In smart spaces such as smart homes, computation is
embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provid
e a pool of available resources which the user can
take
advantage, interacting and creating a friendly envi
ronment. The inherent composability of these system
s
and other unique characteristics such as low-cost e
nergy, simplicity in module programming, and even
their small size, make them a suitable candidate fo
r dynamic and adaptive ambient systems. This resear
ch
work focuses on what is defined as an “ambience”, a
space with a user-defined set of computational
devices. A smart-home is modeled as a collection of
ambiences, where every ambience is capable of
providing a pool of available resources to the user
. In turn, the user is supposed to carry one or sev
eral
personal devices able to interact with the ambience
s, taking advantage of his inherent mobility. In th
is way,
the whole system can benefit from resources discove
red in the spatial proximity. A software architectu
re is
designed, which is based on the implementation of l
ow-cost algorithms able to detect and update the sy
stem
when changes in an ambience occur. Ambience middlew
are implementation works in a wide range of
architectures and OSs, while showing a negligible o
verhead in the time to perform the basic output
operations.
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
This document proposes an Internet of Things (IoT) system to create a smart educational institute. The system would use an Android application to guide visitors around the large campus using a collection of static images stored in a database. It would allow users to view information about different campus locations like departments, cafeterias, and parking based on their current location. The system architecture includes user profiles, a mapping module using Free Space Path Loss to determine location, an image module to display location images, and a recommendation module. The goal is to make it easier for new visitors and students to navigate the campus using their mobile devices.
Design and implementation of a personal super Computer
Resources of personal devices, whether mobile or stationary, can be productively leveraged to service their
users. By doing so, personal users will be able to ubiquitously run relatively complex computational jobs,
which cannot be accommodated in their individual personal devices or while they are on the move. To this
end, the paper proposes a Personal Super Computer (PSC) that superimpose grid functionality over
networked personal devices. In this paper, architectural designs of (PSC) were developed and evaluated
thoroughly through a strictly controlled empirical evaluation framework. The results showed that this
system has successfully maintained high speedup over regular personal computers under different running
conditions.
This document describes a virtual mouse system that uses computer vision and color tracking to replace a conventional mouse. The system tracks colored objects like a red or blue object held in the user's hand to map hand movements to mouse movements and clicks. It analyzes image frames from a webcam to detect pixel colors and scale the detected positions to match screen coordinates. This allows for freer motion than a physical mouse and reduces costs compared to alternatives like touchscreens. The system is implemented using OpenCV for image processing and runs entirely in software on the user's computer.
Towards application development for the internet of things updated
The document discusses developing a domain model for Internet of Things (IoT) applications. It identifies common IoT behaviors like data collection, sense-compute-actuate, and intermittent sensing. An IoT domain model is presented that captures key concepts like entities, sensors, actuators, devices, and software components, as well as their relationships. The domain model provides benefits like a common understanding of IoT terminology, modeling invariant properties, and enabling modular application design.
The document discusses the Internet of Space (IoS), which is a proposed 3D coordinate mapping system that tracks user locations and sets up digital ecosystems reflecting specific places and conditions in real-time. IoS would provide authenticated user/program spatial transactions anchored to real physical areas, setting up a third dimension currently missing from network topologies. This would create intelligent digital ecosystems layered over specific areas and allow users/programs to exist within these ecosystems. IoS could save costs compared to satellite-based location systems and establish real-time interactions within digitally converged program arrays.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
This document proposes an Internet of Things (IoT) system to create a smart educational institute. The system would use an Android application to guide visitors around the large campus using a collection of static images stored in a database. It would allow users to view information about different campus locations like departments, cafeterias, and parking based on their current location. The system architecture includes user profiles, a mapping module using Free Space Path Loss to determine location, an image module to display location images, and a recommendation module. The goal is to make it easier for new visitors and students to navigate the campus using their mobile devices.
Design and implementation of a personal super Computerijcsit
Resources of personal devices, whether mobile or stationary, can be productively leveraged to service their
users. By doing so, personal users will be able to ubiquitously run relatively complex computational jobs,
which cannot be accommodated in their individual personal devices or while they are on the move. To this
end, the paper proposes a Personal Super Computer (PSC) that superimpose grid functionality over
networked personal devices. In this paper, architectural designs of (PSC) were developed and evaluated
thoroughly through a strictly controlled empirical evaluation framework. The results showed that this
system has successfully maintained high speedup over regular personal computers under different running
conditions.
This document describes a virtual mouse system that uses computer vision and color tracking to replace a conventional mouse. The system tracks colored objects like a red or blue object held in the user's hand to map hand movements to mouse movements and clicks. It analyzes image frames from a webcam to detect pixel colors and scale the detected positions to match screen coordinates. This allows for freer motion than a physical mouse and reduces costs compared to alternatives like touchscreens. The system is implemented using OpenCV for image processing and runs entirely in software on the user's computer.
Towards application development for the internet of things updatedPankesh Patel
The document discusses developing a domain model for Internet of Things (IoT) applications. It identifies common IoT behaviors like data collection, sense-compute-actuate, and intermittent sensing. An IoT domain model is presented that captures key concepts like entities, sensors, actuators, devices, and software components, as well as their relationships. The domain model provides benefits like a common understanding of IoT terminology, modeling invariant properties, and enabling modular application design.
Combining cloud and sensors in a smart city environmentNgoc Thanh Dinh
This document discusses combining cloud computing and sensors to create smart city environments. It proposes an architecture based on sensor web enablement standards that abstracts heterogeneous sensor data and makes it available as a service. The architecture is hierarchical, with a high-level intelligence layer and peripheral decision makers that analyze and aggregate sensor data. It aims to provide scalable and reactive data access to meet user requirements. Smart cities are presented as an example application area.
Understanding User Intentions in Pervasive Computing EnvironmentKarthikeyan V
The challenge for pervasive system developers here is to detect the user intention so as to remove any ambiguity in the user’s expression of a pervasive action. Understanding user intentions can be achieved by detecting the user status and the environment status. The attention data and context data thus obtained can be connected to give us the intention data. The user intention data can be helpful in enabling PCE to provide pro-active and situation-specific user support.
SVHsIEVs for Navigation in Virtual Urban Environmentcsandit
Many virtual reality applications, such as training, urban design or gaming are based on a rich
semantic description of the environment. This paper describes a new representation of semantic
virtual worlds. Our model, called SVHsIEVs1
should provide a consistent representation of the
following aspects: the simulated environment, its structure, and the knowledge items using
ontology, interactions and tasks that virtual humans can perform in the environment. Our first
main contribution is to show the influence of semantic virtual objects on the environment. Our
second main contribution is to use these semantic informations to manage he tasks of each
virtual object. We propose to define each task by a set of attributes and relationships, which
determines the links between attributes in tasks, and links between other tasks. The architecture
has been successfully tested in 3D dynamic environments for navigation in virtual urban
environments.
How to make data more usable on the Internet of ThingsPayamBarnaghi
This document provides an overview of making data from the Internet of Things (IoT) more usable. It discusses how sensor devices and "things" are becoming more connected and generating large amounts of data. It describes challenges around discovery, access, search, and interpretation of heterogeneous IoT data at large scales. The document advocates using semantic technologies like ontologies and linked data to help interpret and integrate IoT data with broader web information. It provides examples of sensor markup languages and the W3C SSN ontology for annotating sensor data. Overall, the summary discusses the growing amount of data from the IoT, challenges in making it usable, and how semantic technologies can help address those challenges.
TOWARDS A HYBRID APPROACH FOR ADAPTING WEB GRAPHICAL USER INTERFACES TO HETER...Luciana Zaina
Ubiquitous Computing promises seamless access to a wide range of applications and Internet based services from anywhere, at anytime, and using any device. In this scenario, new challenges for the practice of software development arise: Applications and services must keep a coherent behavior, a proper appearance, and must adapt to a plenty of contextual usage requirements and hardware aspects. Especially, due to its interactive nature, the interface content of Web applications must adapt to a large diversity of devices and contexts. In order to overcome such obstacles, this work introduces an innovative methodology for content adaptation of Web 2.0
interfaces. The basis of our work is to combine static adaption the implementation of static Web interfaces; and dynamic adaptation the alteration, during execution time, of static interfaces so as for adapting to different contexts of use. In hybrid fashion, our methodology benefits from the advantages of both adaptation strategies static and dynamic. In this line,we designed and implemented UbiCon, a framework over which we tested our concepts through a case study and through a development experiment. Our results show that the hybrid methodology over UbiCon leads to broader and more accessible interfaces, and to faster and less costly software development. We believe that the UbiCon hybrid methodology can foster more efficient and accurate interface engineering in the industry and in the academy.
Semantic Technolgies for the Internet of ThingsPayamBarnaghi
This document discusses semantic technologies for representing and integrating data in the Internet of Things (IoT). It describes how XML, RDF, and ontologies can provide interoperable and machine-interpretable representations of IoT data. Specifically, it explains how these technologies allow defining structured models and vocabularies to annotate sensor data and integrate information from multiple heterogeneous sources. The document also discusses challenges in IoT data such as heterogeneity, multi-modality, and volume, and how semantic technologies can help address issues of data interoperability, discovery, and reasoning.
An ontology for semantic modelling of virtual worldijaia
This article presents a new representation of semantic virtual environments. We propose to use the ontology as a tool for implementation. Our model, called SVHsIEVs1 provides a consistent representation of the following aspects: the simulated environment, its structure, and the knowledge items using ontology, interactions and tasks that virtual humans can perform in the environment. In SVHsIEVs, we find two type of ontology: the global ontology and the local ontology for Virtual Human. Our architecture has been successfully tested in 3D dynamic environments.
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
Tutorial on Data Modelling and Knowledge Engineering for the Internet of Things, presented at EKAW 2012, Galway City, Ireland, October 8-12, 2012
http://knoesis.org/iot-tutorial-ekaw2012/
This document presents a system for managing spatial databases on mobile devices. It proposes an architecture with three tiers: a data tier providing open standards interfaces, a middleware tier enabling access to spatial data services, and a mobile tier with GIS software to access, display, and edit spatial data locally. It describes a prototype implementation on Android phones using OpenStreetMap data stored locally in a spatial database to allow spatial queries without internet. The prototype demonstrates line-of-sight and field-of-view queries to filter objects not visible to the user and reduce information overload.
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
This document presents IoT-Lite, a lightweight semantic model for annotating data in the Internet of Things. IoT-Lite aims to address issues of heterogeneity and interoperability in IoT systems by providing a simple way to semantically describe sensors, actuators, and other devices. It reuses existing models like SSN and defines best practices for annotation. Evaluations show IoT-Lite imposes minimal overhead on data size and query time compared to other semantic models. The goal of IoT-Lite is to make semantic descriptions transparent and easy to implement for both end users and data producers.
Resource efficient floating-point data compression using mas in wsnijasuc
In a wide range of applications, large amounts of f
loating-point data are generated by Wireless Sensor
Networks (WSNs). This data is often transferred bet
ween several sensor nodes, in a multi-hop fashion,
before reaching its ultimate destination (the base
station). It is well known that data communications
is the
most energy-consuming task in sensor nodes [1]. Thi
s can be a great concern when the nodes are
constrained in energy. Therefore, the amount of dat
a to be transferred between nodes should be reduced
to
save energy. In this paper, we investigate data com
pression for resource-constraint WSNs; we introduce
MAS as a novel adaptive lossless floating-point dat
a compression algorithm for WSNs. MAS exploits the
disproportionality in energy consumption between da
ta transmission and processing. Simulation results,
obtained from OMNeT++ and Atmel Studio, show that M
AS surpasses other tested compression algorithms
in terms of compression ratio, compression speed, m
emory requirements and most importantly energy
savings
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
Het concept flipping the classroom kan ook in trainingen gebruikt worden. Bekijk de slideshare wat het concept inhoudt en wat voor- en nadelen zijn. Hoe werkt het voor jou?
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
This document analyzes the impacts of various structural factors on energy consumption in cluster-based wireless sensor networks through extensive simulations. It finds that the best performance for prolonging network lifetime is achieved by locating a sufficient number of sinks around the network area rather than having a single sink located at the edge of the topology. The document discusses clustering approaches for wireless sensor networks and three models for electing cluster heads. It also outlines the experimental architecture and parameters used in the simulations.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
REVIEW OVER HOLE HEALING TECHNIQUES IN WIRELESS SENSOR NETWORKS ijasuc
This document summarizes and compares various hole healing techniques in wireless sensor networks. It discusses hole selection methods such as random, maximum size, nearest distance, travelling salesman problem, and weighted. The weighted method considers hole angle, distance, and depth to assign priority. It then reviews hole healing processes including Voronoi diagram based, Delaunay's triangulation, and direction adjustment approaches. Experimental results show the weighted method improves both coverage and connectivity while the travelling salesman method achieves near complete coverage with additional nodes.
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNijasuc
Ensuring connectivity in Wireless Sensor Networks (WSN) is a challenging issue, especially in hazardous
areas (like battlefield). Many applications of WSN require an important level of connectivity in the network
to detect a given event (like detection Intrusion) and forward it to the ”sink” node in order to alert users.
For these risky areas the deterministic deployment is not usually guaranteed and the network is composed
by a set of disconnected Islands. We present in our work two strategies to relocate sensors in order to
improve the connectivity using mobile Robots. These two solutions are called Multi-Robot Island-based
Relocation (MRIBR) and Multi-Robot Grid-Based Island-based Relocation (MRGIR). Through several
simulations, we show that MRGIR outperforms MRIBR. Our study can be used especially to make a tradeoff
between the number of deployed sensors and the numbers of the used mobile robots, according to the
quality needed for the application.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Impact of the temperature and humidity variations on link quality of xm1000 m...ijasuc
The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Het vraagt de nodige creativiteit om e-learning met een beperkt budget te ontwikkelen. Om je te helpen, lees je hier 5 tips om e-learning te ontwikkelen met een beperkt budget.
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...ijwmn
An OFDM system is combined with multiple-input mult
iple-output (MIMO) in order to increase the
diversity gain and system capacity over the time va
riant frequency-selective channels. However, a maj
or
drawback of MIMO-OFDM system is that the transmitte
d signals on different antennas might exhibit high
peak-to-average power ratio (PAPR).In this paper, w
e present a PAPR analysis reduction of space-time-
block-coded (STBC) MIMO-OFDM system for 4G wireless
networks. Several techniques have been used to
reduce the PAPR of the (STBC) MIMOOFDM system: clip
ping and filtering, partial transmit sequence
(PTS) and selected mapping (SLM). Simulation result
s show that clipping and filtering provides a bette
r
PAPR reduction than the others methods and only SLM
technique conserve the PAPR reduction in
reception part of signal.
A W ARNING S YSTEM F OR O VERSPEED A T T HE C ORNER U SING V ISIBLE L...ijasuc
When a car enters a
corner
with
over speed,
it rise
s
the accident risk higher
.
To warn the risk and urging
the caution to drivers, many of the accident
-
prone corners have warning rights. The driver can decelerate
the car smoothly and pass through the
corner safety by those
devices.
However
, appropriate speed for each
corner is differ
ent by curvature of the corner and characteristics of the vehicle.
The driver
has
to suppose
the safe speed for every corner only by experience,
usually. Of
co
urse too much slow causes traffic jam.
Especially at the first road in the first place for the dr
iver, it is difficult to suppose the curvatures of the
corners. Then
, we propose a visible light communication system so that the warning lights in the corner
send appropriate warning information. V
isible light communication transmits
a signal by blinking the light.
One of the characteristics of
visible light communication is that it can use
existing
lighting equipment as a
transmitter.
In our system, we
can distribute the
warning
information to the driver using the visible light
commun
ication.
Though
the curvature(R:radious) of the corner does not change, the speed of each vehicle
to approach the corner always to different.
Focusing the distance from the corner to the car, we consider a
communication system to send different kind of inf
ormation according to that
distance.
If
the distance is
enough long, the driver has a plenty of time to decelerate the
vehicle. The
more the distance becomes short,
the more the driver is required rapid
deceleration. Therefore
, to distribute the appropriat
e warning
information to the driver, dividing the distance from the corner into some areas, we make the system to send
different information in each
area. Generally
in communication system, modulation primarily changes the
amplitude, phase or
frequency. In
visible light communication, change of the amplitude changes the
brightness, which causes flickering that burdens the
drivers. Therefore
we cannot use amplitude based
modulation.
Next
we consider the varying the
phase.
Unfortunately
, it is difficult for t
he receiver using
photodiode or phototransistor to read the difference of the phase of the signals, because the frequency of
the light is very high
in visible light communication.
Then we employ 'symbol length' with the Pulse
Position
Modulation (
PPM).In our method, brightness does not change when the symbol length is
changed.
We
investigate the system performance by changing the communication
speed. Short
symbol length in high
frequency is sensitive and vulnerable to noise, instead of low frequenc
y with strong against
noise.
Using
this characteristic of symbol length modulation, dif
Carlos Alfredo Rodríguez Miranda is studying mechanics and his file number is 867293. He spent his day playing soccer, eating fish, and sweeping the dining room. While playing with his daughter, a dog barked and he was studying while his daughters drew.
Salem State College's Employee HandbookMartha White
I designed, took the photographs, created, worked with the publishing company, and edited the source document to create the first printed copy of Salem State College's Employee Handbook.
Dokumen tersebut merupakan data pribadi seorang mahasiswa bernama Syahroni yang berada di kelas R7H dan mata kuliah Komputer Grafik dengan dosen Nahot Frastian. Program komputer grafik yang dijelaskan adalah DrawText yang menuliskan teks "the Height result of Education is" dengan font Helvetica bold italic.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
This document provides an overview of the Summer 2007 Seminar on Context-Aware and Ambient Applications at the University of Bonn. The seminar will be run like a scientific conference over three dates in April and June 2007. Topics to be covered include context-aware software architectures, indoor and outdoor location sensing, activity recognition, and security and privacy issues in context-aware systems. Students will present topics in 90-second presentations and submit papers by early June. More information can be found on the seminar website.
A Survey Of Context-Aware Mobile Computing ResearchKelly Lipiec
This document provides a survey of research on context-aware mobile computing systems and applications. It discusses definitions of context, including categories of context like computing context, user context, physical context, and time context. The document also defines context as the set of environmental states and settings that determine an application's behavior or where application events occur and are interesting to the user. It surveys context-aware applications and how they sense and model contextual information. The difficulties and potential solutions outlined will help researchers make context-aware computing a reality.
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
This document summarizes a study on improving the efficiency of resource utilization in virtual infrastructure for high-throughput computing. The study proposes a pre-staging model where virtual machine images are pre-loaded on execution nodes and jobs are directly submitted to the virtual machines. Experimental results show that the pre-staging model improves job execution times by 10-15 times compared to using Condor's virtual universe, with greater improvements for non-HPC jobs. The overhead of virtualization also reduces performance gains for HPC jobs like MPI applications.
The soap based mechanism for home environment using web services ecij
Recent advancements in smart home systems have increased the utilization of consumer devices and appliances in home environment. However, many of these devices and appliances exhibit certain degree of heterogeneity and do not adapt towards joint execution of operation. Hence, it is rather difficult to perform interoperation especially to realize desired services preferred by home users. In this paper, we propose a new intelligent interoperability framework for smart home systems execution as well as coordinating them in a federated manner. The framework core is based on Simple Object Access Protocol (SOAP) technology that provides platform independent interoperation among heterogeneous
systems. We have implemented the interoperability framework with several home devices to demonstrate
their effectiveness for interoperation. The performance of the framework was tested in Local Area Network(LAN) environment and proves to be reliable in smart home setting1.
THE SOAP BASED MECHANISM FOR HOME ENVIRONMENT USING WEB SERVICES ecij
Recent advancements in smart home systems have increased the utilization of consumer devices and appliances in home environment. However, many of these devices and appliances exhibit certain degree of heterogeneity and do not adapt towards joint execution of operation. Hence, it is rather difficult to perform interoperation especially to realize desired services preferred by home users. In this paper, we propose a new intelligent interoperability framework for smart home systems execution as well as coordinating them in a federated manner. The framework core is based on Simple Object Access Protocol (SOAP) technology that provides platform independent interoperation among heterogeneous systems. We have implemented the interoperability framework with several home devices to demonstrate their effectiveness for interoperation. The performance of the framework was tested in Local Area Network (LAN) environment and proves to be reliable in smart home setting1.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
The document describes enhancing the space sensing capabilities of networked robots (URC) developed by ETRI Korea using the Atlas service-oriented architecture platform from the University of Florida. The collaboration integrates the URC robots into pervasive computing environments provided by Atlas. This allows the URC robots to utilize external sensors and overcome onboard limitations, improving space sensing. The implementation provides robots ability to collaborate with sensors for complex tasks to better assist elderly people.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
This document proposes a smart semantic middleware for the Internet of Things. The middleware would allow for self-managed complex systems consisting of distributed and heterogeneous components. Each component would be represented by an autonomous software agent that monitors and controls the component. Semantic technologies and ontologies would be used to enable discovery and interoperability between heterogeneous components. The proposed middleware aims to support self-configuration, optimization, protection and healing of complex systems.
This document proposes incorporating a control system into an existing ubiquitous computing environment (SEDINU system) to allow for manipulation of physical objects. It describes modifying the SEDINU system's database (RBACSoft) to include a control system entity with attributes linking it to autonomous areas and physical objects. A communication protocol is proposed using the USB 2.0 standard for the host services and control system to interact. The control system would allow changing the states of physical objects from mobile devices based on requests from the host services. Future work could include handling multiple concurrent mobile access and migrating to USB 3.0.
This document describes a Relaxed Context-Aware Machine Learning Middleware (RCAMM) for Android that was developed by students and a professor at V.E.S. Institute of Technology in Mumbai, India. RCAMM collects and stores context information from mobile devices and uses machine learning to provide personalized suggestions to users. It aims to reduce redundancy for developers by handling context collection and storage in a middleware, allowing apps to simply consume context data. The middleware uses a hybrid context model with JSON encoding and a relational database to store historical context values from devices.
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
A Framework To Generate 3D Learning ExperienceNathan Mathis
The document discusses a framework called OpenWebTalk (OWT) that was created to generate configurable 3D learning experiences. OWT is a declarative 3D component framework based on XML documents that describe both the formal structure of the virtual world and the complex set of interaction rules that govern user interactions. This framework aims to help fast prototyping and easy building of collaborative applications. It decouples all phases of authoring, allows easy definition and composition of virtual sessions in a component-oriented fashion, and can drive and control interactions to stimulate collaboration. The framework also provides a high-performance 3D rendering engine configurable through XML.
Similar to Ambiences on the-fly usage of available resources through personal devices (20)
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Measuring the Impact of Network Latency at Twitter
Ambiences on the-fly usage of available resources through personal devices
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
AMBIENCES: ON-THE-FLY USAGE OF AVAILABLE
RESOURCES THROUGH PERSONAL DEVICES
Beatriz Otero and Marisa Gil
Computer Architecture Department, Universitat Politècnica de Cataluña
Barcelona-TECH
ABSTRACT
In smart spaces such as smart homes, computation is embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provide a pool of available resources which the user can take
advantage, interacting and creating a friendly environment. The inherent composability of these systems
and other unique characteristics such as low-cost energy, simplicity in module programming, and even
their small size, make them a suitable candidate for dynamic and adaptive ambient systems. This research
work focuses on what is defined as an “ambience”, a space with a user-defined set of computational
devices. A smart-home is modeled as a collection of ambiences, where every ambience is capable of
providing a pool of available resources to the user. In turn, the user is supposed to carry one or several
personal devices able to interact with the ambiences, taking advantage of his inherent mobility. In this way,
the whole system can benefit from resources discovered in the spatial proximity. A software architecture is
designed, which is based on the implementation of low-cost algorithms able to detect and update the system
when changes in an ambience occur. Ambience middleware implementation works in a wide range of
architectures and OSs, while showing a negligible overhead in the time to perform the basic output
operations.
KEYWORDS
Pervasive system; smart space; resource mobility; middleware; runtime management
1. INTRODUCTION
The development of data-centric and user-centric applications is growing and becoming
increasingly common, to the extent that we find computational devices everywhere [1]. Smart
spaces such as smart cities [2][3] and domotics are well-known examples of pervasive systems,
also known as ubiquitous systems. However, Weiser’s vision of pervasive computing as
“invisible” computing, where people would not be aware of tools, and would have easy
technological access, has not been accomplished yet. Nowadays “Internet of things” work again
reveals a complex and powerful development, but far removed from the simplicity that Weiser’s
predicted.
These pervasive platforms tend to be based on a set of distributed cooperating components that
share resources, thereby eliminating their inherent resource constraints. From the point of view of
distribution, several components connect through the network to make a complete system. The
system manages the components (or nodes) as well as the resources provided by them, which are
viewed as a global resource pool accessible to everyone.
DOI : 10.5121/ijasuc.2013.4501
1
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
However, some relevant characteristics exist that make pervasive systems more complex in their
management, and distinct from all other types of distributed systems. Connection tends to be
heterogeneous, so different components can connect through different protocols and bandwidths,
generally wireless networks (Zigbee, Bluetooth, Wi-Fi, etc.), with interactions between user and
resources that require certain proximity. The system is built dynamically: it is mobile and
components appear and disappear at any time [4][5]. The user might require resources provided
by the environment in order to complete a service.
From the resources point of view, the components are usually different one from the other,
usually mobile and resource limited (i.e. smartphones, sensor devices, or netbooks) in some
respect (memory, battery power). To complete a service, the user might require resources
provided by the environment so, by sharing their resources, they can improve their capabilities as
well as the global system.
In this context, runtime and middleware play a leading role in building optimal systems, both
from the point of view of the developers (making programming easy) and the performance
(managing heterogeneous and dynamic resources). The main support that middleware should
provide is spontaneous interaction, context management and application adaptation. In addition,
smart spaces should be able to acquire and apply knowledge about their environment, and to
adapt to their inhabitants in order to improve their experience in these environments [6].
Resource scheduling in these systems is aimed at taking advantage of the system resources as a
global pool of different quality and power capabilities. This presents a challenge to current
research, and is highly dependent on the system platform and goals. Although general ubiquitous
systems have proven to be complex, it is possible to establish simple strategies for particular
contexts.
In this paper a virtual model to represent user smart spaces, called ambiences, is proposed. This
approach is based on a personal device context, a very typical scenario today, where a person
owns several devices and would be able to define the most suitable application output. Examples
of such ambiences are the user home, the user vehicle or the user him/herself. For these personal
contexts we define some data structures to make the proper management of resources distributed
into the ambiences, and we present intelligent algorithms to detect the availability of different
resources in the system quickly, in order to be able to select the most suitable for a particular
application execution.
The rest of the paper is organized as follows: Section 2 reviews the related work. Section 3
characterize the context and types of resources we can find for a specific kind of environment and
user profile style; in Section 4 we introduce the middleware, defining the mechanisms and
strategies to manage the resource availability. Section 5 present experimental results to evaluate
the performance using the proposed algorithms. Finally, Section 6 shows the conclusions and
points out new directions for future work.
2. RELATED WORK
Resource management for pervasive computing and ambience intelligence has been addressed by
different works since years ago, projects such as, Aire [7], Aura [8], and Gaia [9] are a few
examples. These projects have considered the automatic control of the physical conditions in
smart spaces through automated sensing of the users and their environment, where automatic
control facilitates the activities that the user must regularly undertake. To achieve this, the
aforementioned projects have defined a software infrastructure to support the execution of tasks,
able to maximize the use of available resources, and minimize user distraction. However, the
2
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
main characteristic of these solutions is that, they are oriented to the development of applications
with the ability of advantaging pervasive resources, and do not consider a user-centric approach
where the user can select one output device, and this selection is based on its own ambiences
characteristics, user’s own devices, space and mobility.
Other similar projects like the Dynamic Composable Computing (DCC) [10] uses a “join-thedots” metaphor to create logical computer systems from the best set of wireless component parts
available nearby; and MobiGo [11], which consists of a middleware system that migrates service
states to achieve seamless mobility saving and resuming in other environments with adaptation of
available resources. The main difference with the proposed middleware is that DCC relies on
specialized devices to allow composition, and MobiGo use external services to access its data.
In [12], the authors propose an infrastructure and a protocol to incorporate pervasive computing
based on cloud services. A major disadvantage in using cloud architectures for pervasive
environments is the need for security policies for personal computers and small networks. This
security concern is difficult to achieve and maintain in these ubiquitous mobile environments that
have dynamic management of resources, and thus often lack central control.
Finally, regarding communication protocols, there exist works [13][14] describing proprietary
protocols developed by Apple Inc. and Samsung companies respectively, to share digital
multimedia contents using devices from these commercial brands either wirelessly or with a
cable. However, a main drawback from these implementations is the interoperability among
platforms and devices, these protocols have been designed considering specific hardware features
and closed APIs, and therefore with the sole use of such implementations it is not possible to
seamlessly and transparently share peripherals among different vendor devices. Thus, considering
the proprietary characteristics of these protocols, this work focuses on the design of a low
overhead protocol that allows different devices to interoperate, disregarding specific vendor
features.
3. USER CONTEXT CHARACTERIZATION
Smart spaces are pervasive systems that work in a broad range of environments, each of them
with quite different characteristics, ranging from smart cities to intelligent buildings or
autonomous personal devices. Depending on the necessities, the system requirements and runtime
design can differ notoriously, adding more or less complexity.
Our vision is based on a user-centric approach; meaning that, all devices and gadgets belong to
the same owner and, as the user is moving from one zone to another, is the user’s main device the
one that will appear or disappear in the ambiences defined in the system, as a result, available
devices and their resources can appear or disappear seamlessly as shown in Figure 1.
Figure 1. User moving from zone B to zone C
3
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
Examples of these environments are: an apartment, an office, or a vehicle. All these places today
hold many gadgets and mobile devices belonging to the same person, several of them having the
same or even more powerful capabilities, and, with enhanced characteristics (e.g., higher quality
larger screen), or with energy-saving possibilities (e.g., different communication protocols, or
output formats). It is important to note that specific or particular security controls, or concerns
about privacy, are not necessary, because the user is inside a secure personal space.
In general, we can differentiate autonomous devices, which run their own OS and manage their
own resources, from devices that can be considered as merely input/output devices, which
provide data. The proposed approach aims to provide a resource pool for all the system that can
be accessed from a main autonomous device that acts as the manager of all the resources, either
local or external to this device. This pool is spatially grouped in ambiences, and even if, in the
system there are some other autonomous devices, only one is the manager, therefore, the rest will
only act as input/output providers. In this context, clearly, smart-phones have the same powerful
ability to communicate and run all kind of applications as well as laptops, tablets or other generalpurpose computer systems. Nevertheless, at a given moment, the user might be willing to benefit
from available resources, thus, from a tablet device it can be possible to generate video that can
be watched on a TV screen or on a laptop screen, this is, to advantage a better video quality, or
just to benefit from a larger display. Given this scenario, the system is defined as a mobile
context-aware system, centered on user mobility and running user-centric applications. The main
characteristics that define our specific pervasiveness are:
1. The user wears the main device.
2. Other peripherals/gadgets can supply more quality services.
3. The user can move from one zone to another, but he/she is not continuously in movement.
The clearest example is a person at home, using smartphone or laptop applications, and from time
to time moving from one room to another. In each room, he/she can use different available
resources such as screens (TV, PC) or speakers, depending on the desired quality, energy, etc.
As mentioned before, the proposed solution is based on what has been defined as an “ambience”:
the minimum unit to apply resource management policies. The basic environment is a collection
of ambiences (e.g. rooms of one’s own house), each one with a set of computational devices. In
this way the system can benefit from resources discovered in the spatial proximity. Figure 2 (left)
shows an apartment with some ordinary computational devices. We refer to it as a physical
model. The Figure 2 (right) also illustrates the equivalent virtual model with each room
representing an ambience. Because the visible resources are changing, algorithms to detect and
update the system when devices appear/disappear are required, as well as to decide which
resources can be used by an application, and moreover, to decide which is the most suitable
resource for a specific execution. Therefore, the context-aware algorithms must:
•
Detect availability/unavailability of resources in the system on-the-fly while the
application is running.
•
Be able to adapt to changes in the environment due to user mobility, or when devices are
no longer available (flat battery, for example).
•
Produce effects to changing conditions, without involving the user in maintenance tasks:
the user provides a description of his/her needs.
These phases are known in the field as sensing, adaption and effecting functionality, respectively
[15].
4
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
As long as we have only one main device in the system, we cannot talk about a centralized or
decentralized solution. However, we use a self-scheduling policy, based on the current ambience,
and this approach is equivalent to a decentralized view: we believe a decentralized solution is
always preferable, based on the particular location of each device. The manager –autonomousdevice looks for resources and updates its own information, acting as an individual component.
Based on their presence into the ambience, we distinguish between:
•
Static resources: Resources belonging to an ambience. When the user enters this
ambience the resource appears and is always available (i.e. screens, speakers).
•
Dynamic resources: Resources that appear and disappear independently of the ambience.
An example might be sensors.
A) Living Room
1. PDA
2. Laptop
3. TV Screen
B) Dining Room
1. Smartphone
2. Speakers 1
C) Bedroom
1. MP3 Player
2. Computer
3. Speakers 2
D) Kitchen
1. TV Screen
Figure 2. Correlation between the physical and virtual model: left) Physical model, home with furniture and
devices in their corresponding room and place; right) Virtual model with an “ambience” representing each
room and its associated devices
In the next section, we introduce the main component of our solution: the middleware in charge
of managing communication between different devices and to represent and define ambience
objects; and also how the system determines the resource it should choose to satisfy user
requirements.
4. AMBIENCE RESOURCES MANAGEMENT
The foundation in the proposed system is the already existing ambience information. For each
defined ambience, the system has their resources, their properties and the corresponding
qualification, and can establish the use of the resource directly. This is applicable in particular for
static resources, since at least the local resource (i.e. resource belonging to the main device) is
always present. When moving to another ambience, again, the best resource selection is defined
(based on quality context) and assigned immediately.
The key is to have the data structures needed to store and maintain information about the system
state and resources, and then the mechanisms to detect dynamic changes as well as resource
management policies to provide the best service to the user. A communication mechanism able to
operate over a wide range of platforms is also necessary. All these elements are managed by a
middleware; the first-class object situated in the device is acting as the system manager.
These data structures consist of: the Ambience struct representing an ambience and containing all
its related information (e.g. position, list of associated devices, etc.); the set of all user defined
5
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
ambiences is then represented by the Ambience list. The registered-device struct that stores each
of the devices information (e.g., type, status, locking, and qualification defined by the tuple
[Video, Audio, Image]); thus the set of registered devices is then represented by an array of
devices descriptors. Finally, the available devices list which comprises all available devices that
are both, visible and connected and from where the output device is chosen. Then, the available
devices list is a set of devices that have been previously registered by the user (i.e. a subset of the
registered devices list) and which in turn have been associated to the current ambience. The
available devices list is ordered according to the tuple [priority, device index], in the way that, the
middleware will always select the first element. In cases where, there are not available devices,
the middleware will then select from the local resources (device index=0).
To connect to the current output device, a client-server architecture is established, using the wellknown socket communication paradigm as the standard interface and available for use in a wide
number of platforms and Oss, from WSN to specific embedded systems to general-purpose
laptops or computers. The communication link between devices, use the socket connection with
the IP address obtained from the device struct. The client starts the communication request and
once the server accepts the connection, starts to stream the data packets, thus the output device
can play the content on the requested resource.
If the user moves to another ambience, different possibilities exist for determining the user
mobility that causes an ambience change. To define the current ambience explicitly, we can have
a position sensor (we are in the living room, or in the car, for example); or we can define a
threshold of appearing/disappearing static resources to indicate that we have already entered a
new ambience and what this ambience is. All this should be done in a simple way. To keep
information and changes in the specified context, the following issues must be addressed:
•
Establish the initial ambience and policy, and prioritize the best output device based on
these;
•
Detect when devices dynamically appear/disappear in order to update the system state
information;
•
Change the ambience and then move to a completely different resource table.
We consider that users are always in a particular ambience (the base ambience) based on the
current user position. Although all -or almost all- devices can move, appearing and disappearing
from a specific ambience, the local resources are always available in all ambiences. The user
configures the system by introducing “ambiences” and “ambience devices” into the system.
Devices are added in the registered devices list, and from now on, only these devices can be
managed by the system.
A multithreaded scheme is used to manage this information and lists updating: controller,
monitoring and workers. The monitoring thread checks if the registered devices are available in
the current ambience and update the corresponding lists. The controller is the main thread in
which many actions are taken as selection of resources based on policies, aggregation of new
resources, and updating of statuses. The workers threads actually are in charge of streaming the
data to the selected device.
6
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
Ambience list
Ambience struct
Available devices list
Figure 3. Best output device selection on a specific ambience and policy
4.1. Resource selection policies
Consider an scenario where the base ambience is the living room, and the available devices are a
laptop and a wall screen, just as shown in Figure 3. In this scenario, it is assumed that the user is
watching a multimedia file, and then the most suitable output device is the wall screen according
to its capabilities values (first in the list). Now, consider that the wall screen is not available, the
middleware is able to detect this failure, and will look for the next available device in the list, in
this case, the laptop, which is available and able to show the multimedia file. The device is
chosen from the available device list, which is generated based on a policy. In the initial
approach, three different policies to choose a device in a base ambience have been implemented.
Each policy sorts the device list from a particular ambience by assigning a priority value to the
different devices. This value changes according to the criteria of the policy used. To explain each
policy, four devices and three categories are defined, according to their file extension: video (e.g.
avi, mpg, mp4), audio (e.g. mp3, wav) and image (e.g. jpg, gif, png). Table 1 shows the value that
represents the capability to play the multimedia categories for each category and device
considered.
Table 1. Device list qualifications according to its resources capabilities.
Device type
Computer
TV
Music player
Smartphone
Video
Audio
Image
4
6
0
2
4
5
6
2
4
6
0
2
The first policy for choosing a device is called the Output-Quality policy. This policy gives
priority to the device which has the best audio-visual quality for playing a particular multimedia
format. For example, if the user wants to play a video file, and considering the multimedia
categories defined above, then the chosen device is the TV, because it has the best video value of
the available devices.
The second policy is called the Cost Estimation policy. This policy chooses the device based on
the combination of two quality criteria: the best quality for playing a particular multimedia output
format (Q) and the signal-quality connectivity device (C). The objective is to calculate a priority
value (P) from these criteria using the harmonic mean, as follows:
7
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
Table 2 shows an example of this policy considering two devices in an ambience and the user
wishing to play a video file. The select device is the TV, according to the priority value
calculated.
Table 2. Cost estimation policy.
Device type
TV
Computer
Connectivity device
(C)
3
3
Multimedia output format (Q)
Priority value (P)
6
3
4
3
Finally, the last policy is called the Manual policy. This policy is the natural way of selecting a
device, enabling users to choose the output device directly through an application menu. Because
devices are “visible” to the user, this policy does not satisfy the properties of a pervasive system,
although we consider it interesting to offer the user this possibility.
4.2. Ambience adaptation
When the user moves, conditions and many resources may also change. In this situation we have
two scenarios: devices that appear/disappear, and eventually an ambience change. The first
situation to occur is when a device disappears because the user is moving and the device is no
longer accessible: when the resource in use has already disappeared the application has to adapt to
the new resource, which may not yet have appeared. Our first approach for this situation is to
move to local.
For example, the initial situation is as follows: he/she is in the living room and is using the TV
screen to watch a music video. At a given moment, the user exits the room and the connection
with the TV is lost, so he/she continues the video visualization through the next on the list: the
Smartphone screen.
If the disappearing resource is a dynamic, for example a temperature sensor, our first approach is
simply to stop the application from running. In this case it does not matter whether it is the user or
the sensor that disappears from the “Base ambience”. The same situation may be caused by a
device error, and the response will be the same.
When the number of resources is continuously disappearing, we may assume that the ambience is
changing. In this case, it is necessary to detect the new ambience in order to react and manage the
current possibilities. The question is how many resources are required to indicate that the user is
moving from one ambience to another.
A position sensor can be used to simplify the identifications of a particular ambience. This sensor
can also help to identify quickly if we are going to a different ambience. Depending on the
platform sensors, different options exist to indicate that the user is leaving an ambience: for
example, we can establish spatial ambience distributions if allowed, and then entering/exiting
depending on the location movement. Another way to consider that the user are entering a new
ambience therefore changing his current base ambience is, to discover the number of resources
that disappears/appears which indicates that the user is leaving an ambience and hence entering in
a new one.
We establish a MAX_DISAPPEAR threshold value: when the number of disappearing ambience
resources reaches this value, the system considers the user has left the ambience. In addition, a
MIN_APPEAR value determines that a sufficient number of resources are appearing to indicate
8
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
that we are in the resources ambience. As soon as the change in “Base ambience” is detected,
default resources are updated and output/input redirected to the new one, should this be needed.
This shift from one ambience to another may well give rise to a “limbo” situation, in which the
resource in use has already disappeared but the application that must adapt to the new resource
has yet to appear. Our first approach for this situation is again to move to local.
Finally, the possibility that the user-worn device has no local version of the peripheral is not
addressed in this paper.
5. EXPERIMENTAL RESULTS
We evaluate the overhead introduced by the middleware to validate our framework, based on the
code size and the time spent in the basic communication operations for sending data.
Given the aforementioned conditions, the initial experiment scenario considers two ambiences of
9m2, and with a maximum distance of 2m between two different devices, both with two different
and available server devices, a Linux-based High-quality screen and an Apple MacBook. All
devices in the ambiences are communicating through a 100Mb/s Wi-Fi connection.
The user wears a MeeGo OS tablet, and the programming language used for the middleware is the
framework Qt/C++, which allows GUI applications software to be developed. In the case of the
output devices, the server program is developed in Java. The size of the middleware is 368Kb and
the server program is 8Kb. Both sizes are small enough to be contained in any device especially
resource constrained devices. To test the proposed approach three multimedia files are
considered: they consist of a video clip (mp4) of 5.1Mb, a song (mp3) of 2.4Mb and a picture
(jpg) of 39Kb. The user interacts with the middleware through the user interface and selects the
policy of public available shared resources. Then, the middleware selects the most suitable device
based on the Output-Quality policy, as defined in Section 4.1. Once the server device has been
selected, the local device streams the corresponding information; if server resource becomes
unavailable (noisy environment, out of power, etc.), the main thread selects another device (if
available) based on priorities calculated by the Output-Quality policy. Note that if no other
external resource is available or if the user leaves the ambiences, the local device will continue
playing the multimedia files. It is also worth mentioning that the process of detecting an ambience
change is too expensive for any mobile device considering the current constraints in battery
resources; however, we are exploring new mechanisms to afford this limitation.
As may be deduced from Table 3, the middleware overhead impact on the overall transmission
rates is not significant. The time overhead introduced by the middleware is constant and around
of 1.2s. The time overhead to send the output to an external device is 8ms, which in this specific
kind of application is negligible. And finally, in case of connection failure due to the device
disappearance, i.e. changing from ambience, the time taken was in the range of 1.2s and 13.4s.
Table 3. Time overhead results.
Middleware / Type of file transferred
Without middleware
With middleware in local device
With middleware in output device
With middleware and connection failure
Video (secs)
70,064
71,326
71,335
84,755
Audio
(secs)
160,062
161,317
161,325
174,69
Image
(secs)
0,063
1,319
1,326
Not apply
9
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
6. CONCLUSIONS AND FUTURE WORK
In this paper we present a mobile context-aware framework based on pervasive personal systems.
The framework focuses on a user-centric environment: the user wears the main computing device
(mobile device) and the available resources (mobile and fixed) are located among the different
user-defined ambiences in which, given a user’s location (current ambience), different output
peripherals become available and could provide better quality.
The proposed framework dynamically handles ambience detection. If a user’s location changes,
currently used peripherals become unavailable and disappear., Thus, the system continues the
execution by selecting the default resource (local), and if a threshold of a specific amount of
disappeared devices is reached (user moving to a different ambience) the system detects the
change of ambience and identifies it in order to publish the new ambience-assigned peripherals
based on the defined policy.
The policy management and the proposed algorithms have been tested and the results obtained
demonstrate that the overhead introduced by the middleware for streaming the information to the
output device (external peripheral) is negligible and thus perfectly suitable for such environments.
Moreover, both middleware and server applications are small enough to be contained in any
device, including resource constrained devices.
The current implementation is limited by the validation of a threshold indicating that the number
of disappeared devices in an ambience has been reached. As future work, we propose to improve
dynamicity by predicting the next ambience (on the fly), as the user moves from one ambience to
another, by dynamically validating his/her location changes, and therefore enhancing
performance and quality of service. Furthermore, we have identified other needs such as the
implementation of multi-tasking, which in turn will imply definition of more complex policies to
establish priorities among applications and the possibility of preemptive/nonpreemptive policies
to access devices once they are already in use.
Finally, we introduce a “contextualized” security component for places where information must
be protected due to its confidentiality. Examples of these places are shopping malls or hospitals.
In the latter case, doctors and other clinical professionals frequently work with files and images
that must be protected, and should not be shared by everyone. Such images must also be deleted
and made inaccessible for people who may subsequently use the same devices (for example,
patients who may later use the same room).
ACKNOWLEDGEMENTS
The authors would like to thank Carlos Medina for his valuable support with the first prototype
implementation. We are also grateful to Jetzabel Serna for her helpful comments and suggestions.
This work has been supported by the European Commission through the HiPEAC-3 Network of
Excellence (FP7/ICT-217068), the Spanish Ministry of Education (TIN2012-34557), and the
Generalitat de Catalunya (2009-SGR-980).
REFERENCES
[1]
[2]
Kostakos V., O’Neill E. and Penn A. (2006). Designing urban pervasive systems. IEEE Computer.
Nippun A. A., Kiran G. and Sudarshan TSB (2010). “Intelligent lighting system using wireless
sensor networks”. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) 1(4),
pp. 17-27.
10
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.5, October 2013
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Waltersand J., Kanter T. and Rahmani R. (2013). “Establishing multi-criteria context relations
supporting ubiquitous immersive participation”. International Journal of Ad hoc, Sensor &
Ubiquitous Computing (IJASUC) 4(2), pp. 59-77.
Kalapriya, K. et al. (2004). “A framework for discovery in pervasive computing for mobile aware
task execution”. Computer Frontiers (CF’04), Ischia, Italy.
O’Keeffe D. (2010) “Distributed complex event detection for pervasive computing”. Technical
Report UCAM-CL-TR-783, Cambridge.
Cook D. and Das S. (2004). Smart environments: Technology, protocols and applications. John
Wiley and Sons, pages 424. ISBN: 0-471-54448.
Hanssens N., Kulkarni A., Tuchinda R. and Horton T. (2002) “Building agent based intelligent
workspaces”. In proceedings of the ABA Conference.
Garlan D., Siewiorek D. P., Smailagic A. and Steenkiste O. (2002) “Project Aura: Toward
distraction-free ubiquitous computing”. IEEE Pervasive Computing 1(2) pp. 22-31. Available from:
http://www.cs.cmu.edu/ aura/docdir/aura-pervasive02.pdf.
Roman M., Hess C., Cerqueira R., Ranganathan A., Campbell R. H. and Nahrstedt K. (2002). “A
middleware infrastructure for active spaces”. IEEE Pervasive Computing 1 (4), pp. 74-83.
Roy, W., P. Trevor, et al. (2008). “Dynamic composable computing”. In proceedings of the 9th
workshop on Mobile computing systems and applications. Napa Valley, California, ACM.
Xiang, S. and Umakishore R. (2007) “MobiGo: A middleware for seamless mobility”. In
proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing
Systems and Applications, IEEE Computer Society.
Youssef A. (2013). “Towards pervasive computing environments with cloud services”. International
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) 4(3), pp. 1-9.
Brownlee, J. (2010). ”September iPod Event: In iOS 4.2, AirTunes Becomes AirPlay”. Cult of Mac.
Cultomedia. Retrieved April 11, 2011.
AllShare. Available from: http://www.samsung.com/global/allshare/pcsw/
Jurmu M. (2007). “Resource management in smart spaces using context-based leases”. University of
Oulu (Finland), Department of electrical and information engineering. Master’s thesis, pages 77.
AUTHORS
Beatriz Otero received her Ph.D. degree in Computer Architecture from Universitat Politècnica de
Catalunya (UPC) in 2007. She also obtained her Ph.D degree in Computer Science from Universidad
Central de Venezuela (UCV) in 2006. She has been working with the UPC at the Department of Computer
Architecture (DAC) since 2000 and currently, she is an Assistant Professor and Researcher in this
Department. Her research interest includes the design and implementation of system software for
distributed computing.
Marisa Gil, Associate Professor at the Universitat Politecnica de Catalunya (UPC) since 1988. She received
her Ph.D. in Computer Science from the UPC in 1994. Prof. Gil is a member of HiPEAC, the European
Network of Excellence. She is also a Senior Member of the ACM and a Senior Member of the IEEE (IEEE
Education, IEEE Computer Society and IEEE WIE). She has served on the board of Spanish IEEE
Education. She is also co-founder of MuIN (Network Spanish Women in Informatics). Marisa Gil's
research is primarily concerned with the design and implementation of system software for parallel
computing, to improve resource management. Her work focus mainly in the area of OS, middleware and
runtime multicore architectures support. She is participating in the HiPEAC Network of Excellence and in
the TERAFLUX European project.
11