Advances in Parallel and Distributed Computing and Ubiquitous Services (eBook)

UCAWSN & PDCAT 2015
eBook Download: PDF
2016 | 1st ed. 2016
XVII, 236 Seiten
Springer Singapore (Verlag)
978-981-10-0068-3 (ISBN)

Lese- und Medienproben

Advances in Parallel and Distributed Computing and Ubiquitous Services -
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.



Professor James J. Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. 

Professor Gangman Yi received his master's degree in Computer Sciences at Texas A&M University, USA in 2007, and doctorate in Computer Sciences at Texas A&M University, USA in 2011. In May 2011, he joined System S/W group in Samsung Electronics, Suwon, Korea. He joined the Department of Computer Science & Engineering, Gangneung-Wonju National University, Korea, since March 2012. Dr. Yi has been researched in an interdisciplinary field of researches.

Professor Young Sik Jeong is Professor of Multimedia Engineering in Dongguk University. He received his master's degree in Computer Sciences at Korea University, Korea, and, doctorate in Computer Sciences at Korea University. His Research and Interests are 'IaaS cloud-based service technology for multimedia content processing', 'Big multimedia data processing in the mobile cloud-based technologies', 'Multimedia data processing middleware development in the WSN environment', 'CPS-related technology for multimedia content service', and 'Cloud service technologies for IoT based technical support'. 

Professor Hong Shen is Professor (Chair) of Computer Science in the School of Computer Science, University of Adelaide. He received his B.Eng. degree from Beijing University of Science

and Technology, M.Eng. degree from University of Science and Technology of China, Ph.Lic. and Ph.D. degrees from Abo Akademi University, Finland, all in Computer Science. 


This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Professor James J. Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. Professor Gangman Yi received his master’s degree in Computer Sciences at Texas A&M University, USA in 2007, and doctorate in Computer Sciences at Texas A&M University, USA in 2011. In May 2011, he joined System S/W group in Samsung Electronics, Suwon, Korea. He joined the Department of Computer Science & Engineering, Gangneung-Wonju National University, Korea, since March 2012. Dr. Yi has been researched in an interdisciplinary field of researches. Professor Young Sik Jeong is Professor of Multimedia Engineering in Dongguk University. He received his master’s degree in Computer Sciences at Korea University, Korea, and, doctorate in Computer Sciences at Korea University. His Research and Interests are 'IaaS cloud-based service technology for multimedia content processing', 'Big multimedia data processing in the mobile cloud-based technologies', 'Multimedia data processing middleware development in the WSN environment', 'CPS-related technology for multimedia content service', and 'Cloud service technologies for IoT based technical support'.  Professor Hong Shen is Professor (Chair) of Computer Science in the School of Computer Science, University of Adelaide. He received his B.Eng. degree from Beijing University of Science and Technology, M.Eng. degree from University of Science and Technology of China, Ph.Lic. and Ph.D. degrees from Abo Akademi University, Finland, all in Computer Science. 

Message from the UCAWSN 2015 General Chairs 6
Message from the UCAWSN 2015 ProgramChairs 8
Organization 10
Message From the PDCAT 2015 General Chairs 12
Organization Committee 13
Contents 15
1 Rhymes+: A Software Shared Virtual Memory System with Three Way Coherence Protocols on the Intel Single-Chip Cloud Computer 18
Abstract 18
1 Introduction 18
2 Related Works 19
3 Intel SCC 20
4 Three Way Coherence 20
4.1 Shared Physical Memory 20
4.2 Distributed Shared Memory 21
4.3 Shared Physical Memory-on-Chip 21
5 Performance Evaluations 23
5.1 Small Problem Size 23
5.2 Medium Problem Size 23
5.3 Large Problem Size 25
6 Conclusion 25
Acknowledgements 25
References 26
2 Review and Comparison of Mobile Payment Protocol 27
Abstract 27
1 Introduction 27
2 Background and Related Work 28
2.1 Primitive Payment Transaction 28
2.2 Components of Mobile Payment 28
2.3 Mobile Payment Procedure 29
3 Technology of Mobile Payment 29
4 Security of Mobile Payment 30
4.1 Security Properties 30
4.2 Cryptography Concept 31
5 Analysis of Existing Secure Mobile Payment Protocols 31
5.1 Methodology Aspect 33
5.2 Security Aspect 33
5.3 Peformance Aspect 35
6 Conclusion 35
References 35
3 POFOX: Towards Controlling the Protocol Oblivious Forwarding Network 37
Abstract 37
1 Introduction 37
2 POFOX Design 38
2.1 Communication Engine 39
2.2 Topology Discovery 39
2.3 Spanning Tree Protocol 41
3 POF Network Testbed 43
3.1 Devices 43
3.2 Functionality Test 44
3.3 Performance Test 44
3.3.1 Connection Time 44
3.3.2 Avoiding Broadcast Storm 45
4 Conclusion and Future Work 45
Acknowledgements 46
References 46
4 An Experimental Study on Social Regularization with User Interest Similarity 47
Abstract 47
1 Introduction 48
2 Related Work 49
3 New Similarity Functions 49
4 Social Regularization 50
4.1 Model 1: Friend Relationship Regularization (FRR) 50
4.2 Model 2: Shared Friend Regularization (SFR) 51
5 Experimental Analysis 51
5.1 Dataset 51
5.2 Comparisons 52
6 Conclusion 53
Acknowledgments 53
References 53
5 Representing Higher Dimensional Arrays into Generalized Two-Dimensional Array: G2A 55
Abstract 55
1 Introduction 55
2 Generalized Two Dimensional Representation (G2A) Scheme 56
2.1 G2A for TMA(4) 56
2.2 G2A for TMA(n) 57
3 Comparison Between TMA and G2A for Matrix Operations 57
3.1 Matrix-Matrix Addition/Subtraction Algorithms 58
3.2 Matrix-Matrix Multiplication Algorithms 59
4 Experimental Results 60
5 Related Works 61
6 Conclusion 61
References 61
6 A Portable and Platform Independent File System for Large Scale Peer-to-Peer Systems and Distributed Applications 63
Abstract 63
1 Introduction 63
2 User Space File System 64
3 Metadata Structures 66
4 Implementation 67
5 Evaluation 68
6 Related Work 70
7 Conclusion 70
References 70
7 OCLS: A Simplified High-Level Abstraction Based Framework for Heterogeneous Systems 72
Abstract 72
1 Introduction 72
2 Related Works 73
3 OCLS Framework 74
3.1 OCLS Abstraction Layer 74
3.2 OCLS Library 75
3.3 Kernel Data Type and Data Movement 75
3.4 Runtime Data Structures 76
4 Case Study 76
5 Evaluation 77
5.1 Code Size Comparison 78
5.2 Performance 78
5.3 Stability 79
6 Conclusion 80
Acknowledgments 80
References 80
8 Hierarchical Caching Management for Software Defined Content Network Based on Node Value 81
Abstract 81
1 Introduction 82
2 Hierarchical Cache Model 82
2.1 Software Defined Content Network Architecture 83
2.2 Node Value 83
2.3 Hierarchical Cache Model 84
3 Cache Decision Strategy Based on Node Value 85
4 Experiment and Analysis 85
5 Conclusion 87
Acknowledgements 87
References 87
9 Interoperation of Distributed MCU Emulator/Simulator for Operating Power Simulation of Large-Scale Internet of Event-Driven Control Things 88
Abstract 88
1 Introduction 89
2 Research Motivation 90
3 Proposed Architecture 91
4 Our Approach for Implementation Method 93
5 Conclusion 94
Acknowledgements 94
References 95
10 The Greedy Approach to Group Students for Cooperative Learning 96
Abstract 96
1 Introduction 96
2 Related Work 97
2.1 Cooperative Learning 97
2.2 Finding a Team of Experts 98
2.3 Grouping Students with Ability 98
3 Framework 98
3.1 Preliminaries 98
3.2 Problem 101
4 Algorithm 101
5 Conclusions 102
References 102
11 Secure Concept of SCADA Communication for Offshore Wind Energy 103
Abstract 103
1 Introduction 103
2 Need to Secure Communication 104
3 Security Concepts 105
3.1 Threats 105
3.2 Security Processes 105
4 Apply Security to Wind Energy 107
5 Conclusion 108
Acknowledgements 108
References 108
12 ASR Error Management Using RNN Based Syllable Prediction for Spoken Dialog Applications 110
Abstract 110
1 Introduction 110
2 Method 111
2.1 Overall Architecture 111
2.2 ASR Error Detection 111
2.3 Syllable Prediction RNN-Based Error Correction (SPREC) 113
3 Experiments 115
3.1 ASR Error Detection 115
3.2 ASR Error Correction 116
4 Conclusion 116
Acknowledgements 116
References 117
13 A Protection Method of Mobile Sensitive Data and Applications Over Escrow Service 118
Abstract 118
1 Introduction 118
2 Related Works 119
3 The Proposed Scheme 120
4 Conclusion 125
Acknowledgments 126
References 126
14 GPU-Based Fast Refinements for High-Quality Color Volume Rendering 127
Abstract 127
1 Introduction 128
2 Description of Method 129
2.1 Boundary Refinements 129
2.2 Fast GPU-Based Refinement 130
3 Results and Discussion 131
4 Conclusion 132
Acknowledgments 133
References 133
15 Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment 134
Abstract 134
1 Introduction 135
2 Filter-Based Beacon Distance Measurement 135
2.1 Beacon Distance Measurement Framework 135
2.2 Definition of Indoor Environment 135
2.3 Filters of Beacon Distances 136
3 Experiment 138
4 Conclusion 138
Acknowledgements 138
References 138
16 Indoor Location-Based Natural User Interface for Ubiquitous Computing Environment 140
Abstract 140
1 Introduction 140
2 User Location Estimation Framework in Indoor Environment 141
2.1 Location-Based NUI/NUX Concept 141
2.2 Process of User Location Estimation 142
3 Experiment 142
4 Conclusion 144
Acknowledgements 144
References 145
17 Flexible Multi-level Regression Model for Prediction of Pedestrian Abnormal Behavior 146
Abstract 146
1 Introduction 146
2 Flexible Multi-level Regression Model for Prediction of Abnormal Behavior 147
2.1 Abnormal Behavior Diagram of Prediction System 147
2.2 Data Classification 148
2.3 Flexible Multi-level Regression Model 149
2.4 Behavior Prediction 150
3 Scenario Application 150
4 Conclusion 151
Acknowledgements 152
References 152
18 Automatic Lighting Control Middleware System Controlled by User's Emotion Based on EEG 153
Abstract 153
1 Introduction 153
2 Related Research 154
3 Emotional Lighting Control Middleware System 155
3.1 Structure of System 155
3.2 Emotional Lighting Control Middleware System Application 156
4 Experiment and Results 157
4.1 EEG Analysis 157
4.2 Experiment 157
5 Conclusion 158
Acknowledgments 158
References 158
19 Hand Recognition Method with Kinect 160
Abstract 160
1 Introduction 160
2 Related Work 161
3 Hand Region Detection Algorithm 162
3.1 Hand Segmentation 163
3.2 Outlines Detection 164
3.3 Finger Count Recognition 164
4 Experiment 165
5 Conclusion 165
Acknowledgments 166
References 166
20 A Study on the Connectivity Patterns of Individuals Within an Informal Communication Network 167
Abstract 167
1 Introduction 167
2 Theoretical Background 168
2.1 Organizational Learning and Organizational Communication Structure 168
3 Model 169
3.1 Entities and Their Individual Structural Importance 169
4 Experimental Setup 170
5 Results 170
6 Conclusion 172
References 172
21 Grid Connected Photovoltaic System Using Inverter 173
Abstract 173
1 Introduction 174
2 Parameter of PV Cell and I-V Characteristic Curves of Solar Cell 174
2.1 Short-Circuit Current 175
2.2 Maximum Power Point 175
3 Control of Grid Connected Power Converter 176
4 Conclusion 177
References 178
22 The Cluster Algorithm for Time-Varying Nonlinear System with a Model Uncertainty 179
Abstract 179
1 Introduction 179
2 The Input-Output Linearization for the Time-Varying Nonlinear System with an Uncertainty 180
3 The Proposed Algorithm 181
4 Simulation 182
5 Conclusion 183
References 183
23 Integrated Plant Growth Measurement System Based on Intelligent Circumstances Recognition 184
Abstract 184
1 Introduction 185
2 Related Studies 185
2.1 Growth of Plants 185
2.2 Growth Measurement 186
3 Growth Measurement System Based on Intelligent Circumstances Recognition 186
3.1 Image Processing 187
3.2 Image Analysis 187
3.3 Three-Dimensional Measurement of a Plant Using a Stereo Camera 188
3.4 Machine Learning 188
4 Conclusion 188
References 189
24 A Study on the Big Data Business Model for the Entrepreneurial Ecosystem of the Creative Economy 190
Abstract 190
1 Introduction 191
2 Related Research 192
3 Big Data Business Strategies in the Creative Economy 192
4 Conclusion 194
References 194
25 Implementation of Intelligent Decision-Based Smart Group Scheduler 196
Abstract 196
1 Introduction 197
2 Related Work 197
3 Requirement Analysis 198
3.1 Function-Related Requirement 198
3.2 Data-Related Requirement 199
3.3 Interface-Related Requirement 199
3.4 User-Related Requirement 199
4 System Structure 200
5 Conclusion 200
References 201
26 Implementation of MCA Rule Mapper for Cloud Computing Environments 202
Abstract 202
1 Introduction 203
2 Related Work 204
3 Requirement Analysis 205
3.1 Function-Related Requirement 205
3.2 Interface-Related Requirement 205
3.3 User-Related Requirement 205
4 System Structure 205
5 Module Specification 206
6 Anticipated Results and Contributions 206
References 207
27 A Simple Fatigue Condition Detection Method by using Heart Rate Variability Analysis 208
Abstract 208
1 Introduction 208
2 Related Work 209
3 Data Collection and Analysis 209
3.1 Time Domain Analysis 209
3.2 HRV Data of PPG Measuring Device 210
4 Results 211
5 Conclusion 213
References 213
28 Insider Detection by Analyzing Process Behaviors of File Access 214
Abstract 214
1 Introduction 215
2 Related Work 215
3 File Access Behavior Analysis 216
3.1 Dataset 216
3.2 File Access Behavior Analysis 217
3.2.1 File Path Dispersion 217
3.2.2 Operation Type 218
3.2.3 File Type 219
3.2.4 Velocity 219
3.3 File Access Behavior Model 220
4 Model Verification 220
4.1 OCSVM Based Semi-supervised Detection 221
4.2 K-Means Based Unsupervised Detection 221
4.3 Discussion 222
5 Conclusion and Future Work 223
Acknowledgements 223
References 223
29 Analysis of the HOG Parameter Effect on the Performance of Vision-Based Vehicle Detection by Support Vector Machine Classifier 225
Abstract 225
1 Introduction 225
2 HOG Descriptor Parameters 226
2.1 Computation Steps of HOG Features 226
2.2 Parameters of HOG Descriptor 227
3 HOG Parameter Space Exploration by Experiments 227
3.1 Experimental Setup 227
3.2 Experimental Results 228
4 Conclusion 231
References 232
30 A Fast Algorithm to Build New Users Similarity List in Neighbourhood-Based Collaborative Filtering 233
Abstract 233
1 Introduction 234
2 The TwinSearch Algorithm 235
2.1 Algorithm Design 235
2.2 Time Complexity Analysis 236
3 Experimental Evaluation 237
3.1 Datasets and Experimental Settings 237
3.2 Experimental Results 237
4 Conclusion 239
Acknowledgements 239
References 239

Erscheint lt. Verlag 23.1.2016
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XVII, 236 p. 95 illus.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Artificial Intelligence • Big Data and Data Mining • Embedded System • Intelligent Sensor Network • Mobile and ubiquitous computing • Parallel and Distributed Computing • PDCAT 2015 proceedings • ubiquitous computing • UCAWSN 2015 proceedings • wireless sensor network
ISBN-10 981-10-0068-9 / 9811000689
ISBN-13 978-981-10-0068-3 / 9789811000683
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 8,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Achieve data excellence by unlocking the full potential of MongoDB

von Marko Aleksendric; Arek Borucki; Leandro Domingues …

eBook Download (2024)
Packt Publishing (Verlag)
53,99
A guide to developing efficient and elegant T-SQL code

von Pam Lahoud; Pedro Lopes

eBook Download (2024)
Packt Publishing (Verlag)
35,99