This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
This document describes a virtual mouse system that uses computer vision and color tracking to replace a conventional mouse. The system tracks colored objects like a red or blue object held in the user's hand to map hand movements to mouse movements and clicks. It analyzes image frames from a webcam to detect pixel colors and scale the detected positions to match screen coordinates. This allows for freer motion than a physical mouse and reduces costs compared to alternatives like touchscreens. The system is implemented using OpenCV for image processing and runs entirely in software on the user's computer.
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
New research articles 2019 may issue international journal of computer networ...
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
Automation is a powerful word that lies everywhere. It shows that without automation, application will not get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the chip based design through automation .The main advantage of applying the machine learning & deep learning technique is to improve the implementation rate based upon the capability of the society. The main objective of the proposed system is to apply the deep learning using data driven approach for controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs. Through this system, huge volume of data’s that are generated by the system will also get control.
This document describes a virtual mouse system that uses computer vision and color tracking to replace a conventional mouse. The system tracks colored objects like a red or blue object held in the user's hand to map hand movements to mouse movements and clicks. It analyzes image frames from a webcam to detect pixel colors and scale the detected positions to match screen coordinates. This allows for freer motion than a physical mouse and reduces costs compared to alternatives like touchscreens. The system is implemented using OpenCV for image processing and runs entirely in software on the user's computer.
Wireless sensor network plays vital role in today’s life, it is a collection of sensors that are scattered in different directions which are further used to control and measure the physical conditions of environment as well as to organize to the data somewhere at centre location. As in context of greenhouse we can measure various parameters such as temperature, humidity, water level, insect monitoring and light intensity.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating
healthcare applications and services is one of the vast data approaches that can be adapted to mobile
cloud computing. This work proposes a framework of a global healthcare computing based combining both
mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
This document proposes a model for resource management using a volunteering community cloud for educational purposes. It utilizes underutilized computing resources from organizations through virtualization to provide software services at a lower cost, especially for rural schools. The model uses Citrix XenServer to create virtual machines from idle resources. A web app is developed for educational management and deployed in the community cloud. Load balancing is achieved through the Gale-Shapley algorithm to optimally match user demands to available resources. This ensures resources are utilized efficiently while providing reliable services to users in a cost-effective manner.
This document proposes an Internet of Things (IoT) system to create a smart educational institute. The system would use an Android application to guide visitors around the large campus using a collection of static images stored in a database. It would allow users to view information about different campus locations like departments, cafeterias, and parking based on their current location. The system architecture includes user profiles, a mapping module using Free Space Path Loss to determine location, an image module to display location images, and a recommendation module. The goal is to make it easier for new visitors and students to navigate the campus using their mobile devices.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions in real time without human intervention are playing critical role in this age. All of these require models that can automatically analyse large complex data and deliver quick accurate results – even on a very large scale. Machine learning plays a significant role in developing these models. The applications of machine learning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representation and classification methods for developing hardware for machine learning with the main focus on neural networks. This paper also presents the requirements, design issues and optimization techniques for building hardware architecture of neural networks.
Things like growing volumes and varieties of available data, cheaper and more powerful computational processing, data storage and large-value predictions that can guide better decisions and smart actions inreal time without human intervention are playing critical role in this age. All of these require models thatcan automatically analyse large complex data and deliver quick accurate results – even on a very largescale. Machine learning plays a significant role in developing these models. The applications of machinelearning range from speech and object recognition to analysis and prediction of finance markets. Artificial Neural Network is one of the important algorithms of machine learning that is inspired by the structure and functional aspects of the biological neural networks. In this paper, we discuss the purpose, representationand classification methods for developing hardware for machine learning with the main focus on neuralnetworks. This paper also presents the requirements, design issues and optimization techniques for buildinghardware architecture of neural networks.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
The document discusses context awareness in building management. It describes context awareness as a system's ability to remain aware of its environment and adapt based on contextual information from various sources, like sensors. The key topics discussed are:
1) Context awareness is important for building management as it allows systems to assist occupants by automatically optimizing conditions like HVAC, lighting, and security based on contextual data.
2) Realizing full context awareness requires enhanced data sources, availability, and context models to integrate information from various building systems and sensors.
3) The project aims to enable context awareness in buildings by using wireless sensor networks to monitor contextual data and support integrated building management and automation.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
This document presents a reference framework for classifying software quality models. It proposes analyzing software quality using four "worlds": 1) Subject World, which defines what software quality is, 2) Usage World, which identifies user intentions and goals for quality, 3) System World, which specifies how quality will be represented and measured, and 4) Development World, which contains processes and tools to achieve quality objectives. Each world addresses a fundamental question about quality. The framework characterizes each model based on attributes within these worlds. It aims to provide a comprehensive way to analyze, compare, and develop software quality models.
This document proposes incorporating a control system into an existing ubiquitous computing environment (SEDINU system) to allow for manipulation of physical objects. It describes modifying the SEDINU system's database (RBACSoft) to include a control system entity with attributes linking it to autonomous areas and physical objects. A communication protocol is proposed using the USB 2.0 standard for the host services and control system to interact. The control system would allow changing the states of physical objects from mobile devices based on requests from the host services. Future work could include handling multiple concurrent mobile access and migrating to USB 3.0.
Charith Perera, Prem Prakash Jayaraman, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos, Sensor Discovery and Configuration Framework for the Internet of Things Paradigm, Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, March, 2014
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
Interactive systems in the mobile, ubiquitous and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use, and usability of these systems. Ubiquitous Computing is the design, implementation and usability that highlight the theories, techniques, tools and best practices in these environments. This paper shows that usable and useful systems that can be achieved in ways that will improve usability to enhance user experience. Research on the usability issues for young children, teenagers, adults and the elderly is presented with different techniques for the mobile, ubiquitous and virtual environments. Interactive frameworks in the portable, omnipresent, and virtual situations are at a phase of advancement where creators and engineers are quick to discover more about the outline, use, and ease of use of these frameworks. The objective of this research paper is to assess the tools and techniques for designing, implementing, and evaluating ubiquitous computing systems used by developers so as to formulate practical solutions that address the functionality of these systems. Ideal systems ensure that designers are able to develop and predict usability of systems at all the stages of virtual environments. This is particularly essential as it increases the experience of the users. This requires one to use the best tool and techniques backed by theories to practice the same. However this varies across different fields such as ubiquitous and mobile environments. In addition all the computing tools have to share visionary tools that allow them to network while at the same time they are processing and distinctively modeling the user interface. Some of the main methods that are used for smart devices include tools such as tabs, boards and pads. Various tools are usually used in the design of the works of the computer. The need to select appropriate techniques that will allow for the efficient use of the chosen techniques for the devices is thus a necessity. This implies that the selection of such tools should be based on set out effective techniques that have been tested so that the required output is achieved.
This document summarizes and reviews several models for ubiquitous computing systems. It begins by defining ubiquitous computing and describing the need for context awareness, wireless networks, and mobility in ubiquitous environments. It then examines three specific models:
1) SenSay, a context-aware mobile phone that adapts its behavior based on the user's environment and state.
2) HOMEROS, a middleware architecture that allows flexibility for heterogeneous devices and users across three layers.
3) Mobile Gaia, a middleware for ad-hoc pervasive computing networks.
1. Pervasive computing refers to embedding computing devices into physical objects that are connected via networks to communicate without user interaction.
2. The main idea is that devices ranging from appliances to cars to the human body can be embedded with microchips to connect to a vast network. This allows invisible computing to weave into everyday life.
3. Key challenges of pervasive computing include privacy as computing is everywhere, limited battery life, and ensuring seamless mobility as users move across devices.
Ubiquitous computing will surround users
with a comfortable and convenient information environment and a smart
space that merges physical and computational infrastructures into an integrated
habitat. This habitat will feature a proliferation of hundreds or thousands of
computing devices and sensors that will provide new functionality, offer specialized
services, and boost productivity
and interaction among the devices and
the
users.
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
This document discusses modeling real-time interaction between a user and a ubiquitous system using dynamic Petri net models. It proposes using Petri nets to model a user's activity as a set of elementary actions. Elementary actions are modeled as Petri net structures that are then composed together through techniques like sequence, parallelism, etc. to form an overall model of user-system interaction. The models can be dynamically adapted based on changes to the user's context. OWL-S ontology is used to describe the dynamic aspects of the Petri net models, especially real-time composition of models. Simulation results validate the approach of dynamically modeling user-system interaction through mutation of Petri net models.
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
With the emergence of ubiquitous computing, whole scenario of computing has been changed. It affected many inter disciplinary fields. This paper visions the impact of ubiquitous computing on video surveillance system. With increase in population and highly specific security areas, intelligent monitoring is the major requirement of modern world .The paper describes the evolution of surveillance system from analog to multi sensor ubiquitous system. It mentions the demand of context based architectures. It draws the benefit of merging of cloud computing to boost the surveillance system and at the same time reducing cost and maintenance. It analyzes some surveillance system architectures which are made for ubiquitous deployment. It provides major challenges and opportunities for the researchers to make surveillance system highly efficient and make them seamlessly embed
in our environments.
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
This document summarizes a study on improving the efficiency of resource utilization in virtual infrastructure for high-throughput computing. The study proposes a pre-staging model where virtual machine images are pre-loaded on execution nodes and jobs are directly submitted to the virtual machines. Experimental results show that the pre-staging model improves job execution times by 10-15 times compared to using Condor's virtual universe, with greater improvements for non-HPC jobs. The overhead of virtualization also reduces performance gains for HPC jobs like MPI applications.
Context-aware recommender system for multi-user smart homeIJECEIAES
Smart home is one of the most important applications of the internet of things (IoT). Smart home makes life simpler, easier to control, saves energy based on user’s behavior and interaction with the home appliances. Many existing approaches have designed a smart home system using data mining algorithms. However, these approaches do not consider multiusers that exist in the same location and time (which needs a complex control). They also use centralized mining algorithm, then the system’s efficiency is reduced when datasets increase. Therefore, in this paper, we firstly build a context-aware recommender system that considers multi-user’s preferences and solves their conflicts by using unsupervised algorithms to deliver useful recommendation services. Secondly, we improve smart home’s responsive using parallel computing. The results reveal that the proposed method is better than existing approaches.
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
This document describes a system that uses wireless sensor networks to help guide people to safety during emergencies. When an emergency occurs, sensors detect hazardous conditions and notify people in the area through their mobile devices. The system then provides navigation instructions to safely guide people out of the hazardous area while avoiding congestion. It considers alternative routes and ways to temporarily replace parts of routes. The proposed system aims to more efficiently evacuate an area during an emergency compared to existing systems that only focus on finding the safest individual path and do not account for potential congestion issues.
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
Due to the exponential growth of wireless network based miniaturized device and
sensors, the dream of context aware ubiquitous computing world is becoming realistic. In this
ubiquitous world of context aware applications the users can get the information and share the
information elsewhere instantaneously. Context aware meeting room is one of the interesting context
aware systems where in the meeting of a given set of users will be organized as per the situation of
users. In this paper we present the conceptual design and development of service recommendation
system for prototypical context aware meeting room using Fuzzy Rules .The proposed
recommendation system for context aware meeting room recommends the services by considering
the users contextual parameters like role, priority and environmental conditions. The fuzzy rule is
constructed using history database and knowledge base of the meeting.
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
Similar to UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware (20)
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This document discusses the importance of leadership in leading an organization towards improvement and development. It states that leadership is responsible for providing a clear vision and strategy to successfully achieve that vision. Effective leadership can impact the success of an organization by controlling its direction and motivating employees. Leadership is different from traditional management in that it guides employees towards organizational goals through open communication and motivation, rather than simply directing work. The paper concludes that only leadership can lead an organization to change according to its evolving environment, while management may simply follow old rules. Leadership is key to adapting to new market needs and trends.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
The document summarizes research on a nano composite polymer gel electrolyte containing SiO2 nanoparticles. Key points:
1. Polyvinylidene fluoride-co-hexafluoropropylene polymer was used as the base polymer mixed with propylene carbonate, magnesium perchlorate, and SiO2 nanoparticles to synthesize the nano composite polymer gel electrolyte.
2. The electrolyte was characterized using XRD, SEM, and FTIR which confirmed the homogeneous dispersion of SiO2 nanoparticles and increased amorphous nature of the electrolyte, enhancing its ion conductivity.
3. XRD showed decreased crystallinity and disappearance of polymer peaks upon addition of SiO2. SEM revealed
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
1. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
1
www.viva-technology.org/New/IJRI
UBIQUITOUS COMPUTING
Its Paradigm, Systems & Middleware
Pallavi Vartak 1
1
(Computer Engineering Department, VIVA Institute of Technology, India)
Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive
Computing Middleware.
1. INTRODUCTION
The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces,
invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices
to the factor in which their use is transparent. For lots of packages transparent operation requires that the device
be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly
non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may
emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from
the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a
concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In
ubiquitous computing environments computation is embedded. With advancements in laptop technological
knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in
networked and standalone surroundings and capable of conversation with the human and with each different.
Those devices support context-conscious software, nomadic customers, area aware services, and cell records
access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while
making the presence of the machine “invisible” to the consumer.
1.2 Traits of Ubiquitous Computing (Ubicom) Systems
Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29]
specifically distributed computation, invisibility, and context-attention. The distributed computation method the
computer systems/structures need to be networked, dispensed and transparently on hand. They could have
interaction with human beings in addition to with each other’s. the invisibility property approach that the computer
interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is
contextattention that implies that so as to optimize device operation of their physical and human surroundings it's
far necessary to make the structures aware about environmental context.
Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that
allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that
ubiquitous computing aim is to help users in everyday existence.
2. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
2
www.viva-technology.org/New/IJRI
The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always
required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or
usable in many instances in exercise to aid all 5 middle properties.
Fig.1. Five Properties of Ubiquitous Computing
2. LITERATURE SURVEY
This study is going to include extensive research about the ubiquitous computing as well as its influence
on the users. We will also examine the different techniques, mechanisms and design principles.
2.1 Service Composition Mechanisms
The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of
combining the existing services. Researchers have substantially studied and discover a function of the ever-present
computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc
way. In amigo [12], the focal point of the provider composition mechanism used was to construct an
“international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside
the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values
acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from
exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application
developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are
used to map sources on gadgets into principles in the ontology.
We located that during service composition three characteristics are needed namely, usability,
adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a
preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific
environment and context. The performance is the belongings of the machine to provide appropriate response and
overall performance to the user requests or movements within a stipulated time. The three traits we have
mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need
and possibility of research to be had within the service composition mechanisms.
2.2 Context-Aware Systems And Design Principles
Region information based totally context-conscious structures are extensively utilized by customers in
their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for
instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts,
eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge
locations. To acquire region information diverse sensors and modules are to be had which include gps satellites,
mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those
proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer
offerings to the user primarily based on the detected location.
In context-conscious device challenge majority of them used and focused most effective on the vicinity
awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors
3. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
3
www.viva-technology.org/New/IJRI
consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing
the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive,
efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds
context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm.
Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging
system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes
approaches for sensory information acquisition for sensory records acquisition.
The principles of the context-conscious device designing encompass strategies of context information
acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records
acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3
one-of-a-kind context management models: widgets, networked services and blackboard model.
We observed that the prevailing answers and research efforts specially focused and used physical sensors
for context attention. However, we believed that logical and digital sensors also are useful and able to offering
more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and
structures.
2.3 Pervasive Computing Middlewares
The aim of pervasive computing is to create a smart environment the usage of embedded sensors and
networked computing gadgets that offer customers transparent get entry to of services. Examples of current
pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15]
and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and
want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to
design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to
developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree
implementation information. Another characteristic of pervasive middleware systems is to offer management of
system sources together with ser-vice management, context management and data control of context the usage of
ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology.
3. USER SURVEY
To identify person requirements for consumer interface design and features of ubiquitous gadgets, we
performed a user survey of 1000 engineering students. Even though the range of people participated within the
survey are very small in numbers and some distance from supplying end but it presents an indicative figures of
consumer preferences [20]. The survey included following seven questions. To every person identical set of
questions and alternatives have been given. The table shown below provides a detailed view about the survey.
Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819
customers favored a smart tool single user operated, 96 customers preferred more than one person operated and
85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have
to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519
customers’ favored multi-task operations and 54 users genuinely don’t care.
A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool
need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t
care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall
967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually
don’t care.
What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands
free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored
hand-unfastened input technique.
Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt
various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support
instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964
customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.
4. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
4
www.viva-technology.org/New/IJRI
Table.1. Survey results [20]
Using a Smart
Tool
Single User
Multiple User
Neutral
819 96 85
Tasking
Single
Tasking
Multitasking
Unsure
427 319 54
Standalone or
Networked
Stand-alone Networked Unsure
124 83 3
Connectivity
Wired Wireless Unsure
24 967 9
Haptic Entry
techniques
1-
Handedness
2-
Handedness
Handsfree
356 46 598
Safe
Exploration
Safe
Exploration
NA Unsure
995 NA 5
Feedback
Instant
Feedback
Cumulative
Feedback
Unsure
964 34 2
4. SYSTEM ARCHITECTURE
This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous
computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end
servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies
like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed
architecture.
Fig.2. System Architecture
5. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
5
www.viva-technology.org/New/IJRI
It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually
numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and
possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to
handle a couple of obligations successfully and aid multi-venture environment inside the software. The
multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well
as context and consumer design management. The user db module enables to authenticate users. The opposite
modules along with gear, monitoring, replication, communication, localization supports various functions in the
ubiquitous computing packages.
5. CONCLUSION
This research work supplied a survey of ubiquitous computing studies. We provided a classification of
the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of
ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work
additionally presented novel device structure, a distributed outline design to support ubiquitous computing
applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing
and want to make valuable contributions to this research place.
REFERENCES
[1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”,
Proceedings of the 4th
International Conference on Mobile Technology, Applications, and Systems and the 1st International
Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007.
[2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a
Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003.
[3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM
Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000.
[4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the
International Conference on Pervasive Systems and Computing, pp. 27-30, 2005.
[5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop
on Semantic Web Services and Web Process Composition, pp. 26-42, 2004.
[6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware
Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd
European Workshop on Object Orientation and
Web Services, 2004.
[7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland,
2004.
[8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”,
Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005.
[9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based
Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012.
[10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and
Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001.
[11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE
Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002.
[12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the
Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005.
[13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers,
Vol. 14, No. 4, pp. 301-312, 2002.
[14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department
of Computer Science, School of Engineering and Technology, Pondicherry University, 2011.
[15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive
Computing”, Proceedings of the 21st
International Symposium on Computer and Information Sciences, pp. 755-764, 2006.
[16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”,
International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015.
[17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”,
Proceedings of the European Conference on Information Systems, 2005.
6. Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
6
www.viva-technology.org/New/IJRI
[18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009.
[19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active
Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002.
[20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous
Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications
Workshops, 2004.
[21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for
Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001.
[22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing
Environments”, Proceedings of the 3rd
International Federation for Information Processing, Vol. 97, pp. 29-43, 2002.
[23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European
Wireless, pp. 595-601, 2002.
[24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and
Applications”, Proceedings of the 3rd
International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007.
[25] Mark Weiser, “The Computer for the 21st
Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991.
[26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994.
[27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing.
[28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.