• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2015 Fiscal Year Research-status Report

Research and Development of a Cyber-I Open Service Platform

Research Project

Project/Area Number 26330350
Research InstitutionHosei University

Principal Investigator

Jianhua Ma  法政大学, 情報科学部, 教授 (70295426)

Co-Investigator(Kenkyū-buntansha) Huang Runhe  法政大学, 情報科学部, 教授 (00254102)
Project Period (FY) 2014-04-01 – 2017-03-31
KeywordsWeb Computing / Ubiquitous Computing / Wearable Computing / User Modeling / Cyber-I / Personalized Service
Outline of Annual Research Achievements

In 2015 fiscal year, our main work was focused on personal data collections using smartphone and wearables as well as privacy-preserved and best-effort provisions of Cyber-I information to personalized services.

For personal data management and personality analysis, we have developed a smartphone based client-server system. The smartphone is functioned as not only a source of personal data but also a gateway to manage other wearables and communicate with a server that keeps personal data in a larger amount and a longer period. A multi-security mechanism is implemented to ensure data security in collection, transmission and storage. Personality analysis is made from data normalization, feature extraction and clustering, to personality computation based on sociological personality theories.

In order to provide Cyber-I information to personalized services, there are two main problems should be solved. One is the privacy protection problem. Methods should be designed to provide privacy preservation for user. Another one is the best-effort issue which is about how to make full use of existing Cyber-I information to satisfy personalized services as much as possible. Thus, we studied and developed a Cyber-I Information Provision System (CIPS) to provide Cyber-I information to personalized services by best-efforts provisions, simultaneously provide privacy preservation for Cyber-I.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

The research in FY 2015 has been done basically as we expected. The developed smartphone-based personal system enables automatic data collections from embedded sensors and apps in a smartphone and wearable devices worn by a user, and upload of the collected data from a SQLite local database in the smartphone to a remote Mongo database in the server. And further, a multi-security mechanism is implemented for authentication and encryption of personal data in the process of identification, collection and transmission. Another developed CPIS system is capable of providing Cyber-I information by using (1) two level privacy protection, i.e., the system level and the Cyber-I level privacy preservation; (2) three best-effort provisions, i.e., existing data provision, related data provision and predicting data preservation. We also studied the Cyber-I modeling with growable mechanisms along with successive collections of personal data from various sources. These research results were presented in IEEE conferences, IUCC-2015, CPSCom-2015 and IoP-2015.

Strategy for Future Research Activity

The research in FY 2016 is planned as the following.
(1) Development of a wearable-oriented platform to manage various wearable devices, which will be one kind of main sources to collect personal data. The main research issue is how to deal with heterogeneous devices, operating systems, networks, data formats and so on.
(2) Integration of PC-based, smart-based and wearable-oriented platforms to form a general Cyber-I system that will be consisted of three layers: devices, gateways and clouds. All personal data will be kept permanently and securely in the clouds and related tools will be provided to access and use the data by users and Cyber-I application developers.
(3) Refinement of Cyber-I modeling and implementation of Cyber-I growth mechanisms including time-driven scheme and data-driven scheme. We are also going to conduct research on analyzing an individual’s basic character, i.e., personality with utilization of personal data collected. The personality may form some kind of seed to guide a Cyber-I’s growth.

Causes of Carryover

There are two main reasons. The one is that this principle researcher was invited to give keynote speeches supported by the two conferences. The other is that many devices haven't been purchased yet since the system was under developing stage.

Expenditure Plan for Carryover Budget

The FY 2016 will be the 3rd year of this project. We should present research achievements in more conferences and thus need more travel expenses. More devices will be purchased to enhance and test our system.

  • Research Products

    (9 results)

All 2016 2015

All Journal Article (4 results) (of which Int'l Joint Research: 4 results,  Peer Reviewed: 4 results,  Open Access: 4 results,  Acknowledgement Compliant: 1 results) Presentation (5 results) (of which Int'l Joint Research: 5 results,  Invited: 2 results)

  • [Journal Article] Cybermatics: A Holistic Field for Systematic Study of Cyber-enabled New Worlds2015

    • Author(s)
      Jianhua Ma, Huansheng Ning, Runhe Huang, Hong Liu, Laurence T. Yang, Jinjun. Chen, Geyong Min
    • Journal Title

      IEEE Access

      Volume: 3 Pages: 2270-2280

    • DOI

      10.1109/ACCESS.2015.2498288

    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Brain Informatics-Based Big Data and the Wisdom Web of Things2015

    • Author(s)
      Ning Zhong, Stephen S. Yau, Jianhua Ma, Shinsuke Shimojo, Marcel Just, Bin Hu, Guoyin Wang, Kazuhiro Oiwa, Yuichiro Anzai
    • Journal Title

      IEEE Intelligent Systems

      Volume: 30 Pages: 2-7

    • DOI

      10.1109/MIS.2015.83

    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] On Studying the Impact of Uncertainty on Behavior Diffusion in Social Networks2015

    • Author(s)
      Yufeng Wang, Athanasios V. Vasilakos, Jianhua Ma, Naixue Xiong
    • Journal Title

      IEEE Trans. Systems, Man, and Cybernetics: Systems

      Volume: 45 Pages: 185-197

    • DOI

      10.1109/TSMC.2014.2359857

    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Neighborhood-user Profiling based on Perception Relationship in the Micro-blog Scenario2015

    • Author(s)
      Jianxing Zheng, Bofeng Zhang, Xiaodong Yue, Guobing Zou, Jianhua Ma, Keyuan Jiang
    • Journal Title

      International Journal of Web Services Research

      Volume: 34 Pages: 13-26

    • DOI

      10.1016/j.websem.2015.06.005

    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Presentation] Cybermatics for Cyberization Towards Cyber-enabled Hyper Worlds2016

    • Author(s)
      Jianhua Ma
    • Organizer
      IEEE Mobile Cloud 2016
    • Place of Presentation
      Oxford, UK
    • Year and Date
      2016-03-29 – 2016-04-01
    • Int'l Joint Research / Invited
  • [Presentation] Privacy-preserved and Best-effort Provisions of Cyber-I Information to Personalized Services2015

    • Author(s)
      Jianhua Ma
    • Organizer
      The 8th IEEE International Conference on Cyber, Physcial and Social Computing
    • Place of Presentation
      Sydney, Australia
    • Year and Date
      2015-12-11 – 2015-12-13
    • Int'l Joint Research
  • [Presentation] Wear-I: A New Paradigm in Wearable Computing2015

    • Author(s)
      Jianhua Ma
    • Organizer
      The 14th IEEE International Conference on Ubiquitous Computing and Communications
    • Place of Presentation
      Liverpool, UK
    • Year and Date
      2015-10-26 – 2015-10-28
    • Int'l Joint Research / Invited
  • [Presentation] A Smartphone-Based System for Personal Data Management and Personality Analysis2015

    • Author(s)
      Jianhua Ma
    • Organizer
      The 13th IEEE International Conference on Pervasive Intelligence and Computing
    • Place of Presentation
      Liverpool, UK
    • Year and Date
      2015-10-26 – 2015-10-28
    • Int'l Joint Research
  • [Presentation] Digital Explosions and Digital Clones2015

    • Author(s)
      Jianhua Ma
    • Organizer
      IEEE International Conference on Internet of People
    • Place of Presentation
      Beijing, China
    • Year and Date
      2015-08-10 – 2015-08-14
    • Int'l Joint Research

URL: 

Published: 2017-01-06  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi