Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method...Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment.展开更多
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'...We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.展开更多
In ubiquitous stub environment, it is a critical challenge to design an optimal device aggregation mechanism to meet all requested ubiquitous services simultaneously with resource- limited devices and bandwidth-limite...In ubiquitous stub environment, it is a critical challenge to design an optimal device aggregation mechanism to meet all requested ubiquitous services simultaneously with resource- limited devices and bandwidth-limited network. Firstly, Multi-Service oriented Devices Aggregation Problem is generalized and formulated based on QoS-metric with Multi-attribute Decision Making. Secondly, a Multi-Service oriented Devices Aggregation Mechanism is proposed to deal the problem in which there are two processes: Dimensionless Processing and Device Aggregation Approach. At last, the simulation is implemented with OPNET and MATLAB. We integrate different QoS factors, such as Average Utility, Utility distribution, Total Utility distribution and Service Failure Rate, to reflect user experience.展开更多
Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computationa...Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.展开更多
Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up an...Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education.展开更多
The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with peop...The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed..展开更多
With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mob...With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well.展开更多
Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range target...Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI.展开更多
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst...The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.展开更多
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m...The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.展开更多
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ...The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs.展开更多
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne...Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.展开更多
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU...To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.展开更多
文摘Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment.
文摘We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.
文摘In ubiquitous stub environment, it is a critical challenge to design an optimal device aggregation mechanism to meet all requested ubiquitous services simultaneously with resource- limited devices and bandwidth-limited network. Firstly, Multi-Service oriented Devices Aggregation Problem is generalized and formulated based on QoS-metric with Multi-attribute Decision Making. Secondly, a Multi-Service oriented Devices Aggregation Mechanism is proposed to deal the problem in which there are two processes: Dimensionless Processing and Device Aggregation Approach. At last, the simulation is implemented with OPNET and MATLAB. We integrate different QoS factors, such as Average Utility, Utility distribution, Total Utility distribution and Service Failure Rate, to reflect user experience.
文摘Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.
文摘Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education.
文摘The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed..
基金National Key Research and Development Project of China(Grant No.2018YFB2100202).
文摘With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well.
文摘Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI.
基金supported by Science and Technology Foundation of State Grid Corporation of China(Ubiquitous Power Internet of Things Technical Standard System)5442HL 190008National Key Research and Development Program of China(2020YFB0905900)。
文摘The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.
文摘The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.
文摘The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs.
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
基金Supported by the Ministry of Educationin China(No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
基金Supported by the Ministry of Educationin China (No.104086)
文摘To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.