Implementing a Reliable and Context-Aware Framework in Pervasive Computing for Event Reporting by Using Intelligent Technique

نویسندگان

  • Hossein Karimi
  • Mohammad Mosleh
چکیده

The Appearance of new generation of computer systems, embedded systems, mobile, and also advances in mobile wireless networks, cause to extension of the computation fields. This process, lead to a scenario which is called: “pervasive computing”. The aim of pervasive computing is the presence of computers in all fields of the human life, without the need to his presence, coordinating among all computer systems which related to each other and also the reduction of the calculations complexity. As the computations being pervasive, the nature of the requests be changed. The requests awareness of context is one of the most important features in pervasive computing, Because being aware of the context enable system to make automatic decisions. Context including any information about the person or object, such as location, identity, surrounding objects, feelings, environmental conditions and etc. For ease of planning requests, Context is collected, managed, and then finally a general conclusion had be done. pervasive computing include three major subsystems, Sensing subsystem, thinking subsystem, and the Acting subsystem. In this paper, by using the context, a reliable and context-aware framework for pervasive computing is presented which we called it, intelligent pervasive computing system. This system can evaluate received data from environment optimally by using machine learning technique.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Programming Secure and Robust Pervasive Computing Applications

We have developed a programming framework for building context-aware multi-user collaborative applications in pervasive computing environments. It supports context-sensitive security and multi-user coordination requirements. It also supports error handling in pervasive computing applications through an exception handling model. In this paper we present the programming framework and demonstrate ...

متن کامل

A confidence-aware interval-based trust model

It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012