• Title/Summary/Keyword: pervasive computing environments

Search Result 30, Processing Time 0.038 seconds

Human Activity Recognition in Smart Homes Based on a Difference of Convex Programming Problem

  • Ghasemi, Vahid;Pouyan, Ali A.;Sharifi, Mohsen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.321-344
    • /
    • 2017
  • Smart homes are the new generation of homes where pervasive computing is employed to make the lives of the residents more convenient. Human activity recognition (HAR) is a fundamental task in these environments. Since critical decisions will be made based on HAR results, accurate recognition of human activities with low uncertainty is of crucial importance. In this paper, a novel HAR method based on a difference of convex programming (DCP) problem is represented, which manages to handle uncertainty. For this purpose, given an input sensor data stream, a primary belief in each activity is calculated for the sensor events. Since the primary beliefs are calculated based on some abstractions, they naturally bear an amount of uncertainty. To mitigate the effect of the uncertainty, a DCP problem is defined and solved to yield secondary beliefs. In this procedure, the uncertainty stemming from a sensor event is alleviated by its neighboring sensor events in the input stream. The final activity inference is based on the secondary beliefs. The proposed method is evaluated using a well-known and publicly available dataset. It is compared to four HAR schemes, which are based on temporal probabilistic graphical models, and a convex optimization-based HAR procedure, as benchmarks. The proposed method outperforms the benchmarks, having an acceptable accuracy of 82.61%, and an average F-measure of 82.3%.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Design and Implementation of a XHTML to VoiceXML Converter based on EXI in Pervasive Environments (편재형 컴퓨팅 환경에서 XHTML과 VoiceXML간 EXI 문서의 변환시스템 설계와 구현)

  • Shin, Kyoung-Hee;Kwak, Dong-Gyu;Yoo, Chae-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.13-20
    • /
    • 2009
  • In a pervasive environment, there are various applications as much as connections of various devices. In this computing environment, XML is the most suitable data representation method. XML is able to transform data for other application areas using XSLT. XML is text-based, the file size of XML document is bigger than binary data file. Therefore, XML has a disadvantage that it is hard to deal with XML in a pervasive environment. In this paper, we survey encoding methods of XML documents, and then we propose a transform method that transforms an encoded EXI format XML document into an EXI format XML document suited for other applications. Among various applications, we present a system that transforms an EXI format XHTML document into an VoiceXML document. This system can improve reusability of EXI format XML documents in a pervasive environment and it is expected to contributes utilization of EXI format XML documents.

Toward A Totally Solving Interference Problem for Ultrasound Localization System (초음파 위치인지 시스템의 간섭 문제의 해결을 위한 연구)

  • Song, Byung-Hun;Ham, Kyung-Sun;Lee, Hyung-Su
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.177-178
    • /
    • 2006
  • The real-time tracking system is an essential factor for the development of low cost sensor networks for use in pervasive computing and ubiquitous networking. In this paper, we address the interference problems of the sensor network platform with ultrasonic for location tracking system. Ubiquitous indoor environments often contain substantial amounts of metal and other such reflective materials that affect the propagation of radio frequency signals in non-trivial ways, causing severe multi-path effects, dead-spots, noise, and interference. Especially we present a novel reducing interference location system that is particularly well suited to support context-aware computing. The system called Pharos, aims to combine the advantages of real-time tracking systems that implement distributed environment with regardless of infrastructure or infrastructure-less wireless sensor networks.

  • PDF

A Time-Constrained Information Processing Model in Ubiquitous Environments

  • Hur, Sun;Lee, Hyun;Shin, Dong-Min;Lee, Won-Suk
    • ETRI Journal
    • /
    • v.29 no.4
    • /
    • pp.489-496
    • /
    • 2007
  • As pervasive computing is widely adopted and reliable networks are becoming more easily accessible, there is a rapidly growing need to develop a mechanism to analyze and evaluate the performance of ubiquitous environments. This paper presents an information processing model which characterizes a ubiquitous environment where a variety of pieces of information need to be exchanged among devices within a system. The proposed model not only provides analytical tools to evaluate the performance of devices, but also makes it possible to identify key factors in designing a ubiquitous environment. For illustrative purposes, a test bed is constructed and the performance of the system is assessed based on the proposed model.

  • PDF

An Experimental Analysis of Linux TCP Variants for Video Streaming in LTE-based Mobile DaaS Environments (LTE 기반 모바일 DaaS 환경에서 비디오 스트리밍을 위한 Linux TCP 구현물의 실험적 성능 분석)

  • Seong, Chaemin;Hong, Seongjun;Lim, Kyungshik;Kim, Dae Won;Kim, Seongwoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.241-255
    • /
    • 2015
  • Recent network environment has been rapidly evolved to cloud computing environment based on the development of the Internet technologies. Furthermore there is an increasing demand on mobile cloud computing due to explosive growth of smart devices and wide deployment of LTE-based cellular networks. Thus mobile Desktop-as-a-Service(DaaS) could be a pervasive service for nomadic users. In addition, video streaming traffic is currently more than two-thirds of mobile traffic and ever increasing. All such trends enable that video streaming in mobile DaaS could be an important concern for mobile cloud computing. It should be noted that the performance of the Transmission Control Protocol(TCP) on cloud host servers greatly affects Quality of Service(QoS) of video streams for mobile users. With widely deployed Linux server platforms for cloud computing, in this paper, we conduct an experimental analysis of the twelve Linux TCP variants in mobile DaaS environments. The results of our experiments show that the TCP Illinois outperforms the other TCP variants in terms of wide range of packet loss rate and propagation delay over LTE-based wireless links between cloud servers and mobile devices, even though TCP CUBIC is usually used in default in the current Linux systems.

A Metadata-enabled Approach for Scalable Video Streaming in Heterogeneous Networks

  • Thang, Truong Cong;Le, Hung T.;Nguyen, Duc V.;Pham, Anh T.
    • Journal of Multimedia Information System
    • /
    • v.2 no.1
    • /
    • pp.153-162
    • /
    • 2015
  • In today's pervasive computing environments, multimedia content should be adapted to meet various conditions of network connections, terminals, and user characteristics. Scalable Video Coding (SVC) is a key solution for video communication over heterogeneous networks, where user terminals have different capabilities. This paper presents a standard-compliant approach that adapts an SVC bitstream to support multiple users. The adaptation problem is formulated as an optimization problem, focusing on the tradeoff between qualities of different spatial layers of an SVC video. Then the adaptation process is represented by standard metadata of MPEG-21, which can be solved by universal processing to enable interoperable and automatic operation. Our approach provides the users with optimal quality, a wide flexibility, and seamless adaptation. To the best of our knowledge, this is the first study that shows the adaptation tradeoff between spatial layers of a conforming SVC bitstream.

Joint Access Point Selection and Local Discriminant Embedding for Energy Efficient and Accurate Wi-Fi Positioning

  • Deng, Zhi-An;Xu, Yu-Bin;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.794-814
    • /
    • 2012
  • We propose a novel method for improving Wi-Fi positioning accuracy while reducing the energy consumption of mobile devices. Our method presents three contributions. First, we jointly and intelligently select the optimal subset of access points for positioning via maximum mutual information criterion. Second, we further propose local discriminant embedding algorithm for nonlinear discriminative feature extraction, a process that cannot be effectively handled by existing linear techniques. Third, to reduce complexity and make input signal space more compact, we incorporate clustering analysis to localize the positioning model. Experiments in realistic environments demonstrate that the proposed method can lower energy consumption while achieving higher accuracy compared with previous methods. The improvement can be attributed to the capability of our method to extract the most discriminative features for positioning as well as require smaller computation cost and shorter sensing time.

Design of a Mobile Agent Platform for Pervasive Computing Environments (침수형 컴퓨팅 환경을 위한 이동 에이전트 플랫폼 설계)

  • 김구수;엄영익
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.652-654
    • /
    • 2002
  • 이동 에이전트란 컴퓨터 네트워크 상에서 사용자를 대신하여 특정 작업을 수행하는 프로그램이 독자적으로 여러 노드들을 이동하면서 필요한 작업을 수행하고 그 결과를 사용자에게 전달하도록 작성된 프로그램을 말하며, 이런 이동 에이전트를 수행할 수 있도록 컴퓨팅 환경을 제공하는 것을 이동 에이전트 컴퓨팅 환경이라고 한다. 본 연구에서는 이동 에이전트 운영에 필요한 모든 기능을 제공하는 풀버젼의 이동 에이전트 플랫픔과 이동 에이전트 운영의 최소 기능만을 가지고 휴대용 기기나 홈 네트워크를 구성하는 디지털 가전 기기에 장착될 수 있는 경량 이동 에이전트 플랫폼을 설계하고 그 결과를 보인다. 이 두 버전의 상호 언동을 통해 홈 네트워크 기기들의 임베디드 소프트웨어를 이동 에이전트로 대체 가능하도록 설계하였다.

  • PDF

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.