73 research outputs found

    A Conceptual Framework for Analyzing the Use of Context in Groupware

    Full text link
    Abstract. This article presents a conceptual framework for the identification and classification of contextual elements included in groupware applications. Contextual elements store information that helps group members to characterize and to understand the interaction and its associate information. The conceptual framework can be used not only to guide the development of new groupware applications but also to analyze existing groupware. We illustrate the use of the framework in the analysis of three groupware tools.

    A Spatial Distribution Study of Faunal Remains from Two Lower Magdalenian Occupation Levels in El MirĂłn Cave, Cantabria, Spain

    Get PDF
    Abstract: Human behaviour can be reconstructed by analysing specific activities and campsite organization using spatial analysis. The dense occupation layers of the Lower Cantabrian Magdalenian in the Northern Spain reveal varied aspects of Upper Palaeolithic lifeways, including evidence of specific localized activities. The outer vestibule of El Mirón cave has a particularly rich and intact Lower Magdalenian occupation horizon, Levels 15–17. The excavations in the outer vestibule “Cabin” area of the site revealed excellent bone preservation. Artefacts and faunal remains were individually recorded and sediments water-screened to yield a large sample of archaeological finds and spatial data. Zooarchaeological analysis provided the taxonomic, anatomic and taphonomic determination of the faunal individual finds. Smaller animal remains were categorized and counted; special attention was given to the identification of anthropogenic modifications such as burnt bones or bone flakes. These small refuse items are considered to be useful, in situ indicators of localized activities. The spatial distribution analysis of this dense and complex palimpsest of El Mirón Lower Cantabrian Magdalenian layers required GIS based methods including density analysis, heatmaps and cluster analysis. Based on the spatial distribution of Level 15 and 16 faunal remains, different activity areas were identified comprising hearth, working and dropping zones. These results imply the deliberately segregated use of space within the Lower Cantabrian Magdalenian site area, in which bone-processing activities played a central rol

    A multivariant secure framework for smart mobile health application

    Get PDF
    This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecommunications Technologies, available online: https://doi.org/10.1002/ett.3684 The accepted version of the publication may differ from the final published version.Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost as well as easy availability of data sharing and accessing devices, the Internet of Things (IoT) has grown exponentially during the past few years. The availability of these devices plays a remarkable role in the new era of mHealth. In mHealth, the sensors generate enormous amounts of data and the context-aware computing has proven to collect and manage the data. The context aware computing is a new domain to be aware of context of involved devices. The context-aware computing is playing a very significant part in the development of smart mobile health applications to monitor the health of patients more efficiently. Security is one of the key challenges in IoT-based mHealth application development. The wireless nature of IoT devices motivates attackers to attack on application; these vulnerable attacks can be denial of service attack, sinkhole attack, and select forwarding attack. These attacks lead intruders to disrupt the application's functionality, data packet drops to malicious end and changes the route of data and forwards the data packet to other location. There is a need to timely detect and prevent these threats in mobile health applications. Existing work includes many security frameworks to secure the mobile health applications but all have some drawbacks. This paper presents existing frameworks, the impact of threats on applications, on information, and different security levels. From this line of research, we propose a security framework with two algorithms, ie, (i) patient priority autonomous call and (ii) location distance based switch, for mobile health applications and make a comparative analysis of the proposed framework with the existing ones.Published onlin

    context in artificial intelligence II. key elements of contexts

    No full text
    Context is the challenge for the coming years in artificial intelligence. In the companion paper [6], we present a view of how context is considered through the literature in various domains. In this paper, we present the main results of discussions at some workshops and the first conference focusing on the notion of context.  We point out the opposition between two viewpoints on context, namely the engineering and the cognitive ones. We show that this opposition is only superficial because they do not consider context at the same level, one is at the level of the knowledge representation, the other at the level of the interaction between two agents

    COntext in artificial intelligence: I. A survey of the literature

    No full text
    Context is the challenge for the coming years in artificial intelligence. In the companion paper [8], we present the main results of discussions at two workshops and at the first conference  focusing on the notion of context. In this paper, we present a view of how context is considered in knowledge acquisition, machine learning, communication, and databases and ontologies. We describe the way in which context is modelled and represented in the logic formalism and a rule-based formalism. We present briefly after some of the other approaches,  and sum up the different points that may be of interest for modelling context effectively

    Representation of procedures and practices in contextual graphs

    No full text
    • 

    corecore