main-content

## Über dieses Buch

This book presents the latest research findings and innovative theoretical and practical research methods and development techniques related to the emerging areas of information networking and their applications.

Today’s networks and information systems are evolving rapidly, and there are several new trends and applications, such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These networks have to deal with the increasing number of users, provide support for different services, guarantee the QoS, and optimize the network resources, and as such there are numerous research issues and challenges that need to be considered and addressed.

## Inhaltsverzeichnis

### A Fuzzy-Based System for Actor Node Selection in WSANs for Improving Network Connectivity and Increasing Number of Covered Sensors

Wireless Sensor and Actor Network (WSAN) is formed by the collaboration of micro-sensor and actor nodes. The sensor nodes have responsibility to sense an event and send information towards an actor node. The actor node is responsible to take prompt decision and react accordingly. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters: Size of Giant Component (SGC), Distance to Event (DE), Remaining Energy (RE) and Number of Covered Sensors (NCS) as new parameter. The output parameter is Actor Selection Decision (ASD). The simulation results show that by increasing SGC to 0.5 and 0.9, the ASD is increased 12% and 68%, respectively.

Donald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli

### A Delay-Aware Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks

In opportunistic networks the communication opportunities (contacts) are intermittent and there is no need to establish an end-to-end link between the communication nodes. The enormous growth of devices having access to the Internet, along the vast evolution of the Internet and the connectivity of objects and devices, has evolved as Internet of Things (IoT). There are different issues for these networks. One of them is the selection of IoT devices in order to carry out a task in opportunistic networks. In this work, we implement a Fuzzy-Based System for IoT device selection in opportunistic networks. For our system, we use four input parameters: IoT Message Timeout Ratio (MTR), IoT Contact Duration (IDCD), IoT Device Storage (IDST) and IoT Device Remaining Energy (IDRE). The output parameter is IoT Device Selection Decision (IDSD). The simulation results show that the proposed system makes a proper selection decision of IoT devices in opportunistic networks. The IoT device selection is increased up to 18% and 28% by increasing IDST and IDRE, respectively.

Miralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli

### A Fuzzy-Based Approach for Improving Peer Awareness and Group Synchronization in MobilePeerDroid System

In this work, we present a distributed event-based awareness approach for P2P groupware systems. The awareness of collaboration will be achieved by using primitive operations and services that are integrated into the P2P middleware. We propose an abstract model for achieving these requirements and we discuss how this model can support awareness of collaboration in mobile teams. We present a fuzzy-based system for improving peer coordination quality according to four parameters. This model will be implemented in MobilePeerDroid system to give more realistic view of the collaborative activity and better decisions for the groupwork, while encouraging peers to increase their reliability in order to support awareness of collaboration in MobilePeerDroid Mobile System. We evaluated the performance of proposed system by computer simulations. From the simulations results, we conclude that when AA, SCT and GS values are increased, the peer coordination quality is increased. With increasing of NFT, the peer coordination quality is decreased.

Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli

### A Hybrid Simulation System Based on Particle Swarm Optimization and Distributed Genetic Algorithm for WMNs: Performance Evaluation Considering Normal and Uniform Distribution of Mesh Clients

The Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure because they have many advantages such as low cost and increased high speed wireless Internet connectivity. In our previous work, we implemented a Particle Swarm Optimization (PSO) based simulation system, called WMN-PSO, and a simulation system based on Genetic Algorithm (GA), called WMN-GA, for solving node placement problem in WMNs. In this paper, we implement a hybrid simulation system based on PSO and distributed GA (DGA), called WMN-PSODGA. We analyze the performance of WMNs using WMN-PSODGA simulation system considering Normal and Uniform client distributions. Simulation results show that the WMN-PSODGA has good performance for Normal distribution compared with the case of Uniform distribution.

Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa

### Evaluation of Table Type Reader for 13.56 MHz RFID System Considering Distance Between Reader and Tag

RFID system is one of the key technology to bring the efficiency to the automatic rental of goods or the automatic adjustment of shopping. In this paper, we evaluate the basic performance of a table type RFID reader which is a key device to offer these services. Furthermore, in order to increase the communication performance, we consider the use of a parasitic element on the table type RFID reader and show its usefulness.

Kiyotaka Fujisaki

### A Position Detecting System Using Supersonic Sensors for Omnidirectional Wheelchair Tennis

The wheelchair with good performance for the aged and disabled is attracting attention from the society. Also, the wheelchair can provide the user with many benefits, such as maintaining mobility, continuing or broadening community social activities, conserving energy and enhancing quality of life. The wheelchair body must be compact enough and should be able to make different movements in order to have many applications. In our previous work, we presented the design and implementation of an omnidirectional wheelchair. In this paper, we propose a position detecting system using supersonic sensors. The proposed system can find correctly the wheelchair position for collision avoidance.

Keita Matsuo, Leonard Barolli

### Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking

Recently, network consumers use Internet for getting contents: videos, musics, photos, and other contents created by many producers. Those contents accelerate the increasing traffic volumes. For reducing the increasing traffic volume to keep stabilities of broadband network, realizing the concept of CCN (Contents Centric Networking) is strongly required. The NDN (Named Data Networking) which is the most popular network architecture have been proposed to realize the concept of CCN. However, it have been also reported that the NDN is vulnerable to CIFA (Collusive Interest Flooding Attack). In this paper, we propose a novel distributed algorithm for detecting CIFA for keep availabilities of NDN. The results of computer simulations confirm that our proposal can detect and mitigate the effects of CIFA, effectively.

Tetsuya Shigeyasu, Ayaka Sonoda

### An Energy-Efficient Dynamic Live Migration of Multiple Virtual Machines

In this paper, we propose an algorithm to migrate virtual machines to reduce the total electric energy consumption of servers. Here, virtual machines are dynamically resumed and suspended so that the number of processes on each virtual machine can be kept fewer. In addition, multiple virtual machines migrate from a host server to a more energy-efficient guest server. In our previous studies, time to migrate virtual machines is assumed to be zero. The more often a virtual machine migrates, the longer time it takes to perform processes on the virtual machine. We propose a model to estimate the electric energy consumption of servers by considering the migration time of each virtual machine. By using the model, virtual machines to migrate and to perform processes are selected so that the total electric energy consumption can be reduced. In the evaluation, we show the total electric energy consumption of servers can be reduced compared with other algorithms.

Dilawaer Duolikun, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

### Evaluation of an Energy-Efficient Tree-Based Model of Fog Computing

A huge number of devices like sensors are interconnected in the IoT (Internet of Things). In the cloud computing model, processes and data are centralized in a cloud. Here, networks are congested and servers are overloaded due to heavy traffic from sensors. In order to reduce the delay time and increase the performance, data and processes to handle the data are distributed to not only servers but also fog nodes in fog computing models. On the other hand, the total electric energy consumed by fog nodes increases to process a sensor data. In this paper, we newly propose a tree-based fog computing model to distribute processes and data to servers and fog nodes so that the total electric energy consumption of nodes can be reduced in the IoT. In the evaluation, we show the total electric energy consumption of nodes in the tree-based model is smaller than the cloud computing model.

Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

### Object-Based Information Flow Control Model in P2PPS Systems

In the P2PPS (P2P (peer-to-peer) type of topic-based PS (publish/subscribe)) model, each peer process (peer) publishes and subscribes event messages which are characterized by topics with no centralized coordinator. An illegal information flow occurs if an event message $$e_j$$ej published by a peer $$p_j$$pj carries information on some topics into the peer $$p_i$$pi, which the target peer $$p_i$$pi is not allowed to subscribe. In our previous studies, the SBS, TBS, and FS-H protocols are proposed to prevent illegal information flow among peers by banning event messages. In the protocols, the number of topics kept in every peer monotonically increases. Hence, most of the event messages are banned. In this paper, we newly consider the P2PPSO (P2PPS with object concept) model where the number of topics kept in every peer increases and decreases each time objects obtained by every peer are updated. In order to prevent illegal information flow from occurring in the P2PPSO system, we newly propose a TOBS (topics of objects-based synchronization) and TSOBS (topics and states of objects-based synchronization) protocols. In the TOBS protocol, it is simpler to detect illegal information flow than the TSOBS protocol. On the other hand, the fewer number of event messages are banned in the TSOBS protocol than the TOBS protocol.

Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

### Performance Evaluation of Energy Consumption for Different DTN Routing Protocols

In this paper, we evaluate the energy consumption of different routing protocols in a Delay Tolerant Network (DTN). Seven groups with three stationary sensor nodes for each group sense the temperature, humidity and wind speed and send these data to a stationary destination node that collects them for statistical and data analysis purposes. The opportunistic contacts will exchange the sensed data to different relay nodes that are pedestrians and cyclist equipped with smart devices moving in Tirana city roads, until the destination node is reached. For simulations we use the Opportunistic Network Environment (ONE) simulator. Nodes in this DTN are energy constrained and play an important role in the success of delivering messages. When the energy of a node is low chance to deliver messages across the network. In this work, we evaluate and compare the performance of different routing protocols in order to find the energy-efficient routing protocol to be used for message transmission for our DTN application. We evaluate the nodes average remaining energy, the number of dead nodes, delivery probability and overhead ratio for different routing protocols.

Evjola Spaho, Klodian Dhoska, Kevin Bylykbashi, Leonard Barolli, Vladi Kolici, Makoto Takizawa

### A Robot Gesture Framework for Watching and Alerting the Elderly

Watching and medical care for the elderly is one of promising application fields of IoT. Humanoid robots are considered to be useful agents for not only relaxing the elderly but also watching and alerting them in a daily life. Detecting and preventing the risk of indoor heat stroke is an important issue especially for the elderly who live alone. A method for reliably conveying the possible danger of the indoor heat stroke to the elderly is a crucial factor to implement a practical system. In this paper, we describe the system for informing unusual conditions to the elderly by using a communication robot that normally gives users healing. We designed and implemented a set of normal and special motions for a desktop humanoid robot and evaluated whether the robot motions effectively make users aware of abnormal situations.

Akihito Yatsuda, Toshiyuki Haramaki, Hiroaki Nishino

### A Robot Assistant in an Edge-Computing-Based Safe Driving Support System

In this paper, we describe a robot-based interface for presenting important information to assist safety driving. We have been developing a safe driving support system consisting of various devices for sensing the in-vehicle environment and driver’s vital signals, a set of edge computing nodes for analyzing the sensed data, and actuators for presenting the analyzed results to the driver. Because visual and auditory messages are commonly used in an instrumental panel, an audio system, and a navigation system in the car, adding similar notification methods may hinder the driver’s safety driving operations. We, therefore, propose to use robot motions with voice messages as a new way of delivering important information to the driver. We designed and implemented two sets of the driver assisting methods using a real robot placed in a vehicle and a visual robot aid moving on a monitor screen. We conducted a comparative experiment among the methods to verify their effectiveness and practicality.

Toshiyuki Haramaki, Akihito Yatsuda, Hiroaki Nishino

### The Improved Transmission Energy Consumption Laxity Based (ITECLB) Algorithm for Virtual Machine Environments

Various types of distributed applications are realized in server cluster systems equipped with virtual machines like cloud computing systems. On the other hand, a server cluster system consumes a large amount of electric energy since a server cluster system is composed of large number of servers and each server consumes the large electric energy to perform application processes on multiple virtual machines. In this paper, the improved transmission energy consumption laxity based (ITECLB) algorithm is proposed to allocate communication processes to virtual machines in a server cluster so that the total electric energy consumption of a server cluster and the average transmission time of each communication process can be reduced. We evaluate the ITECLB algorithm in terms of the total electric energy consumption of a server cluster and the average transmission time of each process compared with the transmission energy consumption laxity based (TECLB) algorithm.

Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa

### Continuous k-Nearest Neighbour Strategies Using the mqrtree

In this paper, two strategies for processing a continuous k-nearest neighbor query for location-based services are proposed. Both use a spatial access method, the mqrtree, for locating a safe region. The mqrtree supports searching within the structure, so searches from the root are not required - a property which is exploited in the strategies. However, the proposed strategies will work with most spatial access methods. The strategies are evaluated and compared against a repeated nearest neighbor search. It is shown that both approaches achieve significant performance gains in reducing the number of times a new safe region must be identified, in both random and exponentially distributed points sets.

Wendy Osborn

### Developing a Low-Cost Thermal Camera for Industrial Predictive Maintenance Applications

This paper presents the development and evaluation of a low-cost thermal camera based on off-the-shelf components that can be used to predict failures of industrial machines. On the sensing side the system is based on a LWIR thermal camera (FLiR Lepton), whereas for the data acquisition it uses an ARM Cortex-M4F micro-controller (Texas Instruments MSP432) running FreeRTOS. For the data communications the system uses a Wi-Fi transceiver with an embedded IPV4 stack (Texas Instruments CC3100), which provides seamless integration with the Cloud back-end (Amazon AWS) used to retrieve, store and process the thermal images. The paper also presents the calibration method used to obtain the relation between the camera raw output and the actual object temperature, as well the measurements that have been conducted to determine the overall energy consumption of the system.

Alda Xhafa, Pere Tuset-Peiró, Xavier Vilajosana

### Globally Optimization Energy Grid Management System

This paper focuses on the smart grid with cloud and fog computing to reduce the wastage of electricity. A traditional grid is converted into a smart grid to reduce the increase of temperature. A smart grid is the combination of traditional grid and information and communication technology (ICT). The Micro Grid (MG) is directly connected with fog and has small scale power. MG involves multiple sources of energy as a way of incorporating renewable power. The Macro Grid has a large amount of energy, and it provides electricity to the MG and to the end users. Clusters are the number of buildings having multiple homes. Some load balancing algorithms are used to distribute the load efficiently on the virtual machines and also helps the maximum utilization of the resources. However, a user is not allowed to communicate directly with MG, a smart meter is used with each cluster for the communication purpose. If the MG is unable to send as much energy as needed then fog will ask cloud to provide energy through macro grid. Optimized bubble sort algorithm is used and it is actually a sorting algorithm. The sorting, in this case, means that the virtual machine sorts on the basis of a load. The virtual machine which has the least load will serve the demand. In this way, the virtual machine works and this mechanism give least response time with high resources utilization. Cloud analyst is used for simulations.

### Efficient Resource Distribution in Cloud and Fog Computing

Smart Grid (SG) is a modern electrical grid with the combination of traditional grid and Information, Communication and Technology. SG includes various energy measures including smart meters and energy-efficient resources. With the increase in the number of Internet of Things (IoT) devices data storage and processing complexity of SG increases. To overcome these challenges cloud computing is used with SG to enhance the energy management services and provides low latency. To ensure privacy and security in cloud computing fog computing concept is introduced which increase the performance of cloud computing. The main features of fog are; location awareness, low latency and mobility. The fog computing decreases the load on the Cloud and provides same facilities as Cloud. In the proposed system, for load balancing we have used three different load balancing algorithms: Round Robin (RR), Throttled and Odds algorithm. To compare and examine the performance of the algorithms Cloud Analyst simulator is used.

### Resource Allocation over Cloud-Fog Framework Using BA

Edge computing or fog computing (FG) are introduced to minimize the load on cloud and for providing low latency. However, FG is specified to a comparatively small area and stores data temporarily. A cloud-fog based model is proposed for efficient allocation of resources from different buildings on fog. FG provides low latency hence, makes the system more efficient and reliable for consumer’s to access available resources. This paper proposes an cloud and fog based environment for management of energy. Six fogs are considered for six different regions around the globe. Moreover, one fog is interconnected with two clusters and each cluster contains fifteen numbers of buildings. All the fogs are connected to a centralized cloud for the permanent storage of data. To manage the energy requirements of consumers, Microgrids (MGs) are available near the buildings and are accessible by the fogs. So, the load on fog should be balanced and hence, a bio-inspired Bat Algorithm (BA) is proposed which is used to manage the load using Virtual Machines (VMs). Service broker policy considered in this paper is closest data center. While considering the proposed technique, results are compared with Active VM Load Balancer (AVLB) and Particle Swarm Optimization (PSO). Results are simulated in the Cloud Analyst simulator and hence, the proposed technique gives better results than other two load balancing algorithms.

### Cloud-Fog Based Smart Grid Paradigm for Effective Resource Distribution

Smart grid (SG) provides observable energy distribution where utility and consumers are enabled to control and monitor their production, consumption, and pricing in almost, real time. Due to increase in the number of smart devices complexity of SG increases. To overcome these problems, this paper proposes cloud-fog based SG paradigm. The proposed model comprises three layers: cloud layer, fog layer, and end user layer. The 1st layer consists of the cluster of buildings. The renewable energy source is installed in each building so that buildings become self-sustainable with respect to the generation and consumption. The second layer is fog layer which manages the user’s requests, network resources and acts as a middle layer between end users and cloud. Fog creates virtual machines to process multiple users request simultaneously, which increases the overall performance of the communication system. MG is connected with the fogs to fulfill the energy requirement of users. The top layer is cloud layer. All the fogs are connected with a central cloud. Cloud provides services to end users by itself or through the fog. For efficient allocation of fog resources, artificial bee colony (ABC) load balancing algorithm is proposed. Finally, simulation is done to compare the performance of ABC with three other load balancing algorithms, particle swarm optimization (PSO), round robin (RR) and throttled. While considering the proposed scenario, results of these algorithms are compared and it is concluded that performance of ABC is better than RR, PSO and throttled.

### Effective Resource Allocation in Fog for Efficient Energy Distribution

Fog computing is used to distribute the workload from cloud, decrease Network Latency (NL) and Service Response Time (SRT). Cloud have the capability to respond to too many requests from consumer side, however, the physical distance between a consumer and cloud is far than the consumer and fog. Fog is limited to a specific location, moreover, fog is meant to deal requests locally and helps out in processing the Consumer’s Requests (CRs) and provide efficient response. A fog holds the consumer’s data temporarily, processes it and provides response then sends it to cloud for permanent storage. Apart from this, it also sends the consumer’s data when Micro Grids (MGs) are not able to fulfill the consumer’s energy demand. Cloud communicates with Macro Grid. Fog and cloud computing concepts are integrated to create an environment for effective energy management of a building in a residential cluster. Fog deals with requests at the consumer’s end, because it is nearer to the consumer than a cloud. The theme of this paper is efficient allocation of Virtual Machines (VMs) in a fog, therefore, Insertion Sort Based Load Balancing Algorithm (ISBLBA) is used for this purpose. Simulations have been conducted, comparing ISBLBA to Round Robin (RR) technique and results regarding fog performance, cluster performance and cost are elucidated in the Sect. 5.

### Optimized Load Balancing Using Cloud Computing

The concept of fog computing is initiated to mitigate the load on cloud. Fog computing assists cloud computing services. It extends the services of cloud computing. The permanent storage of the data is come to pass in cloud. An environment based on fog and cloud is providd to manage the energy demand of the consumers. It deals with the data of buildings which are linked with clusters. To assist cloud, six fogs are deployed in three regions, which are found on three continents of the world. In addition, each fog is connected with clusters of buildings. There are eighty buildings in each cluster. These buildings are Smart Grid (SG) buildings. For the management of consumers energy demand, Micro Grids (MGs) are available near by buildings and reachable by fogs. The central object is to manage the energy requirements, so, fog assists consumers to attain their energy requirements by using MGs and cloud servers that are near to them. However, for balancing the load on cloud the implementation of an algorithm is needed. Virtual Machines (VMs) are also required. Pigeon hole algorithm is used for this purpose. Using proposed techniques results are compared with Round Robin (RR) which gives better results. The proposed technique in this paper is showing better results in terms of response time.

### A Cloud-Fog Based Smart Grid Model Using Max-Min Scheduling Algorithm for Efficient Resource Allocation

Cloud-fog infrastructure revolutionized the modern world, providing, low latency, high efficiency, better security, faster decision making, while lowering operational cost [1]. However, integration of Smart Grid (SGs) with cloud-fog platform provides high quality supply and secure generation, transmission and distribution of power; uninterrupted demand-supply chain management. In this paper, integration of SG uses cloud-fog based environment is proposed, for better resource distribution. Six fogs are considered in different geographical regions. Whereas, each fog is connected with clusters, each cluster consists of 500 smart homes. In order to fulfill energy demand of homes, fogs receive a number of requests, where different load balancing algorithms are used on Virtual Machines (VMs), in order to provide efficient Response Time (RT) and Processing Time (PT). However, in this paper, Max-Min algorithm is proposed, for load balancing with advanced service broker policy. Considering the proposed load balancing algorithm, results are compared with Round Robin (RR), from simulations, we conclude, proposed load balancing algorithms outperform than RR.

Sadia Rasheed, Nadeem Javaid, Saniah Rehman, Kanza Hassan, Farkhanda Zafar, Maria Naeem

### Efficient Energy Management Using Fog Computing

Smart Grid (SG) is a modern electricity network that promotes reliability, efficiency, sustainability and economic aspects of electricity services. Moreover, it plays an essential role in modern energy infrastructure. The main challenges for SG are, how can different types of front end smart devices, such as smart meters and power sources, be used efficiently and how a huge amount of data is processed from these devices. Furthermore, cloud and fog computing technology is a technology that provides computational resources on request. It is a good solution to overcome these obstacles, and it has many good features, such as cost savings, energy savings, scalability, flexibility and agility. In this paper, a cloud and fog based energy management system is proposed for the efficient energy management. This frame work provides the idea of cloud and fog computing with the SG to manage the consumers requests and energy in efficient manner. To balance load on fog and cloud a selection Base Scheduling Algorithm is used. Which assigns the tasks to VMs in efficient way.

### A New Generation Wide Area Road Surface State Information Platform Based on Crowd Sensing and V2X Technologies

Yoshitaka Shibata, Goshi Sato, Noriki Uchida

### Self-Outer-Recognition of OpenFlow Mesh in Cases of Multiple Faults

Recently, renewable systems have received increasing attention. We propose a metabolic architecture that is suitable for the construction of renewable systems. A metabolic architecture-based system is one that can exchange all of its elements dynamically, similar to a multicellular organism. In this way, the system not only maintains homeostasis, but also adapts to environmental changes. We are developing OpenFlow Mesh as a system based on a metabolic architecture. OpenFlow Mesh is a 2 + 1D mesh of OpenFlow switches that recognizes the outer shape, i.e., physical allocations of elements, on the basis of the network structure. Previously, we proposed a propagation-based method for determining the outer shape in the case of single faults. In this paper, we describe a method that can determine the outer shape in the case of multiple faults.

Minoru Uehara

### Deterrence System for Texting-While-Walking Focused on User Situation

In recent years, users of smartphones are increasing explosively, and accidents and troubles due to texting-while-walking (TWW) are rapidly increasing along with this. Previous research on the TWW deterrence system was to display a warning on the screen, notify by voice or vibration, or make the screen dark and invisible when detecting TWW from the acceleration sensor. Although it is possible to detect TWW, but if the user feels the application troublesome, the application may be erased. This is because the TWW is forcibly suppressed even if user judges that the TWW is not dangerous at present or the short and important operation is required. In this research, we develop a suppression system focusing on user’s situation, especially walking speed. During the TWW, the user is notified that the walking speed is low, and the user is urged to increase the walking speed within a safe range. In order to evaluate the effectiveness of this system, we prepared a conventional TWW deterrence system and our proposed system, and asked 17 peoples to do TWW. In the questionnaire after the experiment, 11 people answered that they would like to continue using the system that focused on walking speed.

Megumi Fujiwara, Fumiaki Sato

### Joint Deployment of Virtual Routing Function and Virtual Firewall Function in NFV-Based Network with Minimum Network Cost

It is essential for economical NFV-based network design to determine the place where each network function should be located in the network and what its capacity should be. The authors proposed an algorithm of virtual routing function allocation in the NFV-based network for minimizing the network cost, and provided effective allocation guidelines for virtual routing functions. This paper proposes the joint deployment algorithm of virtual routing function and virtual firewall function for minimizing the network cost. Our evaluation results have revealed the following: (1) Installing a packet filtering function, which is a part of the firewall function, in the sending-side area additionally can reduce wasteful transit bandwidth and routing processing and thereby reduce the network cost. (2) The greater the number of packets filtered by packet filtering function in the sending-side area, the more the reduction of network cost is increased. (3) The proposed algorithm would be approaching about 95% of the deployment with the optimal solution.

Kenichiro Hida, Shin-ichi Kuribayashi

### Consideration of Policy Information Decision Processes in the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain

In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations, the policy information decision processes applied for this scheme are considered and described.

Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa

### Lessons Learned in Tokyo Public Transportation Open Data APIs

Open data is a vital part of new digital economy. It facilitates value creation from combining data from multiple sources. It also important to utilize a massive data flow from emerging IoT (Internet of Things) devices. Future smart cities will consist of a large aggregation of open data APIs. The size and variety of open data APIs provide challenges for usability, consistency, and integrity. The author analyzes issues in open data APIs in the Tokyo public transportation. The author discusses multiple aspects of issues. Then, the author presents a framework with three view models to deal with open data APIs: outcome, cause, and fixes. Finally, the author discusses lessons learned in the Tokyo public transportation open data APIs.

Toshihiko Yamakami

### Slovak Broadcast News Speech Recognition and Transcription System

We have developed a working prototype of automatic subtitling system for transcription, archiving, and indexing of Slovak audiovisual recordings, such as lectures, talks, discussions or broadcast news. To go further in the development and research, we had to incorporate more and more modern speech technologies and embrace nowadays deep learning techniques. This paper describes transition and changes made to our working prototype regarding speech recognition core replacement, architecture changes and new web-based user interface. We have used the state-of-the art speech toolkit KALDI and distributed architecture to achieve better responsivity of the interface and faster processing of the audiovisual recordings. Using acoustic models based on time delay deep neural networks we have been able to lower the system’s average word error rate from previously reported 24% to 15%, absolutely.

Martin Lojka, Peter Viszlay, Ján Staš, Daniel Hládek, Jozef Juhár

### Web Based Interactive 3D Educational Material Development Framework Supporting 360VR Images/Videos and Its Examples

This paper treats one of the activities of ICER (Innovation Center for Educational Resources) in Kyushu University Library of Kyushu University, Japan. It is the development of educational materials using recent ICT for enhancing the educational efficiency in the university. Especially, this activity focuses on the development of attractive and interactive educational materials using 3D CG. So, the authors have already proposed a framework dedicated for the development of web-based interactive 3D educational materials and introduced a couple of practical educational materials actually developed using the proposed framework. For developing more and more attractive educational materials using Virtual Reality (VR)/Augmented Reality (AR), the authors have added newly functionalities to the framework that allows the development of web-based VR/AR applications. Recently, 360VR images/videos have become popular because 360VR recorders are released from several companies. Therefore, the authors also introduced new functionalities that support 360VR images/videos into the framework. This paper describes the details of the introduced functionalities and also shows a couple of example materials developed using the framework.

Yoshihiro Okada, Akira Haga, Wei Shi

### On Estimating Platforms of Web User with JavaScript Math Object

Browser fingerprinting is a technique to identify a device using a combination of information that a server can gather from a browser. In general, the user-agent is known to be one of the most useful features for identification via browser fingerprinting. However, users can easily change the user-agent. This may lead to a decrease in the device identification accuracy. In this paper, we conducted two experiments. First, we proposed a method to estimate the platforms without using the user-agent. In particular, we used the fact that the computational result of a JavaScript math object varies depending on the platform. Using this method, we could classify 14 platforms into nine groups. Five of these uniquely identify the OS and the browser, two uniquely identify the OS and one uniquely identifies the browser. Second, we compared the accuracy of the browser fingerprint with user-agent (FP-A) and the browser fingerprint with our proposed method (FP-B). As a result, the identification accuracy rate with FP-B was only 0.4% lower than that with FP-A.

Takamichi Saito, Takafumi Noda, Ryohei Hosoya, Kazuhisa Tanabe, Yuta Saito

### A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination

Biometric information can be easily leaked and/or copied. Therefore, the biometric information used for biometric authentication should be kept secure. To cope with this issue, we have proposed a user authentication system using a human reflex response. It is assumed that even if people know someone’s reflex characteristics, it is difficult to impersonate that individual, as anyone cannot control his/her reflexes. In this study, we discuss a biometric authentication system using eye-head coordination as a particular instance of reflex-based authentication. The availability of the proposed authentication system is evaluated through fundamental experiments.

Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki

### Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS

Cyber-physical systems (CPS), as fusions of virtual and real worlds, have attracted attention in recent years. CPS realize rationalization and optimization in various domains, by collecting real-world data in the virtual world, analyzing the information, then reacting to the real world. Moreover, attacks on CPS can cause direct damage in the real world. Therefore, with the NIST CPS framework in mind, this paper discusses an approach to designing countermeasures to risks, considering the interactions with a system. Applying the approach of intrusion detection for control systems, this paper also proposes an intrusion detection method using an enhanced whitelist.

Nobuhiro Kobayashi, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, Masakatsu Nishigaki

### Innovative Protocols for Data Sharing and Cyber Systems Security

In this paper will be presented new classes of cryptographic secret sharing procedures dedicated for secure information division and transmission. In particular will be presented two classes of protocols, which allow to share information with application of grammar solutions, as well as personal or behavioral parameters. Some possible application of such technologies will also be presented especially with relation to secure data or services management in distributed structures or Cloud environment.

Urszula Ogiela, Makoto Takizawa, Lidia Ogiela

### Implementation of Mass Transfer Model on Parallel Computational System

At present, parallel computational systems are being used more often for implementation of solutions of many phenomena. One of such phenomena is the mass transfer from one location to another that occurs in many porous building materials and the knowledge about this transfer is significant at least in civil engineering practice. In this paper, we consider a complex mass transfer diffusion model that involves beside water and water vapor, the air presence, and moreover, the phase transition of water to vapor or vice versa. The model was developed recently and its exact solution was found. In this paper, our intention is to implement this exact solution of the model on the parallel computational system HybriLIT. We suggest the sequential and parallel CUDA algorithms for the implementation of the solution. Thus, the speed-up of the parallel implementation is obtained and compared to the sequential implementation as a ratio of 44 s for sequential and 0.004 s for parallel implementation. GPU capacity is compared with total capacity used for problem solution on the sequential level. Input parameters of the problem are found so that the GPU capacity limits are reached.

Miron Pavluš, Tomáš Bačinský, Michal Greguš

### Server System of Converting from Surface Model to Point Model

Handling the 3D CG model as a point clouds uniformly, it will be possible to easily perform data conversion, 3D shape search, and data downsizing. We have developed a system to convert a surface model to a point model and a system to downsize the point model. Then in order to publish these tools, we are currently proceeding to release these software as a service. In this paper, we introduce the service system.

Hideo Miyachi, Isamu Kuroki

### Proposal of a Virtual Traditional Crafting System Using Head Mounted Display

Due to the spread of computers and Internet technologies in recent years, the traditional craft industry is presenting information using personal computer terminals for the purpose of market development. However, consumers must rely on imagination of the tastefulness, texture and scale of traditional crafts because information is presented on a flat display. Therefore, in this research, we have constructed the high presence immersive virtual traditional crafting presentation system. This system provides the high presence immersive virtual traditional crafting presentation experience by fusing “Japanese” and “Western”. Furthermore, this system provides collaborative work functions by realizing remote sharing of space using network technology.

Tomoyuki Ishida, Yangzhicheng Lu, Akihiro Miyakwa, Kaoru Sugita, Yoshitaka Shibata

### Development of AR Information System Based on Deep Learning and Gamification

Recently, several AR systems have been developed and used in various fields. However, in most AR systems, there are some restrictions caused by the usage of AR marker or location information. In this research, in order to solve these problems, AR information system that can recognize object itself based on deep learning was developed. In particular, this system was constructed using client-server model so that the machine learning can be updated while operating the system. In addition, the method of gamification was introduced to gather the learning data automatically from the users when they use the system. The prototype was applied to the AR zoo information system and the effectiveness of the proposed system was validated in the evaluation experiment.

Tetsuro Ogi, Yusuke Takesue, Stephan Lukosch

### A Study on Practical Training with Multiple Large-Scale Displays in Elementary and Secondary Education

To promote effective ICT utilization in the practical training to learn the basics of the industry subjects in elementary and secondary education, we believe that it is important to study the effective utilization of large-scale display systems. In this paper, we studied on the effective practical training by utilization of multiple large-scale display systems in conjunction with the interface for screen operation developed in our previous study. As the approach, we tried the practical training with g multiple large-scale displays using the interface for screen operation in combination with the SAGE2. From this trial, we showed that there is a high possibility that the effective practical training realize to conduct by combining the interface for screen operation and multiple displays environment.

Yasuo Ebara, Hiroshi Hazama

### Implementation and Evaluation of Unified Disaster Information System on Tiled Display Environment

In the event of large disaster, local government will be charged of responsible activity over counter disaster operation. However, conventional procedure for understanding and sharing of disaster information at the headquarters is performed by paper-based documents and indication on paper-based map, it could be difficult to represent of understanding of disaster statuses for multiple headquarters personnel. This paper proposes design and implementation of disaster information system based on ultra high definition display environment using GIS. We have designed the system consists of large and ultra definition display environment as unified shared display at headquarters. Our system considers to implement directly status reporting function, detachment of displaying location and media content and user-system interaction method using smart devices as content controller. We had hands-on based experiment in order to assess usability of our system. The result shows relatively positive feedback for usability of the system by participant consist of non-specialist for counter disaster activity.

Akira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata

### 3D Measurement and Modeling for Gigantic Rocks at the Sea

In this research, we digitally archived large rocks at the sea, which are called “Sanouiwa” in Miyako city. We conducted two types of three-dimensional (3D) measurement techniques. The first is to take pictures by using drone. The second is to use Global Navigation Satellite System (GNSS). The point cloud data was generated from the high resolution camera images by using 3D shape reconstruction software. Finally, we integrated all point cloud data, and we constructed 3D triangular model by using these point cloud data.

Zhiyi Gao, Akio Doi, Kenji Sakakibara, Tomonori Hosokawa, Masahiro Harada

### Adaptive Array Antenna Controls with Machine Learning Based Image Recognition for Vehicle to Vehicle Networks

With the developments of ITS technology, it is considered that the V2V communication is necessary for the new kinds of applications in the future. However, there are actually some subjects of wireless networks between vehicles caused by the fast movements or the radio noise of the moving vehicles. Thus, this paper proposes the Delay Tolerant Network System with the Adaptive Array Antenna controlled by the image recognition for the V2V Networks. In the proposed system, the target vehicle is recognized by the Machine Learning based image recognition system, the Kalman Filter algorithm to modify the influence of the vehicle’s speed or the obstacles in the way of the road controls the direction of the Adaptive Array Antenna. The paper especially deals with the implemented image recognition system and the antenna direction controls from the experimental results of the prototype system, and the results indicate the effectiveness of the proposed system for the V2V networks.

Noriki Uchida, Ryo Hashimoto, Goshi Sato, Yoshitaka Shibata

### Performance Evaluation of a Smartphone-Based Active Learning System for Improving Learning Motivation During Study of a Difficult Subject

In our previous work, we presented an interactive learning process in order to increase the students learning motivation and the self-learning time. We proposed an Active Learning System (ALS) for student’s self-learning. We evaluated the proposed system for each level (low, middle and high level) class and checked the student concentration using our proposed ALS. We found that for a difficult subject, there are only few high level students. The other students are middle or low level students. However, it is important that when using ALS all students should keep their learning motivation. In this paper, we described the results of the performance evaluations of the proposed ALS for a difficult subject. The evaluation results show that the ALS increased the learning efficiently of the students for the difficult subject.

Noriyasu Yamamoto, Noriki Uchida

### A Causally Precedent Relation Among Messages in Topic-Based Publish/Subscribe Systems

Event-driven publish/subscribe (PS) systems are widely used in various types of applications. In this paper, we consider a peer-to-peer (P2P) model of a topic-based PS system which is composed of peer processes (peers) with no centralized coordinator. Here, each peer publishes a message with publication topics while receiving messages whose publication topics are in the subscription topics of the peer. Each peer has to deliver every pair of messages related with respect to topics in the causal order of publication events. In this paper, a message is considered to carry objects whose meanings are denoted by topics. Based on the meanings of objects, we define an object-based-causally (OBC) precedent relation among messages. Based on the OBC precedent relation, we newly propose a protocol to topic-based-causally (TBC) deliver messages to peers. Here, each peer causally delivers event messages which are related with respect to topics. If a message $$m_{1}$$m1 OBC-precedes a message $$m_{2}$$m2, the message $$m_{1}$$m1 TBC-precedes $$m_{2}$$m2.

Takumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

### Fog-Cloud Based Platform for Utilization of Resources Using Load Balancing Technique

Fog based computing concept is used in smart grid (SG) to reduce the load on the cloud. However, fog covers the small geographical area by storing data temporarily and send furnished data to the cloud for long-term storage. In this paper, a fog and cloud base platform integrated is proposed for the effective management of energy in the smart buildings. A request generated from a cluster of building at demand side end is to be managed by Fog. For this purpose six fogs are considered for three different regions including Europe, Africa an North America. Moreover, each cluster is connected to fog, comprises of the multiple number of buildings. Each cluster contains thirty buildings and these buildings consisted 10 homes with multiple smart appliances. To fulfill the energy demand of consumer, Microgrids (MGs) are used through fog. These MGs are placed nearby the buildings. For effective energy utilization in smart buildings, the load on fog and cloud is managed by load balancing techniques using Virtual Machines (VMs). Different algorithms are used, such as Throttled, Round Robin (RR) and First Fit (FF) for load balancing techniques. These techniques are compared for closest data center service broker policy. This service broker policy is used for best fog selection. Although using the proposed policy, three load balancing algorithms are used to compare the result among them. The results showed that proposed policy outperforms cost wise.

### A Practical Indoor Localization System with Distributed Data Acquisition for Large Exhibition Venues

In this paper, we focus on the Wi-Fi based indoor localization in large exhibition venues. We identify and describe the real-world problems in this scenario and present our system. We adopt a passive way to detect mobile devices with the consideration of users’ preference and iOS devices’ privacy issue, and collect signal strength data in a distributed manner which meets the practical demand in exhibition venues and save the power consumption of mobile devices. Since exhibition venues have many restrictions on traditional localization approaches, we propose our approach and solution to fit these special conditions. We propose the clustering and Gaussian process regression (GPR) method to improve localization accuracy. Series of experiments in Hong Kong Convention and Exhibition Centre (HKCEC) show our system’s feasibility and effectiveness. Our approach has significant improvement in the localization accuracy when compared with traditional trilateration, fingerprinting and the state-of-the-art approaches.

Hao Li, Joseph K. Ng, Shuwei Qiu

### Secure Visible Light Communication Business Architecture Based on Federation of ID Management

With the progress of visible light communication (VLC) technology, opportunities for new mobile communication infrastructures and business creation are increasing. Specifically, there are many proposals for spot type broadcasting services linked to positions such as on-the-spot explanations at art museums and information delivery linked with digital signage. However, due to their limited capabilities, investigations into their security measures has been insufficient. On the other hand, in promoting VLC for business in the future, security measures are an important issue. We have previously proposed a secure business architecture through cooperation with VLC, public key encryption technology, and power line communication technology. This architecture provides an “position authentication ID” from a light source, such as an LED, and it is characterized by strict position authentication that encrypts these data using a public key infrastructure (PKI). In this paper, we propose a new business architecture to enable a more secure cooperation through cooperation with the ID management infrastructure, and contribute to the creation of new business by using VLC.

Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi

### Peer-to-Peer Data Distribution System with Browser Cache Sharing

Many services that provide video contents such have been available. Traffic caused by watching videos has been increasing and the traffic will consume network resources on the Internet or networks of contents delivery provides. In this paper, the authors proposed peer-to-peer data distribution system with browser cache sharing to decrease network resource consumption. Nodes that are watching the same video exchange fragments of video data by using WebRTC protocol.

Kazunori Ueda, Yusei Irifuku

### A Dynamism View Model of Convergence and Divergence of IoT Standardization

As IoT (Internet of Things) continues to penetrate everyday life, we witness the increase in the number of IoT standardization activities. This is a kind of business and political conflicts. It can be also viewed as an emergence of new types of standardization. In a world where complicated cyber-physical systems come to exist, legacy view models such as layered view models are not adequate to the new landscape of IoT standardization. As a departure of static structural view of standardization, the author proposes a dynamism model for divergence and convergence.

Toshihiko Yamakami

### Optimized Resource Allocation in Fog-Cloud Environment Using Insert Select

Energy management in modern way is done using cloud computing services to fulfill the energy demands of the users. These amenities are used in smart buildings to manage the energy demands. Entertaining maximum requests in minimum time is the main goal of our proposed system. To achieve this goal, in this paper, a scheme for resource distribution is proposed for cloud-fog based system. When the request is made by the user, the allocation of Virtual Machines (VMs) to the Data Centers (DCs) is required to be done timely for DSM. This model helps the DCs in managing the VMs in such a way that the request entertainment take minimum Response Time (RT). The proposed Insert Select Technique (IST) tackle this problem very effectively. Simulation results depicts the cost effectiveness and effective response time (RT) achievement.

### Smart Grid Management Using Cloud and Fog Computing

Cloud computing provides Internet-based services to its consumer. Multiple requests on cloud server simultaneously cause processing latency. Fog computing act as an intermediary layer between Cloud Data Centers (CDC) and end users, to minimize the load and boost the overall performance of CDC. For efficient electricity management in smart cities, Smart Grids (SGs) are used to fulfill the electricity demand. In this paper, a proposed system designed to minimize energy wastage and distribute the surplus energy among energy deficient SGs. A three-layered cloud and fog based architecture described for efficient and fast communication between SG’s and electricity consumers. To manage the SG’s requests, fog computing introduced to reduce the processing time and response time of CDC. For efficient scheduling of SG’s requests, proposed system compare three different load balancing algorithms: Round Robin (RR), Active Monitoring Virtual Machine (AMVM) and Throttled for SGs electricity requests scheduling on fog servers. Dynamic service broker policy is used to decide that which request should be routed on fog server. For evaluation of the proposed system, results performed in cloud analyst, which shows that AMVM and Throttled outperform RR by varying virtual machine placement cost at fog servers.

### Evaluation of Self-actualization Support System by Using Students Independence Rubric

To actualize own life, proactive action is one of essential skills. However, most students are reactive. Reactive students are characterized in the following no challenge, no thinking, awaiting instructions, and avoidance of trial and error. Our contributions are aiming to provide a proactive action support system for students life, and to evaluate significant of the system. The 7 habits is one of the most powerful schemes for proactive action choice. We are developing proactive action support system by visualization of quadrant II activities called Self-reflector-Plus. Self-reflector-Plus was systematized the first three habits in the 7 habits. Periodic and long-term practice is necessary to gain the significant effect of the 7 habits. In this paper, to examine our system, we have designed rubric to evaluate effect of Self-reflector-Plus. There are 9 components corresponding habit 1 to 3 in the 7 habits.

Yoshihiro Kawano

### Characterizations of Local Recoding Method on k-Anonymity

k-Anonymity is one of the most widely used techniques for protecting the privacy of the publishing datasets by making each individual not distinguished from at least k-1 other individuals. The local recoding method is an approach to achieve k-anonymization through suppression and generalization. The method generalizes the dataset at the cell level. Therefore, the local recoding could achieve the k-anonymization with only a small distortion. As the optimal k-anonymity has been proved as the NP-hard problem, the plenty of optimal algorithm local recoding has been proposed. In this research, we study the characteristics of the local recoding method. In addition, we discover the special characteristic dataset that all generalization hierarchies of each quasi-identifier are identical, called an “Identical Generalization Hierarchy” (IGH) data. We also compare the efficiency of the well-known algorithms of the local recoding method on both $$non-IGH$$non-IGH and IGH data.

Waranya Mahanan, Juggapong Natwichai, W. Art Chaovalitwongse

### A Cloud-Fog Based Environment Using Beam Search Algorithm in Smart Grid

Smart Grid (SG) monitor, analyze and communicate to provide electricity to consumers. In this paper, a cloud and fog computing environment is integrated with SG for efficient energy management. In this scenario world is divided into six regions having twelve fogs and eighteen clusters. Each cluster has multiple buildings and each building comprises of eighty to hundred apartments. Multiple Micro Grids (MG’s) are available for each region. The request for energy is sent to fog and load balancing algorithm is used for balancing the load on Virtual Machines (VMs). Service broker policies are used for the selection of fog. Round Robin (RR), throttled and Beam Search (BS) algorithms are used with service proximity policy. Results are compared for these three algorithms and from this BS algorithm gives better result.

Komal Tehreem, Nadeem Javaid, Hamida Bano, Kainat Ansar, Moomina Waheed, Hanan Butt

### A Microservices-Based Social Data Analytics Platform Over DC/OS

With increasing popularity of cloud services, the microservices architecture has been gaining more attention in the software development industry. The idea of the microservices architecture is to use a collection of loosely coupled services to compose a large-scale software application. In traditional monolithic architecture, by contrast, every piece of code is put together, and the application is developed, tested, and deployed as a single application. Obviously, it is challenging for the traditional architecture to scale properly. In this research, we implemented a social data analytics platform based on the microservices architecture over DC/OS. Specifically, our data analytics service is built by composing many open-source software including Spark, Kafka, and Node.js. On streaming processing, our platform offers a visual interface to show the hottest hashtags of the most popular user posts from an online forum. On batch processing, our platform is able to show the statistics such the top-10 liked or commented posts and the gender counts of the posters. The experimental results show that our data analytics platform can do streaming processing and batch processing successfully and reveal useful analytical results.

Ming-Chih Hsu, Chi-Yi Lin

### Application of Independent Component Analysis for Infant Cries Separation

The research on analysing infant crying has received many attentions in recent years. In our prior work, a baby crying translation method called infant crying translator was proposed and showed high recognition accuracy. However, in a real environment, there may be more than one baby crying. These mixed cries will seriously affect the accuracy of recognition. In order to isolate these mixed cries, the independent component analysis was adopted herein. Experimental results show that the proposed method can separate out the mixed cries and greatly improves the recognition rate of infant crying translator. The recognition rate increased from 34% to 68%.

Chuan-Yu Chang, Chi-Jui Chen, Ching-Ju Chen

### BLE Beacon Based Indoor Position Estimation Method for Navigation

Bluetooth Low Energy (BLE) beacons are useful to estimate a user’s location in indoor situations. Because our university has numerous BLE beacons, they are easy to use for indoor route navigation. For this study, we propose a position estimation method using BLE beacons. Using this method, we eliminate the existing difficulty of error accumulation of earlier systems and improve indoor location estimation accuracy. We designed an indoor position estimation method and conducted an estimation accuracy evaluation experiment comparing the proposed method and existing methods. The experiment results underscore the effectiveness of the proposed method.

Takahiro Uchiya, Kiyotaka Sato, Shinsuke Kajioka

### Metaheuristic Optimization Technique for Load Balancing in Cloud-Fog Environment Integrated with Smart Grid

Energy Management System (EMS) is necessary to maintain the balance between electricity consumption and distribution. The huge number of Internet of Things (IoTs) generate the complex amount of data which causes latency in the processing time of Smart Grid (SG). Cloud computing provides its platform for high speed processing. The SG and cloud computing integration helps to improve the EMS for the consumers and utility. In this paper, in order to enhance the speed of cloud computing processing edge computing is introduced, it is also known as fog computing. Fog computing is a complement of cloud computing performing on behalf of cloud. In the proposed scenario numbers of clusters are taken from all over the world based on six regions. Each region contains two clusters and two fogs. Fogs are assigned using the service broker policies to process the request. Each fog contains four to nine Virtual Machines (VMs). For the allocation of VMs Round Robin (RR), throttle and Ant Colony Optimization (ACO) algorithms are used. The paper is based on comparative discussion of these load balancing algorithms.

### The Optimal Beacon Placement for Indoor Positioning

In recent years, based on the development of low-power transmission technologies, the issue of indoor positioning has also received increasing attention. This paper combines grid technology to transform the indoor positioning of Beacon deployment problems into optimization problems. Considering the RSSI signal drift problem, this optimization model converts the RSSI signal strength to Signal Power Ranking (SPR), which is a combination of Simulated Annealing (SA). In order to obtain the location and transmission power of Beacon, to achieve the objective of providing complete identification and the best identification rate with the minimum number of Beacons. At the same time, we also use the IBM ILOG CPLEX optimization tool to verify the SA algorithm. The simulation results show that under different topologies, the SA algorithm can reach the results with the CPLEX tool in a shorter time.

Ching-Lung Chang, Chun-yen Wu

### A Secure Framework for User-Key Provisioning to SGX Enclaves

Intel Software Guard Extensions (SGX) protects user software from malware by maintaining the confidentiality and integrity of the software executed in secure enclaves on random access memory. However, the confidentiality of its stored executable is not guaranteed. Therefore, secret information, e.g. user keys, should be provided to the enclaves via appropriate secure channels. Although one of the solutions is to use remote attestation function of SGX, there is a potential risk that user keys are exposed to malicious insiders at the service provider of remote attestation. In this paper, we propose a novel and secure framework for user-key provisioning to SGX enclaves. Our framework utilizes sealing function of SGX, and consists of two phases: the provisioning phase and the operation phase. In the provisioning phase, a user key is encrypted by sealing function, and it is stored in storage. Our assumption is that this phase is performed in a secure environment. In the operation phase, the encrypted blob is read from the storage and decrypted. Then, SGX applications can use the user key without exposing it to attackers. We implemented a prototype of our framework using a commercial Intel CPU and evaluated its feasibility.

Takanori Machida, Dai Yamamoto, Ikuya Morikawa, Hirotaka Kokubo, Hisashi Kojima

### Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG

At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the caracteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we employed support vector machines and attempted to improve the gesture recognition method by introducing correlation coefficient and cross-correlation. A series of experiments was carried out in order to evaluate the performance of the method.

Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki

### Person Tracking Based on Gait Features from Depth Sensors

Gait information is a useful biometric because it is a user-friendly property and gait is hard to mimic exactly, even by skillful attackers. Most conventional gait authentication schemes assume cooperation by the subjects being recognized. Lack of cooperation could be an obstacle for automated tracking of users and many commercial users require new gait identification schemes that do not require the help of target users. In this work, we study a new person-tracking method based on the combination of some gait features observed from depth sensors. The features are classified into three groups: static, dynamic distances, and dynamic angles. We demonstrate with ten subjects that our proposed scheme works well and the accuracy of equal error ratio can be improved to 0.25 when the top five features are combined.

Takafumi Mori, Hiroaki Kikuchi

### Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption

Machine learning servers with mass storage and computing power is an ideal platform to store, manage, and analyze data and support decision-making. However, the main issue is providing security and privacy to the data, as the data is stored in a public way. Recently, homomorphic data encryption has been proposed as a solution due to its capabilities in performing computations over encrypted data. In this paper, we proposed an encrypted all convolutional net that transformed traditional all convolutional net into a net based on homomorphic encryption. This scheme allows different data holders to send their encrypted data to cloud service, complete predictions, and return them in encrypted form as the cloud service provider does not have a secret key. Therefore, the cloud service provider and others cannot get unencrypted raw data. When applied to the MNIST database, privacy-preserving all convolutional based on homomorphic encryption predict efficiently, accurately and with privacy protection.

Wenchao Liu, Feng Pan, Xu An Wang, Yunfei Cao, Dianhua Tang

### Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory

It has been reported that many Internet users do not recover personal computers (PCs) that have been infected by computer viruses. To address this problem, we have investigated how to motivate users to remove viruses from their PCs based on the Protection Motivation Theory. Previously, we have reported that the cognitive factors related to response efficacy, responsibility, percentage of performers, and group norm could affect the intention to recover an infected PC. In this study, we created the experimental content to stimulate these cognitive factors and conducted an experiment to verify whether the content would be effective to persuade Internet users to recover infected PCs. Our research confirmed that the content stimulated some cognitive factors and effectively persuaded users to recover their PCs. We also found that some users did not intend to cope with the virus infection because they did not consider the information about the virus infection to be credible.

Kana Shimbo, Shun-ichi Kurino, Noriaki Yoshikai

### Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation

In group signature schemes, signers prove verifiers, their validity of signing through an interactive protocol in zero-knowledge. In lattice-based group signatures with Verifier-local revocation (VLR), group members have both secret signing key and revocation token. Thus, the members in VLR schemes should show the verifiers, that he has a valid secret signing key and his token is not in the revoked members list. These conditions are satisfied in the underlying interactive protocol provided in the first lattice-based group signature scheme with VLR suggested by Langlois et al. in PKC 2014. In their scheme, member revocation token is a part of the secret signing key and has an implicit tracing algorithm to trace signers. For a scheme which generates member revocation token separately, the suggested interactive protocol by Langlois et al. is not suitable. Moreover, if the group manager wants to use an explicit tracing algorithm to trace signers instead the implicit tracing algorithm given in VLR schemes, then the signer should encrypt his index at the time of signing, and the interactive protocol should show signer’s index is correctly encrypted. This work presents a combined interactive protocol that signer can use to prove his validity of signing, his separately generated revocation token is not in the revocation list, and his index is correctly encrypted required for such kind of schemes.

Maharage Nisansala Sevwandi Perera, Takeshi Koshiba

### A Path Search System Considering the Danger Degree Based on Fuzzy Logic

There are many disasters happening in the world and in general it is difficult to predict them. For this reason, there are many disaster prevention centers where the people learn about information, techniques and the ability to take action in relation to disasters and simulates various disasters in the case of emergencies. It is better that people avoid danger as much as possible in everyday life. The conventional path search systems, such as car navigation systems, mainly consider the length of the path. Thus, the system may recommend a dangerous route such as a place easy to a landslide. In this work, we propose a path search system considering the danger degree by using Fuzzy logic. In our proposed system, we use the data of the hazard map as input parameters to decide the danger degree.

Shinji Sakamoto, Shusuke Okamoto, Leonard Barolli

### A Recovery Method for Reducing Storage Usage Considering Different Thresholds in VANETs

Technologies have been developed for providing higher functionality of on-board unit and providing a communication function with other vehicles and roadside units. Nowadays, vehicles can be called as one communication terminal. However, end-to-end communication is difficult because of the lack of end-to-end connectivity. Delay/Disruption/Disconnection Tolerant Networking (DTN) are used as one of a key alternative network for Vehicular Ad-hoc Networks (VANETs). In this paper, we propose a recovery method for reducing storage usage considering different thresholds in VANETs. From the simulation results, we found that our proposed recovery method has a good performance even for sparse or dense network environment.

Shogo Nakasaki, Yu Yoshino, Makoto Ikeda, Leonard Barolli

### Butt-Joint Assembly of Photonic Crystal Waveguide Units for Large Scale Integration of Circuits with Variety of Functions

Photonic crystal (PhC) structure is useful for fabrication of highly integrated optical circuit on single substrate. However, it was reported that repetition of chemical etching process to mount various functions damages the structure itself. Then, a new assembly process of functional units is proposed in this paper. For the assembly of butt joint, transmission and reflection on joint surface is critical. Then, measurement results of butt joint in PhC waveguide is evaluated to show the transmission and reflection characteristics. The waveguide shift $$\varDelta$$Δ was situated in the middle of PhC waveguide by composing two separated basement plate of aluminum. It was found that the waveguide shift $$\varDelta$$Δ up to half of waveguide width is not seriously critical for the transmission and reflection. Application of proposed assembly technique by butt joint is hopeful for fabrication of PhC integrated circuit.

Hiroshi Maeda, Keisuke Haari, Xiang Zheng Meng, Naoki Higashinaka

### Clustering in VANETs: A Fuzzy-Based System for Clustering of Vehicles

In recent years, inter-vehicle communication has attracted attention because it can be applicable not only to alternative networks but also to various communication systems. In this paper, we propose a Fuzzy-based system for clustering of vehicles in VANETs. We evaluate the proposed system by simulations. From the simulation results, we found that when DCC parameter is small and SC is high, the possibility that vehicle remains in the cluster is increased.

Kosuke Ozera, Kevin Bylykbashi, Yi Liu, Makoto Ikeda, Leonard Barolli

### Movement Detection Methods with Wireless Signals and Multiple Sensors on Mobile Phone for Traffic Accident Prevention Systems

In the recent traffic accidents, it has been focused on the pedestrians and the bicycles as well as the automobiles. Especially, it is widely considered that the texting while walking and riding bicycles is extremely dangerous. Thus, this research proposed the mobile traffic accident prevention system with observing the radio signals and various sensors on the smartphone. In the methods, the RSSI levels of IEEE802.11a/b/g/n from others are firstly observed, and the sensors such as the gyro sensor on the smartphone are secondly applied for the modifications of the detection process based on the Markov Chain algorithm. Then, this paper reports the prototype system of the proposed methods, and the experimental results are discussed for the future studies.

Shoma Takeuchi, Noriki Uchida, Yoshitaka Shibata

### A System to Select Reception Channel by Machine Learning in Hybrid Broadcasting Environments

Due to the recent prevalence of the Internet, some TV broadcasting services deliver videos using both electric wave broadcasting systems and the Internet (hybrid broadcasting environments). Video players encounter playback interruptions when they cannot receive a part of video data (video data segment) until the time to play it. The probability to encounter playback interruptions can be reduced by receiving video data segments earlier. However, it is difficult for video players to find from which reception channel (broadcasting system or the Internet) they can receive video data segments earlier since the time required for receiving them depends on various factors such as broadcasting schedules, the number of receiving video players, and so on. To find appropriate reception channels for reducing playback interruptions, we propose a system to select reception channel by machine learning.

Tomoki Yoshihisa, Yusuke Gotoh, Akimitsu Kanzaki

### A Meeting Log Structuring System Using Wearable Sensors

We propose a system that structures a meeting log by detecting and tagging the participants’ actions in the meeting using acceleration sensors. The proposed system detects head movement such as nodding of each participant or motion during utterances by using acceleration sensors attached to the heads of all participants in a meeting. In addition, we developed a Meeting Review Tree, which is an application that recognizes a meeting participants’ utterances and three kinds of actions using acceleration and angular velocity sensors and tags them to recorded movies. In the proposed system, the structure of the meeting is hierarchized into three layers and tagged contexts as follows: The first layer represents the transition of the reporter during the meeting, the second layer represents changes in information of speakers in the report, and the third layer represents motions such as nodding. As a result of the evaluation experiment, the recognition accuracy of the stratified first layer was 57.0% and that of the second layer was 61.0%.

Ayumi Ohnishi, Kazuya Murao, Tsutomu Terada, Masahiko Tsukamoto

### Hiding File Manipulation of Essential Services by System Call Proxy

Security software or logging programs are frequently attacked because they are an obstruction to attackers. Protecting these essential services from attack is crucial to preventing and mitigating damage. Hiding information related to essential services, such as that of the files and processes, can help to deter attacks on these services. This paper proposes a method of hiding file manipulation for essential services. The method makes the files invisible to all services except their corresponding essential services and provides access methods to those files in a virtual machine (VM) environment. In the proposed method, system calls to those files are executed by a proxy process on the other VM. The original system call is not executed in the operating system of the original VM, however, the result of file access is returned to the original process. Thus, the files of essential services are placed on the other VM and other processes on the original VM cannot access to them. Therefore, the proposed method can prevent or deter identification of essential services based on file information monitoring.

Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi

### Evaluation of Broadcasting System for Selective Contents Considering Interruption Time

Due to the recent popularization of digital broadcasting, selective contents broadcasting has attracted much attention. In selective contents broadcasting, although the server delivers contents based on their preferences, users may experience the interruption time while playing their selected contents. To reduce this interruption time, many researchers have proposed scheduling methods. However, since these scheduling methods evaluated the interruption time in simulation environments, we need to evaluate them in network environments. In this paper, we propose a broadcasting system of selective contents and evaluate its effectiveness in network environments.

Takuro Fujita, Yusuke Gotoh

### Play Recognition Using Soccer Tracking Data Based on Machine Learning

In professional football, every play data is recorded such as Pass, Dribble, etc. However, the play data is manually recorded, which requires huge effort. To reduce the human effort, we propose a method to recognize the labels of plays in football games from tracking data. By using features extracted from tracking data, we generate a play classifier model based on machine learning. We have evaluated the proposed method through real tracking data recorded in Japan Professional Football League (J. League). The results have shown that our play recognition is effective for mitigating the heavy workload for play labeling.

Tomoki Imai, Akira Uchiyama, Takuya Magome, Teruo Higashino

### A Graphical Front-End Interface for React.js

We present a graphical front-end interface for creating dynamical web pages by means of React.js. Its user does not have to write JavaScript codes for specifying the dynamical behavior of the web components but has only to draw state-transition diagrams graphically on the developed graphical editor. Using the graphical editor, the user composes a state transition diagram that specifies the dynamical behavior of each web component in terms of circles representing the states of the component and arrows representing the conditioned transitions among the states. Then the developed translator converts the state transition diagrams into web components of React.js in JavaScript that compose the target web page. This system of the graphical editor and the translator enables general users without knowledge and experiences in programming to create dynamical web pages. Wanna-be programmers may start learning JavaScript and React.js by comparing their diagrams and the translated JavaScript codes.

Shotaro Naiki, Masaki Kohana, Shusuke Okamoto, Masaru Kamada

### An Attendance Management System Capable of Mapping Participants onto the Seat Map

We present an attendance management system where the student and the seat position are identified by IC cards of the FeliCa standard. Seated in a classroom, each student first touches his/her student ID card of the FeliCa standard with his/her own Android smartphone and then touches another FeliCa card fixed on the desk at his/her seat. Then the developed Android application software sends the student ID and the seat ID to the server. The developed service program produces the seating list with the student names mapped onto the seat map of the classroom. The seating list can be updated instantly as soon as the students touch the cards after getting seated or moving to other seats in the classroom. Looking at the seating list as a web page, the teacher can easily identify and call on each student. The seating list also helps the teacher spot a blank seat or a student missing, or equivalently, cheating in attendance.

Shinya Kinoshita, Michitoshi Niibori, Masaru Kamada

Yasuhiro Ohtaki

### Anonymous Accessible Bulletin Board System with Location Based Access Control Mechanism

A bulletin board system (BBS) which allows anonymous submission has lower barriers to enter the discussions because everyone can post opinions without any responsibilities. Therefore, there are some risks that “a flaming” occurs, where the discussion is inundated with comments. To suppress emerging such situation, we developed a novel BBS with location-based access control mechanism. The BBS is anonymously accessible by default; however, the access permission to each chat room in the BBS depends on its geospatial information. That is, the chat rooms keep their geographical information when they are created, and users who can access each room must exist near the original location. In this paper, the overview of our system and its applications are described.

Jun Iio, Shogo Asada, Mitsuhiko Kai

### Newly-Added Functions for Video Search System Prototype with a Three-Level Hierarchy Model

This paper describes newly added functions onto ELVIDS, previously presented the three hierarchical video search system. We have developed this system for fostering scholarly use of videos over the three years. The development in the previous phase was mainly for giving functions for users such as retrieving videos, displaying search results, and playing back the videos. As the next phase, we considered adding functions for metadata registrars. In this paper, the background, sample dataset and a protocol for an authentication are firstly described in the earlier chapters. Then, the functions for metadata registration and the authentication including the methods and the interfaces are introduced. Finally, the conclusions and the further works are mentioned.

Tongjin Lee, Jun Iio

### A Location-Based Web Browser Network for Virtual Worlds

This paper proposes a way to construct networks among Web browsers. The building a web-based virtual world needs a lot of computing resource, which means that we need a lot of Web servers. However, if we increase the number of Web servers, the financial and the maintenance cost also increases. In this study, we try to use computing resource on Web browsers. In our previous study, we proposed a way to share data among Web browsers. This way has a problem that is the longer data transfer time when the number of users increases. Therefore, we try to construct small Web browser networks based on the location of each players on a virtual world.

Masaki Kohana, Shusuke Okamoto

### Overview of Digital Forensic Tools for DataBase Analysis

The number of digital devices that people use in everyday life has significantly increased. Since they have become an integral part of everyday life, they contain information that are often extremely sensitive. Modern devices use complex data structures to store data (heterogeneous media files, documents, GPS positions and SQLite databases, etc.), therefore, during a forensic investigation, it has been necessary the adoption of specialized acquisition and analysis tools.

Flora Amato, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato, Francesco Romeo

### Remarks of Social Data Mining Applications in the Internet of Data

Social network analysis attracted interests from both the research and business communities for a strong potential and variety of applications. In addition, this interest has been fuelled by the large success of online social networking sites and the subsequent abundance of social network data produced. A key aspect in this research field is the influence maximization in social networks. In this paper we discuss an overview about the models and the approaches widely used to analyse social networks. In this context, we also discuss data preparation and privacy concerns also considering different kind of approaches based on centrality measures.

Salvatore Cuomo, Francesco Maiorano, Francesco Piccialli

### An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems

Computing power and flexibility provided by cloud technologies represent an opportunity for Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular. Even though the cloud model is considered efficient for Smart Grids, it has stringent constraints in terms of security and reliability. An attack to the integrity or confidentiality of data may have a devastating impact for the system itself and for the surrounding environment. The main security risk is represented by malicious insiders, i.e., malevolent employees having privileged access to the hosting machines. In this paper, we evaluate a powerful hardening approach that could be leveraged to protect synchrophasor data processed at cloud level. In particular, we propose the use of homomorphic encryption to address risks related to malicious insiders. Our goal is to estimate the feasibility of such a security solution by verifying the compliance with frame rate requirements typical of synchrophasor standards.

Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione

### Cooperative Localization Logic Schema in Vehicular Ad Hoc Networks

Localization of nodes in wireless sensor networks (WSNs) is typically obtained by exploiting specific systems such as Global Position System (GPS). In this work we consider a GPS-free scenario and we want to provide a way to precisely estimate the nodes position, by exploiting cooperation mechanisms. Many algorithms have been proposed for environment mapping problem considering a single vehicle perspective, but they do not fully exploit the potential of having a network of nodes where the collaboration can seriously speedup the mapping procedure. In this work, we analyze the Vehicular Ad Hoc Networks (VANets) scenario and we propose a strategy for vehicle pose estimation by exploiting a decentralized clustering technique, and some fixed nodes in the environment called anchors, whose position is already known. The power of this approach is in the cooperative nature of vehicles localization, explained by means of Prolog facts and rules that point out the actual inference procedure leading to the pose estimation.

Walter Balzano, Silvia Stranieri

### FiDGP: A Smart Fingerprinting Radiomap Refinement Method Based on Distance-Geometry Problem

Localization-based services are having a lot of attention in the latest years, due to the widespread availability of mobile smart devices like smartphones. While in outdoor environments it is possible to use Global Navigation Satellite Systems (GNSS) to obtain accurate user position, in indoor environments where sky visibility is an issue good methodologies are still under research. In this context, WiFi fingerprinting based localization systems are quite interesting as they offer good positional accuracy using available network signals stored in a database named RadioMap, without the need of a secondary localization-only infrastructure. In this paper we present FiDGP: A smart Fingerprinting radiomap refinement method based on Distance-Geometry Problem, which exploits wifi-fingerprinting and a DGP-based algorithm in order to provide superior positioning while also keeping the RadioMap updated over time.

Walter Balzano, Fabio Vitale

### Backmatter

Weitere Informationen