Ubiquitous Intelligence and Computing: 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science, 4611)
3540735488, 9783540735489
149
59
81MB
English
Pages [1280]
Report DMCA / Copyright
DOWNLOAD PDF FILE
Table of contents :
Title Page
Preface
Organization
Table of Contents
Autonomic and Trusted Computing for Ubiquitous Intelligence
Ubiquitous Intelligence
Autonomous and Trusted Computing
Technology for Autonomic and Trusted Generation of 3D Images and Animation from 2D Digital Images -Automated Generation of 3D Digital Images and Computer Animations from 2D Digital Images Taken by a Free Hand Digital Camera-
Assumption
Reeb Graph [13]: Differential Topological Design - Morse TheoreticalModel and Reeb Graph Model –
The Simplest 4 Neighbor Density Difference Approach
The Critical Point Filter Approach
Conclusions
References
Sensitivity Improvement of the Receiver Module in the Passive Tag Based RFID Reader
Introduction
RFID System
Design of 908.5~914 MHz RFID System
RFID Simulation and Experiment
Conclusion
References
${{Q}^{\rm +}}$-$Algorithm$: An Enhanced RFID TagCollision Arbitration Algorithm
Introduction
Preliminaries
{\it Q-Algorithm}
Optimization Problems
${Q^{\rm +}}$-$Algorithm$
Design Rationale
Parameter Optimization
Performance Evaluation
Total Identification Delay
Marginal Identification Cost
Conclusions and Future Works
References
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
Introduction
TheProblem
ASolution
Where Can a Tag Be Read?
PRF Suface
Proof-of-Concept Experiments
Automated Design of PRF Surfaces
Assumptions
Algorithms
Simulations
Buffon’s Needle Problem Reformulated
Conclusions
References
Development of a Single 3-Axis Accelerometer Sensor Based Wearable Gesture Recognition Band
Introduction
Related Work
Application Scenario and Wearable System
Defining Gesture Command
Implementation of Hardware and Software
Placement of an Accelerometer Sensor
Gesture Recognition Engine
Experiment Determining the Sensor Location
Final Evaluation
Conclusions
References
An Enhanced Ubiquitous Identification System Using Fast Anti-collision Algorithm
Introduction
The Conventional Anti-collision Algorithm
The Fast Anti-collision Algorithm
Performance Analysis
The Conventional Anti-collision Algorithm
The Fast Anti-collision Algorithm
Numerical and Simulation Results
Conclusion
References
Certification Tools of Ubiquitous Mobile Platform
Introduction
Related Works
Platform Certificate Tool
System Architecture
Certification Procedure
Discussion of the J2ME Certification Scheme
HAL Certification Toolkit
Implementation Result
WIPI Reference Implementation
PCT Implementation
The HCT Implementation
Case Study: Applying a WIPI Platform
Conclusion and Future Work
References
Dynamic Binding Framework for Open Device Services
Introduction
Related Work
Framework Architecture
Dynamic Service Binding Framework
Adaptor and Handler Architecture
Issues About the Architecture
Making Hardware Objects into Standard Services
Message Processing
Real-Time Module Management
Device Service Transform and Export
Experimental Implementation
Experimental Environments
Experiment and Results
Conclusions
References
Design and Evaluation of Multitasking-Based Software Communications Architecture for Real-Time Sensor Networking Platforms
Introduction
Real-Time Sensor Networking Platform
Experiments
Conclusion
References
Distributed Processing in Wireless Sensor Networks for Structural Health Monitoring
Introduction
Related Work
Distributed Processing for SHM in WSN
Framework of Distributed Processing for SHM
Distributed Processing Algorithms for Damage Detection
Experiments and Evaluation
Emulation
Simulations
Conclusions and Future Works
Reference
Distributed Processing in Wireless Sensor Networks for Structural Health Monitoring
Introduction
Related Work
Distributed Processing for SHM in WSN
Framework of Distributed Processing for SHM
Distributed Processing Algorithms for Damage Detection
Experiments and Evaluation
Emulation
Simulations
Conclusions and Future Works
References
An Improved Fusion and Fission Architecture Between Multi-modalities Based on Wearable Computing
Introduction
Web-Based Speech Recognition and Synthesis Using Voice-XML
WPS-Based Embedded KSSL Recognizer
WPS
Feature Extraction and Language Recognition Models Using RDBMS
Fuzzy Logic: Max-Min Composition of Fuzzy Relation
Fusion and Fission Between Modalities
Fusion Scheme Between Audio-Gesture Modalities
Synchronization Between Audio-Gesture Modalities
Noise Analysis
Fission Depending on SNNR and Fuzzy Value
Experiments and Results
Conclusions
References
A Smart Space Architecture for Location-Based Spatial Audio Scenario Orchestration
Introduction
Architectural Requirements
Mark-Up Language Extension
L-DEAR Architecture
Implementation Issues and Experiments
Global Time Based Coordination of Distributed Multimedia Actions
Session Initiation with Capability and Location Information
Experimental Scenario
Conclusions
References
CHASE: Context-Aware Heterogenous Adaptive Smart Environments Using Optimal Tracking for Resident’s Comfort
Introduction
Related Work on Smart Environments
System Description and Location Uncertainty
Optimal Tracking from Symbolic Domain
Inhabitant’s Comfort with Energy Conservation
Mobility Aware Energy Conservation
Estimating Inhabitant’s Comfort
Performance Evaluation
Conclusions
References
A Methodology of Identifying Ubiquitous Smart Services for U-City Development
Introduction
U-City
Ubiquitous Service Identification and Selection Methodology
Overall Methodology
Need Identification and Confirmation
CSF Identification and Interpretation
CSF/Ubiquitous Services Mapping and Service Selection
Verification on Service Selection
Conclusion
References
Simulated Intersection Environment and Learning of Collision and Traffic Data in the U&I Aware Framework
Introduction
Simulation
Current Experimental Learning Results
Learn Changes and Trends in Traffic Data
Learn Patterns in Collision Data
Conclusion and Future Work
References
Dynamic Scheduling Protocol for Highly-Reliable, Real-Time Information Aggregation for Telematics Intersection Safety System(TISS)
Introduction
Architecture of WSN-Based Telematics Intersection Safety System(TISS)
Telematics Scheduling Protocol(TSP)
Simulation Configurations
Error-Free WSN Simulation Configuration
Comprehensive TSP Simulation Configuration
Performance Evaluation
Performance Evaluation of Error-Free WSN Configuration
Performance Evaluation of Comprehensive TSP Configuration
Conclusion
References
Spontaneous Interaction Framework for Thin-Client Access to Services
Introduction
Design Goals
Minimum Assumption for Client Devices
Spontaneous Interaction Across Multiple Spaces
Aggregation of Heterogeneous Devices and Services
Architecture
Client-Server Architecture
Centralized Infrastructure, Rich Services
Captive and Service Portals
Distributed Local Service Providers Employing the Same Framework
Implementation
Walkthroughs
Office
Home
Issues
Design Concerns
Experiences
Future Directions
Conclusion
References
Towards a Model of Interaction for Mutual Aware Devices and Everyday Artifacts
Introduction
Modelling Device Awareness: An Overview
Context Aware Artifacts
Spatial Model of Interaction and Presence
Formalisng Spatial Model with Presence for Mutual Aware Devices
Experimental Prototypes
RFID
Bluetooth
Related Work
Conclusion
References
A Peer-to-Peer Semantic-Based Service Discovery Method for Pervasive Computing Environment
Introduction
Related Work
Multi-level Structure of Service Discovery Network
Hierarchical Service Attribute Tree
Service Discovery Network
Service Discovery Algorithm Overview
Hybrid Peer-to-Peer Cache Method
Establishing and Maintain Community Information
Contact Selection Mechanism
Performance Evaluation
Conclusion and Future Work
References
Ubiquitous Healthcare Architecture Using SmartBidet and HomeServer with Embedded Urinalysis Agent
Introduction
Three-Tired Intelligence and System Model
Three-Tired Intelligence
System Model
Use Case Analysis
Normal Use Case
Careful Use Case
Critical Use Case
System Architecture
SmartBidet
HomeServer
Agent
Prototype Implementation
Conclusions
References
Proactive Agriculture: An Integrated Framework for Developing Distributed Hybrid Systems
Introduction
Mixed Societies of Communicating Plants and Artefacts
Integrated Framework for Developing Hybrid Systems
Wireless Sensor/Actuator Network Hardware Platform
Software System Architecture
Rule Editor
Precision Agriculture Example Application
Plant/Environmental Signals
Prototype Setup and Evaluation
Related Work
Conclusions and Future Directions
References
Integrating RFID Services and Ubiquitous Smart Systems for Enabling Organizations to Automatically Monitor, Decide, and Take Actions
Introduction
RFID Technology Within Organizations
A Smart Ubiquitous Platform
The RFID Document Management Service
The Proposed Solution
The Deployment
Conclusions
References
Towards an RFID-Oriented Service Discovery System
Introduction
Related Work
System Overview
Service Model
System Architecture
Example for Locating RFID-Related Services
Storage and Splitting of Service Information
Service Query
Collaboration Service Query
Query Performance
Conclusion
References
Activity Recognition Using an Egocentric Perspective of Everyday Objects
Introduction
An Egocentric Perspective of Everyday Objects
A Situative Space Model: Bridging the Intent-Action Gap
Applying the Egocentric Perspective
Activity Recognition System
Feature Extraction
Clustering
Classification
Combining the Information Channels
Evaluation
Precision, Recall and Confusion Matrix
Information Channels Complement Each Other
Discussion and Future Work
Conclusions
References
A Novel Price Prediction Scheme of Grid Resources Based on Time Series Analysis
Introduction
Grid Economy
Grid Resource Price
Portfolio Optimization
Grid Resource-Based Model
Roadmap
Price Prediction Based on Time Series Analysis
Time Series Analysis Approach
Time-Based Predication
Predicted Resource Price
Performance Evaluations
Preliminary
Results Analysis
Conclusions
References
Adaptive Multicast Trees on Static Ad Hoc Networks: Tradeoffs Between Delay and Energy Consumption
Introduction
Preliminaries
Tree-Based Multicast
Power Saving Mechanism and Energy Model
Adaptive Multicast Trees
Function for Tradeoffs
Tree Construction Algorithm
Performance Evaluation
Simulation Environment
Simulation Results and Discussion
Conclusions
References
Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks
Introduction
Related Work
Proposed Multicast MAC Protocol
OFDMA-Based Reliable Multicast
Sub-channel Assignment
Packet Delay Analysis
Average Packet Delay
Numerical Results
Conclusion
References
Mobility Tracking for Mobile Ad Hoc Networks
Introduction
Related Work
ProposedMethod
Update Protocols
Mobility Tracking
Performance Evaluation
Simulation Environment
Evaluation of Mobility Tracking
Conclusions
References
Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks
Introduction
Problem Description
Fractional Flow Assignment Problem
Solutions to Cases II, III, and IV of the FFA Problem
Solution to Case V of the FFA Problem
Two Heuristic Algorithms for the General FFA Problem
Integral Flow Assignment Problem
Problem Formulation
Heuristic Algorithm
Performance Evaluation
Simulation Settings
Simulation Results
Conclusion
References
2-Level Hierarchical Cluster-Based Address Auto-configuration Technique in Mobile Ad-Hoc Networks
Introduction
Related Work
Our Scheme: Cluster-Based Address Auto-configuration (CBA)
Assumption and Notations
Cluster Construction
Assigning an Address to a New Joining Node
Managing the Cluster Head and Node Mobility
Network Merging and Partitioning
Discussion
Performance Evaluation
Simulation Environments
The Many-in-B Scenario
Network Merging Scenario
Conclusions
References
Replication in Intermittently Connected Mobile Ad Hoc Networks
Introduction
RICMAN Scheme
Semi-probabilistic Data Dissemination Protocol
Replicating Nodes Election and Replica Distribution
Update Propagation and Consistency
Performance Evaluation of RICMAN
Conclusion and Future Direction
References
Rate-Adaption Channel Assignment and Routing Algorithm for Multi-channel WirelessMAN Mesh Networks
Introduction
Multi-channel Wireless Networks
Goal of the Paper
Paper Organization
ProposedScheme
IEEE 802.16 Control Messages
Proposed Channel Assignment
Proposed Routing Algorithm
Simulation
Channel Usage and Utilization
Conclusion
References
Neighbor-Aware Optimizing Routing for Wireless Ad Hoc Networks
Introduction
Related Work
Neighbor-Aware Optimizing Routing
Problem Description of AODV and SHORT
NAOR: Detailed Algorithms
Simulation and Results
Analysis for Static Networks
Effect of Mobility
Conclusion and Future Work
References
Gateway Zone Multi-path Routing in Wireless Mesh Networks
Introduction
Gateway Zone Multi-path Routing
Overview
System Model
Gateway Discovery
Route Discovery
Data Forwarding
Route Maintenance
Performance Evaluation
Simulation Environment
Simulation Results
Conclusions and Future Work
References
On Estimating Path Capacity in Wireless Mesh Networks
Introduction
Related Work
Network Model and Some Assumptions
Network Model
Assumptions
Constrains and Problem Statement
Constrains
Problem Statement
Algorithm Design and Analysis
Performance Evaluation
Conclusion
References
A Meta Service Description Assisted Service Discovery Protocol for MANETs
Introduction
OverviewofGSD
Service Advertisement Packet Spreading
Service Request Packet Forwarding
Service Reply Packet Routing
Improvements Can Be Made
Preliminaries
Notations and Definitions
Finding Minimum Dominating Forwarding Node Set
MSDASDP
Meta Service Description in Service Advertisement Packet Spreading
Meta Service Description Guided Request Packet Forwarding
Performance Evaluation
Performance Metrics
Simulation Settings
Simulation Results
Conclusion
References
On Characterizing Economic-Based Incentive- Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network
Introduction
System Model
Cost Model
Concepts in Mechanism Design
Hidden Information and Routing Mechanisms
Hidden Actions in Message Forwarding
Frugality in Forwarding Game
Conclusion
References
A Study on USN Technologies for Ships
Introduction
USN Technologies for Ship
Zigbee
RFID
PLC
Applications to Ships
Monitoring for Equipment Failure or Abnormal Operation
Monitoring for Fire Prevention in Dangerous Regions
Tracking and Safety Management of Passengers and Crew
The USN Test Bed
System Description
Experiment Setup
Experiment Results
Conclusion
References
A New Modeling and Delay Analysis of IEEE 802.11 Distributed Coordination Function
Introduction
Related Works
Brief Review of the IEEE 802.11 DCF
Mathematical Modeling
Modeling Binary Exponential Backoff
Motivation of Our Work
Analysis of Backoff Windows
Delay Analysis
Simulation Study
Model Validation
Simulation Analysis
Conclusion
References
Proactive Data Delivery Scheme with Optimal Path for Dynamic Sensor Networks
Introduction
Adaptive Reversal Optimal-Path Tree (AROT)
Sink Mobility Management
Proactive Data Dissemination Via AROT
Error Recovery to Failures
Optimal Path Analysis
Performance Evaluations
Robustness of AROT
Communication Overhead
Evaluation of End-to-End Delay
Conclusions
References
Low-Latency Routing for Energy-Harvesting Sensor Networks
Introduction
Related Work
Duty Cycle of a Node in Energy-Harvesting Sensor Networks
Duty Cycle for Perpetual Operation
Latency Between Nodes in an Asynchronous Network
Network Topology and Routing Scheme
Topology Considerations
Low-Latency Routing Schemes
Performance Evaluation
Conclusion
References
A Localized Link Quality-Aware Optimization Mechanism for Routing Protocols in Wireless Sensor Networks
Introduction
Related Works
Our Proposed Schema: Link Quality-Aware Optimization Mechanism
Link Quality Evaluation
White List Formation
White List Exchanging
White Node Selection
Simulation and Performance
Route Lifetime
End to End Delay and Packet Delivery Ratio
Conclusion
References
Minimum Energy and Latency MAC Protocol for Wireless Sensor Networks
Introduction
Related Work
Proposed Scheme
Theoretical Analysis
Energy Estimation
End to End Latency Estimation
Conclusion
References
An Efficient Bi-Directional Flooding in Wireless Sensor Networks
Introduction
Related Work
Bi-Directional Flooding (BDF) Scheme
Antenna Model
Single Directional Flooding (SDF) Scheme
BDF Scheme
Performance Analysis
Simulation Model
Performance Evaluation
Conclusion
References
Maximizing Network Lifetime Under Reliability Constraints Using a Cross–Layer Design in Dense Wireless Sensor Networks
Introduction
Proposed Approach
System Model
Wireless Radio Channel
Energy Efficient Cross–Layer Protocol
Performance Evaluation
Conclusion
References
Adaptive Data Aggregation for Clustered Wireless Sensor Networks
Introduction
Related Work
Problem Definition
An Adaptive Data Aggregation Scheme
State and Region
Scheme Operation
Performance Analysis
Analytical Results
Simulation Results
Conclusions
References
Directed Diffusion Based on Link-Stabilizing Clustering for Wireless Sensor Networks
Introduction
Related Work
Network Module
Link-Stabilizing Clustering for Wireless Sensor Networks
Cluster Forming
Cluster Updating
Cluster Heads Re-electing
Power Control Scheme in LSC
Directed Diffusion Based on LSC
Performance Evaluation
Network Stability
Average Delay
Energy Consumption
Conclusion
References
Voronoi Tessellation Based Rapid Coverage Decision Algorithm for Wireless Sensor Networks
Introduction
Preliminaries
Voronoi Tessellation Based Rapid Coverage Decision Algorithm
Algorithm Analyses and Simulation
Conclusion
References
A Clustering-Based Approximation Scheme for In-Network Aggregation over Sensor Networks
Introduction
In-Network Aggregation Model
The Approximation Problem
Clustering-Based Approximation Architecture for In-Network Aggregation
Problem of Tree-Based Approximation Architecture
Properties of Hierarchical Caching Method
Optimum Number of Clusters
Adaptive Tolerance Reallocating Scheme
Experiments and Results
Effect of Routing Structure with tct Support
Evaluating the Adaptive tct Reallocating Scheme
Related Work
Conclusion
References
Real-Time Data Delivery in Wireless Sensor Networks: A Data-Aggregated, Cluster-Based Adaptive Approach
Introduction
Related Work
Delay Sensitive Feedback Control in Intra-cluster Data Aggregation
Priority Based Packets Classification and Scheduling
Delay Due to Data Aggregation
Trade-Off Between AW Delay and Aggregation Accuracy
Inter-cluster Congestion Avoidance: Channel Reservation
Performance Evaluation
Simulation Settings
Performance of DSFC
Performance of Combination of DSFC with EPCR
Conclusion
References
A Location-Unaware Connected Coverage Protocol in Wireless Sensor Networks
Introduction
Related Work
Preliminary
Problem Analysis
LUCCP Protocol
Adjust the Transmission Range
Simulation Results
Effectiveness of LUCCP
Network Lifetime
Discussion
References
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks
Introduction
Propagation Limiting Method Overview
Reliable Data Delivery Method
Assumptions
Overview
Input Parameters
Fuzzy Logic Design
Data Delivery
Simulation Result
Conclusion and Future Work
References
An Efficient Grid-Based Data Gathering Scheme in Wireless Sensor Networks
Introduction
NetworkModel
Assumptions
Grid Construction
The Proposed Efficient Grid-Based Data Gathering (EGDG) Scheme
Overview
Cycle Construction
Data Gathering in EGDG
Cycle Maintenance
The Improvement of EGDG
Performance Evaluation
The Number of Rounds and Coverage Ratio
Energy $\times$ Delay Cost
References
Conclusions and Future Work
References
Grid-Based Sense Schedule for Event Detection in Wireless Sensor Networks
Introduction
SystemModel
Grid-Based Sense Schedule
Grid Partition
Election of Representative
Performance Analysis
Network Lifetime
Detection Delay
Simulation
Conclusion
References
An Integrated and Flexible Scheduler for Sensor Grids
Introduction
Sensor Grid Architecture and Testbed
Sensor Grid Scheduler Design
Characteristics of Sensor Jobs
Sensor Job Scheduling Algorithms
Load Balancing Algorithms
Dropping Jobs
Implementation of the Scheduler
Evaluation of Scheduling Algorithms
Experimental Methodology
PerformanceMetrics
Results and Discussion
Evaluation of Load Balancing Algorithms
Experimental Methodology
PerformanceMetrics
Results and Discussion
Conclusion
References
A Lightweight Scheme for Node Scheduling in Wireless Sensor Networks
Introduction
Preliminary
Fractional Coverage Analyses for Dense Wireless Sensor Networks
Lightweight Node Scheduling Scheme (LNS)
Simulation Study
Simulation Parameters
Simulation Results
Conclusion
References
A Multi-tier, Multimodal Wireless Sensor Network for Environmental Monitoring
Introduction
Sensor Networks - Concepts and Characteristics
A M$^2$ WSN for Environment Monitoring
Network Organization
Network Operation
Network Communication
Experimental Evaluation
Experimental Results
Conclusion
References
Wireless Sensor Networks, Making a Difference Tomorrow
Introduction and Related Work
Novel Application
Connectivity Algorithms in WSNs
Problem Formulation
Simple Connectivity Algorithm ($SCA$)
Cooperative Diversity Connectivity Algorithm ($CDCA$)
Simulation Results and Analysis
Conclusions
References
Enabling Distributed Messaging with Wireless Sensor Nodes Using TinySIP
Introduction
Overview of TinySIP
Summary of SIP
Design Choices for TinySIP
Implementation of TinySIP
TinySIP Message Format
TinySIP Library Components
Application of TinySIP Communication Abstractions
Performance Evaluation
Related Work
Conclusions
References
Localization and Synchronization for 3D Underwater Acoustic Sensor Networks
Introduction
Background and Related Works
Localization and Time Synchronization in Terrestrial Sensor Networks
Localization and Time Synchronization for UW-ASNs
3D Space Partition and Localization
Problem Statement
Our Methods
Results and Analysis
Evaluation Methodology
Results
Conclusions
References
An Energy-Efficient Framework for Wireless Sensor Networks with Multiple Gateways
Introduction
Related Work
Energy-Efficient Dissemination Framework with Multiple Gateways (EDF)
System Model
Energy-Efficient Scheme with Multiple Gateways
Performance Evaluation
Conclusions and Future Work
References
Self-configurable Structure for Tracking Moving Objects in Wireless Sensor Networks
Introduction
Model Analysis
Scenario 1: Sensor Fields with Only One Sink
Scenario 2: Sensor Fields with Multiple Sinks
Scenario 3: Sensor Fields with No Sink
Performance Evaluation
Simulation Model and Metric
Impact of the Number of Multiple Static Sinks
Impact of the Number of Multiple Users
Impact of the Number of Sensor Nodes
Impact of the User Mobility
Conclusion and Further Work
References
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks
Introduction
Related Works and Problem Definition
Secure Dynamic Network Reprogramming
Delayed Authentication Problem
Proposed Schemes
Scheme 1: Redundant Hash Approach
Scheme 2: Page Digest Approach
Analysis and Performance Evaluation
Authentication Probability
Storage Overhead Analysis
Communication Overhead Analysis
Security Analysis
Conclusion
References
Self-deployment of Mobile Nodes in Hybrid Sensor Networks by AHP
Introduction
Problem Statements
Moving Direction Determination by AHP
Performance Evaluations
Simulation Environment
Simulation Results
Conclusion and Future Work
References
Data Synchronization in Distributed and Constrained Mobile Sensor Networks
Introduction
Related Work
Proposed Algorithms
Notions
Motivation
Pairwise Data Sync
N-Node Data Sync
Experimental Evaluations
Experiment Set 1
Experiment Set 2
Conclusion
References
Reference Interpolation Protocol for Time Synchronization in Wireless Sensor Networks
Introduction
Related Work
Sources of the Inaccurate Time Synchronization
RBS Time Synchronization
Reference Interpolation Protocol
Basic Operations in Single Hop
Operations in Multiple Hops
Convergence Time for Synchronization
Performance Evaluation
Experimental Environment
Performance in the Single Hop
Performance in the Multiple Hops
The Amount of Power Consumption
Conclusion and Future Work
References
Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks
Introduction
Related Work
Distance-Sensitive Node Discovery
Grid Sensor Networks
Arbitrary Sensor Networks
Performance Evaluation
The Mesh-Based Relocation Protocol
Implementation Details
References
Neighbor Position-Based Localization Algorithm for Wireless Sensor
Introduction
Neighbor Position-Based Localization Algorithm
Problem Statements
Overlapping Using Crescents
Neighbor Table List Request and Positioning Neighbor Selection Method
Accuracy-Based Adaptive NPLA
Simulation Study
Simulation Parameters and Evaluation Criteria
Conclusion
References
Location Estimation with Mobile Nodes in Wireless Sensor Networks
Introduction
Related Works
Radio Waves
Wireless Sensor Network Locating Method
A Location Mechanism with Mobile Reference Nodes in WSNs
Locating Mechanism
Locating Process - Calculate the Coordinates
Transmission of Coordinate Data
Movement of Reference Points
Movement of Three Reference Points
Calculation Method
Simulation Results
Simulation Environment
Simulation Results
Conclusions and Future Work
References
A Novel Architecture for Hierarchically Nested Network Mobility
Introduction
Proposed System Protocol
System Architecture
Binding Update Procedures
Performance Analysis
Analytic Model of Our Proposed Scheme in a Hierarchically Nested NEMO Environment
Analytic Model of NEMO
Performance Comparison
Conclusion
References
Route Optimization Using Scalable Cache Management for Intra-NEMO Communication
Introduction
Related Works
Inter-NEMO RO Scheme
Intra-NEMO RO Scheme
The Proposed Scheme
Performance Evaluation
Conclusion
References
Content Aware Selecting Method for Reducing the Response Time of an Adaptive Mobile Web Service
Introduction
Mobile Web Service
The Pre-service Method for Enhancing the Response Time of Mobile Web Service
Definition of Pre-service
Process of Pre-service
Methods to Select Contents in Cache for Pre-service
Device Profile-Aware Selection Method
Content-Aware Selection Method
Experiments and Evaluation
Conclusions
References
A Study of Speech Emotion Recognition and Its Application to Mobile Services
Introduction
Proposed System
Emotional Feature Extractions and Optimization
Pre-processing and Feature Extraction
Feature Selection Procedure
Noise Reduction Using MA Filtering
Experimental Results
Experimental Setup
SFS Feature Selection Experiment
Emotional States Classification Results
Application Study - Mobile Emotion Agent
Conclusion
References
Mobility Driven Vertical Handover for Mobile IPTV Traffic in Hybrid IEEE 802.11e/16e Networks
Introduction
Related Work
Mobility Driven Vertical Handover Scheme
Reference Network Model
Performance Evaluation
Conclusions
References
An Efficient Scheme for Lifetime Setting in the MIPv6
Introduction
System Configuration
Proposed System Configuration
Proposed Scheme for BU
Performance Analysis
An Analytical Model of the BU Costs in IETF MIPv6
An Analytical Model of the BU Costs in the Proposed Scheme
MN’s Lifetime Setting Model
Conclusion and Future Work
References
Bridging OSGi Islands Through SLP Protocol
Introduction
Related Work
OSGi Framework Bridging Architecture
Alternative Bridging Schemes
Design of SLPBridge Service
Implementation and Evaluation Study
Prototype Implementations
Comparison of Bridging Strategies
Concluding Remarks
References
Selective Grid Access for Energy-Aware Mobile Computing
Introduction
Grid Services for Mobile Computing
SGA System Model for Energy-Aware Reconfiguration
Context in Energy-Aware SGA
The Scheduling Problem Description
Enhancement Techniques
SGA Reconfiguration Algorithm
Performance Evaluation
Conclusions
References
Cognitive Computing Resource Management for a Ubiquitous Wireless Access
Introduction
Cognitive Computing Resource Management
Case Study
Computing Resource Management Algorithms
SDR Platforms
SDR Applications
Application Mapping
Results
Conclusions
References
Research of UWB Signal Propagation Attenuation Model in Coal Mine
Introduction
Uwb Indoor Propagation Model
Uwb Propagation Model in Coalmine
Theoretical Gist of Dividing Propagation Area in Tunnel
Propagation Model in Near-Field Region
Propagation Model in Far-field Region[5]
Simulation and Analysis
Future Work
References
Context Script Language and Processor for Context-Awareness in Ubiquitous Intelligent Environment
Introduction
Related Work
Context Script Language for Context-Awareness
Context Object Declaration
Context Definition and Destroy
Context Instance Insertion and Deletion
Context Instance Activation and Deactivation
Context Script Language Processor
Context-Aware Application System
Conclusions and Future Work
References
A Semantics-Based Framework for Context-Aware Services: Lessons Learned and Challenges
Introduction
Related Work
Context Pedestrian Guiding System Architecture
Deployed Services
Challenges in Ubiquitous and Context-Aware Implementations
Distributed Planning and Multi-agent Coordination Techniques
Complex, Dynamic and Uncertain Environments
Plan Representation and Sharing
Conclusions
References
Devising a Context Selection-Based Reasoning Engine for Context-Aware Ubiquitous Computing Middleware
Introduction
Related Work
Our Existing Reasoning Engine
Overview
Main Characters of Our Reasoning Engine
Improvement on Our Reasoning Engine
User-Defined Rules in Knowledge Base
Learning Models
Conclusions
References
The u-Class Based on Context-Awareness
Introduction
The Context-Aware Middleware: Ubi-Core
The Context-Aware Lecture Room: u-Class
Scenario of u-Class
A Model of Lecture Room
Progress of Interpreting Contexts in u-Class
Test and Evaluation
Conclusion and Future Work
References
Audio-Visual Fused Online Context Analysis Toward Smart Meeting Room
Introduction
Research Platform
Online Context Analysis
Context Aware Engine
Online Analysis of Group Scenarios
Online Analysis of Interactive Scenarios
Experimental Results
Conclusion
References
An Offset Algorithm for Conflict Resolution in Context-Aware Computing
Introduction
A Case Study
Conflict Description
Conflict Solutions
Experiment Result and Analysis
Related Works
Conclusion
References
UCIPE: Ubiquitous Context-Based Image Processing Engine for Medical Image Grid
Introduction
Related Works
Overview of MedImGrid UCIPE
The Work Environment of MedImGrid UCIPE
The Framework of MedImGrid UCIPE
UCIPE Based 3D Reconstruction Algorithm
Experiments
Conclusions and Future Works
References
Ontology-Based Semantic Recommendation for Context-Aware E-Learning
Introduction
Related Work
Ontology Model
Semantic Content Recommendation
Semantic Relevance Calculation
Recommendation Refining
Learning Path Generation
Recommendation Augmentation
Prototype Implementation and Experiment
Conclusion and Future Work
References
Deployment of Context-Aware Component-Based Applications Based on Middleware
Introduction
Context-Aware Applications
Architecture of the Context-Aware Middleware for the Component-Based Pervasive Computing
Component Based Middleware StarCCM
Architecture of the Middleware Based Context Management
Context-Aware Deployment for the Component-Based Applications
Deployment of the Component Based Applications
Deployment Adaptation Rules
Performance Results
Conclusions
References
Identifying a Generic Model of Context for Context-Aware Multi-services
Introduction
Literature Review: Models of Context
The Assessment Methodology of Context Models
The Scenarios for the Evaluation
Conceptual Framework
Model Representation Power
Model Simplicity
Context Model Selection
Generic Model of Context
Conclusion
References
Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System
Introduction
Related Work
Background Information
SensorML for Automated Sensor Discovery and Configuration
Context Modelling and Ownership
Privacy Preference Language
A General Obfuscation Mechanism for Context Information
Architecture of the Context Management System
The Privacy and Obfuscation Mechanism
Conclusion
References
Context-Aware Service Composition for Mobile Network Environments
Introduction
Architectural Design of Smart Space Middleware
Automated Service Composition Support in OSGi Environments
Shopping Aid Scenario: A Case of Service Composition
Plumber Service
Dynamic Service Ranking
Service Composition Support Subsystem
Prototype Implementation
Related Work
Conclusion
References
A Context-Awareness Middleware Based on Service-Oriented Architecture
Introduction
Related Works
The Context Model
Context Information Ontology
Context Metadata Ontology
Context-Awareness Middleware
Architecture
Context Reasoning
Performance Evaluation
Conclusion
References
On the Design, Deployment and Use of Ubiquitous Systems
Introduction
The Technologies
The Bat System: Location Awareness
The Broadband Phones: Ubiquitous Output/Input
Design and Deployment Issues
The Bat System
The Broadband Phones
Summary of Major Design and Deployment Criteria
Usage
Conclusions
References
Performance Evaluation of 3-Hierarchical Resource Management Model with Grid Service Architecture
Introduction
3-Hierarchical Resource Management Model(3-HRMM)
Adaptive Resource Management on 3-HRMM
Resource Brokering
Task Allocation Algorithms
Resource Monitoring and Visualization
Application Implementation
Conclusions
References
A Study on Ubiquitous Intelligent Healthcare Systems inHome Service Aggregation Business Model
Introduction
Architecture of a UI-Healthcare System
Details of a UI-Healthcare System
Sensor Network System
HAS Server and Healthcare Server
Healthcare System Protocol
Sensor Network Protocol
Server Protocol
Experiment of a UI-Healthcare System
Conclusion
References
Implementation and Quantitative Evaluation of UbiMDR Framework
Introduction
Prototype Implementation
Scenario and Implementation Environment
Prototype Implementation
Comparative Evaluation
Notations and Symbols
Assumptions
Cost Evaluation for Integrating Initial Built-In Semantics
Cost Evaluation for Adding New Sensor Fields
Conclusion and Future Works
References
A Key-Index Based Distributed Mechanism for Component Registration
Introduction
KI Based Distributed Component Registration Framework
Component Description and Key-Index Tree
XML Based Unified Description
Key Information Tree
KI Based Distributed Registration Process
Distributed Architecture
Sequence of Operations
Performance Evaluation
Performance Metrics
Simulation Results
Conclusions and Future Work
References
BASCA: A Business Area-Oriented Service Component Adaptation Approach Suitable for Ubiquitous Environment
Introduction
The BASCA Approach Overview
BASCA Framework
Business Area and Function Unit
Control Structures
Service Component Description
User Requirement Representation
Service Component Adaptation Approach
User Requirement Process
Functionality Relationship Resolution
Service Component Adaptation
The Adaptation Result and Application Discussions
Conclusions
References
A Pervasive Service Framework for Pervasive Computing Applications
Introduction
Problem Formalization
Component-Based Service Model
User-Oriented QoS Model
User Preference Model
Service Selection
Experiments Evaluation
Conclusion
References
Symbiotic Computing: Concept, Architecture and Its Applications
Introduction
Symbiotic Computing: The Concept
Basic Concept
Mutual Understanding Between Real Space and Digital Space
Basic Architecture of Symbiotic Computing
Basic Architecture
Basic Model
Applications
SOTTO
uEyes
Symbiotic Group Learning
AMACS
Ubiquitous Multimedia Communication System
Conclusion
References
Multi-agent Software Control System with Hybrid Intelligence for Ubiquitous Intelligent Environments
Introduction
Distributed Embedded Intelligence Room (DEIR)
Device Networks and Middleware
Multi-agent Control System
Hybrid Learning
Device Grouping and Classification
Decision Tree Learning
Fuzzy Inference Learning
Performance Evaluation
Future Works
Conclusions
References
IUMELA: A Lightweight Multi-Agent Systems Based Mobile Learning Assistant Using the ABITS Messaging Service
Introduction
Related Work
IUMELA – The Agent Architecture
Evaluation
Discussion and Future Work
References
Towards Intuitive Spatiotemporal Communication Between Human and Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory --- A General Theory of Tempo-logical Connectives ---
Introduction
The Formal Language $L_md$
Omnisensory Image Model
Empty Event
TLCs Extended for Conceptual Loci
Formulation of Natural Event Concepts
Temporal Event Concepts
Spatial Event Concepts
Formulation of More General Knowledge
Utilization of Temporal Implications
Utilization of Temporal Equivalences
Definition of Natural Object Concepts
Discussions and Conclusions
References
Graph-Based Semantic Description in Medical Knowledge Representation and 3D Coronary Vessels Recognition
Introduction
Description of the Problem
Functional Analysis of Coronary Arteries
Semantic Description of Coronary Vessels with the Use of Graph-Based Formalisms
Characteristics of the Image Data
Graph-Based Description of Coronary Arteries
Results
Conclusions
References
Persistent Storage System for Efficient Management of OWL Web Ontology
Introduction
Definition of Persistent Storage System
Framework
Permanent Storage System Model Definition
System Design for Implementation
System Architecture
Overall Loading Algorithm
Performance Evaluation
Target Systems and Experiment Environment
Experiment Result and Discussion
Conclusion and Further Study
References
Prediction-Based Dynamic Thread Pool Management of Agent Platform for Ubiquitous Computing*
Introduction
The Related Work
The Proposed Scheme
The Dynamic Thread Pool
The Agent Platform
Performance Evaluation
Conclusion
References
A Ubiquitous Watch-Over System Based on Environmental Information and Social Knowledge
Introduction
uEyes: The Concept and Model
Concept of uEyes
Functional Model of uEyes
Real Space Understanding Mechanism Based on Social Knowledge
Real Space Understanding Mechanism
Human Relation Recognition Function
Situation Recognition Function
Behavior
Application: A Watching System for Elderly People
Implementation
Knowledge Representation
Experimental Environment
Experiments
Exp.1: Effect of Real Space Understanding Function
Exp.2: Effects of Proposed Function on uEyes
Evaluation
Conclusion
References
Ubiquitous Intelligent Information Push-Delivery for Personalized Content Recommendation
Introduction
The Search Present Condition and Scarcity of Time Series in the Financial Realm
Financial Time Series Forecast Analysis Based on the SVM
Support Vector Machines Theoretical Foundation
Time Series Forecasting Model Based on the Support Vector Machine
Prediction Algorithm Description Based on Time Series of Support Vector Machine
The Evaluation and the Experiment Analysis of Algorithm
The Environment of the Experiment and the Evaluation Index
Experimental Result and Analysis
Summary
References
Location-Based Recommendation System Using Bayesian User's Preference Model in Mobile Devices
Introduction
Related Works
The Context and Recommendation in Mobile Environment
Recommendation Systems
BN-Based Personalized Recommendation System
Overview
Context Information
Bayesian Network Based User Preference Model
Restaurant Recommendation
Experimental Results
Experimental Environment
Experimental Results
Concluding Remarks
References
Fuzzy-Smith Control for QoS-Adaptive Notification Service
Introduction
QoS-Adaptive Notification Service
Flexible Task Scheduling Model
QoS-Adaptive Event Channel Feedback Control Framework
Fuzzy-Smith Controller
Fuzzy-Smith Controller Architecture
Fuzzy-Smith Controller Design
QoS Level Adjusting
Experiments and Discussions
Conclusion
References
Petri Nets for the Verification of Ubiquitous Systems with Transient Secure Association
Introduction
The Resurrecting Duckling Policy
TSA Systems
An Application Example
Verification of TSA Systems
Conclusions and Future Work
References
An Approach of Trusted Program Generation for User-Responsible Privacy
Introduction
Related Works
Information Protection Framework
Approaches for Checking Information
Information Protection Framework
Challenges for the Framework
Usage and Protection Policy
The Usage and Protection Policy
The Program Conversion Rule
Examples of the Trusted Program Generation
Discussions for Other Challenges
Conclusion
References
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes
Introduction
Related Works and Our Contribution
RFID-BasedBankSystem
Components
Security and Privacy Risks
Our Scheme: Self-updating Protocol
System Set-Up
Banknotes Issue
Verification and Updating
Tracing
Security Analysis
References
Intelligent Detection Computer Viruses Based onMultiple Classifiers
Introduction
Viruses Detection Engine
Model Frame
Feature Extraction
Detection Method
Experiment Results
Conclusion
References
Designated Verifier Signature: Definition, Framework and New Constructions
Introduction
DVS and Its Variants
Differences from Former Definitions
Delegatability Analysis of ID-Based UDVS Scheme
Delegatability Analysis
MDVSModel
Analysis of Chow’s MDVS Scheme [3]
Refined Classification
Transfer Mode in MDVS
An Efficient and Constant-Size MDVS
Conclusions
References
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence
Introduction
The Road Behind
The Road Ahead
Protected Computing
Other Approaches
Trusted Computing Platform for Secure Agent-Based Environment
Proof-Carrying-Code
Conclusions
References
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes
Introduction
This Paper
Remote User Authentication (RUA) Schemes
The Hwang et al. Scheme
The Hwang-Li Scheme
Generic Perspective of Attacks on RUA Schemes
Attacks Due to Distributivity
Oracle Attacks Due to Symmetry
Dictionary Attacks Due to Verifiers
Issues Due to Long-Term Key Compromise
Concluding Remarks
References
Secret Key Revocation in Sensor Networks
Introduction
Basic and Relying Schemes
Contribution, Definitions and Terms Elucidation
Contributions
Definitions and Terms Elucidation
Putting It All Together: Symmetric Key Revocation
On Symmetric Key Revocation
BVS for Symmetric Key Revocation
CS Cover for Symmetric Key Revocation
On the Encoding
Analysis and Evaluation
Application: Key Establishment
Conclusion and Future Work
References
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network
Introduction
Related Works
A Hybrid Key Establishment Protocol for WSN
Notation
Key Pre-deployment Phase
Cluster Formation
Key Establishment Between Nodes in Cluster
Analysis
Security Analysis
Performance Analysis
Conclusion
References
A Secure Pairwise Key Establishment Scheme in Wireless Ad Hoc Networks*
Introduction
Background
Chan’s Scheme
Du et al.’s Scheme
Notation
Our Pairwise Key Establishment Protocol
Modified Multiple Key Space Generation Phase
Pairwise Key Generation Phase
Performance and Security Analysis
Performance Analysis
Security Analysis
Conclusions
References
Author Index