To see the other types of publications on this topic, follow the link: Pervasive / ubiquitous computing.

Dissertations / Theses on the topic 'Pervasive / ubiquitous computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Pervasive / ubiquitous computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zeidler, Andreas. "A Distributed Publish/Subscribe Notification Service for Pervasive Environments." Phd thesis, [S.l.] : [s.n.], 2005. http://elib.tu-darmstadt.de/diss/000519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abukmail, Ahmed Ahed. "Pervasive computing approach to energy management." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schiele, Gregor Alexander. "System support for spontaneous pervasive computing environments." kostenfrei, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?idn=985989661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schiele, Gregor. "System support for spontaneous pervasive computing environments." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-32709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Haoyu, and 胡昊宇. "ContextTorrent: a context provisioning framewrok for pervasive applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47028488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blackstock, Michael Anthony. "A common model for ubiquitous computing." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2478.

Full text
Abstract:
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability.
APA, Harvard, Vancouver, ISO, and other styles
8

Grimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arabi, Agha Ihab. "Distributed and adaptive approaches for ubiquitous and pervasive computing." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA025.

Full text
Abstract:
Le paradigme d'émergence spontanée de services (Spontaneous Emergence Paradigm, SEP) pour la mise en œuvre de l’informatique omniprésente ou diffuse (pervasive computing), consiste à fournir des services aux utilisateurs en fonction de leur environnement ad hoc. Ce paradigme a prouvé son efficacité et son adéquation aux applications distribuées sensibles au contexte. Ce travail se concentre sur deux aspects liés à la mise en œuvre des services SEP. Le premier se distingue de ce qui est proposé dans la littérature, par une approche physiologique de « Dead Reckoning » (Physiological Pedestrian Dead Reckoning Approach, PDR), qui permet de corriger les erreurs de positionnement à partir de données physiologiques comme la fréquence cardiaque et la vitesse de déplacement. Cette approche utilise des modèles stochastiques, qui reposent sur la distribution des probabilités des fréquences cardiaques précédemment collectées par rapport à la vitesse de déplacement de l’utilisateur (par exemple, par apprentissage via une marche sur un tapis roulant). Le modèle proposé permet ainsi d’ajuster les vitesses lues dans n’importe quel futur système PDR. Le deuxième aspect de cette recherche concerne la détection de réseaux d’affinités (Social Relationship Detection framework, SRD). Cette approche propose d’explorer le niveau d’affinité entre personnes en fonction de leur connexions et interactions selon plusieurs conditions. Ces connexions à des bornes WAP (Wireless Access Point), par rapport à chaque condition, sont consolidées pour former des distributions de probabilités. Par la suite, ces distributions de probabilités sont introduites dans un réseau de neurones (back propagation neural network) pour détecter et déterminer les affinités entre utilisateurs. Cette approche permet une prise de décision adaptative à chaque connexion au WAP et selon le comportement de l’utilisateur, contrairement aux approches classiques reposant uniquement sur une connaissance globale au préalable de la convergence des attributs des utilisateurs concernés<br>Service Emergence Paradigm (SEP), based on a pervasive computing approach, consists of providing services to users within intended applications, transparently from their intentions, relatively to their needs, and regardless of the time and devices used. This considered paradigm has been proved sufficiently in applications that have context awareness schemes and various working threads. This research focuses on two aspects for providing SEP services. This first aspect is to implement a Physiological Pedestrian Dead Reckoning Approach (PPDR) that corrects position errors in pedestrian dead reckoning systems based on the heart rate parameter. This approach uses specific stochastic models that rely on probability distributions of previously collected heart rate values with respect to their velocities of a user during a treadmill walk. The reason behind this collection is to form a pattern that contributes in adjusting currently read velocities in any future PDR system. The second aspect of this research is the Social Relationship Detection framework (SRD). This approach proposes a mean for exploring the level of relationship between people by observing the network connection pattern of each person over several conditions. These connections, with respect to each condition, are consolidated to form a set that holds different probability distributions. These distributions are formed based on the users’ Wireless Access Point (WAP) connection establishment routine. Afterwards, the distributions of the probabilities are fed into a trained back propagation neural network to detect the level of relationship between candidate users for forthcoming friendship recommendations. This approach is elaborated in a technique that achieves intelligent decision-making whenever the connection pattern to the WAP and the user behavior are changing with time. It is also distinguished from other classical approaches that rely solely on prior knowledge of the convergence of the users’ attributes
APA, Harvard, Vancouver, ISO, and other styles
10

Baloch, Raheel Ali. "Context dependency analysis in ubiquitous computing." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714129.

Full text
Abstract:
To provide users with personalized adaptive services only using the accessible computing resources in a cloud environment, context aware applications need to assimilate both the accessed and derived context, i.e. a combination of more than one sensed data and information in the environment. Context data dependency, dependency that arises between the context data producer and consumer, may get introduced in a system due to numerous reasons. But as the number of context dependencies for a service increases, the more complex the system becomes to manage. The thesis addresses issues of how to identify context dependencies, represent such context dependencies and then reduce them in a system. In the first part of the thesis, we present two efficient approaches to determine context dependency relations among various services in ubiquitous computing environment to help better analyse the pervasive services. One approach is based on graph theory, and we have used the topological sort to determine the context dependencies. The second approach is based on solving constraint networks which determines whether an entity is affected when the state of a certain other entity has its state changed, i.e. determining the dynamic nature of context dependency. In the second part of the thesis, we present a mode for representation of context dependencies within a system. Our model that represents context dependencies is based on set theory and first-order predicate logic. The context dependency representation model also represents alternative sources for context acquisition that can be utilized in a case in which the preferred context producers are not available to service the desired context to the relevant context consumer any more. Further, we try to reduce the context dependencies by presenting the idea of profile context, which is based on the proposal of an open framework for context acquisition, management and distribution. This heuristic approach is based on the idea of utilizing mobile nodes in an ad hoc overlay network with more resources than the context producer itself to store various contextual information under the banner of profile context, and further, provide profile context instead of each context individually based on the queries the nodes receive from the context consumers. Bringing together the context information and context updates from various sources, support for context aware decisions can be implemented efficiently in a mobile environment by addressing the issues of context dependency using profile context
APA, Harvard, Vancouver, ISO, and other styles
11

O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gauger, Matthias. "Integration of wireless sensor networks in pervasive computing scenarios." Berlin Logos-Verl, 2010. http://d-nb.info/1002361559/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Thompson, Michael Stewart. "Service Discovery in Pervasive Computing Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29133.

Full text
Abstract:
Service discovery is a driving force in realizing pervasive computing. It provides a way for users and services to locate and interact with other services in a pervasive computing environment. Unfortunately, current service discovery solutions do not capture the effects of the human or physical world and do not deal well with diverse device populations; both of which are characteristics of pervasive computing environments. This research concentrates on the examination and fulfillment of the goals of two of the four components of service discovery, service description and dissemination. It begins with a review of and commentary on current service discovery solutions. Following this review, is the formulation of the problem statement, including a full explanation of the problems mentioned above. The problem formulation is followed by an explanation of the process followed to design and build solutions to these problems. These solutions include the Pervasive Service Description Language (PSDL), the Pervasive Service Query Language (PSQL), and the Multi-Assurance Delivery Protocol (MADEP). Prototype implementations of the components are used to validate feasibility and evaluate performance. Experimental results are presented and analyzed. This work concludes with a discussion of overall conclusions, directions for future work, and a list of contributions.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
15

Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Matuštík, Ondřej. "Ubiquitous computing se zaměřením na bankovnictví a pojišťovnictví." Doctoral thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-71679.

Full text
Abstract:
This dissertation thesis is focused on the issue of further extension of computers into the human life and its stronger influencing of human being, in the foreign literature defined as ubiquitous computing, everyware or pervasive computing. The basic goals of the thesis are follows: - Compare different views on this issues and make their assessment - Analyze possible effect, especially for banking and insurance area - Propose some specific innovation in named areas The results of this thesis should: - Serve as a basis for further studies in the ubiquitous computing area - Be usable as a basis for further scientific research - Bring some practical application, with which can we met in practice in future years Whole work place emphasis on the innovation process, with which is topic very closely linked and which is constantly emphasizing both in technical as in commercial spheres. The goals of the thesis are fulfilled in the individual chapters in the following way: - Definition of the goals and introduction of the topic -- Chapter 1 - Analysis of current status of knowledge -- Chapter 2 - Brief characteristic of main UC concepts -- Chapter 3 - Practical experience and innovation from UC -- Chapter 4 - Final evaluation -- Chapter 5 The scientific benefits of this work have been awarded by presentation of main parts of the thesis on international conferences and publication in the scientific magazines.
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmed, Ali Ahmed Ali. "Context-aware access control in ubiquitous computing (CRAAC)." Thesis, University of Manchester, 2010. https://www.research.manchester.ac.uk/portal/en/theses/contextaware-access-control-in-ubiquitous-computing-craac(1eaa4390-7062-4af5-8aa5-d645d91fa547).html.

Full text
Abstract:
Ubiquitous computing (UbiComp) envisions a new computing environment, where computing devices and related technology are widespread (i.e. everywhere) and services are provided at anytime. The technology is embedded discreetly in the environment to raise users' awareness. UbiComp environments support the proliferation of heterogeneous devices such as embedded computing devices, personal digital assistants (PDAs), wearable computers, mobile phones, laptops, office desktops (PCs), and hardware sensors. These devices may be interconnected by common networks (e.g. wired, wireless), and may have different levels of capabilities (i.e. computational power, storage, power consumption, etc). They are seamlessly integrated and interoperated to provide smart services (i.e. adaptive services). A UbiComp environment provides smart services to users based on the users' and/or system's current contexts. It provides the services to users unobtrusively and in turn the user's interactions with the environment should be as non-intrusive and as transparent as possible. Access to such smart services and devices must be controlled by an effective access control system that adapts its decisions based on the changes in the surrounding contextual information. This thesis aims at designing an adaptive fine-grained access control solution that seamlessly fits into UbiComp environments. The solution should be flexible in supporting the use of different contextual information and efficient, in terms of access delays, in controlling access to resources with divergent levels of sensitivity. The main contribution of this thesis is the proposal of the Context-Risk-Aware Access Control (CRAAC) model. CRAAC achieves fine-grained access control based upon the risk level in the underlying access environment and/or the sensitivity level of the requested resource object. CRAAC makes new contributions to the access control field, those include 1) introducing the concept of level of assurance based access control, 2) providing a method to convert the contextual attributes values into the corresponding level of assurance, 3) Proposing two methods to aggregate the set of level of assurance into one requester level of assurance, 4) supporting four modes of working each suits a different application context and/or access control requirements, 5) a comprehensive access control architecture that supports the CRAAC four modes of working, and 6) an evaluation of the CRAAC performance at runtime.
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Chang. "Inconsistency detection and resolution for context-aware pervasive computing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kwan, Wai-man Vivien Joanna, and 關慧敏. "A distributed proxy system for functionality adaptation in pervasive computing environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Costa, Cristiano Andre da. "Continuum : a context-aware service-based software infrastucture for ubiquitous computing." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/14964.

Full text
Abstract:
Este trabalho apresenta uma proposta de infra-estrutura de software sensível ao contexto para a computação ubíqua (ubicomp) denominada Continuum. A área de ubicomp, também chamada de computação pervasiva, pressupõe uma forte integração com o mundo real, com foco no usuário e na manutenção de alta transparência. Para o desenvolvimento de aplicativos nesse cenário, é necessária uma infra-estrutura de software adequada. A infra-estrutura projetada é baseada no padrão da arquitetura orientada a serviços (service-oriented architecture ou SOA), fazendo uso de framework e middleware, e empregando uma redefinição da semântica siga-me. Nessa visão redefinida, os usuários podem ir para qualquer lugar carregando os dados e os aplicativos que desejam, os quais podem ser usados de forma imperceptível e integrada com o mundo real (seamless integration). O foco particular desse trabalho é sensibilidade ao contexto: a percepção de características relacionadas aos usuários e ao entorno. No trabalho são considerados os recursos disponíveis no ambiente e é mantida a história dos dados de contexto. Além disso, é proposta a representação do contexto para promover raciocínio e compartilhamento de conhecimento, empregando uma ontologia. Dessa forma, contexto é representado de uma maneira formal e bastante expressiva, diferente de muitas soluções existentes hoje em dia que ainda usam modelos de representação ad hoc. Esta tese está então na interseção destas três áreas principais: infra-estrutura de software para ubicomp, sensibilidade ao contexto e ontologias. No desenvolvimento desta tese, também examina-se o campo da computação ubíqua, e sugere-se um modelo de arquitetura geral que enfrente esses desafios fundamentais. Baseado nos requisitos estabelecidos para esse modelo, propõe-se um conjunto de serviços para o Continuum. Os serviços são projetados considerando o trabalho previamente desenvolvido pelo nosso grupo de pesquisa, mais especificamente o projeto ISAM, e particularmente o middleware EXEHDA. A proposta estende esses projetos, adicionando aspectos que não haviam sido considerados no momento do seu desenvolvimento. Particularmente, o suporte a sensibilidade de contexto é melhorado com a proposta de uma ontologia para a formalização da informação de contexto. Algumas análises, usando a metodologia de estudo de caso, foram conduzidas para apreciar as principais proposições da tese. Baseado nessas avaliações, foram apresentadas algumas lições aprendidas e traçada a conclusão do trabalho. Como resultado, Continuum é uma infra-estrutura de software que endereça muitos aspectos da computação ubíqua, integrando imperceptivelmente diferentes desafios.<br>The present work is a proposal of a context-aware software infrastructure for ubiquitous computing (ubicomp) named Continuum. The ubicomp area, also called pervasive computing, presupposes a strong integration with the real world, with focus on the user and on keeping high transparency. For the development of applications in this scenario, we need an adequate software infrastructure. The infrastructure designed in this work is based on service-oriented architecture (SOA), making use of framework and middleware, and employing a redefinition of follow-me semantics. In this redefined vision, users can go anywhere carrying the data and application they want, which they can use in a seamlessly integrated fashion with the real world. The specific focus of our work is context awareness: the perception of characteristics related to users and surroundings. We consider the resources available in the environment and keep a history of context data. Furthermore, we propose the representation of context to promote reasoning and knowledge sharing, using ontology. In this way, context is represented in a considerably expressive, formal approach, different from many solutions that exist today, which still use ad hoc representations models. Our work is then at the intersection of these three main areas: software infrastructures for ubicomp, context awareness, and ontologies. In the development of this thesis, we also survey the field of ubiquitous computing, suggesting a general architectural model to deal with its fundamental challenges. Based on the established requirements for this model, we propose a set of services for Continuum. The services are designed considering the previous works developed by our research group, namely ISAM (Infra-estrutura de Suporte às Aplicações Móveis – Mobile Applications Support Infrastructure), and particularly the middleware EXEHDA (Execution Environment for Highly Distributed Applications). We further extend these projects, by adding aspects to them that had not been considered at the time of their development. Particularly, we improve context awareness support, proposing an ontology for the formalization of context information. We have conducted some analysis, using case study methodology, to evaluate the main propositions of our work. Based on these assessments, we present lessons learned and draw the conclusion of our work. As a result, Continuum is a software infrastructure that addresses many aspects of ubiquitous computing, seamlessly integrating many different challenges.
APA, Harvard, Vancouver, ISO, and other styles
22

Siu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jansen, Erwin. "Context-driven programming model for pervasive spaces." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ndiwalana, Ali. "Ubiquitous Computing: By the People, For the People." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33848.

Full text
Abstract:
Computing is moving away from the desktop, permeating into many everyday objects and the environments in which we live. Many researchers in ubiquitous computing are excited about the potential to profoundly change the way we live by revolutionizing how we interact with information. Despite the excitement, few successful applications are making the transition from the laboratories to the mass market. While this could easily be attributed to the immaturity of the research area, it is also a manifestation of a larger problemâ the lack of coherent methods, processes or tools that assist designers in thinking about issues pertinent to ubiquitous computing, as they explore potential ideas and develop some of these into working prototypes. To this end, this research presents an overview of the important characteristics of ubiquitous computing systems identified by many of the leading researchers in the field. Contrasting with conventional systems, we discuss the resulting issues and challenges, and their implications on the future directions of this emerging research area. In a case study, we use scenario-based design to walkthrough the design of a community computing application. At various stages of the design process, the need to focus on more issues relevant to ubiquitous computing design became apparent, resulting in the augmentation of scenario-based design. The augmented scenario-based design process is proposed as a tool for helping designers conceptualize user activities within given usage circumstances and at various stages of the design process. New questions help to identify the most common pitfalls, enabling designers to produce systems that are more socially acceptable and provide a higher likelihood for adoption by everyday users beyond the laboratory. In initial testing, the augmented process was shown to produce better designs. The ultimate ambition of ubiquitous computing technology is to be able to serve users anywhere, at anytime. However, taking into account the dynamic nature of user needs and usage situations, is a novel and non trivial undertaking. In essence, it is a fundamental change that requires designers to rethink many of the conventional answers and processes that help guide the creation of interactive systemsâ We provide a promising approach.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
26

Lu, Heng, and 陸恒. "A software testing framework for context-aware applications in pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kong, Choi-yu. "Effective partial ontology mapping in a pervasive computing environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kong, Choi-yu, and 江采如. "Effective partial ontology mapping in a pervasive computing environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dragoi, Octavian Andrei. "The Continuum Architecture: Towards Enabling Chaotic Ubiquitous Computing." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1158.

Full text
Abstract:
Interactions in the style of the ubiquitous computing paradigm are possible today, but only in handcrafted environments within one administrative and technological realm. This thesis describes an architecture (called Continuum), a design that realises the architecture, and a proof-of-concept implementation that brings ubiquitous computing to chaotic environments. Essentially, Continuum enables an ecology at the edge of the network, between users, competing service providers from overlapping administrative domains, competing internet service providers, content providers, and software developers that want to add value to the user experience. Continuum makes the ubiquitous computing functionality orthogonal to other application logic. Existing web applications are augmented for ubiquitous computing with functionality that is dynamically compiled and injected by a middleware proxy into the web pages requested by a web browser at the user?s mobile device. This enables adaptability to environment variability, manageability without user involvement, and expansibility without changes to the mobile. The middleware manipulates self-contained software units with precise functionality (called <i>frames</i>), which help the user interact with contextual services in conjunction with the data to which they are attached. The middleware and frame design explicitly incorporates the possibility of discrepancies between the assumptions of ubiquitous-computing software developers and field realities: multiple administrative domains, unavailable service, unavailable software, and missing contextual information. A framework for discovery and authorisation addresses the chaos inherent to the paradigm through the notion of <i>role assertions</i> acquired dynamically by the user. Each assertion represents service access credentials and contains bootstrapping points for service discovery on behalf of the holding user. A proof-of-concept prototype validates the design, and implements several frames that demonstrate general functionality, including driving discovery queries over multiple service discovery protocols and making equivalences between service types, across discovery protocols.
APA, Harvard, Vancouver, ISO, and other styles
30

Edegger, Francika. "Pervasive gaming als ein neuer Weg zur Beeinflussung von Denken und Handeln eine Anwendung im Lernkontex." Wiesbaden Gabler, 2007. http://d-nb.info/987522507/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Adhikari, Sameer. "Programming Idioms and Runtime Mechanisms for Distributed Pervasive Computing." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4820.

Full text
Abstract:
The emergence of pervasive computing power and networking infrastructure is enabling new applications. Still, many milestones need to be reached before pervasive computing becomes an integral part of our lives. An important missing piece is the middleware that allows developers to easily create interesting pervasive computing applications. This dissertation explores the middleware needs of distributed pervasive applications. The main contributions of this thesis are the design, implementation, and evaluation of two systems: D-Stampede and Crest. D-Stampede allows pervasive applications to access live stream data from multiple sources using time as an index. Crest allows applications to organize historical events, and to reason about them using time, location, and identity. Together they meet the important needs of pervasive computing applications. D-Stampede supports a computational model called the thread-channel graph. The threads map to computing devices ranging from small to high-end processing elements. Channels serve as the conduits among the threads, specifically tuned to handle time-sequenced streaming data. D-Stampede allows the dynamic creation of threads and channels, and for the dynamic establishment (and removal) of the plumbing among them. The Crest system assumes a universe that consists of participation servers and event stores, supporting a set of applications. Each application consists of distributed software entities working together. The participation server helps the application entities to discover each other for interaction purposes. Application entities can generate events, store them at an event store, and correlate events. The entities can communicate with one another directly, or indirectly through the event store. We have qualitatively and quantitatively evaluated D-Stampede and Crest. The qualitative aspect refers to the ease of programming afforded by our programming abstractions for pervasive applications. The quantitative aspect measures the cost of the API calls, and the performance of an application pipeline that uses the systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Bruneau, Julien. "Developing and Testing Pervasive Computing Applications: A Tool-Based Methodology." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2012. http://tel.archives-ouvertes.fr/tel-00767395.

Full text
Abstract:
Malgré des progrès récents, développer une application d'informatique ubiquitaire reste un défi à cause d'un manque de canevas conceptuels et d'outils aidant au développement. Ce défi implique de prendre en charge des objets communicants hétérogènes, de surmonter la complexité des technologies de systèmes distribués, de définir l'architecture d'une application, et d'encoder cela dans un programme. De plus, tester des applications d'informatique ubiquitaire est problématique car cela implique d'acquérir, de tester et d'interfacer une variété d'entités logicielles et matérielles. Ce procédé peut rapidement devenir coûteux en argent et en temps lorsque l'environnement ciblé implique de nombreuses entités. Cette thèse propose une méthodologie outillée pour dévelop- per et tester des applications d'informatique ubiquitaire. Notre méthodologie fournit tout d'abord le langage de conception DiaSpec. Ce langage permet de définir une taxonomie d'entités spécifiques à un domaine applicatif, s'abstrayant ainsi de leur hétérogénéité. Ce langage inclut également une couche permettant de définir l'architecture d'une application. Notre suite outillée fournit un compilateur qui, à partir de descriptions DiaSpec, génère un canevas de programmation guidant les phases d'implémentation et de test. Afin d'aider à la phase de test, nous proposons une approche de simulation et un outil intégré dans notre méthodologie outillée : l'outil DiaSim. Notre approche utilise le support de test généré par DiaSpec pour tester les applications de manière transparente dans un environnement physique simulé. La simulation d'une application est rendue graphiquement dans un outil de visualisation 2D. Nous avons combiné DiaSim avec un langage dédié permet- tant de décrire les phénomènes physiques en tant qu'équations différentielles, permettant des simulations réalistes. DiaSim a été utilisé pour simuler des applications dans des domaines applicatifs variés. Notre approche de simulation a également été appliquée à un système avionique, démontrant la généralité de notre approche de simulation.
APA, Harvard, Vancouver, ISO, and other styles
33

Rasch, Katharina. "Smart assistants for smart homes." Doctoral thesis, KTH, Programvaruteknik och Datorsystem, SCS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-129171.

Full text
Abstract:
The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart homes. The first assistant is a recommender system that suggests useful services (i.e actions that the home can perform for the user). The recommended services are fitted to the user’s current situation, habits, and preferences. With these recommendations it is possible to build much simpler user interfaces that highlight the most interesting choices currently available. Configuration becomes much more flexible: since the recommender system automatically learns user habits, user routines no longer have to be manually described. Evaluations with two smart home datasets show that the correct service is included in the top five recommendations in 90% of all cases. The second assistant addresses the difficult installation procedures. The unique feature of this assistant is that it removes the need for manually describing device functionalities (such descriptions are needed by the recommender system). Instead, users can simply plug in a new device, begin using it, and let the installation assistant identify what the device is doing. The installation assistant has minimal requirements for manufacturers of smart home devices and was successfully integrated with an existing smart home. Evaluations performed with this smart home show that the assistant can quickly and reliably learn device functionalities.<br><p>QC 20130924</p>
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Weisong. "A pervasive information framework based on semantic routing and cooperative caching." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B31065326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Weisong, and 陳偉松. "A pervasive information framework based on semantic routing and cooperative caching." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31065326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khan, Izhar Ahmed. "A Distributed Context Simulation Component." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-32576.

Full text
Abstract:
Mobile devices with access to large numbers of sensors with internet access move forwards the development of intelligent applications towards new shape of ubiquitous applications. In order to create such applications we need to be able to do simulations to test and deploy. Current simulators do not permit this since they are centralized and the information is not shared globally. Therefore we cannot use them to test application built on distributed sensor information. I selected Siafu as the simulator component. In the next step, the simulator was customized according to the requirements of the project. There are different possibilities to achieve this task, but a simple GUI is made to control the simulator.The end result is a complete architecture for simulating context aware scenarios. The implementation is tested by running the simulator and dumping the context data into the PGRID overlay. For future work, implementing proximity estimation between the agents will be a good idea and can be interesting as well.
APA, Harvard, Vancouver, ISO, and other styles
37

PALMEIRA, FILHO Antonio Sá Fernandes. "SNU: um framework para o desenvolvimento de aplicações voltadas às redes ad-hoc espontâneas." Universidade Federal do Maranhão, 2007. http://tedebc.ufma.br:8080/jspui/handle/tede/1819.

Full text
Abstract:
Submitted by Rosivalda Pereira (mrs.pereira@ufma.br) on 2017-08-14T18:44:38Z No. of bitstreams: 1 AntonioPalmeiraFilho.pdf: 3164841 bytes, checksum: 23d94c0539749a601438bcd53f1d7384 (MD5)<br>Made available in DSpace on 2017-08-14T18:44:38Z (GMT). No. of bitstreams: 1 AntonioPalmeiraFilho.pdf: 3164841 bytes, checksum: 23d94c0539749a601438bcd53f1d7384 (MD5) Previous issue date: 2007-11-09<br>Mobile devices have evolved from simple personal digital assistants or cell phones to cutting-edge personal digital assistants, aliasing or combining on-the- y video/audio acquisition and data processing. But giving the best usage to all this new technology in our day-by-day tasks still is challenging. The large variety of devices, the increasing need for ubiquitous mobile services and the network heterogeneity are just some problems developers may nd when deploying for the mobile world. With the popularization of the wireless network technologies, we can nd devices capable of establishing network connections using di erent technologies. Infrastructured networks support good bandwidth with low latency, but they demand an infrastructure of access points that are not available at any place. On the other hand, ad-hoc networks don't need an infrastructure and the communication is done in a peer-to-peer maner. The ad-hoc networks play an important rule in the environments made by mobile devices since they ensure high availability. Spontaneous networks are ad-hoc networks formed occasionally by users that wish to engage in some collaborative task, like a le sharing. In this work we describe a framework to help developers to easily create applications capable of managing and sharing digital content within groups of people in a spontaneous short-range ad-hoc network. We describe the framework architecture, its services and their relationship, as well as some usage scenarios, applications and related works.<br>Dispositivos móveis evoluíram de simples agendas, calendários ou telefones celulares para modernos assistentes pessoais, capazes de armazenar e processar áudio e vídeo em tempo real. Contudo, dar a melhor utilidade a esta tecnologia em nossas tarefas do dia-a-dia ainda é um desafio. A grande variedade de dispositivos, a crescente necessidade de serviços móveis pervasivos e a heterogeneidade das tecnologias de rede são apenas alguns exemplos dos problemas possivelmente encontrados pelos desenvolvedores ao produzir software para o mundo móvel. Com a popularização das tecnologias de rede, é cada vez mais comum encontrarmos dispositivos móveis capazes de estabelecer conexões através de diferentes tecnologias. Redes infra-estruturadas disponibilizam boas larguras de banda e baixa latência, porém necessitam de uma infra-estrutura de pontos de acesso nem sempre disponível. Por outro lado, as redes ad-hoc não necessitam de infra-estrutura e a comunicação entre seus nós é feita ponto a ponto, razão pela qual desempenham um importante papel nos ambientes formados por dispositivos móveis. Redes espontâneas são redes ad-hoc formadas ao acaso por usuários que desejam participar de alguma tarefa colaborativa, como o compartilhamento de arquivos. Neste trabalho apresentamos um framework cujo objetivo é ajudar os desenvolvedores a criar facilmente aplicações capazes de gerenciar e compartilhar conteúdo digital com grupos de usuários em redes ad-hoc espontâneas de curto alcance. São descritos a arquitetura do framework proposto, seus serviços e relacionamentos, assim como alguns cenários de uso, aplicações e trabalhos relacionados.
APA, Harvard, Vancouver, ISO, and other styles
38

Cavdar, Davut. "A Certificate Based Authentication Control Model Using Smart Mobile Devices For Ubiquitous Computing Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613682/index.pdf.

Full text
Abstract:
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementation is developed and successful application of the model is demonstrated. Within the prototype implementation, a mobile application is developed for access requests and sensors are used as representative local resources. Sample cases applied on the prototype demonstrate applicability and feasibility of the model.
APA, Harvard, Vancouver, ISO, and other styles
39

Paul, Arnab. "Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6848.

Full text
Abstract:
This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing. The main results are at the intersection of Security and Fault Tolerance for these environments. There are two primary areas that are explored in this thesis. 1. We have investigated protocols for large scale fault tolerant secure distributed storage. The two main concerns here are security and redundancy. In one arm of this research we developed SAFE, a distributed storage system based on a new protocol that offers a two-in-one solution to fault-tolerance and confidentiality. This protocol is based on cryptographic properties of error correction codes. In another arm, we developed esf, another prototype distributed persistent storage; esf facilitates seamless hardware extension of storage units, high resilience to loads and provides high availability. The main ingredient in its design is a modern class of erasure codes known as the {em Fountain Codes}. One problem in such large storage is the heavy overhead of the associated fingerprints needed for checking data integrity. esf deploys a clever integrity check mechanism by use of a data structure known as the {em Merkle Tree} to address this issue. 2. We also investigated the design of a new remote authentication protocol. Applications over long range wireless would benefit quite a bit from this design. We designed and implemented LAWN, a lightweight remote authentication protocol for wireless networks that deploys a randomized approximation scheme based on Error correcting codes. We have evaluated in detail the performance of LAWN; while it adds very low overhead of computation, the savings in bandwidth and power are quite dramatic.
APA, Harvard, Vancouver, ISO, and other styles
40

He, Ruan. "Architectures et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00579773.

Full text
Abstract:
Contributions principales Les éléments précédents identifient les principes de conception de base pour construire un canevas logiciel d'auto-protection. Différentes technologies peuvent être choisies pour réaliser ces principes. Les contributions principales de cette thèse décrivent des mécanismes développés et mis en œuvre pour réaliser notre canevas logiciel d'auto-protection. Il s'agit des éléments suivants : - Une architecture a trois couches pour l'auto-protection : un espace d'exécution fournit un environnement d'exécution pour des applications; un plan de contrôle supervise l'espace d'exécution ; et un plan autonome guide le plan de contrôle en prenant en compte l'etat du systeme, l'evolution des risques, la strategie de securite definie par l'administrateur, et les preferences de l'utilisateur. - Une approche du contrôle d'acces a base d'attributs: l'approche proposee (appelee G-ABAC) exprime les politiques d'autorisation en se basant sur des attributs. Cette approche apporte a la fois une neutralite vis-a-vis du modele de contrôle d'acces, et une flexibilite permettant des manipulations elementaires sur ces politiques. - Un canevas logiciel a base de politiques pour realiser la gestion autonome de la securite : l'approche a base de politiques a montre ses avantages pour l'administration des systemes complexes et dynamiques. Un canevas logiciel autonome de politiques de securite (ASPF) fournit une solution coherente et decentralisee pour administrer les politiques d'autorisation pour les systemes pervasifs a grande echelle. L'integration des patrons autonomes ameliore egalement la souplesse et la facilite d'adaptation au contexte. - Un noyau de securite embarque pour l'application des politiques de contrôle d'acces : les politiques d'autorisation denies precedemment sont appliquees par une architecture d'autorisation au niveau du systeme d'exploitation. Ce noyau appele VSK contrôle l'acces aux ressources d'une maniere dynamique an de reduire le surcoût des mecanismes d'autorisation. Ce mecanisme permet egalement de supporter dierents types de politiques d'autorisation. - Un langage dedie (Domain-Specic Language ou DSL) pour la specication de politiques d'adaptation : toutes les adaptations de notre canevas logiciel d'auto-protection de bout en bout sont contr^olees par des strategies de haut niveau appelees politiques d'adaptation. Un DSL tenant compte de nombreux facteurs pour les decisions d'adaptation. est deni pour specier ces politiques.
APA, Harvard, Vancouver, ISO, and other styles
41

Vasanta, Harikrishna. "Secure, privacy assured mechanisms for heterogeneous contextual environments." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16177/.

Full text
Abstract:
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to export location information across multiple devices and the existence of different location determination technologies necessitates the need for heterogeneous location network. These networks derive location information from multiple sources and provides various location-based services to users irrespective of the medium, device or technology used. Security, user privacy and management of location information are some of the important issues that need to be addressed. The main contribution of this thesis is the design of a secure and privacy assured heterogeneous location architecture. A formal methodology was chosen to design the heterogeneous location architecture. The design of the architecture resulted in a novel key distribution protocol and a model for information flow that can be easily encapsulated into applications or architectures having similar requirements. The research also resulted in the enhancement of a proposed location framework for securing critical infrastructures using context-aware self-defending objects. The proposed enhanced framework helps to negate the security vulnerabilities introduced through the use of general-purpose computer systems in critical infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
42

Pirttikangas, S. (Susanna). "Routine Learning: from Reactive to Proactive Environments." Doctoral thesis, University of Oulu, 2004. http://urn.fi/urn:isbn:9514275659.

Full text
Abstract:
Abstract Technological development and various information services becoming common has had the effect that data from everyday situations is available. Utilizing this technology and the data it produces in an efficient manner is called context-aware or ubiquitous computing. The research includes the specifications of each application, the requirements of the communication systems, issues of privacy, and human - computer interaction, for example. The environment should learn from the user's behaviour and communicate with the user. The communication should not be only reactive, but proactive as well. This thesis is divided into two parts, both representing methodology for enabling intelligence in our everyday surroundings. In part one, three different applications are defined for studying context-recognition and routine learning: a health monitoring system, a context-aware health club application, and automatic device configuration in an office space. The path for routine learning is straight forward and it is closely related to pattern recognition research. Sensory data is collected from users in various different situations, the signals are pre-processed, and the contexts recognized from this sensory data. Furthermore, routine learning is realized through association rules. The routine learning paradigm developed here can utilize already recognized contexts despite their meaning in the real world. The user makes the final decision on whether the routine is important or not, and has authority over every action of the system. The second part of the thesis is built on experiments on identifying a person walking on a pressure-sensitive floor. Resolving the characteristics of the special sensor producing the measurements, which lies under the normal flooring, is one of the tasks of this research. The identification is tested with Hidden Markov models and Learning Vector Quantization. The methodology developed in this thesis offers a step along the long road towards functional and calm intelligent environments.
APA, Harvard, Vancouver, ISO, and other styles
43

Barrientos, Alfredo, Julissa E. Calderón, and Stephanie Mujica. "Context Awareness & Pervasive Computing: Arquitectura lógica de un sistema perceptivo al contexto de un usuario." The International Institute of Informatics and Systemics, 2015. http://hdl.handle.net/10757/608513.

Full text
Abstract:
Los Sistemas Perceptivos del Contexto son capaces de reconocer y anticipar proactivamente a necesidades próximas del usuario teniendo en cuenta intereses, ubicación y proximidad, incluso sin necesidad de comunicárselo de manera explícita. Esto gracias al aprovechamiento de las redes sociales como la herramienta de “Inteligencia de Negocios” que permitirá no sólo conectar a los consumidores con las marcas sino también para entender a los clientes finales y con ello desarrollar productos y servicios especializados. Context Awareness se apoya de los Sistemas de Posicionamiento Global (GSP) quienes facilitan servicios basados en la ubicación del usuario para la creación de soluciones contextuales. Diversas arquitecturas son propuestas para el desarrollo de soluciones contextuales sin embargo carecen de ubicuidad, lo que limita la aplicabilidad de las mismas. Este estudio propone una arquitectura lógica para un Sistema Perceptivo del Contexto que permita agilizar la fase de desarrollo reflejando los niveles de dependencia entre componentes hardware y software. A modo validación se proponen escenarios aplicativos que consumen los servicios y dominios propuestos en la arquitectura con ayuda del procesamiento de los sensores y dispositivos inteligentes del mercado móvil. De esta manera, el estudio mejora el desarrollo de los Sistemas Inteligentes.<br>Los Sistemas Perceptivos del Contexto son capaces de reconocer y anticipar proactivamente a necesidades próximas del usuario teniendo en cuenta intereses, ubicación y proximidad, incluso sin necesidad de comunicárselo de manera explícita. Esto gracias al aprovechamiento de las redes sociales como la herramienta de “Inteligencia de Negocios” que permitirá no sólo conectar a los consumidores con las marcas sino también para entender a los clientes finales y con ello desarrollar productos y servicios especializados. Context Awareness se apoya de los Sistemas de Posicionamiento Global (GSP) quienes facilitan servicios basados en la ubicación del usuario para la creación de soluciones contextuales. Diversas arquitecturas son propuestas para el desarrollo de soluciones contextuales sin embargo carecen de ubicuidad, lo que limita la aplicabilidad de las mismas. Este estudio propone una arquitectura lógica para un Sistema Perceptivo del Contexto que permita agilizar la fase de desarrollo reflejando los niveles de dependencia entre componentes hardware y software. A modo validación se proponen escenarios aplicativos que consumen los servicios y dominios propuestos en la arquitectura con ayuda del procesamiento de los sensores y dispositivos inteligentes del mercado móvil. De esta manera, el estudio mejora el desarrollo de los Sistemas Inteligentes.
APA, Harvard, Vancouver, ISO, and other styles
44

Vasini, Fabio. "Integration of Internet of Things and Cloud computing. A case study on vital signs monitoring." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10204/.

Full text
Abstract:
Il progresso scientifico e le innovazioni tecnologiche nei campi dell'elettronica, informatica e telecomunicazioni, stanno aprendo la strada a nuove visioni e concetti. L'obiettivo della tesi è quello d'introdurre il modello del Cloud computing per rendere possibile l'attuale visione di Internet of Thing. Nel primo capitolo si introduce Ubiquitous computing come un nuovo modo di vedere i computer, cercando di fare chiarezza sulla sua definizione, la sua nascita e fornendo un breve quadro storico. Nel secondo capitolo viene presentata la visione di Internet of Thing (Internet delle “cose”) che si avvale di concetti e di problematiche in parte già considerate con Ubiquitous computing. Internet of Thing è una visione in cui la rete Internet viene estesa agli oggetti di tutti i giorni. Tracciare la posizione degli oggetti, monitorare pazienti da remoto, rilevare dati ambientali sono solo alcuni esempi. Per realizzare questo tipo di applicazioni le tecnologie wireless sono da considerare necessarie, sebbene questa visione non assuma nessuna specifica tecnologia di comunicazione. Inoltre, anche schede di sviluppo possono agevolare la prototipazione di tali applicazioni. Nel terzo capitolo si presenta Cloud computing come modello di business per utilizzare su richiesta risorse computazionali. Nel capitolo, vengono inizialmente descritte le caratteristiche principali e i vari tipi di modelli di servizio, poi viene argomentato il ruolo che i servizi di Cloud hanno per Internet of Thing. Questo modello permette di accelerare lo sviluppo e la distribuzione di applicazioni di Internet of Thing, mettendo a disposizione capacità di storage e di calcolo per l'elaborazione distribuita dell'enorme quantità di dati prodotta da sensori e dispositivi vari. Infine, nell'ultimo capitolo viene considerato, come esempio pratico, l'integrazione di tecnologie di Cloud computing in una applicazione IoT. Il caso di studio riguarda il monitoraggio remoto dei parametri vitali, considerando Raspberry Pi e la piattaforma e-Health sviluppata da Cooking Hacks per lo sviluppo di un sistema embedded, e utilizzando PubNub come servizio di Cloud per distribuire i dati ottenuti dai sensori. Il caso di studio metterà in evidenza sia i vantaggi sia le eventuali problematiche che possono scaturire utilizzando servizi di Cloud in applicazioni IoT.
APA, Harvard, Vancouver, ISO, and other styles
45

Marron, Monteserin Juan Jose. "Multi Sensor System for Pedestrian Tracking and Activity Recognition in Indoor Environments." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5068.

Full text
Abstract:
The widespread use of mobile devices and the rise of Global Navigation Satellite Systems (GNSS) have allowed mobile tracking applications to become very popular and valuable in outdoor environments. However, tracking pedestrians in indoor environments with Global Positioning System (GPS)-based schemes is still very challenging given the lack of enough signals to locate the user. Along with indoor tracking, the ability to recognize pedestrian behavior and activities can lead to considerable growth in location-based applications including pervasive healthcare, leisure and guide services (such as, museum, airports, stores, etc.), and emergency services, among the most important ones. This thesis presents a system for pedestrian tracking and activity recognition in indoor environments using exclusively common off-the-shelf sensors embedded in smartphones (accelerometer, gyroscope, magnetometer and barometer). The proposed system combines the knowledge found in biomechanical patterns of the human body while accomplishing basic activities, such as walking or climbing stairs up and down, along with identifiable signatures that certain indoor locations (such as turns or elevators) introduce on sensing data. The system was implemented and tested on Android-based mobile phones with a fixed phone position. The system provides accurate step detection and count with an error of 3% in flat floor motion traces and 3.33% in stairs. The detection of user changes of direction and altitude are performed with 98.88% and 96.66% accuracy, respectively. In addition, the activity recognition module has an accuracy of 95%. The combination of modules leads to a total tracking error of 90.81% in common human motion indoor displacements.
APA, Harvard, Vancouver, ISO, and other styles
46

Freitas, Leandro Oliveira. "UMA METODOLOGIA PARA ASSISTIR PACIENTES EM AMBIENTES HOMECARE PERVASIVOS." Universidade Federal de Santa Maria, 2011. http://repositorio.ufsm.br/handle/1/5385.

Full text
Abstract:
Conselho Nacional de Desenvolvimento Científico e Tecnológico<br>Every year the queues in hospitals publics and privates grows due to, among others, the increasing of the world population and the delay in the patients service. This is a serious problem faced by administrators of hospitals which believe that it is increasingly difficult to offer services of quality to those who search for them. One of the ways to decrease these queues is through the development of homecare systems that allow the patient to receive the clinic treatment directly in his house. The development of these kind of systems would help to decrease the queues and consequently, would improve the attendance of those who goes to the hospitals looking for assistance. Considering this, this work has as main purpose to present the modelling of an architecture of a pervasive system to be applied in homecare environments. The pervasive systems developed from this modelling aim to improve the services provided by healthcare professionals in the treatment of patients that are located in their houses. The architecture proposed by the methodology uses concepts of pervasive computing to provide access to information anytime and wherever the user is, once that a homecare environment has a high level of dynamicity of the envolved. The knowledge representation of the homecare environment needed in the modelling of the architecture is made through ontologies due to the possibility of reuse of the information stored, as well as the interoperability of information among different computational devices. To validate the proposed methodology, we present two use cases, which are also used to demonstrate the workflow of the pervasive system of homecare.<br>A cada ano que passa as filas de hospitais públicos e privados crescem devido, entre outros fatores, ao aumento da população mundial e a demora no atendimento de pacientes. Este é um problema sério enfrentado por administradores de hospitais os quais acreditam ser cada vez mais difícil oferecer um serviço de qualidade a quem os procura. Uma das formas de diminuir estas filas é através do desenvolvimento de sistemas de homecare que possibilitam que o paciente receba um tratamento clínico diretamente em sua casa. O desenvolvimento de sistemas deste tipo ajudaria a diminuir as filas e, consequentemente, iria melhorar o atendimento daqueles que forem até os hospitais a procura de auxílio. Considerando isto, este trabalho tem como objetivo principal apresentar uma modelagem para uma arquitetura de um sistema pervasivo para ser aplicado em ambientes de homecare. Os sistemas pervasivos desenvolvidos a partir desta modelagem visam o aprimoramento dos serviços prestados por profissionais da saúde no tratamento de pacientes que encontram-se em suas casas. A metodologia proposta apresenta uma arquitetura que utiliza conceitos de computação pervasiva possibilitando acesso à informação a qualquer hora e independente do lugar onde estejam, uma vez que um ambiente homacare possui um alto grau de dinamicidade dos envolvidos. A representação do conhecimento existente no ambiente homecare necessária para a modelagem da arquitetura é feita através de ontologias devido possibilidadde de reuso das informações ali armazenadas, bem como a interoperabilidade de informações entre diferentes dispositivos computacionais. Para validação da metodologia proposta, são apresentados dois casos de estudos, os quais também são utilizados para demonstração do fluxo de funcionamento do sistema pervasivo de homecare.
APA, Harvard, Vancouver, ISO, and other styles
47

Peker, Serhat. "A Novel User Activity Prediction Model For Context Aware Computing Systems." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613662/index.pdf.

Full text
Abstract:
In the last decade, with the extensive use of mobile electronic and wireless communication devices, there is a growing need for context aware applications and many pervasive computing applications have become integral parts of our daily lives. Context aware recommender systems are one of the popular ones in this area. Such systems surround the users and integrate with the environment<br>hence, they are aware of the users&#039<br>context and use that information to deliver personalized recommendations about everyday tasks. In this manner, predicting user&rsquo<br>s next activity preferences with high accuracy improves the personalized service quality of context aware recommender systems and naturally provides user satisfaction. Predicting activities of people is useful and the studies on this issue in ubiquitous environment are considerably insufficient. Thus, this thesis proposes an activity prediction model to forecast a user&rsquo<br>s next activity preference using past preferences of the user in certain contexts and current contexts of user in ubiquitous environment. The proposed model presents a new approach for activity prediction by taking advantage of ontology. A prototype application is implemented to demonstrate the applicability of this proposed model and the obtained outputs of a sample case on this application revealed that the proposed model can reasonably predict the next activities of the users.
APA, Harvard, Vancouver, ISO, and other styles
48

Hamann, Thomas. "Dynamische Verwaltung heterogener Kontextquellen in global verteilten Systemen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-ds-1233311862785-09186.

Full text
Abstract:
Im Rahmen der Dissertation wurde ein Middlewaredienst entwickelt und realisiert. Es gestattet die dynamische Verwaltung heterogener Kontextquellen. Das zugrunde liegende Komponentenmodell selbstbeschreibender Context Provieder ermöglicht die lose Kopplung von Kontextquellen und -senken. Es wird durch Filter- und Konverterkomponenten zur generischen Providersselektion anhand domänenspezifischer Merkmale ergänzt. Die Kopplung der verteilten Dienstinstanzen erfolgt durch ein hybrides Peer-to-Peer-System. Dies trägt der Heterogenität der Endgeräte Rechnung, und erlaubt die skalierbare , verteilte Verwaltung von Kontextquellen in globalen Szenarien.
APA, Harvard, Vancouver, ISO, and other styles
49

Pereira, Henrique Gabriel Gularte. "UMA ARQUITETURA PARA A UTILIZAÇÃO DE COMPUTAÇÃO NAS NUVENS NOS AMBIENTES DE COMPUTAÇÃO PERVASIVA." Universidade Federal de Santa Maria, 2012. http://repositorio.ufsm.br/handle/1/5396.

Full text
Abstract:
The modern world can be characterized by the quick proliferation of mobile devices and by the intense use of computers on our daily lives. Both pervasive computing and cloud computing have appeared as very promissing trends, but for pervasive computing to reach mainstream, many paradigm changes are needed on the current computing environments. Some of the problems found in pervasive camputing are not from a technical order, but due to a lack of standards and models to allow devices to interoperate and the problems related to the creation of low cost computing environments. Pervasive environments are marked by having sudden and frequent changes, making it necessary to think of a way to manage context information. This work aims at showing a solution that will allow the creation of pervasive computing environments using resources available in the cloud computing paradigm and taking in consideration requisites like the ability of mixing heterogenous computing devices running on the least possible amount of resources and using ontologies for context information representation and management. In this context, an architecture for the development of pervasive computing environments, an study case in a residencial cenario and an analysis of the results obtained with the proposed architecture are presented.<br>O mundo atual é caracterizado pela rápida proliferação de dispositivos móveis e pelo intenso uso de computadores no nosso cotidiano. Tanto a computação pervasiva quanto a computação em nuvem têm surgido como uma tendência muito promissora. Porém, para que a computação pervasiva se consolide são necessárias algumas mudanças de paradigma nos ambientes atuais da computação. Boa parte dos problemas encontrados hoje em dia na computação pervasiva não são de ordem técnica, mas sim a falta de padrões e modelos para permitir a interoperabilidade entre os dispositivos e a criação de ambientes computacionais de baixo custo. Os ambientes de computação pervasiva são caracterizados por mudanças rápidas e frequentes, sendo necessária a existência de alguma maneira para gerenciar essa informação de contexto. Essa dissertação visa apresentar uma solução para permitir a criação de ambientes de computação pervasiva utilizando serviços disponíveis no paradigma da computação em nuvem levando em consideração requisitos como a capacidade de trabalhar com dispositivos computacionais heterogêneos consumindo o mínimo possível de recursos e utilizando ontologias para a representação de informação de contexto. Nesse contexto, são apresentadas uma proposta de arquitetura para ambientes pervasivos, um estudo de caso em um cenário residencial e apresentados resultados e conclusões sobre a arquitetura proposta. Os resultados alcançados no estudo de caso permitiram a implementação de um ambiente pervasivo utilizando recursos computacionais disponíveis na nuvem e atingind os objetivos propostos no trabalho.
APA, Harvard, Vancouver, ISO, and other styles
50

Faure, Matthieu. "Management of scenarized user-centric service compositions for collaborative pervasive environments." Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20110/document.

Full text
Abstract:
L'informatique pervasive (ou ubiquitaire) est un support pour des environnements contenant denombreux objets (ou dispositifs) disséminés, équipés d'électronique et interconnectés. Ces dispositifsfournissent un accès distant à une multitude de fonctionnalités qui nous aident dans notre vie quotidienne.Les Architectures Orientées Services sont adaptées à la conception de logiciels pervasifs. En effet,chaque dispositif fournit son propre ensemble de fonctionnalités sous la forme de services. Ainsi, enl'absence de mécanisme complémentaire, les utilisateurs se trouvent limités à utiliser les servicesisolément alors que leurs besoins correspondent à des scénarios qui impliquent une composition demultiples services offerts par plusieurs appareils.Dans cette thèse, nous défendons qu'un système pervasif doit : d'une part, permettre aux utilisateursd'exprimer facilement leurs besoins en créant des scénarios et d'autre part, proposer à ses utilisateursune représentation et des moyens de gestion de leur contexte afin qu'ils puissent tirer le meilleur parti deleur environnement et de ses changements. De plus, la présence de plusieurs utilisateurs implique lanécessité de collaborer. Par ailleurs, l'exécution de scénarios doit être résiliente aux changementsenvironnementaux et aux actions des utilisateurs. Elle doit ainsi s'adapter dynamiquement et, si possible,tirer profit du contexte et des changements de l'environnement.Notre contribution, nommée SaS (Scenarios as Services), répond à ces objectifs. Elle propose uneapproche interopérable capable de s'adapter à l'environnement. Elle fournit une représentation persistanteet personnalisable du contexte et inclut un langage de description de scénarios destiné aux utilisateurs.Ces scénarios sont facilement contrôlables, personnalisables et réutilisables. Elle planifie l'exécution pasà pas des scénarios, afin de s'adapter aux changements de l'environnement et de bénéficier desavantages de la mobilité des utilisateurs (exécution d'un scénario, dans la durée, sur plusieurs lieux).Enfin, elle inclut le partage de scénarios qui permet aux utilisateurs de collaborer. Un prototype de SaS,basé sur des normes industrielles (telle qu'OSGi), prouve la faisabilité de notre contribution et nouspermet de l'évaluer sur un cas d'étude simple<br>Pervasive (or ubiquitous) computing is a paradigm for environments containing distributedinterconnected devices that embed electronics. These devices provide a remote access to numerousfunctionalities that assist us in our daily life. Service-Oriented Architectures are suitable to design softwarefor pervasive environments. Indeed, each device provides its own set of functionalities as services.Without any extra mechanism, users can only use a single service at a time. Nevertheless, their needsusually correspond to scenarios which involve a composition of multiple services, provided by multipledevices.In this thesis, we advocate that a pervasive system must, on the one hand, enable users to easily expresstheir needs through scenario creation and, on the other hand, propose to users a representation of theircontext so that they can benefit from both their environment and its changes. In addition, the presence ofseveral users implies that users must be able to collaborate.Our contribution, named SaS (Scenarios as Services), fulfils these requirements. It proposes aninteroperable approach that adapts to its environment. It provides users with a customizable andpersistent representation of their context and includes a scenario description language targeted to users.Scenarios are easy to control, customize and reuse. SaS schedules the step-by-step execution ofscenarios to adapt to environmental changes and benefit from user mobility (scenario execution split over time on successive distinct sites). Finally, SaS includes scenario sharing mechanisms which are abasis for collaboration. A prototype of SaS, based on industrial standards (e.g., OSGi), proves thefeasibility of our contribution and serves for its evaluation on a simple use case
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!