SlideShare a Scribd company logo
1 of 6
Download to read offline
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
1
www.viva-technology.org/New/IJRI
UBIQUITOUS COMPUTING
Its Paradigm, Systems & Middleware
Pallavi Vartak 1
1
(Computer Engineering Department, VIVA Institute of Technology, India)
Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive
Computing Middleware.
1. INTRODUCTION
The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces,
invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices
to the factor in which their use is transparent. For lots of packages transparent operation requires that the device
be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly
non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may
emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from
the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a
concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In
ubiquitous computing environments computation is embedded. With advancements in laptop technological
knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in
networked and standalone surroundings and capable of conversation with the human and with each different.
Those devices support context-conscious software, nomadic customers, area aware services, and cell records
access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while
making the presence of the machine “invisible” to the consumer.
1.2 Traits of Ubiquitous Computing (Ubicom) Systems
Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29]
specifically distributed computation, invisibility, and context-attention. The distributed computation method the
computer systems/structures need to be networked, dispensed and transparently on hand. They could have
interaction with human beings in addition to with each other’s. the invisibility property approach that the computer
interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is
contextattention that implies that so as to optimize device operation of their physical and human surroundings it's
far necessary to make the structures aware about environmental context.
Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that
allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that
ubiquitous computing aim is to help users in everyday existence.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
2
www.viva-technology.org/New/IJRI
The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always
required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or
usable in many instances in exercise to aid all 5 middle properties.
Fig.1. Five Properties of Ubiquitous Computing
2. LITERATURE SURVEY
This study is going to include extensive research about the ubiquitous computing as well as its influence
on the users. We will also examine the different techniques, mechanisms and design principles.
2.1 Service Composition Mechanisms
The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of
combining the existing services. Researchers have substantially studied and discover a function of the ever-present
computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc
way. In amigo [12], the focal point of the provider composition mechanism used was to construct an
“international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside
the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values
acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from
exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application
developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are
used to map sources on gadgets into principles in the ontology.
We located that during service composition three characteristics are needed namely, usability,
adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a
preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific
environment and context. The performance is the belongings of the machine to provide appropriate response and
overall performance to the user requests or movements within a stipulated time. The three traits we have
mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need
and possibility of research to be had within the service composition mechanisms.
2.2 Context-Aware Systems And Design Principles
Region information based totally context-conscious structures are extensively utilized by customers in
their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for
instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts,
eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge
locations. To acquire region information diverse sensors and modules are to be had which include gps satellites,
mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those
proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer
offerings to the user primarily based on the detected location.
In context-conscious device challenge majority of them used and focused most effective on the vicinity
awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
3
www.viva-technology.org/New/IJRI
consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing
the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive,
efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds
context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm.
Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging
system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes
approaches for sensory information acquisition for sensory records acquisition.
The principles of the context-conscious device designing encompass strategies of context information
acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records
acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3
one-of-a-kind context management models: widgets, networked services and blackboard model.
We observed that the prevailing answers and research efforts specially focused and used physical sensors
for context attention. However, we believed that logical and digital sensors also are useful and able to offering
more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and
structures.
2.3 Pervasive Computing Middlewares
The aim of pervasive computing is to create a smart environment the usage of embedded sensors and
networked computing gadgets that offer customers transparent get entry to of services. Examples of current
pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15]
and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and
want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to
design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to
developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree
implementation information. Another characteristic of pervasive middleware systems is to offer management of
system sources together with ser-vice management, context management and data control of context the usage of
ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology.
3. USER SURVEY
To identify person requirements for consumer interface design and features of ubiquitous gadgets, we
performed a user survey of 1000 engineering students. Even though the range of people participated within the
survey are very small in numbers and some distance from supplying end but it presents an indicative figures of
consumer preferences [20]. The survey included following seven questions. To every person identical set of
questions and alternatives have been given. The table shown below provides a detailed view about the survey.
Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819
customers favored a smart tool single user operated, 96 customers preferred more than one person operated and
85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have
to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519
customers’ favored multi-task operations and 54 users genuinely don’t care.
A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool
need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t
care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall
967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually
don’t care.
What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands
free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored
hand-unfastened input technique.
Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt
various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support
instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964
customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
4
www.viva-technology.org/New/IJRI
Table.1. Survey results [20]
Using a Smart
Tool
Single User
Multiple User
Neutral
819 96 85
Tasking
Single
Tasking
Multitasking
Unsure
427 319 54
Standalone or
Networked
Stand-alone Networked Unsure
124 83 3
Connectivity
Wired Wireless Unsure
24 967 9
Haptic Entry
techniques
1-
Handedness
2-
Handedness
Handsfree
356 46 598
Safe
Exploration
Safe
Exploration
NA Unsure
995 NA 5
Feedback
Instant
Feedback
Cumulative
Feedback
Unsure
964 34 2
4. SYSTEM ARCHITECTURE
This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous
computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end
servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies
like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed
architecture.
Fig.2. System Architecture
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
5
www.viva-technology.org/New/IJRI
It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually
numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and
possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to
handle a couple of obligations successfully and aid multi-venture environment inside the software. The
multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well
as context and consumer design management. The user db module enables to authenticate users. The opposite
modules along with gear, monitoring, replication, communication, localization supports various functions in the
ubiquitous computing packages.
5. CONCLUSION
This research work supplied a survey of ubiquitous computing studies. We provided a classification of
the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of
ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work
additionally presented novel device structure, a distributed outline design to support ubiquitous computing
applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing
and want to make valuable contributions to this research place.
REFERENCES
[1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”,
Proceedings of the 4th
International Conference on Mobile Technology, Applications, and Systems and the 1st International
Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007.
[2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a
Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003.
[3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM
Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000.
[4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the
International Conference on Pervasive Systems and Computing, pp. 27-30, 2005.
[5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop
on Semantic Web Services and Web Process Composition, pp. 26-42, 2004.
[6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware
Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd
European Workshop on Object Orientation and
Web Services, 2004.
[7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland,
2004.
[8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”,
Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005.
[9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based
Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012.
[10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and
Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001.
[11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE
Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002.
[12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the
Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005.
[13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers,
Vol. 14, No. 4, pp. 301-312, 2002.
[14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department
of Computer Science, School of Engineering and Technology, Pondicherry University, 2011.
[15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive
Computing”, Proceedings of the 21st
International Symposium on Computer and Information Sciences, pp. 755-764, 2006.
[16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”,
International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015.
[17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”,
Proceedings of the European Conference on Information Systems, 2005.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
6
www.viva-technology.org/New/IJRI
[18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009.
[19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active
Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002.
[20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous
Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications
Workshops, 2004.
[21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for
Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001.
[22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing
Environments”, Proceedings of the 3rd
International Federation for Information Processing, Vol. 97, pp. 29-43, 2002.
[23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European
Wireless, pp. 595-601, 2002.
[24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and
Applications”, Proceedings of the 3rd
International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007.
[25] Mark Weiser, “The Computer for the 21st
Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991.
[26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994.
[27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing.
[28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.

More Related Content

What's hot

Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
 
HARDWARE DESIGN FOR MACHINE LEARNING
HARDWARE DESIGN FOR MACHINE LEARNINGHARDWARE DESIGN FOR MACHINE LEARNING
HARDWARE DESIGN FOR MACHINE LEARNINGijaia
 
Hardware design for_machine_learning
Hardware design for_machine_learningHardware design for_machine_learning
Hardware design for_machine_learninggerogepatton
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
I3CON Newsletter #2
I3CON Newsletter #2I3CON Newsletter #2
I3CON Newsletter #2lk314
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
Ar32704708
Ar32704708Ar32704708
Ar32704708IJMER
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
 

What's hot (18)

Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Intelligent Internet of Things (IIoT): System Architectures and Communica...
   Intelligent Internet of Things (IIoT): System  Architectures and Communica...   Intelligent Internet of Things (IIoT): System  Architectures and Communica...
Intelligent Internet of Things (IIoT): System Architectures and Communica...
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
K1802027780
K1802027780K1802027780
K1802027780
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
M1802028591
M1802028591M1802028591
M1802028591
 
IJET-V3I1P6
IJET-V3I1P6IJET-V3I1P6
IJET-V3I1P6
 
HARDWARE DESIGN FOR MACHINE LEARNING
HARDWARE DESIGN FOR MACHINE LEARNINGHARDWARE DESIGN FOR MACHINE LEARNING
HARDWARE DESIGN FOR MACHINE LEARNING
 
Hardware design for_machine_learning
Hardware design for_machine_learningHardware design for_machine_learning
Hardware design for_machine_learning
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
I3CON Newsletter #2
I3CON Newsletter #2I3CON Newsletter #2
I3CON Newsletter #2
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
J1802026976
J1802026976J1802026976
J1802026976
 
Ar32704708
Ar32704708Ar32704708
Ar32704708
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 

Similar to UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware

Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineering
Breaking the Walls: A Unified Vision on Context-Oriented Software EngineeringBreaking the Walls: A Unified Vision on Context-Oriented Software Engineering
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineeringkim.mens
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
 
Context-aware recommender system for multi-user smart home
Context-aware recommender system for multi-user smart homeContext-aware recommender system for multi-user smart home
Context-aware recommender system for multi-user smart homeIJECEIAES
 
Emergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksEmergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksIRJET Journal
 
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemConceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
 

Similar to UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware (20)

Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
50120140502006
5012014050200650120140502006
50120140502006
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineering
Breaking the Walls: A Unified Vision on Context-Oriented Software EngineeringBreaking the Walls: A Unified Vision on Context-Oriented Software Engineering
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineering
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing
 
Context-aware recommender system for multi-user smart home
Context-aware recommender system for multi-user smart homeContext-aware recommender system for multi-user smart home
Context-aware recommender system for multi-user smart home
 
Emergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor NetworksEmergence Detection And Rescue Using Wireless Sensor Networks
Emergence Detection And Rescue Using Wireless Sensor Networks
 
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemConceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital Age
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 

More from vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problemvivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethicsvivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbotsvivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technologyvivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devicesvivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Fluttervivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
 

More from vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 

UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware

  • 1. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 1 www.viva-technology.org/New/IJRI UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware Pallavi Vartak 1 1 (Computer Engineering Department, VIVA Institute of Technology, India) Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that gears communication technologies into routine life accomplishments. This study paper affords a types of the studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting, this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary for exceptional-of-provider assertion of ubiquitous computing.. Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive Computing Middleware. 1. INTRODUCTION The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces, invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices to the factor in which their use is transparent. For lots of packages transparent operation requires that the device be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In ubiquitous computing environments computation is embedded. With advancements in laptop technological knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in networked and standalone surroundings and capable of conversation with the human and with each different. Those devices support context-conscious software, nomadic customers, area aware services, and cell records access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while making the presence of the machine “invisible” to the consumer. 1.2 Traits of Ubiquitous Computing (Ubicom) Systems Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29] specifically distributed computation, invisibility, and context-attention. The distributed computation method the computer systems/structures need to be networked, dispensed and transparently on hand. They could have interaction with human beings in addition to with each other’s. the invisibility property approach that the computer interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is contextattention that implies that so as to optimize device operation of their physical and human surroundings it's far necessary to make the structures aware about environmental context. Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that ubiquitous computing aim is to help users in everyday existence.
  • 2. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 2 www.viva-technology.org/New/IJRI The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or usable in many instances in exercise to aid all 5 middle properties. Fig.1. Five Properties of Ubiquitous Computing 2. LITERATURE SURVEY This study is going to include extensive research about the ubiquitous computing as well as its influence on the users. We will also examine the different techniques, mechanisms and design principles. 2.1 Service Composition Mechanisms The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of combining the existing services. Researchers have substantially studied and discover a function of the ever-present computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc way. In amigo [12], the focal point of the provider composition mechanism used was to construct an “international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are used to map sources on gadgets into principles in the ontology. We located that during service composition three characteristics are needed namely, usability, adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific environment and context. The performance is the belongings of the machine to provide appropriate response and overall performance to the user requests or movements within a stipulated time. The three traits we have mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need and possibility of research to be had within the service composition mechanisms. 2.2 Context-Aware Systems And Design Principles Region information based totally context-conscious structures are extensively utilized by customers in their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts, eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge locations. To acquire region information diverse sensors and modules are to be had which include gps satellites, mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer offerings to the user primarily based on the detected location. In context-conscious device challenge majority of them used and focused most effective on the vicinity awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors
  • 3. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 3 www.viva-technology.org/New/IJRI consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive, efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm. Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes approaches for sensory information acquisition for sensory records acquisition. The principles of the context-conscious device designing encompass strategies of context information acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3 one-of-a-kind context management models: widgets, networked services and blackboard model. We observed that the prevailing answers and research efforts specially focused and used physical sensors for context attention. However, we believed that logical and digital sensors also are useful and able to offering more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and structures. 2.3 Pervasive Computing Middlewares The aim of pervasive computing is to create a smart environment the usage of embedded sensors and networked computing gadgets that offer customers transparent get entry to of services. Examples of current pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15] and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree implementation information. Another characteristic of pervasive middleware systems is to offer management of system sources together with ser-vice management, context management and data control of context the usage of ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology. 3. USER SURVEY To identify person requirements for consumer interface design and features of ubiquitous gadgets, we performed a user survey of 1000 engineering students. Even though the range of people participated within the survey are very small in numbers and some distance from supplying end but it presents an indicative figures of consumer preferences [20]. The survey included following seven questions. To every person identical set of questions and alternatives have been given. The table shown below provides a detailed view about the survey. Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819 customers favored a smart tool single user operated, 96 customers preferred more than one person operated and 85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519 customers’ favored multi-task operations and 54 users genuinely don’t care. A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall 967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually don’t care. What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored hand-unfastened input technique. Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964 customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.
  • 4. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 4 www.viva-technology.org/New/IJRI Table.1. Survey results [20] Using a Smart Tool Single User Multiple User Neutral 819 96 85 Tasking Single Tasking Multitasking Unsure 427 319 54 Standalone or Networked Stand-alone Networked Unsure 124 83 3 Connectivity Wired Wireless Unsure 24 967 9 Haptic Entry techniques 1- Handedness 2- Handedness Handsfree 356 46 598 Safe Exploration Safe Exploration NA Unsure 995 NA 5 Feedback Instant Feedback Cumulative Feedback Unsure 964 34 2 4. SYSTEM ARCHITECTURE This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed architecture. Fig.2. System Architecture
  • 5. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 5 www.viva-technology.org/New/IJRI It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to handle a couple of obligations successfully and aid multi-venture environment inside the software. The multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well as context and consumer design management. The user db module enables to authenticate users. The opposite modules along with gear, monitoring, replication, communication, localization supports various functions in the ubiquitous computing packages. 5. CONCLUSION This research work supplied a survey of ubiquitous computing studies. We provided a classification of the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work additionally presented novel device structure, a distributed outline design to support ubiquitous computing applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing and want to make valuable contributions to this research place. REFERENCES [1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”, Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007. [2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003. [3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000. [4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the International Conference on Pervasive Systems and Computing, pp. 27-30, 2005. [5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop on Semantic Web Services and Web Process Composition, pp. 26-42, 2004. [6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd European Workshop on Object Orientation and Web Services, 2004. [7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland, 2004. [8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”, Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005. [9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012. [10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001. [11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002. [12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005. [13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers, Vol. 14, No. 4, pp. 301-312, 2002. [14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department of Computer Science, School of Engineering and Technology, Pondicherry University, 2011. [15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing”, Proceedings of the 21st International Symposium on Computer and Information Sciences, pp. 755-764, 2006. [16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”, International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015. [17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”, Proceedings of the European Conference on Information Systems, 2005.
  • 6. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 6 www.viva-technology.org/New/IJRI [18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009. [19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002. [20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. [21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001. [22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments”, Proceedings of the 3rd International Federation for Information Processing, Vol. 97, pp. 29-43, 2002. [23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European Wireless, pp. 595-601, 2002. [24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and Applications”, Proceedings of the 3rd International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007. [25] Mark Weiser, “The Computer for the 21st Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991. [26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994. [27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing. [28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.