scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Space-Based and Situated Computing in 2011"


Journal ArticleDOI
TL;DR: This paper synthesises existing clustering algorithms news's and highlights the challenges in clustering.
Abstract: A wireless sensor network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor is communicated to the base station, which forwards the data to the end user. Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs. Clustering also conserves the limited energy resources of the sensors. This paper synthesises existing clustering algorithms in WSNs and highlights the challenges in clustering.

1,097 citations


Journal ArticleDOI
TL;DR: A roadmap highlighting the possible use of next generation emerging technologies for enabling collective computational intelligence in managing disaster situations is presented and a relevant scenario is used to illustrate the model architecture.
Abstract: Much work is underway within the broad next generation emerging technologies community on issues associated with the development of services to foster synergies and collaboration via the integration of distributed and heterogeneous resources, systems and technologies. In previous works, we have discussed how these could help coin and prompt future direction of their fit-to-purpose use in various real-world scenarios including but not limited to disaster management, healthcare, vehicular networking and knowledge cities. In this exploratory paper, we brief and then build upon our previous works and specifically, we present a roadmap highlighting the possible use of next generation emerging technologies for enabling collective computational intelligence in managing disaster situations. A relevant scenario is used to illustrate the model architecture, as well as to detail the proposed roadmap.

38 citations


Journal ArticleDOI
TL;DR: This work has performed experimental studies with a real world prototype of a distributed data management system for MANETs, called MIDAS data space, and done an extensive simulation study showing where table replicas should be placed in the network, in order to minimise network traffic generated by access to the databases and by the synchronisation data.
Abstract: The dynamic nature of mobile ad-hoc networks (MANETs) can easily lead to data being inaccessible due to constant route changes and network partitions. One method often used for increasing reliability and availability of data is replication. However, replication comes with costs, those of transferring and storing data and keeping track of consistency between replicas. For that reason, we have identified the core factors impacting the resulting network traffic. We have performed experimental studies with a real world prototype of a distributed data management system for MANETs, called MIDAS data space. Furthermore, we have done an extensive simulation study showing where table replicas should be placed in the network, in order to minimise network traffic generated by access to the databases and by the synchronisation data. The results of the experiments are consistent and show that by using clustering techniques we can achieve close-to-optimal traffic by placing replicas on approximately 10% of nodes.

31 citations


Journal ArticleDOI
Madoka Yuriyama1, Takayuki Kushida1
TL;DR: The evaluated infrastructure proves the scalability that can support a large number of physical sensors on cloud computing and can also map the physical sensor to the virtualised sensor.
Abstract: This paper proposes the sensor-cloud infrastructure which supports sensor management on cloud computing. It can also map the physical sensor to the virtualised sensor. Since the resource and capacity of physical sensors are limited, IT management on cloud computing can be on behalf of the sensor management. Both dynamic provisioning and automated management of the cloud computing can be leveraged for sensor services. IT resources with those virtualised sensors can be provided on the sensor-cloud infrastructure. The significance of the proposed infrastructure is that virtualised sensors can be used as part of IT resource such as CPU, disk and memory. In addition, the dynamic sensor group can be automatically provisioned with those virtual sensors. The evaluation of the proposed infrastructure proves the scalability that can support a large number of physical sensors on cloud computing.

31 citations


Journal ArticleDOI
TL;DR: The specificities and vulnerabilities of wireless sensor networks are shown, and a list of current attacks, which can be found in these particular networks, and how they use their vulnerabilities are presented.
Abstract: Wireless sensor networks are specific ad hoc networks. They are characterised by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show the specificities and vulnerabilities of wireless sensor networks. We present a list of current attacks, which can be found in these particular networks, and how they use their vulnerabilities. Finally, we discuss different solutions made by the scientific community to secure wireless sensor networks.

29 citations


Journal ArticleDOI
TL;DR: A new research domain, human-to-human interaction (HHI), is presented that describes how today's human interaction is largely indirect and mediated by a wide variety of technologies and devices.
Abstract: We present a new research domain, human-to-human interaction (HHI) that describes how today's human interaction is largely indirect and mediated by a wide variety of technologies and devices. We show how this new and exciting field of design originates from the convergence of a few well-established research areas, such as traditional graphical user interfaces (GUIs), tangible user interfaces (TUIs), touchless gesture user interfaces (TGUIs), voice user interfaces (VUIs), and brain computer interfaces (BCIs). We analyse and describe current research in those areas and offer a first-hand view and presentation of its salient aspects for the human-to human interaction domain.

21 citations


Journal ArticleDOI
TL;DR: A vision of invisible security that integrates unobtrusive multi-factor authentication with probabilistic models that take into account social relationships and natural behaviours, such as borrowing credentials as a form of access delegation is described.
Abstract: This paper surveys the state of the art in authentication, authorisation, and auditing for ubiquitous computing. The survey covers a range of recent work, of which 12 representative contributions are compared side by side along 20 criteria. The paper also describes a vision of invisible security that integrates unobtrusive multi-factor authentication with probabilistic models that take into account social relationships and natural behaviours, such as borrowing credentials as a form of access delegation. This vision recasts current probabilistic models for authentication and argues that the traditional separation of concerns between authentication and authorisation needs to be revisited.

16 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigate issues concerning wireless sensor networks and mobile ad hoc networks design based on simulation, and present a novel algorithm for calculating a collision-free motion trajectory for a mobile device in unknown environment.
Abstract: Modelling and simulation is a critical element in the design, development and evaluation of self-organising and cooperative networks. In this paper, we investigate issues concerning wireless sensor networks and mobile ad hoc networks design based on simulation. We survey approaches to wireless transmission and nodes mobility modelling, and describe a novel algorithm for calculating a collision-free motion trajectory for a mobile device in unknown environment. Finally, we describe the design, performance and potential applications of our software platform for parallel and distributed simulation, and computer-aided design of self-organising networks.

16 citations


Journal ArticleDOI
Shigeaki Sakurai1
TL;DR: This method learns prediction models from the data by using data mining techniques and verifies the efficiency of the method through numerical experiments based on the RFID data collected from two branches of an apparel company.
Abstract: This paper proposes a new method that efficiently uses the RFID data collected from apparel shops. This method learns prediction models from the data by using data mining techniques. The models represent relationships between the number of sales in the next term and the actions of customers, such as the number of pick-up, the number of fitting, the number of customers, and so on. It is possible to predict sales volume by applying the present RFID data to the models. Also, this paper proposes two step-wise methods in order to acquire the models. It verifies the efficiency of the method through numerical experiments based on the RFID data collected from two branches of an apparel company.

13 citations


Journal ArticleDOI
TL;DR: Testing of HABITS shows that it gives comparable levels of accuracy to those achieved by doubling the number of access points, and is twice as accurate as existing systems in dealing with signal black spots and it can predict the final destination of a person within the test environment almost 80% of the time.
Abstract: Using Wi-Fi signals is an attractive and reasonably affordable option to deal with the currently unsolved problem of widespread tracking in an indoor environment. Our system, history aware-based indoor tracking system (HABITS) models human movement patterns and this knowledge is incorporated into a discrete Bayesian filter to predict the areas that will, or will not, be visited in the future. These probabilistic predictions may be used as an additional input into building automation systems for intelligent control of heating and lighting. This paper outlines current indoor tracking methods and the weaknesses associated with them. It describes in detail the operation of the HABITS algorithm and discusses the implementation of this algorithm in relation to indoor Wi-Fi tracking with a large wireless network. Testing of HABITS shows that it gives comparable levels of accuracy to those achieved by doubling the number of access points. It is twice as accurate as existing systems in dealing with signal black spots and it can predict the final destination of a person within the test environment almost 80% of the time.

13 citations


Journal ArticleDOI
TL;DR: This paper proposes a new zone-based routing protocol, called improved EZRP (IEZRP), which reduces the number of control packets in the conventional routing protocols, but in IEZRP, the control packets are only transmitted when nodes are moving.
Abstract: In recent years, there are many research works on ad hoc networks. The routing protocols play an important role for construction of ad hoc networks. In this paper, we propose a new zone-based routing protocol, called improved EZRP (IEZRP), which reduces the number of control packets. In the conventional routing protocols, the control packets are transmitted periodically. However, in IEZRP, the control packets are only transmitted when nodes are moving. The performance evaluation via simulations shows that the IEZRP has better performance than EZRP.

Journal ArticleDOI
TL;DR: TeC is precise enough to support the fully automated deployment of systems designed by end users, and it addresses important characteristics of ubiquitous computing, namely, the ability to describe dynamic adaptations and to relate system features to physical location and to the presence and identity of users.
Abstract: This paper presents TeC, a framework for end-user design, deployment, and evolution of applications for smart spaces. This work is motivated by the current gap between traditional software development approaches and end user desire to easily personalise and evolve their systems for smart spaces. TeC is precise enough to support the fully automated deployment of systems designed by end users, and it addresses important characteristics of ubiquitous computing, namely, the ability to describe dynamic adaptations and to relate system features to physical location and to the presence and identity of users. TeC is described by example, with four home automation systems concerning surveillance and energy management. The paper also discusses the implementation of the TeC middleware and preliminary evaluation concerning usability and engineering effort.

Journal ArticleDOI
TL;DR: This paper focuses on the agent-agent and agent-environment interaction mechanisms at global and regional levels in the application layer of the architectural model and makes a synthesis and generalisation of the existed formal models of SMAS.
Abstract: Situated computing is a computational paradigm based on the ability of computing devices to detect, interpret and respond to the users' interactions in a local environment. It provides a mechanism to create a new type of application of the multi-agent system – situated multi-agent system (SMAS) – for modelling the local relationships between users and objects in the environment. In this paper, we present the general concept of the three-layered architecture model for SMAS and analyse the model components and the properties of situated agents. We focus on the agent-agent and agent-environment interaction mechanisms at global and regional levels in the application layer of the architectural model and make a synthesis and generalisation of the existed formal models of SMAS. The sample multi-layer MAS infrastructure tools supporting the situated agents and an example of practical approach of SMAS in a real-life scenario are surveyed in the end of the paper.

Journal ArticleDOI
Sergio Toral1, Derlis Gregor1, M. Vargas1, Federico Barrero1, F. Cortes1 
TL;DR: An application based on an embedded CORBA-compliant middleware layer and several computer vision equipments is presented, proving the feasibility of distributed applications for building intelligent urban environments.
Abstract: Intelligent transportation systems (ITS) in urban environments are based today on modern embedded systems with enhanced digital connectivity and higher processing capabilities, supporting distributed applications working in a cooperative manner. This paper provides an overview about modern cooperative ITS equipments and presents a distributed application to be used in an urban data network. As a case example, an application based on an embedded CORBA-compliant middleware layer and several computer vision equipments is presented. Results prove the feasibility of distributed applications for building intelligent urban environments.

Journal ArticleDOI
TL;DR: This paper proposes systems that reduce the number of operations on inputting a query to a search engine, enable clipping and saving a web content, and assist cooperative web search conducted by multiple mobile users.
Abstract: Mobile internet access has become an important technology to our life. According to this trend, search engines have been providing search services for mobile phones. Since a mobile phone has a limited interface, such as a small screen and keypad, even simple interactions are burdensome for users. Therefore, to provide comfortable web browsing experience, efforts on HCI aspect are also essential. In this paper, we describe our studies that tackle this problem by HCI-based approach. We propose systems that reduce the number of operations on inputting a query to a search engine, enable clipping and saving a web content, and assist cooperative web search conducted by multiple mobile users.

Journal ArticleDOI
TL;DR: Middleware issues for situated computing, embedded devices, autonomic space management, proactive services, context awareness, and smart spaces are tackled and service oriented, event driven, agent-based, and peer-to-peer architectures are discussed.
Abstract: Situated computing is an actual research area that gathers the knowledge and investigation in mobile, wearable, ubiquitous and augmented computing. The aim is to sustain systems that collect information about contexts and user actions over a period of time and supply it to applications that dynamically adapt to context changes. Situated computing systems have various architectures, but most of them include a middleware layer that supports equipment with limited computing resources and offers functionalities that simplify applications development, deployment, execution, and maintenance. Middleware and architectures are the focus of this paper, which presents the main concepts, research results, and future trends in middleware for situated computing. Service oriented, event driven, agent-based, and peer-to-peer architectures are discussed. Middleware issues for situated computing, embedded devices, autonomic space management, proactive services, context awareness, and smart spaces are tackled as well.

Journal ArticleDOI
TL;DR: This paper proposes a centralised resource allocation scheme that allocates interdependent tasks to nodes in mobile ad hoc computational grids, and classify tasks and dependencies, and then exploit them to reduce communication cost between inter dependent tasks, and thus application completion time.
Abstract: Recent advancements in mobile computing and communication technologies have given rise to the development of mobile ad hoc computational grids which provide a software and hardware infrastructure to share computing resources in mobile ad hoc environments. The adaptation of computational grids in mobile ad hoc environments is not simple and presents numerous research challenges due to node mobility and infrastructure-less network environment. In order to improve utilisation of shared computing resources and application performance, one of the key services is a resource allocation. In this paper, we propose a centralised resource allocation scheme that allocates interdependent tasks to nodes in mobile ad hoc computational grids. First, we classify tasks and dependencies, and then exploit them to reduce communication cost between interdependent tasks, and thus application completion time. The effectiveness of proposed scheme is demonstrated through simulations.

Journal ArticleDOI
TL;DR: A new routing algorithm for mobile ad hoc networks is proposed, which reduces the usage of the resource while forwarding the data packets from the source to destination with the help of support node, and uses the tree-based cache model to increase the network throughput.
Abstract: Mobile ad hoc network is a collection of mobile nodes that can be dynamically setup anywhere anytime without having pre-existing infrastructure. This paper proposes a new routing algorithm for mobile ad hoc networks, which reduces the usage of the resource while forwarding the data packets from the source to destination with the help of support node. In order to route the data packets, the proposed model uses the tree-based cache model to increase the network throughput. It reduces the number of control message packets and average path-length in the network. The proposed model has been simulated using network simulator (NS-2.33) and has compared with AODV, DSR and DSDV models. The proposed model has shown better results in terms of packet delivery, average path-length and control message packets. The proposed model delivers 82% of the data packets when the mobility is 20 m/sec. If the mobility is 2.5-20 m/sec, then the path-length of the proposed model is 2.2-2.8 whereas DSDV model has 2.1-4, DSR model needs 3.32-3.8 and AODV model with 3.3-3.8.

Journal ArticleDOI
TL;DR: A novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses is proposed which can be used to facilitate in threat identification and decision-making process.
Abstract: Identification of threats in networked systems is one of the important risk management processes that should be followed in order to be aware of all risks In general, risk assessment guidelines for threat analysis propose to use historical organisation's data, thus, novel and unheard threats often are skipped from an analysis In this paper, we propose a novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses The model can be used to facilitate in threat identification and decision-making process by focusing on attack scenarios that illustrate vulnerable nodes, threats and shortest attack paths to the attacker's goal The model can be used as part of risk management practices to improve security awareness through different attack scenarios and manage all system risks

Journal ArticleDOI
TL;DR: A preliminary evaluation of the performance of the information-sharing algorithm autonomous data exchange system (ADES) is reported and an improved system called ADES-Plus is introduced, which employs information management functions using an existing database and adds a function that enables flexible processing.
Abstract: Safety information regarding evacuees is the most important information for relief activities carried out after disasters. We have previously discussed the requirements for computer systems designed for supporting effective relief activities after disasters. In addition, on the basis of this discussion, we have also proposed a network construction algorithm and have performed a preliminary evaluation regarding the installation locations of wireless stations and wireless link connectivity. In this paper, we report the results of a preliminary evaluation of the performance of the information-sharing algorithm autonomous data exchange system (ADES). In addition, this paper introduces an improved system called ADES-Plus. The ADES-Plus system employs information management functions using an existing database. Furthermore, in accordance with the required speed of information sharing, we add a function that enables flexible processing. The effective operation of these new functions is confirmed through computational experiments.

Journal ArticleDOI
TL;DR: This paper estimates the field distributions with respect to both the main and a relay station by using the discrete ray tracing method (DRTM) and discusses the necessity of a relay stations in conjunction with the blind zones of the main station due to shadowing in a mountainous area.
Abstract: Fukuoka tower plays an important role as main stations for several terrestrial digital broadcasting systems in Fukuoka area, which are going to completely replace the conventional analogue broadcasting systems in 2011. The input power of the digital broadcasting system is reduced about one-tenth of the old analogue system, but the new system needs many relay stations to maintain high quality of services. In this paper, focusing on two relay stations in the Western part of Fukuoka, we estimate the field distributions with respect to both the main and a relay station by using the discrete ray tracing method (DRTM). We also discuss the necessity of a relay station in conjunction with the blind zones of the main station due to shadowing in a mountainous area.

Journal ArticleDOI
TL;DR: This study examines the use of sensors to record indoor lifestyle environments as one such attempt to reduce carbon dioxide emissions and proposes a system to carry out a new ecology-oriented lifestyle that attaches great importance to human comfort.
Abstract: Many attempts have been made to reduce carbon dioxide emissions in an effort to combat global warming. This study examines the use of sensors to record indoor lifestyle environments as one such attempt. In the house, we propose sensors measure the temperature, humidity, illumination intensity, the presence of people, and whether doors are open or closed. These measured elements are closely related to human lifestyles and living environments. Furthermore, we use 'life logs' as a method of measuring the indoor environment, locating resources being wasted, and to suggest further actions to improve the quality of life. Finally, through an analysis of the sensing devices and obtained data, we propose a system to carry out a new ecology-oriented lifestyle that attaches great importance to human comfort.

Journal ArticleDOI
TL;DR: The characteristics of the diffracted fields by two horizontal edges of a building rooftop are discussed and it is shown that the waves grazing on the rooftop of concrete building are considerably attenuated for the low concrete conductivity, but when parapets are constructed on the roof, the diffraction waves become stronger than the grazing waves.
Abstract: In order to have an effective utilisation of the radio wave resources, it is important to estimate propagation path in the urban area. In our previous work, we have examined the diffracted fields by two edges with an arbitrary angle which are in different and same heights. In this paper, the characteristics of the diffracted fields by two horizontal edges of a building rooftop are discussed. The numerical calculations are carried out for two wedges of a building rooftop on perfect conductor and concrete wedges. The results show that the waves grazing on the rooftop of concrete building are considerably attenuated for the low concrete conductivity, but when parapets are constructed on the rooftop, the diffracted waves become stronger than the grazing waves.

Journal ArticleDOI
TL;DR: Analytical and design aspects of technical and economic challenges emerging in multiservice networks, and was conducted from a methodological perspective of evolving network infrastructure.
Abstract: Contemporary information and communication services, specifically their functionalities’ level and range, the way it is achieved as well as the end-users’ satisfaction, are developing much faster than ever before. The strong drive for these services’ fast development and deployment has not been accompanied by a proper understanding of their engineering and design principles, and for the most part, the services’ satisfactory qualitative performance is being obtained by the strength approach of over-provisioning. Consequently, there is a strong need for a deeper quantitative understanding of the services’ functioning, an understanding that leads to clear design and control methods those in turn make the services’ efficient deployment and exploitation possible. Thus, the research performed within this paper covers analytical and design aspects of technical and economic challenges emerging in multiservice networks, and was conducted from a methodological perspective of evolving network infrastructure.

Journal ArticleDOI
TL;DR: A new digital traditional crafting system that aimed at the next generation's succession support as a prototype system of a new fusion reality that combined a virtual space with a real space was constructed.
Abstract: In this research, the prototype system of a new fusion reality that combined a virtual space with a real space was constructed. We located the technique that used a wireless interface and the high-resolution display to the enhancing method of the virtual reality technology. In addition, the technique that used video avatar and an ultrahigh-speed network was located to the enhancing method of the tele-immersion technology. In this paper, the space by the extended method of the virtual reality technology and the tele-immersion technology is defined as the fusion reality. We constructed a new digital traditional crafting system that aimed at the next generation's succession support as a prototype system. In this paper, the system evaluation of the prototype system is clarified.

Journal ArticleDOI
TL;DR: A remote control model for the conversional appliances to integrate with smart home environment is proposed and a smart home portal combined with video surveillance system was built to realise conversional appliance control in smart home.
Abstract: Remote appliance control is a core vision for the smart home. Even in the next few decades, it is inevitable that conversional appliances and smart devices will coexist together to help people live better. For this reason, this paper proposed a remote control model for the conversional appliances to integrate with smart home environment. Based on the model, a smart home portal combined with video surveillance system was built to realise conversional appliance control in smart home. Due to the video-based control, total appliance control cycle is based on 'what you see is what you have done'. The main benefits of this model come from simple design, mature technologies, lightweight architecture, and practicable for implementation.