International Journal of Space-Based and Situated Computing (8 papers in press)
Design and Implementation of Hiding Method for File Manipulation of Essential Services by System Call Proxy using Virtual Machine Monitor
by Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi
Abstract: Security or system management software is essential for keeping systems
secure. If these essential services are stopped or disabled by attackers, damages to the
system increase. Therefore, protecting essential services is crucial for preventing and
mitigating attacks. To deter attacks on essential services, hiding information related to
essential services is helpful. This paper describes design and implementation of a method
to make files invisible to all services except their corresponding essential services and
provides access methods to those files in a virtual machine (VM) environment. The
proposed method consists of interposition and proxy execution of the system call function.
In the proposed method, the virtual machine monitor (VMM) monitors system calls
invoked in a protection target VM. If an essential process invokes system calls related to
file manipulation, the VMM interposes the system call and collects information from the
protection target VM. If the file is an essential file, the VMM requests proxy execution
to the proxy VM on another VM. After proxy-execution of the system call, the proxy
process returns the result to the VMM. Finally, the VMM returns the result and skips the
execution of the original system call on the protection target VM. Thus, access to essential files by the essential service is skipped on the protection target VM, but the essential service can access the file content. With this mechanism, it is difficult for attackers to monitor access to essential files. In this paper, we describe the design, implementation, and evaluation of the proposed method.
Keywords: Virtual Machine Monitor; File Manipulation; System Call Proxy; Essential Services.
Scalable Distributed Collaborative Editing for 3D Models using Conflict-Free Data Structure
by Kengo Imae, Naohiro Hayashibara
Abstract: Consistent maintenance in collaborative editing is one of the most important problems in distributed systems. rnSo many papers have proposed various approaches to this issue, but most of them are for documents, and there are a few for 3D models. rnWe propose a data structure, called ChainVoxel, and operations on it for scalable distributed collaborative editing systems for 3D models. It is based on the conflict-free replicated data type (CRDT). ChainVoxel is implemented by a chained hash table for collision resolution while editing by multiple users. It guarantees the eventual consistency for updating a shared 3D model without mutual exclusion. rnWe analyzed our prototype regarding the size of ChainVoxel and the number of operations. rnWe also conducted simulations to compare our prototype with a consensus based implementation. Our prototype shows the scalability regarding the number of messages and steps for executing operations.rn
Keywords: Collaborative editing; 3D models; Conflict-free data structure; Scalability; Performance comparison;.
An analysis method for eye motion and eye blink detection from color images around ocular region
by Shogo Matsuno, Naoaki Itakura, Tota Mizuno
Abstract: This paper examines an analysis and measurement method that to aim to involve incorporating eye motion and eye blink as functions of an eye-based human-computer interface. Proposed method has been achieved by analyzing the visible-light images captured without using special equipment, in order to make the eye-controlled input interface independent of gaze-position measurement. Specifically, we propose two algorithms, one for detecting eye motion using optical flow and the other for classifying voluntary eye blinks using changes of eye aperture areas. In addition, we tried evaluating experiment both detection algorithms simultaneously assuming application to input interface. The two algorithms were examined for applicability in an eye-based input interface. As a result of experiments, real-time detection of each eye motion and eye blink could be performed with an accuracy of about 80% on average.
Keywords: eye tracking; eye motion detection; eye blink; user interface; gesture input.
Mobile Relay Assisted Dynamic Clustering in Wireless Sensor Networks
by Nishi Gupta, Satbir Jain
Abstract: One of the most used networks is the Wireless Sensor Network. Such networks sense the environment and collect data when an event occurs. This data is transmitted to the base station, called the sink for analysis and decision regarding any action required. Sensor nodes sense events and forward data to the sink. This transmission is an energy consuming task and sensor networks are generally energy constraint. Hierarchical approach of using cluster heads has proven to be a good method to deal with this energy crisis and results in better performance of the network in terms of connectivity and communication. Routing algorithm chooses an optimal route from the sensor nodes to the sink for actual data delivery. This paper introduces a mobile relay node in the clustering scheme to enhance the performance of the network by maintaining the clusters and reducing the re-clustering overhead.
Keywords: Wireless Sensor Networks; Clustering; Overhead; Relay; Connectivity; Lifetime; Energy Efficiency.
Study on Effective Practical Training with Multiple Large-scale Display Systems in Elementary and Secondary Education
by Yasuo Ebara, Hiroshi Hazama
Abstract: To promote ICT (Information Communication Technology) utilization in the practical training of industry subjects in elementary and secondary education, we consider that it is important to discuss the effective utilization method of large-scale display systems. In this paper, we studied on effective practical training by utilizing multiple large-scale display systems in conjunction with the interface for screen operation that was developed as part of this study. In this approach, we constructed multiple large-scale display environments using the interface for screen operation in combination with the SAGE2 (Scalable Amplied Group Environment). Moreover, to verify the effectiveness of this display environment, we tried the simulated practical training with a teacher using this display environment. As the results, we showed that, by combining the interface for screen operation and multiple display systems, this environment has excellent potential to facilitate effective practical training.
Keywords: Elementary and Secondary Education; Wearable Interface; Large-scale display; Practical Training.
Enhancements of Minimax Access-Point Setup Optimization Approach for IEEE 802.11 WLAN
by Soe Lwin Kyaw, Nobuo Funabiki, Ismael Munene Kwenga
Abstract: As a flexible and cost-efficient Internet access network, the IEEE 802.11 wireless local-area network (WLAN) has been broadly deployed around the world. Previously, to improve the IEEE 802.11n WLAN performance, we proposed the four-step minimax access-point (AP) setup optimization approach: 1) link throughputs between the AP and hosts in the network field are measured manually, 2) the throughput estimation model is tuned using the measurement results, 3) the bottleneck host suffering the least throughput is estimated using this model, and 4) the AP setup is optimized to maximize the throughput of the bottleneck host. Unfortunately, this approach has drawbacks: 1) a lot of manual throughput measurements are necessary to tune the model, 2) the shift of the AP location is not considered, and 3) IEEE 802.11ac devices at 5 GHz are not evaluated, although they can offer faster transmissions. In this paper, we present the three enhancements: 1) the number of measurement points is reduced while keeping the model accuracy, 2) the coordinate of the AP setup is newly adopted as the optimization parameter, and 3) the AP device with IEEE 802.11ac at 5GHz is considered with slight modifications. The effectiveness is confirmed by extensive experiments in three network fields.
Keywords: Wireless local area network; access point setup; throughput estimationrnmodel; parameter optimization; MIMO.
Electronic Word Of Mouth on Social Media Websites: Role of Social Capital Theory, Self-Determination Theory, and Altruism
by Saqib Mahmood, Muddasar Ghani Khwaja, Ahmad Jusoh
Abstract: Purchase decisions in recent times are extensively dependent on social media referrals. The effective utilization of social media has become compulsory for the organizations in order to remain competitive. In the emerging markets like Pakistan, promotions through electronic word of mouth on social media have incepted, but still its quite difficult for the organizations to cope-up with the contemporary electronic word of mouth needs. Nevertheless, the Pakistani social media marketing managers are unfamiliar in motivating social media users to engage in electronic word of mouth. For that reason, the current research aims to understand the social capital theory and self determination theory dimensions and altruism role in engaging customers for sharing products and services associated with word of mouth on social media websites. Structural, cognitive, and relational dimensions of social capital are manifested as tie-strength, shared language and trust respectively. Autonomy, competence, and relatedness of self-determination theory are manifested as voluntary self-disclosures, innovativeness, and trust respectively. In order to affirm literary associations among the constructs, structural equation modelling using MPlus was executed on the responses of 550 Pakistani social media users. The outcomes attained manifestly accepted the established hypotheses. Based on these findings theoretical and practical implications are produced.
Keywords: Electronic word of mouth; social capital theory; self-determination theory; altruism; social media websites.
Implementation of an inbound corresponding smartphone application using markerless image processing augmented reality technology
by Tomoyuki Ishida, Hayato Sakamoto
Abstract: We have developed an inbound corresponding smartphone application based on markerless image-processing augmented reality technology for use by zoo visitors and staff. On this application, we implemented an animal quiz distribution function and an animal character hunting function. We also implemented a web system on which the administrator can update the contents handled by these functions in real time. The proposed application negates the need for newly installing multilingual guide boards for foreign zoo visitors. Moreover, the web system enables the realtime updates of the contents used in smartphone applications. Here we confirmed the operability, relevance, readability, applicability, and effectiveness of the mobile application and content management web system in a questionnaire survey of 57 zoo visitors and 14 zoo staff. The survey results of all five measures revealed an overwhelmingly positive response to our mobile application and content management web application.
Keywords: augmented reality; markerless image processing; beacon; inbound; zoo navigation.