7,029 research outputs found

    Ubiquitous and context-aware computing modelling : study of devices integration in their environment

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIn an almost imperceptible way, ubiquitous and context-aware computing make part of our everyday lives, as the world has developed in an interconnected way between humans and technological devices. This interconnectedness raises the need to integrate humans’ interaction with the different devices they use in different social contexts and environments. In the proposed research, it is suggested the development of new scenario building based on a current ubiquitous computing model dedicated to the environment context-awareness. We will also follow previous research made on the formal structure computation model based on social paradigm theory, dedicated to embed devices into different context environments with social roles developed by Santos (2012/2015). Furthermore, several socially relevant context scenarios are to be identified and studied. Once identified, we gather and document the requirements that devices should have, according to the model, in order to achieve a correct integration in their contextual environment

    Smart campuses : extensive review of the last decade of research and current challenges

    Get PDF
    Novel intelligent systems to assist energy transition and improve sustainability can be deployed at different scales, ranging from a house to an entire region. University campuses are an interesting intermediate size (big enough to matter and small enough to be tractable) for research, development, test and training on the integration of smartness at all levels, which has led to the emergence of the concept of “smart campus” over the last few years. This review article proposes an extensive analysis of the scientific literature on smart campuses from the last decade (2010-2020). The 182 selected publications are distributed into seven categories of smartness: smart building, smart environment, smart mobility, smart living, smart people, smart governance and smart data. The main open questions and challenges regarding smart campuses are presented at the end of the review and deal with sustainability and energy transition, acceptability and ethics, learning models, open data policies and interoperability. The present work was carried out within the framework of the Energy Network of the Regional Leaders Summit (RLS-Energy) as part of its multilateral research efforts on smart region

    Identity Management Framework for Internet of Things

    Get PDF

    Balancing privacy needs with location sharing in mobile computing

    Get PDF
    Mobile phones are increasingly becoming tools for social interaction. As more phones come equipped with location tracking capabilities, capable of collecting and distributing personal information (including location) of their users, user control of location information and privacy for that matter, has become an important research issue. This research first explores various techniques of user control of location in location-based systems, and proposes the re-conceptualisation of deception (defined here as the deliberate withholding of location information) from information systems security to the field of location privacy. Previous work in this area considers techniques such as anonymisation, encryption, cloaking and blurring, among others. Since mobile devices have become social tools, this thesis takes a different approach by empirically investigating first the likelihood of the use of the proposed technique (deception) in protecting location privacy. We present empirical results (based on an online study) that show that people are willing to deliberately withhold their location information to protect their location privacy. However, our study shows that people feel uneasy in engaging in this type of deception if they believe this will be detected by their intended recipients. The results also suggest that the technique is popular in situations where it is very difficult to detect that there has been a deliberate withholding of location information during a location disclosure. Our findings are then presented in the form of initial design guidelines for the design of deception to control location privacy. Based on these initial guidelines, we propose and build a deception-based privacy control model. Two different evaluation approaches are employed in investigating the suitability of the model. These include; a field-based study of the techniques employed in the model and a laboratory-based usability study of the Mobile Client application upon which the DPC model is based, using HCI (Human Computer Interaction) professionals. Finally, we present guidelines for the design of deception in location disclosure, and lessons learned from the two evaluation approaches. We also propose a unified privacy preference framework implemented on the application layer of the mobile platform as a future direction of this thesis

    Why customers participate in social commerce activities? – A laddering analysis

    Get PDF
    A new phenomenon emerging within virtual communities is a blurring between social and commercial activities. This paper explores the motivations of customers who participate in social commerce, The chosen context is micro-businesses operated by members of a virtual community of Malay lifestyle bloggers. Observations were carried out and 21 participants were interviewed in order to build an understanding of the community. We used laddering techniques in order to answer the research questions, which is “what is the relationship between participation in virtual communities and their participation in social commerce?” We found that virtual community relationship was the main influential factor, and that virtual community relationship contributed to the sense of social support as well as customers’ trust in social commerce

    A role-based software architecture to support mobile service computing in IoT scenarios

    Get PDF
    The interaction among components of an IoT-based system usually requires using low latency or real time for message delivery, depending on the application needs and the quality of the communication links among the components. Moreover, in some cases, this interaction should consider the use of communication links with poor or uncertain Quality of Service (QoS). Research efforts in communication support for IoT scenarios have overlooked the challenge of providing real-time interaction support in unstable links, making these systems use dedicated networks that are expensive and usually limited in terms of physical coverage and robustness. This paper presents an alternative to address such a communication challenge, through the use of a model that allows soft real-time interaction among components of an IoT-based system. The behavior of the proposed model was validated using state machine theory, opening an opportunity to explore a whole new branch of smart distributed solutions and to extend the state-of-the-art and the-state-of-the-practice in this particular IoT study scenario.Peer ReviewedPostprint (published version

    Deep convolutional and LSTM recurrent neural networks for multimodal wearable activity recognition

    Get PDF
    Human activity recognition (HAR) tasks have traditionally been solved using engineered features obtained by heuristic processes. Current research suggests that deep convolutional neural networks are suited to automate feature extraction from raw sensor inputs. However, human activities are made of complex sequences of motor movements, and capturing this temporal dynamics is fundamental for successful HAR. Based on the recent success of recurrent neural networks for time series domains, we propose a generic deep framework for activity recognition based on convolutional and LSTM recurrent units, which: (i) is suitable for multimodal wearable sensors; (ii) can perform sensor fusion naturally; (iii) does not require expert knowledge in designing features; and (iv) explicitly models the temporal dynamics of feature activations. We evaluate our framework on two datasets, one of which has been used in a public activity recognition challenge. Our results show that our framework outperforms competing deep non-recurrent networks on the challenge dataset by 4% on average; outperforming some of the previous reported results by up to 9%. Our results show that the framework can be applied to homogeneous sensor modalities, but can also fuse multimodal sensors to improve performance. We characterise key architectural hyperparameters’ influence on performance to provide insights about their optimisation
    • …
    corecore