SlideShare a Scribd company logo
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
1
www.viva-technology.org/New/IJRI
UBIQUITOUS COMPUTING
Its Paradigm, Systems & Middleware
Pallavi Vartak 1
1
(Computer Engineering Department, VIVA Institute of Technology, India)
Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive
Computing Middleware.
1. INTRODUCTION
The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces,
invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices
to the factor in which their use is transparent. For lots of packages transparent operation requires that the device
be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly
non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may
emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from
the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a
concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In
ubiquitous computing environments computation is embedded. With advancements in laptop technological
knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in
networked and standalone surroundings and capable of conversation with the human and with each different.
Those devices support context-conscious software, nomadic customers, area aware services, and cell records
access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while
making the presence of the machine “invisible” to the consumer.
1.2 Traits of Ubiquitous Computing (Ubicom) Systems
Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29]
specifically distributed computation, invisibility, and context-attention. The distributed computation method the
computer systems/structures need to be networked, dispensed and transparently on hand. They could have
interaction with human beings in addition to with each other’s. the invisibility property approach that the computer
interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is
contextattention that implies that so as to optimize device operation of their physical and human surroundings it's
far necessary to make the structures aware about environmental context.
Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that
allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that
ubiquitous computing aim is to help users in everyday existence.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
2
www.viva-technology.org/New/IJRI
The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always
required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or
usable in many instances in exercise to aid all 5 middle properties.
Fig.1. Five Properties of Ubiquitous Computing
2. LITERATURE SURVEY
This study is going to include extensive research about the ubiquitous computing as well as its influence
on the users. We will also examine the different techniques, mechanisms and design principles.
2.1 Service Composition Mechanisms
The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of
combining the existing services. Researchers have substantially studied and discover a function of the ever-present
computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc
way. In amigo [12], the focal point of the provider composition mechanism used was to construct an
“international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside
the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values
acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from
exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application
developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are
used to map sources on gadgets into principles in the ontology.
We located that during service composition three characteristics are needed namely, usability,
adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a
preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific
environment and context. The performance is the belongings of the machine to provide appropriate response and
overall performance to the user requests or movements within a stipulated time. The three traits we have
mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need
and possibility of research to be had within the service composition mechanisms.
2.2 Context-Aware Systems And Design Principles
Region information based totally context-conscious structures are extensively utilized by customers in
their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for
instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts,
eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge
locations. To acquire region information diverse sensors and modules are to be had which include gps satellites,
mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those
proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer
offerings to the user primarily based on the detected location.
In context-conscious device challenge majority of them used and focused most effective on the vicinity
awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
3
www.viva-technology.org/New/IJRI
consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing
the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive,
efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds
context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm.
Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging
system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes
approaches for sensory information acquisition for sensory records acquisition.
The principles of the context-conscious device designing encompass strategies of context information
acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records
acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3
one-of-a-kind context management models: widgets, networked services and blackboard model.
We observed that the prevailing answers and research efforts specially focused and used physical sensors
for context attention. However, we believed that logical and digital sensors also are useful and able to offering
more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and
structures.
2.3 Pervasive Computing Middlewares
The aim of pervasive computing is to create a smart environment the usage of embedded sensors and
networked computing gadgets that offer customers transparent get entry to of services. Examples of current
pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15]
and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and
want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to
design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to
developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree
implementation information. Another characteristic of pervasive middleware systems is to offer management of
system sources together with ser-vice management, context management and data control of context the usage of
ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology.
3. USER SURVEY
To identify person requirements for consumer interface design and features of ubiquitous gadgets, we
performed a user survey of 1000 engineering students. Even though the range of people participated within the
survey are very small in numbers and some distance from supplying end but it presents an indicative figures of
consumer preferences [20]. The survey included following seven questions. To every person identical set of
questions and alternatives have been given. The table shown below provides a detailed view about the survey.
Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819
customers favored a smart tool single user operated, 96 customers preferred more than one person operated and
85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have
to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519
customers’ favored multi-task operations and 54 users genuinely don’t care.
A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool
need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t
care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall
967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually
don’t care.
What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands
free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored
hand-unfastened input technique.
Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt
various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support
instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964
customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
4
www.viva-technology.org/New/IJRI
Table.1. Survey results [20]
Using a Smart
Tool
Single User
Multiple User
Neutral
819 96 85
Tasking
Single
Tasking
Multitasking
Unsure
427 319 54
Standalone or
Networked
Stand-alone Networked Unsure
124 83 3
Connectivity
Wired Wireless Unsure
24 967 9
Haptic Entry
techniques
1-
Handedness
2-
Handedness
Handsfree
356 46 598
Safe
Exploration
Safe
Exploration
NA Unsure
995 NA 5
Feedback
Instant
Feedback
Cumulative
Feedback
Unsure
964 34 2
4. SYSTEM ARCHITECTURE
This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous
computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end
servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies
like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed
architecture.
Fig.2. System Architecture
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
5
www.viva-technology.org/New/IJRI
It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually
numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and
possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to
handle a couple of obligations successfully and aid multi-venture environment inside the software. The
multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well
as context and consumer design management. The user db module enables to authenticate users. The opposite
modules along with gear, monitoring, replication, communication, localization supports various functions in the
ubiquitous computing packages.
5. CONCLUSION
This research work supplied a survey of ubiquitous computing studies. We provided a classification of
the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of
ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work
additionally presented novel device structure, a distributed outline design to support ubiquitous computing
applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing
and want to make valuable contributions to this research place.
REFERENCES
[1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”,
Proceedings of the 4th
International Conference on Mobile Technology, Applications, and Systems and the 1st International
Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007.
[2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a
Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003.
[3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM
Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000.
[4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the
International Conference on Pervasive Systems and Computing, pp. 27-30, 2005.
[5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop
on Semantic Web Services and Web Process Composition, pp. 26-42, 2004.
[6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware
Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd
European Workshop on Object Orientation and
Web Services, 2004.
[7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland,
2004.
[8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”,
Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005.
[9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based
Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012.
[10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and
Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001.
[11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE
Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002.
[12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the
Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005.
[13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers,
Vol. 14, No. 4, pp. 301-312, 2002.
[14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department
of Computer Science, School of Engineering and Technology, Pondicherry University, 2011.
[15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive
Computing”, Proceedings of the 21st
International Symposium on Computer and Information Sciences, pp. 755-764, 2006.
[16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”,
International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015.
[17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”,
Proceedings of the European Conference on Information Systems, 2005.
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6
6
www.viva-technology.org/New/IJRI
[18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009.
[19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active
Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002.
[20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous
Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications
Workshops, 2004.
[21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for
Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001.
[22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing
Environments”, Proceedings of the 3rd
International Federation for Information Processing, Vol. 97, pp. 29-43, 2002.
[23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European
Wireless, pp. 595-601, 2002.
[24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and
Applications”, Proceedings of the 3rd
International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007.
[25] Mark Weiser, “The Computer for the 21st
Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991.
[26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994.
[27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing.
[28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.

More Related Content

PDF
A survey on context aware system & intelligent Middleware’s
PDF
Software Engineering Challenges in Pervasive Computing: A review
PDF
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
PPSX
Phd defence presentation
PDF
Ambiences on the-fly usage of available resources through personal devices
PDF
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
PDF
The technologies of ai used in different corporate world
PDF
Feasibility of Artificial Neural Network in Civil Engineering
A survey on context aware system & intelligent Middleware’s
Software Engineering Challenges in Pervasive Computing: A review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Phd defence presentation
Ambiences on the-fly usage of available resources through personal devices
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
The technologies of ai used in different corporate world
Feasibility of Artificial Neural Network in Civil Engineering

What's hot (18)

PDF
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
PDF
Intelligent Internet of Things (IIoT): System Architectures and Communica...
PDF
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
PDF
K1802027780
DOCX
Insect Mointoring
PDF
New research articles 2019 may issue international journal of computer networ...
PDF
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
PDF
M1802028591
PDF
HARDWARE DESIGN FOR MACHINE LEARNING
PDF
Hardware design for_machine_learning
PDF
Analysis of programming aspects of wireless sensor networks
PDF
Cooperative hierarchical based edge-computing approach for resources allocati...
PDF
I3CON Newsletter #2
PDF
Iju top 10 cited articles -january 2021
PDF
J1802026976
PDF
Ar32704708
PDF
WF-IOT-2014, Seoul, Korea, 06 March 2014
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Intelligent Internet of Things (IIoT): System Architectures and Communica...
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
K1802027780
Insect Mointoring
New research articles 2019 may issue international journal of computer networ...
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
M1802028591
HARDWARE DESIGN FOR MACHINE LEARNING
Hardware design for_machine_learning
Analysis of programming aspects of wireless sensor networks
Cooperative hierarchical based edge-computing approach for resources allocati...
I3CON Newsletter #2
Iju top 10 cited articles -january 2021
J1802026976
Ar32704708
WF-IOT-2014, Seoul, Korea, 06 March 2014
Ad

Similar to UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware (20)

PDF
Proactive Intelligent Home System Using Contextual Information and Neural Net...
PDF
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
PDF
Toward a real time framework in cloudlet-based architecture
PDF
50120140502006
PDF
Pervasive Computing
PDF
Chap 1 libre
PDF
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
PDF
NISARCHANA Natural calamities, Machine Learning
PDF
NISARCHANA in Machine learning technology
PPTX
UBIQUITOUS COMPUTING
PDF
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineering
PDF
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
PDF
Scheduling in Virtual Infrastructure for High-Throughput Computing
PDF
Context-aware recommender system for multi-user smart home
PDF
Emergence Detection And Rescue Using Wireless Sensor Networks
PDF
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
PDF
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
PDF
Embedded Systems and Software: Enabling Innovation in the Digital Age
PDF
International Journal of Computer Science, Engineering and Applications (IJCSEA)
PDF
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Toward a real time framework in cloudlet-based architecture
50120140502006
Pervasive Computing
Chap 1 libre
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
NISARCHANA Natural calamities, Machine Learning
NISARCHANA in Machine learning technology
UBIQUITOUS COMPUTING
Breaking the Walls: A Unified Vision on Context-Oriented Software Engineering
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
Scheduling in Virtual Infrastructure for High-Throughput Computing
Context-aware recommender system for multi-user smart home
Emergence Detection And Rescue Using Wireless Sensor Networks
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
Embedded Systems and Software: Enabling Innovation in the Digital Age
International Journal of Computer Science, Engineering and Applications (IJCSEA)
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
Ad

More from vivatechijri (20)

PDF
Design and Implementation of Water Garbage Cleaning Robot
PDF
Software Development Using Python Language For Designing Of Servomotor
PDF
GSM Based Controlling and Monitoring System of UPS Battery
PDF
Electrical Drive Based Floor Cleaning Robot
PDF
IoT BASED FIRE EXTINGUISHER SYSTEM with IOT
PDF
Wave Energy Generation producing electricity in future
PDF
Predictive Maintenance of Motor Using Machine Learning
PDF
Development of an Android App For Designing Of Stepper Motor By Kodular Software
PDF
Implementation Technology to Repair Pothole Using Waste Plastic
PDF
NFC BASED VOTING SYSTEM with Electronic voting devices
PDF
Review on Electrical Audit Management in MATLAB Software.
PDF
DESIGN AND FABRICATION OF AUTOMATIC CEMENT PLASTERING MACHINE
PDF
Research on Inspection Robot for Chemical Industry
PDF
Digital Synchroscope using Arduino microcontroller
PDF
BLDC MACHINE DESIGN SOFTWARE AND CALCULATION
PDF
SIMULATION MODEL OF 3 PHASE TRANSMISSION LINE FAULT ANALYSIS
PDF
Automated Water Supply and Theft Identification Using ESP32
PDF
Multipurpose Swimming Pool Cleaning Device for Observation, Cleaning and Life...
PDF
Annapurna – Waste Food Management system
PDF
A One stop APP for Personal Data management with enhanced Security using Inte...
Design and Implementation of Water Garbage Cleaning Robot
Software Development Using Python Language For Designing Of Servomotor
GSM Based Controlling and Monitoring System of UPS Battery
Electrical Drive Based Floor Cleaning Robot
IoT BASED FIRE EXTINGUISHER SYSTEM with IOT
Wave Energy Generation producing electricity in future
Predictive Maintenance of Motor Using Machine Learning
Development of an Android App For Designing Of Stepper Motor By Kodular Software
Implementation Technology to Repair Pothole Using Waste Plastic
NFC BASED VOTING SYSTEM with Electronic voting devices
Review on Electrical Audit Management in MATLAB Software.
DESIGN AND FABRICATION OF AUTOMATIC CEMENT PLASTERING MACHINE
Research on Inspection Robot for Chemical Industry
Digital Synchroscope using Arduino microcontroller
BLDC MACHINE DESIGN SOFTWARE AND CALCULATION
SIMULATION MODEL OF 3 PHASE TRANSMISSION LINE FAULT ANALYSIS
Automated Water Supply and Theft Identification Using ESP32
Multipurpose Swimming Pool Cleaning Device for Observation, Cleaning and Life...
Annapurna – Waste Food Management system
A One stop APP for Personal Data management with enhanced Security using Inte...

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
PPT on Performance Review to get promotions
PPTX
web development for engineering and engineering
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Welding lecture in detail for understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Construction Project Organization Group 2.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT on Performance Review to get promotions
web development for engineering and engineering
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Welding lecture in detail for understanding
bas. eng. economics group 4 presentation 1.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT 4 Total Quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
Construction Project Organization Group 2.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Mechanical Engineering MATERIALS Selection
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Embodied AI: Ushering in the Next Era of Intelligent Systems

UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware

  • 1. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 1 www.viva-technology.org/New/IJRI UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware Pallavi Vartak 1 1 (Computer Engineering Department, VIVA Institute of Technology, India) Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that gears communication technologies into routine life accomplishments. This study paper affords a types of the studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting, this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary for exceptional-of-provider assertion of ubiquitous computing.. Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive Computing Middleware. 1. INTRODUCTION The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces, invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices to the factor in which their use is transparent. For lots of packages transparent operation requires that the device be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In ubiquitous computing environments computation is embedded. With advancements in laptop technological knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in networked and standalone surroundings and capable of conversation with the human and with each different. Those devices support context-conscious software, nomadic customers, area aware services, and cell records access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while making the presence of the machine “invisible” to the consumer. 1.2 Traits of Ubiquitous Computing (Ubicom) Systems Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29] specifically distributed computation, invisibility, and context-attention. The distributed computation method the computer systems/structures need to be networked, dispensed and transparently on hand. They could have interaction with human beings in addition to with each other’s. the invisibility property approach that the computer interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is contextattention that implies that so as to optimize device operation of their physical and human surroundings it's far necessary to make the structures aware about environmental context. Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that ubiquitous computing aim is to help users in everyday existence.
  • 2. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 2 www.viva-technology.org/New/IJRI The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or usable in many instances in exercise to aid all 5 middle properties. Fig.1. Five Properties of Ubiquitous Computing 2. LITERATURE SURVEY This study is going to include extensive research about the ubiquitous computing as well as its influence on the users. We will also examine the different techniques, mechanisms and design principles. 2.1 Service Composition Mechanisms The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of combining the existing services. Researchers have substantially studied and discover a function of the ever-present computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc way. In amigo [12], the focal point of the provider composition mechanism used was to construct an “international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are used to map sources on gadgets into principles in the ontology. We located that during service composition three characteristics are needed namely, usability, adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific environment and context. The performance is the belongings of the machine to provide appropriate response and overall performance to the user requests or movements within a stipulated time. The three traits we have mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need and possibility of research to be had within the service composition mechanisms. 2.2 Context-Aware Systems And Design Principles Region information based totally context-conscious structures are extensively utilized by customers in their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts, eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge locations. To acquire region information diverse sensors and modules are to be had which include gps satellites, mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer offerings to the user primarily based on the detected location. In context-conscious device challenge majority of them used and focused most effective on the vicinity awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors
  • 3. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 3 www.viva-technology.org/New/IJRI consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive, efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm. Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes approaches for sensory information acquisition for sensory records acquisition. The principles of the context-conscious device designing encompass strategies of context information acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3 one-of-a-kind context management models: widgets, networked services and blackboard model. We observed that the prevailing answers and research efforts specially focused and used physical sensors for context attention. However, we believed that logical and digital sensors also are useful and able to offering more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and structures. 2.3 Pervasive Computing Middlewares The aim of pervasive computing is to create a smart environment the usage of embedded sensors and networked computing gadgets that offer customers transparent get entry to of services. Examples of current pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15] and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree implementation information. Another characteristic of pervasive middleware systems is to offer management of system sources together with ser-vice management, context management and data control of context the usage of ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology. 3. USER SURVEY To identify person requirements for consumer interface design and features of ubiquitous gadgets, we performed a user survey of 1000 engineering students. Even though the range of people participated within the survey are very small in numbers and some distance from supplying end but it presents an indicative figures of consumer preferences [20]. The survey included following seven questions. To every person identical set of questions and alternatives have been given. The table shown below provides a detailed view about the survey. Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819 customers favored a smart tool single user operated, 96 customers preferred more than one person operated and 85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519 customers’ favored multi-task operations and 54 users genuinely don’t care. A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall 967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually don’t care. What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored hand-unfastened input technique. Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964 customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.
  • 4. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 4 www.viva-technology.org/New/IJRI Table.1. Survey results [20] Using a Smart Tool Single User Multiple User Neutral 819 96 85 Tasking Single Tasking Multitasking Unsure 427 319 54 Standalone or Networked Stand-alone Networked Unsure 124 83 3 Connectivity Wired Wireless Unsure 24 967 9 Haptic Entry techniques 1- Handedness 2- Handedness Handsfree 356 46 598 Safe Exploration Safe Exploration NA Unsure 995 NA 5 Feedback Instant Feedback Cumulative Feedback Unsure 964 34 2 4. SYSTEM ARCHITECTURE This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed architecture. Fig.2. System Architecture
  • 5. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 5 www.viva-technology.org/New/IJRI It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to handle a couple of obligations successfully and aid multi-venture environment inside the software. The multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well as context and consumer design management. The user db module enables to authenticate users. The opposite modules along with gear, monitoring, replication, communication, localization supports various functions in the ubiquitous computing packages. 5. CONCLUSION This research work supplied a survey of ubiquitous computing studies. We provided a classification of the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work additionally presented novel device structure, a distributed outline design to support ubiquitous computing applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing and want to make valuable contributions to this research place. REFERENCES [1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”, Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007. [2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003. [3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000. [4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the International Conference on Pervasive Systems and Computing, pp. 27-30, 2005. [5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop on Semantic Web Services and Web Process Composition, pp. 26-42, 2004. [6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd European Workshop on Object Orientation and Web Services, 2004. [7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland, 2004. [8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”, Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005. [9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012. [10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001. [11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002. [12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005. [13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers, Vol. 14, No. 4, pp. 301-312, 2002. [14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department of Computer Science, School of Engineering and Technology, Pondicherry University, 2011. [15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing”, Proceedings of the 21st International Symposium on Computer and Information Sciences, pp. 755-764, 2006. [16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”, International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015. [17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”, Proceedings of the European Conference on Information Systems, 2005.
  • 6. Volume 1, Issue 1 (2018) Article No. 2 PP 1-6 6 www.viva-technology.org/New/IJRI [18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009. [19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002. [20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. [21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001. [22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments”, Proceedings of the 3rd International Federation for Information Processing, Vol. 97, pp. 29-43, 2002. [23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European Wireless, pp. 595-601, 2002. [24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and Applications”, Proceedings of the 3rd International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007. [25] Mark Weiser, “The Computer for the 21st Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991. [26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994. [27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing. [28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.