The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops
With the increasing popularity of wearable computing devices, new sensing techniques that enable always-available interaction are highly demanded. In this paper, we propose Body RC, a novel body-based device using human body as lossy signal transmission medium. This device supports on-body interaction and body gesture recognition. In particular, Body RC recognizes the operations of on-body interaction...
Modern tactical edge communication is turning to mobile ad hoc networks (MANETs) since the self-forming and self-healing nature of MANETs are advantageous in such a military environment. However, MANET faces a myriad of challenges in tactical field compared with traditional scenarios. Barrage Relay Network (BRN) is a special MANET designed from the ground up for the demands of tactical edge communications,...
The prevalence of smart phones equipped with various sensors enables pervasive capturing users' mobility data (GPS, GSM network, WiFi, etc.), which contains approximate whereabouts of users. In order to protect users' privacy some mobility data is anonymized, which is challenging for discovering individual information implicated in the data. In this study, we are attempting to discover people's life...
It is common to tile normal sized units together to obtain very large tabletops or interactive digital walls. Usually cameras are adopted to capture the touch input on the surface, which demands for fusing several multi-touch input feeds into a single feed in real time. Common approaches of stitching camera frames into aggregate images do not scale to larger number of cameras. We present uStitch Hub...
The Internet of Things comprises a large number of "smart things" bringing in physical world data that help resolve the challenges (e.g., Environmental pollution) we face every day. With the prevalence of IoT, some platforms emerged (e.g., Xively) on which people are allowed to share or retrieve sensor data and deploy applications. It is, however, a challenge to search/select appropriate...
The rapid growth of cell phone users in cities enable the cell phone towers spread all over urban area in past years. The user call logs, which refer to users movement trajectory in urban area, can provide an opportunity to understand urban spatial structure. As the extraction of more popular channel of human movement in urban area, the hot lines highlighted the spatial morphology of human flows in...
As an emerging technology approved in areas of database and business processing, CEP (Complex Event Process) faced challenges when applied in critical areas like CPS. Based on analysis such challenges from three aspects: event model definition, event semantic interoperability and event pattern matching, a semantic enhanced event model for CPS is proposed. While existing efforts have mainly focused...
Ubiquitous computing is strongly centered on the human, aiming to provide the right information through personalized interfaces and services in context of use to the applications users. We envision a ubiquitous computing based world in which a generic personalization model is applied to different applications, even if from different domains. The model is the core of a cloud-based platform, which guides...
Task scheduling in Cyber-Physical System (CPS) is of vital importance to increase resource utilization and enhance system performance. Conventional task scheduling schemes in embedded real-time systems are unable to satisfy performance requirements of CPS due to its task diversity and system heterogeneity. In this paper, we consider two parts of task scheduling in CPS, scheduling at node network and...
In predictable delay tolerant networks (PDTNs), the topology is known a priori or can be predicted over time. This kind of networks is often utilized to collect data, in which many to one communication pattern are adopted. Therefore, maintaining efficient tree-based topology will be very helpful to reduce resource consumption by select certain transmitting opportunities to delivery data instead of...
Several email virus models have been proposed in previous papers. Usually, users in these models are homogeneous and symmetric which fail to model the real situation accurately. In this paper, a novel model with local group is presented. In real email system, users will usually group their contacts into various kinds of groups. Moreover, users have different levels of security awareness according...
Visually impaired people need assistance to navigate safely, especially in indoor environment. This research developed an obstacle avoidance system for visually impaired using Kinect's depth camera as the main vision device. A new approach called auto-adaptive thresholding is proposed to detect and to calculate the distance of obstacle from the user. The proposed method divides equally a depth image...
Business Environments, such as shops, offices, automation plants, etc., are usually handled by the modeling and execution of business processes using languages such as Colored Petri Nets (CPN). CPN are a mathematical and graphical modeling language with powerful analysis techniques. However, current Petri nets formalisms are not aware of their execution context (i.e., Users and equipment location,...
Inertial-based indoor pedestrian tracking that uses Micro electro mechanical Systems (MEMS) technology suffers undesirable positional drift over time. As widely attested, zero-velocity updates (ZUPT) from the stance phase reduce the error growth from a third order polynomial to a linear one. However, researchers are struggling to find consistent ZUPT, especially when the pedestrian walks naturally,...
In this paper, a method of moving path control of an automatic guided vehicle (AGV) in indoor environment through recognition of marker images is presented. The existing motion control system of the AGV using infrared sensors and landmarks has faced at the critical problem. That is, the crematorium has a narrow indoor environment compared with typical industrial fields. Particularly when the AGV changes...
In this paper, we recruited 20 participants preforming user-defined gestures on a touch screen phone for 22 TV remote commands. Totally 440 gestures were recorded, analyzed and paired with think-aloud data for these 22 referents. After analyzing these gestures according to extended taxonomy of surface gestures and agreement measure, we presented a user-defined gesture set for interactive TV remote...
Wireless applications are taking an important role in our lives. More and more merchants begin to provide wireless connection so as to attract customers. For business purpose, they often ask customers to provide their personal information for using wireless, which may threat customer. So, it is desired to make a trade off between the competitive profits of both service providers and user privacy....
Advances in the 3G and LTE technologies made video on-demand a very popular entertainment for people on the go. However, uniform coverage of mobile networks is almost impossible and, in addition, we often experience drops in bandwidth due to handovers between cellular stations, interference and admission control. In this paper, we analyse the state-of-the-art approaches to streaming on-demand videos,...
This paper deals with simultaneous energy transfer to multiple nodes for scalable wireless recharging in wireless sensor networks. All existing recharging schemes rely on the use of a mobile charger that roves the network and drops by some locations for nodes recharging. However, they focus on the efficiency of energy transfer and neglect the energy engendered by the charger movement. This is tackled...
Ubiquitous environments are characterized by the abundant number of users, their mobility and the heterogeneity of their devices. These characteristics pose a big challenge to service environments and service selection methods must change accordingly. In this paper, we describe a novel approach for service selection in ubiquitous environments. To handle the dynamic nature of these types of environments,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.