Search Results - IPSJ
-
1
Proxy cooperative awareness message: an infrastructure-assisted V2V messaging
Published in 2016 Ninth International Conference on Mobile Computing and Ubiquitous Networking (ICMU) (01-10-2016)“…Cooperative Intelligent Transportation Systems (CITS) are being developed to make road traffic safer and more efficient. Vehicle to vehicle (V2V) communication…”
Get full text
Conference Proceeding -
2
Approaching vehicle detection method with acoustic analysis using smartphone for elderly bicycle driver
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…More than 60 percentage of fatal accidents while riding a bicycle is caused by elderly people over 65 years old. The main cause is the detection delay of…”
Get full text
Conference Proceeding -
3
Evaluating the spatio-temporal coverage of automotive sensing for smart cities
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Automotive sensing is a novel and appealing sensing technology in which sensors are installed into vehicles to utilize vehicles' mobility to conduct urban…”
Get full text
Conference Proceeding -
4
Compression method for ECU software updates
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Bugs in electrical control units (ECUs) in vehicles are increasing in accordance with the increasing complexity and scale of the ECU software. Thus,…”
Get full text
Conference Proceeding -
5
Post-quantum authentication in OpenSSL with hash-based signatures
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Quantum computing is a major threat to contemporary security mechanisms. As standards bodies increasingly focus on post-quantum cryptography, hash-based…”
Get full text
Conference Proceeding -
6
Mixed public and secret-key cryptography for wireless sensor networks
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of…”
Get full text
Conference Proceeding -
7
An alternative approach to blockchain mining work for making blockchain technologies fit to ubiquitous and mobile computing environments
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…The mining work concentration problem, whereby machine power is monopolized when supporting its operation, is becoming a serious problem in virtual currency…”
Get full text
Conference Proceeding -
8
Reliable wireless communications in battery management system of electric vehicles
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Recent works on enhancing comfortability and convenience of vehicles reveal the appeal of information collections by various wireless sensor nodes due to their…”
Get full text
Conference Proceeding -
9
Cloud-based UAV data delivery over 4G network
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Drones generate heterogeneous data including flight status parameters, locations, video sequences and other IoT specific information depending on the sensors…”
Get full text
Conference Proceeding -
10
A Japanese input method using leap motion in virtual reality
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Various character input devices and methods have been proposed with the spread of VR. However, most of the techniques for character input suffer practical…”
Get full text
Conference Proceeding -
11
Analysis of random geometric graph for wireless network configuration
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Random geometric graphs are used to obtain a simple representation of wireless networks. Much recent research has analyzed the properties of these graphs…”
Get full text
Conference Proceeding -
12
Clash tanks: An investigation of virtual and augmented reality gaming experience
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Despite the popularity of Virtual and Augmented Reality (AR/VR) within gaming, the full potential of Virtual and Augmented Reality technologies is yet to be…”
Get full text
Conference Proceeding -
13
Design and implementation of a wireless network tap device for IEEE 802.11 wireless network emulation
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Network emulation environments are useful for evaluating network systems and applications. A network emulation environment abstracts a part of a network system…”
Get full text
Conference Proceeding -
14
Maximum weight packet scheduling scheme with retransmission in multi-hop wireless networks
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Retransmissions serve as the basic building block that communication protocols use it to achieve reliable data transmission. To reduce data loss,…”
Get full text
Conference Proceeding -
15
Detection of half-turn stairs from walking trajectories estimated by pedestrian dead reckoning
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…This study detects half-turn stairs, a common building structure, from walking trajectories estimated using PDR from walking sensing data within a certain…”
Get full text
Conference Proceeding -
16
An automatic training system against advanced persistent threat
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…In recent years, APT attack (Advanced Persistent Threat) puts out a lot of damage. There is method to train the "human" who received attack emails as a…”
Get full text
Conference Proceeding -
17
Accuracy improvement in sensor localization system utilizing heterogeneous wireless technologies
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Sensor localization is one of the big problems when building large scale indoor sensor networks because GPS (Global Positioning System) is unavailable in…”
Get full text
Conference Proceeding -
18
Utilizing mobile devices for evaluating body trunk coordination: Feasibility and preliminary results
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…Enhancing body trunk coordination is an important aspect in personal health, as week coordination ability of the body trunk is associated to increasing risk of…”
Get full text
Conference Proceeding -
19
Considering interpersonal differences in validating wearable sleep-tracking technologies
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…This study investigated an important yet usually neglected question in validating consumer sleep tracking devices: does interpersonal difference play a role in…”
Get full text
Conference Proceeding -
20
Estimating customer preference through store check-in histories and its use in visitor promotion
Published in 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU) (01-10-2017)“…This paper proposes a method to estimate the preference of customers based on store check-in histories. The proposed method can distinguish the preferences of…”
Get full text
Conference Proceeding