Pub Date : 2023-01-01DOI: 10.1504/ijssc.2023.133236
Yikai Wang, Zhuming Nie, Yuquan Wu, Xiaozhao Fang, Xi He, Hongbo Gao
{"title":"Traffic intersection crossing method for intelligent vehicles based on game theory","authors":"Yikai Wang, Zhuming Nie, Yuquan Wu, Xiaozhao Fang, Xi He, Hongbo Gao","doi":"10.1504/ijssc.2023.133236","DOIUrl":"https://doi.org/10.1504/ijssc.2023.133236","url":null,"abstract":"","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"2 2 1","pages":"138-146"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84414573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-20DOI: 10.1504/ijssc.2019.10025971
Saqib Mahmood, Muddasar Ghani Khwaja, A. Jusoh
Purchase decisions in recent times are extensively dependent on social media referrals. The effective utilisation of social media has become compulsory for the organisations in order to remain competitive. In the emerging markets like Pakistan, promotions through electronic word of mouth on social media have incepted, but still it's quite difficult for the organisations to cope-up with the contemporary electronic word of mouth needs. Nevertheless, the Pakistani social media marketing managers are unfamiliar in motivating social media users to engage in electronic word of mouth. For that reason, the current research aims to understand the social capital theory and self-determination theory dimensions and altruism role in engaging customers for sharing products and services associated with word of mouth on social media websites. Structural, cognitive, and relational dimensions of social capital are manifested as tie-strength, shared language and trust respectively. Autonomy, competence, and relatedness of self-determination theory are manifested as voluntary self-disclosures, innovativeness, and trust respectively. In order to affirm literary associations among the constructs, structural equation modelling using MPlus was executed on the responses of 550 Pakistani social media users. The outcomes attained manifestly accepted the established hypotheses. Based on these findings theoretical and practical implications are produced.
{"title":"Electronic word of mouth on social media websites: role of social capital theory, self-determination theory, and altruism","authors":"Saqib Mahmood, Muddasar Ghani Khwaja, A. Jusoh","doi":"10.1504/ijssc.2019.10025971","DOIUrl":"https://doi.org/10.1504/ijssc.2019.10025971","url":null,"abstract":"Purchase decisions in recent times are extensively dependent on social media referrals. The effective utilisation of social media has become compulsory for the organisations in order to remain competitive. In the emerging markets like Pakistan, promotions through electronic word of mouth on social media have incepted, but still it's quite difficult for the organisations to cope-up with the contemporary electronic word of mouth needs. Nevertheless, the Pakistani social media marketing managers are unfamiliar in motivating social media users to engage in electronic word of mouth. For that reason, the current research aims to understand the social capital theory and self-determination theory dimensions and altruism role in engaging customers for sharing products and services associated with word of mouth on social media websites. Structural, cognitive, and relational dimensions of social capital are manifested as tie-strength, shared language and trust respectively. Autonomy, competence, and relatedness of self-determination theory are manifested as voluntary self-disclosures, innovativeness, and trust respectively. In order to affirm literary associations among the constructs, structural equation modelling using MPlus was executed on the responses of 550 Pakistani social media users. The outcomes attained manifestly accepted the established hypotheses. Based on these findings theoretical and practical implications are produced.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"143 42","pages":"74-89"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72492414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-20DOI: 10.1504/ijssc.2019.104219
Laiqa Binte Imran, R. Latif, Muhammad Farhan, Tayyaba Tariq
In a smart city, the use of wireless sensor network is an emerging technology, and it provides many benefits in terms of communication, energy, and cost. We have focused on energy efficient smart lighting system. In our proposed model we have divided street lights energy usage into three categories: low, moderate and high. The street light energy usage is low in daylight, moderate when average traffic on roads and high when heavy traffic is on roads. Street lights turn on when a vehicle enters in a passage after sensing its entry within a region. We have deployed our system on street lights with the facility of solar panel so that our devices have more life as in daylight it gets charged, and at night it turned on based on the presence of a vehicle.
{"title":"Real-time simulation of smart lighting system in smart city","authors":"Laiqa Binte Imran, R. Latif, Muhammad Farhan, Tayyaba Tariq","doi":"10.1504/ijssc.2019.104219","DOIUrl":"https://doi.org/10.1504/ijssc.2019.104219","url":null,"abstract":"In a smart city, the use of wireless sensor network is an emerging technology, and it provides many benefits in terms of communication, energy, and cost. We have focused on energy efficient smart lighting system. In our proposed model we have divided street lights energy usage into three categories: low, moderate and high. The street light energy usage is low in daylight, moderate when average traffic on roads and high when heavy traffic is on roads. Street lights turn on when a vehicle enters in a passage after sensing its entry within a region. We have deployed our system on street lights with the facility of solar panel so that our devices have more life as in daylight it gets charged, and at night it turned on based on the presence of a vehicle.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"4 1","pages":"90-98"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87613394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-20DOI: 10.1504/ijssc.2019.104218
Tomoyuki Ishida, Hayato Sakamoto
We have developed an inbound corresponding smartphone application based on markerless image-processing augmented reality technology for use by zoo visitors and staff. On this application, we implemented an animal quiz distribution function and an animal character hunting function. We also implemented a web system on which the administrator can update the contents handled by these functions in real time. The proposed application negates the need for newly installing multilingual guide boards for foreign zoo visitors. Moreover, the web system enables the real-time updates of the contents used in smartphone applications. Here we confirmed the operability, relevance, readability, applicability, and effectiveness of the mobile application and content management web system in a questionnaire survey of 57 zoo visitors and 14 zoo staff. The survey results of all five measures revealed an overwhelmingly positive response to our mobile application and content management web application.
{"title":"Implementation of an inbound corresponding smartphone application using markerless image processing augmented reality technology","authors":"Tomoyuki Ishida, Hayato Sakamoto","doi":"10.1504/ijssc.2019.104218","DOIUrl":"https://doi.org/10.1504/ijssc.2019.104218","url":null,"abstract":"We have developed an inbound corresponding smartphone application based on markerless image-processing augmented reality technology for use by zoo visitors and staff. On this application, we implemented an animal quiz distribution function and an animal character hunting function. We also implemented a web system on which the administrator can update the contents handled by these functions in real time. The proposed application negates the need for newly installing multilingual guide boards for foreign zoo visitors. Moreover, the web system enables the real-time updates of the contents used in smartphone applications. Here we confirmed the operability, relevance, readability, applicability, and effectiveness of the mobile application and content management web system in a questionnaire survey of 57 zoo visitors and 14 zoo staff. The survey results of all five measures revealed an overwhelmingly positive response to our mobile application and content management web application.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"17 1","pages":"61-73"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89796475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-20DOI: 10.1504/ijssc.2019.104221
R. Madhusudhan, K. Suvidha
In 2016, Gope and Hwang have proposed a scheme, in which they stated that their scheme preserves user anonymity. However with the thorough cryptanalysis of their scheme, we have proved that their scheme is vulnerable to various security attacks. To overcome the security attacks and to achieve the security goals, a new scheme has been proposed. Through the rigorous informal and formal security analysis, we have demonstrated that the proposed scheme is secure against the security attacks. Further, the proposed scheme is simulated using widely accepted automated validation of internet security protocols and applications (AVISPA) tool. With the simulated results of the proposed scheme, we proved that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang and other schemes in terms of performance, computational cost and communication overhead. The proposed scheme is efficient and robust.
{"title":"A secure lightweight two-factor authentication scheme in global mobility networks","authors":"R. Madhusudhan, K. Suvidha","doi":"10.1504/ijssc.2019.104221","DOIUrl":"https://doi.org/10.1504/ijssc.2019.104221","url":null,"abstract":"In 2016, Gope and Hwang have proposed a scheme, in which they stated that their scheme preserves user anonymity. However with the thorough cryptanalysis of their scheme, we have proved that their scheme is vulnerable to various security attacks. To overcome the security attacks and to achieve the security goals, a new scheme has been proposed. Through the rigorous informal and formal security analysis, we have demonstrated that the proposed scheme is secure against the security attacks. Further, the proposed scheme is simulated using widely accepted automated validation of internet security protocols and applications (AVISPA) tool. With the simulated results of the proposed scheme, we proved that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang and other schemes in terms of performance, computational cost and communication overhead. The proposed scheme is efficient and robust.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"1 1","pages":"109-123"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90238748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-20DOI: 10.1504/ijssc.2019.10025978
Yousra Chabchoub, R. E. Sibai, C. Fricker
Since its launch, Velib' (the Bike Sharing System – BSS – in Paris) has emerged in the Parisian landscape and has been a model for similar systems in many cities. A major problem with BSS is the stations' heterogeneity caused by the attractivity of some stations located in particular areas. In this paper, we focus on spatial outliers defined as stations having a behaviour significantly different from their neighbouring stations. First, we propose an improved version of Moran scatterplot to exploit the similarity between neighbours, and we test it on a real dataset issued from Velib' system to identify outliers. Then, we design a new method that globally improves the resources' availability in bike stations by adapting the users' trips to the resources' availability. Results show that with a partial collaboration of the users or a limitation to the rush hours, the proposed method enhances significantly the resources' availability in Velib' system.
{"title":"Bike sharing systems: a new incentive rebalancing method based on spatial outliers detection","authors":"Yousra Chabchoub, R. E. Sibai, C. Fricker","doi":"10.1504/ijssc.2019.10025978","DOIUrl":"https://doi.org/10.1504/ijssc.2019.10025978","url":null,"abstract":"Since its launch, Velib' (the Bike Sharing System – BSS – in Paris) has emerged in the Parisian landscape and has been a model for similar systems in many cities. A major problem with BSS is the stations' heterogeneity caused by the attractivity of some stations located in particular areas. In this paper, we focus on spatial outliers defined as stations having a behaviour significantly different from their neighbouring stations. First, we propose an improved version of Moran scatterplot to exploit the similarity between neighbours, and we test it on a real dataset issued from Velib' system to identify outliers. Then, we design a new method that globally improves the resources' availability in bike stations by adapting the users' trips to the resources' availability. Results show that with a partial collaboration of the users or a limitation to the rush hours, the proposed method enhances significantly the resources' availability in Velib' system.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"13 1","pages":"99-108"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-28DOI: 10.1504/IJSSC.2019.100008
Kengo Imae, Naohiro Hayashibara
Consistent maintenance in collaborative editing is one of the most important problems in distributed systems. So many papers have proposed various approaches to this issue, but most of them are for documents, and there are a few for 3D models. We propose a data structure, called ChainVoxel, and operations on it for scalable distributed collaborative editing systems for 3D models. It is based on the conflict-free replicated data type (CRDT). ChainVoxel is implemented by a chained hash table for collision resolution while editing by multiple users. It guarantees the eventual consistency for updating a shared 3D model without mutual exclusion. We analysed our prototype regarding the size of ChainVoxel and the number of operations. We also conducted simulations to compare our prototype with a consensus-based implementation. Our prototype shows the scalability regarding the number of messages and steps for executing operations.
{"title":"Scalable distributed collaborative editing for 3D models using conflict-free data structure","authors":"Kengo Imae, Naohiro Hayashibara","doi":"10.1504/IJSSC.2019.100008","DOIUrl":"https://doi.org/10.1504/IJSSC.2019.100008","url":null,"abstract":"Consistent maintenance in collaborative editing is one of the most important problems in distributed systems. So many papers have proposed various approaches to this issue, but most of them are for documents, and there are a few for 3D models. We propose a data structure, called ChainVoxel, and operations on it for scalable distributed collaborative editing systems for 3D models. It is based on the conflict-free replicated data type (CRDT). ChainVoxel is implemented by a chained hash table for collision resolution while editing by multiple users. It guarantees the eventual consistency for updating a shared 3D model without mutual exclusion. We analysed our prototype regarding the size of ChainVoxel and the number of operations. We also conducted simulations to compare our prototype with a consensus-based implementation. Our prototype shows the scalability regarding the number of messages and steps for executing operations.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"11 1","pages":"11-21"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78828731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-28DOI: 10.1504/IJSSC.2019.100017
K. Lwin, N. Funabiki, Sumon Kumar Debnath, Kwenga Ismael Munene, R. Sudibyo, M. Kuribayashi, W. Kao
As a flexible and cost-efficient internet access network, the IEEE 802.11 wireless local-area network (WLAN) has been broadly deployed around the world. Previously, to improve the IEEE 802.11n WLAN performance, we proposed the four-step minimax access-point (AP) setup optimisation approach: 1) link throughputs between the AP and hosts in the network field are measured manually; 2) the throughput estimation model is tuned using the measurement results; 3) the bottleneck host suffering the least throughput is estimated using this model; 4) the AP setup is optimised to maximise the throughput of the bottleneck host. Unfortunately, this approach has drawbacks: 1) a lot of manual throughput measurements are necessary to tune the model; 2) the shift of the AP location is not considered; 3) IEEE 802.11ac devices at 5 GHz are not evaluated, although they can offer faster transmissions. In this paper, we present the three enhancements: 1) the number of measurement points is reduced while keeping the model accuracy; 2) the coordinate of the AP setup is newly adopted as the optimisation parameter; 3) the AP device with IEEE 802.11ac at 5 GHz is considered with slight modifications. The effectiveness is confirmed by extensive experiments in three network fields.
{"title":"Enhancements of minimax access-point setup optimisation approach for IEEE 802.11 WLAN","authors":"K. Lwin, N. Funabiki, Sumon Kumar Debnath, Kwenga Ismael Munene, R. Sudibyo, M. Kuribayashi, W. Kao","doi":"10.1504/IJSSC.2019.100017","DOIUrl":"https://doi.org/10.1504/IJSSC.2019.100017","url":null,"abstract":"As a flexible and cost-efficient internet access network, the IEEE 802.11 wireless local-area network (WLAN) has been broadly deployed around the world. Previously, to improve the IEEE 802.11n WLAN performance, we proposed the four-step minimax access-point (AP) setup optimisation approach: 1) link throughputs between the AP and hosts in the network field are measured manually; 2) the throughput estimation model is tuned using the measurement results; 3) the bottleneck host suffering the least throughput is estimated using this model; 4) the AP setup is optimised to maximise the throughput of the bottleneck host. Unfortunately, this approach has drawbacks: 1) a lot of manual throughput measurements are necessary to tune the model; 2) the shift of the AP location is not considered; 3) IEEE 802.11ac devices at 5 GHz are not evaluated, although they can offer faster transmissions. In this paper, we present the three enhancements: 1) the number of measurement points is reduced while keeping the model accuracy; 2) the coordinate of the AP setup is newly adopted as the optimisation parameter; 3) the AP device with IEEE 802.11ac at 5 GHz is considered with slight modifications. The effectiveness is confirmed by extensive experiments in three network fields.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"75 1","pages":"47-59"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86363920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-28DOI: 10.1504/IJSSC.2019.100010
Shogo Matsuno, N. Itakura, Tota Mizuno
This paper examines an analysis and measurement method that to aim to involve incorporating eye motion and eye blink as functions of an eye-based human-computer interface. Proposed method has been achieved by analysing the visible-light images captured without using special equipment, in order to make the eye-controlled input interface independent of gaze-position measurement. Specifically, we propose two algorithms, one for detecting eye motion using optical flow and the other for classifying voluntary eye blinks using changes of eye aperture areas. In addition, we tried evaluating experiment both detection algorithms simultaneously assuming application to input interface. The two algorithms were examined for applicability in an eye-based input interface. As a result of experiments, real-time detection of each eye motion and eye blink could be performed with an accuracy of about 80% on average.
{"title":"An analysis method for eye motion and eye blink detection from colour images around ocular region","authors":"Shogo Matsuno, N. Itakura, Tota Mizuno","doi":"10.1504/IJSSC.2019.100010","DOIUrl":"https://doi.org/10.1504/IJSSC.2019.100010","url":null,"abstract":"This paper examines an analysis and measurement method that to aim to involve incorporating eye motion and eye blink as functions of an eye-based human-computer interface. Proposed method has been achieved by analysing the visible-light images captured without using special equipment, in order to make the eye-controlled input interface independent of gaze-position measurement. Specifically, we propose two algorithms, one for detecting eye motion using optical flow and the other for classifying voluntary eye blinks using changes of eye aperture areas. In addition, we tried evaluating experiment both detection algorithms simultaneously assuming application to input interface. The two algorithms were examined for applicability in an eye-based input interface. As a result of experiments, real-time detection of each eye motion and eye blink could be performed with an accuracy of about 80% on average.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":"197 1","pages":"22-30"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72919142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}