SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com            Vol.3, Issue.2, March-April. 2013 pp-704-708      ISSN: 2249-6645


                Control System for Manipulation of Services in Ubiquitous
                                     Environment

                 Mario I. García Antonio, 1 José A. Cruz Tolentino, 2 Victor Gómez, 3
                          Alejandro Jarillo-Silva, 4 Luis A. González Rojas, 5
                                 Amando Alejandro Ruíz Figueroa6
    123456
             Universidad de la Sierra Sur, St. Guillermo Rojas Mijangos S/N, Oaxaca, México. Department of Information
                                       Technology, Sierra Sur University, Oaxaca, México

Abstract: The ubiquitous computing are to guide a the creation of intelligent space, where of users already not
interaction with a only the computation system but on with different computer system at a time and not
necessarily a user is aware of this interaction. Recent research describes computer systems where the user accesses
the services of a ubiquitous environment through mobile devices. The problem with these systems is the lack of full
control over physical objects (e.g. doors, windows, heating systems, etc). In this paper, we propose the incorporation
of a control system that allows manipulation of physical objects in ubiquitous environments by developing a
c o m m u n i c a t i o n protocol based on the standard USB 2.0

Keywords: communication protocol, control system, ubiquitous environment.

                                                     I. INTRODUCTION
          Since the last years, a computer revolution is changing the way of acting in society. It is going to the era in
which a user controlling a PC, to the era where the user uses the same time several electronics platforms to access the
information when you require it. This notion of Mark Weiser viewable in the year 1988 in his article “The Computer for
the 21st Century” in which he noted “the most profound technologies are those that disappear ... weave themselves
into everyday life until they become indistinguishable” [8]. This approach gave rise to what is now know as ubiquitous
computing.
          The notion of ubiquitous computing wager a to create intelligence environments where the technology are
invisible of user, does present only where are need and easily a most interaction natural and easy. This conception
proposes develop computer system that together with the use of mobile devices to communicate via wireless networks, same
as in recent years has increased in popularity [4].
          For achieve this invisibility, systems should be as free possible to the administration of human beings. In this way is
especially difficult develop systems where mobile devices involving dynamically connect and disconnect from a network, if
they require explicit configuration to work together and the management overhead outweighs any possible benefit.
          Service discovery has been a major achievement in the area of ubiquitous computing by allowing the user through
their mobile device to quickly find the services of an environment.
          Once the user finds such services initiates an interaction with these. This interaction is based on the handling of
service independently of the user location in the environment. Services will not necessarily be computer services, physical
services may also exist. (E.g. control to open and close windows, doors, on or off lighting, ventilation, etc).
          So, this way controlling a physical service involves knowing their status (e.g. on or off on a ventilator) and the
transition can be made from one state to another. Include manipulation of physical services in a ubiquitous environment
means developing a component that is responsible for managing the physical service and their status. In this way, include a
control system in a ubiquitous environment will be able to bring the system from an initial state to a final state in a
finite time [3].
          To include a control system to a ubiquitous system should be a protocol that allows this communication.
          Therefore, the development of this paper is to include control system architecture of a ubiquitous environment
and the protocol to achieve the manipulation of a physical service.

                                                       II. HEADINGS
        The distribution of this article is divided into 4 sections, section III describes the related work on service
discovery systems, section IV presents the proposed control system and communication protocol, and section V presents
conclusions and future work arising from this research.

                                                   III. RELATED WORK
          Currently, the technological headway allow develop systems be geared to paradigm of ubiquitous computing. The
building of ubiquitous environment provide of ways and means for that the users discover the services of an
environment. The discovery is the process in which a network entity (client) is reported spontaneously from the
availability of services or devices available on a network (resource), i.e., is a mechanism to dynamically refer to a network

                                                           www.ijmer.com                                              704 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com            Vol.3, Issue.2, March-April. 2013 pp-704-708      ISSN: 2249-6645

resource for the customer to contact the resource [4].
         A key part of a ubiquitous environment are the different areas, which are autonomous and independent, i.e.,
manage their own resources and services to exchange information with other areas [11]. Users who interact in these
areas are considered nomadic user, because they acquire specific functions of the current environmental context.
         Within a ubiquitous environment is required that the user can access and manipulate nomadic services offered
by each area using mobile devices in this context mobile users have a wide range of mobile devices which is considered as
heterogeneous devices [13].
         Thus, market-leading companies in information technology have developed technologies for service discovery,
as in the case of SSDP (Simple Service Discovery Protocol) [5] used by Microsoft, Intel, Sony and Samsung which
supports a simple form of search in which customers specify the resource. Jini Network Technology [7] developed by Sun
Microsystem’s is a network technology to create a service infrastructure to adapt to change. Also, Bluetooth Special
Interest Group (Bluetooth SDP) [15] is a protocol that defines the characteristics of services available for learning that are
given to a device. These technologies allow service discovery. Therefore, creating service discovery systems involves using
some components of these technologies.

B. SEDINU SYSTEM
         Similarly, parallel research centers working in the construction of service discovery systems, such is the case
SEDINU system (Service Discovery for Nomadic Users) [10]. A service discovery system where the user through their
mobile device acquires information of hardware and software services provided by the areas of environment.
         The feature that distinguishes this system is that it is intended to be a framework for building ubiquitous
environments.
This system consists of three sites; Site A, Site B and Site C. See Figure 1.
         The Site A, houses the module Application Tiny SEDINU responsible for showing the user the services
available from the current autonomous area through their mobile device, the Site B, which contains the module
Location Detector responsible for sending the current user coordinate system RBACSoft (Software - Role Based
Access Control), who determines the current autonomous area where the user is located. And finally, the Site
C consists of two modules, the module Service Manager and module Ad hoc Creator including system RBACSoft [10].
Thus, when the user accesses the environment, the system SEDINU provides user services through their mobile device.
Thus, the host service interacts directly with the system to acquire information RBACSoft a database containing information
on available services.




                                  Figure. 1: Architecture of distribution SEDINU system

         RBACSoft system has an important role within this system, besides providing information to the mobile device of
services available includes a database for each of the autonomous areas of a ubiquitous environment. Therefore, our
proposal is to add a control system and communication protocol to achieve this system for the manipulation of physical
services in a ubiquitous environment.

                                                     IV. PROPOSAL
         The development of our proposal consists of a new architecture in the development of ubiquitous environments
by modifying the structure of the database RBACSoft component of SEDINU system and includes a control system to
achieve the goal of manipulating a physical service.
                                                          www.ijmer.com                                            705 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com            Vol.3, Issue.2, March-April. 2013 pp-704-708      ISSN: 2249-6645

          This inclusion is to modify the structure of the database RBACSoft and add the following Add the entity
Sistema_Control with the attributes idF_idAreaN1, idF_idobjetos, idF_idsistcontrol. Thus, it will log
tuples a control system in the database corresponding to the autonomous area. Similarly, establishing the relationship
cardinality of the entity AreaN1 with the entity Sistema_Control making it possible to lace a control system with
each of the autonomous areas of a ubiquitous environment.
          Similarly, to modify the entity RecursosA_N1 adding the attribute idsistcontrol join with attribute
estado, ensure which these attributes: a control system can manipulate one or more physical elements in one
or more autonomous areas and that a physical element can only be controlled by a control system.
          Finally, add the entity Estados with attributes id_estado, nom_estado and idF_objetos. This
with to store information of the states that each object can to have.
          Thus adding control system architecture of an environment ubiquitous gives rise to a new structure of the database.
See Figure 2. With this structured is possible to include a control system environment ubiquitous.
It should bear in mind that the building of a control system together the interaction of various components. (e.g. sensors,
actuators, plants, etc). The interaction of these components will in order to bring the system form an initial state until a
finite state, in a finite time [3].




                                             Figure. 2: Structure o f database

          A adding a control system is necessary to establish the communication between the services host, and a system
control. We implement this communication with the standard USB 2.0 [2].
          The communication using standard USB 2.0 is a viable option for establish this communication. The
use of this standard is a accesible solution when you need to communicate to a computer with and external device (e.g.
mouse, keyboard, printer, digital camera, store devices as hard disk). The using of this interface also allows control
systems that handle specific functions (e.g. communication with a microcontroller).
          Other feature with has this standard is the speed of transmission of the information, being of 480 Mbps, a
considerable speed for manipulating a physical service in seconds. In addition to the USB 2.0 ports has automatic detection
and configuration plug and play, being this possible without installing additional software or restart the computer to
recognize USB [2].
          The standard USB 2.0 deliver of advantages of send and received information a through of endpoints, when a
device USB is connected at system, the system will recognize and configure it, the device is organized as a set of
endpoints. Then the system sets all communication routes through pipes necessary between the host and each endpoint
available in the configuration [6].
          The use of endpoints ensures that the data sent from the control system to the host guarantees data delivery to
the addressee and the package will be free of errors. Taking place that during the execution of protocolo rules the
resulting information will be consistency in both components.
          For to establish communication between the host services and control system there is a need to build a
communication protocolo between two components, being essential to know the time when the user indicates manipulate a
physical service and the time when has finished execution this action
          The need of establish protocols for communication is fundamental for communication between machines and
network devices, because the machines, though intelligent, are not human being that can run a task with a single
instruction to tell the machine . Therefore, the need to build fast rules and protocols with strict procedures for deal with
                                                         www.ijmer.com                                            706 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com             Vol.3, Issue.2, March-April. 2013 pp-704-708      ISSN: 2249-6645

any eventuality [12].
          Thus, a control system consequence of great importance in the design of a ubiquitous environment. The following
Figure 3 shows the inclusion of a control system in RBACSoft system. The Figure 3 describes the following process: User
from your device mobile first authenticates with the server of current autonomous area, then, the server depending
on the function and purpose of the nomadic user determines the task to be performed in the area. Subsequently, this
information is stored in the database, after establishing the connection to the database, and establishing connection with
the control system vía USB 2.0 standard and it is therefore possible to manipulate the physical element that
is controlled by control system.
          Once to include this component in the architecture of RBACsoft, the flow begin in the host services requesting the
registration database of physical object, once acquire this information, then, host sends the data to the control system asking
to change the object state.
          For protocol, the host acquires information of registration from database, once that acquire sends a notification a
control system for manipulate the element. The control system executes the action verifying its availability. Then, it
returns a notification to the host and it will request an updated record in the database. If not run the action is notified to
the host and does not update the record. Figure 4 presents the outline of this communication protocol.
          One o f t h e c o n s i d e r a t i o n s o f i m p l e m e n t a t i o n of this communication protocol is to hold
together the integrity of the database with current state of the object. This ensures that changes made to the database
do not cause loss of consistency [14]. And, therefore, hold together in the control system with the database.
          The design of this new architecture in the RBACsoft system consist to achieve the manipulation of physical service
in a environment ubiquitous will allow on the user to have full control of physical elements from environment.




                                            Figure. 4: Communication protocol.

                                         V. CONCLUSION AND FUTURE WORK
         We present the inclusion of a control system specifically RBACSoft system, since the information it provides is
information acquired by SEDINU to display information to the user through their mobile devices. In the develop of this
protocol lack the recognition of different physical devices in the control system, the test was implement with a physical
device and working successfully. Other of the way research is develop a access concurrent of various mobile devices
accessing on a same control system. Therefore, migrate our USB 2.0 protocol at USB 3.0, as a feature from USB 3.0 is
the increment the speed of the information a changing of the 480 Mbps at 4,8Gbps. Finally, to make standard our
protocol a fundamental component in the develop of ubiquitous environment of specifically manipulation of physical
services




                                                          www.ijmer.com                                             707 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com              Vol.3, Issue.2, March-April. 2013 pp-704-708      ISSN: 2249-6645




                                           Figure. 3: Control system in RBACsoft system

                                                                 REFERENCES
[1]    U SB Implementers Forum, I. C. o. U. t. (2003). Universal Serial Bus Revision 2.0 Specification [cited: february-16-2012]
       available in: http://www.usb.org/developers/docs/.
[2]    Axelson, J. (2005). Usb complete: Everything you need to develop custom usb peripherals. Madison, WI 53704: Editorial Lakeview
       Research LLC.
[3]    Ogata, K. (1998). Ingeniería de control moderna. Naucalpan de Juárez, Edo. De México: Editorial Prentice-Hall.
[4]    W, Keith Edwards. (April-June 2006), Discovery Systems in Ubiquitous Computing. PERVASIVE computing, pp. 70-77,
       Published by the IEEE CS and IEEE ComSoc.
[5]    M. Jeronimo and J. Weast, UPnP Design by Example: A Software DeveloperŠs Guide to Universal Plug and Play, Intel Press,
       May 2003. [6] OEM., S. T. (2003). Soporte Técnico OEM, Fujitsu España. Marzo                               de    2003     [cited:
       february-16-2012]      available     in: http://www.fujitsu.com/downloads/EU/es/soporte/discosduros/- UnpaseoporUSB-2.pdf
[7]    S. Oaks and H. Wong, Jini in a Nutshell: A Desktop Quick Reference, Reilly & Associates, Inc., Sebastopol, CA, USA, March
       2000.
[8]    Weiser, M. (January-March 2002), the Computer for the 21st Century. Scientific American, Sept., 1991, pp. 94-104, reprinted in
       IEEE Pervasive Computing, pp. 19-25.
[9]    Navarrete, M. (2010). Administración de fujos de trabajo organizados en áreas autónomas para entornos ubicuos. Master
       thesis, Depto. de Computación, Centro de Investigación y de Estudios Avanzados del Instituto Politécnico Nacional, Unidad
       Zacatenco, México. D.F.
[10]   Gómez. V., Decouchant. D., Mendoza. S. and Rodríguez, J. (2009). Nomadic user interaction/ cooperation within autonomous
       areas. In Pro- ceedings of the 15th Collabo- ration Researchers International Workshop on Groupware, 32-40.
[11]   Andrew, T. (1996). Sistemas operativos distribuidos. México: Editorial Prentice Hall.
[12]   Herrera, E. (2005). Tecnologías y redes de transmisión de datos. México: Editorial Limusa.
[13]   Kindberg, T. Barton, John. A Web-Based Nomadic Computing System.Copyright Hewlett-Packard Company 2000, 1- 14
[14]   Silberschatz, A. (2002). Fundamentos de bases de datos. España: Editorial McGraw-Hill Inc.
[15]                                                                                                                 ˇ
       C.Chang, P. K. Sahoo and S. Lee, S A Location-Aware Routing Protocol for the Bluetooth ScatternetT , Wireless Personal
                                                  ¸
       Communications, vol. 40, num. 1, pp. 117-135, January 2007.
       Note that the proceedings title is set in italic




                                                               www.ijmer.com                                                708 | Page

More Related Content

What's hot

IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingIDES Editor
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
 
Internet of Things (IoT), a Roadmap for Smart Environments
Internet of Things (IoT), a Roadmap for Smart EnvironmentsInternet of Things (IoT), a Roadmap for Smart Environments
Internet of Things (IoT), a Roadmap for Smart EnvironmentsKhachik Babaians
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...IJERD Editor
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Conclusion
ConclusionConclusion
Conclusionhanmya
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...IJECEIAES
 

What's hot (14)

IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
7 (1)
7 (1)7 (1)
7 (1)
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory Sensing
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
Internet of Things (IoT), a Roadmap for Smart Environments
Internet of Things (IoT), a Roadmap for Smart EnvironmentsInternet of Things (IoT), a Roadmap for Smart Environments
Internet of Things (IoT), a Roadmap for Smart Environments
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Conclusion
ConclusionConclusion
Conclusion
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 

Viewers also liked

Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three  Phase InverterDesign and Development of Gate Signal for 36 Volt 1000Hz Three  Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase InverterIJMER
 
Dr31564567
Dr31564567Dr31564567
Dr31564567IJMER
 
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix CompositesEvaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix CompositesIJMER
 
Significance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaSignificance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaIJMER
 
Mgmt404 entire class course project + all 7 weeks i labs devry university
Mgmt404 entire class course project + all 7 weeks i labs  devry universityMgmt404 entire class course project + all 7 weeks i labs  devry university
Mgmt404 entire class course project + all 7 weeks i labs devry universityliam111221
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
Df3211051114
Df3211051114Df3211051114
Df3211051114IJMER
 
Dj31514517
Dj31514517Dj31514517
Dj31514517IJMER
 
Ce31342345
Ce31342345Ce31342345
Ce31342345IJMER
 
Ijmer 46046266
Ijmer 46046266Ijmer 46046266
Ijmer 46046266IJMER
 
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...IJMER
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagationIJMER
 
Dx31599603
Dx31599603Dx31599603
Dx31599603IJMER
 
Udk cutscene & export tutorial
Udk cutscene & export tutorialUdk cutscene & export tutorial
Udk cutscene & export tutorialMugetsu Tensho
 
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...IJMER
 
Vibration control of newly designed Tool and Tool-Holder for internal treadi...
Vibration control of newly designed Tool and Tool-Holder for  internal treadi...Vibration control of newly designed Tool and Tool-Holder for  internal treadi...
Vibration control of newly designed Tool and Tool-Holder for internal treadi...IJMER
 
Flashcard baocaolan1
Flashcard baocaolan1Flashcard baocaolan1
Flashcard baocaolan1lienptk
 
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type Data
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type  Data MK-Prototypes: A Novel Algorithm for Clustering Mixed Type  Data
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type Data IJMER
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingIJMER
 

Viewers also liked (20)

Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three  Phase InverterDesign and Development of Gate Signal for 36 Volt 1000Hz Three  Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
 
Dr31564567
Dr31564567Dr31564567
Dr31564567
 
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix CompositesEvaluation of Tensile and Flexural Properties of Polymer Matrix Composites
Evaluation of Tensile and Flexural Properties of Polymer Matrix Composites
 
Significance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaSignificance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-Goa
 
Make my library
Make my libraryMake my library
Make my library
 
Mgmt404 entire class course project + all 7 weeks i labs devry university
Mgmt404 entire class course project + all 7 weeks i labs  devry universityMgmt404 entire class course project + all 7 weeks i labs  devry university
Mgmt404 entire class course project + all 7 weeks i labs devry university
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
Df3211051114
Df3211051114Df3211051114
Df3211051114
 
Dj31514517
Dj31514517Dj31514517
Dj31514517
 
Ce31342345
Ce31342345Ce31342345
Ce31342345
 
Ijmer 46046266
Ijmer 46046266Ijmer 46046266
Ijmer 46046266
 
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
 
Dx31599603
Dx31599603Dx31599603
Dx31599603
 
Udk cutscene & export tutorial
Udk cutscene & export tutorialUdk cutscene & export tutorial
Udk cutscene & export tutorial
 
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...Development of a Smart Mechatronic Tracking System to  Enhance Solar Cell Pan...
Development of a Smart Mechatronic Tracking System to Enhance Solar Cell Pan...
 
Vibration control of newly designed Tool and Tool-Holder for internal treadi...
Vibration control of newly designed Tool and Tool-Holder for  internal treadi...Vibration control of newly designed Tool and Tool-Holder for  internal treadi...
Vibration control of newly designed Tool and Tool-Holder for internal treadi...
 
Flashcard baocaolan1
Flashcard baocaolan1Flashcard baocaolan1
Flashcard baocaolan1
 
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type Data
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type  Data MK-Prototypes: A Novel Algorithm for Clustering Mixed Type  Data
MK-Prototypes: A Novel Algorithm for Clustering Mixed Type Data
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid Tooling
 

Similar to Control System for Manipulation of Services in Ubiquitous Environments

DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devicesijasuc
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsIJCSIS Research Publications
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devicesIJCNCJournal
 
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...redpel dot com
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернетаSergey Zhdanov
 
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...dannyijwest
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services  The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services ecij
 

Similar to Control System for Manipulation of Services in Ubiquitous Environments (20)

DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of Things
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
50120140502006
5012014050200650120140502006
50120140502006
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devices
 
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Фреймворк промышленного интернета
Фреймворк промышленного интернетаФреймворк промышленного интернета
Фреймворк промышленного интернета
 
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...
Adaptation of Web Services to the Context Based on Workflow: Approach for Sel...
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
chapter 3.pdf
chapter 3.pdfchapter 3.pdf
chapter 3.pdf
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docx
 
The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services  The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Control System for Manipulation of Services in Ubiquitous Environments

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-704-708 ISSN: 2249-6645 Control System for Manipulation of Services in Ubiquitous Environment Mario I. García Antonio, 1 José A. Cruz Tolentino, 2 Victor Gómez, 3 Alejandro Jarillo-Silva, 4 Luis A. González Rojas, 5 Amando Alejandro Ruíz Figueroa6 123456 Universidad de la Sierra Sur, St. Guillermo Rojas Mijangos S/N, Oaxaca, México. Department of Information Technology, Sierra Sur University, Oaxaca, México Abstract: The ubiquitous computing are to guide a the creation of intelligent space, where of users already not interaction with a only the computation system but on with different computer system at a time and not necessarily a user is aware of this interaction. Recent research describes computer systems where the user accesses the services of a ubiquitous environment through mobile devices. The problem with these systems is the lack of full control over physical objects (e.g. doors, windows, heating systems, etc). In this paper, we propose the incorporation of a control system that allows manipulation of physical objects in ubiquitous environments by developing a c o m m u n i c a t i o n protocol based on the standard USB 2.0 Keywords: communication protocol, control system, ubiquitous environment. I. INTRODUCTION Since the last years, a computer revolution is changing the way of acting in society. It is going to the era in which a user controlling a PC, to the era where the user uses the same time several electronics platforms to access the information when you require it. This notion of Mark Weiser viewable in the year 1988 in his article “The Computer for the 21st Century” in which he noted “the most profound technologies are those that disappear ... weave themselves into everyday life until they become indistinguishable” [8]. This approach gave rise to what is now know as ubiquitous computing. The notion of ubiquitous computing wager a to create intelligence environments where the technology are invisible of user, does present only where are need and easily a most interaction natural and easy. This conception proposes develop computer system that together with the use of mobile devices to communicate via wireless networks, same as in recent years has increased in popularity [4]. For achieve this invisibility, systems should be as free possible to the administration of human beings. In this way is especially difficult develop systems where mobile devices involving dynamically connect and disconnect from a network, if they require explicit configuration to work together and the management overhead outweighs any possible benefit. Service discovery has been a major achievement in the area of ubiquitous computing by allowing the user through their mobile device to quickly find the services of an environment. Once the user finds such services initiates an interaction with these. This interaction is based on the handling of service independently of the user location in the environment. Services will not necessarily be computer services, physical services may also exist. (E.g. control to open and close windows, doors, on or off lighting, ventilation, etc). So, this way controlling a physical service involves knowing their status (e.g. on or off on a ventilator) and the transition can be made from one state to another. Include manipulation of physical services in a ubiquitous environment means developing a component that is responsible for managing the physical service and their status. In this way, include a control system in a ubiquitous environment will be able to bring the system from an initial state to a final state in a finite time [3]. To include a control system to a ubiquitous system should be a protocol that allows this communication. Therefore, the development of this paper is to include control system architecture of a ubiquitous environment and the protocol to achieve the manipulation of a physical service. II. HEADINGS The distribution of this article is divided into 4 sections, section III describes the related work on service discovery systems, section IV presents the proposed control system and communication protocol, and section V presents conclusions and future work arising from this research. III. RELATED WORK Currently, the technological headway allow develop systems be geared to paradigm of ubiquitous computing. The building of ubiquitous environment provide of ways and means for that the users discover the services of an environment. The discovery is the process in which a network entity (client) is reported spontaneously from the availability of services or devices available on a network (resource), i.e., is a mechanism to dynamically refer to a network www.ijmer.com 704 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-704-708 ISSN: 2249-6645 resource for the customer to contact the resource [4]. A key part of a ubiquitous environment are the different areas, which are autonomous and independent, i.e., manage their own resources and services to exchange information with other areas [11]. Users who interact in these areas are considered nomadic user, because they acquire specific functions of the current environmental context. Within a ubiquitous environment is required that the user can access and manipulate nomadic services offered by each area using mobile devices in this context mobile users have a wide range of mobile devices which is considered as heterogeneous devices [13]. Thus, market-leading companies in information technology have developed technologies for service discovery, as in the case of SSDP (Simple Service Discovery Protocol) [5] used by Microsoft, Intel, Sony and Samsung which supports a simple form of search in which customers specify the resource. Jini Network Technology [7] developed by Sun Microsystem’s is a network technology to create a service infrastructure to adapt to change. Also, Bluetooth Special Interest Group (Bluetooth SDP) [15] is a protocol that defines the characteristics of services available for learning that are given to a device. These technologies allow service discovery. Therefore, creating service discovery systems involves using some components of these technologies. B. SEDINU SYSTEM Similarly, parallel research centers working in the construction of service discovery systems, such is the case SEDINU system (Service Discovery for Nomadic Users) [10]. A service discovery system where the user through their mobile device acquires information of hardware and software services provided by the areas of environment. The feature that distinguishes this system is that it is intended to be a framework for building ubiquitous environments. This system consists of three sites; Site A, Site B and Site C. See Figure 1. The Site A, houses the module Application Tiny SEDINU responsible for showing the user the services available from the current autonomous area through their mobile device, the Site B, which contains the module Location Detector responsible for sending the current user coordinate system RBACSoft (Software - Role Based Access Control), who determines the current autonomous area where the user is located. And finally, the Site C consists of two modules, the module Service Manager and module Ad hoc Creator including system RBACSoft [10]. Thus, when the user accesses the environment, the system SEDINU provides user services through their mobile device. Thus, the host service interacts directly with the system to acquire information RBACSoft a database containing information on available services. Figure. 1: Architecture of distribution SEDINU system RBACSoft system has an important role within this system, besides providing information to the mobile device of services available includes a database for each of the autonomous areas of a ubiquitous environment. Therefore, our proposal is to add a control system and communication protocol to achieve this system for the manipulation of physical services in a ubiquitous environment. IV. PROPOSAL The development of our proposal consists of a new architecture in the development of ubiquitous environments by modifying the structure of the database RBACSoft component of SEDINU system and includes a control system to achieve the goal of manipulating a physical service. www.ijmer.com 705 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-704-708 ISSN: 2249-6645 This inclusion is to modify the structure of the database RBACSoft and add the following Add the entity Sistema_Control with the attributes idF_idAreaN1, idF_idobjetos, idF_idsistcontrol. Thus, it will log tuples a control system in the database corresponding to the autonomous area. Similarly, establishing the relationship cardinality of the entity AreaN1 with the entity Sistema_Control making it possible to lace a control system with each of the autonomous areas of a ubiquitous environment. Similarly, to modify the entity RecursosA_N1 adding the attribute idsistcontrol join with attribute estado, ensure which these attributes: a control system can manipulate one or more physical elements in one or more autonomous areas and that a physical element can only be controlled by a control system. Finally, add the entity Estados with attributes id_estado, nom_estado and idF_objetos. This with to store information of the states that each object can to have. Thus adding control system architecture of an environment ubiquitous gives rise to a new structure of the database. See Figure 2. With this structured is possible to include a control system environment ubiquitous. It should bear in mind that the building of a control system together the interaction of various components. (e.g. sensors, actuators, plants, etc). The interaction of these components will in order to bring the system form an initial state until a finite state, in a finite time [3]. Figure. 2: Structure o f database A adding a control system is necessary to establish the communication between the services host, and a system control. We implement this communication with the standard USB 2.0 [2]. The communication using standard USB 2.0 is a viable option for establish this communication. The use of this standard is a accesible solution when you need to communicate to a computer with and external device (e.g. mouse, keyboard, printer, digital camera, store devices as hard disk). The using of this interface also allows control systems that handle specific functions (e.g. communication with a microcontroller). Other feature with has this standard is the speed of transmission of the information, being of 480 Mbps, a considerable speed for manipulating a physical service in seconds. In addition to the USB 2.0 ports has automatic detection and configuration plug and play, being this possible without installing additional software or restart the computer to recognize USB [2]. The standard USB 2.0 deliver of advantages of send and received information a through of endpoints, when a device USB is connected at system, the system will recognize and configure it, the device is organized as a set of endpoints. Then the system sets all communication routes through pipes necessary between the host and each endpoint available in the configuration [6]. The use of endpoints ensures that the data sent from the control system to the host guarantees data delivery to the addressee and the package will be free of errors. Taking place that during the execution of protocolo rules the resulting information will be consistency in both components. For to establish communication between the host services and control system there is a need to build a communication protocolo between two components, being essential to know the time when the user indicates manipulate a physical service and the time when has finished execution this action The need of establish protocols for communication is fundamental for communication between machines and network devices, because the machines, though intelligent, are not human being that can run a task with a single instruction to tell the machine . Therefore, the need to build fast rules and protocols with strict procedures for deal with www.ijmer.com 706 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-704-708 ISSN: 2249-6645 any eventuality [12]. Thus, a control system consequence of great importance in the design of a ubiquitous environment. The following Figure 3 shows the inclusion of a control system in RBACSoft system. The Figure 3 describes the following process: User from your device mobile first authenticates with the server of current autonomous area, then, the server depending on the function and purpose of the nomadic user determines the task to be performed in the area. Subsequently, this information is stored in the database, after establishing the connection to the database, and establishing connection with the control system vía USB 2.0 standard and it is therefore possible to manipulate the physical element that is controlled by control system. Once to include this component in the architecture of RBACsoft, the flow begin in the host services requesting the registration database of physical object, once acquire this information, then, host sends the data to the control system asking to change the object state. For protocol, the host acquires information of registration from database, once that acquire sends a notification a control system for manipulate the element. The control system executes the action verifying its availability. Then, it returns a notification to the host and it will request an updated record in the database. If not run the action is notified to the host and does not update the record. Figure 4 presents the outline of this communication protocol. One o f t h e c o n s i d e r a t i o n s o f i m p l e m e n t a t i o n of this communication protocol is to hold together the integrity of the database with current state of the object. This ensures that changes made to the database do not cause loss of consistency [14]. And, therefore, hold together in the control system with the database. The design of this new architecture in the RBACsoft system consist to achieve the manipulation of physical service in a environment ubiquitous will allow on the user to have full control of physical elements from environment. Figure. 4: Communication protocol. V. CONCLUSION AND FUTURE WORK We present the inclusion of a control system specifically RBACSoft system, since the information it provides is information acquired by SEDINU to display information to the user through their mobile devices. In the develop of this protocol lack the recognition of different physical devices in the control system, the test was implement with a physical device and working successfully. Other of the way research is develop a access concurrent of various mobile devices accessing on a same control system. Therefore, migrate our USB 2.0 protocol at USB 3.0, as a feature from USB 3.0 is the increment the speed of the information a changing of the 480 Mbps at 4,8Gbps. Finally, to make standard our protocol a fundamental component in the develop of ubiquitous environment of specifically manipulation of physical services www.ijmer.com 707 | Page
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-704-708 ISSN: 2249-6645 Figure. 3: Control system in RBACsoft system REFERENCES [1] U SB Implementers Forum, I. C. o. U. t. (2003). Universal Serial Bus Revision 2.0 Specification [cited: february-16-2012] available in: http://www.usb.org/developers/docs/. [2] Axelson, J. (2005). Usb complete: Everything you need to develop custom usb peripherals. Madison, WI 53704: Editorial Lakeview Research LLC. [3] Ogata, K. (1998). Ingeniería de control moderna. Naucalpan de Juárez, Edo. De México: Editorial Prentice-Hall. [4] W, Keith Edwards. (April-June 2006), Discovery Systems in Ubiquitous Computing. PERVASIVE computing, pp. 70-77, Published by the IEEE CS and IEEE ComSoc. [5] M. Jeronimo and J. Weast, UPnP Design by Example: A Software DeveloperŠs Guide to Universal Plug and Play, Intel Press, May 2003. [6] OEM., S. T. (2003). Soporte Técnico OEM, Fujitsu España. Marzo de 2003 [cited: february-16-2012] available in: http://www.fujitsu.com/downloads/EU/es/soporte/discosduros/- UnpaseoporUSB-2.pdf [7] S. Oaks and H. Wong, Jini in a Nutshell: A Desktop Quick Reference, Reilly & Associates, Inc., Sebastopol, CA, USA, March 2000. [8] Weiser, M. (January-March 2002), the Computer for the 21st Century. Scientific American, Sept., 1991, pp. 94-104, reprinted in IEEE Pervasive Computing, pp. 19-25. [9] Navarrete, M. (2010). Administración de fujos de trabajo organizados en áreas autónomas para entornos ubicuos. Master thesis, Depto. de Computación, Centro de Investigación y de Estudios Avanzados del Instituto Politécnico Nacional, Unidad Zacatenco, México. D.F. [10] Gómez. V., Decouchant. D., Mendoza. S. and Rodríguez, J. (2009). Nomadic user interaction/ cooperation within autonomous areas. In Pro- ceedings of the 15th Collabo- ration Researchers International Workshop on Groupware, 32-40. [11] Andrew, T. (1996). Sistemas operativos distribuidos. México: Editorial Prentice Hall. [12] Herrera, E. (2005). Tecnologías y redes de transmisión de datos. México: Editorial Limusa. [13] Kindberg, T. Barton, John. A Web-Based Nomadic Computing System.Copyright Hewlett-Packard Company 2000, 1- 14 [14] Silberschatz, A. (2002). Fundamentos de bases de datos. España: Editorial McGraw-Hill Inc. [15] ˇ C.Chang, P. K. Sahoo and S. Lee, S A Location-Aware Routing Protocol for the Bluetooth ScatternetT , Wireless Personal ¸ Communications, vol. 40, num. 1, pp. 117-135, January 2007. Note that the proceedings title is set in italic www.ijmer.com 708 | Page