Mobile professionals need to be assisted with suitable mobile GeoBI (Geospatial Business Intelligence) systems, which are able to capture, organize and structure the user’s reality into a relevant context model and r...Mobile professionals need to be assisted with suitable mobile GeoBI (Geospatial Business Intelligence) systems, which are able to capture, organize and structure the user’s reality into a relevant context model and reason on it. GeoBI context modelling and reasoning are still research issues since there is not yet either a model or a relevant taxonomy regarding GeoBI contextual information. To fill this gap, this paper proposes an extended and detailed OWL-based mobile GeoBI context ontology to provide context-aware applications and users with relevant contextual information and context-based reasoning capabilities. Context quality issues are handled an implementation architecture which is provided.展开更多
A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential...A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential context-aware technologies and AAC usage scenarios were studied, and an efficient communication system was developed by combining smartphone's multimedia functions and its optimized sensor technologies. The experimental results show that context-awareness accuracy is achieved up to 97%.展开更多
This paper proposes a contextual item-based collaborative filtering technology, which is based on the traditional item-based collaborative filtering technology. In the process of the recommendation, user’s important ...This paper proposes a contextual item-based collaborative filtering technology, which is based on the traditional item-based collaborative filtering technology. In the process of the recommendation, user’s important mobile contextual information are taken into account, and the technology combines with those ratings on the items in the users’ historical contextual information who are familiar with user’s current context information in order to predict that which items will be preferred by user in his or her current context. At the end, an experiment is used to prove that the technology proposed in this paper can predict user’s preference in his or her mobile environment more accurately.展开更多
Today, vehicular ad-hoc network (VANET) is a hot research topic due to its many applications like collision avoidance, congestion road notification, parking lot availability, road-side business advertisements, etc. Al...Today, vehicular ad-hoc network (VANET) is a hot research topic due to its many applications like collision avoidance, congestion road notification, parking lot availability, road-side business advertisements, etc. All these applications have hard delay constraints i.e. the messages should reach the target location within certain time limits. So, there must be efficient routing in VANET which meets these delay constraints. In this paper, two techniques are proposed to minimize the data traffic and delay in VANET. Firstly, a context based clustering is proposed which takes into consideration various parameters in cluster formation-location of vehicle, direction of vehicle, velocity of vehicle, interest list of vehicle [1] and destination of vehicle. Secondly, a destination based routing protocol is proposed for these context based clusters for efficient inter-cluster communication.展开更多
In order to address challenges posed by advances in mobile computing, ubiquitous devices software engineering, wireless and sensor technologies in many applications running, this paper provides an approach that simpli...In order to address challenges posed by advances in mobile computing, ubiquitous devices software engineering, wireless and sensor technologies in many applications running, this paper provides an approach that simplifies the design and the implementation of context-aware Interactive systems called CAISDA (Context-Aware Interactive System Development Approach). This approach is based on the analysis and synthesis of context-aware frameworks proposed in literature.展开更多
Requirements of software systems tend to change over time. The speed of this tendency depends on the application domain the software system under consideration belongs to. If we consider novel contexts such as pervasi...Requirements of software systems tend to change over time. The speed of this tendency depends on the application domain the software system under consideration belongs to. If we consider novel contexts such as pervasive systems and systems supporting dynamic B2B interaction, requirements change so fast that the research community is studying how to build systems that are able to self-adapt on the fly to some of these changes. When this happens, the system does not need to undergo through a new development cycle thus increasing its availability and, to a certain extent, its robustness. So far, the research in the area of self-adaptive systems has been focusing on the definition of the mechanisms for supporting self-adaptation. We argue that what is missing now is a structured and robust design process associated to these mechanisms. This design process should include a Requirement Engineering (RE) phase that somewhat differs from the traditional one. However, the identification of requirements for adaptation requires a good knowledge of the context in which the system will be executed. In this work, we consider the modeling of such context as part of the RE phase and we particularly focus on Service-Based Applications (SBAs). We argue that RE activities should be supported at run-time to handle context changes and to support adaptation for SBAs. We survey the state of the art for what concerns the elicitation, modeling, and analysis of requirements and will highlight some issues and challenges in order to support adaptation for SBAs.展开更多
Due to the covert nature of the listening process, English listening comprehension has become a demanding challenge for most EFL learners in China. Strategy-based listening instruction, with its more accurate insight ...Due to the covert nature of the listening process, English listening comprehension has become a demanding challenge for most EFL learners in China. Strategy-based listening instruction, with its more accurate insight into the listening process, could be one of the timely answers to the challenges facing Chinese EFL listeners. Starting with a comprehensive review of theories and studies on strategy-based listening instruction in recent Western academia, the current paper critically examined the possible advantages and the theoretical and practical limitations of strategy-based listening instruction.展开更多
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics...Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.展开更多
There is a tremendous growth of digital data due to the stunning progress of digital devices which facilitates capturing them. Digital data include image, text, and video. Video represents a rich source of information...There is a tremendous growth of digital data due to the stunning progress of digital devices which facilitates capturing them. Digital data include image, text, and video. Video represents a rich source of information. Thus, there is an urgent need to retrieve, organize, and automate videos. Video retrieval is a vital process in multimedia applications such as video search engines, digital museums, and video-on-demand broadcasting. In this paper, the different approaches of video retrieval are outlined and briefly categorized. Moreover, the different methods that bridge the semantic gap in video retrieval are discussed in more details.展开更多
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challengin...Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.展开更多
Task-based teaching has been introduced to many EFL educational settings and has become widely used within those contexts.As a new English teaching approach,it has been evaluated by educators.This essay discusses task...Task-based teaching has been introduced to many EFL educational settings and has become widely used within those contexts.As a new English teaching approach,it has been evaluated by educators.This essay discusses task-based language teaching within the context of EFL students in a middle school in China.A discription of the context,problems of introducing this approach in this context is demonstrated,followed by an overview of this approach and an evaluation including its advantages and disadvantages weighed by scholars,as well as their opinions on"tasks"and"grammar".The end of this essay provides a discussion of solutions for the problems of using this ap proach within this context.展开更多
隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物...隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物联设备指纹生成机制,以对抗型思维并行开展监测与防御方案研究,实现了对隐藏安全威胁的感知与过滤,通过相似度阈值分析测试与评估模型的建立完成了设备安全性验证,具有较好的效果与优势.展开更多
文摘Mobile professionals need to be assisted with suitable mobile GeoBI (Geospatial Business Intelligence) systems, which are able to capture, organize and structure the user’s reality into a relevant context model and reason on it. GeoBI context modelling and reasoning are still research issues since there is not yet either a model or a relevant taxonomy regarding GeoBI contextual information. To fill this gap, this paper proposes an extended and detailed OWL-based mobile GeoBI context ontology to provide context-aware applications and users with relevant contextual information and context-based reasoning capabilities. Context quality issues are handled an implementation architecture which is provided.
基金Project supported by the Changwon National University(2013-2014),Korea
文摘A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential context-aware technologies and AAC usage scenarios were studied, and an efficient communication system was developed by combining smartphone's multimedia functions and its optimized sensor technologies. The experimental results show that context-awareness accuracy is achieved up to 97%.
文摘This paper proposes a contextual item-based collaborative filtering technology, which is based on the traditional item-based collaborative filtering technology. In the process of the recommendation, user’s important mobile contextual information are taken into account, and the technology combines with those ratings on the items in the users’ historical contextual information who are familiar with user’s current context information in order to predict that which items will be preferred by user in his or her current context. At the end, an experiment is used to prove that the technology proposed in this paper can predict user’s preference in his or her mobile environment more accurately.
文摘Today, vehicular ad-hoc network (VANET) is a hot research topic due to its many applications like collision avoidance, congestion road notification, parking lot availability, road-side business advertisements, etc. All these applications have hard delay constraints i.e. the messages should reach the target location within certain time limits. So, there must be efficient routing in VANET which meets these delay constraints. In this paper, two techniques are proposed to minimize the data traffic and delay in VANET. Firstly, a context based clustering is proposed which takes into consideration various parameters in cluster formation-location of vehicle, direction of vehicle, velocity of vehicle, interest list of vehicle [1] and destination of vehicle. Secondly, a destination based routing protocol is proposed for these context based clusters for efficient inter-cluster communication.
文摘In order to address challenges posed by advances in mobile computing, ubiquitous devices software engineering, wireless and sensor technologies in many applications running, this paper provides an approach that simplifies the design and the implementation of context-aware Interactive systems called CAISDA (Context-Aware Interactive System Development Approach). This approach is based on the analysis and synthesis of context-aware frameworks proposed in literature.
文摘Requirements of software systems tend to change over time. The speed of this tendency depends on the application domain the software system under consideration belongs to. If we consider novel contexts such as pervasive systems and systems supporting dynamic B2B interaction, requirements change so fast that the research community is studying how to build systems that are able to self-adapt on the fly to some of these changes. When this happens, the system does not need to undergo through a new development cycle thus increasing its availability and, to a certain extent, its robustness. So far, the research in the area of self-adaptive systems has been focusing on the definition of the mechanisms for supporting self-adaptation. We argue that what is missing now is a structured and robust design process associated to these mechanisms. This design process should include a Requirement Engineering (RE) phase that somewhat differs from the traditional one. However, the identification of requirements for adaptation requires a good knowledge of the context in which the system will be executed. In this work, we consider the modeling of such context as part of the RE phase and we particularly focus on Service-Based Applications (SBAs). We argue that RE activities should be supported at run-time to handle context changes and to support adaptation for SBAs. We survey the state of the art for what concerns the elicitation, modeling, and analysis of requirements and will highlight some issues and challenges in order to support adaptation for SBAs.
文摘Due to the covert nature of the listening process, English listening comprehension has become a demanding challenge for most EFL learners in China. Strategy-based listening instruction, with its more accurate insight into the listening process, could be one of the timely answers to the challenges facing Chinese EFL listeners. Starting with a comprehensive review of theories and studies on strategy-based listening instruction in recent Western academia, the current paper critically examined the possible advantages and the theoretical and practical limitations of strategy-based listening instruction.
基金the financial support from Department of Science and Technology,Government of India under the grant:SR/CSRI/118/2014
文摘Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.
文摘There is a tremendous growth of digital data due to the stunning progress of digital devices which facilitates capturing them. Digital data include image, text, and video. Video represents a rich source of information. Thus, there is an urgent need to retrieve, organize, and automate videos. Video retrieval is a vital process in multimedia applications such as video search engines, digital museums, and video-on-demand broadcasting. In this paper, the different approaches of video retrieval are outlined and briefly categorized. Moreover, the different methods that bridge the semantic gap in video retrieval are discussed in more details.
基金Supported by the National Natural Science Foundation of China (No.60403027) .
文摘Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.
文摘Task-based teaching has been introduced to many EFL educational settings and has become widely used within those contexts.As a new English teaching approach,it has been evaluated by educators.This essay discusses task-based language teaching within the context of EFL students in a middle school in China.A discription of the context,problems of introducing this approach in this context is demonstrated,followed by an overview of this approach and an evaluation including its advantages and disadvantages weighed by scholars,as well as their opinions on"tasks"and"grammar".The end of this essay provides a discussion of solutions for the problems of using this ap proach within this context.
文摘隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物联设备指纹生成机制,以对抗型思维并行开展监测与防御方案研究,实现了对隐藏安全威胁的感知与过滤,通过相似度阈值分析测试与评估模型的建立完成了设备安全性验证,具有较好的效果与优势.