572 research outputs found

    Challenges of Information and Communication Technologies Usage in E-Business Systems

    Get PDF
    In today\u27s identification and data collection methods on traffic entities, large number of traffic and logistic systems uses one of the automatic identification and data capture (AIDC) technologies. The mentioned group contains information and communication technologies such as radio‐frequency identification (RFID), real‐time location systems (RTLS), near field communication (NFC), global positioning system (GPS), and beacon and advanced tagging technologies such as barcode and quick response code (QR code) which can be implemented with function of mobile traffic entities identification in traffic environment. In this chapter, possibilities and characteristics of mentioned technologies will be described from the aspect of their usage in traffic system through implementation of e‐business. Data collection and exchange concept will be based on cloud computing and Internet of Things concepts. Through various case study examples in traffic environment, more efficient use of AIDC technologies in traffic system will be shown

    Context-aware information delivery for mobile construction workers

    Get PDF
    The potential of mobile Information Technology (IT) applications to support the information needs of mobile construction workers has long been understood. However, existing mobile IT applications in the construction industry have underlined limitations, including their inability to respond to the changing user context, lack of semantic awareness and poor integration with the desktop-based infrastructure. This research argues that awareness of the user context (such as user role, preferences, task-at-hand, location, etc.) can enhance mobile IT applications in the construction industry by providing a mechanism to deliver highly specific information to mobile workers by intelligent interpretation of their context. Against this this background, the aim of this research was to investigate the applicability of context-aware information delivery (CAID) technologies in the construction industry. The research methodology adopted consisted of various methods. A literature review on context-aware and enabling technologies was undertaken and a conceptual framework developed, which addressed the key issues of context-capture, contextinference and context-integration. To illustrate the application of CAID in realistic construction situations, five futuristic deployment scenarios were developed which were analysed with several industry and technology experts. From the analysis, a common set of user needs was drawn up. These needs were subsequently translated into the system design goals, which acted as a key input to the design and evaluation of a prototype system, which was implemented on a Pocket-PC platform. The main achievements of this research include development of a CAID framework for mobile construction workers, demonstration of CAID concepts in realistic construction scenarios, analysis of the Construction industry needs for CAID and implementation and validation of the prototype to demonstrate the CAID concepts. The research concludes that CAID has the potential to significantly improve support for mobile construction workers and identifies the requirements for its effective deployment in the construction project delivery process. However, the industry needs to address various identified barriers to enable the realisation of the full potential of CAID

    Ubiquitous Computing

    Get PDF
    The aim of this book is to give a treatment of the actively developed domain of Ubiquitous computing. Originally proposed by Mark D. Weiser, the concept of Ubiquitous computing enables a real-time global sensing, context-aware informational retrieval, multi-modal interaction with the user and enhanced visualization capabilities. In effect, Ubiquitous computing environments give extremely new and futuristic abilities to look at and interact with our habitat at any time and from anywhere. In that domain, researchers are confronted with many foundational, technological and engineering issues which were not known before. Detailed cross-disciplinary coverage of these issues is really needed today for further progress and widening of application range. This book collects twelve original works of researchers from eleven countries, which are clustered into four sections: Foundations, Security and Privacy, Integration and Middleware, Practical Applications

    MEDUSA: Middleware for End-User Composition of Ubiquitous Applications

    Get PDF
    International audienceActivity-oriented computing (AOC) is a paradigm promoting the run-time realization of applications by composing ubiquitous services in the user's surroundings according to abstract specifications of user activities. The paradigm is particularly well-suited for enacting ubiquitous applications. However, there is still a need for end-users to create and control the ubiquitous applications because they are better aware of their own needs and activities than any existing context-aware system could ever be. In this chapter, we give an overview of state of the art ubiquitous application composition, present the architecture of the MEDUSA middleware and demonstrate its realization, which is based on existing open-source solutions. On the basis of our discussion on state of the art ubiquitous application composition, we argue that current implementations of the AOC paradigm are lacking in end-user support. Our solution, the MEDUSA middleware, allows end-users to explicitly compose applications from networked services, while building on an activity-oriented computing infrastructure to dynamically realize the composition

    Comparative analyzes of technological tools between industry 4.0 and smart cities approaches: the new society ecosystem

    Get PDF
    Today the growth of modern cities is unprecedented in the history of urbanization and the urban environmental problems have also been increased. Unfortunately, there is no much time to modify past failures and improve the status quo, and ensure the protection of the environment. Consequently, it’s important to pay attention to the development of sustainable urban planning and its role in urban management issues is an objective that requires a new approach.On the other hand, Industry 4.0 (I.4.0), as called the 4th Industrial Revolution, carries impacts in the production on companies, the economy and society, with disruptive character, creating new markets and destabilizing the traditional way of doing business. Once I.4.0 is a strategic approach to the integration of advanced control systems with internet technology, enabling communication between people, products and complex systems, it’s expected to follow the same in the Smart Cities development.This article aims to relate technological tools of I.4.0 and the dimensions of “Smart Cities”, based on analytical framework for better understanding the emergence of new society ecosystem focused on the redefinition of the cities’ concept, urbanism and way of life, motivated by this new reconfiguration

    From Signal to Social : Steps Towards Pervasive Social Context

    Get PDF
    The widespread adoption of smartphones with advanced sensing, computing and data transfer capabilities has made scientific studies of human social behavior possible at a previously unprecedented scale. It has also allowed context-awareness to become a natural feature in many applications using features such as activity recognition and location information. However, one of the most important aspects of context remains largely untapped at scale, i.e. social interactions and social context. Social interaction sensing has been explored using smartphones and specialized hardware for research purposes within computational social science and ubiquitous computing, but several obstacles remain to make it usable in practice by applications at industrial scale. In this thesis, I explore methods of physical proximity sensing and extraction of social context information from user-generated data for the purpose of context-aware applications. Furthermore, I explore the application space made possible through these methods, especially in the class of use cases that are characterized by embodied social agency, through field studies and a case study.A major concern when collecting context information is the impact on user privacy. I have performed a user study in which I have surveyed the user attitudes towards the privacy implications of proximity sensing. Finally, I present results from quantitatively estimating the sensitivity of a simple type of context information, i.e. application usage, in terms of risk of user re-identification

    Context-aware information delivery for mobile construction workers

    Get PDF
    The potential of mobile Information Technology (IT) applications to support the information needs of mobile construction workers has long been understood. However, existing mobile IT applications in the construction industry have underlined limitations, including their inability to respond to the changing user context, lack of semantic awareness and poor integration with the desktop-based infrastructure. This research argues that awareness of the user context (such as user role, preferences, task-at-hand, location, etc.) can enhance mobile IT applications in the construction industry by providing a mechanism to deliver highly specific information to mobile workers by intelligent interpretation of their context. Against this this background, the aim of this research was to investigate the applicability of context-aware information delivery (CAID) technologies in the construction industry. The research methodology adopted consisted of various methods. A literature review on context-aware and enabling technologies was undertaken and a conceptual framework developed, which addressed the key issues of context-capture, contextinference and context-integration. To illustrate the application of CAID in realistic construction situations, five futuristic deployment scenarios were developed which were analysed with several industry and technology experts. From the analysis, a common set of user needs was drawn up. These needs were subsequently translated into the system design goals, which acted as a key input to the design and evaluation of a prototype system, which was implemented on a Pocket-PC platform. The main achievements of this research include development of a CAID framework for mobile construction workers, demonstration of CAID concepts in realistic construction scenarios, analysis of the Construction industry needs for CAID and implementation and validation of the prototype to demonstrate the CAID concepts. The research concludes that CAID has the potential to significantly improve support for mobile construction workers and identifies the requirements for its effective deployment in the construction project delivery process. However, the industry needs to address various identified barriers to enable the realisation of the full potential of CAID.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Energy Management in RFID-Sensor Networks: Taxonomy and Challenges

    Get PDF
    Ubiquitous Computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has the capability to encapsulate identification potential and sensing capabilities, strives towards the objective of developing seamless, interoperable and securely integrated systems which can be achieved by connecting the Internet with computing devices. This gives way for the evolution of wireless energy harvesting and power transmission using computing devices. Radio Frequency (RF) based Energy Management (EM) has become the backbone for providing energy to wireless integrated systems. The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET). These techniques enable the dynamic energy level maintenance and optimisation as well as ensuring reliable communication which adheres to the goal of increased network performance and lifetime. In this paper, we present an overview of RSN, its types of integration and relative applications. We then provide the state-of-the-art EM techniques and strategies for RSN from August 2009 till date, thereby reviewing the existing EH and ET mechanisms designed for RSN. The taxonomy on various challenges for EM in RSN has also been articulated for open research directives
    • 

    corecore