By Topic

Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on

Date 26-28 June 2012

Filter Results

Displaying Results 1 - 25 of 59
  • [Back cover]

    Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (732 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Message from Program Chairs

    Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • Conference Organization

    Page(s): xi - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • Message from IET 2012 Workshop Organizers

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • IET 2012 Workshop Organization

    Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Keynotes

    Page(s): xix
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (111 KB)  

    These keynote speeches discuss the following: energy adaptation in ubiquitous computing; mobile cloud and green computing; intelligent infrastructure, sustainable design and signature structures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mobile Head-Mounted Display for Action Sports

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (348 KB) |  | HTML iconHTML  

    We describe a highly portable head-mounted display designed for use in action sports such as skiing and snowboarding. The low field-of-view, monocular display is designed to keep distraction to a minimum and not impede the mobility of the wearer. Implications of the location of the monocular display are discussed. The driving electronics and power source are small enough so that no tethering is needed, all electronics are attached to the display. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models

    Page(s): 5 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (654 KB) |  | HTML iconHTML  

    Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Case of a Context-Aware Mobile Recommender System in a Banking Environment

    Page(s): 13 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (579 KB) |  | HTML iconHTML  

    Traditional E-Commerce applications have evolved in the last years due to the growth of the mobile environment, creating a new research area known as U-Commerce. The application of these techniques in the banking environment has been a direct outcome in order to enhance the services offered to end users. In this paper, we present a context-aware mobile recommender system based on real banking data provided by a well known Spanish bank. The data were composed by customer profiles, credit card transactions and information about places where bank clients have previously spent their money. The system model and its architecture are described taking into account social, mobility and ubiquitous requisites to generate personalized recommendations. The mobile prototype deployed in the bank was evaluated in a survey among 100 users with good results regarding trust, usefulness and effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proxy-Based Mobile Computing Infrastructure

    Page(s): 21 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (317 KB) |  | HTML iconHTML  

    Proxies can be used as gateways between remote resources and mobile devices to deal with the challenges resulted from disconnections and the limited resources of mobile devices. This paper describes a proxy-based infrastructure that provides proxy services to support mobile device applications. Proxy services can be thought of as a library of functions where the functions execute on a proxy and serve as a bridge between client application on the mobile device and remote services. The infrastructure allows for a dynamic association of a proxy with a mobile device that takes into account the proximity between the mobile device and proxy and the mobility of the client mobile device. Furthermore, proxies are chosen dynamically and the services provided by a proxy are dynamically changing based on the requirements of the clients for a better resource utilization. Several experiments are carried out to evaluate the effectiveness of the proposed infrastructure. The results suggest that the services offered by the proxy can be used for quick recovery after disconnections with only the minimal addition of overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Collaborative Video Watching on Mobile Devices with REST Services

    Page(s): 29 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Density Maps: Determining Where to Sample in Participatory Sensing Systems

    Page(s): 35 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (345 KB) |  | HTML iconHTML  

    Participatory sensing (PS) systems are a new emerging sensing paradigm based on the participation of cellular users. While they present interesting characteristics, such as spatiotemporal granularity and low cost, they also create new problems and challenges. One key challenge in PS systems is that of the determination of the locations and number of users where to obtain samples from so that we can accurately represent the variable of interest with a low number of participants. This paper proposes the use of density maps, based on the current estimations of the variable, to address this challenge. The density maps are then utilized by the incentive mechanism in order to encourage the participation of those users indicated in the map. Our results show how the density maps greatly improve the quality of the estimations while maintaining a stable and low total number of users in the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query-by-Humming/Singing of MIDI and Audio Files by Fuzzy Inference System

    Page(s): 41 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (671 KB) |  | HTML iconHTML  

    Music Information Retrieval (MIR) is a crucial topic in the domain of information retrieval. According to major characteristics of music, Query-by-Humming system retrieves interesting music by finding melody that contains similar or equal melody to the humming query. Basing on the designed fuzzy inference model a novel Query-by-Humming/Singing system is proposed to extract pitch contour information from WAV and MIDI files in this paper. To verify the effectiveness of the presented work, the MIREX QBSH Database is employed as our experimental database and a large amount of human vocal data is used as query to test the robustness of MIR. Then, the Longest Common Subsequence (LCS) is served as an approximate matching algorithm to identify the most related top 5 music as an evaluation standard for the system. Experimental results show that the proposed system achieves 85% accuracy in the top 5 retrievals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-Based Large-Scale Landmark Image Recognition Scheme for Mobile Devices

    Page(s): 47 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1155 KB) |  | HTML iconHTML  

    In this paper, we propose a location-based large-scale landmark image recognition scheme for mobile devices such as smart phones. To achieve this goal, we collected landmark images all around the world, which were available on the web. For each landmark, we detected interest points and constructed their feature descriptors using SURF. Next, we performed a statistical analysis on the local features to select representative points among them. Intuitively, the representative points of an object are the interest points that best characterize the object. Similar representative points are merged for filtering and fast matching purposes. These points are indexed using an R-tree based on GPS information. Our scheme is based on client-server architecture. When the user takes a picture of a landmark using a mobile device, the client module on the mobile device extracts the local features from the image and sends them to the server, along with location and other sensor data. For the query, the server searches its index using the location data first to find nearby landmarks and then compares their local features. Matched landmark images are sent back to the client. We implemented a prototype system and performed various experiments. Through experiments, we showed that our scheme achieves reasonable performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating OWL Ontology from Relational Database

    Page(s): 53 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing User Behavior in Weibo

    Page(s): 60 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (425 KB) |  | HTML iconHTML  

    Online social networks (OSNs) have become the most popular services on the Internet, and such systems have become part of users' life all over the world. They visit such systems every day and spend more and more time on them. So understanding users' behavior is important to understand such systems. This paper presents results from our measurement on the large-scale OSN spanned by Weibo, the most prevalent and largest microblog system in China at present. Here we talked about two topics: (I) who use Weibo, and (II) what is the users' behavior. We spend one year to persistently observe Weibo, and using API to collect more than 20 million users' profiles to find out that they are and what is their behavior, which is rarely discussed by other researchers. Our studies reveal the users' behavior in Weibo, and we believe our findings make opportunities for in-depth studies of online social network and improve design of such systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adjustable Heuristic for Offset Assignment Problems in Embedded System Design

    Page(s): 66 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    Offset assignment (OA) is a highly effective address code optimization technique for embedded processors with limited memory. Modify registers (MRs) concern the offset difference of address code for offset assignment (OA) problems. Address registers (ARs) concern the assignment of program variables for general offset assignment (GOA) problems. This paper proposes a novel MRs and ARs assignment technique for SOA and GOA problems based on specialized DSPs Address Generation Units (AGU) machines. A technique to reduce the number of distinct offset difference so as to reduce the modify register assignment instructions was proposed for SOA and during GOA such that the cost is further reduced. An adjustable ARs assignment technique was proposed to reduce the GOA cost and the number of distinct offset difference during GOA. Our experiments show the reduction of the number of distinct offset difference during GOA can also help to improve the GOA cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UVote: A Ubiquitous E-voting System

    Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (444 KB) |  | HTML iconHTML  

    Traditional e-voting systems replace the paper-based process with an electronic one at official voting locations. Remote e-voting, where the voter can vote from any location, increases both participation rates in the elections and the user's satisfaction as it eases the voting process and saves time. However, having a remote e-voting system increases the security vulnerabilities. Those vulnerabilities include harder user authentication, possibility of malicious software on the user's devices, network malicious nodes, coercion, and vote-selling. We introduce UVote as a ubiquitous, convenient, verifiable, and incoercible democratic e-voting system. UVote works as a front-end to many of the current traditional e-voting systems, providing the user with a convenient voting solution with guarantees on security, achieving the best of both worlds. The key design principal in UVote is redundancy at system architecture different components, including voting devices, vote verification, and allowing voting multiple times. We present the UVote architecture and how it leverages redundancy to achieve its goals. We also analyze the different possible attacks and how UVote combats them. Evaluation of the system performance shows that these advantages come with minimal performance overhead. This highlights that UVote is a truly ubiquitous e-voting system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.