2010 International Conference on Broadband, Wireless … · 2011. 8. 8. ·...
Transcript of 2010 International Conference on Broadband, Wireless … · 2011. 8. 8. ·...
2010 International Conference on
Broadband, Wireless Computing,Communication and Applications
(BWCCA 2010)
Fukuoka, Japan4-6 November 2010
Editors:
Leonard Barolli
Fatos Xhafa
Minoru Uehara
Ilsun You
IEEE Catalog Number: CFP1098K-PRT
ISBN: 978-1-4244-8448-5
2010 International Conference
on Broadband, Wireless
Computing, Communication
and Applications
BWCCA 2010
Table of Contents
Message from the BWCCA 2010 International Conference
Organizers xxii
Message from the BWCCA 2010 International Conference
Workshop Co-chairs xxiv
BWCCA 2010 Organizing Committee xxv
BWCCA 2010 Program Committee xxvii
BWCCA 2010 Reviewers xxx
Keynote xxxii
Message from ASTSA 2010 International Workshop
Organizers xxxiii
ASTSA 2010 Organizing Committee xxxiv
ASTSA 2010 Reviewers xxxv
Message from CWECS 2010 International Workshop
Organizers xxxvi
CWECS 2010 Organizing Committee xxxvii
CWECS 2010 Reviewers xxxviii
Message from DCS 2010 Workshop Organizers xxxix
DCS 2010 Organizing Committee xi
DCS 2010 Reviewers xli
Message from ISSE 2010 Workshop Organizers xlii
ISSE 2010 Organizing Committee xiiii
ISSE 2010 Reviewers xiiv
Message from MAPWC 2010 International Workshop
Organizers xlv
MAPWC 2010 Organizing Committee xivi
V
MAPWC 2010 Reviewers xivii
Message from NGWMN 2010 International Workshop
Co-chairs xiviii
NGWMN 2010 Organizing Commitee xivix
NGWMN 2010 Reviewers i
Message from NTCAA 2010 Workshop Organizers li
NTCCA 2010 Organizing Committee. Hi
NTCCA 2010 Reviewers liii
Message from RI3C 2010 International Workshop Organizers liv
RI3C 2010 Organizing Committee iv
RI3C 2010 Reviewers ivi
Message from SCMAS 2010 International Workshop
Organizers ,
ivii
SCMAS 2010 Organizing Committee iviii
SCMAS 2010 Reviewers ivix
Message from WSNR 2010 International Workshop
Organizers lx
WSNR 2010 Organizing Committee lxi
WSNR 2010 Reviewers lxii
Session 1: Ad Hoc Networks
Efficient Address Management for Mobile Ad Hoc Networks 1
Sudath Indrasinghe, Rubem Pereira, and John Haggerty
Analysis of MANET Routing Protocols for Indoor Environment 9
Makoto Ikeda, Elis Kulla, Masahiro Hiyama, LeonardBarolli, andMakoto Takizawa
A Zone Based Routing Protocol for Ad Hoc Networks and Its Performance
Improvement by Reduction of Control Packets 17
Yuki Sato, Akio Koyama, and Leonard Barolli
Session 2: Sensor Networks I
Impact of Mobile Sink for Wireless Sensor Networks Considering Different
Radio Models and Performance Metrics 25
Tao Yang, Gjergji Mino, LeonardBarolli, Fatos Xhafa, andArjan Durresi
vi
A Communication Protocol to Improve Fairness and Data Amount on Sensor
Data Collection with a Mobile Sink 33
Wataru Seino, Tomoki Yoshihisa, Takahiro Kara, and Shojiro Nishio
AntSens: An Ant Routing Protocol for Large Scale Wireless Sensor Networks 41
M. Goyal, W. Xie, H. Hosseini, and Y. Bashir
Solving K-Coverage Problem in Wireless Sensor Networks Using Improved
Harmony Search 49
Shohreh Ebrahim Nezhad, Hoda Jalal Kamali, and Mohsen Ebrahimi Moghaddam
Session 3: Parallel and Multi-core Systems
Parallel Implementation of a Balancing Domain Decomposition Method
for Multi-core Processors 56
Masao Ogino, Hiroshi Kawai, Ryuji Shioya, and Shinobu Yoshimura
Parallel CAE System for Large Scale Problems Based on Computer Network 62
Ryuji Shioya, Masao Ogino, and Hiroshi Kawai
Architecture and Design of Efficient 3D Network-on-Chip (3D NoC)
for Custom Multicore SoC 67
Akram Ben Ahmed, Abdevazek Ben Abdallah, and Kenichi Kuroda
Advanced Design Issues for OASIS Network-on-Chip Architecture 74
Kenichi Mori, Adam Esch, Abderazek Ben Abdallah, andKenichi Kuroda
Session 4: Mesh and Ad Hoc Networks
Tuning Operators of Genetic Algorithms for Mesh Routers Placement Problem
in Wireless Mesh Networks 80
Fatos Xhafa, Christian Sanchez, Admir Barolli, Rozeta Miho, LeonardBarolli,
andMakoto Takizawa
Autonomous Power Supplied Wireless Mesh Network for Disaster
Information System 88
Toshihiro Suzuki and Yoshitaka Shibata
Impact of Source and Destination Movement on MANET Performance
Considering BATMAN and AODV Protocols 94
Elis Kulla, Makoto Ikeda, LeonardBarolli, andRozeta Miho
vii
Provisioning Vehicular Ad Hoc Networks with Quality of Service 102
Gongjun Yan, DandaB. Rawat, andBhedB. Bista
Session 5: Practical Security and Privacy Application I
A Solution to Protecting USB Keyboard Data 108
Kyungroul Lee, Wansoo Kim, Kwangjin Bae, and Kangbin Yim
Managing Some Security Risks Related to the Deployment of Multifarious
Authentication and Authorization in a Virtualized Environment 112
Annette Tolnai andSebastiaan von Solms
An Analytical Evaluation of Network Security Modelling Techniques Appliedto Manage Threats 117
Valentino Viduto, Carsten Maple, and Wei Huang
Session 6: Optical Networks
Differentiated Bandwidth Allocation and WaveLength Assignment Method
in WDM EPON 124
Min-jun Kim, Yong-suk Jang, Yong-do Choi, and Sung-ho Kim
Design and Evaluation ofFiber Direct Coupling Optical Antennas for Next
Generation Optical Wireless Communication Systems 129
Koichi Takahashi andNobuo Nakajima
Inter-ONU Scheduling Scheme for QoS Guarantee in 10G EPON 137
Jae-Hyun Jim, Zhibin Yu, Min-Suk Jang, and Sung-Ho Kim
Session 7: Sensor Networks II
Examination of Selection for Relay Nodes Adapted to Priority
of Transportation in Triage Network 142
Hiraki Tamura, Hikaru Kobayashi, Hiroshi Shigeno, andKen-ichi Okada
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone
in Sensor Networks 149
Jisun Kim, JiyoungLim, andKijoon Chae
Defect Identification by Sensor Network Under Uncertainties 155
Tomonari Furukawa, Jinquan Cheng, Shen Bin Lim, FeiXu, andRyuji Shioya
viii
Session 8: Networks Algorithms and Protocols
Energy-Efficient Server Selection Algorithms for Network Applications 159
Tomoya Enokido, Ailixier Aikebaier, and Makoto Takizawa
Modified Estimation Algorithm for Radio Communication Distance
along Random Rough Surface 167
Junichi Honda, Kazunori Uchida, andKwang-Yeol Yoon
Bandwidth Reservation Method to Consider Reservation Failure in VLAN 175
Yong-Do Choi, Jae-Hyun Jun, Gi-Beom Kil, andSung-Ho Kim
Solid Convex-Hull Sequential Support Vector Machine 181
Zhibin Yu, Min-Jun Kim, Kyung-Seok Park, and Sung-Ho Kim
Session 9: Practical Security and Privacy Application II
Towards a Common Notion of Privacy Leakage on Public Database 186
Shinsaku Kiyomoto and Keith M. Martin
Constructivist Approach to Information Security Awareness in the Middle
East 192
Mohammed Boujettifand Yongge Wang
A Contextual Access Control Model 200
Narhimem Boustia andAicha Mokhtari
Redundancy and Defense Resource Allocation Algorithms to Assure Service
Continuity against Natural Disasters and Intelligent Attackers 206
Frank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang, andJui-Pin Lo
Session 10: Distributed Schemes and Protocols
A Scalable Hybrid Time Protocol for a Heterogeneous Group 214
Isamu Tsuneizumi, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido,
and Makoto Takizawa
Queue Management for the Heavy-Tailed Traffics 222
Taktio Nakashima
Fault Tolerant Methods for Intermitted Failures in Virtual Large Scale Disks 229
Minoru Uehara
ix
Session 11: Wireless Networks
Mobility Based MIMO Link Adaptation in LTE-Advanced Cellular Networks 235
Vishwanath Ramamurthi and Wei-Peng Chen
Reliable Message Broadcast Schemes in Distributed Agreement Protocols 242
Ailixier Aikebaier, Tomoya Enokido, andMakoto Takizawa
Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc
Networks: A Survey 250
Admir Barolli, Makoto Takizawa, Fatos Xhafa, andLeonardBarolli
Session 12: Disaster Information Systems
Wireless Distributed Network System for Relief Activities after Disasters - A
Field Experiment for Channel Setting and a System for Information Exchange
among Shelters 260
Misako Urakami, Satoshi Innami, Makoto Kamegawa, Tetsuya Shigeyasu,
and Hiroshi Matsuno
Performance Evaluation ofPC Router Based Cognitive Wireless LANs
for Disaster Information System 268
Goshi Sato and Yoshitaka Shibata
Distributed Disaster Information System in DTN Based Mobile
Communication Environment 274
Yutaka Sasaki and Yoshitaka Shibata
Session 13: Network Security, Privacy and Trust
Darknet Monitoring on Real-Operated Networks 278
Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori,
andKouichi Sakurai
Secure Hybrid Communications for Medical Applications 286
Arjan Durresi, Mimoza Durresi, Zeynep Salih, andLeonard Barolli
Comments on a One-Way Hash Chain Based Authentication for FMIPv6 293
Ilsun You andJong-Hyouk Lee
Malware Obfuscation Techniques: A Brief Survey 297
Ilsun You andKangbin Yim
x
Session 14: Distributed Algorithms and Systems
An Iterative Domain Decomposition Method of Magnetostatic Problems
Based on a Mixed Formulation 301
Daisuke Tagami
Introduction of a Direct Method at Subdomains in Non-linear Magnetostatic
Analysis with HDDM 304
Shin-ichiro Sugimoto, Masao Ogino, Hiroshi Kanayama, and Shinobu Yoshimura
A Parallel Skyline Solver for Coarse Grid Correction of BDD Pre-conditioning
in Domain Decomposition Method 310
Hiroshi Kctwai, Masao Ogino, Ryuji Shioya, and Shinobu Yoshimura
Session 15: Multimedia and Web Applications
A Cloud-Based Support System for Offshore Software Development 315
YukiKaeri, Yusuke Manabe, Claude Moulin, Kenji Sugawara, and Jean-Paul A. Barthes
Two Types ofTrustworthiness ofAcquaintances in Peer-to-Peer (P2P)
Overlay Networks 320
Soiehi Sawamura, Admir Barolli, Ailixier Aikebaier, Valbona Barolli,
and Makoto Takizawa
Multihopped Wireless Disaster Information Network by Automatic Directional
Antenna Control Method 328
Daisuke Asahizawa and Yoshitaka Shibata
Session 16: Wireless Communication
An Approximation for Fresnel Function to Reduce Computation Time Based
on DRTM 334
Kazunori Uchida, Junichi Honda, and Yuuki Kimura
Wireless Link Selection by Time Transitional AHP Based on Emergent Policy
in Cognitive Wireless Network 340
Noriki Uchida, Kazuo Takahata, and Yoshitaka Shibata
xi
ASTSA 2010 Session 1: Sensors and Applications
LiNS: A Library Navigation System Using Sensors and Smartphones 346
Kazuki Watanabe, Tomoyuki Takahashi, Toshihiko Ando, Kaoru Takahashi,
Yoshifumi Sasaki, and Tatsuya Funakoshi
Network-Adaptive Multipath Video Delivery over Wireless Multimedia
Sensor Networks Based on Packet and Path Priority Scheduling 351
Amir Rastegar Lari andBehzadAkbari
Received Signal Strength Technique Performance in Sensor Network
Localization Application ...357
Kazim Firat Taraktas, Osman Ceylan, and Butent Yagci
Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor
Networks 363
Muhammad Ayazt Azween Abdullah, and Ibrahima Faye
ASTSA 2010 Session 2: Protocols and Algorithms
Enhancing RSS1 Technologies in Wireless Sensor Networks by Using
Different Frequencies 369
Osman Ceylan, K. Firat Taraktas, and H. Bulent Yagci
A Novel Adaptable Routing Protocol for Wireless Sensor Networks 373
K. G. Aravind and MM. Manahara Pai
Multipath Data Transfer in Wireless Multimedia Sensor Network 379
Shobha Poojaiy and M.M. Manohara Pai
CWECS 2010 Session 1: Digital Signature
Contract Signatures in E-Commerce Applications 384
Lien Ham, Chu-Hsing Lin, and Che-Wei Hu
A Proxy Partially Blind Signature Scheme with Proxy Revocation 389
Fuw-Yi Yang andLing-Ren Liang
Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications 395
Shhih-Jeng Wang, Yuh-Ren Tsai, and Chien-Chih Shen
xii
Efficient Modular Exponentiation Resistant to Simple Power Analysis
in DSA-Like Systems 401
Chia-Yu Lit, Wv-Chuan Yang, andChi-Sung Laih
CWECS 2010 Session 2: Computer Forensics
VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP) 407
I-Long Lin, Yun-Sheng Yen, Bo-Lin Wu, andHsiang-Yu Wang
Fast Deployment ofComputer Forensics with USBs 413
Chung-Huang Yang and Pei-Hua Yen
Source Camera Identification in Real Practice: A Preliminary Experimentation 417
Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, and Umberto Ferraro Petrillo
CWECS 2010 Session 3: Authentication and Privacy
Based on Mobile RFID Device to Design a Secure Mutual Authentication
Scheme for Market Application 423
Chin-Ling Chen, Jinn-Ke Jan, and Chih-Feng Chien
The Iterative Distributed Re-authentication Scheme Based on EAP-AKA
in 3G/UMTS-WLAN Heterogeneous Mobile Networks 429
Shen-Ho Lin, Jung-Hui Chiu, and Sung-Shiou Shen
Transparent Digital Rights Management System with Superdistribution 435
Chih-Ta Yen, Hrong-Twu Liaw, Nai-Wei Lo, Ting-Chun Liu, andJayStu
CWECS 2010 Session 4: Cloud and Wireless Security
Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM
Environment 441
Yi-Fung Huang, Fang-Yie Leu, and Chao-Hong Chiu
Securing the Cloud's Core Virtual Infrastructure 447
A. Tolnai andS.H. von Solms
A Biologically Modeled Intrusion Detection System for Mobile Networks 453
Brian C. Williams andErrin W, Fulp
xiii
CWECS 2010 Session 5: Image Secret, Sensor Network and Computer Security
High-Capacity Multi-secret Sharing by Random Grid 459
Tzung-Her Chen, Yao-Sheng Lee, and Ci-Lin Li
Noise-Resistant Joint Fingerprinting and Decryption Based on Vector
Quantization 463
Chih-Yang Lin, Wei-Lun Huang, and Tzung-Her Chen
Lifetime Security Improvement in Wireless Sensor Network Using
Queue-Based Techniques 469
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, and Chu-HsingLin
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment
of Emerging Security Threats 475
Aniello Castiglione, Alfredo De Santis, Ugo Fiore, andFrancesco Palmieri
DCS 2010 Session 1: Fault Detection and Diagnosis
A Wrapper Approach Based on Clustering for Sensors Selection of Industrial
Monitoring Systems 482
Cesar Uribe, Claudia Isaza, Oscar Gualdron, Cristian Duran, andAdrian Carvajal
Discrete Flatness for Non Linear Systems FDI 488
Nan Zhang, Andrei Doncescu, and Felix Mora-Camino
Feature Selection for Fault Diagnosis Using Fuzzy-ARTMAP Classification
and Conflict Intersection 495
M. Benkaci, A. Doncescu, andB. Jammes
A Diagnosis Approach Based on Kolmogorov Complexity 501
N. Kabbaj, A. Doncescu, andM. Benkaci
ISSE 2010 Session 1: Intelligent Networks
Detour Routing Protocol for Geographic Sensor Networks 505
Lih-Chyau Wuu, Wen-Bin Li, and Wen-Chung Kuo
Fast Seamless Secure Handoff for Loosely Coupled Systems in HeterogeneousWireless Mobile Networks 511
Ben-Jye Chang, Ying-Hsin Liang, and Shou-Chi Liang
xiv
The Decision Scheme ofFrame Importance Factor for Video Streaming
System 517
Huan-Yao Kang and Ching-Lung Chang
ISSE 2010 Session 2: Human Behavior Understanding
Frequency Domain Analysis ofHuman Motions in Surveillance Video 522
Hsuan T. Chang, Chang-Sian Chen, Chun- Wen Hung, and Day-Fann Shen
Automatic Facial Skin Defect Detection System 527
Chuan-Yu Chang, Shang-ChengLi, Pau-Choo Chung, Jui-YiKuo, and Yung-Chin Tu
Fingertip-Writing Alphanumeric Character Recognition for Vision-Based
Human Computer Interaction 533
Chien-Cheng Lee, Cheng-Yuan Shih, andBor-Shenn Jeng
A Motion Planning of Swarm Robots Using Genetic Algorithm 538
Chien-Chou Lin, Po-Yuan Hsiao, andKun-Cheng Chen
ISSE 2010 Session 3: Image and Video Analysis
Gaussian Distributive Filtering in Histogram Equalization 544
Ping-Hsien Lin, Hsu-Chun Yen, and Chia-Chen Yu
A 3D Model Retrieval System Based on the Cylindrical Projection Descriptor 550
Jau-Ling Shih, Chang-HsingLee, Chih-Hsun Chou, and Hsiang-Yuen Chang
An Information Hiding Scheme Using Magic Squares 556
Ming-Gun Wen, Su-Chieng Huang, and Chin-Chuan Han
MAPWC 2010 Session 1: Scattering and Diffraction
Numerical Analysis of Scattered Eletromagnetic Wave by a Dielectric
Cylinder with High Contrast by CIP Method 561
Hiroshi Maeda, Hiroyuki Terashima, Tetsuo Maruyama, andShinjiro Hironaka
Back Scattering from Target above Random Rough Surface 565
Kazunori Uchida, Junichi Honda, Shunsuke Nakasima, andKwang-Yeol Yoon
Characteristics of Diffracted Waves Going over Building Rooftop 571
Jiro /washige, Leonard Barolli, and Katsuki Hayashi
XV
Electromagnetic Scattering from Cylinders Located near Periodic Cylinder
ArrayKoki Watanabe and Yoshimasa Nakatake
.577
MAPWC 2010 Session 2: Wireless Modelling and Applications
Relations among 10-Minute Precipitation, Rainfall Intensity and Ku-Band
Rain Attenuation in Kyushu Island, Japan 581
Kiyotaka Fujisaki, Goshi Satoh, and Mitstw Tateiba
Delay Profile Using Scale Model Method for Microcells in Urban Areas 587
Ryuichiro Jwahima, Yu Funaki, Toyokazu Mine, and Shinichi Ichitsubo
Application Techniques of Particle Swarm Optimization 592
Zhiqi Meng
MAPWC 2010 Session 3: Wireless Technologies
2D Wave Propagation Characteristics ofthe CIP Method with Amplitude
Error Compensation 596
Tsuyoshi Matsuoka
Frequency-Selection Properties for Composite Periodic Structures 600
Maurice Sesay and Mitushiro Yokota
Heuristic Maxmin Fairness for the Wireless Channel Allocation Problem 606
Mario Kdppen, Rodrigo Verschae, Kaori Yoshida, and Masato Tsum
A New Design of Circular Polarized Planar Antennae 612
Mayumi Matsunaga and Toshiaki Matsunaga
NGWMN 2010 Session 1: Wireless Traffic Control an Resource Allocation
Evaluation ofa Fuzzy-Based CAC Scheme for Different Priorities in Wireless
Cellular Networks 616
Taku Ikebata, Gjergji Mino, LeonardBarolli, Fatos Xhafa, Arjan Dwresi,
andAkio Koyama
Adaptive Mixed Bias Resource Allocation for Wireless Mesh Networks 622
Jason B. Ernst and Thabo Nkwe
xvi
Effect of Adaptive RTS/CTS ON/OFF Control Method for Mitigating
Transmission Overhead of IEEE802.ilDCF 627
Tetsuya Shigeyasu andHiroshi Matsuno
NGWMN 2010 Session 2: Wireless Communication
Field Estimation for Terrestrial Digital Broadcasting in Western Part
of Fukuoka 633
Kazunori Uchida, Junichi Honda, Masafumi Takematsu, and Toshiaki Tazume
Particle Swarm Optimization on DSI Method for PAPR Reduction in OFDM
Systems 639
Shu-Hong Lee and Ho-LungHung
Phase Error Cancellation for OFDM Systems Using Adaptive Filters 643
Chia-Hsin Cheng, Kai-Jie Chen, Gwo-Ruey Lee, and Yung-Fa Huang
NGWMN 2010 Session 3: Intelligent Algorithms
An Intelligent Fuzzy-Based Cluster Head Selection System for WSNs and Its
Performance Evaluation for D3N Parameter 648
Hironori Ando, Leonard Barolli, Arjan Durresi, Fatos Xhafa, andAkio Koyama
Jump Resonance Analysis for Systems with Parametric Uncertainties 654
Li-Shan Ma, Chih-Hung Wu, Jieh-La Jaw, Bing-Fei Wu, and Jau-WoeiPerng
Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical
Coloured Petri-nets 660
Hsing-Chung Chen, Jai-Zong Sun, and Zhen-Dong Wu
NTCCA 2010 Session 1: Network Performance Analysis
Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic
Patterns Using SCTP 666
Mamoru Mimura andHidehiko Tanaka
DDoS Detection Technique Using Statistical Analysis to Generate Quick
Response Time 672
Shunsuke Oshima, Takuo Nakashima, and Toshinori Sueyoshi
xvii
Experimental Evaluation of a MANET Testbed in Indoor Stairs Scenarios 678
Masahiro Hiyama, Makoto Ikeda, Leonard Barolli, Elis Kvlla, Fatos Xhafa,
andArjan Durresi
Implementation and Evaluation of Distributed Hash Table Using MPI 684
Daisuke Tsukamoto and Tahio Nakashima
NTCCA 2010 Session 2: Network Services
A Development of Environment Verification System "View-Aid" Using
Digital Wireless Camera for Low Vision : ......;;689
Yoshifumi Oyama and Yuki Shimada
A Mailing List Management System Mashing-Up with Web Services 695
Keisuke Fujiwara, Yoshinari Nomura, andHideo Taniguchi
Advanced Relay Nodes for Adaptive Network Services - Concept
and Prototype Experiment 701
Masayoshi Shimamura, Takeshi Ikenaga, andMasato Tsurit
Gathering Large Scale Human Activity Information Using Mobile Sensor
Devices 708
Yuichi Hattori, Sozo Inoue, Takemori Masaki, Go Hirakawa, and Osama Sudo
RI3C 2010 Session 1: Teleoperation and Robot Control
Teleoperation ofa Robot Arm System Using Pneumatic Artificial Rubber
Muscles: Teleoperation over the Internet Using UDP and a Web Camera 714
Tomonori Kato, Tomoaki Higashi, and Kenichi Shimizu
Application of a JXTA-Overlay P2P Control System for a Biped Walking
Robot 719
Keita Matsuo, Yuichi Ogata, Evjola Spaho, Fatos Xhafa, and LeonardBarolli
Study on Increase in Propulsion of Flexible Linear Actuator 725
Kazuhiro Ohyama, Yasushi Hyakutake, and Hitoshi Kino
xviii
RI3C 2010 Session 2: Intelligent Methods and Models for Robotics
Decision Method of Internal Force for Sensorless Positioning
ofMusculoskeletal System 731
Hiloshi Kino, Shiro Kikuchi, and Kenji Tahara
Character Modeling and Calligraphic Learning by Haptic Device 737
Hiroyuki Fujioka, Hiroyuki Kano, and Sousuke Kakehi
Operational Feel Adjustment for Power-Assisted Positioning by
an Actor-Critic Method,
743
Tetsuya Morizono
RI3C 2010 Session 3: Robot Applications
A Method for Event Handling on Robot Town Platform and a Sharable
Personal Mobility Robot 749
Takafumi Ienaga, Yosuke Senta, Daisaku Arita, Yoshihiko Kimuro, Kouji Murakami,
and Tsutomu Hasegawa
Experimental Studies on Various Types of Animal Mimicking Robots 755
Y, Kawamura
Iterative Learning Scheme for a Redundant Musculoskeletal Arm: Task Space
Learning with Joint and Muscle Redundancies 760
Kenji Tahara and Hitoshi Kino
Development ofDetection System for the Bed Accident Using Ultrasonic
Wave Sensor 766
Hiroyuki Agatsuma, Takehiko Abe, Takuya Tajima, and Haruhiko Kimura
SCMAS 2010 Session 1: Agent Technology and Multiagent Systems
Design and Implementation of Repository-Based Agent Organization Method
on Heterogeneous Agent Platform 772
Takahiro Uchiya and Tetsuo Kinoshita
An OWL-Based Ontology to Represent Knowledge about Location, Space
and Perceputual Primitives 780
Shigeru Fitjita and Kenji Sugawara
xix
Multiagent Architecture ofKnowledge Based Network Management Support
System 782
Kazuto Sasai, Gen Kitagata, and Tetsuo Kinoshita
Perceptual Integration ofReal-Space and Virtual-Space Based on Symbiotic
Reality 788
Hiroshi Noguchi, Takuo Suganuma, and Tetsuo Kinoshita
SCMAS 2010 Session 2: Symbiotic Computing and Applications
Implementation of SmartBox End-Device for a P2P System and Its Evaluation
for E-Leaming and Medical Applications 794
Ynichi Ogata, Keita Matsno, Evjola Spaho, LeonardBarolli, and FatosXhafa
Moving Object Detection by a Ghost Cancel Method on Indoor Images 800
Hiroyuki Utsunomiya and Shigeru Fujita
A Road Location Estimating Method by Many Trajectories to Realize Rapid
Map Survey for a Car Navigation System 806
Hiromitsu Sugawara, Nobuyoshi Sato, Tsuyoshi Takayama, and Yoshitoshi Murata
WSNR 2010 Session 1: Wireless Sensor Networks Protocols
Wireless Sensor Network Transport Protocol - A State ofthe Art 812
A.J. Dinusha Rathnayaka, Vidyasagar M. Potdar, AtifSharif, SaeedSarencheh,
andSamitha Knruppu
Prototype Design and Analysis of Wireless Vibration Sensor 818
Mohammad Reza Akhondi, Alex Talevski, and Tsung-Hsien Chou
Wireless Sensor Networks: Challenges Ahead 824
A.J. Dinusha Rathnayaka, Vidyasagar M. Potdar, AtifSharif, Saeed Sarencheh,
and Samitha Kuruppu
WSNR 2010 Session 2: Wireless Sensor Networks
State of the Art: Carbon Emission Accountability Modeling 830
Valencia Lo and Vidyasagar Potdar
Criteria for Hardware Selection of Wireless Vibration Sensor 836
Mohammad Reza Akhondi, Alex Talevski, and Tsung-Hsien Chou
XX
Wireless Multimedia Sensor Networks Applications and Security Challenges 842
Bambang Harjito and SongHan
Author Index 847
xxi