Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.展开更多
A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communic...A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.展开更多
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ...In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.展开更多
Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration fo...Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration for pervasive application.Based on task-oriented and descriptive properties of scenario,a scenario-based participatory design model was proposed to realize the task abstraction.The design model provided users and domain experts a useful mechanism to build the customized applications by separating system model into domain model and design model.In this design model,domain experts,together with users,stakeholders focus on the logic rules(domain model)and programmers work on the implementation(design model).In order to formalize the model description,a human-agent interaction language to transform users' goals and domain rules into executable scenarios was also discussed.An agent platform-describer used to link design and implementation of scenarios was developed to realize the configuration of applications according to different requirements.The demand bus application showed the design process and the usability of this model.展开更多
This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment ...This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.展开更多
In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is co...In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario.展开更多
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with incons...New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.展开更多
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ...Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.展开更多
Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or p...Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture for realizing the RoW concept is described along with a proof-of-concept prototype that implements portions of the RoW concept. One essential part of an RoW implementation is accurate Iocationing of objects and people in a video frame. The Iocationing problem becomes particularly challenging because we want to reuse existing infrastructure as much as possible. We developed a high-frequency sound-based Iocationing scheme and implemented it on the prototype. The results from initial experiments performed on the Iocationing scheme are reported here.展开更多
Tsinghua Science and Technology is founded and published since 1996. It is an international academic journal sponsored by Tsinghua University and is published bimonthly. This journal aims at presenting the up-to-date ...Tsinghua Science and Technology is founded and published since 1996. It is an international academic journal sponsored by Tsinghua University and is published bimonthly. This journal aims at presenting the up-to-date scientific achievements in computer science, and other information technology fields. It is indexed by Ei and other abstracting and indexing services. From 2013, the journal commits to the open access at IEEE Xplore Digital Library.展开更多
Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the ...Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior.It is evident from the recent literature that cyber-physical systems(CPS)were used in the analytics and modeling of telecom data.In addition,CPS is used to provide valuable services in smart cities.In general,a typical telecom company hasmillions of subscribers and thus generatesmassive amounts of data.From this aspect,data storage,analysis,and processing are the key concerns.To solve these issues,herein we propose a multilevel cyber-physical social system(CPSS)for the analysis and modeling of large internet data.Our proposed multilevel system has three levels and each level has a specific functionality.Initially,raw Call Detail Data(CDR)was collected at the first level.Herein,the data preprocessing,cleaning,and error removal operations were performed.In the second level,data processing,cleaning,reduction,integration,processing,and storage were performed.Herein,suggested internet activity record measures were applied.Our proposed system initially constructs a graph and then performs network analysis.Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city(Milan city).Our research is helpful for the network operators to plan effective network configuration,management,and optimization of resources.展开更多
Reducing cost of service is an important goal for resource discovery and interaction technologies. The shortcomings of transhipment-method and hibernation-method are to increase holistic cost of service and to slower ...Reducing cost of service is an important goal for resource discovery and interaction technologies. The shortcomings of transhipment-method and hibernation-method are to increase holistic cost of service and to slower resource discovery respectively. To overcome these shortcomings, a context-aware computing-based method is developed. This method, firstly, analyzes the courses of devices using resource discovery and interaction technologies to identify some types of context related to reducing cost of service, then, chooses effective methods such as stopping broadcast and hibernation to reduce cost of service according to information supplied by the context but not the transhipment-method’s simple hibernations. The results of experiments indicate that under the worst condition this method overcomes the shortcomings of transhipment-method, makes the “poor” devices hibernate longer than hibernation-method to reduce cost of service more effectively, and discovers resources faster than hibernation-method; under the best condition it is far better than hibernation-method in all aspects.展开更多
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ...Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.展开更多
With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more...With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more and more prevalent. Many applications in PCE require Agent communication,manual control,and diversity of devices. Hence system in PCE must be designed flexible,and optimize the use of network,storage and computing resources. However,traditional MA software framework cannot completely adapt to these new features. A new MA software framework and its Agent Communication Modules to solve the problem brought by PCE was proposed. To describe more precisely,it presents Wright/ADL (Architecture Description Language) description of the new framework. Then,it displays an application called AI Eleven based on this new framework. AI Eleven achieves Agent-Agent communication and good collaboration for a task. Two experiments on AI Eleven will demonstrate the new framework's practicability and superiority.展开更多
Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every s...Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every software engineer needs to clearly understand the goal of the development and to categorize the context in the application. We incorporate context-based modifications into the appearance or the behavior of the interface, either at the design time or at the run time. In this paper, we present application behavior adaption to the context modification via a context-based user interface in a mobile application. We are interested in a context-based user interface in a mobile device that is automatically adapted based on the context information. We use the adaption tree, named in our methodology, to represent the adaption of mobile device user interface to various context information. The context includes the user’s domain information and dynamic environment changes. Each path in the adaption tree, from the root to the leaf, presents an adaption rule. An e-commerce application is chosen to illustrate our approach. This mobile application was developed based on the adaption tree in the Android platform. The automatic adaption to the context information has enhanced human-computer interactions.展开更多
The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an in...The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience.The key technique used to realise this is context awareness.Contexts in the living space can provide large amounts of information regarding users’behaviours and habits.Together with an information system,it can automatically execute many common operations of applications,instead of users,and can make the applications"smart".However,since contexts in the environment are diverse and sensitive,it is difficult to choose the ones that are most useful to the users’current activity.A proper scheduling strategy should first consider the users’demand.This paper proposes a context-aware scheduling algorithm that is based on correlation,with the purpose of improving the utilization rate of context collections.Experiments show that with the priority based on correlation in low-level contexts,the scheduling of reasoning tasks can reduce the cost of transmission.展开更多
Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications ...Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.展开更多
Activity-oriented context-aware (AOCA) applications are representative in pervasive computing. These appli- cations recognize daily-life human activities, perceive the environment status related to the activities, a...Activity-oriented context-aware (AOCA) applications are representative in pervasive computing. These appli- cations recognize daily-life human activities, perceive the environment status related to the activities, and react to ensure the smooth performance of the activities. Existing research proposed a specific light-weight, incremental method to support the development of such applications; however it is not easy to learn and use. This paper aims to facilitate the development of such applications and improve the productivity of developers. We propose AocML, a textual domain-specific language which provides a high-level abstraction of AOCA applications. Specifically, we first show the software model of AOCA applications and the abstract syntax of AocML. Then, we introduce the concrete syntax of AocML. We also implement the tools for AocML, including the development environment as well as the generation of Java code and ontology specification. Moreover, we use a case study and evaluation to demonstrate the advantages of AocML.展开更多
Context-aware system is an emerging research area in recent years. Context plays an important role in these systems. In most existing work, context is treated as all rel- ative elements in the environment of an applic...Context-aware system is an emerging research area in recent years. Context plays an important role in these systems. In most existing work, context is treated as all rel- ative elements in the environment of an application, and the scope of context is predefined by the developers during the development. However, it is difficult to analyze, specify, and organize everything in the environment accurately and com- pletely; and even when it is possible, the developed applica- tions are difficult to extend or modify as the requests for en- vironment may change over time. In this paper, we focus on activity-oriented context-aware (AOCA) applications where the requests for environment are highly dependent on user activities, and propose a programming framework for devel- oping AOCA applications. In particular, we first present a concept model for describing the notions of activity-oriented context. Next, based on the concept model, we describe the details of the programming framework as well as a develop- ment tool. Moreover, we provide a platform to support the runtime of AOCA applications, and demonstrate the advan- tages of our programming framework through experimental evaluations.展开更多
基金Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
文摘Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.
基金The National Natural Science Foundation of China(No60503041)the Science and Technology Commission of ShanghaiInternational Cooperation Project (No05SN07114)
文摘A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.
基金Supported by the National Natural Science Foundation of China (No.60703101)
文摘In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic.
文摘Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration for pervasive application.Based on task-oriented and descriptive properties of scenario,a scenario-based participatory design model was proposed to realize the task abstraction.The design model provided users and domain experts a useful mechanism to build the customized applications by separating system model into domain model and design model.In this design model,domain experts,together with users,stakeholders focus on the logic rules(domain model)and programmers work on the implementation(design model).In order to formalize the model description,a human-agent interaction language to transform users' goals and domain rules into executable scenarios was also discussed.An agent platform-describer used to link design and implementation of scenarios was developed to realize the configuration of applications according to different requirements.The demand bus application showed the design process and the usability of this model.
文摘This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.
基金The Key Project of Chinese Ministry of Education(No.104086)
文摘In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario.
基金supported by the National Natural Science Foundation of China under Grant No. 60970010the National Basic Research 973 Program of China under Grant No. 2009CB320705the Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20090073110026
文摘New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness.
基金funded by the Abu Dhabi University,Faculty Research Incentive Grant(19300483–Adel Khelifi),United Arab Emirates.Link to Sponsor website:https://www.adu.ac.ae/research/research-at-adu/overview.
文摘Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach.
文摘Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture for realizing the RoW concept is described along with a proof-of-concept prototype that implements portions of the RoW concept. One essential part of an RoW implementation is accurate Iocationing of objects and people in a video frame. The Iocationing problem becomes particularly challenging because we want to reuse existing infrastructure as much as possible. We developed a high-frequency sound-based Iocationing scheme and implemented it on the prototype. The results from initial experiments performed on the Iocationing scheme are reported here.
文摘Tsinghua Science and Technology is founded and published since 1996. It is an international academic journal sponsored by Tsinghua University and is published bimonthly. This journal aims at presenting the up-to-date scientific achievements in computer science, and other information technology fields. It is indexed by Ei and other abstracting and indexing services. From 2013, the journal commits to the open access at IEEE Xplore Digital Library.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493).
文摘Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior.It is evident from the recent literature that cyber-physical systems(CPS)were used in the analytics and modeling of telecom data.In addition,CPS is used to provide valuable services in smart cities.In general,a typical telecom company hasmillions of subscribers and thus generatesmassive amounts of data.From this aspect,data storage,analysis,and processing are the key concerns.To solve these issues,herein we propose a multilevel cyber-physical social system(CPSS)for the analysis and modeling of large internet data.Our proposed multilevel system has three levels and each level has a specific functionality.Initially,raw Call Detail Data(CDR)was collected at the first level.Herein,the data preprocessing,cleaning,and error removal operations were performed.In the second level,data processing,cleaning,reduction,integration,processing,and storage were performed.Herein,suggested internet activity record measures were applied.Our proposed system initially constructs a graph and then performs network analysis.Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city(Milan city).Our research is helpful for the network operators to plan effective network configuration,management,and optimization of resources.
文摘Reducing cost of service is an important goal for resource discovery and interaction technologies. The shortcomings of transhipment-method and hibernation-method are to increase holistic cost of service and to slower resource discovery respectively. To overcome these shortcomings, a context-aware computing-based method is developed. This method, firstly, analyzes the courses of devices using resource discovery and interaction technologies to identify some types of context related to reducing cost of service, then, chooses effective methods such as stopping broadcast and hibernation to reduce cost of service according to information supplied by the context but not the transhipment-method’s simple hibernations. The results of experiments indicate that under the worst condition this method overcomes the shortcomings of transhipment-method, makes the “poor” devices hibernate longer than hibernation-method to reduce cost of service more effectively, and discovers resources faster than hibernation-method; under the best condition it is far better than hibernation-method in all aspects.
基金supported by the National Natural Science Foundation of China under Grant 61272519the Research Funds of Blockchain Joint Lab between BUPT and BCTthe joint Blockchain and Security Lab between BUPT and CAPSTONE
文摘Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.
基金Guangdong-Hong Kong Technology Cooperation Funding Scheme, China ( No.2007A010101003)Guangdong-Ministry of Education Industry-University Cooperation Funding Scheme,China (No.2007B090200018)
文摘With the improvement of mobile equipment performance and development of Pervasive Computing,interactive computational applications such as Multi-Agent (MA) systems in Pervasive Computing Environments (PCE) become more and more prevalent. Many applications in PCE require Agent communication,manual control,and diversity of devices. Hence system in PCE must be designed flexible,and optimize the use of network,storage and computing resources. However,traditional MA software framework cannot completely adapt to these new features. A new MA software framework and its Agent Communication Modules to solve the problem brought by PCE was proposed. To describe more precisely,it presents Wright/ADL (Architecture Description Language) description of the new framework. Then,it displays an application called AI Eleven based on this new framework. AI Eleven achieves Agent-Agent communication and good collaboration for a task. Two experiments on AI Eleven will demonstrate the new framework's practicability and superiority.
文摘Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every software engineer needs to clearly understand the goal of the development and to categorize the context in the application. We incorporate context-based modifications into the appearance or the behavior of the interface, either at the design time or at the run time. In this paper, we present application behavior adaption to the context modification via a context-based user interface in a mobile application. We are interested in a context-based user interface in a mobile device that is automatically adapted based on the context information. We use the adaption tree, named in our methodology, to represent the adaption of mobile device user interface to various context information. The context includes the user’s domain information and dynamic environment changes. Each path in the adaption tree, from the root to the leaf, presents an adaption rule. An e-commerce application is chosen to illustrate our approach. This mobile application was developed based on the adaption tree in the Android platform. The automatic adaption to the context information has enhanced human-computer interactions.
基金partially supported by the National Natural Science Foundation of China under Grant No.61103115the Hunan Provincial Natural Science Foundation of China under Grant No.11JJ4058the Scientific Research Fund of Hunan Provincial Education Department under Grant No.11A041
文摘The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience.The key technique used to realise this is context awareness.Contexts in the living space can provide large amounts of information regarding users’behaviours and habits.Together with an information system,it can automatically execute many common operations of applications,instead of users,and can make the applications"smart".However,since contexts in the environment are diverse and sensitive,it is difficult to choose the ones that are most useful to the users’current activity.A proper scheduling strategy should first consider the users’demand.This paper proposes a context-aware scheduling algorithm that is based on correlation,with the purpose of improving the utilization rate of context collections.Experiments show that with the priority based on correlation in low-level contexts,the scheduling of reasoning tasks can reduce the cost of transmission.
基金Hong Kong Polytechnic University under the ICRG Grant No.G-YE57,Hong Kong RGC under the Grant of A Research Center Ubiquitous Computingthe National Hi-Tech Development 863 Program of China under Grant No.2006AA01Z231.
文摘Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.
基金The work was supported by the National Key Research and Development Program of China under Grant No. 2017YFB1001801, the National Natural Science Foundation of China under Grant Nos. 61702263, 61761136003, and 61373011, the Natural Science Foundation of Jiangsu Province of China under Grant No. BK20171427, and the Fundamental Research Funds for the Central Universities of China under Grant No. 30917011322.
文摘Activity-oriented context-aware (AOCA) applications are representative in pervasive computing. These appli- cations recognize daily-life human activities, perceive the environment status related to the activities, and react to ensure the smooth performance of the activities. Existing research proposed a specific light-weight, incremental method to support the development of such applications; however it is not easy to learn and use. This paper aims to facilitate the development of such applications and improve the productivity of developers. We propose AocML, a textual domain-specific language which provides a high-level abstraction of AOCA applications. Specifically, we first show the software model of AOCA applications and the abstract syntax of AocML. Then, we introduce the concrete syntax of AocML. We also implement the tools for AocML, including the development environment as well as the generation of Java code and ontology specification. Moreover, we use a case study and evaluation to demonstrate the advantages of AocML.
基金This research was funded by the National Ba- sic Research Program (973 program) (2015CB352202), the National High Technology Research and Development Program (863 program) (2015AA01A203), and the National Natural Science Foundation of China (Grant Nos. 91318301, 61373011, 61321491).
文摘Context-aware system is an emerging research area in recent years. Context plays an important role in these systems. In most existing work, context is treated as all rel- ative elements in the environment of an application, and the scope of context is predefined by the developers during the development. However, it is difficult to analyze, specify, and organize everything in the environment accurately and com- pletely; and even when it is possible, the developed applica- tions are difficult to extend or modify as the requests for en- vironment may change over time. In this paper, we focus on activity-oriented context-aware (AOCA) applications where the requests for environment are highly dependent on user activities, and propose a programming framework for devel- oping AOCA applications. In particular, we first present a concept model for describing the notions of activity-oriented context. Next, based on the concept model, we describe the details of the programming framework as well as a develop- ment tool. Moreover, we provide a platform to support the runtime of AOCA applications, and demonstrate the advan- tages of our programming framework through experimental evaluations.