The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the context of pervasive computing with time-sensitive, the system scheduling management module must support real-time scheduling of context-aware. When a context information acting on the high-level application, may make other emergency contexts in a wait state which is not conducive to real-time systems and efficient implementation in ubiquitous computing environment. In order to solve this...
A machining procedure covers several critical issues, which can be handled in a way of pervasive computing to build a whole environment with several parts to respectively fit different functionalities of machining. This paper proposes the construction of a pervasive environment for machining with necessary instruments to accomplish the correct drilling operations in the plates of the typical Shell-and-Tube...
In the pervasive environment, intelligent taxation systems are required to be adaptive to the changing environment and the volatile requirements of taxation rules. The business rule technique is effective in achieving these kinds of adaptation. In this paper, we present an OO Petri Net based Business Rule modeling method of Intelligent Taxation System. And the structure and grammar rules of the business...
Cloud computing is a buzzword terminology applied to several nascent trends in the turbulent landscape of information technology. Computing in the "cloud" alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. In the era of cloud computing, whole lifecycle of telecommunication services, especially service deployment, present new features. In this...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
In this paper, we propose a context-aware system framework characteristic of two novel features. First, this framework is capable of modeling highly complex usage scenarios as a finite state machine while having transitions controlled by context information. And, this framework is designed with Augmented Reality capability as an integral component in its overall architecture to enable augmented interaction...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose heterogeneous content-aware...
Cloud Computing promises to deliver on an objective that building on compute and storage virtualization technologies, consumers are able to rent infrastructure "in the Cloud" as needed, deploy applications and store data, and access them via Web protocols on a pay-per-use basis. For application and data deployment in cloud, high availability and service level agreement must be satisfied...
The conversion matrix between Beta-spline basis functions and Bézier representation is analyzed in this paper. Based on it, calculation of arbitrary degree Beta-spline basis functions can be translated into a solution of linear system of equations. The construction of Beta-spline is simplified greatly, which made it more suitable for implement in pervasive computing.
Two important aspects are associated with service composition. One is to understand the needs and constraints for a new added-value composite service, and otherwise it would lead to an ad-hoc effort for service composition. The second is to reflect the changes of computing environment to the service composition to catch up the on-demand of users. This paper introduces a goal-driven approach to specify...
Context data management is a challenging task in context aware application development. Highly dynamic data coming from distributed providers has to be acquired, processed, managed and stored in order to provide applications with real time up to date context data. A lot of work has been done in the area of Contextual Computing, proposing several architectures and frameworks. However, none of them...
Pervasive computing research is mainly focused on technology as such, while more human-centric issues are being addressed only recently. One such issue is trust and its management is getting crucial for further and wider acceptance of pervasive computing solutions. In IT domain trust was first addressed some fifteen years ago, but the suggested approaches were actually addressing security. After a...
This paper considers autonomic applications to systems for which continuous perfect monitoring of state is not possible. We use sophisticated exact-state observers to provide enhanced information about the system state. In order that we can achieve optimal configuration of the autonomic controller itself over a wide range of environmental operating conditions, and across a wide range of unique application...
The following topics are dealt with: health care; information technology; biofeedback; technology infrastructure; collaborative business; pervasive database security; context-aware scheduling algorithm; enterprises process cooperative model; feedback adaptive fuzzy Petri net model; group-based load balancing; network-level synchronization; data collected routing algorithm; multimodal wireless video...
The intelligent interaction is an important supporting technique for achieving the merging of the information space and physical space in the internet of things. For now there isn 't a general architecture of the intelligent interaction in the environment of the internet of things. In this paper, we propose an intelligent interaction architecture based on the context merging in the internet of things...
According to the characteristics of pervasive computing, a suitable service model based on recommendation trust for pervasive computing is presented in this paper. In this model, the concept of recommendation credibility, credibility of service content and indirect credibility are introduced to overcome the problem of pervasive computing in the choice of service provider blindly. Recommendation credibility...
To cope with the inflexible security configuration in current mainstream embedded database system, this paper proposes a discretionary safely system (DSS), which is independent of any specific database system. DSS is based on hook technology. The experiment on SQLITE demonstrates that DSS is able to provide the pervasive and flexible security and audit with acceptable extra time consuming.
The existing reminder system uses limited context information and has limited functions, so it can't meet users ' needs. This paper presents intelligent business assistant based on context-aware computing platform in a grid computing environment. The platform uses the context modeling and reasoning technology and analyzes the system in the grid environment. At last, the intelligent business assistant...
Nowadays one can observe rapid development of various technologies supporting autonomic features and context-awareness of pervasive systems. And this is perfectly understandable as these features effectively increase the systems autonomicity. However, in the case of safety-critical realtime systems it becomes crucial to determine how the entire system performance is affected by the growth in complexity...
Nowadays, many people suffer from negative moods like sadness or anxiety. As an effective tool to relieve such moods, music therapy is widely embraced. Furthermore, researchers try to use newly developed bio-feedback technologies like electroencephalograms (EEG) to measure the effects of music therapy since it can reflect people's emotion sensitively and objectively. In this paper, we design a mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.