85 research outputs found

    A Conceptual Framework for Analyzing the Use of Context in Groupware

    Full text link
    Abstract. This article presents a conceptual framework for the identification and classification of contextual elements included in groupware applications. Contextual elements store information that helps group members to characterize and to understand the interaction and its associate information. The conceptual framework can be used not only to guide the development of new groupware applications but also to analyze existing groupware. We illustrate the use of the framework in the analysis of three groupware tools.

    A Spatial Distribution Study of Faunal Remains from Two Lower Magdalenian Occupation Levels in El MirĂłn Cave, Cantabria, Spain

    Get PDF
    Abstract: Human behaviour can be reconstructed by analysing specific activities and campsite organization using spatial analysis. The dense occupation layers of the Lower Cantabrian Magdalenian in the Northern Spain reveal varied aspects of Upper Palaeolithic lifeways, including evidence of specific localized activities. The outer vestibule of El Mirón cave has a particularly rich and intact Lower Magdalenian occupation horizon, Levels 15–17. The excavations in the outer vestibule “Cabin” area of the site revealed excellent bone preservation. Artefacts and faunal remains were individually recorded and sediments water-screened to yield a large sample of archaeological finds and spatial data. Zooarchaeological analysis provided the taxonomic, anatomic and taphonomic determination of the faunal individual finds. Smaller animal remains were categorized and counted; special attention was given to the identification of anthropogenic modifications such as burnt bones or bone flakes. These small refuse items are considered to be useful, in situ indicators of localized activities. The spatial distribution analysis of this dense and complex palimpsest of El Mirón Lower Cantabrian Magdalenian layers required GIS based methods including density analysis, heatmaps and cluster analysis. Based on the spatial distribution of Level 15 and 16 faunal remains, different activity areas were identified comprising hearth, working and dropping zones. These results imply the deliberately segregated use of space within the Lower Cantabrian Magdalenian site area, in which bone-processing activities played a central rol

    A multivariant secure framework for smart mobile health application

    Get PDF
    This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecommunications Technologies, available online: https://doi.org/10.1002/ett.3684 The accepted version of the publication may differ from the final published version.Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost as well as easy availability of data sharing and accessing devices, the Internet of Things (IoT) has grown exponentially during the past few years. The availability of these devices plays a remarkable role in the new era of mHealth. In mHealth, the sensors generate enormous amounts of data and the context-aware computing has proven to collect and manage the data. The context aware computing is a new domain to be aware of context of involved devices. The context-aware computing is playing a very significant part in the development of smart mobile health applications to monitor the health of patients more efficiently. Security is one of the key challenges in IoT-based mHealth application development. The wireless nature of IoT devices motivates attackers to attack on application; these vulnerable attacks can be denial of service attack, sinkhole attack, and select forwarding attack. These attacks lead intruders to disrupt the application's functionality, data packet drops to malicious end and changes the route of data and forwards the data packet to other location. There is a need to timely detect and prevent these threats in mobile health applications. Existing work includes many security frameworks to secure the mobile health applications but all have some drawbacks. This paper presents existing frameworks, the impact of threats on applications, on information, and different security levels. From this line of research, we propose a security framework with two algorithms, ie, (i) patient priority autonomous call and (ii) location distance based switch, for mobile health applications and make a comparative analysis of the proposed framework with the existing ones.Published onlin

    context in artificial intelligence II. key elements of contexts

    No full text
    Context is the challenge for the coming years in artificial intelligence. In the companion paper [6], we present a view of how context is considered through the literature in various domains. In this paper, we present the main results of discussions at some workshops and the first conference focusing on the notion of context.  We point out the opposition between two viewpoints on context, namely the engineering and the cognitive ones. We show that this opposition is only superficial because they do not consider context at the same level, one is at the level of the knowledge representation, the other at the level of the interaction between two agents

    COntext in artificial intelligence: I. A survey of the literature

    No full text
    Context is the challenge for the coming years in artificial intelligence. In the companion paper [8], we present the main results of discussions at two workshops and at the first conference  focusing on the notion of context. In this paper, we present a view of how context is considered in knowledge acquisition, machine learning, communication, and databases and ontologies. We describe the way in which context is modelled and represented in the logic formalism and a rule-based formalism. We present briefly after some of the other approaches,  and sum up the different points that may be of interest for modelling context effectively

    ABSTRACT DECISION MAKING AT A CROSSROAD: A NEGOTIATION OF CONTEXTS

    No full text
    The initial training generally puts the driver in a supervised learning context that is not the autonomous-driving context in which decision making and responsibility are assumed by the driver alone. As a consequence, the beginner is not able to contextualize the learned procedures and transform them in effective practices, to identify and manage pre-critical situations and to evaluate the degree of danger of situations. Starting from the studies and works presented in the literature, we propose a twofold approach based on the one hand on global methods and, on the other hand, on local methods. We first represent a driver in two spaces (situations and behaviors) related through scenarios. The situation space is an objective representation by a lattice and the other one is a subjective representation by contextual graphs. Our second goal is to provide the driver with a system for a self training and self evaluation of his behavior in different pre-critical situations. This paper discusses the cognitive part of the approach and objectives on a case study

    Representation of procedures and practices in contextual graphs

    No full text

    Cooperating for assisting intelligently operators

    No full text
    We are in the process of design of an intelligent cooperative system in a nuclear plant application. The system must cooperate with an operator who accomplishes a task of supervision of a real-world process. We point out in the paper that a cooperation between a cooperative system and an operator has two modes: a waking state and a participating state. During the waking state, the system observes the operator's behavior and the consequences on the process. During the participating state, the cooperative system builds jointly with the user a solution to a problem. In our approach, the cooperation depends of the system capabilities to explain, to incrementally acquire knowledge and to make explicit the context of the cooperation. We develop these ideas in the framework of the design of the cooperative system in the nuclear plant application
    • 

    corecore