SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

TECHNOLOGY (IJCET)

IJCET

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 2, February (2014), pp. 46-55
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 4.4012 (Calculated by GISI)
www.jifactor.com

©IAEME

SYSTEMATIC REVIEW OF UBIQUITOUS COMPUTING SYSTEM MODELS
SmritiMahajan1,
1,2,3

Anil Kumar Mishra2

and

Latika Singh3

Dept of Computer Science and Engineering, ITM University Gurgaon, India

ABSTRACT
Ubiquitous computing forces computers to live in the world of humans. We can that
ubiquitous computing is roughly the opposite of virtual reality. With advancement in technology we
will soon see large number of ubiquitous devices. The services delivered by ubiquitous computing
environment will require evolution of context-awareness, wireless network and mobility. Almost all
applications of ubiquitous computing require a middleware for its implementation and a mechanism
for discovery of available services. In this paper we will study about SenSay, the context-aware
application of ubiquitous computing; the middleware architecture HOMEROS which allows high
flexibility in the environment of heterogeneous devices and users; dynamic discovery and invocation
mechanism for discovery of available services; Mobile Gaia a middleware for ad-hoc pervasive
computing.
Keywords: Dynamic discovery and invocation, HOMEROS, Mobile Gaia, Pervasive computing,
SenSay, Ubiquitous computing.
1. INTRODUCTION
The term Ubiquitous Computing was coined by Mark Weiser in 1991. His vision was to
create environment saturated with computing and communicating capability, and integrated with
human users [1]. This vision was too far ahead of its time and the hardware technology that was
needed to achieve this did not exist. Ubiquitous computing is an advanced computing concept where
computing is made to appear everywhere and anywhere [2]. In terms of technology, the term
ubiquitous implies that technology is everywhere and we use it all the time. These technologies have
been integrated in our lives so well that we tend to use them without thinking about the tool.
Ubiquitous computing is also known as Pervasive Computing [3]. Both these terms can be used for
the technology that has become almost invisible to us as it is now an integrated part of our life. It is
an emerging field that includes technology that bridge the physical and digital world; systems and
46
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

applications that incorporate such technologies; infrastructure that support these technologies. It is
the prospect of connecting all the things in the world to internet in order to provide information on
anything, anytime and anywhere. It relies on the convergence of wireless technology, advancement
in electronics and the internet. Continuous advancement in technology will soon lead to abundance
of very small and very cheap microprocessors which are equipped with sensors and have wireless
communication capabilities. Processing of information will then become ubiquitous and permeate
almost every type of object. In ubiquitous computing environment, the design of systems and
applications needs to take care of different devices, mobile users and continuously changing contexts
of both the users and the system. The agents can acquire contextual information easily using
middleware, reason about it using different logics and then adapt themselves to changing contexts. In
this paper we will study about:
•
•
•

A context-aware mobile phone SenSay.
Two middleware architectures-HOMEROS and Mobile Gaia.
Dynamic discovery and invocation mechanism.

The rest of the paper has following structure: section 2 presents an application of Ubiquitous
computing-SenSay; section 3 describes HOMEROS-the middleware used for mobile heterogeneous
systems; section 4 elaborates the mechanism for dynamic discovery and invocation of service
components and section 5describes Mobile Gaia-a middleware for Ad-hoc pervasive computing.
2. SENSAY: A CONTEXT-AWARE MOBILE PHONE
SenSay(sensing & saying) is a context aware mobile phone that adapts to the dynamically
changing environment[4]. It modifies its behavior based on its user’s state and surroundings. It gives
the ability to communicate the urgency of their calls to the remote callers, suggests user to make calls
when they are idle and gives the feedback on the current status of the SenSay user to the caller.
SenSay introduces 4 states: uninterruptible, idle, active and the default state the normal state
(fig 1). The architecture consists of 5 functional modules: Sensor box, sensor module, decision
module (core), action module and phone module.
2.1 Sensor Box
It consists of a printed circuit board (PCB) which consists of two subsystems: the sensors and
the microcontroller. The microcontroller provides eight 10-bit analog-to-digital conversion channels
as the interface to the sensors and a port for serial communication to interface with the sensor
module.
The various sensors integrated in the sensor box are the voice and the ambient microphones
which can be mounted on various parts of the body; three accelerometers to capture three(x, y, z)
degrees of motion which are mounted directly on the PCB; and the light sensor mounted on the
phone. Each sensor in the sensor box has a unique ID.
The sensor box polls its sensors periodically as quick as it can and stores the most current
value in an array.
2.2 Sensor Module
The sensor module queries the sensor box (once per second) and returns the data to the
decision module. Standard RS232 serial connection issued to establish the connection between the
microcontroller and the sensor module.
At any time, the sensor module will query the sensor box for a particular sensor data using
the unique ID of that sensor. When a query is processed, the microprocessor will respond with the
47
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

most recent reading of the sensor by doing a table lookup rather than actually polling the sensor. This
allows the microcontroller to respond immediately.
2.3 Decision Module
The decision logic provides the logic used in state management. The sensor module transfers
the sensor data to the decision module. It queries the sensor data and the electronic calendar of the
user to determine the state of the user and issues phone actions.
Sensor value history (of up to 10 minutes) is stored to help determine the user’s state so that
the transitions can be done smoothly.
2.4 Action Module
This module is controlled by the decision module and is responsible for issuing changes in
setting and operation on the phone. The basic operations supported by the module are:
1. Ringer control: off/low/medium/high
2. Vibrate control: on/off
3. Send an SMS to the caller
4. Make call suggestions
5. Provide access to the electronic calendar.
2.5 Problem
With distributed systems and mobile computing, privacy is a major concern and it becomes
complicated by pervasive computing [5]. With context aware devices, the information about user’s
movements, behavior patterns and habits becomes more knowledgeable with mechanisms like
location tracking, smart spaces and use of surrogates. The knowledge of this information is necessary
for successful proactivity and self-tuning but, the use of this information should be strictly
controlled. If not, it can be put to a variety of unsavory uses ranging from targeted spam to
blackmail. This may prevent knowledgeable users from using a pervasive computing system.
To be reliable on infrastructure, the user must trust the infrastructure to a considerable extend.
Also the infrastructure should be confident of the user’s identity and authorization level before
responding to the request.
3. HOMEROS
To support the computational needs of mobile users we need to maximize the use of available
resources and minimize user distraction which is caused by dynamic and frequent changes in the
resources. The middleware architecture HOMEROS satisfies these needs [6]. It allows high
flexibility in the environment of heterogeneous devices and users. It consists of three layers- the core
component management layer, the extended component service layer, and the system support layer.
This architecture was designed to provide maximum flexibility in supporting service providers and
user requirements.

48
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

Figure 1: SenSay architecture depicting 5 modules
3.1 Core Component Management
This module consists of core ORB components and interrelated set of basic services which
allows collaboration of service component development vendors. It allows dynamic loading,
unloading, transferring, creating, and destroying the components in the upper layers.
HOMEROS offers seven basic services: Event Manager, Component Repository, QoSAdaptation, Configuration Manager, Resource Manager, and Security manager. All of the services
could be built on top of existing middleware services to support HOMEROS service architecture.
3.2 Event Manager
The event manager distributes events and implements a decoupled communication model
based on suppliers and consumers for enhanced reliability and stability. It has a single entry point
and one or more event factories. Applications can define and register their own factories for state
changes. If a supplier fails, the service can automatically replace all the corresponding information
entries from the factory and scheduling queue without disrupting the system. The current event
manager implementation uses CORBA’s event service.
3.3 Component Repository
The component repository stores information (name, type, services, and so on) about all the
components available in the middleware and allows applications and component manager browse
and retrieve entities on the basis of specific attributes. The current component repository uses
standard SQL for query component entities.

49
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

3.4 Context Manager
Mobile agent collects overall user information and hardware, software information for
resource management, and the context manager provides proactive services using that information. It
prepares personal data, user preferences, device characteristics, and organized data automatically
available to other components.
3.5QoS Adaptation
This module supports resource manager and configuration manager. It collects various
devices monitoring information from resource manager, and then provides QoS information to the
configuration manager.
3.6 Configuration Manager
The configuration manager configures the new components and improves the component
performance by optimizing system resource usages. It supports mobile agent for collecting
environment information and running specific processes.
3.7 Resource Manager
Resource manager allows dynamic reallocation of resources based on resource awareness.
The middleware platform allows the system to be aware of the available configuration resources. It
performs both self-inspection and self-adaption.
3.8Security Manager
HOMEROS proposes platform registration and authentication, and stability evaluation of
authentication. Registration can be done without user’s intervention, and platform authentication is to
certify that relevant platform is reliable. Registered agents take part in the authentication process for
other unregistered agents and platform.
4. DYNAMIC DISCOVERY AND INVOCATION MECHANISM
Ubiquitous computing environment involves a variety of devices of different capabilities. The
middleware takes a crucial role for efficiently coordinating the components and providing proper
services. In the previous section we have read about a middleware architecture called HOMEROS.

Figure 2: The HOMEROS Architecture
50
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

All the service providing components in an environment registers them with the system,
providing information about the services they provide [7]. Service proxy agent represents the service
of the components in the world of agents. All the services that provide the same functionality are
wrapped by a service proxy. The service proxy is also registered with the system. Fig3 illustrates the
mechanism for dynamic discovery and invocation of services.
All the providers of a specific service and the proxy of that service register to the system
(step A and step B). The smart room agent (SRA) which acts as a gateway for all the services
receives the service invocation request from the client (step 1). The SRA then searches the registry
for a proxy for such a service (step 2) and forwards the request to it (step 3). The service proxy on
receiving a request checks the registry for available service providers (step 4). The proxy then
activates a selection algorithm to decide to which provider to forward the request (step 5).

Figure 3: Dynamic discovery and invocation mechanism

5. MOBILE GAIA
Mobile Gaia [8] [9] [10] is the middleware for ad-hoc pervasive computing. It is a service
based middleware that integrates resources of various devices. Ad-hoc pervasive computing is a
cluster of personal devices that can communicate and share resources among each other. The user
51
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

can program the cluster through a common interface. This cluster is also referred as a personal active
space. Mobile Gaia contains services which help in discovery of devices that form the personal
space, maintaining the composition of the cluster, sharing resources among devices in the cluster and
facilitate communication. It provides an application framework for development of applications for
the device collection. This decomposes the application into smaller components that can run on
different devices in this collection. The services are present in two roles-coordinator and client.
The core services make up the kernel of Mobile Gaia and enable the devices in the cluster to
share resources and data seamlessly. The component management core provides necessary low level
support for creating and managing components.
5.1 Service Deployment Framework
Services in Mobile Gaia are implemented as components and this framework forms a
container for these service components. It installs new service components, load and unload
components and remove components when they are no longer needed. It is based on the “What You
Need Is What You Get” (WYNIWYG) model. When a service is deployed, it specifies the
components that are to be loaded in the coordinator and client roles. Whenever a device changes
roles from coordinator to client or vice versa, the cluster management service notifies the service
deployment framework of this change.
5.2 Discovery and Cluster Management Service
Mobile Gaia has the ability to dynamically discover nearby personal devices and bootstrap a
personal active space on the discovered devices. Discovery protocols like Bluetooth or IrDA are
used. When new personal devices are within range, they are added to the personal active space on the
fly.
Depending on the capabilities of the new device, the framework loads appropriate
components and runs additional services that allow the system to utilize the device’s capabilities.
Once a device is out of range, it is automatically removed from the personal active space. It also
maintains a database of active devices and services in the personal active space and a list of
components running locally on the device.
5.3 Event Service
The event service is used to send events among devices in the cluster. These events include
updates to location information; heartbeat messages events, it informing that the device is part of the
cluster and location-based events. Events are implemented using event channels. When an
application wants to send creates an event channel in the host device. The event service of the host
device registers the event channel with the coordinator. The event service in the coordinator
maintains a list of event channels in the cluster. When an application wants to subscribe to an event
channel, it queries the local event service which in turn queries the event service of the coordinator
for event channels. The event service of the coordinator acts like a repository that contains
information about various event channels in the cluster.
5.4 Location Service
The location service enables location awareness in the device cluster. Different devices in the
cluster have different location-sensing technologies such as GPS, WiFi, RFID, Ubisense etc. It fuses
location information from different devices and arrives at a probabilistic estimate of the location
information. This location information is conveyed to all devices in the cluster. This cooperative
approach to sharing location information enables devices to be location-aware in heterogeneous
location-sensing environments. It supports a spatial database that contains a spatial model of the
52
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

physical world. Spatial information is required for route planning, finding points-of interest and for
location-based triggers.
5.5 Security Service
Security which is essential in personal active spaces can be divided into two main parts –
authentication and access control. Authentication is needed to ensure that only authorized devices are
allowed to connect to a user’s personal active space, and a device can only connect to personal
spaces approved by its owner. Access control identifies what information or resources a device can
share with a specific space name. Authentication is done using public key. For access control, users
are allowed to create simple security policies on the personal device, which specify what services
may run on the device when connected to a certain space.
6. DISCUSSION
In this paper we have discussed about an application of ubiquitous computing, middleware
architecture and the mechanism for dynamic discovery and invocation. The application SenSay
combines sensory data, user information and history information to create a context-aware phone.
The smart features provided by the phone aim to improve the overall usability of the phone. It either
notifies the user of an incoming call by adjusting ringer and vibration settings or eliminates
unwanted interruptions. The middleware HOMEROS provides high flexibility by adopting a hybrid
network model and dynamically configurable reflective ORB. All major ubiquitous computing
projects have established sophisticated middleware architectures. These architectures however face
challenges of integrating large number of perceptual components. These challenges require
establishment of intelligent methods for discovering, invoking and managing distributed
components. Dynamic Discovery and invocation mechanism registers all the service proxies and
their related services available in a smart space. It then provides services to the clients on request.
The middleware Mobile Gaia is a service based middleware which provides dynamic discovery of
near by devices. The services in this architecture are decomposed in two roles- coordinator and
client.
It also supports an application framework that can decompose an application into
components. A device can act either as a coordinator or as a client. Table 1 summarizes the various
system models studied in the paper.
7. CONCLUSION AND FUTURE SCOPE
Ubiquitous computing is an emerging field. Two decades ago, when the term was
coined, Mark Weiser’s vision of ubiquitous environments was too far ahead of its time. The
hardware technology that was needed to achieve this did not exist. But with continuous advancement
in the field of wireless technology, microelectronics and World Wide Web, creating ubiquitous
environments became possible. We can presently see some efforts involved in the construction of
ubiquitous applications in domain areas such as ambient intelligence, pervasive healthcare,
ubiquitous learning and urban spaces. The future projects in this field are smart homes [11] and
ubiquitous city [12].

53
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

Table 1: SUMMARY TABLE
Functionality
SenSay

HOMEROS

Discovery and
Invocation
Mechanism

Mobile Gaia

Components

It is a context-aware
mobile phone that
adapts dynamically to
the user’s environment
and
modifies
its
behavior.
It is a middleware
which is designed to
maximize the use of
available resources and
minimize
user
distraction caused by
dynamic and frequent
changes
in
the
resources for mobile
users.
It is used to discover
the devices in a smart
space and register them
with the system which
provides information
about their services.
It is the middleware for
ad-hoc
pervasive
computing
that
integrates the resources
of various devices.

Security

Sensor Box, Sensor
Module, Decision
Module,
Action
Module and Phone
Module.

If not controlled,
information about
user’s movements
and behavior can
be put to a variety
of unsavory uses.
Three LayersIt provides security
Core Component through platform
Layer,
Extended registration
and
Component Service authentication.
Layer,
System
Support Layer.

Service providing
components,
Service
proxy
agents
and
Knowledge
base
server.
Service
Development
Framework,
Discovery
and
Cluster
Management,
Event,
Location,
Context
and
Security Service.

--

Future Scope
Mechanisms that
provide complete
security to users’
information
should be
deployed.
The
proposed
architecture needs
to be compared
with
other
middleware
architectures
proposed
for
PDAs and mobile
devices.

--

Security
is Future work will
provided
by be
address
authentication and challenges posed
access control.
by mobility of
nodes
at
application/servic
e layer.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]

Weiser, M. (1991).The computer for the 21st Century.In Scientific American, vol. 265, no. 3,
1991, pp. 66-75.
Mattern, F. ,”The Vision and Technical Foundations of Ubiquitous Computing”, UPGRADE
Vol II, No 5, 2001.
Ferscha, A. , “What is Pervasive Computing?”.
Siewiorek, D.;Smailagic, A. ; Furukawa, J. ; Moraveji, N. ; Reiger, K. , “SenSay: A contextaware mobile phone”,Seventh IEEE International Symposium on (2003), pp. 248-249,.
Satyanarayanan, M.,”Pervasive computing: vision and challenges”, IEEE Personal
Communications, 2001.
Han, W. ; Bong, Y. ; Yoon ; Youn, H. ; Cho, W ,”A new middleware architecture for
ubiquitous computing environment”, Proceedings of the Second IEEE Workshop on Software
Technologies for Future Embedded and Ubiquitous Systems, 2004 IEEE.

54
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME

[7]

[8]
[9]

[10]
[11]

[12]
[13]

[14]

Pandis, I. ; Soldatos, J. ; Paar, A. ; Reuter, J. ; Carras, M. ; Polymenakos, L.; ”An Ontologybased framework for dynamic resource management in ubiquitous computing environment”,
Proceddings of the second International Conference on Embedded Software and Systems,
2005 IEEE.
Chetan, S. ;Muhtadi, J. ; Campbell, R., “Mobile gaia: A middleware for ad-hoc pervasive
computing”, 2004 IEEE.
Roman, M.; Hess, C.; Cerqueira, R.; Campbell, R.; Narhstedt, K., "Gaia: A middleware
infrastructure to enable active spaces" IEEE Pervasive Computing Magazine, vol. 1,
pp. 74-83, 2002.
Chetan, S.;Muhtadi, J. ; Campbell, R.,”A middleware for enabling personal ubiquitous
spaces”.
Alam, M.;Reaz, M. ; Ali, M.,“A review of smart homes- past, present and future” IEEE
Transactions on System, Man and Cybernetics-Part C: Applications and Reviews, Vol 42,
No. 6, November 2012.
Shin, D.,”A realization of pervasive computing: ubiquitous City”2010 IEEE.
S.Mohan Raj, “Feasibility Study of Pervasive Computing Approach for Energy Management
in Mobiles”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 3, 2012, pp. 312 - 319, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Aakash Shah, Gautami Nadkarni, Namita Rane and Divya Vijan, “Ubiqutous Computing
Enabled in Daily Life”, International Journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 5, 2013, pp. 217 - 223, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

55

More Related Content

What's hot

IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Smart phone as a cloud server machine computing framework
Smart phone as a cloud server machine computing frameworkSmart phone as a cloud server machine computing framework
Smart phone as a cloud server machine computing frameworkeSAT Journals
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemKaushik Gupta
 
IRJET- A Remotely Controlled Home Automation System for Energy Saving
IRJET-  	  A Remotely Controlled Home Automation System for Energy SavingIRJET-  	  A Remotely Controlled Home Automation System for Energy Saving
IRJET- A Remotely Controlled Home Automation System for Energy SavingIRJET Journal
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
An enhanced method for human life rescue system
An enhanced method for human life rescue systemAn enhanced method for human life rescue system
An enhanced method for human life rescue systemeSAT Journals
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationIRJET Journal
 
Smart Sensor Network for Society Automation-A Review
Smart Sensor Network for Society Automation-A ReviewSmart Sensor Network for Society Automation-A Review
Smart Sensor Network for Society Automation-A ReviewIRJET Journal
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
 
Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)paperpublications3
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 

What's hot (19)

Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Smart phone as a cloud server machine computing framework
Smart phone as a cloud server machine computing frameworkSmart phone as a cloud server machine computing framework
Smart phone as a cloud server machine computing framework
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
[IJET-V1I3P8] Authors :Mrs. Latha A.P.,Pratik Agarwal, Rishabh Rajgarhia,Shas...
[IJET-V1I3P8] Authors :Mrs. Latha A.P.,Pratik Agarwal, Rishabh Rajgarhia,Shas...[IJET-V1I3P8] Authors :Mrs. Latha A.P.,Pratik Agarwal, Rishabh Rajgarhia,Shas...
[IJET-V1I3P8] Authors :Mrs. Latha A.P.,Pratik Agarwal, Rishabh Rajgarhia,Shas...
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision System
 
IRJET- A Remotely Controlled Home Automation System for Energy Saving
IRJET-  	  A Remotely Controlled Home Automation System for Energy SavingIRJET-  	  A Remotely Controlled Home Automation System for Energy Saving
IRJET- A Remotely Controlled Home Automation System for Energy Saving
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
An enhanced method for human life rescue system
An enhanced method for human life rescue systemAn enhanced method for human life rescue system
An enhanced method for human life rescue system
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compiler
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home Automation
 
Smart Sensor Network for Society Automation-A Review
Smart Sensor Network for Society Automation-A ReviewSmart Sensor Network for Society Automation-A Review
Smart Sensor Network for Society Automation-A Review
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
 
Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 

Viewers also liked

Viewers also liked (20)

50120140502005
5012014050200550120140502005
50120140502005
 
40220140501005
4022014050100540220140501005
40220140501005
 
30120140503002
3012014050300230120140503002
30120140503002
 
40220130406003
4022013040600340220130406003
40220130406003
 
10120130406015
1012013040601510120130406015
10120130406015
 
L & T DESIGN EXPERIENCE CERTIFICATE
L & T DESIGN EXPERIENCE CERTIFICATEL & T DESIGN EXPERIENCE CERTIFICATE
L & T DESIGN EXPERIENCE CERTIFICATE
 
Business Grade 12 Certificate
Business Grade 12 CertificateBusiness Grade 12 Certificate
Business Grade 12 Certificate
 
Pdf1
Pdf1Pdf1
Pdf1
 
Presentacion aprendizaje definitiva!
Presentacion aprendizaje definitiva!Presentacion aprendizaje definitiva!
Presentacion aprendizaje definitiva!
 
Reporte de la película
Reporte de la películaReporte de la película
Reporte de la película
 
JCI-Certificate
JCI-CertificateJCI-Certificate
JCI-Certificate
 
CD BusCard Rachel Front AWv2
CD BusCard Rachel Front AWv2CD BusCard Rachel Front AWv2
CD BusCard Rachel Front AWv2
 
CV opal
CV opalCV opal
CV opal
 
Business Management
Business ManagementBusiness Management
Business Management
 
page_76
page_76page_76
page_76
 
In Step Testimonial 2016
In Step Testimonial 2016In Step Testimonial 2016
In Step Testimonial 2016
 
4 p´s y 4 c´s sandra martinez escobar
4 p´s y 4 c´s sandra martinez escobar4 p´s y 4 c´s sandra martinez escobar
4 p´s y 4 c´s sandra martinez escobar
 
Informática rosyyyyyyyyyyyy
Informática rosyyyyyyyyyyyyInformática rosyyyyyyyyyyyy
Informática rosyyyyyyyyyyyy
 
AIESEC Certification
AIESEC CertificationAIESEC Certification
AIESEC Certification
 
APD-JobStreet
APD-JobStreetAPD-JobStreet
APD-JobStreet
 

Similar to IJCET - Systematic Review of Ubiquitous Computing System Models

Emergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksEmergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory FurnitureIRJET Journal
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep LearningIRJET Journal
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneeSAT Journals
 
Iot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareIot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareMd Nazrul Islam Roxy
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
Ar32704708
Ar32704708Ar32704708
Ar32704708IJMER
 
11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...Alexander Decker
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.IRJET Journal
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Sign Language Detection for Deaf and Dumb Using Flex Sensors
Sign Language Detection for Deaf and Dumb Using Flex SensorsSign Language Detection for Deaf and Dumb Using Flex Sensors
Sign Language Detection for Deaf and Dumb Using Flex SensorsIRJET Journal
 
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET Journal
 

Similar to IJCET - Systematic Review of Ubiquitous Computing System Models (20)

Emergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksEmergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor Networks
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep Learning
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 
L010527175
L010527175L010527175
L010527175
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
 
Iot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcareIot and cloud computing on pervasive healthcare
Iot and cloud computing on pervasive healthcare
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Ar32704708
Ar32704708Ar32704708
Ar32704708
 
11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Sign Language Detection for Deaf and Dumb Using Flex Sensors
Sign Language Detection for Deaf and Dumb Using Flex SensorsSign Language Detection for Deaf and Dumb Using Flex Sensors
Sign Language Detection for Deaf and Dumb Using Flex Sensors
 
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

IJCET - Systematic Review of Ubiquitous Computing System Models

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME TECHNOLOGY (IJCET) IJCET ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com ©IAEME SYSTEMATIC REVIEW OF UBIQUITOUS COMPUTING SYSTEM MODELS SmritiMahajan1, 1,2,3 Anil Kumar Mishra2 and Latika Singh3 Dept of Computer Science and Engineering, ITM University Gurgaon, India ABSTRACT Ubiquitous computing forces computers to live in the world of humans. We can that ubiquitous computing is roughly the opposite of virtual reality. With advancement in technology we will soon see large number of ubiquitous devices. The services delivered by ubiquitous computing environment will require evolution of context-awareness, wireless network and mobility. Almost all applications of ubiquitous computing require a middleware for its implementation and a mechanism for discovery of available services. In this paper we will study about SenSay, the context-aware application of ubiquitous computing; the middleware architecture HOMEROS which allows high flexibility in the environment of heterogeneous devices and users; dynamic discovery and invocation mechanism for discovery of available services; Mobile Gaia a middleware for ad-hoc pervasive computing. Keywords: Dynamic discovery and invocation, HOMEROS, Mobile Gaia, Pervasive computing, SenSay, Ubiquitous computing. 1. INTRODUCTION The term Ubiquitous Computing was coined by Mark Weiser in 1991. His vision was to create environment saturated with computing and communicating capability, and integrated with human users [1]. This vision was too far ahead of its time and the hardware technology that was needed to achieve this did not exist. Ubiquitous computing is an advanced computing concept where computing is made to appear everywhere and anywhere [2]. In terms of technology, the term ubiquitous implies that technology is everywhere and we use it all the time. These technologies have been integrated in our lives so well that we tend to use them without thinking about the tool. Ubiquitous computing is also known as Pervasive Computing [3]. Both these terms can be used for the technology that has become almost invisible to us as it is now an integrated part of our life. It is an emerging field that includes technology that bridge the physical and digital world; systems and 46
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME applications that incorporate such technologies; infrastructure that support these technologies. It is the prospect of connecting all the things in the world to internet in order to provide information on anything, anytime and anywhere. It relies on the convergence of wireless technology, advancement in electronics and the internet. Continuous advancement in technology will soon lead to abundance of very small and very cheap microprocessors which are equipped with sensors and have wireless communication capabilities. Processing of information will then become ubiquitous and permeate almost every type of object. In ubiquitous computing environment, the design of systems and applications needs to take care of different devices, mobile users and continuously changing contexts of both the users and the system. The agents can acquire contextual information easily using middleware, reason about it using different logics and then adapt themselves to changing contexts. In this paper we will study about: • • • A context-aware mobile phone SenSay. Two middleware architectures-HOMEROS and Mobile Gaia. Dynamic discovery and invocation mechanism. The rest of the paper has following structure: section 2 presents an application of Ubiquitous computing-SenSay; section 3 describes HOMEROS-the middleware used for mobile heterogeneous systems; section 4 elaborates the mechanism for dynamic discovery and invocation of service components and section 5describes Mobile Gaia-a middleware for Ad-hoc pervasive computing. 2. SENSAY: A CONTEXT-AWARE MOBILE PHONE SenSay(sensing & saying) is a context aware mobile phone that adapts to the dynamically changing environment[4]. It modifies its behavior based on its user’s state and surroundings. It gives the ability to communicate the urgency of their calls to the remote callers, suggests user to make calls when they are idle and gives the feedback on the current status of the SenSay user to the caller. SenSay introduces 4 states: uninterruptible, idle, active and the default state the normal state (fig 1). The architecture consists of 5 functional modules: Sensor box, sensor module, decision module (core), action module and phone module. 2.1 Sensor Box It consists of a printed circuit board (PCB) which consists of two subsystems: the sensors and the microcontroller. The microcontroller provides eight 10-bit analog-to-digital conversion channels as the interface to the sensors and a port for serial communication to interface with the sensor module. The various sensors integrated in the sensor box are the voice and the ambient microphones which can be mounted on various parts of the body; three accelerometers to capture three(x, y, z) degrees of motion which are mounted directly on the PCB; and the light sensor mounted on the phone. Each sensor in the sensor box has a unique ID. The sensor box polls its sensors periodically as quick as it can and stores the most current value in an array. 2.2 Sensor Module The sensor module queries the sensor box (once per second) and returns the data to the decision module. Standard RS232 serial connection issued to establish the connection between the microcontroller and the sensor module. At any time, the sensor module will query the sensor box for a particular sensor data using the unique ID of that sensor. When a query is processed, the microprocessor will respond with the 47
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME most recent reading of the sensor by doing a table lookup rather than actually polling the sensor. This allows the microcontroller to respond immediately. 2.3 Decision Module The decision logic provides the logic used in state management. The sensor module transfers the sensor data to the decision module. It queries the sensor data and the electronic calendar of the user to determine the state of the user and issues phone actions. Sensor value history (of up to 10 minutes) is stored to help determine the user’s state so that the transitions can be done smoothly. 2.4 Action Module This module is controlled by the decision module and is responsible for issuing changes in setting and operation on the phone. The basic operations supported by the module are: 1. Ringer control: off/low/medium/high 2. Vibrate control: on/off 3. Send an SMS to the caller 4. Make call suggestions 5. Provide access to the electronic calendar. 2.5 Problem With distributed systems and mobile computing, privacy is a major concern and it becomes complicated by pervasive computing [5]. With context aware devices, the information about user’s movements, behavior patterns and habits becomes more knowledgeable with mechanisms like location tracking, smart spaces and use of surrogates. The knowledge of this information is necessary for successful proactivity and self-tuning but, the use of this information should be strictly controlled. If not, it can be put to a variety of unsavory uses ranging from targeted spam to blackmail. This may prevent knowledgeable users from using a pervasive computing system. To be reliable on infrastructure, the user must trust the infrastructure to a considerable extend. Also the infrastructure should be confident of the user’s identity and authorization level before responding to the request. 3. HOMEROS To support the computational needs of mobile users we need to maximize the use of available resources and minimize user distraction which is caused by dynamic and frequent changes in the resources. The middleware architecture HOMEROS satisfies these needs [6]. It allows high flexibility in the environment of heterogeneous devices and users. It consists of three layers- the core component management layer, the extended component service layer, and the system support layer. This architecture was designed to provide maximum flexibility in supporting service providers and user requirements. 48
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME Figure 1: SenSay architecture depicting 5 modules 3.1 Core Component Management This module consists of core ORB components and interrelated set of basic services which allows collaboration of service component development vendors. It allows dynamic loading, unloading, transferring, creating, and destroying the components in the upper layers. HOMEROS offers seven basic services: Event Manager, Component Repository, QoSAdaptation, Configuration Manager, Resource Manager, and Security manager. All of the services could be built on top of existing middleware services to support HOMEROS service architecture. 3.2 Event Manager The event manager distributes events and implements a decoupled communication model based on suppliers and consumers for enhanced reliability and stability. It has a single entry point and one or more event factories. Applications can define and register their own factories for state changes. If a supplier fails, the service can automatically replace all the corresponding information entries from the factory and scheduling queue without disrupting the system. The current event manager implementation uses CORBA’s event service. 3.3 Component Repository The component repository stores information (name, type, services, and so on) about all the components available in the middleware and allows applications and component manager browse and retrieve entities on the basis of specific attributes. The current component repository uses standard SQL for query component entities. 49
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME 3.4 Context Manager Mobile agent collects overall user information and hardware, software information for resource management, and the context manager provides proactive services using that information. It prepares personal data, user preferences, device characteristics, and organized data automatically available to other components. 3.5QoS Adaptation This module supports resource manager and configuration manager. It collects various devices monitoring information from resource manager, and then provides QoS information to the configuration manager. 3.6 Configuration Manager The configuration manager configures the new components and improves the component performance by optimizing system resource usages. It supports mobile agent for collecting environment information and running specific processes. 3.7 Resource Manager Resource manager allows dynamic reallocation of resources based on resource awareness. The middleware platform allows the system to be aware of the available configuration resources. It performs both self-inspection and self-adaption. 3.8Security Manager HOMEROS proposes platform registration and authentication, and stability evaluation of authentication. Registration can be done without user’s intervention, and platform authentication is to certify that relevant platform is reliable. Registered agents take part in the authentication process for other unregistered agents and platform. 4. DYNAMIC DISCOVERY AND INVOCATION MECHANISM Ubiquitous computing environment involves a variety of devices of different capabilities. The middleware takes a crucial role for efficiently coordinating the components and providing proper services. In the previous section we have read about a middleware architecture called HOMEROS. Figure 2: The HOMEROS Architecture 50
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME All the service providing components in an environment registers them with the system, providing information about the services they provide [7]. Service proxy agent represents the service of the components in the world of agents. All the services that provide the same functionality are wrapped by a service proxy. The service proxy is also registered with the system. Fig3 illustrates the mechanism for dynamic discovery and invocation of services. All the providers of a specific service and the proxy of that service register to the system (step A and step B). The smart room agent (SRA) which acts as a gateway for all the services receives the service invocation request from the client (step 1). The SRA then searches the registry for a proxy for such a service (step 2) and forwards the request to it (step 3). The service proxy on receiving a request checks the registry for available service providers (step 4). The proxy then activates a selection algorithm to decide to which provider to forward the request (step 5). Figure 3: Dynamic discovery and invocation mechanism 5. MOBILE GAIA Mobile Gaia [8] [9] [10] is the middleware for ad-hoc pervasive computing. It is a service based middleware that integrates resources of various devices. Ad-hoc pervasive computing is a cluster of personal devices that can communicate and share resources among each other. The user 51
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME can program the cluster through a common interface. This cluster is also referred as a personal active space. Mobile Gaia contains services which help in discovery of devices that form the personal space, maintaining the composition of the cluster, sharing resources among devices in the cluster and facilitate communication. It provides an application framework for development of applications for the device collection. This decomposes the application into smaller components that can run on different devices in this collection. The services are present in two roles-coordinator and client. The core services make up the kernel of Mobile Gaia and enable the devices in the cluster to share resources and data seamlessly. The component management core provides necessary low level support for creating and managing components. 5.1 Service Deployment Framework Services in Mobile Gaia are implemented as components and this framework forms a container for these service components. It installs new service components, load and unload components and remove components when they are no longer needed. It is based on the “What You Need Is What You Get” (WYNIWYG) model. When a service is deployed, it specifies the components that are to be loaded in the coordinator and client roles. Whenever a device changes roles from coordinator to client or vice versa, the cluster management service notifies the service deployment framework of this change. 5.2 Discovery and Cluster Management Service Mobile Gaia has the ability to dynamically discover nearby personal devices and bootstrap a personal active space on the discovered devices. Discovery protocols like Bluetooth or IrDA are used. When new personal devices are within range, they are added to the personal active space on the fly. Depending on the capabilities of the new device, the framework loads appropriate components and runs additional services that allow the system to utilize the device’s capabilities. Once a device is out of range, it is automatically removed from the personal active space. It also maintains a database of active devices and services in the personal active space and a list of components running locally on the device. 5.3 Event Service The event service is used to send events among devices in the cluster. These events include updates to location information; heartbeat messages events, it informing that the device is part of the cluster and location-based events. Events are implemented using event channels. When an application wants to send creates an event channel in the host device. The event service of the host device registers the event channel with the coordinator. The event service in the coordinator maintains a list of event channels in the cluster. When an application wants to subscribe to an event channel, it queries the local event service which in turn queries the event service of the coordinator for event channels. The event service of the coordinator acts like a repository that contains information about various event channels in the cluster. 5.4 Location Service The location service enables location awareness in the device cluster. Different devices in the cluster have different location-sensing technologies such as GPS, WiFi, RFID, Ubisense etc. It fuses location information from different devices and arrives at a probabilistic estimate of the location information. This location information is conveyed to all devices in the cluster. This cooperative approach to sharing location information enables devices to be location-aware in heterogeneous location-sensing environments. It supports a spatial database that contains a spatial model of the 52
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME physical world. Spatial information is required for route planning, finding points-of interest and for location-based triggers. 5.5 Security Service Security which is essential in personal active spaces can be divided into two main parts – authentication and access control. Authentication is needed to ensure that only authorized devices are allowed to connect to a user’s personal active space, and a device can only connect to personal spaces approved by its owner. Access control identifies what information or resources a device can share with a specific space name. Authentication is done using public key. For access control, users are allowed to create simple security policies on the personal device, which specify what services may run on the device when connected to a certain space. 6. DISCUSSION In this paper we have discussed about an application of ubiquitous computing, middleware architecture and the mechanism for dynamic discovery and invocation. The application SenSay combines sensory data, user information and history information to create a context-aware phone. The smart features provided by the phone aim to improve the overall usability of the phone. It either notifies the user of an incoming call by adjusting ringer and vibration settings or eliminates unwanted interruptions. The middleware HOMEROS provides high flexibility by adopting a hybrid network model and dynamically configurable reflective ORB. All major ubiquitous computing projects have established sophisticated middleware architectures. These architectures however face challenges of integrating large number of perceptual components. These challenges require establishment of intelligent methods for discovering, invoking and managing distributed components. Dynamic Discovery and invocation mechanism registers all the service proxies and their related services available in a smart space. It then provides services to the clients on request. The middleware Mobile Gaia is a service based middleware which provides dynamic discovery of near by devices. The services in this architecture are decomposed in two roles- coordinator and client. It also supports an application framework that can decompose an application into components. A device can act either as a coordinator or as a client. Table 1 summarizes the various system models studied in the paper. 7. CONCLUSION AND FUTURE SCOPE Ubiquitous computing is an emerging field. Two decades ago, when the term was coined, Mark Weiser’s vision of ubiquitous environments was too far ahead of its time. The hardware technology that was needed to achieve this did not exist. But with continuous advancement in the field of wireless technology, microelectronics and World Wide Web, creating ubiquitous environments became possible. We can presently see some efforts involved in the construction of ubiquitous applications in domain areas such as ambient intelligence, pervasive healthcare, ubiquitous learning and urban spaces. The future projects in this field are smart homes [11] and ubiquitous city [12]. 53
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME Table 1: SUMMARY TABLE Functionality SenSay HOMEROS Discovery and Invocation Mechanism Mobile Gaia Components It is a context-aware mobile phone that adapts dynamically to the user’s environment and modifies its behavior. It is a middleware which is designed to maximize the use of available resources and minimize user distraction caused by dynamic and frequent changes in the resources for mobile users. It is used to discover the devices in a smart space and register them with the system which provides information about their services. It is the middleware for ad-hoc pervasive computing that integrates the resources of various devices. Security Sensor Box, Sensor Module, Decision Module, Action Module and Phone Module. If not controlled, information about user’s movements and behavior can be put to a variety of unsavory uses. Three LayersIt provides security Core Component through platform Layer, Extended registration and Component Service authentication. Layer, System Support Layer. Service providing components, Service proxy agents and Knowledge base server. Service Development Framework, Discovery and Cluster Management, Event, Location, Context and Security Service. -- Future Scope Mechanisms that provide complete security to users’ information should be deployed. The proposed architecture needs to be compared with other middleware architectures proposed for PDAs and mobile devices. -- Security is Future work will provided by be address authentication and challenges posed access control. by mobility of nodes at application/servic e layer. REFERENCES [1] [2] [3] [4] [5] [6] Weiser, M. (1991).The computer for the 21st Century.In Scientific American, vol. 265, no. 3, 1991, pp. 66-75. Mattern, F. ,”The Vision and Technical Foundations of Ubiquitous Computing”, UPGRADE Vol II, No 5, 2001. Ferscha, A. , “What is Pervasive Computing?”. Siewiorek, D.;Smailagic, A. ; Furukawa, J. ; Moraveji, N. ; Reiger, K. , “SenSay: A contextaware mobile phone”,Seventh IEEE International Symposium on (2003), pp. 248-249,. Satyanarayanan, M.,”Pervasive computing: vision and challenges”, IEEE Personal Communications, 2001. Han, W. ; Bong, Y. ; Yoon ; Youn, H. ; Cho, W ,”A new middleware architecture for ubiquitous computing environment”, Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004 IEEE. 54
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 46-55 © IAEME [7] [8] [9] [10] [11] [12] [13] [14] Pandis, I. ; Soldatos, J. ; Paar, A. ; Reuter, J. ; Carras, M. ; Polymenakos, L.; ”An Ontologybased framework for dynamic resource management in ubiquitous computing environment”, Proceddings of the second International Conference on Embedded Software and Systems, 2005 IEEE. Chetan, S. ;Muhtadi, J. ; Campbell, R., “Mobile gaia: A middleware for ad-hoc pervasive computing”, 2004 IEEE. Roman, M.; Hess, C.; Cerqueira, R.; Campbell, R.; Narhstedt, K., "Gaia: A middleware infrastructure to enable active spaces" IEEE Pervasive Computing Magazine, vol. 1, pp. 74-83, 2002. Chetan, S.;Muhtadi, J. ; Campbell, R.,”A middleware for enabling personal ubiquitous spaces”. Alam, M.;Reaz, M. ; Ali, M.,“A review of smart homes- past, present and future” IEEE Transactions on System, Man and Cybernetics-Part C: Applications and Reviews, Vol 42, No. 6, November 2012. Shin, D.,”A realization of pervasive computing: ubiquitous City”2010 IEEE. S.Mohan Raj, “Feasibility Study of Pervasive Computing Approach for Energy Management in Mobiles”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 312 - 319, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Aakash Shah, Gautami Nadkarni, Namita Rane and Divya Vijan, “Ubiqutous Computing Enabled in Daily Life”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2013, pp. 217 - 223, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 55