提出了许多研究方法,如基于攻击树过程的方法,其中我们也发现了攻击-防御树方法。本文主要研究车辆系统中攻击者和防御者之间存在的权衡关系,并试图通过数学分析,即博弈论分析,找到一个反映这种关系的平衡点。博弈论方法被许多研究首先部署在自组织网络中,而对于车载系统,我们发现少数研究致力于将博弈论方法用于此类网络的安全或隐私保护。为了更好地理解,我们首先介绍了一些突出博弈论应用的工作,以解决ad hoc网络(更准确地说是车载ad hoc网络)中不同形式的安全和隐私问题。我们展示了车辆网络中攻击者和防御者之间的不同互动如何被建模为一个游戏。
{"title":"When Game Theory Meets VANET's Security and Privacy","authors":"Sara Bahamou, M. D. E. Ouadghiri, J. Bonnin","doi":"10.1145/3007120.3007168","DOIUrl":"https://doi.org/10.1145/3007120.3007168","url":null,"abstract":"Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket 手机从口袋中取出时的行为特征解锁方法
Ryo Izuta, Kazuya Murao, T. Terada, T. Iso, H. Inamura, M. Tsukamoto
In this paper, we propose a screen unlocking system using an accelerometer and pressure sensor arrays mounted on a mobile phone as casual identification. The proposed system focuses on the user's behavioral characteristics when taking their mobile phone from their pocket and the pressure distribution when gripping the mobile phone during this motion. In the evaluation experiment, 12 out of 30 taking-out actions succeed to unlock the mobile phone screen, and our system achieved 0.43 FAR after 18 templates had been trained.
在本文中,我们提出了一种使用安装在手机上的加速度计和压力传感器阵列作为临时识别的屏幕解锁系统。本系统主要研究用户从口袋中取出手机时的行为特征,以及在此过程中握持手机时的压力分布。在评估实验中,30次取出动作中有12次成功解锁手机屏幕,我们的系统在训练了18个模板后FAR达到了0.43。
{"title":"Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket","authors":"Ryo Izuta, Kazuya Murao, T. Terada, T. Iso, H. Inamura, M. Tsukamoto","doi":"10.1145/3007120.3007162","DOIUrl":"https://doi.org/10.1145/3007120.3007162","url":null,"abstract":"In this paper, we propose a screen unlocking system using an accelerometer and pressure sensor arrays mounted on a mobile phone as casual identification. The proposed system focuses on the user's behavioral characteristics when taking their mobile phone from their pocket and the pressure distribution when gripping the mobile phone during this motion. In the evaluation experiment, 12 out of 30 taking-out actions succeed to unlock the mobile phone screen, and our system achieved 0.43 FAR after 18 templates had been trained.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124209396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Securing Body Sensor Network with ECG 用ECG保护身体传感器网络
Xuechao Yang, X. Yi, I. Khalil, F. Han, Z. Tari
The market of wearable healthcare monitoring devices has exploded in recent years as healthcare consciousness has increased. These types of devices usually consist of several biosensors, which can be worn on human bodies, such as the head, arms, and feet. The health status of a user can be analyzed according to the user's real-time vital signs that are collected from different biosensors. Due to personal medical data being transmitted through a wireless network, the data have to be encrypted. In this paper, a key agreement protocol for biosensors within Wireless Body Sensor Networks (WBSN) has been proposed based on the n-Party Diffie-Hellman key exchange protocol. In order to prevent the man-in-the-middle attacks, we have used Advance Encryption Standard (AES) encryption with Electrocardiography-based (ECG-based) keys to secure the key exchange procedures. The security and performance analysis show the feasibility of the proposed method.
近年来,随着健康意识的增强,可穿戴式健康监测设备市场呈爆炸式增长。这些类型的设备通常由几个生物传感器组成,可以佩戴在人体上,如头部、手臂和脚。根据从不同的生物传感器收集的用户实时生命体征,可以分析用户的健康状况。由于个人医疗数据是通过无线网络传输的,因此必须对数据进行加密。提出了一种基于n方Diffie-Hellman密钥交换协议的无线身体传感器网络(WBSN)生物传感器密钥协商协议。为了防止中间人攻击,我们使用了高级加密标准(AES)加密和基于心电图(ecg)的密钥来保护密钥交换过程。安全性和性能分析表明了该方法的可行性。
{"title":"Securing Body Sensor Network with ECG","authors":"Xuechao Yang, X. Yi, I. Khalil, F. Han, Z. Tari","doi":"10.1145/3007120.3007121","DOIUrl":"https://doi.org/10.1145/3007120.3007121","url":null,"abstract":"The market of wearable healthcare monitoring devices has exploded in recent years as healthcare consciousness has increased. These types of devices usually consist of several biosensors, which can be worn on human bodies, such as the head, arms, and feet. The health status of a user can be analyzed according to the user's real-time vital signs that are collected from different biosensors. Due to personal medical data being transmitted through a wireless network, the data have to be encrypted. In this paper, a key agreement protocol for biosensors within Wireless Body Sensor Networks (WBSN) has been proposed based on the n-Party Diffie-Hellman key exchange protocol. In order to prevent the man-in-the-middle attacks, we have used Advance Encryption Standard (AES) encryption with Electrocardiography-based (ECG-based) keys to secure the key exchange procedures. The security and performance analysis show the feasibility of the proposed method.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Integrated context-aware Planning Approach to Self-Adaptation Web Service Composition 自适应Web服务组合的集成上下文感知规划方法
Sihem Cherif, Raoudha Ben Djemaa, Ikram Amous
Web services are rapidly gaining acceptance as a fundamental technology in the web field. They are becoming the cutting edge of communication between the different applications all over the web. With the need for the ubiquitous computing and the pervasive use of mobile devices, the context-aware web service composition becomes a hot topic. This latter aims to adapt the web service composition behavior to the user's context such as his specific work environment, language, type of Internet connection, devices and preferences. The adaptation of previous works was carried out only at the runtime and partially covered the user's general context. In this paper, we introduce a new context-aware approach that provides a dynamic adaptation of web service composition. Our approach enables us to express requirements by taking into account the potential user's context in addition to the functional one.
Web服务作为Web领域的一项基础技术正在迅速获得认可。它们正在成为网络上不同应用程序之间通信的前沿。随着无处不在的计算需求和移动设备的普遍使用,上下文感知的web服务组合成为一个热门话题。后者的目的是使web服务组合行为适应用户的上下文,例如他的特定工作环境、语言、Internet连接类型、设备和偏好。先前作品的改编只在运行时进行,部分覆盖了用户的一般上下文。在本文中,我们介绍了一种新的上下文感知方法,该方法提供了对web服务组合的动态适应。我们的方法使我们能够通过考虑潜在用户的上下文(除了功能上下文)来表达需求。
{"title":"An Integrated context-aware Planning Approach to Self-Adaptation Web Service Composition","authors":"Sihem Cherif, Raoudha Ben Djemaa, Ikram Amous","doi":"10.1145/3007120.3007127","DOIUrl":"https://doi.org/10.1145/3007120.3007127","url":null,"abstract":"Web services are rapidly gaining acceptance as a fundamental technology in the web field. They are becoming the cutting edge of communication between the different applications all over the web. With the need for the ubiquitous computing and the pervasive use of mobile devices, the context-aware web service composition becomes a hot topic. This latter aims to adapt the web service composition behavior to the user's context such as his specific work environment, language, type of Internet connection, devices and preferences. The adaptation of previous works was carried out only at the runtime and partially covered the user's general context. In this paper, we introduce a new context-aware approach that provides a dynamic adaptation of web service composition. Our approach enables us to express requirements by taking into account the potential user's context in addition to the functional one.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"101 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CARTON Project: Do-It-Yourself Approach to Turn a Smartphone into a Smart Eyewear 纸箱项目:自己动手把智能手机变成智能眼镜
D. Brun, Susan M. Ferreira, Charles Gouin-Vallerand, S. George
This paper presents a tool to transform a smartphone into a smart eyewear, named "CARTON", following a Do-It-Yourself (DIY) approach. The hardware prototype is made with very simple materials and regular tools we could find anywhere. It also includes a Software Development Kit (SDK) with samples in order to easily adapt or develop new mobile app compatible with this kind of device. By providing everything open-source and open-hardware, we intend to solve the reachability of technologies related to smart eyewear and aim to accelerate research around it. Users experiments were conducted in which participants were asked to create, by themselves, the CARTON's hardware part and perform usability tests with their own creation. Qualitative user feedback and quantitative results prove that CARTON is functional and feasible by anyone, without specific skills.
本文介绍了一种将智能手机变成智能眼镜的工具,名为“纸箱”,采用自己动手(DIY)的方法。硬件原型是用非常简单的材料和我们在任何地方都能找到的常规工具制成的。它还包括一个带有示例的软件开发工具包(SDK),以便轻松适应或开发与此类设备兼容的新移动应用程序。通过提供一切开源和开放硬件,我们打算解决与智能眼镜相关的技术的可及性,并旨在加速围绕它的研究。在用户实验中,参与者被要求自己创建纸箱的硬件部分,并用自己的作品进行可用性测试。定性的用户反馈和定量的结果证明,纸箱是功能性和可行性的任何人,没有特定的技能。
{"title":"CARTON Project: Do-It-Yourself Approach to Turn a Smartphone into a Smart Eyewear","authors":"D. Brun, Susan M. Ferreira, Charles Gouin-Vallerand, S. George","doi":"10.1145/3007120.3007134","DOIUrl":"https://doi.org/10.1145/3007120.3007134","url":null,"abstract":"This paper presents a tool to transform a smartphone into a smart eyewear, named \"CARTON\", following a Do-It-Yourself (DIY) approach. The hardware prototype is made with very simple materials and regular tools we could find anywhere. It also includes a Software Development Kit (SDK) with samples in order to easily adapt or develop new mobile app compatible with this kind of device. By providing everything open-source and open-hardware, we intend to solve the reachability of technologies related to smart eyewear and aim to accelerate research around it. Users experiments were conducted in which participants were asked to create, by themselves, the CARTON's hardware part and perform usability tests with their own creation. Qualitative user feedback and quantitative results prove that CARTON is functional and feasible by anyone, without specific skills.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Regression Method for real-time video quality evaluation 一种实时视频质量评价的回归方法
M. T. Vega, D. Mocanu, A. Liotta
No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.
无参考(NR)指标提供了一种在不断增长的无线网络中评估视频质量的机制。其低计算复杂度和功能特点使其成为实时内容管理和移动流媒体控制的首选。不幸的是,普通NR指标的准确性很差,特别是在网络受损的视频流中。在这项工作中,我们引入了一种基于回归的视频质量度量,它足够简单,可以在瘦客户端上进行实时计算,并且与最先进的全参考(FR)度量相当准确,后者在功能和计算上在实时流媒体中是不可实现的。我们将我们的指标与FR指标VQM(视频质量指标)进行基准测试,发现了一个非常强的相关因素。
{"title":"A Regression Method for real-time video quality evaluation","authors":"M. T. Vega, D. Mocanu, A. Liotta","doi":"10.1145/3007120.3007125","DOIUrl":"https://doi.org/10.1145/3007120.3007125","url":null,"abstract":"No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Teacher AICA: A Mobile-based Intelligent Tutoring System for Laws of Exponents Teacher AICA:基于移动的指数定律智能辅导系统
R. Bringula, Jairus Lyndel G. Belza, Sherwin P. Belarmino, Mary Claire G. Chavez
Computing exponents is one of the most difficult mathematical topics to learn by high school students. Motivated by this concern, a mobile-based intelligent tutoring system (ITS) is being developed to assist students in learning laws of exponents. In this paper, the development and the proposed deployment of a mobile learning system for computing of exponents will be discussed. A randomized pretest-posttest control group design will be employed to determine if the mobile-based ITS is able to assist the students in learning exponents.
计算指数是高中学生最难学习的数学课题之一。基于这种关注,一种基于移动的智能辅导系统(ITS)正在开发,以帮助学生学习指数定律。在本文中,将讨论用于计算指数的移动学习系统的开发和建议部署。采用随机前测后测控制组设计来确定基于移动的ITS是否能够帮助学生学习指数。
{"title":"Teacher AICA: A Mobile-based Intelligent Tutoring System for Laws of Exponents","authors":"R. Bringula, Jairus Lyndel G. Belza, Sherwin P. Belarmino, Mary Claire G. Chavez","doi":"10.1145/3007120.3007150","DOIUrl":"https://doi.org/10.1145/3007120.3007150","url":null,"abstract":"Computing exponents is one of the most difficult mathematical topics to learn by high school students. Motivated by this concern, a mobile-based intelligent tutoring system (ITS) is being developed to assist students in learning laws of exponents. In this paper, the development and the proposed deployment of a mobile learning system for computing of exponents will be discussed. A randomized pretest-posttest control group design will be employed to determine if the mobile-based ITS is able to assist the students in learning exponents.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs 为地面无线传感器网络提供接收器即服务的无人机云
Soumaya Bel Hadj Youssef, S. Rekhis, N. Boudriga, A. Bagula
One of the primary tasks of wireless sensor networks (WSNs) is the collection of data from a field of interest. However, in practice, maintaining a total connectivity between sensors is not always possible, and sensors may be scattered along the sensing area, forming a set of isolated cluster of nodes that are unable to deliver the collected data. In this paper, we provide a three-layer based cloud architecture, showing the use of a network of drone quadcopters for the delivery of a Sink As A Service to terrestrial mobile sensor nodes. The set of quadcopters are in charge of coordinating their movement to collect data from terrestrial cluster heads (local data collectors) and cooperate together to relay these data to the nearest base station. As the used number of terrestrial collectors (i.e., clusters heads) has a great impact on the data delivery delay and also on the energy consumption of the quadcopters, we develop an analytical model that allows determining the optimal number of terrestrial clusters of sensors. A numerical analysis is conducted to assess the variation of the optimal values of clusters' width, delivery delay, and consumer energy, with respect to the quadcopters speed, the network throughput, and the total number of sensors.
无线传感器网络(wsn)的主要任务之一是从感兴趣的领域收集数据。然而,在实践中,传感器之间并不总是能够保持完全的连通性,传感器可能分散在传感区域,形成一组孤立的节点集群,无法传递收集到的数据。在本文中,我们提供了一个基于三层的云架构,展示了使用无人机四轴飞行器网络向地面移动传感器节点提供Sink As a Service。这组四轴飞行器负责协调它们的运动,从地面群集头(本地数据收集器)收集数据,并共同合作将这些数据中继到最近的基站。由于地面收集器(即簇头)的使用数量对数据传输延迟和四轴飞行器的能量消耗有很大影响,因此我们开发了一个分析模型,可以确定地面传感器簇的最佳数量。通过数值分析,评估了四轴飞行器速度、网络吞吐量和传感器总数对集群宽度、传输延迟和消耗能量的最优值的影响。
{"title":"A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs","authors":"Soumaya Bel Hadj Youssef, S. Rekhis, N. Boudriga, A. Bagula","doi":"10.1145/3007120.3007138","DOIUrl":"https://doi.org/10.1145/3007120.3007138","url":null,"abstract":"One of the primary tasks of wireless sensor networks (WSNs) is the collection of data from a field of interest. However, in practice, maintaining a total connectivity between sensors is not always possible, and sensors may be scattered along the sensing area, forming a set of isolated cluster of nodes that are unable to deliver the collected data. In this paper, we provide a three-layer based cloud architecture, showing the use of a network of drone quadcopters for the delivery of a Sink As A Service to terrestrial mobile sensor nodes. The set of quadcopters are in charge of coordinating their movement to collect data from terrestrial cluster heads (local data collectors) and cooperate together to relay these data to the nearest base station. As the used number of terrestrial collectors (i.e., clusters heads) has a great impact on the data delivery delay and also on the energy consumption of the quadcopters, we develop an analytical model that allows determining the optimal number of terrestrial clusters of sensors. A numerical analysis is conducted to assess the variation of the optimal values of clusters' width, delivery delay, and consumer energy, with respect to the quadcopters speed, the network throughput, and the total number of sensors.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1