2014 eighth international conference on innovative mobile ... · imis smeuceorganizing committee....
TRANSCRIPT
2014 Eighth International
Conference on Innovative Mobile
and Internet Services in
Ubiquitous Computing
(IMIS 2014)
Birmingham, United Kingdom2 - 4 July 2014
IEEE Catalog Number: CFP1458N-POD
ISBN: 978-1-4799-7891-5
2014 Eighth International
Conference on Innovative
Mobile and Internet Services
in Ubiquitous Computing
IMIS 2014
Table of Contents
Message from General Chairs xvi
Message from Program Committee Co-Chairs xviii
Message from Workshop Co-Chairs xix
Organizing Committee xx
Reviewers xxv"
IMIS ACTICS Welcome Message xx>x
IMIS ACTICS Organizing Committee xxx
IMIS ACTICS Reviewers xxxi
IMIS esloT Welcome Message xxx"
IMIS esloT Organizing Committee xxx"i
IMIS esloT Reviewers xxxv
IMIS FINGNet Welcome Message xxxvi
IMIS FINGNet Organizing Committee xxxv»
IMIS FINGNet Reviewers xxxviii
IMIS ITAUC Welcome Message xxxix
IMIS ITAUC Organizing Committee xl
IMIS ITAUC Reviewers xli
IMIS MCNCS Welcome Message xlii
IMIS MCNCS Organizing Committee xliii
IMIS MCNCS Reviewers xliv
IMIS PISPIS Welcome Message xlv
IMIS PISPIS Organizing Committee xlvi
IMIS PISPIS Reviewers xlvii
IMIS SMEUCE Welcome Message xlviii
V
IMIS SMEUCE Organizing Committee. XIVIX
IMIS SMEUCE Reviewers 1
IMIS WAIS Welcome Message
IMIS WAIS Organizing Committee '»
IMIS WAIS Reviewers m
IMIS 2014
Session 1: Distributed System and Cloud Computing I
Thermal-Aware Task Placement with Dynamic Thermal Model in
an Established Datacenter 1
Zhigang Jiang, Wei Huang, llsun You, Zhuzhong Qian, and Sanglu Lu
The GEO-Cloud Experiment: Global Earth Observation System Computed
in Cloud 9
Jonathan Becedas
Visions and Challenges for Sensor Network Collaboration in the Cloud 16
Simon Oechsner, Boris Bellalta, Desislava Dimitrova, and Tobias Hossfeld
Architecture Reconfiguration in Pervasive Environment: An AADL-based
Approach 23
Luxi Chen, Linpeng Huang, Chen Li, and Mengyao Ruan
Session 2: Intelligent Technologies and Applications on BigData I
Construction of Scholarly n-Gram from Huge Text Data 31
Myunggwon Hwang, Ha-Neul Yeom, Mi-Nyeong Hwang, and Hanmin Jung
Research for the Pattern Analysis of Individual Interest Using SNS Data:
Focusing on Facebook 36
Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, and Pankoo Kim
A New Method of Measuring Document Similarity for Movie Recommendation 41
Sung-Min Kim and Young-Guk Ha
Large Imbalance Data Classification Based on MapReduce for Traffic Accident
Prediction 45
Seong-Hun Park and Young-Guk Ha
vi
Session 3: Distributed System and Cloud Computing II
An Overview of Application Traffic Management Approaches: Challengesand Potential Extensions 50
loanna Papafili, Krzysztof Wajda, Roman Lapacz, Alessandro Predieri,
Thomas Bocek, and Michael Seufert
Scenario-Based Behavioral Nonexistent Consistency Checkingfor Cyber-Physical Systems 58
Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, and Zhuzhong Qian
Data De-duplication on Similar File Detection 66
Yueguang Zhu, Xingjun Zhang, Runting Zhao, and Xiaoshe Dong
An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search 74
Huiquan Wang, Junjie Wu, Xuejun Yang, Pingxing Chen, andXun Yi
Session 4: Intelligent Technologies and Applications on BigData II
Conceptual Similarity Calculation Using Common-Context
between Comparatives on Ontology 82
Hyun Jung Lee and Mye Sohn
On Semantic Techniques for Intelligent Computing 90
Myunggwon Hwang, Mi-Nyeong Hwang, and Hanmin Jung
Fast Multi-line Detection and Tracking with CUDAfor Vision-Based UAV
Autopilot 96
Tyan Vladimir, Doo-Hyun Kim, Young-Guk Ha, and Dongwoon Jeon
Keyword-Based SPARQL Query Generation System to Improve Semantic
Tractability on LOD Cloud 102
Soyeon Im, Mye Sohn, Sunghwan Jeong, and Hyun Jung Lee
Session 5: Internet, Wireless, and Mobile Networks for UPC I
A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using
Probabilistic Broadcast 110
D.G. Reina, S.L. Toral, Eleana Asimakopoulou, Nik Bessis, and F. Barrero
A Cross-Layer Design Scheme Based on Integrated Management Applied
in Wireless Communication 115
Linyuan Yao, Fei Song, and Hongke Zhang
Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks
with Global Mobility Support 121
Chulhee Cho, Jun-Dong Cho, and Jongpil Jeong
vii
Developing Useful Mobile Applications in Cross-Media Platforms
Cajsa-Tora Hermansson, Mikael Soderstrom, and Dan Johansson
128
Session 6: Disaster Resilient System and Reliable Network
Technologies
The Information Sharing System Using Web-GIS at the Time of Wide-Scale
Disaster133
Tomoyuki Ishida, Kazuhiro Takahagi, Yoichiro Shimizu, Akira Sakuraba,
Noriki Uchida, and Yoshitaka Shibata
Mobile Gateway for Ubiquitous Health Care System Using ZigBee
and Bluetooth139
Teemu H. Laine, Chaewoo Lee, and Haejung Suk
Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks
for Disaster Use146
Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, and Yoshitaka Shibata
SODiCS on Challenged Communication Environment 152
Kenfa Ito, Go Hirakawa, and Yoshitaka Shibata
Session 7: Internet, Wireless, and Mobile Networks for UPC
II
Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile
Networks 159
Chulhee Cho, Jun-Dong Cho, and Jongpil Jeong
Analytical Modeling of IP-based Hierarchical Mobility Management Protocols 166
Chulhee Cho, Jun-Dong Cho, and Jongpil Jeong
A Case Study for Potential Carpooling in Beijing 172
Fei Song, Rong Li, Huachun Zhou, Hongke Zhang, and llsun You
An Exercise Data Logging System for Retrofitting Gym Equipment 178
Colin Patch, Kin Fun Li, and Bruce Gooch
Session 8: Artificial Intelligence and Cognitive Technologies
Unsupervised Learning of GDL Classifier 186
Tomasz Hachaj and Marek R. Ogiela
Cognitive Management Systems 192
Lidia Ogiela and Marek R. Ogiela
Facial Feature Extraction Using an Active Appearance Model on the iPhone 196
Yong-Hwan Lee, Woori Han, Youngseop Kim, and Bonam Kim
viii
Efficient Compression Algorithm for H.264/AVC Intra-prediction Using
an Activity Map 202
June Kim, Youngseop Kim, Yong-Hwan Lee, Oh-Jin Kwon, and Bonam Kim
Feature Mining for Machine Learning Based Compilation Optimization 207
Fengqian Li, Feilong Tang, and Yao Shen
Session 9: Smart Phone and Mobile Computing Platform
Exploring the Design Space for Android Smartphones 215
Shih-Hao Hung, Jen-Hao Chen, Chia-Heng Tu, Jeng-Peng Shieh, and Roger Chien
Indoor Taxi-Cab: Real-Time Indoor Positioning and Location-Based Services
with Ekahau and Android OS 223
Caner Kilinc, Seraj Al Mahmud Mostafa, Raihan Ul-lslam, Kashif Shahzad,
and Karl Andersson
PasDroid: Real-Time Security Enhancement for Android 229
Shuen-Wen Hsiao, Shih-Hao Hung, Roger Chien, and Chih-Wei Yeh
Efficient Identification of Windows Executable Programs to Prevent Software
Piracy 236
Yesol Kim, Jeongoh Moon, Seong-Je Cho, Minkyu Park, and Sangchul Han
Session 10: Security and Dependable Applications I
A Survey of Green, Energy-Aware Security and Some of Its Recent
Developments in Networking and Mobile Computing 241
Mauro Migliardi, Alessio Merlo, and Luca Caviglione
On Security-Effective and Global Mobility Management for FPMIPv6 Networks 247
Hyun-Suk Chai, Jun-Dong Cho, and Jongpil Jeong
Cryptographic Techniques in Advanced Information Management 254
Marek R. Ogiela, Lidia Ogiela, and Urszula Ogiela
A Role-Based RSA Key Management Approach in a Hierarchy Scheme 258
Hsing-Chung Chen and Anita Christiana
Session 11: Security and Dependable Applications II
Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers 265
Francesco Palmieri, Massimo Ficco, and Aniello Castiglione
How to Find an Appropriate K for K-Anonymization 273
Shinsaku Kiyomoto and Yutaka Miyake
Elliptic Curve Scalar Multiplication with a Bijective Transform 280
Yoshitaka Nagai, Masaaki Shirase, and Tetsuya Izu
ix
Identifying Windows Installer Package Files for Detection of Pirated Software 287
Dongjin Kim, Yesol Kim, Jeongoh Moon, Seong-Je Cho, Jinwoon Woo,
and llsun You
ACTICS 2014
Session 1: Next Generation Wireless Networks
The Impact of TDMA Frame Size on Latency in a Neighbor-Aware VANET
MAC 291
Marthinus J. Booysen and Gert-Jan Van Rooyen
An Evaluation Environment and Methodology for Automotive Media Streaming
Applications297
Robert Protzmann, Kay Massow, and llja Radusch
Cooperative Power and Contention Control MAC Protocol in Multichannel
Cognitive Radio Ad Hoc Networks 305
Chien-Min Wu, Hui-Kai Su, Maw-Lin Leou, Yi-Ching Liaw, and Chih-Pin Lo
The Effect of TDMA Frame Size and the Hidden Node Problem on
the Performance of a Neighbor-Aware VANET MAC 310
Marthinus J. Booysen and Gert-Jan Van Rooyen
Evaluation of Sleep Scheduling Method for Data Collection from Sensor
Networks Divided into Local Areas 316
Masato Nakamura and Shigetomo Kimura
esloT 2014
Session 1: Networking, Security, and IPv6 for the loT
Flexible, Direct Interactions between CoAP-enabled loT Devices 322
Girum Ketema Teklemariam, Jeroen Hoebeke, Ingrid Moerman,
and Piet Demeester
Challenges of the Internet of Things: IPv6 and Network Management 328
Nabil Benamar, Antonio Jara, LatifLadid, and Driss El Ouadghiri
Towards Privacy-Preserving Data Sharing in Smart Environments 334
Jose L. Hernandez Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks 340
Marcin Piotr Pawlowski, Antonio J. Jara, and Maciej J. Ogorzalek
X
Session 2: Services, Augmented Reality and Crowdsensingfor the loT
A System to Enable Level-of-Detail Mobile Interaction with Augmented Media
Objects 346
David Gomez, Ana M. Bernardos, and Jose R. Casar
Midgar: Domain-Specific Language to Generate Smart Objects for an Internet
of Things Platform 352
Cristian Gonzalez Garcia, Jordan Pascual Espada,Edward Rolando Nunez-Valdez, and Vicente Garcia-Diaz
A Mobile Crowdsourcing Platform for Urban Infrastructure Maintenance 358
Jose Pablo Gomez Barron, Miguel Angel Manso, Ramon Alcarria,
and Rufino Perez-Gomez
Extending the EPCIS with Building Automation Systems: A New Information
System for the Internet of Things 364
Nam Ky Giang, Seonghoon Kim, Daeyoung Kim, Markus Jung,
and Wolfgang Kastner
Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective 370
Aitor Gomez-Goiri, ihigo Goiri, and Diego L6pez-de-lpiha
Session 3: Big Data and Software Engineering for the loT
Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions
and Opportunities 376
Antonio J. Jara, Dominique Genoud, and Yann Bocchi
Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid
Index 381
Jine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, and Zhangbing Zhou
Codesign-Oriented Platform for Agile Internet of Things Prototype
Development 387
Jonathan Ruiz-De-Garibay, AitorAlmeida, Szilard A. Kados,
Adolfo Garcia-Corcuera, and Diego Lopez-De-lpina
Exploiting the Internet of Things for Systems Engineering: Breaking Down
the Barriers between Siloed Engineering Teams 393
Ian Giblett
Smart City Data Stream Visualization Using Glyphs 399
Felix Jesus Villanueva, Cesar Aguirre, David Villa, Maria Jose Santofimia,
and Juan Carlos Lopez
xi
Session 4: Applications for the loT
Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing 404
D. Gachet Paez, F. Aparicio, M. De Buenaga, and Juan Ramon Ascanio
Team Up with Eco-aware Everyday Things to Green Your Workplace! 409
Diego Casado-Mansilla, Juan Lopez-De-Armentia, Pablo Garaizar,
and Diego Lopez-de-lpina
Test Set Validation for Home Electrical Signal Disaggregation 415
Luc Dufour, Dominique Genoud, Gianluca Rizzo, Antonio J. Jara, Pierre Roduit,
Jean-Jacques Bezian, and Bruno Ladevie
ekoNET - Environmental Monitoring Using Low-Cost Sensors for Detecting
Gases, Particulate Matter, and Meteorological Parameters 421
Boris Pokric, Srdan Kreo, Dejan Drajic, Maja Pokric, Ivan Jokic,
and Milena Jovasevic-Stojanovic
FINGNet 2014
Session 1: Security Issues and New ApplicationsService Security for Smart Grid System 427
Inshil Doh, Jiyoung Urn, and Kijoon Chae
Security of Selected Future Internet Architectures: A Survey 433
Rahamatullah Khondoker, Beny Nugraha, Ronald Marx, and Kpatcha Bayarou
A Remote Lock System Using Bluetooth Communication 441Hae-Duck J. Jeong, Jiyoung Lim, Wooseok Hyun, and Woojin Lee
Multi-defense Mechanism against DDoS in SDN Based CDNi 447
Nishat-I-Mowla, Inshil Doh, and Kijoon Chae
ITAUC 2014
Session 1: Networking Coding and SecurityA Credit-Based Incentive Protocol for Stimulating Network-Coded CooperativeContent Distribution in VANET
452
Ing-Chau Chang and Jacky Lo
NFC Attacks Analysis and Survey 458Cheng-Hao Chen, luon-Chang Lin, and Chou-Chen Yang
QoS Based Performance Evaluation for the Cooperative CommunicationSystems in Decode-and-Forward Mode
463Jyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin,and Hsing-Chung Chen
xii
Session 2: Mobile and Wireless Networks
Energy Efficiency of Bandwidth Expansion Algorithms in Wireless
Communication Systems 468
Yung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, and Ching-Mu Chen
An Improving Localization Scheme Using Mobile Anchors with Directional
Antennas in Wireless Sensor Networks 473
Young-Long Chen, Tzu-Chieh Sun, Neng-Chung Wang, and Shin-You Shie
A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless
Sensor Networks 477
Neng-Chung Wang, Yung-Kuei Chiang, Young-Long Chen, and Chih-Hung Hsieh
Towards Implementing Web-Based Adaptive Application Mobility Using Web
Real-Time Communications 483
Dan Johansson and Mikael Holmgren
MCNCS 2014
Session 1: Privacy and Social Issues in the Public Internet
Services
High-Efficient Multi-key Exchange Protocol Based on Three-Party
Authentication 487
Kun-Lin Tsai, Yi-Li Huang, Fang-Yie Leu, Jiu-Soon Tan, and Mengyuan Ye
Interoperability between Federated Authentication Systems 493
Luigi Catuogno and Clemente Galdi
A Secure Authentication Scheme of Health Care Based on the Cloud 499
Chin-Ling Chen, Tsai-Tung Yang, and Fang-Yie Leu
A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security 505
Sen-Tarng Lai, Fang-Yie Leu, and William Cheng-Chung Chu
Session 2: SOP and Data Service/Detection
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP,
and ISO27037 SOP 511
l-Long Lin, Yun-Sheng Yen, and Fang-Yie Leu
An Efficient Protocol for Reliable Data Communication on Dataless Devices 517
Arcangelo Castiglione, Raffaele Pizzolante, Bruno Carpentieri,
and Alfredo De Santis
Minimum Cost Content Object Reconstruction in Multi-tier Servers 523
Lung-Pin Chen, Chih-Wei Hsieh, and Fang-Yie Leu
xiii
Foreground Object Detection in Complex Scenes Using Cluster Color
Chung-Chi Lin, Wen-Kai Tsai, and Chishyan Liaw
529
PISPIS 2014
Session 1: Privacy and Social Issues in the Public Internet
Services
Anonymous Authentication Scheme Based on Proxy Group Signature
for Wireless MESH Network 533
Tianhan Gao, Qidi Miao, and Nan Guo
Threats and Countermeasures on a 4G Mobile Network 538
Seongmin Park, Sekwon Kim, Joohyung Oh, Myoungsun Noh, and Chaetae Im
An Intuitive Computer Forensic Method by Timestamp Changing Patterns 542
Gyu-Sang Cho
Anti-theft Solusions for In-Vehicle Electronic Devices 549
Kyungroul Lee, Hyungjun Yeuk, Jaein Kim, and Kangbin Yim
Anonymous Credential-Based Privacy-Preserving Identity Verification
for Business Processes 554
Nan Guo, Yuanting Jin, and Kangbin Yim
SMEUCE 2014
Session 1: Ubiquitous Commerce Engineeringand Information ManagementA Comparative Study on the Performance of Electronic Reservation Services 560
Mei Hua Huang, Zhao-Yu Liu, and Perng-Fei Huang
Study of e-Business and Long-Established Companies in Japan 567
Hidekazu Sone and Innan Sasaki
Media Coverage and Stock Return an Impulse Response Analysis 570
Kuei-Yuan Wang, Chien-Kuo Chen, and Hsiao-Chi Wei
Analysts' Forecasts and Institutional Investors' Behavior 575
Mei-hua Liao and Chia-Yun Chang
How Does the Ratio and Part-Time Situation of Independent Directors Affect
Firm Performance? 580
Ying-Li Lin, Hsiu-Feng Huang, and Shu-Chen Chen
xiv
WAIS 2014
Session 1: Privacy and Security
Privacy-Preserving Technology for Secure Utilization of Sensor Data
(Extended Abstract) 583
Tetsuya Izu, Takao Ogura, Yumi Sakemi, Masahiko Takenaka, and Hiroshi Tsuda
On the Vulnerability of Ghost Domain Names 584
Hiroaki Kikuchi and Tomohiro Arimizu
Visualization of SSL Setting Status Such as the FQDN Mismatch 588
Yuji Suga
New Privacy-Preserving Method for Matching Location Data 594
Mebae Ushida, Yuji Yamaoka, Kouichi Itoh, and Hiroshi Tsuda
Author Index 600
XV