Skip to main content

2014 | Buch

E-Business and Telecommunications

International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers

herausgegeben von: Mohammad S. Obaidat, Joaquim Filipe

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

This book constitutes the refereed proceedings of the 9th International Joint Conference on E-Business and Telecommunications, ICETE 2012, held in Rome, Italy, in July 2012. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 18 full papers presented were carefully reviewed and selected from 403 submissions. They cover a wide range of topics in the key areas of e-business and telecommunications.

Inhaltsverzeichnis

Frontmatter

Invited Speaker

Frontmatter
Big Complex Biomedical Data: Towards a Taxonomy of Data
Abstract
Professionals in the Life Sciences are faced with increasing masses of complex data sets. Very few data is structured, where traditional information retrieval methods work perfectly. A large portion of data is weakly structured; however, the majority falls into the category of unstructured data. To discover previously unknown knowledge from this data, we need advanced and novel methods to deal with the data from two aspects: time (e.g. information entropy) and space (e.g. computational topology). In this paper we show some examples of biomedical data and discuss a taxonomy of data with the specifics on medical data sets.
Andreas Holzinger, Christof Stocker, Matthias Dehmer

Data Communication Networking

Frontmatter
Study on a Fast OSPF Route Reconstruction Method Under Network Failures
Abstract
OSPF (Open Shortest Path First), which is used widely on networks, has a Router Dead Interval problem. If a (backup) designated router has stopped operation due to failure, the OSPF routers await a hello packet acknowledgment for the router dead interval to recognize that the designated router has ceased the operation. The Router Dead Interval is 40 sec This interval time is not only long for many real-time applications but also involves huge buffering of data and a burst of traffic after the router reconstruction. To avoid the Router Dead Interval, we propose a fast method of designated router detection by enhanced OSPF. In this report, we show how our method reduces the route reconstruction time from 45 sec to 10 or less on OSPF networks.
Hiroki Doi
Intelligent Monitoring System for Bird Behavior Study
Abstract
Until now, the best way to obtain relevant information about the behaviour of animals is capturing them. However, the procedure to capture individuals cause them stress and introduces an effect on the measurement that can affect the behaviour of the animals. To solve this problems this paper describes a novel intelligent motoring system for birds breeding in nest boxes. This system is based in a network of smart-nest boxes that allows access to the acquired data all over the world through internet. A prototype of the proposed system has been implemented for the evaluation of a lesser kestrel breeding colony in Southern Spain. This prototype has offered in a short time more valuable information that several years of manual captures. This prototype has demonstrated that the proposed system allows short and log time animal behaviour evaluation without interferences or causing stress.
D. F. Larios, C. Rodríguez, J. Barbancho, M. Baena, F. Simón, J. Marín, C. León, J. Bustamante

e-Business

Frontmatter
Three Dimensional Components of e-Business Sustainability
Abstract
e-Business modelling is a prevalent term now days as it converts technology into economic value. The sustainability of the business is another global contemporary issue. Although e-business modelling and sustainability are the two major global trends now but still there is no common understanding about the elements that need to be used for a sustainable e-business model. Surprisingly, none of the e-business modelling approaches even consider sustainability as a major element. In this paper, therefore, after extensive literature review on e-business modelling and sustainability of the business we carefully identify and determine the required elements for a sustainable e-business model. The elements are three dimensional and selected from customer value area, business value area, and process value area so that the modelling elements safeguard the interests of all stakeholders (customer, business, society, and environment) while maintaining the sustainability.
Mohammed Naim A. Dewan, Md. Maruf Hossan Chowdhury, Mohammed A. Quaddus
Consumer Online Search Behavior: A Cross-Industry Analysis Based on User-Level Data
Abstract
Understanding consumer online search behavior is crucial to optimize companies’ paid search advertising campaigns. Standard measures such as the click-through rate do not account for this search behavior over time, which may favor a certain group of search type and, therefore, may mislead managers in allocating their financial spending efficiently. We analyzed a large query log for the occurrence of user-specific interaction patterns within and across three different industries and were able to show that consumers’ online search behavior is indeed a multi-stage process that heavily depends on industry-specific characteristics. For example, whereas a product search within the clothing industry typically begins with general keywords (“sneakers”) and that search process becomes narrowed as it proceeds by including more specific, e.g. brand-related (“sneakers adidas”), keywords, this behavior is a relatively rare event in other industries (e.g., the healthcare industry). Our method to analyze consumer search processes helps companies to identify the role of specific activities within a respective industry and to allocate their financial spending in paid search advertising accordingly.
Florian Nottorf, Andreas Mastel, Burkhardt Funk
eGovernment Interventions: The Multiple Projects Evaluation Problem
Abstract
Consider the scenario where an organ of a public administration, which we refer as the decision-maker, is requested to plan one or more interventions in some framework related to the Information Society or the eGovernment set of actions. The above scenario has been addressed in a recent work [1], where the authors propose a methodology to support the decision-maker in orienting, planning, and evaluating multiple (partially overlapping) interventions. Furthermore, the problem has been formally modeled, and it has been proved that it belongs to the NP-complete class.
In this paper we study the above problem, i.e., the Multiple Projects Evaluation, focusing on its approximability. In particular, we show that the problem admits a \(O(1-\frac{1}{e})-\)approximation algorithm.
Fabrizio d’Amore, Luigi Laura
Strategizing and Revenue Creation in Dynamic Paradigms: A Model to Support Revenue Analysis for Mobile Incumbent Telcos
Abstract
The growth of the Mobile telecommunications business in Italy has largely offset the decrease in revenues coming from fixed telephony. More specifically, we are witnessing a significant growth in data services, mainly driven by connectivity. The competitive landscape is also evolving, thanks to the growing convergence between the markets of Telecommunications, Media and Consumer Electronics. In consideration of the above scenario, this study aims to develop a strategic model in to analyze revenue streams generated by Telcos in the Italian Mobile services segment. This model describes the variation of the main factors influencing income and creates three possible future scenarios (optimistic, pessimistic and expected), affecting these variables in the next 5 years. The goal of the model is to support Telco executives in the identification of any critical areas that may create large gaps in revenue in the coming years and in the formulation of the right strategies.
Antonio Ghezzi, Angela Malanchini, Raffaello Balocco, Marcelo Cortimiglia, Alejandro G. Frank

Optical Communication Systems

Frontmatter
Iteratively Detected and SVD-assisted MIMO Multimode Transmission Schemes
Abstract
In the recent past the concept of MIMO (multiple input multiple output) transmission over multimode fibers has attracted increasing interest in the optical fiber transmission community, targeting at increased fiber throughput or improved bit-error rate performance. In this contribution a coherent \((2 \times 2)\) MIMO (multiple input multiple output) transmission with iterative detection over a measured multimode fiber channel at \(1325\) nm as well as at \(1570\) nm operating wavelength is studied under the constraint of a given fixed data throughput and integrity. For the channel measurements a fibre length of \(1{,}4\) km were chosen. Extrinsic information transfer (EXIT) charts are used for analyzing and optimizing the convergence behaviour of the iterative demapping and decoding. Our results show that in order to achieve the best bit-error rate, not necessarily all MIMO layers have to be activated.
Sebastian Aust, Andreas Ahrens, Steffen Lochmann

Security and Cryptography

Frontmatter
Use of SIMD Features to Speed up Eta Pairing
Abstract
Eta pairing over supersingular elliptic curves is widely used in designing many cryptographic protocols. Because of efficiency considerations, curves over finite fields of small characteristics are preferred. In this paper, we report several of our implementations of eta pairing over finite fields of characteristics two and three. We exploit SIMD features available in Intel processors to speed up eta-pairing computations. We study two ways of vectorizing the computations: horizontal (intra-pairing) and vertical (inter-pairing). We report our experimental results using SSE2 and AVX2 features supported by the Haswell microarchitecture. Our implementations use two popular curves. Recently proposed discrete-logarithm algorithms make these curves less secure than previously thought. We discuss the implications of these developments in the context of our implementations.
Anup Kumar Bhattacharya, Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Aravind Iyer
Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions
Abstract
Redactable signature schemes (\(\mathsf{RSS }\)) permit to remove parts from signed documents, while the signature remains valid. Some \(\mathsf{RSS }\)s for trees allow to redact non-leaves. Then, new edges have to be added to the tree to preserve it’s structure. This alters the position of the nodes’ children and may alter the semantic meaning encoded into the tree’s structure. We propose an extended security model, where the signer explicitly controls among which nodes new edges can be added. We present a provably secure construction based on accumulators with the enhanced notions of indistinguishability and strong one-wayness.
Hermann de Meer, Henrich C. Pöhls, Joachim Posegga, Kai Samelin
Encryption Schemes Secure Against Profiling Adversaries
Abstract
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. User profiling has gained lot of importance today, this activity supports the big business of online advertising at the cost of user privacy. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes. The security notions developed in this paper are also further used to analyze an existing scheme meant for providing security against profilers.
Sandra Díaz-Santiago, Debrup Chakraborty
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets
Abstract
The analysis of large amount of traffic data is the daily routine of Autonomous Systems and ISP operators. The detection of anomalies like denial-of-service (DoS) or distributed denial-of-service (DDoS) is also one of the main issues for critical services and infrastructures. The suitability of metrics coming from the information theory for detecting DoS and DDoS episodes has been widely analyzed in the past. Unfortunately, their effectiveness are often evaluated on synthetic data set, or, in other cases, on old and unrepresentative data set, e.g. the DARPA network dump. This paper presents the evaluation by means of main metrics proposed in the literature of a real and large network flow dataset, collected from an Italian transit tier II Autonomous System (AS) located in Rome. We show how we effectively detected and analyzed several attacks against Italian critical IT services, some of them also publicly announced. We further report the study of others legitimate and malicious activities we found by ex-post analysis.
Angelo Spognardi, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini, Roberto Battistoni

Signal Processing and Multimedia Applications

Frontmatter
Image Segmentation Using Diffusion Tracking Algorithm with Patch Oversampling
Abstract
An image segmentation process can be considered as a process of solving a pixel clustering problem. This paper represents and combines a new clustering algorithm that we call as a Diffusion Tracking (DT) algorithm and a new clustering based image segmentation algorithm. The DT algorithm is related to classical spectral clustering techniques but overcomes some of their problems which guarantees a better starting point for the image segmentation process. The image segmentation process introduced in this paper joins seamlessly to the DT algorithm but can also be used together with other clustering methods like k-means. The segmentation algorithm is based on oversampling pixels from classified patches and using simple statistical methods for joining the information collected. The experimental results at the end of this paper show clearly that the algorithms proposed suit well also for very demanding segmentation tasks.
Lassi Korhonen, Keijo Ruotsalainen
Cloud-Based Automatic Video Editing Using Keywords
Abstract
In this paper we propose a cloud-based video editing application designated to manage abundance of video using automatic video editing and summarization algorithms. Our approach uses text processing, statistic analysis and information retrieval techniques to analyze audio transcripts of video corpus. A model approach of mashup based on keywords is proposed. A video editing testbed has been designed and implemented. Finally the video editor engine is deployed on Openstack cloud computing platform which deliver a massively scalable cloud operating system.
Abdelkader Outtagarts, Sylvain Squedin, Olivier Martinot
Controlling a Wheelchair Through Head Movement Through Artificial Vision and Using Speech Recognition
Abstract
The Purpose of this project is the control of motion and direction in real time of a wheel chair, using machine vision algorithms. The main goal of this project is signal acquisition from the video camera and collision sensors for post processing in the C# algorithms and later obtaining motor control in the traction mechanism of the wheelchair. The C# algorithm has several tasks. The first is to obtain the real time image from web cam and later processing for the identification of the direction of movement of the human face. The second is to calculate the speed of the movement for generation of the PWM output for motor movement. This information output uses the RS232C driver with a microcontroller card attached to a motor control box in the wheel chair mechanism. The final task is to obtain the collision sensor status for security implementation, all in real time. The main reason for development of an implementation of this solution is the use of open source software tools for a more stable platform in the base system due to the characteristics of the end use of the system. The end user of the system will be a quadriplegic.
Ricardo Fuentes Covarrubias, Andrés Gerardo Fuentes Covarrubias, Cristina Conde Vilda, Isaac Martin de Diego, Enrique Cabello

Wireless Information Networks and Systems

Frontmatter
Assessment of Multimedia Services QoS/QoE over LTE Networks
Abstract
The evaluation of the Quality of Experience (QoE) for data services over wireless technologies is currently a hot topic. In this paper we present service performance evaluation method that is able to estimate both the Quality of Service (QoS) and QoE for different data services over cellular networks. This method is based on specific performance indicators that are evaluated at each layer of the terminal’s protocol stack following a bottom-up process from the physical layer up to the application layer. Then, specific utility functions for each data service are used to map QoS into QoE in terms of Mean Opinion Score (MOS). Three different data services (web, YouTube and voice over IP) have been evaluated over a typical LTE network scenario. Performance results show that the MOS is largely affected by the radio level performance (error rate, throughput and delay), so proper protocols’ configuration critical to achieve a desired service quality.
Gerardo Gómez, Esther de Torres, Javier Lorca, Raquel García, Quiliano Pérez, Estefanía Arias
Using TETRA Technology for Improving a Decentralized Positioning System for Trains and Trams
Abstract
Today virtually all of our vehicles have GPS devices that provide highly accurate positioning. This type of positioning system has also come to public transportation such as trains and trams. These positioning systems represent a cost effective solution for railway companies operating in not evolved regions. The problem in these cases is that the routes of these trains pass through areas where coverage to calculate the position, or to send that position to the control center, is not sufficient. This paper focuses on the problem of the lack of coverage for the wireless transmission of positioning information. It discusses the feasibility of incorporating TETRA radio technology to increase the reliability of communications systems based on commonly mobile technologies (GPRS/3G). The main objective is to analyze the performance of TETRA technology for transmitting positioning information on a rail system. In the analysis, this technology is compared to alternatives based on GPRS and 3G.
Roberto Carballedo, Pablo Fernández, Unai Hernández Jayo, Asier Perallos
Knowledge Acquisition System based on JSON Schema for Electrophysiological Actuation
Abstract
Data stored and transferred through the Internet increases every day. The problem with these data begins with the lack of structure, making information disperse, uncorrelated, non-transparent and difficult to access and share. The World Wide Web Consortium (W3C), proposed a solution for this problem, Semantic Web, promoting semantic structured data, like ontologies, enabling machines to perform more work involved in finding, combining, and acting upon information on the web. Using this to our advantage we created a Knowledge Acquisition System, written in JavaScript using JavaScript Object Notation (JSON) as the data structure and JSON Schema to define that structure, enabling new ways of acquiring and storing knowledge semantically structured. A novel Human Computer Interaction framework was developed based on this knowledge system, providing a Electrophysiological Actuation Mechanism. We tested this mechanism by controlling an electrostimulator.
Nuno M. C. da Costa, Tiago Araujo, Neuza Nunes, Hugo Gamboa
Backmatter
Metadaten
Titel
E-Business and Telecommunications
herausgegeben von
Mohammad S. Obaidat
Joaquim Filipe
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-662-44791-8
Print ISBN
978-3-662-44790-1
DOI
https://doi.org/10.1007/978-3-662-44791-8