31,637 results on '"Ubiquitous computing"'
Search Results
152. Digitalisierungskritik mit Walter Benjamin
- Author
-
Bohlmann, Markus, Krämer, Sybille, Series Editor, Noller, Jörg, Series Editor, Rehbein, Malte, Series Editor, and Bohlmann, Markus
- Published
- 2022
- Full Text
- View/download PDF
153. Contextual Behavior Evaluation Design for an Artistic Research Setting
- Author
-
Spindler, Cedric, Kellermeyer, Jonas, Torpus, Jan, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Stephanidis, Constantine, editor, Antona, Margherita, editor, and Ntoa, Stavroula, editor
- Published
- 2022
- Full Text
- View/download PDF
154. A Hybrid Model Based on Behavioural and Situational Context to Detect Best Time to Deliver Notifications on Mobile Devices
- Author
-
Kamal, Rashid, McCullagh, Paul, Cleland, Ian, Nugent, Chris, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, and García Márquez, Fausto Pedro, editor
- Published
- 2022
- Full Text
- View/download PDF
155. Touchless Biometric User Authentication Using ESP32 WiFi Module
- Author
-
Makwana, Rikesh, Shaikh, Talal, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Ullah, Abrar, editor, Anwar, Sajid, editor, Rocha, Álvaro, editor, and Gill, Steve, editor
- Published
- 2022
- Full Text
- View/download PDF
156. iSenseYourPain: Ubiquitous Chronic Pain Evaluation through Behavior-Change Analysis
- Author
-
Ciman, Matteo, Wac, Katarzyna, editor, and Wulfovich, Sharon, editor
- Published
- 2022
- Full Text
- View/download PDF
157. Machine Learning and IoT Applied to Cardiovascular Diseases Identification Through Heart Sounds: A Literature Review
- Author
-
Brites, Ivo S. G., Silva, Lídia M., Barbosa, Jorge L. V., Rigo, Sandro J., Correia, Sérgio D., Leithardt, Valderi R. Q., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Rocha, Álvaro, editor, Ferrás, Carlos, editor, Méndez Porras, Abel, editor, and Jimenez Delgado, Efren, editor
- Published
- 2022
- Full Text
- View/download PDF
158. Smart Technologies in Agriculture as the Basis of Its Innovative Development: AI, Ubiquitous Computing, IoT, Robotization, and Blockchain
- Author
-
Savelyeva, Nadezhda K., Semenova, Alla A., Popova, Larisa V., Shabaltina, Larisa V., Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Popkova, Elena G., editor, and Sergi, Bruno S., editor
- Published
- 2022
- Full Text
- View/download PDF
159. Building a Crowdsensing Platform Based on Spatio-Temporal Fencing
- Author
-
Miyagawa, Nobuhito, Tsuchimoto, Ryoga, Suzaki, Shota, Kaji, Katsuhiko, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Hara, Takahiro, editor, and Yamaguchi, Hirozumi, editor
- Published
- 2022
- Full Text
- View/download PDF
160. A Novel Survey on Ubiquitous Computing
- Author
-
Dhyani, Kshitij, Bhachawat, Saransh, Prabhu, J., Kumar, M. Sandeep, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Jacob, I. Jeena, editor, Kolandapalayam Shanmugam, Selvanayaki, editor, and Bestak, Robert, editor
- Published
- 2022
- Full Text
- View/download PDF
161. Rethinking Access Control Mechanism for Ubiquitous Computing
- Author
-
Mhetre, Nalini, Deshpande, A. V., Mahalle, Parikshit N., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Tuba, Milan, editor, Akashe, Shyam, editor, and Joshi, Amit, editor
- Published
- 2022
- Full Text
- View/download PDF
162. An Approach to Ensure High-Availability Deployment of IoT Devices
- Author
-
Mohan, Abishaik, Seetharaman, Balaji, Janarthanan, P., Chlamtac, Imrich, Series Editor, Raj, Pethuru, editor, Dubey, Ashutosh Kumar, editor, Kumar, Abhishek, editor, and Rathore, Pramod Singh, editor
- Published
- 2022
- Full Text
- View/download PDF
163. Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges
- Author
-
Li, Zheng, Pradena Miquel, Mauricio, Pinacho-Davidson, Pedro, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Zhang, Yu-Dong, editor, Senjyu, Tomonobu, editor, So-In, Chakchai, editor, and Joshi, Amit, editor
- Published
- 2022
- Full Text
- View/download PDF
164. Human Interaction with Embedded Systems
- Author
-
Murti, KCS, Chakrabarti, Amlan, Series Editor, and Murti, KCS
- Published
- 2022
- Full Text
- View/download PDF
165. Unobtrusive and personalised monitoring of Parkinson's disease using smartphones
- Author
-
Vega Hernandez, Julio, Jay, Caroline, Harper, Simon, and Vigo, Markel
- Subjects
004 ,Digital Health ,Smartphone ,Ubiquitous Computing ,Parkinson's Disease ,Precision Medicine ,Unobtrusive Monitoring - Abstract
Parkinson's Disease is a neurodegenerative condition with no cure and a wide variety of idiosyncratic motor and non-motor symptoms that impact people's quality of life. In infrequent and short clinical consultations, health care professionals use validated clinical scales that are time-consuming and rely on clinical expertise or patients' perception. Moreover, symptoms can fluctuate within or between days due to the natural progression of the disease or medication and thus, a short session only provides a snapshot and not a longitudinal image of the disease. In practice, it is difficult for clinicians to tailor treatments and medication to each person's symptoms. Therefore, a granular, continuous, and objective methodology to track symptom fluctuations would improve patients' quality of life and make health services more efficient. The complexity of Parkinson's makes it a challenging but suitable study case to investigate new personalised approaches supported by technology and tailored to each patient's condition. This work aims to explore the use of behavioural inferences extracted from smartphone data to track the fluctuations in Parkinson's Disease symptoms. We recruited 7 participants with early Parkinson's (Hoehn & Yahr scale ≤ 3), instrumented their personal Android and iOS mobiles, and collected a dataset with up to 22 data sources, 24/7, during 222 to 380 days and within the technological, ethical, and UX limitations of a real-world deployment. As part of this dataset, we assessed their symptom severity using four clinical scales and seven cognitive tests every six weeks and patients self-reported the severity of their three main symptoms on a daily basis. Through an agile iterative design process, we generated knowledge that supports ground truth collection for longitudinal Parkinson's tracking. We identified five design implications for future Parkinson's self-reporting tools. We published PaperStream, an open-source tool to create and encode questionnaires or surveys automatically. Also, we created a paper diary that blends digital and analogue data collection which participants used to gather daily self-reported symptom severity scores with average answer compliance of 96.39% (SD=0.05) among 7 participants monitored between 222 and 380 days. We created an adaptative method to track weekly self-reported fluctuations in pain, gait and fatigue, the first one of its kind for Parkinson's Precision Medicine. Our method adapts to an individual's condition (personalised) and tracks symptoms while participants carry on with their regular lives (naturalistic), over time (longitudinal) and without people's input (unobtrusive). Instead of relying on the structure of the collected smartphone data to find patterns, our method starts with a generalised set of predictions based on mobility and activity recognition features that are overfitted to each patient's symptoms. We showed that this method tracks fluctuations better than chance with an agreement measured by Cohen's kappa between 0.19 and 0.53 finding a different subset of predictions for each participant. Also, exploring how this method can be deployed in the real world, we show that splitting our dataset into personalisation/testing sets is not a suitable strategy to identify a relevant subset of smartphone features to track symptoms on unseen data. Our results should be considered under the assumptions we made when we designed our method as well as the three primary sources of error in our methodology: the validity of the smartphone features, the confounders in participants behaviour, and the drawbacks of self-reporting. Nonetheless, this work is evidence that the unobtrusive and personalised monitoring methodology we proposed has the potential to track fluctuations in Parkinson's symptoms with the most impact on patients' daily life. Thus, we encourage researchers to tackle questions that remain open: how can we refine the mobility and activity recognition smartphone features we used? What other behavioural areas and smartphone features can be exploited to monitor other motor and non-motor symptoms? What other ground truth collection methods can minimise the problems related to analogue selfreported data? What is the clinical and self-management utility of the weekly fluctuations we tracked with our personalised models? What parameters and models of our method can be improved? Moreover, in the future, how can we include people with Parkinson's in the development and evaluation of their personalised models?
- Published
- 2019
166. Comprehensive machine and deep learning analysis of sensor-based human activity recognition.
- Author
-
Balaha, Hossam Magdy and Hassan, Asmaa El-Sayed
- Subjects
- *
HUMAN activity recognition , *MACHINE learning , *DEEP learning , *BODY area networks , *FEATURE extraction , *UBIQUITOUS computing , *EXTRACTION techniques - Abstract
Human Activity Recognition (HAR) is a crucial research focus in the body area networks and pervasive computing domains. The goal of HAR is to examine activities from raw sensor data, video sequences, or even images. It aims to classify input data correctly into its underlying category. In the current study, machine and deep learning approaches along with different traditional dimensionality reduction and TDA feature extraction techniques are suggested to solve the HAR problem. Two public datasets (i.e., WISDM and UCI-HAR) are used to conduct the experiments. Different data balancing techniques are utilized to deal with the problem of imbalanced data. Additionally, a sampling mechanism with two overlapping percentages (i.e., 0% and 50%) is applied to each dataset to retrieve four balanced datasets. Five traditional dimensionality reduction techniques in addition to the Topological Data Analysis (TDA) are utilized. Seven machine learning (ML) algorithms are used to perform HAR where six of them are ensemble classifiers. In addition to that, 1D-CNN, BiLSTM, and GRU deep learning approaches are utilized. Three categories of experiments (i.e., ML with traditional features, ML with TDA, and DL) are applied. For the first category experiments, the best-reported scores concerning the WISDM dataset are accuracy and WSM of 99.10% and 86.61%, respectively. When concerning the UCI-HAR dataset, the best-reported scores are accuracy and WSM of 100% and 100%, respectively. For the second category experiments, the best-reported scores concerning the WISDM dataset are accuracy and WSM of 95.34% and 89.62%, respectively. When concerning the UCI-HAR dataset, the best-reported scores are accuracy and WSM of 96.70% and 92.57%, respectively. For the third category experiments, the best-reported scores concerning the WISDM dataset are accuracy and WSM of 99.90% and 99.76%, respectively. When concerning the UCI-HAR dataset, the best-reported scores are accuracy and WSM of 100% and 100%, respectively. After concluding the final results, the suggested approach is compared with 6 related studies utilizing the same dataset(s). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
167. Building a pervasive social gaming experience using SocialPG.
- Author
-
Valera‐Aranguren, Ramón, Rodriguez, Patricia Paderewski, Vela, Francisco Luis Gutierrez, Arango‐López, Jeferson, and Moreira, Fernando
- Subjects
- *
UBIQUITOUS computing , *SOFTWARE architecture , *STRATEGY games - Abstract
Pervasive computing has become a key element to build applications that use fun as a motivating component because it allows exploring new interaction schemes by making the concept of space and time ambiguous and confusing. The present research describes a pervasive social gaming experience, using as a reference SocialPG, which is a model that describes social expansion as a strategy to improve gaming experiences supported by pervasive computing. In this article a description of the model is offered, software architecture is proposed to support it and a case study related to the process of error resolution and detection of improvement opportunities in software products is developed, finally, a general idea about the final software product that will support the game experience is offered together with an evaluation performed by a set of users, where some important findings are highlighted, such as the importance of the missions as a unit of cooperative work and the spectator's participation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
168. Design and Development of a Mobile-based Caretaking System for the Elderly People in Thailand: A Design Thinking Approach.
- Author
-
Kulrattanarak, Chuwong, Anantaransi, Patarapornkan, Kanchanarusmeechoti, Pasin, Suwannapasri, Natthorn, Weeramongkolkul, Manapat, Mekintharanggur, Dhanabodee, Kamolrattanawech, Panoj, Vanichayangkuranont, Supatach, Koomgreng, Sirathee, Kitnarong, Varis, Saetoen, Suparuek, Ornwichian, Sippakorn, and Pyae, Aung
- Subjects
- *
OLDER people , *DESIGN thinking , *ELDER care , *UBIQUITOUS computing , *MOBILE computing - Abstract
As the ageing population has become a global phenomenon in the past few decades, it has brought several issues to many countries (e.g., aged care). Thailand has one of the highest ageing populations in the region, which has challenged society to find a feasible solution for promoting the elderly's quality of life while considering the vital role of caregivers in the aged care context. Thanks to the advances in ubiquitous mobile computing, mobile-based applications have become promising for the aged care sector. However, a limited number of mobile-based applications can cater to the needs of the elderly and caregivers, particularly in Thailand. Using the design thinking approach, we developed an innovative elderly caretaking system called 'Aegis' to effectively manage aged care by caregivers. Using this system, the elderly can effectively communicate with their caregivers, while the latter can easily support what the elderly need. We conducted a usability evaluation of 'Aegis' with three elderly-caregiver pairs in Thailand. The findings show that the 'Aegis' is useful in promoting the quality of life for the elderly and caregivers while considering the importance of user-friendly interface design and experiences. The usability recommendations suggested by this study can help HCI researchers understand design guidelines for intergenerational digital technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
169. Design and Development of a User-Centered Mobile Application for Intermodal Public Transit in Bangkok: A Design Thinking Approach.
- Author
-
Vittayaphorn, Nantanit, Lohaburananont, Gawin, Bhumtakwong, Jinnipha, Udompongsanont, Kritasak, Uchida, Mami, Asavarojkul, Napat, Rodphol, Phatsakorn, Sajjapong, Pongsapak, Boonribsong, Rapeekorn, Chanthateyanonth, Sahutchai, Julerttrakul, Tanaseth, and Pyae, Aung
- Subjects
- *
PUBLIC transit , *MOBILE apps , *DESIGN thinking , *UBIQUITOUS computing , *USER interfaces - Abstract
With the constant increase in public transit coverage in Bangkok Metropolitan Area in Thailand, many people are still hesitant to switch from using private to public transit, with one potential cause being the unavailability and difficulty in accessing accurate and timely information about their itineraries, while they are commuting. To assess and tackle such issues, the researchers adopted the user-centric Design Thinking methodology to empathize with target users' pain points in this study. They proposed a solution in a user-centric manner by assessing the usability flaws of existing mobile navigation applications, such as Google Maps and ViaBus. By developing a holistic mobile application called 'Disgovery' that covers all modes of public transit in the Bangkok Metropolitan Area and provides relevant information about their trips, the researchers aim to help commuters in Bangkok easily access it in a timely fashion. Through the user-friendly interface, commuters can eliminate the difficulty of finding routes and prices suitable to their needs. By making public transit more accessible with the help of ubiquitous mobile computing, commuters are also encouraged to switch from using private vehicles to public transit, which also can reduce accidents and carbon emissions. The findings from the usability testing in this study suggest that 'Disgovery' is an effective and user-friendly application for daily commuters in Bangkok that can help them achieve their goals without difficulties. The findings also indicate the importance of user interface and user experience guidelines in designing such applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
170. The Polyopticon: a diagram for urban artificial intelligences.
- Author
-
Sherman, Stephanie
- Subjects
- *
ARTIFICIAL intelligence , *INDUSTRY 4.0 , *SMART cities , *SOCIAL impact , *ARCHITECTURAL design , *UNIFIED modeling language - Abstract
Smart city discourses often invoke the Panopticon, a disciplinary architecture designed by Jeremy Bentham and popularly theorized by Michel Foucault, as a model for understanding the social impact of AI technologies. This framing focuses attention almost exclusively on the negative ramifications of Urban AI, correlating ubiquitous surveillance, centralization, and data consolidation with AI development, and positioning technologies themselves as the driving factor shaping privacy, sociality, equity, access, and autonomy in the city. This paper describes an alternative diagram for Urban AI—the Polyopticon: a distributed, polyvalent, multi-modal network of synthetic intelligences. It posits that fourth industrial revolution technologies change the political, social, and psychodynamic relationships of sentience and witness in the city, shifting the effects of watching and watched beyond the exclusive domain of top-down surveillance and discipline. The Polyopticon poses a more expansive and ambivalent spectrum of possibilities for Urban AI scenarios, one that undermines the totalizing, singular, and cerebral notion of intelligence that so often characterizes Urban AI and smart city critiques. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
171. An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity.
- Author
-
Meshram, Akshaykumar, Alouane-Turki, Monia Hadj, Wazalwar, N. M., and Meshram, Chandrashekhar
- Subjects
DATA privacy ,ANONYMITY ,SMART devices ,INFRASTRUCTURE (Economics) ,INTERNET of things ,IMAGE encryption ,UBIQUITOUS computing - Abstract
Internet of Things (IoT) applications can be found in various industry areas, including critical infrastructure and healthcare, and IoT is one of several technological developments. As a result, tens of billions or possibly hundreds of billions of devices will be linked together. These smart devices will be able to gather data, process it, and even come to decisions on their own. Security is the most essential thing in these situations. In IoT infrastructure, authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit (e.g., via client identification and provision of secure communication). It is still challenging to create secure, authenticated key exchange techniques. The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing, hashing, or modular exponentiation processes. The focus of this paper is to propose an efficient three-party authenticated key exchange procedure (AKEP) using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above. The proposed three-party AKEP is protected from several attacks. The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications, according to statistical experiments and low processing costs. To protect client identification when transferring data over an insecure public network, our three-party AKEP may also offer client anonymity. Finally, the presented procedure offers better security features than the procedures currently available in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
172. Context Awareness in Recognition of Affective States: A Systematic Mapping of the Literature.
- Author
-
Dorneles, Sandro Oliveira, Francisco, Rosemary, Barbosa, Débora Nice Ferrari, and Barbosa, Jorge Luis Victória
- Subjects
- *
AFFECTIVE computing , *AFFECT (Psychology) , *UBIQUITOUS computing , *RESEARCH questions , *AWARENESS - Abstract
Studies indicate the growth and relevance of systems that can recognize affective states in the most different areas. A tendency to more natural environments could be noticed that considering physical or physiological signs and the individual's relationship with the environment, other people, and daily activities. Therefore, what is the importance of combining ubiquitous computing, affective computing, and the contributions of context-aware information to provide more accurate and intelligent affective systems? This study presents a systematic literature mapping about the use of contextual information to identify affective states, which covered articles published between 2010 and October 2021, resulting in 1.638 studies. After applying filters, which we explain further in this article, we selected 49 works to answer a set of research questions. The results indicate that physiological data was the main parameter for recognizing affective signs (62.3%, 33/53), followed by visual data (32.1%, 17/53). The links between context and affective signs presented a more significant occurrence in the combination of contexts related to activities and physiological data (34%, 18/53). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
173. To Transfer or Not to Transfer and Why? Meta-Transfer Learning for Explainable and Controllable Cross-Individual Activity Recognition.
- Author
-
Shen, Qiang, Teso, Stefano, Giunchiglia, Fausto, and Xu, Hao
- Subjects
HUMAN activity recognition ,MACHINE learning ,UBIQUITOUS computing ,HUMAN behavior - Abstract
Human activity recognition (HAR) plays a central role in ubiquitous computing applications such as health monitoring. In the real world, it is impractical to perform reliably and consistently over time across a population of individuals due to the cross-individual variation in human behavior. Existing transfer learning algorithms suffer the challenge of "negative transfer". Moreover, these strategies are entirely black-box. To tackle these issues, we propose X-WRAP (eXplain, Weight and Rank Activity Prediction), a simple but effective approach for cross-individual HAR, which improves the performance, transparency, and ease of control for stakeholders in HAR. X-WRAP works by wrapping transfer learning into a meta-learning loop that identifies the approximately optimal source individuals. The candidate source domains are ranked using a linear scoring function based on interpretable meta-features capturing the properties of the source domains. X-WRAP is optimized using Bayesian optimization. Experiments conducted on a publicly available dataset show that the model can effectively improve the performance of transfer learning models consistently. In addition, X-WRAP can provide interpretable analysis according to the meta-features, making it possible for stakeholders to get a high-level understanding of selective transfer. In addition, an extensive empirical analysis demonstrates the promise of the approach to outperform in data-sparse situations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
174. Deep SE-BiLSTM with IFPOA Fine-Tuning for Human Activity Recognition Using Mobile and Wearable Sensors.
- Author
-
Jameer, Shaik and Syed, Hussain
- Subjects
- *
WEARABLE technology , *HUMAN activity recognition , *OPTIMIZATION algorithms , *DEEP learning , *UBIQUITOUS computing , *BEHAVIORAL assessment , *FEATURE extraction - Abstract
Pervasive computing, human–computer interaction, human behavior analysis, and human activity recognition (HAR) fields have grown significantly. Deep learning (DL)-based techniques have recently been effectively used to predict various human actions using time series data from wearable sensors and mobile devices. The management of time series data remains difficult for DL-based techniques, despite their excellent performance in activity detection. Time series data still has several problems, such as difficulties in heavily biased data and feature extraction. For HAR, an ensemble of Deep SqueezeNet (SE) and bidirectional long short-term memory (BiLSTM) with improved flower pollination optimization algorithm (IFPOA) is designed to construct a reliable classification model utilizing wearable sensor data in this research. The significant features are extracted automatically from the raw sensor data by multi-branch SE-BiLSTM. The model can learn both short-term dependencies and long-term features in sequential data due to SqueezeNet and BiLSTM. The different temporal local dependencies are captured effectively by the proposed model, enhancing the feature extraction process. The hyperparameters of the BiLSTM network are optimized by the IFPOA. The model performance is analyzed using three benchmark datasets: MHEALTH, KU-HAR, and PAMPA2. The proposed model has achieved 99.98%, 99.76%, and 99.54% accuracies on MHEALTH, KU-HAR, and PAMPA2 datasets, respectively. The proposed model performs better than other approaches from the obtained experimental results. The suggested model delivers competitive results compared to state-of-the-art techniques, according to experimental results on four publicly accessible datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
175. High-throughput and area-efficient architectures for image encryption using PRINCE cipher.
- Author
-
Kumar, Abhiram, Singh, Pulkit, Patro, K Abhimanyu Kumar, and Acharya, Bibhudendra
- Subjects
- *
IMAGE encryption , *BLOCK ciphers , *UBIQUITOUS computing , *CIPHERS , *PRINCES , *IMAGE analysis - Abstract
Internet of Things (IoT) has gained popularity in recent years and has engulfed nearly every industry. The widespread use of numerous ubiquitous computing devices in the low-resource domain has resulted in a new set of privacy and security concerns. To address the problem of security in resource-constrained devices, many lightweight algorithms have been developed. This paper proposes optimized hardware implementations of the lightweight PRINCE block cipher, with the aim of providing adequate security while maximizing resource efficiency. The proposed architecture uses fewer resources and provides a reasonable trade-off between area footprint and efficiency. In the proposed unrolled pipelined architecture, the encryption round is divided into three sub-stages, with registers inserted in between. Using this design approach, the operating frequency is greatly improved. As a result, this architecture adapts itself effectively to high-performance applications. This paper also proposes serial-based and round-based architectures for resource-constrained devices. The proposed unrolled sub pipeline PRINCE block cipher is implemented on the Virtex-6-FF784 and Virtex-4-FF668 FPGA device families and achieved substantial improvements in throughput of 13.057% and 113%, respectively, as well as efficiency of 8.109% and 113.734% respectively. The proposed architecture is evaluated on a variety of grayscale images, and the security analysis is performed using MATLAB software. Aside from that, the proposed architecture uses the CBC-mode of operation. The security analysis and encryption outputs show that the proposed architecture is an effective choice for image encryption and provides sufficient security to the cipher images. • Propose a serial architecture which reduces the number of utilized resources that suggests reduction in area for resource constrained devices. • Propose an unrolled pipeline architecture which achieves high throughput, and low latency implementation. • Propose a round-based architecture and provides a comparison of all proposed designs with existing implementations. • All the implementations are analyzed by using different security analyses for image encryption applications that secure their immunity against various statistical and differential attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
176. IoMT-based smart healthcare monitoring system using adaptive wavelet entropy deep feature fusion and improved RNN.
- Author
-
Akhtar, MD. Mobin, Shatat, Raid Saleh Ali, Shatat, Abdallah Saleh Ali, Hameed, Shabi Alam, and Ibrahim Alnajdawi, Sakher
- Subjects
ENTROPY ,CONVOLUTIONAL neural networks ,HEALTH care industry ,MEDICAL personnel ,UBIQUITOUS computing - Abstract
With the help of pervasive computing, human living has changed into a smarter way using the developments in IoMT, telecommunication technologies, and wearable sensors for ensuring improved healthcare services. IoMT is comprised of certain potentiality for the revolution in the healthcare industry. IoMT is associated with caregivers, healthcare providers, patients, and wearable sensors with software and ICT. The healthcare industry is also a well-known expanding market that has huge demands. It ensures the potential services towards the patients and also provides its contributions to the profits of the health sector. According to the technical advancements, a healthcare system must be developed based on decision-making capacity. Numerous researchers have also focused on involving cognitive behavior in IoT technology. Thus, in this paper, a new smart healthcare system with the help of IoT devices is suggested. Initially, the data is collected from IoMT devices, which are fed to further processing. Secondly, the data pre-processing is carried out to remove the corrupted data and for removing the noise from the data. Thirdly, the features are collected from the pre-processed data through wavelet entropy computation, and deep features are gathered using CNN. Fourthly, both extracted wavelet entropy features and deep features have undergone an adaptive fusion process using an improved meta-heuristic algorithm, thus termed adaptive wavelet entropy deep feature fusion. Finally, the classification is performed through I-RNN to get the disease-related outcomes, where the weight of RNN is optimized using a new MVS-AVOA. Through the evaluation, the performance analysis of the proposed MVS-AVOA-RNN has 41.5% better than Naive Bayes, 26.8% better than SRU, 18.3% superior to LSTM, and 5.4% enriched than RNN. Thus, the obtained result reveals that the proposed optimized RNN with an advanced feature set supersedes the aforementioned techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
177. Smart Bandwidth Prediction, Power Management and Adaptive Network Coding for WSN.
- Author
-
Vanitha, Gopalsamy, Amudha, Palaniswamy, and Sivakumari, Subramaniam Pillai
- Subjects
BANDWIDTH allocation ,LINEAR network coding ,ARTIFICIAL intelligence ,BANDWIDTHS ,UBIQUITOUS computing ,ENERGY consumption - Abstract
WSN has been widely used in many sensitive applications and it also has novel possibilities for laying the groundwork for using ubiquitous and pervasive computing, but it has also presented a number of issues and challenges, such as a dynamic network topology and a congestion problem that hinders not only network bandwidth utilisation but also performance. Proficient rate control and fair bandwidth allocation (PRC-FBA) was one of the schemes in the literature to solve issues of WSN by combining the ideas of traffic class priority and bandwidth fairness. However, because of the nature of WSN, the energy of nodes near the sink node is diminished when packets move from lowly congested nodes to highly congested nodes. This paper proposes a proficient rate control with data aggregation and fair bandwidth allocation (PRCDA-FBA) to address this problem by using an effective data aggregation approach for reducing the number of transmissions. In the proposed method, fair bandwidth allocation is simplified by an artificial intelligence-based bandwidth prediction method. Thus, PRCDA-FBA increases the network's durability. Despite having lower bandwidth utilizations, energy-critical sensor nodes require careful power management to avoid being eavesdropped upon. Along with data aggregation and fair bandwidth allocation, the effects of overhearing packets by energy-critical nodes are mitigated through network-wide route adjustments based on the energy level of nodes. Thus, in the proposed method, data aggregation is scheduled based on the availability of bandwidth, energy, queue size and packet priority. The proposed method is named as energy-aware proficient rate control with data aggregation and fair bandwidth allocation (EPRCDA-FBA). The proposed algorithms have been deployed on the Network Simulator 2.35 platform, and a comparative analysis has been performed using several metrics, including throughput, packet loss, End-to-End (E2E) delay and energy utilization. The EPRCDA-FBA method archives highest throughput which is 9.17%, 5.48%, 4.68% and 2.45% higher than congestion control strategies like discrete-time sliding mode congestion controller (DSMC), weighted priority based fair queue gradient rate control (WPFQGRC), PRC-FBA and rate adjustment-based congestion control (RACC). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
178. A Context-Aware Edge Computing Framework for Smart Internet of Things.
- Author
-
Ben Sada, Abdelkarim, Naouri, Abdenacer, Khelloufi, Amar, Dhelim, Sahraoui, and Ning, Huansheng
- Subjects
CONTEXT-aware computing ,EDGE computing ,LINKED data (Semantic Web) ,INTERNET of things ,UBIQUITOUS computing ,AMBIENT intelligence ,SMART cities - Abstract
The data explosion caused by the rapid and widespread use of IoT devices is placing tremendous pressure on current communication, computing and storage resources. In an ambient ubiquitous computing environment, taking advantage of the context of the application scenario can significantly improve the system performance of IoT networks. Therefore, in this paper, we propose CONTESS, a context-aware edge computing framework with selective sensing that leverages the context information of the sensed environment to improve its applicability to smart IoT systems. CONTESS is composed of two parts: context management, where context acquisition, modeling and reasoning happens; and selective sensing, where data selection happens. We demonstrate the capabilities of CONTESS in the scenario of a parking management system for a smart city environment. We implement CONTESS using linked data and semantic web technologies. We start by designing an OWL-based ontology and then simulating the proposed scenario using the OMNET++ network simulator along with the Veins framework and SUMO traffic simulator. The results show an improvement compared to traditional sensing methods in both communication overhead and the application results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
179. Enhancing human agency through redress in Artificial Intelligence Systems.
- Author
-
Fanni, Rosanna, Steinkogler, Valerie Eveline, Zampedri, Giulia, and Pierson, Jo
- Subjects
- *
AGENT (Philosophy) , *ARTIFICIAL intelligence , *CHATBOTS , *UBIQUITOUS computing , *DIGITAL technology , *COMMUNICATION infrastructure - Abstract
Recently, scholars across disciplines raised ethical, legal and social concerns about the notion of human intervention, control, and oversight over Artificial Intelligence (AI) systems. This observation becomes particularly important in the age of ubiquitous computing and the increasing adoption of AI in everyday communication infrastructures. We apply Nicholas Garnham's conceptual perspective on mediation to users who are challenged both individually and societally when interacting with AI-enabled systems. One way to increase user agency are mechanisms to contest faulty or flawed AI systems and their decisions, as well as to request redress. Currently, however, users structurally lack such mechanisms, which increases risks for vulnerable communities, for instance patients interacting with AI healthcare chatbots. To empower users in AI-mediated communication processes, this article introduces the concept of active human agency. We link our concept to contestability and redress mechanism examples and explain why these are necessary to strengthen active human agency. We argue that AI policy should introduce rights for users to swiftly contest or rectify an AI-enabled decision. This right would empower individual autonomy and strengthen fundamental rights in the digital age. We conclude by identifying routes for future theoretical and empirical research on active human agency in times of ubiquitous AI. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
180. Unremarkable Augmentation in Busy Practitioners' Surrounding: Exploring Peripheral Interaction with Teachers and Nurses.
- Author
-
Pengcheng An, Bakker, Saskia, Cabral Guerra, Miguel, van Bentum, Jesper, and Eggen, Berry
- Subjects
NEONATAL intensive care units ,INTENSIVE care nursing ,TEACHERS ,DIGITAL technology ,SCHOOL nursing - Abstract
When practitioners are in the midst of their busy day-to-day work--such as teachers facilitating learners in the classroom or nurses caring for patients in the hospital--they face complex social or material environments and intensive, intertwined activities. Yet unprecedentedly, these practitioners also need to incorporate technologies, as increasingly necessary supports, in their surroundings. A challenge thereby concerns practitioners' limited attention: current human-technology interfaces usually demand users' focus of attention, whereas interacting with digital devices is often neither the only nor the central task in practitioners' ongoing activities. This work explores the design of peripheral interaction to understand how surrounding technologies could leverage the periphery of human attention to tacitly augment practitioners' daily routines. Via a series of field explorations with teachers at school and nurses in neonatal intensive care units (NICU), we illustrate how peripheral interaction designs could seamlessly enrich the practitioners' action repertoire (readily available actions) or enhance their reflection-in-action (sensemaking of the unfolding situation) without interfering with their ongoing routines. From these cases, we extract two relevant design properties to inform future practice: i.e., the designed interaction being subsidiary to the main practice and open to practical knowing. Six considerations are provided to help designers to achieve these properties in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
181. Deep learning for compressive sensing: a ubiquitous systems perspective.
- Author
-
Machidon, Alina L. and Pejović, Veljko
- Subjects
UBIQUITOUS computing ,DEEP learning ,ALGORITHMS ,SPACE research - Abstract
Compressive sensing (CS) is a mathematically elegant tool for reducing the sensor sampling rate, potentially bringing context-awareness to a wider range of devices. Nevertheless, practical issues with the sampling and reconstruction algorithms prevent further proliferation of CS in real world domains, especially among heterogeneous ubiquitous devices. Deep learning (DL) naturally complements CS for adapting the sampling matrix, reconstructing the signal, and learning from the compressed samples. While the CS–DL integration has received substantial research interest recently, it has not yet been thoroughly surveyed, nor has any light been shed on practical issues towards bringing the CS–DL to real world implementations in the ubiquitous computing domain. In this paper we identify main possible ways in which CS and DL can interplay, extract key ideas for making CS–DL efficient, outline major trends in the CS–DL research space, and derive guidelines for the future evolution of CS–DL within the ubiquitous computing domain. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
182. Human Activity Recognition Based on Two-Channel Residual–GRU–ECA Module with Two Types of Sensors.
- Author
-
Wang, Xun and Shang, Jie
- Subjects
HUMAN activity recognition ,FLEXIBLE electronics ,DETECTORS ,SMART devices ,UBIQUITOUS computing - Abstract
With the thriving development of sensor technology and pervasive computing, sensor-based human activity recognition (HAR) has become more and more widely used in healthcare, sports, health monitoring, and human interaction with smart devices. Inertial sensors were one of the most commonly used sensors in HAR. In recent years, the demand for comfort and flexibility in wearable devices has gradually increased, and with the continuous development and advancement of flexible electronics technology, attempts to incorporate stretch sensors into HAR have begun. In this paper, we propose a two-channel network model based on residual blocks, an efficient channel attention module (ECA), and a gated recurrent unit (GRU) that is capable of the long-term sequence modeling of data, efficiently extracting spatial–temporal features, and performing activity classification. A dataset named IS-Data was designed and collected from six subjects wearing stretch sensors and inertial sensors while performing six daily activities. We conducted experiments using IS-Data and a public dataset called w-HAR to validate the feasibility of using stretch sensors in human action recognition and to investigate the effectiveness of combining flexible and inertial data in human activity recognition, and our proposed method showed superior performance and good generalization performance when compared with the state-of-the-art methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
183. Identifying Smartphone Users Based on Activities in Daily Living Using Deep Neural Networks
- Author
-
Sakorn Mekruksavanich and Anuchit Jitpattanakul
- Subjects
ubiquitous computing ,activity pattern ,deep learning ,wearable sensors ,smartphone ,Information technology ,T58.5-58.64 - Abstract
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individuals store sensitive data on their devices like financial credentials and personal information due to the convenience and accessibility. However, losing control of this data poses risks if the phone gets lost or stolen. While passwords, PINs, and pattern locks are common security methods, they can still be compromised through exploits like smudging residue from touching the screen. This research explored leveraging smartphone sensors to authenticate users based on behavioral patterns when operating the device. The proposed technique uses a deep learning model called DeepResNeXt, a type of deep residual network, to accurately identify smartphone owners through sensor data efficiently. Publicly available smartphone datasets were used to train the suggested model and other state-of-the-art networks to conduct user recognition. Multiple experiments validated the effectiveness of this framework, surpassing previous benchmark models in this area with a top F1-score of 98.96%.
- Published
- 2024
- Full Text
- View/download PDF
184. Challenges, attacks, QoS, and other security issues for an IoT environment.
- Author
-
Gautam, Krishan Kant Singh, Kumar, Rajendra, and Gupta, Deena Nath
- Subjects
- *
MACHINE-to-machine communications , *WIRELESS communications , *INTERNET of things , *WIRELESS sensor networks , *UBIQUITOUS computing , *ELECTRONIC equipment , *INFORMATION & communication technologies - Abstract
As wireless sensor networks, ubiquitous computing, and machine-to-machine (M2M) communication progress, the concept of the Internet of Things (IoT) is gaining traction in information and communications technology (ICT). The IoT is a network of electronic and mechanical devices such as watches and bicycles linked to electronic devices, sensors, and software. Network connectivity allows these devices to gather and exchange data. Nonetheless, as the network grows with so many IoT device connections, security becomes a major concern. Presented here is an overview of the IoT, including the security challenges associated with IoT devices, as well as a classification of the types of attacks on communicating IoT devices. The quality of service (QoS) associated with an IoT environment is also discussed. Furthermore, different layers of security were discussed to provide ample research opportunities to the researchers working in this field. Also, a number of solutions are identified to existing challenges and future directions are provided for addressing IoT security issues. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
185. IoT security and privacy concerns in cloud ecosystem.
- Author
-
Chaudhary, Jyotirmai and Pillai, Samaya
- Subjects
- *
UBIQUITOUS computing , *INTERNET of things , *PRIVACY , *SECURITY management , *HIGH technology , *CLOUD computing - Abstract
In current times, devices are connected over the internet to make our life simpler without our actual involvement. This connectivity's backbone is an advanced technology that plays a protagonist in this networking world through material objects embedded in RFID form. Technology that we will deep dive into is IoT, and the other one to enhance this is cloud computing. The cloud of things has completely driven our lives in this ubiquitous computing world, whether it is computing, networking and, storage. This purpose can be achieved easily by pay as per usage and that too on-demand basis. Unfortunately, when the users and IoT devices continuously share networking resources and computing remotely, it projects security issues. Therefore, preserving data policies is highly important in this environment. In this research paper, the prime focus is on critical risk, i.e., security and privacy issues, by analyzing potential challenges and security issues that are yet to be resolved. This technology is our future and therefore getting more attention on the security part. Thus, it requires the deployment of high-end security and policies which can ensure confidentiality of the data, authentication of devices, managing and monitoring the access point, and integrity of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
186. Introducing quantitative cognitive analysis: ubiquitous reproduction, cognitivediversity and creativity
- Author
-
Shackell, Cameron and Bruza, Peter
- Subjects
ubiquitous computing ,ubiquitous reproduction ,cognitive diversity ,creativity ,intelligibility - Abstract
The rise of ubiquitous computing has cemented ubiquitousreproduction (UR) as a defining feature of contemporaryhuman environments. UR is most obvious on our televisionsand smartphones but has homogenised most material aspectsof our lives. Emerging technologies such as 3D printing androbotics will ensure that this trend intensifies. UR is an issueof global scale that is relatively intractable to qualitativetreatment. This paper introduces a novel quantitativeapproach to cognitive science and to analysis of UR. Theapproach uses the finiteness of cognition to establish aminimal ontology with which to model cognitive diversityunder UR. It demonstrates that, despite widespreadvalorisation of diversity, cognitive diversity must be decliningat a global level. The implications of this for creativity arethat the arc for creative impact is growing shorter as the needto be immediately intelligible promotes the formulaic at theexpense of the interpretable.
- Published
- 2019
187. Practiced, Conceived and Lived space in the Postdigital City
- Author
-
Sandra Alvaro
- Subjects
postdigital ,new urbanism ,ubiquitous computing ,lefebvre ,digital art ,Architecture ,NA1-9428 - Abstract
The pandemic has highlighted the fast transmission of needs, goods and ideas that sustain the functionality of our globalised, networked world. At the same time, it has highlighted the resilience and unbreakability of this network when transporting undesirable events such as fake news or a virus. Henceforth, this situation has forced us to rethink how we plan our inhabited space. Since the inception of ubiquitous computing, the city has mutated under a new technologically mediated functionalism, overlaid by the platforms of a global and highly relational system that is submitting space to the logic of computing. Fruit of previous doctoral research, this article reviews the transformations leading to the constitution of this technologically mediated urban space and analyses them by applying Lefebvre’s Unitarian Theory of Space. The objective is to unveil the challenges of the postdigital urban space and present projects that point towards alternative possibilities for urban planning.
- Published
- 2022
- Full Text
- View/download PDF
188. Special issue on technologies and applications for ubiquitous interactive media.
- Author
-
Liarokapis, Fotis, von Mammen, Sebastian, and Liang, Hai-Ning
- Subjects
- *
MACHINE learning , *INTERACTIVE multimedia , *ARTIFICIAL intelligence , *UBIQUITOUS computing , *SOFT computing - Abstract
This document is an editorial from the journal "Personal & Ubiquitous Computing" discussing the advancements and challenges in the development of interactive media. The editorial highlights the importance of interdisciplinary collaboration in creating interactive media that are reactive, context-aware, ambient, and seamlessly integrated into everyday life. It emphasizes the role of artificial intelligence (AI) and machine learning in achieving responsiveness and personalization. The document also discusses the need for interdisciplinary approaches to achieve context-awareness and the integration of technology into the user's environment. It concludes by stating that the future of interactive media lies in its ability to combine human and technological insights and foster connections between diverse disciplines. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
189. Design for friction. An inquiry to position friction as a method for reflection in design interventions.
- Author
-
Andrea Benedetti and Michele Mauri
- Subjects
Design for friction ,Information visualization ,Ubiquitous computing ,Human-Computer Interaction ,Fine Arts ,History of the arts ,NX440-632 - Abstract
To solve emerging problems, design uses new technologies to introduce “technofixes” (Hankey & Tuszynski, 2017) that are created to improve society in various capacities. The dissolution of technology, described as “ubiquitous computing”, brings with its pervasiveness a series of consequences to the constant production of personal data online (Greene, 2019; Manovich, 2012) that tech companies have now access to. Such data created new relationships between users, tech companies and their affiliates that are far from being settled, where scandals such as Cambridge Analytica provided visibility to the issue. The lack of awareness in this system, and the efforts in designing smooth and efficient experiences at the expense of clarity, raised questions in the public and legislators. The article explores, through literature review, if non-efficiency in design could be a viable way to make users reflect when using design products. As the antithesis to efficiency, we propose the term “friction”, a lens through which existing definitions of friction in design will be analyzed, introducing the concepts of “diegetic friction” and “extra-diegetic friction” as a possible taxonomy of design interventions.
- Published
- 2023
- Full Text
- View/download PDF
190. Ubiquitous and Transparent Security : Challenges and Applications
- Author
-
A. Suresh Kumar, Rajesh Kumar Dhanaraj, Yassine Maleh, Daniel Arockiam, A. Suresh Kumar, Rajesh Kumar Dhanaraj, Yassine Maleh, and Daniel Arockiam
- Subjects
- Computer security, Ubiquitous computing
- Abstract
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity. This comprehensive tome meticulously dissects the multifaceted challenges faced in safeguarding our digital infrastructure. From the omnipresence of threats to the evolving landscape of vulnerabilities, this book navigates the complexities with a keen eye, offering a panoramic view of the security terrain.Drawing on a rich tapestry of insights from leading experts, this book transcends the traditional boundaries of security discourse. It unveils innovative strategies and technologies, illuminating the path toward a future where security seamlessly integrates with the fabric of our digital existence. With a keen focus on transparency, it delves deep into the mechanisms that enable a clear, holistic view of security, empowering stakeholders to navigate this dynamic landscape with confidence.From cutting-edge applications to the ethical considerations of ubiquitous security, each chapter acts as a guiding compass, providing actionable insights and fostering a deeper understanding of the intricate balance between accessibility and protection. Ubiquitous and Transparent Security is not merely a book; it's a roadmap for practitioners, policymakers, and enthusiasts alike, navigating the ever-evolving world of cybersecurity.Each chapter within this compendium illuminates the diverse challenges that confront security practitioners, policymakers, and technologists today. It goes beyond the conventional paradigms, exploring the nuanced intersections between accessibility, transparency, and robust protection. Through a rich amalgamation of research-backed insights, real-world case studies, and visionary forecasts, this book offers a holistic understanding of the evolving threat landscape, empowering stakeholders to fortify their defenses proactively.
- Published
- 2024
191. Intelligent Environments 2024: Combined Proceedings of Workshops and Demos & Videos Session
- Author
-
M.J. Hornos, G. Slapničar, J. Yu, M.J. Hornos, G. Slapničar, and J. Yu
- Subjects
- Ubiquitous computing, Human-computer interaction, Information technology--Environmental aspects, Ambient intelligence
- Abstract
Intelligent Environments (IEs) enhance physical spaces, integrating technologies from areas such as information and communication, sensing and actuating, artificial intelligence, robotics, and human-computer interfaces. IEs can also be integrated with advanced computational models such as deep learning and large language models. They improve and enrich user activities, enable the effective management of environmental features, and foster awareness of the capabilities of the various technologies, enhancing healthcare and well-being and ensuring reliability and privacy. This book presents the combined proceedings of the Workshops and Demos & Videos Session at IE 2024, the 20th International Conference on Intelligent Environments, which took place from 17 to 20 June 2024 in Ljubljana, Slovenia. The conference provides an opportunity for the multidisciplinary research community dedicated to IEs to come together and explore foundational concepts and core ideas across various contexts, and to address critical challenges. This year's conference included the following workshops: WISHWell 2024, the 13th International Workshop on Intelligent Environments Supporting Healthcare and Well-being; WoRIE 2024, the 13th International Workshop on the Reliability of Intelligent Environments; and ALLEGET 2024, the 4th International Workshop on Artificial Intelligence and Machine Learning for Emerging Topics. The book includes 5 papers from WISHWell, 6 from WoRIE, and 5 from ALLEGET. These were selected for presentation and publication from the significant number of submissions received following a thorough review process. The book also includes two submissions from the demos & videos session. Providing a wide-ranging overview of recent developments and ideas, the book will be of interest to all those working with intelligent environments.
- Published
- 2024
192. Digital Personality: A Man Forever : Volume 1: Introduction
- Author
-
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anand Nayyar, Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, and Anand Nayyar
- Subjects
- Human-computer interaction, Online identities, Ubiquitous computing, Knowledge representation (Information theory), Affect (Psychology)--Computer simulation, Artificial intelligence, Intelligent agents (Computer software), Intelligent personal assistants (Computer software
- Abstract
This book delves into the very core of our digital existence, unearthing the essence of a digital persona. It's a realm where authenticity meets multiplicity, as we decipher the nuanced art of crafting and managing our online identities. We confront issues of privacy and ethics, exploring the profound impact of our digital footprints on our lives and society. The integration of AI paves the way for an intriguing future, with predictions that challenge our understanding of self in the digital age. Welcome to a world where your digital personality is more than just data; it's a reflection of who you are and who you can be. The main goal of this book is to enable more seamless and natural human–computer interaction. This will provide better personalized experience. Further, this will influence the performance of the user, wherein they will have the support of the machines to achieve their tasks in the most efficient way. This book is the first of a kind in introducing Digital Personality. It provides an overview of the character dimensions and how state-of-the-art technologies would accommodate such a research field. It includes novel representation of character from various perspectives. It also provides instances of applications of this emerging research field.
- Published
- 2024
193. Threshold : How Smart Homes Change Us Inside and Out
- Author
-
Heather Suzanne Woods and Heather Suzanne Woods
- Subjects
- Home automation, Internet of things, Ubiquitous computing, Home
- Abstract
An urgent and cautionary examination of the totalizing effect of smart home technology on the lives of those who live in them—and those who don't Smart homes are here—domestic spaces bristling with networked technologies that appear to enhance work, entertainment, logistics, health, and security. But these technologies may also extract a cost in attention, money, and privacy. In Threshold, communication and technology expert Heather Suzanne Woods applies rhetorical theory to answer the urgent question of how swiftly proliferating smart homes alter those who inhabit them. Building on extensive research into smart homes in the United States, Woods recounts how smart homes arose and predicts the trajectory of their future form. She pulls back the curtain on the technology, probes who is in control, and questions whether a home can be too smart. She reveals how smart homes incentivize ubiquitous computing as a daily practice, priming smart home occupants for permanent transactional existence largely controlled by corporate interests. Woods suggests a dynamic cultural framework for understanding smart homes that takes into account sociotechnical variables such as gender, class, income, race, criminal justice, and more through which smart homes shape human life. Woods's framework reveals how smart homes both reflect social norms about technology as well as whet consumer appetites for an ever more totalizing relationship with technology. She argues that this progression leads to “living in digitality,” a cultural state of constant use and reliance on technology. Written for homeowners, policymakers, technology enthusiasts, and scholars, Threshold interweaves meticulously researched critical analysis with matter-of-fact graphics that map relationships between digital tools and social life. Readers will appreciate this bracing assessment of smart technologies that empowers smart home users to make informed decisions about their dwellings.
- Published
- 2024
194. Atmospheric Mediation: From Smart Dust to Customizable Governance
- Author
-
Andrejevic, Mark, author and Volcic, Zala, author
- Published
- 2023
- Full Text
- View/download PDF
195. Enhancing Smart Home Design with AI Models: A Case Study of Living Spaces Implementation Review.
- Author
-
Almusaed, Amjad, Yitmen, Ibrahim, and Almssad, Asaad
- Subjects
- *
ARTIFICIAL intelligence , *SMART homes , *DIGITAL twins , *INTELLIGENT buildings , *ENERGY consumption , *USER experience - Abstract
The normal development of "smart buildings," which calls for integrating sensors, rich data, and artificial intelligence (AI) simulation models, promises to usher in a new era of architectural concepts. AI simulation models can improve home functions and users' comfort and significantly cut energy consumption through better control, increased reliability, and automation. This article highlights the potential of using artificial intelligence (AI) models to improve the design and functionality of smart houses, especially in implementing living spaces. This case study provides examples of how artificial intelligence can be embedded in smart homes to improve user experience and optimize energy efficiency. Next, the article will explore and thoroughly analyze the thorough analysis of current research on the use of artificial intelligence (AI) technology in smart homes using a variety of innovative ideas, including smart interior design and a Smart Building System Framework based on digital twins (DT). Finally, the article explores the advantages of using AI models in smart homes, emphasizing living spaces. Through the case study, the theme seeks to provide ideas on how AI can be effectively embedded in smart homes to improve functionality, convenience, and energy efficiency. The overarching goal is to harness the potential of artificial intelligence by transforming how we live in our homes and improving our quality of life. The article concludes by discussing the unresolved issues and potential future research areas on the usage of AI in smart houses. Incorporating AI technology into smart homes benefits homeowners, providing excellent safety and convenience and increased energy efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
196. Domain Adaptation Methods for Lab-to-Field Human Context Recognition †.
- Author
-
Alajaji, Abdulaziz, Gerych, Walter, Buquicchio, Luke, Chandrasekaran, Kavin, Mansoor, Hamid, Agu, Emmanuel, and Rundensteiner, Elke
- Subjects
- *
SUPERVISED learning , *UBIQUITOUS computing - Abstract
Human context recognition (HCR) using sensor data is a crucial task in Context-Aware (CA) applications in domains such as healthcare and security. Supervised machine learning HCR models are trained using smartphone HCR datasets that are scripted or gathered in-the-wild. Scripted datasets are most accurate because of their consistent visit patterns. Supervised machine learning HCR models perform well on scripted datasets but poorly on realistic data. In-the-wild datasets are more realistic, but cause HCR models to perform worse due to data imbalance, missing or incorrect labels, and a wide variety of phone placements and device types. Lab-to-field approaches learn a robust data representation from a scripted, high-fidelity dataset, which is then used for enhancing performance on a noisy, in-the-wild dataset with similar labels. This research introduces Triplet-based Domain Adaptation for Context REcognition (Triple-DARE), a lab-to-field neural network method that combines three unique loss functions to enhance intra-class compactness and inter-class separation within the embedding space of multi-labeled datasets: (1) domain alignment loss in order to learn domain-invariant embeddings; (2) classification loss to preserve task-discriminative features; and (3) joint fusion triplet loss. Rigorous evaluations showed that Triple-DARE achieved 6.3% and 4.5% higher F1-score and classification, respectively, than state-of-the-art HCR baselines and outperformed non-adaptive HCR models by 44.6% and 10.7%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
197. Reliable Resource Allocation and Management for IoT Transportation Using Fog Computing.
- Author
-
Atiq, Haseeb Ullah, Ahmad, Zulfiqar, uz Zaman, Sardar Khaliq, Khan, Muhammad Amir, Shaikh, Asad Ali, and Al-Rasheed, Amal
- Subjects
RESOURCE allocation ,RESOURCE management ,TRANSPORTATION management ,INTERNET of things ,ENERGY consumption ,UBIQUITOUS computing - Abstract
Resource allocation in smart settings, more specifically in Internet of Things (IoT) transportation, is challenging due to the complexity and dynamic nature of fog computing. The demands of users may alter over time, necessitating more trustworthy resource allocation and administration. Effective resource allocation and management systems must be designed to accommodate changing user needs. Fog devices don't just run fog-specific software. Resource and link failures could be brought on by the absence of centralised administration, device autonomy, and wireless communication in the fog environment. Resources must be allocated and managed effectively because the majority of fog devices are battery-powered. Latency-aware IoT applications, such as intelligent transportation, healthcare, and emergency response, are now pervasive as a result of the enormous growth of ubiquitous computing. These services generate a large amount of data, which requires edge processing. The flexibility and services on-demand for the cloud can successfully manage these applications. It's not always advisable to manage IoT applications exclusively in the cloud, especially for latency-sensitive applications. Thus, fog computing has emerged as a bridge between the cloud and the devices it supports. This is typically how sensors and IoT devices are connected. These neighbouring Fog devices control storage and intermediary computation. In order to improve the Fog environment reliability in IoT-based systems, this paper suggests resource allocation and management strategy. When assigning resources, latency and energy efficiency are taken into account. Users may prioritise cost-effectiveness over speed in a fog. Simulation was performed in the iFogSim2 simulation tool, and performance was compared with one of the existing state-of-the-art strategy. A comparison of results shows that the proposed strategy reduced latency by 10.3% and energy consumption by 21.85% when compared with the existing strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
198. UbiAccess: an Instrument to Assess System Access in Ubiquitous Scenarios.
- Author
-
Pimenta, Josiane Rosa de Oliveira Gaia, Duarte, Emanuel Felipe, Baranauskas, M Cecília C, and Medeiros, Claudia Bauzer
- Subjects
- *
WORLD Wide Web , *WEB accessibility , *INTERNET content , *UNIVERSAL design - Abstract
Ubiquitous computing has brought new challenges for the design of scenarios for people–technology interactions. Despite considerable research on formal accessibility standards, related work has hardly investigated them in ubiquitous computing contexts. In this work, we investigate means of analyzing accessibility aspects in ubiquitous environments based on two standard instruments: the Universal Design (UD) Principles and Guidelines and the W3C-WCAG (Web Content Accessibility Guidelines of the World Wide Web Consortium). Both instruments were applied to the context of socioenactive ubiquitous environments, providing insights into their applicability and shortcomings. As a result of this analysis we constructed UbiAccess, an instrument to evaluate access in ubiquitous scenarios, which combines and extends characteristics of both UD and W3C-WCAG, filling in some of the gaps we identified. The application of UbiAccess to a case study shows the advantages of its use in informing the evaluation of access in ubiquitous scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
199. What Is UMAP?
- Author
-
Campbell, Paul J.
- Subjects
MATHEMATICAL logic ,UNEMPLOYMENT insurance ,STATISTICS ,APPLIED mathematics ,UBIQUITOUS computing - Published
- 2023
200. An Intelligent Approach of Intrusion Detection in Mobile Crowd Sourcing Systems in the Context of IoT Based SMART City.
- Author
-
Kantipudi, MVV Prasad, Aluvalu, Rajanikanth, and Velamuri, Suresh
- Subjects
CROWDSOURCING ,SMART cities ,INTERNET of things ,INTRUSION detection systems (Computer security) ,ENVIRONMENTAL mapping ,UBIQUITOUS computing - Abstract
The recent era of pervasive computing has evolved with various applications and has ground-breaking realities in mobile crowdsourcing (MCS). Multiple attempts have been devoted to integrating MCS with IoT-based smart cities where crowdsensing has played a crucial role in the recent past. Despite having potential features, MCS devices lack efficiency when security aspects are concerned. The current security approaches exercised in MCS operations imply limited features and are not intelligent enough to deal with different types of attacks in IoT smart cities. On the other hand, as MCS communications involve radio environmental mapping functional blocks from communication, it is an obvious situation that leads to a vulnerable situation of which adversarial modules can take advantage of it. There are different types of active and passive modes of attacks that can degrade the Quality-of-Service (QoS) aspects in IoT-driven smart city operations. This study's prime aim and the appealing theme is to realize the need for resilient approaches to intelligent intrusion detection in MCS to mitigate different attacks. The study also introduces a theoretical approach of cluster-enabled multi-task (CeMT) based on bio-inspired learning modeling of the genetic approach to identify the maximum possible threats and misbehaving devices in the smart city-based MCS operations. The study also evaluated the model's performance based on the processing time of identifying malicious events and showed the accuracy of detecting misbehaving working associate (WA) modules. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.