Home-Explorer: Ontology-based physical artifact search and hidden object detection system

نویسندگان

  • Bin Guo
  • Satoru Satake
  • Michita Imai
چکیده

A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects) in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object’s status or location information and for locating hidden objects are described and evaluated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Combined Local Object Based Features and Cluster Fusion for the Behaviors Recognition and Detection of Abnormal Behaviors

In this paper, we propose a novel framework for behaviors recognition and detection of certain types of abnormal behaviors, capable of achieving high detection rates on a variety of real-life scenes. The new proposed approach here is a combination of the location based methods and the object based ones. First, a novel approach is formulated to use optical flow and binary motion video as the loc...

متن کامل

Query Architecture Expansion in Web Using Fuzzy Multi Domain Ontology

Due to the increasing web, there are many challenges to establish a general framework for data mining and retrieving structured data from the Web. Creating an ontology is a step towards solving this problem. The ontology raises the main entity and the concept of any data in data mining. In this paper, we tried to propose a method for applying the "meaning" of the search system, But the problem ...

متن کامل

شناسایی میکرو آمبولی مغزی در سیگنال داپلر از روی ویژگی های غیر خطی

Abstract: An embolus is a blood clot, a fat globule or gas bubbles that may be freely circulating in bloodstream can stop the blood flow and lead to ischemia. In real time assessment of blood flow by Trans Cranial Doppler (TCD) method, travelling solid or gaseous micro emboli in the bloodstream by passing across the assessment area, causes a short time signal with high intensity. While TCD reco...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Using the Oz Explorer for the Development of Constraint Programs

The Oz Explorer [Sch97] is a visual constraint programming tool for Oz. Oz is a concurrent constraint language providing for functional, object-oriented, and constraint programming [Smo95]. It has a simple yet powerful computation model which extends the concurrent constraint model by first-class procedures, concurrent state and encapsulated search. The Explorer uses the search tree of a constr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Mobile Information Systems

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2008