Academia.eduAcademia.edu

Ubiquitous Computing Communication

description42 papers
group2 followers
lightbulbAbout this topic
Ubiquitous Computing Communication refers to the study and design of systems that enable seamless interaction and data exchange among interconnected devices in everyday environments. It emphasizes the integration of computing technology into daily life, allowing for continuous connectivity and communication without the need for explicit user intervention.
lightbulbAbout this topic
Ubiquitous Computing Communication refers to the study and design of systems that enable seamless interaction and data exchange among interconnected devices in everyday environments. It emphasizes the integration of computing technology into daily life, allowing for continuous connectivity and communication without the need for explicit user intervention.

Key research themes

1. How can infrastructure architectures enhance seamless automatic configuration and context-awareness in ubiquitous computing?

This research area focuses on designing and implementing software infrastructures and middleware systems that support automatic configuration, dynamic adaptation, and context-aware interactions in ubiquitous computing environments. These infrastructures aim to reduce user overhead in managing heterogeneous and mobile devices, enable smooth task migration across locations, and provide high utility by learning user intents and environmental context. This is critical because ubiquitous computing ecosystems are characterized by dynamic resource availability, diverse device capabilities, and the need for minimizing user intervention while maximizing system utility.

Key finding: The Aura infrastructure autonomously handles task migration and environment reconfiguration as users move between locations in a ubiquitous computing environment. It exploits lightweight user task and context models to... Read more
Key finding: This work documents the iterative design and deployment of a system infrastructure that manages physically bounded ubiquitous computing environments, supporting multi-device integration, application migration, and coordinated... Read more
Key finding: This paper proposes a decentralized peer-to-peer architecture for scalable and robust context information distribution among heterogeneous devices in mobile and ubiquitous environments. By categorizing sensor nodes,... Read more
Key finding: The paper critiques existing distributed computing technologies as insufficient for pervasive computing due to the tight encapsulation of data and functionality, lack of continuous resource acquisition, and the absence of a... Read more
Key finding: The D-Me multiagent system introduces personal agents that leverage context-awareness for proactive task execution and information presentation in ubiquitous environments. The agent models user activities, intents, and... Read more

2. What role does context-awareness and multimodal interaction play in enabling human-centric ubiquitous communication?

This theme explores how context-aware systems and intimate, seamless human-computer interactions can be designed to better integrate computing into everyday life. Research in this space examines context capturing, interpretation, and dynamic adaptation to user location, activity, and preferences. Studies investigate how multimodal input/output (such as wearable computing, visual markers, speech, and augmented reality) and intimate computing paradigms can be leveraged to support emotional, social, and cognitive aspects of human communication within ubiquitous environments. This focus is crucial as it addresses usability, acceptability, and the enhancement of natural communication in ubicomp.

Key finding: This paper introduces a taxonomy for ubicomp applications based on user mobility and interaction transparency, defining the scope of HCI challenges in ubiquitous computing. It reveals that increasing interaction... Read more
Key finding: Through a workshop and theoretical discourse, this work critically examines the notion of intimacy within ubiquitous computing, conceptualizing intimacy beyond sexual connotations as cognitive, emotional, and physical... Read more
Key finding: The paper presents an approach integrating dynamic visual markers (VCC markers) with event-driven ubiquitous chips that collect sensor data and control actuators to provide context-aware information in wearable augmented... Read more
Key finding: This work extends augmented reality systems by enabling bidirectional dynamic attachment of digital notes (voice, pictures) to physical locations or objects using wearable computers. Contextual tags such as location and... Read more
Key finding: This paper demonstrates an instant messaging (IM) based platform (IMPRUVE) to support human-centric ubiquitous communication, leveraging pervasive wireless standards and commercial IM technology. It uses IM bots and services... Read more

3. How can computational methods like signal processing and security mechanisms support the development of robust, context-aware and mobile ubiquitous systems?

This theme deals with the application of specific computational techniques such as multiwavelet transforms for multilingual information retrieval and the use of advanced public key cryptography tailored for resource-constrained mobile devices and payment systems. It also includes investigations into efficient cryptanalysis methods of RSA schemes in the context of mobile security. These computational underpinnings are critical enablers for robust, private, and efficient information exchange and intelligent data retrieval in ubiquitous computing settings where devices are heterogeneous, contexts are dynamic, and security and efficiency are paramount.

Key finding: The paper presents a novel information retrieval approach that applies multiwavelet transforms for feature extraction across multiple languages while addressing language-specific script, word order, and font challenges.... Read more
Key finding: The study analyzes elliptic curve public key encryption as an efficient alternative to traditional RSA encryption for mobile payment security, highlighting its lower key size, faster computation, and reduced power... Read more
Key finding: The paper proposes a novel algorithm that can efficiently attack RSA encryption by recovering the private key and factoring the modulus from the public key, especially effective when the public exponent e is small, a common... Read more

All papers in Ubiquitous Computing Communication

The effectiveness of a manufacturing product produced depends on whether the specified standards by the management / production engineers are met or not. It is possible that a process will be stable but will not meet the specification set... more
This paper presents a novel approach based on multiwavelet transform in Web information retrieval. The influence multiwavelet transform on feature extraction and information retrieval ability of calibration model and solve problem of... more
Continuous quality improvement is an effort to improve the quality of products, processes, or services. A program intended to effectively implement such efforts begins with the collection and analysis of data. The primary purpose of the... more
Process capability estimation depends on the underlying data distribution. If data is not normally distributed, other techniques for capability estimation should be taken into consideration. In this paper, we propose modified power... more
The pervasive computing scenario provides a diffused presence of technological appliances distributed in the environment and interacting by means of wired or wireless networks. These computational units should be able to fruitfully... more
Due to reliance on stochastic deployment, delivery of large-scale WSN presents a major problem in the application of Wireless Sensor Networks (WSN) technology. When deployed in a stochastic manner, the WSN has the utmost challenge of... more
Heterogeneous wireless sensor network (H-WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. In this Research paper, the improved-enhance coverage overlapping sensing ratio (I-ECOSR)... more
Process capability indices (PCIs) and parts per million (PPM) nonconforming (NC) levels are widely used in quality improvement programs for quantifying the capability of a process to meet specification requirements. Calculation of PCIs... more
Wireless sensor networks (WSNs) have gained wide attention from researchers in the last few years because it has a vital role in countless applications. The main function of WSN is to process extracted data and to transmit it to remote... more
This paper presents a novel approach based on multiwavelet transform in Web information retrieval. The influence multiwavelet transform on feature extraction and information retrieval ability of calibration model and solve problem of... more
The IEEE 802.11standard is developed and gained unprecedented popularity for its simple and cost-effective wireless technology to provide best effort services. But, it has to address serious challenges concerned to multimedia services.... more
Wireless sensor networks (WSNs) have gained wide attention from researchers in the last few years because it has a vital role in countless applications. The main function of WSN is to process extracted data and to transmit it to remote... more
Wireless sensor networks (WSNs) have gained wide attention from researchers in the last few years because it has a vital role in countless applications. The main function of WSN is to process extracted data and to transmit it to remote... more
Many route mapping were done with the help of API of Google maps but does not provide geospatial Routing functionality like overlay, interpolation etc. This project aims to find the shortest path between two or more points by using... more
VANET, Vehicular Ad-hoc Network is very emerging area of research. There are lots of applications like; Message Transmission, for example – Infotainment (Information + Entertainment), Emergency Safety Messages, convenience messages,... more
Numerous Variable Step-Size Normalized Least Mean Square (VSS-NLMS) algorithms have been proposed to solve the problems of fast convergence rate and low value of steady-state misadjustment in the past three decades. In this paper we... more
The advancement of acoustic modem technology in providing better data rates and more reliable underwater wireless communications has motivated many researchers to create various algorithms to support such technology in a better way. These... more
Wireless sensor networks (WSNs) have gained wide attention from researchers in the last few years because it has a vital role in countless applications. The main function of WSN is to process extracted data and to transmit it to remote... more
This paper presents speaker diarization mechanisms using low-cost and low-resolution wearable wireless sensors. Speaker diarization is used for identifying speaking sequence and duration for all individuals engaged in a conversation... more
The advancement of acoustic modem technology in providing better data rates and more reliable underwater wireless communications has motivated many researchers to create various algorithms to support such technology in a better way. These... more
There is a great deal of interest in the manufacturing industry for quantitative measures of process performance with multiple quality characteristics. Unfortunately, multivariate process capability indices that are currently employed,... more
As is well known, process capability analysis for more than one quality variables is a complicated and sometimes contentious area with several quality measures vying for recognition. When these variables exhibit non-normal... more
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing... more
Abstract—Distribution is one of the essential features characterizing multi-agent systems (MASs), giving developers the opportunity to seamlessly conceive and then engineer a physically distributed application as a MAS spread among... more
The pervasive computing scenario provides a diffused presence of technological appliances distributed in the environment and interacting by means of wired or wireless networks. These computational units should be able to fruitfully... more
The characteristics of nodes moving arbitrarily and the network topology changing frequently lead to AODV routing protocol, which uses minimum hop-count as the metric for route selection, facing intermittent connectivity frequently which... more
Because the normal process capability indices (PCIs) C p , C pu , C pl , and C pk represent the times that the process standard deviation is within the specification limits; then, based on and by using the direct relations among the... more
In many industries process capability studies are conducted in order to determine the capability of the process to produce acceptable products and it is one of the important activities of statistical process control. In order to express... more
The effectiveness of a manufacturing product produced depends on whether the specified standards by the management / production engineers are met or not. It is possible that a process will be stable but will not meet the specification set... more
In Ad Hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure... more
Neonatal Mortality Rate (NMR) can be defined as the number of newborn deaths’ aged 0 to 28 days. The most significant factor influenced NMR is low birth weight of newborn babies approximately 48%, followed by asphyxia 37% and sepsis... more
One of the notoriously difficult problems in vehicular ad-hoc networks (VANET) is to ensure that established routing paths do not break before the end of data transmission. This is a difficult problem because the network topology is... more
Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other (V2V) as well as with roadside infrastructure units (V2I). These units provide different services such as driver information systems and Internet access.... more
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is an efficient Mobile Ad hoc NETworks (MANETs) routing protocol. It uses hop count as a metric for the path selection. AODV does not support Quality of Service (QoS) and... more
Nowadays Wireless sensor networks (WSNs) being applied in many different civilian applications like vehicle tracking, habitat monitoring, forest surveillance, earthquake observation, biomedical or health care requests and building... more
Multi-hop wireless networks appear as a promising means for providing broadband Internet access in rural and mountain regions. Reliability and QoS are among others two important aspects in such context. This paper presents a pragmatic... more
The advancement of acoustic modem technology in providing better data rates and more reliable underwater wireless communications has motivated many researchers to create various algorithms to support such technology in a better way. These... more
Process capability indices (PCIs) are used in statistical process control to evaluate the capability of the processes in satisfying the customer's needs. In the past two decades varieties of PCI are introduced by researchers to analyze... more
In this paper, we evaluate a Call Admission Control (CAC) scheme suitable for W-CDMA networks accommodating multiple service-classes. In such networks, the distinction between new and handoff traffic is very important. A simple CAC scheme... more
In this paper, we evaluate a Call Admission Control (CAC) scheme suitable for W-CDMA networks accommodating multiple service-classes. In such networks, the distinction between new and handoff traffic is very important. A simple CAC scheme... more
In today's competitive business environment, it is becoming more crucial than ever to assess precisely process losses due to non-compliance to customer specifications. To assess these losses, industry is widely using process capability... more
In the last few years, extensive research has been performed to extend Internet connectivity to VANETS. Indeed, several routing protocols have been proposed to determine routes between vehicles and gateways (e.g., Road Side Units: RSUs).... more
In mobile ad hoc networks (MANET), routing protocol plays the most important role. For more than one decade, Ad hoc On-demand Distance Vector (AODV) routing protocol becomes attention and research focus on MANET widely. A lot of protocols... more
In mobile ad hoc networks (MANET), routing protocol plays the most important role. For more than one decade, Ad hoc On-demand Distance Vector (AODV) routing protocol becomes attention and research focus on MANET widely. A lot of protocols... more
The continuously increasing demand for better healthcare services has added another application to the sphere of remote monitoring services. This extension to e-Health and Telecare services is known as Remote Patient Monitoring (RPM). The... more
A VANET is composed of vehicles, equipped with short range wireless communication capabilities, which cooperate to form a temporary distributed network enabling communications with other vehicles or road infrastructure nodes, located in... more
Ad hoc On-Demand Distance Vector (AODV) routing protocol is an efficient Mobile Ad hoc NETworks (MANETs) routing protocol. It uses hop count as a metric for the path selection. AODV does not support Quality of Service (QoS) and neither... more
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is an efficient Mobile Ad hoc NETworks (MANETs) routing protocol. It uses hop count as a metric for the path selection. AODV does not support Quality of Service (QoS) and... more
Download research papers for free!