Ubiquitous Systems and Services for IT Convergence

A special issue of Information (ISSN 2078-2489).

Deadline for manuscript submissions: closed (20 December 2014) | Viewed by 27014

Special Issue Editors


E-Mail Website
Guest Editor
Overseas Chinese University, Taiwan
Interests: green IT; ubiquitous computing; mobile storage; mobile computing; distributed software engineering; intelligent agent
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing and Information Sciences, Florida International University, Miami, FL, USA
Interests: big data; mobile multimedia; distributed database systems; multimedia data mining
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor

Special Issue Information

Dear Colleagues,

As computing power and networks have advanced, we face a novel environment called “Converged IT”. The term refers to the realization of a new IT environment where information exchange can be made via various devices, such as smart devices, intelligent systems and services, advanced vehicular communications technology, ubiquitous computing, cloud computing, etc. In addition, as pervasive computing is gradually integrated with every aspect our lives and activities, ubiquitous services are also rapidly applied to our real lives.

This Special Issue aims to address advanced IT issues and to encourage researchers to publish their results in Information. The issue will accept both original research papers and review articles that enhance the state-of-the-art in IT Convergence, its applications, and services. The papers will be peer-reviewed and selected on the basis of their quality and relevance to the Special Issue’s theme. Papers on practical as well as theoretical topics and problems are invited.

Topics include (but are not limited to):

  • Ubiquitous Systems and Services for IT Convergence
  • Intelligent Service Framework and Key elements for IT Convergence
  • Advanced Vehicular Communications Technology
  • UI/UX for IT Convergence
  • Wireless sensor and RFID for IT Convergence
  • Cyber Physical System in IT Convergence
  • Context awareness service model for IT Convergence
  • Internet of Things and M2M
  • Grid and Cloud computing
  • Advanced Cryptography and Security Issues for IT Convergence
  • Network middleware and protocols for IT Convergence
  • Intelligent Mobile Multimedia Computing
  • Smartphone and personal devices for SW
  • Security modeling in SW
  • Methods for improving either the efficiency or accuracy of M2M applications
  • Vehicle service models for IT Convergence
  • Haptic interfaces and interactions for IT Convergence

Prof. Dr. Jason C. Hung
Prof. Dr. Shu-Ching Chen
Prof. Dr. Young-Sik Jeong
Guest editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


Keywords

  • IT Convergence
  • Hybrid of IT, BT, NT
  • Ubiquitous Systems
  • Multimodal Ubiquitous Services
  • Haptic interfaces
  • Vehicular Cloud Computing
  • Green IT
  • Cyber Physical System and Embedded SW
  • Internet of Things
  • Intelligent Mobile Multimedia
  • Convergence Security
  • Converged Video Surveillance

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

988 KiB  
Article
Design of Programmable LED Controller with a Variable Current Source for 3D Image Display
by Kyung-Ryang Lee, Sung-Dae Yeo, Seung-Il Cho and Seong-Kweon Kim
Information 2014, 5(4), 652-660; https://doi.org/10.3390/info5040652 - 3 Dec 2014
Viewed by 5745
Abstract
Conventional fluorescent light sources, as well as incandescent light sources are gradually being replaced by Light Emitting Diodes (LEDs) for reducing power consumption in the image display area for multimedia application. An LED light source requires a controller with a low-power operation. In [...] Read more.
Conventional fluorescent light sources, as well as incandescent light sources are gradually being replaced by Light Emitting Diodes (LEDs) for reducing power consumption in the image display area for multimedia application. An LED light source requires a controller with a low-power operation. In this paper, a low-power technique using adiabatic operation is applied for the implementation of LED controller with a stable constant-current, a low-power and low-heat function. From the simulation result, the power consumption of the proposed LED controller using adiabatic operation was reduced to about 87% in comparison with conventional operation with a constant VDD. The proposed circuit is expected to be an alternative LED controller which is sensitive to external conditions such as heat. Full article
(This article belongs to the Special Issue Ubiquitous Systems and Services for IT Convergence)
Show Figures

Figure 1

1261 KiB  
Article
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
by Seoung-Hyeon Lee, Yong-Kyun Kim, Jong-Wook Han and Deok-Gyu Lee
Information 2014, 5(4), 622-633; https://doi.org/10.3390/info5040622 - 1 Dec 2014
Cited by 11 | Viewed by 9094
Abstract
Communications, Navigation, Surveillance/Air Traffic Management (CNS/ATM) systems utilize digital technologies, satellite systems, and various levels of automation to facilitate seamless global air traffic management. Automatic Dependent Surveillance-Broadcast (ADS-B), the core component of CNS/ATM, broadcasts important monitoring information, such as the location, altitude, and [...] Read more.
Communications, Navigation, Surveillance/Air Traffic Management (CNS/ATM) systems utilize digital technologies, satellite systems, and various levels of automation to facilitate seamless global air traffic management. Automatic Dependent Surveillance-Broadcast (ADS-B), the core component of CNS/ATM, broadcasts important monitoring information, such as the location, altitude, and direction of aircraft, to the ground. However, ADS-B data are transmitted in an unencrypted (or unprotected) communication channel between ADS-B sensors and Air Traffic Control (ATC). Consequently, these data are vulnerable to security threats, such as spoofing, eavesdropping, and data modification. In this paper, we propose a method that protects the ADS-B data transmitted between ADS-B sensors and ATC using Simple Public Key Infrastructure (SPKI) certificates and symmetric cryptography. The SPKI certificates are used to grant transmission authorization to the ADS-B sensors, while symmetric cryptography is used to encrypt/decrypt the ADS-B data transmitted between the ADS-B sensors and ATC. The proposed security framework comprises an ADS-B sensor authentication module, an encrypted data processing module, and an ADS-B sensor information management module. We believe that application of the proposed security framework to CNS/ATM will enable it to effectively obviate security threats, such as ground station flood denial, ground station target ghost injection, and ADS-B data modification. Full article
(This article belongs to the Special Issue Ubiquitous Systems and Services for IT Convergence)
Show Figures

Figure 1

967 KiB  
Article
SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks
by KwangHee Choi and Joon-Min Gil
Information 2014, 5(4), 535-547; https://doi.org/10.3390/info5040535 - 21 Oct 2014
Viewed by 5490
Abstract
In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR), which is defined as a ratio of the session arrival rate to the movement rate. [...] Read more.
In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR), which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks. Full article
(This article belongs to the Special Issue Ubiquitous Systems and Services for IT Convergence)
Show Figures

Figure 1

891 KiB  
Article
VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity
by Won Min Kang, Jae Dong Lee and Jong Hyuk Park
Information 2014, 5(4), 526-534; https://doi.org/10.3390/info5040526 - 17 Oct 2014
Cited by 1 | Viewed by 6076
Abstract
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have [...] Read more.
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic evidence in courts. However, the data from black boxes can be forged or modified by man-in-the-middle (MITM) attacks and message hijacking. In this paper, we propose a vehicle cloud computing-based black box service model that can provide integrity for black box data through digital signatures in vehicle cloud computing (VCC) environments. Our proposed model protects against MITM attacks and message hijacking using only a hash value and digital signature. Moreover, a mirroring technique (RAID 1) provides backup and recovery to protect the data from a traffic accident. Full article
(This article belongs to the Special Issue Ubiquitous Systems and Services for IT Convergence)
Show Figures

Figure 1

Back to TopTop