Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Network-Based Information Systems (eBook)

The 20th International Conference on Network-Based Information Systems (NBiS-2017)
eBook Download: PDF
2017 | 1st ed. 2018
LV, 1154 Seiten
Springer International Publishing (Verlag)
978-3-319-65521-5 (ISBN)

Lese- und Medienproben

Advances in Network-Based Information Systems -
Systemvoraussetzungen
309,23 inkl. MwSt
(CHF 299,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book highlights the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. It includes the Proceedings of the 20th International Conference on Network-Based Information Systems (NBiS-2017), held on August 24-26, 2017 in Toronto, Canada.

Today's networks and information systems are evolving rapidly. Further, there are dynamic new trends and applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These networks are expected to manage the increasing number of users, provide support for a range of services, guarantee the quality of service (QoS), and optimize their network resources. In turn, these demands are the source of various research issues and challenges that have to be overcome - and which these Proceeding address. 

Welcome Message From NBiS Steering Committee Co-chairs 6
NBiS Steering Committee Co-chairs 7
Welcome Message From NBIS-2017 General Co-chairs 8
NBiS-2017 General Co-chairs 9
Welcome Message from NBiS-2017 Program Committee Co-chairs 10
NBiS-2017 Program Committee Co-chairs 11
Welcome Message from NBiS-2017 Workshops Co-chairs 12
NBiS-2017 Workshops Co-chairs 13
NBiS-2017 Organizing Committee 14
Honorary Chair 14
General Co-chairs 14
Program Committee Co-chairs 14
Workshop Co-chairs 14
Award Co-chairs 14
Publicity Co-chairs 14
International Liaison Co-chairs 14
Local Arrangement Co-chairs 15
Finance Chair 15
Web Administrator Chairs 15
Steering Committee 15
Track Areas and PC Members 15
Track 1: Mobile and Wireless Networks 15
Track Co-chairs 15
PC Members 16
Track 2: Internet of Things and Big Data 16
Track Co-chairs 16
PC Members 16
Track 3: Cloud, Grid and P2P Computing 17
Track Co-chairs 17
PC Members 17
Track 4: Multimedia, Web and Internet Applications 18
Track Co-chairs 18
PC Members 18
Track 5: Ubiquitous and Pervasive Computing 18
Track Co-chairs 18
PC Members 18
Track 6: Network Security and Privacy 19
Track Co-chairs 19
PC Members 19
Track 7: Database, Data Mining, and Semantic Computing 19
Track Co-chairs 19
PC Members 20
Track 8: Network Protocols and Applications 20
Track Co-chairs 20
PC Members 20
Track 9: Intelligent Computing and Networking 21
Track Co-chairs 21
PC Members 21
Track 10: Parallel and Distributed Computing 22
Track Co-chairs 22
PC Members 22
Track 11: Cognitive Computing – Theory and Applications 22
Track Co-chairs 22
PC Members 22
NBiS-2017 Reviewers 23
Welcome Message from INVITE-2017 Workshop Organizers 24
INVITE-2017 Workshop Organizers 24
INVITE-2017 Organizing Committee 25
Workshop Co-chairs 25
Program Committee Members 25
Welcome Message from ADPNA-2017 Workshop Co-chairs 26
ADPNA-2017 Workshop Organizers 27
ADPNA-2017 Workshop Chair 27
ADPNA-2017 Organizing Committee 27
Workshop Organizers 27
Workshop Chair 27
Program Committee 27
Welcome Message from HETNET-2017 Workshop Organizers 28
HETNET-2017 Workshop Chair 29
HETNET-2017 Workshop PC Chair 29
HETNET-2017 Organizing Committee 29
Workshop Chair 29
Workshop PC Chair 29
Program Committee Members 29
Welcome Message from ISSE-2017 Workshop Co-chairs 30
ISSE-2017 Workshop Co-chairs 30
ISSE-2017 Organizing Committee 31
Workshop Co-chairs 31
Program Committee Co-chairs 31
Program Committee Members 31
Welcome Message from TwCSec-2017 Workshop Co-chairs 32
TwCSec-2017 Workshop Co-chairs 33
TwCSec-2017 Organizing Committee 33
Workshop Co-chair 33
Advisory Co-chairs 33
Program Committee Members 33
Welcome Message from INWC-2017 Workshop Organizers 35
INWC-2017 Workshop Co-chairs 36
INWC-2017 Workshop PC Chair 36
INWC-2017 Organizing Committee 36
Workshop Co-chairs 36
Workshop PC Co-chair 36
Program Committee Members 36
Welcome Message from DEMoC-2017 Workshop Chair 37
DEMoC-2017 Workshop Chair 37
DEMoC-2017 Organizing Committee 37
Workshop Organizer 37
Program Committee 38
Welcome Message from WSSM-2017 Workshop Co-chairs 39
WSSM-2017 Workshop Co-chairs 40
WSSM-2017 Organizing Committee 40
Workshop Co-chairs 40
Program Chair 40
Program Committee Members 40
NBiS-2017 Keynote Talks 41
Network and Information Systems Need to Embed Privacy and Security, by Design 42
Cooperative Self-driving Vehicles 43
Contents 44
The 20 International Conference on Network-Based Information Systems (NBiS-2017) 55
Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Constriction and Linearly Decreasing Inertia Weight Methods 56
1 Introduction 56
2 Node Placement Problem in WMNs 58
3 Proposed and Implemented Simulation System 58
3.1 PSO Algorithm 58
3.2 Simulated Annealing 60
4 Simulation Results 62
5 Conclusions 64
References 64
A Fuzzy-Based Approach for Improving Team Collaboration in MobilePeerDroid Mobile System: Effects of Time Delay on Collaboration Work 67
1 Introduction 67
2 Scenarios of Collaborative Teamwork 69
2.1 Collaborative Teamwork and Virtual Campuses 69
2.2 Mobile Ad Hoc Networks (MANETs) 70
3 Vote Weights 70
3.1 Votes with Embedded Weight 70
3.2 Voting Score 71
4 Application of Fuzzy Logic for Control 71
4.1 FC 71
4.2 Linguistic Variables 72
4.3 FC Rules 72
4.4 Control Knowledge Base 72
4.5 Defuzzification Methods 73
5 Proposed Fuzzy-Based Peer Voting Score System 73
6 Simulation Results 77
7 Conclusions and Future Work 77
References 78
A Comparison Study of WLAN and WLAN Triage Systems Considering Throughput Parameter 80
1 Introduction 80
2 IEEE 802.11 81
2.1 EDCF 83
2.2 HCCA 84
3 Application of Fuzzy Logic for Control 84
3.1 FC 84
3.2 Linguistic Variables 84
3.3 FC Rules 85
3.4 Control Knowledge Base 85
3.5 Defuzzification Methods 87
4 Implemented Testbed 87
5 Experimental Results 90
6 Conclusions 91
References 92
An Eco Algorithm for Dynamic Migration of Virtual Machines in a Server Cluster 95
1 Introduction 95
2 System Model 96
2.1 Virtual Machines 96
2.2 MLPCM and MLC Models 97
3 A Dynamic Algorithm to Migrate Virtual Machines 98
3.1 Estimation of Process Termination Time 98
3.2 Virtual Machine Selection 98
3.3 Virtual Machine Migration 99
4 Evaluation 100
5 Concluding Remarks 105
References 105
A Simple Energy-Aware Virtual Machine Migration Algorithm in a Server Cluster 108
1 Introduction 108
2 System Model 109
2.1 Virtual Machines 109
2.2 MLPCM Model 109
2.3 MLCM Model 110
3 Energy-Efficient Migration of Virtual Machines 111
3.1 Estimation Model 111
3.2 VM Selection (VMS) Algorithm 112
3.3 VM Migration (VMM) Algorithm 113
4 Evaluation 114
5 Concluding Remarks 117
References 117
Evaluation of Flexible Synchronization Protocol to Prevent Illegal Information Flow in P2PPS Systems 119
1 Introduction 119
2 Information Flow in TBAC Model 121
2.1 TBAC Model 121
2.2 Information Flow Relations 121
3 Synchronization Protocols 123
3.1 Protocols for Hidden Topics 123
3.2 Flexible Synchronization (FS) Protocol for Forgotten Topics 124
4 Evaluation 125
5 Concluding Remarks 129
References 129
Energy-Efficient Role Ordering Scheduler 131
1 Introduction 131
2 System Model 132
2.1 Object-Based Systems with RBAC Model 132
2.2 Significancy of Methods 132
2.3 Significancy of Roles 133
2.4 Significancy of Transactions 134
2.5 Role-Based Serial (RS) Partitions 135
2.6 Meaningless Methods 135
2.7 Power Consumption Model of a Server 136
3 Energy-Efficient Role Ordering Scheduler 137
4 Evaluation 140
4.1 Environment 140
4.2 Average Total Electric Energy Consumption 140
4.3 Average Execution Time of Each Transaction 141
5 Concluding Remarks 142
References 142
A GA-Based Simulation System for WMNs: A Comparison Study for Different WMN Architectures Considering Exponential and Weibull Distributions, HWMP and TCP Protocols 144
1 Introduction 144
2 Architectures of WMNs 145
3 Overview of HWMP Routing Protocol 146
4 Simulation Description and Design 146
4.1 GUI of WMN-GA System 146
4.2 Positioning of Mesh Routers by WMN-GA System 147
4.3 Simulation Description 147
4.4 NS-3 149
5 Simulation Results 151
6 Conclusions 152
References 153
An Energy-Aware One-to-one Routing Protocol in Wireless Ad-Hoc Network 155
1 Introduction 155
2 System Model 156
3 EAO Protocol 157
3.1 Forwarding Phase 157
3.2 Backtracking Phase 159
4 Evaluation 162
5 Concluding Remarks 165
References 165
Effect of Packet Error Rate on Selection of Actor Nodes in WSANs: A Comparison Study of Two Fuzzy-Based Systems 167
1 Introduction 167
2 WSAN 168
2.1 WSAN Challenges 168
2.2 WSAN Architecture 169
3 Proposed System Model 170
3.1 Problem Description 170
3.2 System Parameters 170
3.3 Fuzzy Implementation 171
3.4 Description of FBS1 and FBS2 172
4 Simulation Results 174
5 Conclusions and Future Work 177
References 177
Delay Tolerant Networking with Antenna Directional Controls with the Weight Function for the Multiple Vehicular Communication 180
Abstract 180
1 Introduction 180
2 Related Works 181
3 The DTN with the AAA System 182
4 The Prototype System 184
5 Experiments 185
6 The Conclusion and Future Study 187
References 187
A Localization Free Variable Transmit Power Routing Protocol for Underwater Wireless Sensor Networks 189
1 Introduction 189
2 Related Work 191
3 Channel Model 192
3.1 Channel Noise 192
3.2 Attenuation 192
4 Proposed Scheme 193
4.1 Network Model 193
4.2 Protocol Operation 193
4.3 Transmit Power Calculation 195
5 Simulation Results 195
6 Conclusions 198
References 199
Security of Visual Captcha for Authentication Procedures 201
Abstract 201
1 Introduction 201
2 Authentication Procedures in Cloud Service Management 202
3 Remarks on Security of Visual Captcha 203
4 Conclusions 204
Acknowledgments 204
References 204
Mobility Information Infrastructure in Challenged Network Environment Based on IoT Technology 206
Abstract 206
1 Introduction 206
2 System Configuration 207
3 Expected Applications and Implementation 209
4 Expected Applications and Implementation 210
4.1 Realtime Road Surface Data Exchange System 210
4.2 Dig Data Road Condition Sharing System 211
4.3 Tourist and Disaster Information System 212
5 Prototype System and Performance Evaluation 212
6 Conclusions and Remarks 216
Acknowledgement 216
References 216
Energy Management in Residential Area using Genetic and Strawberry Algorithm 218
1 Introduction 218
2 Related Work 219
3 Problem Statement 221
4 Proposed Model 221
4.1 Load Classification 221
4.2 Energy Pricing Signal 223
4.3 Residential Users 223
4.4 Algorithms 223
5 Simulation and Results 224
6 Conclusion 227
References 228
Biogeography Based Optimization for Home Energy Management in Smart Grid 230
1 Introduction 230
2 Related Work 232
3 Problem Statement 234
4 System Model 234
4.1 Electrical Appliances 235
4.2 Pricing Signal 236
4.3 Objective Function 236
4.4 Heuristic Algorithm 236
5 Simulation 239
6 Conclusion 242
References 242
Demand Side Management Using Strawberry Algorithm and Bacterial Foraging Optimization Algorithm in Smart Grid 244
1 Introduction 244
2 Related Work 245
3 Motivation 248
4 Proposed System Model 248
4.1 Appliances Classification 249
4.2 Strawberry Algorithm 250
4.3 Bacterial Foraging Optimization 251
5 Simulations and Results 251
6 Conclusion 254
References 254
Demand Side Management Using Meta-Heuristic Techniques and ToU in Smart Grid 256
1 Introduction 256
2 Related Work 257
3 System Model 259
4 Meta-Heuristic Techniques 261
4.1 EDE 261
4.2 HSA 262
4.3 BFA 262
4.4 GA 263
5 Simulation Results and Discussions 263
6 Conclusion 268
References 269
Home Energy Management Based on Harmony Search Algorithm and Crow Search Algorithm 271
1 Introduction 271
2 Related Work 273
3 Problem Statement 274
4 Proposed System 275
4.1 HSA 276
4.2 CSA 277
5 Simulation and Results 279
6 Conclusion and Future Work 282
References 282
Meta-Heuristic and Nature Inspired Approaches for Home Energy Management 284
1 Introduction 284
2 Related Work 286
2.1 ILP 286
2.2 Heuristic Approach 286
2.3 DP Approach 287
2.4 Hybrid Approach 288
3 Proposed Work 289
3.1 HSA 289
3.2 FA 291
3.3 EDE 291
4 Simulation and Results 293
5 Conclusion 296
References 296
Home Energy Management Using Social Spider and Bacterial Foraging Algorithm 298
1 Introduction 298
2 Related Work 300
3 Problem Statement 302
4 Proposed Scheme 303
4.1 SSO Technique 305
4.2 BFA Optimization Algorithm 305
5 Simulations and Discussions 306
6 Conclusion 308
References 309
Home Energy Management Using HSA, FA, BFOA Algorithms in Smart Grids 310
1 Introduction 310
2 Related Work 312
2.1 Heuristic Algorithm 312
2.2 Dynamic Programming 312
2.3 Hybrid Approach 313
3 Proposed System Model 313
3.1 Optimization Schemes 314
3.2 Harmony Search Algorithm 314
3.3 Firefly Algorithm 315
3.4 Bacterial Foraging Optimization Algorithm 315
4 Simulations and Results Evaluation 316
4.1 Load Classification 316
4.2 Pricing Model 317
5 Conclusion 321
References 321
Comparison of BFA and EWA in Home Energy Management System Using RTP 323
1 Introduction 323
2 Related Work 325
3 Proposed Techniques 328
3.1 Load Categorization 328
3.2 Algorithms 329
4 Simulation and Results 331
5 Conclusion 334
References 334
Data Collecting System Based on CCN with Congestion Avoidance Routing on WSN 336
1 Introduction 336
2 Related Works 337
2.1 Basic Procedure of NDN 337
2.2 Apply the Technology of NDN to WSN 338
3 Adaptive Relay Node Selection Method on WSN 339
3.1 DCF (Dynamic Change Forwarding) Selecting the Next Relay Node According to the Next Node 339
3.2 DCF with Path Level Investigation 339
4 Performance Evaluations 340
4.1 Effects of Length of Forwarding Path 341
5 Conclusion 346
References 346
A Method for Vehicle Control at T-Junctions for the Diffusion Period of Autonomous Vehicles 348
1 Introduction 348
2 Related Works 349
3 A Basic Experiment 349
3.1 Road Model 349
3.2 Vehicle Model 349
3.3 Result and Discussion 351
3.4 Requirements of Autonomous Vehicles in the Diffusion Period 353
4 Improved Vehicle Model 353
5 Proposed Method 355
6 Evaluation 356
6.1 Result of Proposed Method 356
6.2 Discussion 357
7 Conclusion 357
References 358
Mechanism for Adopting Device-to-Device Communication in Cellular Networks 359
1 Introduction 359
2 Related Work 360
3 System Model 361
3.1 Data Transmission Rate 361
3.2 Reward from BS 363
3.3 Implementation of D2D Communication Establishment 364
4 Simulation Results and Analysis 364
5 Conclusions 368
References 369
Optimal Transmission Range in Sleeping Wireless Networks 370
Abstract 370
1 Introduction 370
2 Related Work 371
3 Background 371
3.1 Routing Based on Forwarding Sets 372
3.2 Random Wakeup 372
4 Analytical Model 372
4.1 Average Path Length 372
4.2 Average Packets in the Network 373
4.3 Backoff Characterization 374
4.4 Sleep Delay Characterization 374
4.5 Queuing Delay 375
4.6 Total Service Time 375
4.7 Optimal Range 376
5 Model Validation 376
5.1 Analytical Evaluation 376
5.2 Simulation Results 378
6 Conclusion 379
References 379
Load Balancing in Wireless Mesh Networks Based on OpenFlow 381
Abstract 381
1 Introduction 381
2 Existing Protocols 382
2.1 Wireless Mesh Networks 382
2.2 OpenFlow 383
2.3 Distributed Routing Algorithm 384
2.4 OpenFlow-Based Load Balancing 384
3 Proposed Load-Balancing Method 385
3.1 Architecture of OpenFlow-Based Load Balancing 385
3.2 Load-Aware DSR 385
3.3 Route Reconstruction Function Based on OpenFlow 386
4 Performance Evaluation 386
4.1 Evaluation Condition 386
4.2 Evaluation Results 387
5 Conclusions 390
Acknowledgments 390
References 390
Directional Preference Collector Tree Protocol for Mobile Wireless Sensing 392
Abstract 392
1 Introduction 392
2 Related Work 394
3 Directional Preference CTP (DP-CTP) 395
3.1 The DP-CTP ETX Value 396
3.2 The Relative Motion Trickle Algorithm 396
4 CTP Vs DP-CTP 397
5 Conclusion 401
References 402
Beyond Beacons – An Interactive Positioning and Tracking System Solely Based on BLE Mesh Network 404
Abstract 404
1 Introduction 404
2 Related Work 405
3 System Design 406
3.1 System Architecture 406
3.2 Principle of Operation 407
3.3 System Design 408
4 Implementation and Preliminary Results 410
4.1 Experiment 1 411
4.2 Experiment 2 413
5 Conclusions and Future Work 414
References 415
Development of a Monitoring System Based on Power Consumption 416
1 Introduction 416
2 Developed System 417
2.1 Analysis of the Mean Power Consumption 418
2.2 Selection of Sensor Devices 419
2.3 Proposed Algorithm 421
3 Results and Discussion 422
4 Conclusion 424
References 424
A Study of Detecting Child Pornography on Smart Phone 426
Abstract 426
1 Introduction 426
2 Literature Review 428
3 The Conceptual Model 429
3.1 An Illustrative Experiment with WhatsApp 432
3.2 Penetration Test in Android’s Security 433
4 Conclusion and Future Work 434
Acknowledgement 434
References 435
Computational Public Safety: The Evolution to Public Safety Research 438
Abstract 438
1 Introduction 438
2 Our Works: Public Safety and USAR 439
3 Proposal: Computational Public Safety 439
4 Selected Examples of CPS 440
4.1 Smart City 440
4.2 Smart Grid 440
4.3 Transportation Network 441
5 Internet of Things 441
6 Data Mining and Predictive Algorithms in Public Safety Domain 442
7 Discussion and Conclusion 444
References 445
Load Experiments of the vDACS Scheme in Case of the 600 Connectionsby 300 Clients 448
Abstract 448
1 Introduction 448
2 Motivation and Related Research 450
3 Existing DACS Scheme and WDACS System 452
3.1 Basic Principle of the DACS Scheme 452
3.2 Application to Cloud Environment 454
4 Cloud Type Virtual PBNM for the Common Use Between Plural Organizations 455
4.1 Concept of the Cloud Type Virtual PBNM for the Common Use Between Plural Organizations 455
4.2 Implementation of the Basic Function in the Cloud Type Virtual PBNM for the Common Usage Between Plural Organizations 455
4.3 Results of the Functional Evaluation 456
5 Load Experiment Results 457
5.1 Load Experiment Results to Confirm the Function of the Software for Realization of the Cloud Type Virtual PBNM for the Common Use Between Plural Organizations 457
5.2 Load Experiment Results for Applications to the Small and Medium Size Scale Organization 457
6 Conclusion 459
Acknowledgments 459
References 459
QoS Aware Virtual Network Embedding in SDN-Based Metro Optical Network 461
1 Introduction 461
2 Related Work 463
3 Resource Allocation Framework for SDN-enabled MON 463
3.1 Overview of the Model 463
3.2 CG-ILP Based Formulation for VN Request Mapping on MEC-DC and WDM Network 465
4 Performance Evaluation 468
4.1 Simulation Setup 468
4.2 Evaluation Metrics 468
4.3 Performance Measurement 468
5 Conclusion 471
References 472
Verification of Data Collection Methods for Live Migration Protection Mechanism 473
1 Introduction 473
1.1 Background 473
1.2 Issues on iKaaS Platform 474
1.3 Our Contribution 474
2 iKaaS Platform 475
3 State-of-the-Art Technologies 476
4 Live Migration Process with Data Protection Mechanism 476
5 Implementation 478
5.1 Request Based Method 480
5.2 Regular Interval Method 481
6 Conclusion 482
References 483
Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders 484
1 Introduction 484
2 Related Work 485
3 Developed System 486
3.1 Methodology 486
3.2 System Features and Overview 487
3.3 System Design 487
3.4 New Functions 487
4 Evaluation of System Effectiveness 489
4.1 Experiment on Farmer's Time to Access Market Information 489
4.2 Experiment on Farmer's Income 491
4.3 Experiment on System Usability 491
4.4 Comparing System Effectiveness with Related Work 493
5 Discussion 493
5.1 Instant Access to Market Information 493
5.2 Improved Incomes to Farmers 493
5.3 Impact of SMS, WEB and SWAHILI Language to System Usability 494
6 Conclusion 494
References 494
Performance Evaluation of a Learning Logger System for Active Learning Using Smartphone 496
Abstract 496
1 Introduction 496
2 ALS: Active Learning System 497
3 Flow of Interactive Lecture 499
4 Interface for Interactive Lecture 501
5 Performance Evaluation of AVS 502
6 Conclusions 503
References 504
Validation of 3D Convolutional Neural Networks for Customer Satisfaction Estimation Using Videos 506
1 Introduction 506
2 Perception Correction Hypotheses 507
3 Preliminary Experiment 508
3.1 Experimental Procedure 508
3.2 Experimental Result 509
4 Estimation Expectation and Satisfaction 510
4.1 3D-CNN 510
4.2 Data Preparation 511
4.3 Experiments 512
5 Discussion and Future Work 514
6 Conclusion 514
References 514
Hybrid Learning Using Profit Sharing and Genetic Algorithm for Partially Observable Markov Decision Processes 516
1 Introduction 516
2 POMDPs 517
3 Hybrid Learning Using PS and GA 518
3.1 Profit Sharing 519
3.2 Crossover 520
3.3 Fitness Calculation 521
3.4 Mutation 522
4 Related Research 522
5 Performance Experiment Under POMDP 523
6 Adaptability Experiment for Environmental Changes 524
7 Conclusion 527
References 527
Resource Propagation Algorithm to Reinforce Knowledge Base in Linked Data 529
Abstract 529
1 Introduction 529
2 Link Prediction 530
3 Resource Propagation Algorithm 531
3.1 Loading Turtle Data 531
3.2 Conversion from Turtle Data to Graph Data Considering Predicates 531
3.3 Link Prediction Considering Semantic Distance 531
3.4 Reconstruction of Turtle Data Using the Link Predicted Values 532
4 Experiments 532
5 Conclusions 536
Acknowledgement 536
References 536
Metadata Complement Method by Linked Open Data for Literature Search 537
Abstract 537
1 Introduction 537
2 I-Scover System Outline 538
3 Literature Search Support System 539
3.1 Keyword Ranking Analysis 540
3.2 Co-occurring Words Analysis 540
3.3 Keywords Estimation 541
4 Evaluation 544
5 Conclusions 544
Acknowledgments 544
References 544
Neuro-Evolutionary Approach to Multi-objective Optimization in One-Player Mahjong 545
1 Introduction 545
2 One-Player Mahjong 546
2.1 Terminology 547
2.2 Related Works 548
2.3 Multiobjective Optimization 549
3 Modular Multi-objective Neuro-Evolution of Augmenting Topologies (MM-NEAT) 549
3.1 Modular Network 549
3.2 Module Mutation 549
4 Experiment 551
4.1 Experimental Setup 551
4.2 Result 552
5 Conclusion 555
References 555
Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting? 557
Abstract 557
1 Introduction 557
2 Related Work on Browser Fingerprinting 558
3 De-Anonymizing Attacks 559
3.1 Related Attacks Against Tor Browser 559
3.2 Current Anti-fingerprinting 560
4 Tor Fingerprinting 562
4.1 HTTP Header 562
4.2 Content Window Size 562
4.3 Font List 562
4.4 SSE2 Test 563
4.5 Estimated Number of Cores 563
4.6 Refresh Rate 563
4.7 Web Storage 564
5 Experiments 564
5.1 Collected Samples 564
5.2 Observed Results 564
5.3 Tracking with Tor Fingerprinting 565
6 Considerations 566
6.1 Amount of Samples 566
6.2 Tracking with Tor Fingerprinting 566
7 Conclusions 568
Acknowledgments 568
References 568
Study on Persuasion Effect of Computer VirusMeasures Based on Collective ProtectionMotivation Theory 571
Abstract 571
1 Introduction 571
2 Related Research Work 572
3 Threat Appeals Model for Information Security 572
3.1 Collective Protection Motivation Theory 572
3.2 Threat Appeals Model 573
4 Investigation of Protection Motivation 573
4.1 Questionnaire Survey 573
4.2 Targets 574
4.3 Analytical Method 575
4.4 Analytical Results 575
5 Discussion 578
6 Conclusions 579
Acknowledgements 580
Appendix: Decision of Latent Variables for Measurement Behavior Intention Model 580
References 580
Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices 582
1 Introduction 582
2 Related Work 583
2.1 Biometrics Authentication 583
2.2 Authentication Method Resistant to Shoulder-Surfing Attacks 584
3 Conventional RA Method 584
4 Improved RA Method 586
4.1 RandomForest 586
4.2 Procedure of Our Improved RA Method 586
5 Performance Evaluation 587
5.1 Experimental Environment 587
5.2 Feature Importance 588
6 Conclusion 589
References 590
Slyware Prevention: Threat of Websites Inducing Accidental Taps and Countermeasures 592
Abstract 592
1 Introduction 592
2 Slyware 593
2.1 Mistap-Slyware 593
2.2 Dishonest/Illegal Acts Using Mistaps 594
3 Related Work 595
3.1 Approach for Suppressing the Occurrence of Mistaps 595
3.2 Approach for Suppressing the Occurrence of Mistransitions 595
4 Countermeasure Against Mistap-Slyware 596
4.1 Concept 596
4.2 Proposed Method 597
5 Basic Experiment 597
5.1 Purpose 597
5.2 Experimental Web Pages 598
5.3 Experimental Settings 600
5.4 Method Settings 600
5.5 Evaluation Items 601
6 Experimental Results 603
6.1 Safety Evaluation 603
6.2 Usability Evaluation 603
6.3 Interview Results 604
7 Conclusion 604
References 605
An Efficient Privacy-Preserving Comparison Protocol 606
1 Introduction 606
1.1 Prior Works 607
1.2 Background and Our Contribution 608
2 Secure Comparison Protocol 608
2.1 The DGK Protocol 608
2.2 Our Protocol Using Asymmetric SwHE 609
3 Packing Method for Secure Comparison Protocol 611
4 Secure Integers Comparison Computation 613
5 Performance Evaluation 614
5.1 Preliminaries 614
5.2 Experimental Setup 615
5.3 Experimental Results 615
6 Conclusions 616
References 617
A k-nearest Neighbour Query Processing Strategy Using the mqr-tree 619
1 Introduction 619
2 Related Work and Background 620
2.1 k-nearest Neighbour Strategies 620
2.2 mqr-tree 621
3 An mqr-tree-Based k-Nearest Neighbour Strategy 622
4 Evaluation 624
4.1 Methodology 624
4.2 Results 626
4.3 Discussion 629
5 Conclusion 630
References 630
Dynamic Resource Adaptation Method by Cooperative User Devices in Wireless Network 631
Abstract 631
1 Introduction 631
2 System Overview 633
3 Cooperative Device Selection Algorithm 635
4 Prototype System 636
5 Performance Evaluation 637
6 Conclusion 639
References 640
A Method for Improving Cache Hit Ratio by Virtual Capacity Multiplication 641
1 Introduction 641
2 Procedure of NDN 642
2.1 Construction of CR on NDN 643
2.2 Basic Procedure of NDN 643
3 Contents Caching and Its Problem by LRU on NDN 644
4 Virtual Capacity Multiplication 644
4.1 Overview of VCM 645
5 Perfromance Evaluation 647
5.1 Evaluation Environment 647
5.2 Characteristics of Cache Hit Ratio--Interest Generation Rate 649
5.3 Performance Evaluation Under Varying Number of CRs 650
5.4 Performance Evaluation Under Varying both Number of CRs and Capacity of Each CR 651
6 Conclusion 651
References 651
LEAS: A Load-Aware Energy-Efficient Adaptive Scheduling for Heterogeneous Wireless Sensor Networks 653
Abstract 653
1 Introduction 653
2 Related Work 654
3 Load-Aware Energy-Efficient Adaptive Scheduling 655
3.1 Random Wakeup 656
3.2 Adaptation to Network Conditions 657
3.2.1 Residual Energy Levels 657
3.2.2 Network Load 658
4 Performance Evaluation 659
4.1 Effect of Threshold 659
4.2 Adaptation to Heterogeneous Energy Levels 661
4.3 Adaptation to Load 662
5 Conclusion 663
References 663
GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks 664
1 Introduction 664
2 Proposed Protocol for OppNets 666
2.1 Dynamic Context Management 667
2.2 GD-CAR Protocol 667
3 Simulation Setup and Results 670
3.1 Simulation Setup 670
3.2 Simulation Results 671
4 Conclusion and Future Work 674
References 674
The 12 International Workshop on Network-based Virtual Reality and Tele-existence (INVITE-2017) 676
Implementation of a Community-Based Disaster Prevention Information System 677
Abstract 677
1 Introduction 677
2 Purpose of Research 678
3 Disaster Information Input System 678
4 Disaster Information Output System 680
5 Disaster Information Notification System 683
6 Evaluation 684
7 Conclusion 686
Acknowledgments 686
References 686
An Automatic Image Registration Method Using Downhill Simplex Method and Its Applications 687
Abstract 687
1 Introduction 687
2 Previous Works 688
3 An Image Registration Using Downhill Simplex Method 689
3.1 Initial Position Calculation 689
3.2 An Evaluation Method for Mutual Information with a Limited Range 690
3.3 MI Computation and Convergence Condition 690
4 Experimental Results 693
5 Conclusion 694
Acknowledgments 694
References 695
Multilingual Information Service Based on Combination of Smartphone and Digital Signage 696
Abstract 696
1 Introduction 696
2 Required Function in Multilingual Information Service 697
2.1 Multilingual Push Message on Smartphone 697
2.2 Web Information in Native Language 698
2.3 Multilingual Digital Signage 698
3 System Construction 699
3.1 Multilingual Push Notification Subsystem 700
3.2 Multilingual Web Information Access Subsystem 700
3.3 Multilingual Digital Signage Subsystem 701
4 Evaluation Experiment 702
5 Conclusions 704
Acknowledgement 705
References 705
Ultra Definition Display Environment for Disaster Management GIS 706
Abstract 706
1 Introduction 706
2 Related Works 707
3 Design of LIVEWall System 707
3.1 System Overview 707
3.2 Disaster State Information 709
3.3 Workspaces 709
3.4 Network Consideration for Disaster 710
4 Interface Design and Implementation of Components 711
4.1 State Report Device 711
4.2 Workspace Controller 712
4.3 Presentation Host and TDW 713
4.4 LIVEWall Manager 713
5 Conclusions 714
Acknowledgement 715
References 715
A Study on the Operation of Infrastructure Management System with Citizens’ Participation Using the ICT Technology 716
Abstract 716
1 Introduction 716
2 Development of the System to Gathering Infrastructure Defect Information from Citizens 717
3 Social Experiment of Infrastructure Management System with Citizens’ Participation 718
3.1 Outline of Social Experiment 718
3.2 Awareness Survey of Municipal Employees on System Deployment 719
3.3 Questionnaire Survey for Citizen and Municipal Employees Participating in the Social Experiment 720
3.4 Content and Aggregation of Posted Data 722
4 Conclusion 724
References 725
Development and Evaluation of Operation Interface for Lesson Using Large-Scale Screen in Elementary and Secondary Education 726
1 Introduction 726
2 Related Work 727
3 Proposal and Implementation of Operation Interface 728
3.1 Requirements for Operation Interface 728
3.2 Implementation of Interface for Screen Operation 728
4 Evaluation 730
5 Conclusion and Future Work 731
References 732
Implementation of Multimedia Contents for Supporting Different Types of Self-learning 733
Abstract 733
1 Introduction 733
2 Educational Multimedia Contents 734
3 Construction Flow for Educational Multimedia Contents 735
4 Implementation 737
5 Conclusions 740
References 740
Development of Integrated Visual Analytic Tool with 3D Visualization 742
Abstract 742
1 Introduction 742
2 System Overview 743
3 Implementation of the First Prototype 743
3.1 Multivariate Color-Map for Data Extraction 743
3.2 Free Hand Color-Map Setting 744
3.3 Filtering with Parallel Coordinates Plot 745
3.4 Remote Visualization with WebGL 745
4 Potential Customer’s Survey 747
5 Conclusion 747
Acknowledgments 748
References 748
The 11 International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2017) 749
Hybrid Replication Schemes of Processes in Energy-Efficient Server Clusters 750
1 Introduction 750
2 System Model 751
3 Type of Replicas 753
3.1 Components of a Replica 753
3.2 Dependency of Components 753
4 Electric Energy Consumption 755
5 Hybrid Replication 756
6 Evaluation 758
7 Concluding Remarks 761
References 761
Gossip-Style Message Dissemination Based on Biconnected Components 762
1 Introduction 762
2 Related Work 763
3 System Model 764
4 Gossip-Style Message Dissemination Protocol Based on Biconnected Components 764
4.1 Matrix for Biconnected Components 765
4.2 The Protocol for Message Dissemination 765
5 Performance Evaluation 766
5.1 Environment and Parameters 766
5.2 Performance Metrics 767
6 Simulation Result 768
7 Conclusion 768
References 768
Energy Efficient Raft Consensus Algorithm 770
1 Introduction 770
1.1 Contribution 770
2 Related Work 771
3 System Model and Problem Statement 771
4 Raft Consensus Algorithm 772
4.1 Roles of Nodes 772
4.2 Leader Election 772
4.3 Log Replication 773
5 Energy Efficient Raft Consensus Algorithm 774
5.1 Suspended Nodes 774
5.2 Resume Messages 774
6 Performance Evaluation 775
6.1 Environment, Parameters and Performance Criterion 775
6.2 On the Number of Messages with the Suspended Rate 776
6.3 The Impact of Failures on the Number of Messages 776
7 Conclusion 777
References 777
Scalable Distributed Data Analysis on Structured P2P Network 779
1 Introduction 779
2 Distributed Data Aggregation on Structured P2P Network 780
3 Distributed Data Analysis on Structured P2P Network 783
4 Simulation Results 784
5 Conclusion 786
References 787
Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era 788
Abstract 788
1 Introduction 788
2 Examples and Issues of Big Data Utilization 789
2.1 Practical Use Cases and Issues of Big Data Utilization 789
2.2 Definition of Information Literacy Beginner 791
2.3 Related Work 791
3 Risk Assessment: Qualitative Evaluation of Privacy Protection of Information Literacy Beginners in Big Data Utilization 792
3.1 Extraction of Risk Factors 792
3.2 Derivation of Proposed Measures by Risk Matrix Method 792
4 Risk Assessment: Quantitative Evaluation of Privacy Protection of Information Literacy Beginnersin Big Data Use 794
4.1 Risk Formula 795
4.1.1 Approximation of Asset Value 795
4.1.2 Approximation of Threat Value 795
4.1.3 Approximation of Value of Vulnerability 796
4.2 Calculation of Risk Value 796
4.3 Discussion 797
5 Conclusion 798
Acknowledgments 798
References 798
Performance Evaluation of Peer--to--Peer Network Applications on Multiple Overlay Networks 801
1 Introduction 801
2 Construction of Logical Networks 801
2.1 Node Coordination System 801
2.2 Provision of Network Information by ISP 802
3 Basic Concept of Proposed System 802
3.1 System Architecture 802
3.2 Prototype of Proposed System 803
4 Performance Evaluation 804
4.1 Simulation Conditons 804
4.2 Simulation Results 805
5 Summary 807
References 807
The 8 International Workshop on Heterogeneous Networking Environments and Technologies (HETNET-2017) 808
Residential Area Power Management Using Genetic Algorithm and Biogeography Based Optimization in Smart Grid 809
1 Introduction 809
2 Related Work 810
3 Problem Statement 812
4 System Model 812
4.1 GA 813
4.2 BBO 813
4.3 Categorization of Appliances 814
5 Simulations and Discussions 815
6 Conclusion 818
References 818
A Social Spider Optimization Based Home Energy Management System 820
1 Introduction 820
2 Related Work 822
3 System Model 823
3.1 Social Spider Optimization Algorithm 825
3.2 BFA Optimization Technique 826
4 Problem Statement 826
5 Simulations and Discussions 826
6 Conclusion 828
References 828
Collecting Data in Sensor Networks Using Homesick Lévy Walk 829
1 Introduction 829
2 Related Work 830
3 System Model 830
4 Homesick Lévy Walk on Grid Graphs 831
5 Performance Analysis 832
5.1 Environment and Parameters 832
5.2 Performance Metrics 832
5.3 Simulation Result 833
6 Conclusion 835
References 835
Privacy Preservation for Trajectory Data Publishing and Heuristic Approach 837
1 Introduction 837
2 Problem Definition 840
3 Algorithm 841
4 Experimental Evaluation 842
4.1 Effectiveness 843
4.2 Efficiency 845
5 Conclusion 846
References 846
The 8 International Workshop on Intelligent Sensors and Smart Environments (ISSE-2017) 848
A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Network 849
Abstract 849
1 Introduction 849
2 The Related Work 850
3 Chinese Reminder Theorem 851
4 Proposed Approach 853
5 Performance Evaluation 855
6 Conclusion 858
References 858
3D Model Generation of Black Cattle Using Multiple RGB Cameras for Their BCS 860
Abstract 860
1 Introduction 860
2 Related Work 861
3 System Overview 862
4 3D Model Generation of Eight RGB Cameras System by Multicolor Attributed Voxel Based Method 863
4.1 Taking Camera Calibration Images 863
4.2 Taking Camera Images of Cows 863
4.3 3D Model Data Generation of Cows 864
5 Conclusions 868
Acknowledgement 869
References 869
Load Scheduling Optimization Using Heuristic Techniques and Combined Price Signal 870
1 Introduction 870
2 Literature Review and Motivation 872
3 Proposed System 873
4 Simulation Results and Discussion 877
5 Conclusion 879
References 880
Home Energy Managment System Using Meta-heuristic Techniques 881
1 Introduction 881
2 Related Work 883
3 Problem Statement 886
4 Proposed Model 886
4.1 Optimization Techniques 888
5 Results Evaluation and Simulations 888
6 Conclusion 891
References 892
Improvement of Indoor Position Estimation of Open-Campus Event System Using BLE Beacon 893
1 Introduction 893
2 MMDAgent 894
3 Previous Research 894
3.1 Voice Dialogue Mode 894
3.2 Features of This System 895
3.3 Acquisition of Positional Information 896
3.4 Algorithm of Walking Path Estimation Using Dead Reckoning 896
3.5 Problem 896
4 Proposed Method 896
4.1 Acquisition of BLE Beacon Information 897
4.2 Management of BLE Beacon Information 897
4.3 Correction of the Current Location 897
4.4 Algorithm of Correction of Current Location 898
5 Experiment 898
5.1 Outline 898
5.2 Results 899
6 Conclusion 899
References 900
Development of Review Selection System Reflecting User Preference Using SVM 901
1 Introduction 901
2 Related Works 902
2.1 Research Investigating Classification of Review Sentences that Evoke User Interests 902
2.2 Research Investigating Discrimination of Review Sentence Usefulness 903
2.3 Position of the Present Study 903
3 Difficulties of Classifying Reviews According to User Preferences 903
3.1 F1: Mistaken User Preference Is Extracted 904
3.2 F2: Notation Variation of Words in a Review 904
3.3 F3: Losing of Co-Occurrence Relation of Feature Quantity 904
4 Design of the Proposed System 906
4.1 Solution of F1 (Mistaken User Preference Is Extracted) 906
4.2 Solution of F2 (Notation Variation of Words in Reviews) 907
4.3 Solution of F3 (Losing a Co-Occurrence Relation of Feature Quantity) 907
5 Implementation of the Proposed System 908
6 Conclusion and Future Works 909
References 909
The 8 International Workshop on Trustworthy Computing and Security (TwCSec-2017) 910
Function Secret Sharing Using Fourier Basis 911
1 Introduction 911
1.1 Our Contribution 913
2 Preliminaries 913
2.1 Definitions 913
2.2 Basis Functions 915
3 Our Proposal 916
3.1 General FSS Scheme for Succinct Functions 916
3.2 FSS Scheme for Succinct Linear Combinations of Point Functions 918
3.3 FSS Scheme for the Fourier Basis 918
3.4 FSS Scheme for Succinct Functions w.r.t. the Fourier Basis 920
4 Conclusion 920
References 921
Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership 922
1 Introduction 922
1.1 Related Works 923
1.2 Comparison with Previous Works 923
1.3 Our Contributions 924
2 Preliminaries 924
2.1 Bilinear Map 925
2.2 Assumption 925
2.3 Security Model 926
3 Construction of the Scheme 927
4 Security 929
5 Conclusion 932
References 932
A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi ... 934
Abstract 934
1 Introduction 934
2 Related Work 935
3 Proposed Method 935
4 Implementation 940
5 Evaluation 942
6 Conclusion 944
Acknowledgments 945
References 945
Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015 947
1 Introduction 947
2 Utility and Security 948
2.1 The Synthesized Micro Dataset 948
2.2 Utility and Security 948
2.3 The Existing Anonymization Methods 949
3 Re-Identification Method by Using the Euclidean Distance 950
3.1 Identify-euc 950
3.2 EUC1 and EUC2 950
4 Evaluation 952
4.1 The Anonymized Datasets of PWSCUP2015 952
4.2 The Anonymized Datasets by a Single Method 952
4.3 Expected Effects 954
4.4 The Result of Evaluation 955
4.5 Comparative EUC1 and the Existing Methods 955
4.6 Discussion 956
4.7 Evaluation the Ability of Our Method 957
5 Conclusions 958
References 958
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method 960
1 Introduction 960
2 Real-Time Burst Detection Method 961
2.1 Data Structure 962
2.2 Cell Generation 962
2.3 Burst Detection Methodology 962
3 Proposed Method 963
3.1 Addition of Continuous Attack Detection Methodology 963
3.2 Suppression of Excessive Detection Events 964
4 Evaluation Experiment 965
4.1 Computing Environment 965
4.2 Evaluation Index 965
4.3 Data 966
4.4 Evaluation of Detection Accuracy 966
4.5 Evaluation of Computational Efficiency 968
5 Conclusion 968
References 969
Efficient Secure Arithmetic on Floating Point Numbers 970
1 Introduction 970
2 Related Works 971
2.1 Secure Computation for Integer Arithmetic 971
2.2 Secure Computation for Floating Point Numbers 971
2.3 Other Secure Computation Method for Real Numbers 972
3 Decreasing Computation Time on Secure Arithmetic 972
3.1 Approaches 972
3.2 Finding Significant Factor on Computation Time 973
3.3 Implementation 973
3.4 Improvement Algorithm Implementation 977
4 Evaluation 978
4.1 Performance of Methods 978
4.2 Performance of Arithmetics 979
5 Conclusion 979
References 980
An Extension of (2, m(m+1)/2)-Threshold Secret Sharing Schemes 981
1 Introduction 981
1.1 Requirements in Use of Clouds 981
1.2 Challenges to Be Solved 983
1.3 Secret Sharing Schemes Using Exclusive-OR Operations 984
1.4 The Contrubutions of This Paper 985
2 Reconsideration of XOR-(2,n)-SSS 985
2.1 Existing Examples of XOR-(2,n)-SSS as a Starting Point 985
2.2 A New Method Proposed in WAIS2013 986
2.3 Introduction of a Concept ``isomorphism'' in XOR-(2,n)-SSS 987
2.4 Definition of 2-Propagation Bases Set and Constructions of XOR-(2,m(m+1)/2)-SSS 988
2.5 New Construction of XOR-(2,m2)-SSS 989
3 Conclusions and Future Work 991
References 991
High-Speed Forensic Technology Against Targeted Cyber Attacks (Extended Abstract) 992
1 Introduction 992
The 7 International Workshop on Information Networking and Wireless Communications (INWC-2017) 993
A Modified Energy-Aware B.A.T.M.A.N Routing Protocol 994
1 Introduction 994
2 B.A.T.M.A.N Routing Protocol 995
2.1 OGM Packet 996
2.2 Originator List (Routing Table) 996
2.3 Sequence Numbers, Ranges, and Windows 998
2.4 Broadcasting Originator Messages (OGMs) 998
2.5 Receiving Originator Messages (Neighbor Ranking) 999
3 Proposed Method 999
3.1 Energy-Aware OGM Packet 999
3.2 Energy-Aware Originator List (Routing Table) 1000
3.3 Energy-Aware Broadcasting of Originator Messages (OGMs) 1001
3.4 Energy-Aware Receiving of Originator Messages (Neighbor Ranking) 1001
4 Discussion 1001
4.1 Implementation 1001
4.2 Problems and Issues 1002
5 Future Works 1002
References 1002
BER Comparison of Constant Envelope DCT and FFT Based OFDM with Phase Modulation 1004
1 Introduction 1004
2 Baseband OFDM Signals 1005
2.1 Baseband FFT-OFDM Signal 1005
2.2 Baseband DCT-OFDM Signal 1005
3 CE-OFDM Transmitter 1006
4 BER Analysis of CE-OFDM System in AWGN 1007
4.1 Phase Demodulation 1008
4.2 OFDM Receiver 1009
4.3 The Probability of Error 1010
4.4 The Threshold Effect 1011
5 Results and Discussion 1011
6 Conclusions 1012
References 1013
Design of Microwave Circuit with Periodic Structure for Channel Switching by Carrier Frequency 1014
1 Introduction 1014
2 Measurement of Photonic Crystal Waveguide 1015
3 Measurement of T-Shaped Branching Waveguide 1016
4 Conclusion 1018
References 1018
A Message Suppression Method for Inter-Vehicle Communications 1020
1 Introduction 1020
2 Delay/Disruption Tolerant Networking 1021
3 Message Suppression Method for VANETs 1022
3.1 Overview of EMSC 1022
3.2 Message Suppression Time 1023
3.3 Scenario Settings 1024
4 Simulation Results 1025
5 Conclusions 1026
References 1026
Demand Side Management Using Strawberry and Enhanced Differential Evolution Algorithms 1028
1 Introduction 1028
2 Related Work 1030
3 Problem Statement 1031
4 Proposed System Model 1032
4.1 Optimization Algorithms 1032
5 Simulation Results and Discussion 1034
6 Conclusion and Future Work 1037
References 1038
A Heuristic Scheduling Approach for Demand Side Energy Management 1040
1 Introduction 1040
2 Related Work 1041
3 Proposed System 1042
4 Simulation Results 1045
5 Conclusion 1048
References 1048
The 6 International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2017) 1049
Generating Manzai-Scenario Using Entity Mistake 1050
1 Introduction 1050
2 Related Work 1051
3 Basic Concept 1052
3.1 What Is Manzai? 1052
3.2 Manzai-Robots 1054
4 Rival Word Extraction Method 1054
5 Introduction Part Based on Entity Mistake 1055
6 Experiments 1056
6.1 Experiment 1: Comparing Rival Extraction Method 1056
6.2 Experiment 2: Benefits of the Entity Mistake 1057
7 Conclusion 1059
References 1059
A k-anonymized Text Generation Method 1061
1 Introduction 1061
2 Related Work 1062
3 k-anonymization of Texts 1063
3.1 Generation of Anonymization Dictionary 1064
3.2 Applying Anonymization Dictionary to Text 1065
4 Case Study 1066
5 Conclusion 1068
References 1068
A System Design for Detecting Moving Objects in Capturing Video Images Using Laser Range Scanners 1070
1 Introduction 1070
2 Moving Object Positioning System 1071
2.1 System Configuration 1071
2.2 Motion Detection by Laser Range Scanner 1072
2.3 Motion Detection by Camera Image Analysis in Coordination with a Laser Range Scanner 1074
3 Preliminary Performance Evaluation of the Prototype System 1075
3.1 Fundamental Evaluation with One Camera 1076
3.2 Additional Evaluation with Two Cameras 1077
4 Conclusion 1079
References 1079
Proposition of Division-Based Broadcasting System for Delivering Multiple Videos 1080
1 Introduction 1080
2 Division-Based Broadcasting for Delivering Single Video 1081
2.1 VoD and Broadcasting 1081
2.2 Waiting Time 1081
3 Related Works 1081
3.1 Scheduling Methods in Division-Based Broadcasting 1081
3.2 Division-Based Broadcasting System 1082
4 Division-Based Broadcasting for Multiple Videos 1083
4.1 Outline 1083
4.2 Scheduling Methods for Delivering Multiple Videos 1083
4.3 Assumed Environment 1084
4.4 MV-B Method 1084
4.5 MV-R Method 1084
5 Delivery System in Division-Based Broadcasting 1085
5.1 Outline 1085
5.2 Synchronization of Timing for Delivering Segments 1085
5.3 Simultaneous Playback of Multiple Videos 1086
6 Design 1087
6.1 Synchronous Delivery for Multiple Videos 1087
6.2 Sequential Playback for Multiple Videos 1088
6.3 Data Format 1088
6.4 Assumed Environment 1089
6.5 Implementation 1089
7 Conclusion 1089
References 1090
The 6 International Workshop on Web Services and Social Media (WSSM-2017) 1091
A Block-Based Structure Editor for the English Language 1092
1 Introduction 1092
2 System Design 1093
2.1 Field for Generating Blocks 1094
2.2 Field for Combining Blocks 1095
2.3 Field to Show the Sentence 1096
2.4 Field to Show Structure Trees 1096
3 Implementation 1097
3.1 Definition and Internal Data Structure of Edit Field Object 1097
3.2 Definition and Internal Data Structure of Block Object 1097
3.3 Definition and Internal Structure of Derivation Rule Object 1098
3.4 Function for Generating Blocks 1098
3.5 Function for Changing the Selected Symbol Type 1098
3.6 Function for Combining Blocks 1099
3.7 Function for Decomposing Composite Block 1099
3.8 Function for Suggesting Candidate Blocks to Be Combined with a Specified Block 1099
3.9 Function for Showing the Structure Trees 1100
4 Conclusions 1100
References 1101
A Web Application for Passengers to Watch Coming Buses in Rural Areas 1102
1 Introduction 1102
2 System Overview 1103
3 Functions 1104
3.1 Display of Bus Stops and Routes 1104
3.2 Display of the Current Location of the Bus 1105
3.3 Sentry and Alert 1106
4 Implementation 1107
4.1 Display of Bus Stops and Routes 1107
4.2 Display of the Current Location of the Bus 1108
4.3 Sentry and Alert 1109
5 Conclusions 1109
References 1109
An HTML5 Implementation of Web-Com for Recording Chalk Annotations and Talk Voices onto Web Pages 1111
1 Introduction 1111
2 Recording 1112
3 Playing Back 1114
4 Conclusions 1116
References 1116
A Web-Based Visualization System for Interdisciplinary Research Using Japanese Local Political Corpus 1117
1 Introduction 1117
2 System Architecture 1118
2.1 Outline 1118
2.2 Japanese Political Corpus 1119
3 System Features 1120
3.1 Full-Text Search for Utterances 1120
3.2 Context Word Extraction Using KWIC 1121
3.3 Map Visualization with Full-Text Search 1121
3.4 Panel Data with Full-Text Search 1122
3.5 Extracting Political Keywords Using TF--IDF 1123
4 Conclusion 1125
References 1125
Text-Based Video Scene Segmentation: A Novel Method to Determine Shot Boundaries 1127
1 Introduction 1127
2 Related Works 1128
2.1 Searching Video Content 1129
2.2 Video Segmentation 1129
3 Our Proposal 1129
3.1 Overview of the Method 1130
3.2 The Criteria of Segmentation 1130
4 Experiment 1131
5 Conclusions and Future Work 1135
References 1135
ELVIDS: Video Search System Prototype with a Three-Level Hierarchy Model 1137
Abstract 1137
1 Introduction 1137
2 Issues of Video Use in Humanities and Social Science Research 1137
3 Video Search System Prototype with a Three-Level Hierarchy Model 1138
3.1 Database 1138
3.2 Interface 1140
4 Evaluation Experiment 1142
4.1 Method 1142
4.2 Results 1142
5 Related Work 1143
6 Conclusions and Further Work 1144
6.1 Conclusions 1144
6.2 Further Work 1144
Acknowledgement 1144
References 1144
Comparison of Typing Efficiency Between PC and Smartphone in the Case of Younger Generations 1146
1 Introduction 1146
1.1 Difference in Typing Between PC and Smartphone 1147
1.2 Novelty of this Research 1147
2 Our Problem 1147
2.1 Hypothesis Formation 1147
2.2 Data Necessary for Verification 1148
3 Hogehoge Typing System 1148
3.1 Composition of Hogehoge Typing 1149
3.2 Data to Acquire and Generate 1149
3.3 Implemented Functions 1150
4 Implementation and Data Analysis 1151
4.1 How to Use Hogehoge Typing 1151
4.2 Experiment 1152
4.3 Questionnaire Survey 1152
4.4 Analysis 1153
5 Conclusions 1156
References 1157
Extracting Laboratory Front Pages from University Websites 1158
1 Introduction 1158
2 Related Work 1159
3 Extraction of Laboratory Front Pages from University Websites 1160
3.1 Extraction of Laboratory Front Pages 1160
3.2 Selection of Laboratory Front Pages from URL Link 1160
3.3 Selection of Laboratory Front Pages by Using Rules 1161
4 Implementation 1162
4.1 Keywords Extraction 1163
5 Evaluation 1164
6 Discussion 1165
7 Conclusions 1165
References 1166
Activity Estimation Using Device Positions of Smartphone Users 1167
Abstract 1167
1 Introduction 1167
1.1 Related Work 1168
2 Moving State and Device Positions 1168
3 Smartphone Application 1171
3.1 Training Phase Using SVM 1171
3.2 Prediction Phase Using the SVM 1172
4 Experiment and Result 1173
5 Conclusion 1175
References 1175
A Topic Trend on P2P Based Social Media 1177
1 Introduction 1177
2 Literature Survey 1178
3 P2P-Based SNS 1178
4 Inference Process 1180
5 Experimental Result 1181
6 Conclusion 1183
References 1184
A Method for Extracting Correct Links from Automatic Created Links on Folksonomy 1185
1 Introduction 1185
2 Tag Explanatory Article on Folksonomy 1186
2.1 Nico Nico Pedia 1187
3 Correct Link Extraction Method 1188
3.1 Preprocess 1188
3.2 Mutual Link Extraction 1188
3.3 Algorithm for the Correct Link Extraction 1188
4 Experiment 1189
4.1 Dataset 1189
4.2 Result 1190
5 Discussion 1190
6 Conclusion 1191
References 1191
Author Index 1192

Erscheint lt. Verlag 21.8.2017
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo LV, 1154 p. 627 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Nachrichtentechnik
Schlagworte Cloud • Communication Networks and Protocols • Databases and Data Mining • Energy Efficient Networks and Green IT • Grid and P2P Computing • Mobile and Wireless Networks • Network Security and Privacy • Semantic Web and Internet Applications • sensor networks • Social Networks • Ubiquitous and Pervasive Computing Applications
ISBN-10 3-319-65521-3 / 3319655213
ISBN-13 978-3-319-65521-5 / 9783319655215
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Die Grundlage der Digitalisierung

von Knut Hildebrand; Michael Mielke; Marcus Gebauer

eBook Download (2025)
Springer Fachmedien Wiesbaden (Verlag)
CHF 29,30
Die materielle Wahrheit hinter den neuen Datenimperien

von Kate Crawford

eBook Download (2024)
C.H.Beck (Verlag)
CHF 17,55