Ubiquitous Computing Smart Devices, Environments and Interactions 1st Edition by Prof. Stefan Poslad – Ebook PDF Instant Download/Delivery: 0470035609, 9780470035603
Full download Ubiquitous Computing Smart Devices, Environments and Interactions 1st Edition after payment
Product details:
ISBN 10: 0470035609
ISBN 13: 9780470035603
Author: Prof. Stefan Poslad
Ronald Wardhaugh’s An Introduction to Sociolinguistics has been a cornerstone of courses in the field for over two decades, maintaining its popularity by combining clear and accessible coverage of a wide range of issues with useful student study features. This comprehensive sixth edition retains these strengths, but has also been updated throughout to reflect developments in the field. New chapter-by-chapter explorations sections have been added which encourage students to actively engage with tkey issues in sociolinguistics. The sixth edition includes greater focus on ideas of identity, solidarity, and markedness, while the features that have made this work a classic the balanced coverage of issues ranging from language dialects and variation, code-switching, bilingualism, and speech communities, to ethnographies, gender, and disadvantage have been updated to reflect the latest research. Accessible and engaging, this is an ideal introduction for both undergraduates and graduate students with little or no background in sociolinguistics.
Ubiquitous Computing Smart Devices, Environments and Interactions 1st Table of contents:
1 Ubiquitous Computing: Basics and Vision
1.1 Living in a Digital World
1.1.1 Chapter Overview
1.1.2 Illustrative Ubiquitous Computing Applications
1.1.2.1 Personal Memories
Figure 1.1 Example of a ubiquitous computing application. The AV-recording is person-aware, location-aware (via GPS), time-aware and networked to interact with other ICT devices such as printers and a family-and-friends database
1.1.2.2 Adaptive Transport Scheduled Service
1.1.2.3 Foodstuff Management
1.1.2.4 Utility Regulation
1.1.3 Holistic Framework for UbiCom: Smart DEI
1.2 Modelling the Key Ubiquitous Computing Properties
1.2.1 Core Properties of UbiCom Systems
1.2.2 Distributed ICT Systems
1.2.2.1 Networked ICT Devices
1.2.2.2 Transparency and Openness
1.2.3 Implicit Human–Computer Interaction (iHCI)
1.2.3.1 The Calm Computer
1.2.3.2 Implicit Versus Explicit Human–Computer Interaction
1.2.3.3 Embodied Reality versus Virtual, Augmented and Mediated Reality
1.2.4 Context-Awareness
1.2.4.1 Three Main Types of Environment Context: Physical, User, Virtual
1.2.4.2 User-Awareness
1.2.4.3 Active Versus Passive Context-Awareness
1.2.5 Autonomy
1.2.5.1 Reducing Human Interaction
1.2.5.2 Easing System Maintenance Versus Self-Maintaining Systems
1.2.6 Intelligence
1.2.7 Taxonomy of UbiCom Properties
Figure 1.2 A UbiCom system model. The dotted line indicates the UbiCom system boundary
Table 1.1 Distributed system properties
Table 1.2 iHCI system properties
Table 1.3 Context-aware system properties
Table 1.4 Autonomous system properties
Table 1.5 Intelligent system properties
1.3 Ubiquitous System Environment Interaction
Figure 1.3 Human–ICT device interaction (HCI) is divided into four sub-types of interaction H2H, H2C, C2H and C2C
Figure 1.4 ICT device and Physical World Interaction (CPI) is divided into four sub-types of interaction: P2P, P2C, C2P and C2C
1.3.1 Human–ICT Device Interaction (HCI)
1.3.2 ICT Device to Physical World Interaction (CPI)
1.4 Architectural Design for UbiCom Systems: Smart DEI Model
Figure 1.5 Three different models of ubiquitous computing: smart terminal, smart interaction, and smart infrastructure
Figure 1.6 Some of the main subtypes (triangle relationships) of smart devices, environments and interactions and some of their main aggregations (diamond relationships) where MTOS is a Multi-Tasking Operating System, VM is a Virtual Machine, ASOS is an Application Specific or embedded system OS, RTOS is a RealTime OS and MEMS is a Micro ElectroMechanical System
1.4.1 Smart Devices
1.4.1.1 Weiser’s ICT Device Forms: Tabs, Pads and Boards
1.4.1.2 Extended Forms for ICT Devices: Dust, Skin and Clay
1.4.1.3 Mobility
1.4.1.4 Volatile Service Access
1.4.1.5 Situated and Self-Aware
1.4.2 Smart Environments
1.4.2.1 Tagging, Sensing and Controlling Environments
1.4.2.2 Embedded Versus Untethered
1.4.2.3 Device Sizes
1.4.3 Smart Interaction
1.4.3.1 Basic Interaction
1.4.3.2 Smart Interaction
1.5 Discussion
1.5.1 Interlinking System Properties, Environments and Designs
Table 1.6 Comparison of smart device, smart environment and smart interaction
Figure 1.7 Alternate viewpoints and organisations for the device, environment and interaction entities in the Smart DEI model
1.5.2 Common Myths about Ubiquitous Computing
1.5.3 Organisation of the Smart DEI Approach
Table 1.7 Book chapters and their relation to the Smart DEI Model (Smart Device, Environment, Interaction), UbiCom system properties, and to system to environment interaction
EXERCISES
References
2 Applications and Requirements
2.1 Introduction
2.1.1 Overview
2.2 Example Early UbiCom Research Projects
2.2.1 Smart Devices: CCI
2.2.1.1 Smart Boards, Pads and Tabs
2.2.1.2 Active Badge, Bat and Floor
2.2.2 Smart Environments: CPI and CCI
2.2.2.1 Classroom 2000
2.2.2.2 Smart Space and Meeting Room
2.2.2.3 Interactive Workspaces and iRoom
2.2.2.4 Cooltown
2.2.2.5 EasyLiving and SPOT
2.2.2.6 HomeLab and Ambient Intelligence
2.2.3 Smart Devices: CPI
2.2.3.1 Unimate and MH-1 Robots
2.2.3.2 Smart Dust and TinyOS
Figure 2.1 Example of Smart Dust, Golem Dust, solar-powered mote with bi-directional communications and sensing, acceleration and ambient light, about 10 mm 3 total circumscribed volume and 5 mm 3 total displaced volume. Reproduced by Permission from Warneke, B.A., Pister, K.S.J. (2004) An Ultra-Low Energy Microcontroller for Smart Dust Wireless Sensor Networks. Int’l Solid-State Circuits Conf. 2004, (ISSCC 2004): 316–317. © 2004 IEEE
2.2.4 Smart Devices: iHCI and HPI
2.2.4.1 Calm Computing
2.2.4.2 Things That Think and Tangible Bits
2.2.4.3 DataTiles
Figure 2.2 The DataTiles system integrates the benefits of two major interaction paradigms, graphical and physical user interfaces. DataTiles, reproduced by permission of © Sony Computer Science Laboratories, Inc.
2.2.4.4 Ambient Wood
2.2.4.5 WearComp and WearCam
Figure 2.3 Type of wearable computer devices prototyped by Mann
2.2.4.6 Cyborg 1.0 and 2.0
Figure 2.4 An electrode array surgically implanted into Warwick’s left arm and interlinked into median nerve fibres is being monitored. Reproduced by permission of © University of Reading
2.2.5 Other UbiCom Projects
2.3 Everyday Applications in the Virtual, Human and Physical World
2.3.1 Ubiquitous Networks of Devices: CCI
2.3.2 Human–Computer Interaction
2.3.2.1 Ubiquitous Audio-Video Content Access
Figure 2.5 Audio-video cluster distributed over a local home network with a PC as the hub
2.3.2.2 Ubiquitous Information Access and Ebooks
2.3.2.3 Universal Local Control of ICT Systems
Figure 2.6 Use of a soft universal local controller to interact with washing machine, TV, DVD recorder and radio
2.3.2.4 User-Awareness and Personal Spaces
2.3.3 Human-to-Human Interaction (HHI) Applications
2.3.3.1 Transaction-based M-Commerce and U-Commerce Services
2.3.3.2 Enhancing the Productivity of Mobile Humans
2.3.3.3 Care in the Community
2.3.4 Human-Physical World-Computer Interaction (HPI) and (CPI)
2.3.4.1 Physical Environment Awareness
2.3.4.2 (Physical) Environment Control
2.3.4.3 Smart Utilities
2.3.4.4 Smart Buildings and Home Automation
2.3.4.5 Smart Living Environments and Smart Furniture
2.3.4.6 Smart Street Furniture
2.3.4.7 Smart Vehicles, Transport and Travel
2.3.4.8 Pervasive Games and Social Physical Spaces
2.4 Discussion
2.4.1 Achievements from Early Projects and Status Today
2.4.1.1 Smart Devices
2.4.1.2 Smart Physical World Environments
2.4.1.3 Context-Awareness and Service Discovery
2.4.1.4 Wearable Smart Devices and Implants
EXERCISES
References
3 Smart Devices and Services
3.1 Introduction
3.1.1 Chapter Overview
3.1.2 Smart Device and Service Characteristics
Table 3.1 Characteristics of service access used by smart devices
3.1.3 Distributed System Viewpoints
Figure 3.1 Different viewpoints of distributed ICT system components. Components are User Access (U),1 Service Processing (P),2 Communication (C3) and Resources (R)4 such as Information (I), sensors, controllers and other device hardware
3.1.4 Abstraction Versus Virtualisation
Figure 3.2 Abstract view of user access to database and file applications which in turn see an abstract view of resource managers for the file system which in turn see an abstract view of the disk data storage system
3.2 Service Architecture Models
3.2.1 Partitioning and Distribution of Service Components
Figure 3.3 Balancing the use of local processing against the amount of communication needed depends upon the application and how it is designed
3.2.2 Multi-tier Client Service Models
Figure 3.4 Different designs for partitioning and distributing Information (I), Processing (P) and Service Access (A) using communication (C).
3.2.2.1 Distributed Data Storage
Figure 3.5 Information Resources (R) can be divided within an Information System
3.2.2.2 Distributed Processing
3.2.2.3 Client-Server Design
3.2.2.4 Proxy-based Service Access
Figure 3.6 Use of proxies to simplify network access by transparently encoding and decoding the transmitted data on behalf of clients and servers
3.2.3 Middleware
Figure 3.7 The trade-off in using middleware to hide the complexity of the ICT system access from applications and types of middleware service
3.2.4 Service Oriented Computing (SOC)
3.2.5 Grid Computing
3.2.6 Peer-to-Peer Systems
Figure 3.8 Three types of P2P system, pure, hybrid and partial decentralised
3.2.7 Device Models
3.3 Service Provision Life-Cycle
Figure 3.9 The service life-cycle: smart services entail operation and management throughout the whole life-cycle. P and A indicate that service processes and service access are active during each phase
3.3.1 Network Discovery
3.3.2 Service Announcement, Discovery, Selection and Configuration
Figure 3.10 Service discovery driven by providers publishing service descriptions
3.3.2.1 Web Service Discovery
3.3.2.2 Semantic Web and Semantic Resource Discovery
3.3.3 Service Invocation
3.3.3.1 Distributed Processes
Figure 3.11 Different designs for supporting distributed interaction: (remote) procedure call, object-oriented interaction, layered network interaction and pipes and filters
3.3.3.2 Asynchronous (MOM) Versus Synchronous (RPC) Communication Models
Figure 3.12 Asynchronous versus synchronous I/O: the use of buffering when sending or receiving, either at the sender or receiver, enables senders and receivers to be temporally decoupled
3.3.3.3 Reliable versus Unreliable Communication
3.3.3.4 Caches, Read-Ahead and Delayed Writes
Figure 3.13 Two design patterns to deal with intermittent server access, read-ahead and delayed write
3.3.3.5 On-Demand Service Access
3.3.3.6 Event-Driven Architectures (EDA)
Figure 3.14 Shared Repositories (left) and Event-driven Interaction (right)
3.3.3.7 Shared Data Repository
3.3.3.8 Enterprise Service Bus (ESB) Model
3.3.3.9 Volatile Service Invocation
3.3.4 Service Composition
3.3.4.1 Service Interoperability
3.4 Virtual Machines and Operating Systems
3.4.1 Virtual Machines
Figure 3.15 a HLL (High-level Language) Program is compiled into intermediate (portable) code (left). When this portable code executes it triggers a Process VM (Virtual Machine) to start up to interpret instructions converting them to executable code that runs on specific hardware (right)
3.4.2 BIOS
3.4.3 Multi-Tasking Operating Systems (MTOS)
Figure 3.16 The main components of an operating system. There are two basic types of operating system kernel: micro-kernel and monolithic kernel
Figure 3.17 Operating System kernel functions: memory management (MM), process control (PC), inter process communication (IPC) and Input/Output Control (IO)
3.4.4 Process Control
Figure 3.18 Scheduling multiple tasks that exceed the number of CPUs available
3.4.5 Memory Management
3.4.6 Input and Output
EXERCISES
References
4 Smart Mobiles, Cards and Device Networks
4.1 Introduction
4.1.1 Chapter Overview
4.2 Smart Mobile Devices, Users, Resources and Code
4.2.1 Mobile Service Design
4.2.1.1 SMS and Mobile Web Services
Figure 4.1 Thin client-server architecture example, a micro-browser running on a mobile device is used to retrieve content over a wireless network
4.2.1.2 Java VM and J2ME
Figure 4.2 J2ME uses a VM to support a variety of devices
4.2.1.3 .NET CF
Figure 4.3 .NET VM versus the JRE VM
4.2.2 Mobile Code
4.2.3 Mobile Devices and Mobile Users
4.3 Operating Systems for Mobile Computers and Communicator Devices
4.3.1 Microkernel Designs
4.3.2 Mobility Support
4.3.3 Resource-Constrained Devices
4.3.4 Power Management
4.3.4.1 Low Power CPUs
Figure 4.4 Use of Dynamic Voltage Scaling and Soft Real-Time scheduling to reduce CPU usage and power consumption
4.3.4.2 Application Support
4.4 Smart Card Devices
Figure 4.5 Contactless and Contact Smart Cards. Contactless cards include an inbuilt antennae and transceiver to interact with a reader. Contact cards include electrical contacts for a reader. A typical smart card OS is also shown
4.4.1 Smart Card OS
4.4.2 Smart Card Development
4.5 Device Networks
4.5.1 HAVi, HES and X10
4.5.2 Device Discovery
4.5.3 OSGi
EXERCISES
References
5 Human-Computer Interaction
5.1 Introduction
5.1.1 Chapter Overview
5.1.2 Explicit HCI: Motivation and Characteristics
5.1.3 Complexity of Ubiquitous Explicit HCI
5.1.4 Implicit HCI: Motivation and Characteristics
5.2 User Interfaces and Interaction for Four Widely Used Devices
5.2.1 Diversity of ICT Device Interaction
Figure 5.1 The range of ICT device sizes in common use in the 2000s
5.2.2 Personal Computer Interface
5.2.3 Mobile Hand-Held Device Interfaces
5.2.3.1 Handling Limited Key Input: Multi-Tap, T9, Fastap, Soft keys and Soft Keyboard
5.2.3.2 Handling Limited Output
5.2.4 Games Console Interfaces and Interaction
5.2.5 Localised Remote Control: Video Devices
5.3 Hidden UI Via Basic Smart Devices
5.3.1 Multi-Modal Visual Interfaces
5.3.2 Gesture Interfaces
Figure 5.2 Use of rotate, tilt and stretch gestures to control a display
Figure 5.3 Human to virtual device interaction, human to physical device interaction, human to human physical interaction, which can in turn trigger human to virtual device interaction
5.3.3 Reflective Versus Active Displays
Figure 5.4 Electrophoretic displays are reflective type displays using the electrophoretic phenomenon of charged particles suspended in a solvent
5.3.4 Combining Input and Output User Interfaces
5.3.4.1 Touchscreens
5.3.4.2 Tangible Interfaces
5.3.4.3 Organic Interfaces
5.3.5 Auditory Interfaces
5.3.6 Natural Language Interfaces
5.4 Hidden UI Via Wearable and Implanted Devices
5.4.1 Posthuman Technology Model
5.4.2 Virtual Reality and Augmented Reality
5.4.3 Wearable Computer Interaction
5.4.3.1 Head(s)-Up Display (HUD)
5.4.3.2 Eyetap
5.4.3.3 Virtual Retinal Display (VRD)
5.4.3.4 Clothes as Computers
5.4.4 Computer Implants and Brain Computer Interfaces
5.4.5 Sense-of-Presence and Telepresence
5.5 Human-Centred Design (HCD)
5.5.1 Human-Centred Design Life-Cycle
Figure 5.5 Comparison of a conventional functional system design approach with a human-centred design approach
5.5.2 Methods to Acquire User Input and to Build Used Models
5.5.3 Defining the Virtual and Physical Environment Use Context
Figure 5.6 Requirements for interactive design considers a wider set of requirements beyond functional and non-functional requirements
5.5.4 Defining the Human Environment Use Context and Requirements
5.5.4.1 User Characteristics
5.5.5 Interaction Design
5.5.5.1 Conceptual Models and Mental Models
5.5.6 Evaluation
5.6 User Models: Acquisition and Representation
5.6.1 Indirect User Input and Modelling
5.6.2 Direct User Input and Modelling
5.6.3 User Stereotypes
5.6.4 Modelling Users’ Planned Tasks and Goals
Figure 5.7 A Hierarchical Task Analysis (HTA) model for part of the record physical world scene from the PVM scenario in Section 1.1.1
5.6.5 Multiple User Tasks and Activity-Based Computing
5.6.6 Situation Action Versus Planned Action Models
5.7 iHCI Design
5.7.1 iHCI Model Characteristics
5.7.2 User Context-Awareness
5.7.3 More Intuitive and Customised Interaction
5.7.4 Personalisation
5.7.5 Affective Computing: Interactions Using Users’ Emotional Context
5.7.6 Design Heuristics and Patterns
Table 5.1 UI design heuristics for UbiCom based upon the high-level heuristics proposed by Tidwell (2006)
Table 5.2 Some examples of lower-level HCI design patterns which are linked to higher-level HCI design heuristics, based upon Tidwell (2005)
Figure 5.8 Relating the HCI design heuristic
EXERCISES
References
6 Tagging, Sensing and Controlling
6.1 Introduction
6.1.1 Chapter Overview
Figure 6.1 Enabling ubiquitous computing via micro, macro embedded and annotation of physical objects in the world
6.2 Tagging the Physical World
6.2.1 Life-Cycle for Tagging Physical Objects
6.2.2 Tags: Types and Characteristics
Figure 6.2 Taxonomy for types and characteristics of tags
6.2.3 Physical and Virtual Tag Management
6.2.4 RFID Tags
Figure 6.3 RFID tag application: (a) transponders in cars cause toll barriers to automatically lift as cars approach; (b) tags on pallet of goods tell distributers where goods are located; and (c) tags on clothes in retail outlets can signal alarms if they are removed without permission
6.2.4.1 Active RFID Tags
6.2.4.2 Passive RFID Tags
6.2.5 Personalised and Social Tags
Figure 6.4 The processes of augmented reality tagging
6.2.6 Micro Versus Macro Tags
6.3 Sensors and Sensor Networks
6.3.1 Overview of Sensor Net Components and Processes
Figure 6.5 A sensor network used to detect increases in heat and report these to a user
Table 6.1 Challenges in designing and deploying sensors and some corresponding solutions
Figure 6.6 The main functional characteristics for sensor net deployment
6.3.2 Sensor Electronics
Figure 6.7 Block diagram for a sensor electronics circuit
6.3.3 Physical Network: Environment, Density and Transmission
6.3.4 Data Network: Addressing and Routing
6.3.4.1 Sensor Networks Versus Ad Hoc Networks
6.3.5 Data Processing: Distributed Data Storage and Data Queries
6.4 Micro Actuation and Sensing: MEMS
Figure 6.8 Some examples of MEMS devices, size of the order of 10 to 100 microns (left to right): mite approaching the gear chain, polysilicon mirror, triple-piston microsteam engine. Reproduced by permission of © Sandia National Laboratories, SUMMIT(TM) Technologies, www.mems.Sandia.gov
6.4.1 Fabrication
6.4.2 Micro-Actuators
6.4.3 Micro-Sensors
6.4.4 Smart Surfaces, Skin, Paint, Matter and Dust
6.4.5 Downsizing to Nanotechnology and Quantum Devices
6.5 Embedded Systems and Real-Time Systems
6.5.1 Application-Specific Operating Systems (ASOS)
6.5.2 Real-Time Operating Systems for Embedded Systems
6.6 Control Systems (for Physical World Tasks)
6.6.1 Programmable Controllers
6.6.2 Simple PID-Type Controllers
Figure 6.9 Two simple control systems: a proportional type controller (top) and a PID-type controller (bottom)
6.6.3 More Complex Controllers
6.7 Robots
6.7.1 Robot Manipulators
6.7.2 Mobile Robots
6.7.3 Biologically Inspired Robots
6.7.4 Nanobots
6.7.5 Developing UbiCom Robot Applications
Figure 6.10 Using the Lego Mindstorm NXt robot to solve Rubik’s Cube
EXERCISES
References
7 Context-Aware Systems
7.1 Introduction
7.1.1 Chapter Overview
7.1.2 Context-Aware Applications
7.2 Modelling Context-Aware Systems
7.2.1 Types of Context
Table 7.1 A classification of the main types of context by type of UbiCom system environment and according to that of Morse et al. (2000)
Figure 7.1 Multidimensional multi-level support for a UbiCom property, e.g., context-awareness
7.2.2 Context Creation and Context Composition
7.2.3 Context-Aware Adaptation
Figure 7.2 A conditional planning model of context-awareness based upon pre-planned actions that move the system towards a goal context
7.2.4 Environment Modelling
7.2.5 Context Representation
Table 7.2 Different types of context representation according to Strang and Linnhoff-Popien (2004)
7.2.6 A Basic Architecture
Figure 7.3 A general architecture for context-aware systems
7.2.7 Challenges in Context-Awareness
Table 7.3 The main challenges in modelling contexts
7.3 Mobility Awareness
7.3.1 Call Routing for Mobile Users
7.3.2 Mobile Phone Location Determination
Figure 7.4 Location determination in mobile networks
7.3.3 Mobile User-Awareness as an Example of Composite Context-Awareness
7.3.4 Tourism Services for Mobile Users
Figure 7.5 A composite (location, person, terminal and network) context-aware application
7.4 Spatial Awareness
Table 7.4 Some types of SAS application with illustrative examples
7.4.1 Spatial Context Creation
7.4.1.1 Spatial Acquisition
7.4.1.2 Location Acquisition
Figure 7.6 Using lateration to determine the location of point O with respect to three reference points A, B and C (left). Using angulation to determine the location of O with respect to two angles for the line-of-sight from two points A and B and knowing the distance between A and B
7.4.2 Location and Other Spatial Abstractions
7.4.3 User Context Creation and Context-Aware Adaptation
7.4.3.1 Cartography: Adapting Spatial Viewpoints to Different User Contexts
7.4.3.2 Geocoding: Mapping Location Contexts to User Contexts
7.4.4 Spatial Context Queries and Management: GIS
Figure 7.7 Storing and indexing spatial structures in an R-tree to support efficient spatial queries
7.5 Temporal Awareness: Coordinating and Scheduling
7.5.1 Clock Synchronization: Temporal Context Creation
7.5.2 Temporal Models and Abstractions
7.5.3 Temporal Context Management and Adaptation to User Contexts
Figure 7.8 Simple task scheduling for non pre-emptive tasks with execution times, deadlines and periods known a priori without resource restrictions
7.6 ICT System Awareness
7.6.1 Context-Aware Presentation and Interaction at the UI
7.6.1.1 Acquiring the UI Context
7.6.1.2 Content Adaptation
7.6.2 Network-Aware Service Adaptation
EXERCISES
References
8 Intelligent Systems (IS)
8.1 Introduction
8.1.1 Chapter Overview
8.2 Basic Concepts
8.2.1 Types of Intelligent Systems
Table 8.1 Dimensions along which intelligent systems can be classified
8.2.2 Types of Environment for Intelligent Systems
Table 8.2 Environment models for UbiCom systems based upon the classification of environments for intelligent systems by Russell and Norvig (2003)
8.2.3 Use of Intelligence in Ubiquitous Computing
8.3 IS Architectures
8.3.1 What a Model Knows Versus How it is Used
8.3.1.1 Types of Architecture Model
Table 8.3 Designs of intelligent systems related to the types of environment they are suited in
8.3.1.2 Unilateral Versus Bilateral System Environment Models
Figure 8.1 Unilateral active system model (left) versus bilateral active system and active environment models
8.3.1.3 Model Representations
8.3.1.4 How System Models are Acquired and Adapt
8.3.2 Reactive IS Models
Figure 8.2 Reactive type intelligent system
8.3.3 Environment Model-based IS
Figure 8.3 Environment model-based IS according to Russell and Norvig (2003)
8.3.4 Goal-based IS
Figure 8.4 Two types of goal-based or utility-based IS design – basic versus hybrid, according to Russell and Norvig (2003)
8.3.5 Utility-based IS
8.3.6 Learning-based IS
Figure 8.5 Two different learning IS designs, the left according to Russell and Norvig (2003) and the right which focuses more on the use of a KB and on learning to generate hypotheses or heuristic functions
8.3.6.1 Machine Learning Design
8.3.7 Hybrid IS
Figure 8.6 Two different designs for a hybrid IS based upon horizontal and vertical layering
Figure 8.7 Simplified layered views for a hybrid environment model-based IS design and for a hybrid goal-based IS design
8.3.8 Knowledge-based (KB) IS
8.3.8.1 Production or Rule-based KB System
Figure 8.8 A rule type knowledge-based IS
8.3.8.2 Blackboard KB System
8.3.9 IS Models Applied to UbiCom Systems
Figure 8.9 Hybrid IS designs to support UbiCom
8.4 Semantic KB IS
8.4.1 Knowledge Representation
Figure 8.10 Two different graphical KRs for the device domain: a weaker, less expressive, node labelled graph representation and a stronger edge labelled graph representation
8.4.2 Design Issues
8.4.2.1 Open World Versus Closed World Semantics
8.4.2.2 Knowledge Life-cycle and Knowledge Management
8.4.2.3 Creating Knowledge
8.4.2.4 Knowledge Deployment and Maintaining Knowledge
8.4.2.5 Design Issues for UbiCom Use
8.5 Classical Logic IS
8.5.1 Propositional and Predicate Logic
8.5.2 Reasoning
8.5.3 Design Issues
8.6 Soft Computing IS Models
8.6.1 Probabilistic Networks
Figure 8.11 A Bayesian network which models vehicles and passengers indeterminately arriving and waiting at pick-up points
8.6.2 Fuzzy Logic
8.7 IS System Operations
8.7.1 Searching
Figure 8.12 Two types of uninformed or brute force search, a breadth first search versus a depth first search and one type of informed search, the A* search
8.7.2 Classical (Deterministic) Planning
Figure 8.13 Hierarchical Task Plan and Partial Order Plan for watch AV content goal
8.7.3 Non-Deterministic Planning
EXERCISES
References
9 Intelligent System Interaction
9.1 Introduction
9.1.1 Chapter Overview
9.2 Interaction Multiplicity
Figure 9.1 Some examples of smart interaction: service composition, concurrency control for shared resources, receiver context dependent responses and active intermediaries acting as filters
Table 9.1 Summary of types of multiplicity and associated designs
9.2.1 P2P Interaction Between Multiple Senders and Receivers
Figure 9.2 Some basic examples of interaction multiplicity
9.2.1.1 Unknown Sender and Malicious Senders
9.2.1.2 Unknown Receivers
9.2.1.3 Too Many Messages
9.2.2 Interaction Using Mediators
9.2.2.1 Shared Communication Resource Access
9.2.2.2 Shared Computation Resource Access
9.2.2.3 Mediating Between Requesters and Providers
Figure 9.3 Designs for mediators based upon who (requestor, mediator or provider) knows what, i.e., who knows the capabilities (the solid arrows), the service requests and, or preferences (the dashed arrows). Who initiates the flow of capabilities or preferences is indicated by the dot
9.2.3 Interaction Using Cooperative Participants
Table 9.2 Advantages and disadvantages of cooperative systems
9.2.3.1 Coordination
9.2.3.2 Coordination Using Norms and Electronic Institutions
9.2.3.3 Hierarchical and Role-based Organisational Interaction
9.2.4 Interaction with Self-interested Participants
9.2.4.1 Market-based Interaction and Auctions
9.2.4.2 Negotiation and Agreements
9.2.4.3 Consensus-based Agreements
9.3 Is Interaction Design
9.3.1 Designing System Interaction to be More Intelligent
Table 9.3 Causes of interaction errors and some ways to handle these
9.3.2 Designing Interaction Between Individual Intelligent Systems
9.3.3 Interaction Protocol Design
9.3.3.1 Semantic or Knowledge-Sharing Protocols
Figure 9.4 Multiple information representations are needed and need to be managed as we move to increasingly rich and soft information. The dotted line indicates our current ability in terms of robust system and tool support to manage these richer, softer types of information
9.3.3.2 Agent Communication Languages and Linguistic-based Protocols
Figure 9.5 Multiple ISs designed as MAS interaction using an Agent Interaction Protocol Suite or Agent Language
Figure 9.6 The FIPA request interaction protocol
9.3.4 Further Examples of the Use of Interaction Protocols
Figure 9.7 Part of the interaction for the plan given in Figure 9.10: locating help when access to resource fails (left) and delegating the task of resource access (right) to a help assistant
Figure 9.8 Part of the interaction for the plan given in Figure 9.10: asking for advice (left) and negotiating (right) resource access from multiple resource providers
9.3.5 Multi-Agent Systems
9.3.5.1 ACL and Agent Platform Design
9.3.5.2 Multi-Agent System Application Design
Figure 9.9 Organisational entities (agents) can play multiple roles. Organisational roles constrain the type of interaction
Figure 9.10 A simple planning model to achieve a goal which defines redundant paths through tasks (redundant sequences of tasks) which can be enacted to reach the goal and which can use redundant peers to enact tasks
9.4 Some Generic Intelligent Interaction Applications
9.4.1 Social Networking and Media Exchange
9.4.2 Recommender and Referral Systems
9.4.2.1 Recommender Systems
9.4.2.2 Content-based Recommendations
9.4.2.3 Collaborative Filtering
9.4.3 Pervasive Work Flow Management for People
9.4.4 Trust Management
EXERCISES
References
10 Autonomous Systems and Artificial Life
10.1 Introduction
10.1.1 Chapter Overview
10.2 Basic Autonomous Intra-Acting Systems
10.2.1 Types of Autonomous System
10.2.1.1 Autonomous Intelligent Systems
10.2.1.2 Limitation of Autonomous Systems
10.2.2 Self-* Properties of Intra-Action
Table 10.1 Types of self-star properties for UbiCom Systems
10.3 Reflective and Self-Aware Systems
10.3.1 Self-Awareness
10.3.2 Self-Describing and Self-Explaining Systems
Table 10.2 Increasing levels of support for an evolution of systems from self-describing (level 1), through to basic self-awareness (level 2), to self-explaining (levels 3 and 4) and to self-empowerment and autonomic behaviour (level 5)
10.3.3 Self-Modifying Systems Based Upon Reflective Computation
Figure 10.1 Reflective system architecture
10.4 Self-Management and Autonomic Computing
Figure 10.2 Three major types of internal self-* system control of resources: global policies driven local self-* control (left) global policies driven global self-* control (middle), local policies driven local self-* control (right)
10.4.1 Autonomic Computing Design
Figure 10.3 A high-level schematic architecture for an autonomic computer system that uses managers as opposed to resources to implement the control loop
Figure 10.4 Control loops to support self-management in different kinds of natural and artificial systems
10.4.2 Autonomic Computing Applications
10.4.3 Modelling and Management Self-Star Systems
10.5 Complex Systems
10.5.1 Self-Organization and Interaction
10.5.2 Self-Creation and Self-Replication
10.6 Artificial Life
10.6.1 Finite State Automata Models
Figure 10.5 A finite state machine represented as a Markov graph for a door control device
Figure 10.6 Five successive generations of Conway’s game of life show how a gliding pattern in which a shape shifts position
10.6.2 Evolutionary Computing
EXERCISES
References
11 Ubiquitous Communication
11.1 Introduction
11.1.1 Chapter Overview
11.2 Audio Networks
11.2.1 PSTN Voice Networks
11.2.2 Intelligent Networks and IP Multimedia Subsystems
11.2.3 ADLS Broadband
11.2.4 Wireless Telecoms Networks
11.2.5 Audio Broadcast (Radio Entertainment) Networks
11.3 Data Networks
11.3.1 Network Protocol Suites
Figure 11.1 Data messages for an application are fragmented into packets D1 to D3 for delivery across distinct communication networks C1 to C5. Data protocols can be combined to encapsulate data corresponding to a higher-level more complex protocol and to map data into a simpler lower-level one
11.3.2 Addressing
11.3.3 Routing and Internetworking
11.4 Wireless Data Networks
11.4.1 Types of Wireless Network
Table 11.1 A comparison of the characteristics of wireless networks used for different kinds of services
11.4.2 WLAN and WiMAX
11.4.3 Bluetooth
11.4.4 Zig Bee
11.4.5 Infrared
11.4.6 UWB
11.4.7 Satellite and Microwave Communication
11.4.8 Roaming between Local Wireless LANs
11.5 Universal and Transparent Audio, Video and Alphanumeric Data Network Access
11.5.1 Combined Voice and Data Networks
Figure 11.2 A typical telecoms network that can support voice and data over fixed and wireless links
11.5.2 Combined Audio-Video and Data Content Distribution Networks
Figure 11.3 A video broadcasting network over cable that also supports the cable provider operating as an ISP
11.5.3 On-demand, Interactive and Distributed Content
11.6 Ubiquitous Networks
11.6.1 Wireless Networks
11.6.2 Power Line Communication (PLC)
11.6.3 Personal Area Networks
11.6.4 Body Area Networks
11.6.5 Mobile Users Networks
Figure 11.4 The difference between mobile and wireless
11.6.5.1 Mobile Addresses
11.6.5.2 Single-Path Routing
11.6.5.3 Multi-Path Routing in Mobile Ad hoc Networks (MANETs)
Figure 11.5 An ad hoc network has no dedicated router nodes. Instead each computer can act as a router to forward messages. The full lines indicate the hop by hop data transfer. Each node is not necessarily connected to every other node. It is not a full mesh network. The dotted lines indicate some examples of end-to-end data transfer from one example node to another node
11.7 Further Network Design Issues
11.7.1 Network Access Control
11.7.2 Ubiquitous Versus Localised Access
11.7.3 Controlling Network Access: Firewalls, NATs and VPNs
11.7.4 Group Communication: Transmissions for Multiple Receivers
11.7.5 Internetworking Heterogeneous Networks
11.7.6 Global Use: Low-Cost Access Networks for Rural Use
11.7.7 Separating Management and Control from Usage
Figure 11.6 Data, control and management flows across the different layers in a simplified network model
11.7.8 Service-Oriented Networks
Figure 11.7 From network oriented service models to service-oriented network models
11.7.8.1 Service-Orientation at the Network Edge
11.7.8.2 Content-based Networks
11.7.8.3 Programmable Networks
11.7.8.4 Overlay Networks
11.7.8.5 Mesh Networks
Figure 11.8 Mesh networks, wireless mesh networks and overlay networks
11.7.8.6 Cooperative Networks
EXERCISES
References
12 Management of Smart Devices
12.1 Introduction
12.1.1 Chapter Overview
12.2 Managing Smart Devices in Virtual Environments
Table 12.1 Management requirements for smart devices
12.2.1 Process and Application Management
12.2.2 Network-Oriented Management
12.2.2.1 FCAPS
Figure 12.1 Telecommunication Network Management (TMN) Services and Network Management (NM) functional areas
Table 12.2 FCAPS network management functions
12.2.3 Monitoring and Accounting
12.2.3.1 ICMP
12.2.3.2 SNMP
Figure 12.2 Basic architecture for network management
12.2.4 Configuration Management
12.2.5 Security Management
Figure 12.3 V-SAT model of security: viewpoints of safeguards that protect the assets of the systems against threats
Table 12.3 Relation between threats, assets and safeguards from the viewpoint of the user of a smart mobile device
12.2.5.1 Encryption Support for Confidentiality, Authentication and Authorisation
12.2.5.2 Securing the System and its Middleware
Figure 12.4 Some examples of threats through the use of seamless (wireless) networks, where R indicates a Rogue User and N indicates a Normal User: (a) compromised phones can overload a network, as free-loader use a local network; (b) remote users can overload a network, preventing access by a local user; (c) local and remote users eavesdrop on a normal user.
12.2.5.3 Securing Access Devices
12.2.5.4 Securing Information
12.2.6 Fault Management
12.2.7 Performance Management
12.2.8 Service-Oriented Computer Management
12.2.8.1 Metrics for Evaluating the Use of SOA
12.2.8.2 Distributed Resource Management and the Grid
12.2.8.3 SLA Management of Services
12.2.8.4 Policy-based Service Management
12.2.8.5 Pervasive Work Flow Management for Services
12.2.9 Information Management
12.2.9.1 Information Applications
12.2.9.2 Rich Versus Lean and Soft Versus Hard Information
12.2.9.3 Managing the Information Explosion
12.2.9.4 Managing Multimedia Content
12.2.9.5 Managing Lean and Hard Data Using RDBMSs
12.2.9.6 Managing Metadata
12.3 Managing Smart Devices in Human User-Centred Environments
12.3.1 Managing Richer and Softer Data
12.3.2 Service Management Models for Human User and Physical Environments
Table 12.4 Seven different models for user-centred service management
12.3.3 User Task and Activity-Based Management
12.3.4 Privacy Management
12.3.4.1 Biometric User Identification
Table 12.5 Different types of biometric identification
Figure 12.5 Block diagram for a content-based feature recognition and identification system
12.3.4.2 Privacy-Invasive Technologies versus Privacy-Enhanced Technologies
12.3.4.3 Entrusted Regulation of User Privacy to Service Providers
12.3.4.4 Legislative Approaches to Privacy
12.4 Managing Smart Devices in Physical Environments
12.4.1 Context-Awareness
12.4.1.1 Context-Aware Management of Physical and Human Activities
12.4.1.2 Management of Contexts and Events
Figure 12.6 Classifying user activity as a composite context based upon a decision tree for individual contexts
12.4.2 Micro and Nano-Sized Devices
12.4.3 Unattended Embedded Devices
EXERCISES
References
13 Ubiquitous System: Challenges and Outlook
13.1 Introduction
13.1.1 Chapter Overview
13.2 Overview of Challenges
13.2.1 Key Challenges
Table 13.1 Challenges in designing support for UbiCom system properties: distributed, iHCI, context-awareness, autonomous, intelligence
13.2.2 Multi-Level Support for UbiCom Properties
Figure 13.1 Graduated levels and system support for each of the five core UbiCom system properties
13.2.3 Evolution Versus Revolution
13.2.4 Future Technologies
13.3 Smart Devices
13.3.1 Smaller, More Functional Smart Devices
Figure 13.2 The trend towards smaller, low-powered, higher resources smart devices
13.3.2 More Fluid Ensembles of Diverse Devices
Figure 13.3 The trend to embed and scatter numerous and even potentially overwhelming numbers of digital network devices into and bound to physical objects in the environment
13.3.3 Richer System Interaction and Interoperability
13.3.3.1 Migrating from Analogue to Digital Device Interaction
13.3.3.2 Richer Digital Device Interaction
13.4 Smart Interaction
13.4.1 Unexpected Connectivity: Accidentally Smart Environments
Figure 13.4 An example of unexpected connectivity: homeowners may not realise that their wireless speakers can actually connect themselves to sound sources in another house as easily as to sound sources within their own home
13.4.2 Impromptu Service Interoperability
13.5 Smart Physical Environment Device Interaction
13.5.1 Context-Awareness: Ill-Defined Contexts Versus a Context-Free World
13.5.2 Lower Power and Sustainable Energy Usage
13.5.3 ECO-Friendly UbiCom Devices
Figure 13.5 The engineering process versus the reverse engineering process
13.6 Smart Human-Device Interaction
13.6.1 More Diverse Human-Device Interaction
Table 13.2 UbiCom Interaction past, present and future (extended from Tesler, 1991)
13.6.2 More Versus Less Natural HCI
13.6.3 Analogue to Digital and Digital Analogues
13.6.4 Form Follows Function
13.6.5 Forms for Multi-Function Devices
13.7 Human Intelligence Versus Machine Intelligence
Figure 13.6 Human ability versus machine ability
Table 13.3 Contrasting specific human versus intelligent system behaviours
13.7.1 Posthuman: ICT Augments Human Abilities Beyond Being Human
13.7.2 Blurring of Reality and Mediated Realities
13.8 Social Issues: Promise Versus Peril
13.8.1 Increased Virtual Social Interaction Versus Local Social Interaction
13.8.2 UbiCom Accessible by Everyone
13.8.3 UbiCom Affordable by Everyone
13.8.4 Legislation in the Digital World and Digitising Legislation
13.9 Final Remarks
People also search for Ubiquitous Computing Smart Devices, Environments and Interactions 1st:
ubiquitous computing smart devices environments and interactions
ubiquitous computing book pdf
smart environments and ubiquitous computing
pervasive computing textbook
human computer interaction ubiquitous computing
Tags: Ubiquitous, Computing, Smart Devices, Environments, Interactions, Prof Stefan Poslad



