Ambient Intelligence, Wireless Networking, And Ubiquitous Computing
, by Vasilakos, Athanasios; Pedrycz, Witold- ISBN: 9781580539630 | 1580539637
- Cover: Hardcover
- Copyright: 6/30/2006
Preface | p. xvii |
Ambient Intelligence: Visions and Technologies | p. 1 |
Introduction | p. 1 |
Basic Functions and Devices of Ambient Intelligence | p. 3 |
IC Trends for Computing | p. 5 |
The Processing Perspective | p. 6 |
The Fixed Base Network | p. 6 |
The Wireless Base Network | p. 7 |
The Sensor Network | p. 7 |
The Communication Perspective | p. 8 |
The Software Perspective | p. 8 |
Computational Intelligence as a Conceptual and Computing Environment of AmI | p. 10 |
Conclusions | p. 11 |
References | p. 11 |
Ambient Intelligence and Fuzzy Adaptive Embedded Agents | p. 13 |
Introduction | p. 13 |
Agents Meet AmI | p. 14 |
Transparent Fuzzy Control | p. 17 |
FML Environment Description | p. 19 |
FML Agent Distribution | p. 23 |
Adaptivity | p. 26 |
Conclusions | p. 32 |
References | p. 33 |
Ambient Intelligence: The MyCampus Experience | p. 35 |
Introduction | p. 35 |
Prior Work | p. 37 |
Overall System Architecture | p. 38 |
A Semantic e-Wallet | p. 40 |
Capturing User Preferences | p. 46 |
Instantiating the MyCampus Infrastructure | p. 49 |
MyCampus Development Experience | p. 53 |
Empirical Evaluation | p. 54 |
Conclusions | p. 57 |
Additional Sources of Information | p. 58 |
Acknowledgments | p. 58 |
References | p. 58 |
Physical Browsing | p. 61 |
Introduction | p. 61 |
Related Work | p. 62 |
Tangible User Interfaces | p. 63 |
Physical Browsing Research | p. 63 |
Physical Browsing Terms and Definitions | p. 66 |
Physical Browsing | p. 66 |
Object | p. 66 |
Information Tag | p. 66 |
Link | p. 67 |
Physical Selection | p. 67 |
Action | p. 67 |
Physical Selection Methods | p. 67 |
PointMe | p. 68 |
TouchMe | p. 68 |
ScanMe | p. 69 |
NotifyMe | p. 70 |
Physical Browsing and Context-Awareness | p. 70 |
Visualizing Physical Hyperlinks | p. 72 |
Implementing Physical Browsing | p. 73 |
Visual codes | p. 73 |
Electromagnetic Methods | p. 74 |
Infrared Technologies | p. 74 |
Comparison of the Technologies | p. 75 |
Demonstration Applications | p. 75 |
PointMe, TouchMe, ScanMe Demonstration | p. 76 |
TouchMe Demonstration Using a Mobile Phone | p. 77 |
Conclusion | p. 79 |
Acknowledgments | p. 80 |
References | p. 80 |
Ambient Interfaces for Distributed Workgroups: Design Challenges and Recommendations | p. 83 |
Introduction | p. 83 |
Ambient Displays and Ambient Interfaces | p. 84 |
Ambient Interfaces in TOWER | p. 86 |
TOWER | p. 86 |
Ambient Indicators | p. 87 |
User Involvement | p. 94 |
Recommendations for the Design of Ambient Interfaces | p. 96 |
Conclusions | p. 100 |
Acknowledgments | p. 100 |
References | p. 100 |
Expanding the Role of Wearable Computing in Business Transformation and Living | p. 103 |
Introduction | p. 103 |
Wearable Computers-History and Present Status | p. 104 |
Wearable Computing Applications | p. 110 |
Factors Limiting the Impact of Wearable Computers | p. 112 |
Factors Providing Positive Feedback Loop | p. 115 |
Middleware Components for Accelerating Transformation | p. 117 |
Context Sensing | p. 117 |
Sensor Interfaces | p. 118 |
Data Logging and Analysis | p. 119 |
Energy Management and Awareness | p. 120 |
Suspend, Resume, and Session Migration Capabilities | p. 120 |
Device Symbiosis | p. 121 |
Privacy and Security | p. 121 |
Conclusions | p. 122 |
References | p. 122 |
Grids for Ubiquitous Computing and Ambient Intelligence | p. 127 |
Introduction | p. 127 |
Grid Computing | p. 129 |
Grid Environments | p. 130 |
The Open Grid Services Architecture | p. 132 |
Towards Future Grids | p. 133 |
Requirements and Services for Future-Generation Grids | p. 135 |
Architecture of Future-Generation grids | p. 136 |
Grids for Ubiquitous Computing and Ambient Intelligence | p. 137 |
Grids for Ambient Intelligence | p. 139 |
Conclusion | p. 140 |
Acknowledgments | p. 140 |
References | p. 141 |
Peer-to-Peer Networks-Promises and Challenges | p. 143 |
Introduction | p. 143 |
Taxonomy of P2P Systems | p. 145 |
P2P-The Promises | p. 146 |
P2P-The Challenges | p. 148 |
Security | p. 148 |
Noncooperation-Freeriders | p. 149 |
Search and Resource Location | p. 150 |
Unstructured P2P Systems | p. 151 |
Napster | p. 151 |
Gnutella | p. 152 |
Topology of Unstructured Peer-to-Peer Networks | p. 154 |
Structured P2P Systems | p. 157 |
Background | p. 157 |
The Chord Distributed Lookup Protocol | p. 158 |
Pastry | p. 161 |
Conclusions | p. 162 |
References | p. 163 |
Comparative Analysis of Routing Protocols in Wireless Ad Hoc Sensor Networks | p. 167 |
Introduction | p. 167 |
Communication Architecture | p. 170 |
Design Factors | p. 172 |
Power Consumption | p. 172 |
Fault Tolerance | p. 172 |
Scalability | p. 172 |
Hardware Issues | p. 173 |
Routing in Wireless Sensor Networks | p. 173 |
Flooding-Based Routing | p. 173 |
Gradient-Based Routing | p. 176 |
Hierarchical-Based Routing | p. 179 |
Location-Based Routing | p. 181 |
IP Mobility Management in Wireless Sensor Networks | p. 185 |
IP Mobility Protocols | p. 186 |
Limitations of Mobile IP | p. 188 |
Conclusions | p. 188 |
References | p. 189 |
Pose Awareness for Augmented Reality and Mobile Devices | p. 193 |
Introduction | p. 193 |
Problem Description | p. 195 |
System Setup | p. 196 |
Notation | p. 197 |
Fusion Framework | p. 197 |
Quaternions | p. 199 |
Kalman Filters | p. 201 |
Filter Variants | p. 202 |
General Setup | p. 203 |
Time Update | p. 204 |
Observation Update | p. 206 |
Coping with Lag | p. 206 |
Divergence Problems | p. 207 |
The Decentralized KF | p. 208 |
A Modular Kalman Filter | p. 210 |
Camera Positioning | p. 212 |
Problem Specification | p. 212 |
Marker Layout | p. 213 |
Canny Edge Detection | p. 213 |
Contour Detection | p. 215 |
Rejecting Unwanted Contours | p. 216 |
Corner Detection | p. 216 |
Fitting Lines | p. 217 |
Determining the ID of the Marker | p. 219 |
Determining the Pose from a Marker's Feature Points | p. 220 |
Coordinate Systems | p. 220 |
Camera Model | p. 220 |
Estimating the Pose | p. 221 |
First Experiment | p. 223 |
Calibration | p. 224 |
Camera Calibration | p. 224 |
Pattern Pose | p. 224 |
Camera Frame to Body Frame | p. 225 |
Measurements | p. 225 |
Performance of the Subpixel Edge Detector | p. 225 |
The Dependence of the Pose Accuracy on the Viewing Angle | p. 227 |
The Dependence of the Pose Accuracy on the Location in the Image | p. 229 |
Conclusions | p. 233 |
Pluggable Filter | p. 233 |
Usability for Mobile Devices | p. 233 |
Usability for Augmented Reality | p. 233 |
Conclusions | p. 235 |
References | p. 235 |
Dynamic Synthesis of Natural Human-Machine Interfaces in Ambient Intelligence Environments | p. 237 |
Introduction | p. 237 |
A Task Architectural Model for Ambient Intelligence | p. 239 |
Service/Resource Components | p. 241 |
Tasks | p. 242 |
The Task Synthesis Service | p. 244 |
A Human-Machine Interface Functional Architecture for Ambient Intelligence | p. 245 |
Context-Awareness | p. 247 |
Natural Interaction | p. 248 |
Reusability | p. 250 |
Synthesizing Natural Human-Machine Interfaces | p. 251 |
Dynamically Composable Human-Machine Interfaces | p. 251 |
Realization of the Scenario | p. 253 |
Current Achievements and Future Perspectives | p. 256 |
Conclusions | p. 260 |
References | p. 260 |
Emotional Interfaces with Ambient Intelligence | p. 263 |
Introduction | p. 263 |
Background | p. 264 |
The General Framework | p. 264 |
The Key Role of Emotions | p. 265 |
The Emotion Physical Milieu | p. 265 |
The Emotion Psychological Milieu | p. 266 |
No Emotion without Cognition | p. 267 |
Materials and Methods | p. 269 |
The Data | p. 269 |
The General Architecture | p. 271 |
A Simulated Experiment | p. 273 |
Current and Future Work | p. 278 |
Conclusions | p. 283 |
References | p. 284 |
A Sense of Context in Ubiquitous Computing | p. 287 |
Introduction | p. 287 |
Ubiquitous Computing: A Paradigm for the 21st Century | p. 287 |
Mobile Computing | p. 288 |
Wearable Computing | p. 289 |
The Question of Context | p. 289 |
Some Definitions of Context | p. 289 |
Reflections on Context in Mobile Computing | p. 290 |
Spatial Context | p. 290 |
User Profile | p. 291 |
Device Profile | p. 291 |
Environment | p. 292 |
Wireless Advertising | p. 292 |
Emotions in Context | p. 293 |
Affective Computing Systems | p. 293 |
Introducing Ad-me | p. 294 |
Ambient Sensors: Foundations of a Smart Environment | p. 296 |
Introducing the Intelligent Climitization Environment (ICE) | p. 297 |
Architecture | p. 297 |
Conclusion | p. 300 |
References | p. 300 |
Ad Hoc On-Demand Fuzzy Routing for Wireless Mobile Ad Hoc Networks | p. 303 |
Introduction | p. 303 |
Problem Statement | p. 304 |
Limitations of Single Metric Single Objective Routing Schemes | p. 304 |
Complexity in Multiobjective Routing in MANETs | p. 305 |
Applicability of Fuzzy Logic for Multiobjective Routing in MANETs | p. 306 |
Brief Background of Fuzzy Logic | p. 307 |
Cost Function for MANET Multiobjective Routing | p. 308 |
Objective 1 (O[subscript 1]): Minimizing End-to-End Delay | p. 308 |
Objective 2 (O[subscript 2]): Maximizing Probability of Successful Packet Delivery | p. 308 |
Objective 3 (O[subscript 3]): Minimizing Total Battery Cost of the Route | p. 309 |
Ad Hoc On-Demand Fuzzy Routing (AOFR) | p. 312 |
AOFR Route Discovery Phase | p. 313 |
AOFR Route Reply Phase | p. 313 |
Fuzzy Cost Calculation in AOFR | p. 313 |
Simulation Parameters | p. 317 |
Mobility Model | p. 319 |
Traffic Model | p. 319 |
Energy Model | p. 320 |
Performance Evaluation | p. 320 |
End-to-End Delay | p. 320 |
Congestion Loss | p. 321 |
Packet Delivery Fraction | p. 321 |
Expiration Sequence | p. 321 |
Normalized Routing Load | p. 322 |
Route Stability | p. 323 |
Packets-per-Joule | p. 323 |
Discussion | p. 324 |
Conclusions | p. 325 |
References | p. 326 |
Authentication and Security Protocols for Ubiquitous Wireless Networks | p. 329 |
Introduction | p. 329 |
System Architecture and Design Issues | p. 330 |
Authentication Architecture for Interworking 3G/WLAN | p. 332 |
Mobile IP with AAA Extensions | p. 333 |
Authentication Servers and Proxy | p. 334 |
AAA and Inter-Domain Roaming | p. 335 |
Authentication in Wireless Security Protocols | p. 336 |
Wired Equivalent Privacy 802.11 LANs | p. 337 |
Extensible Authentication Protocol and its Variants | p. 337 |
802.1x Authentication Protocol | p. 337 |
WiFi Protected Access and 802.11i | p. 338 |
Virtual Private Network | p. 339 |
Comparison Study of Wireless Security Protocols | p. 339 |
Security Policies | p. 340 |
Conclusions | p. 341 |
References | p. 343 |
Learning in the AmI: from Web-Based Education to Ubiquitous Learning Experiences | p. 345 |
Introduction | p. 345 |
The Present Paradigm in Learning Technologies | p. 346 |
The Emerging Paradigm: Mobile Learning | p. 347 |
The Future Paradigm: Learning in the AmI | p. 350 |
Enabling Technologies, Models, and Standards | p. 351 |
Personalization Technologies and Computational Intelligence | p. 352 |
Learning Technologies Standards | p. 354 |
Learning Theories and Models | p. 355 |
Conclusions | p. 356 |
References | p. 357 |
Meetings and Meeting Support in Ambient Intelligence | p. 359 |
Introduction | p. 359 |
What Are Meetings? | p. 361 |
Meeting Resources | p. 362 |
Meeting Process | p. 362 |
Meeting Roles | p. 362 |
Problems with Meetings | p. 363 |
Technology: Mediation and Support | p. 364 |
The Virtuality Continuum | p. 364 |
Meetings in the Virtuality Continuum | p. 365 |
Technology and Meeting Resources | p. 366 |
Supporting Meeting Processes | p. 368 |
Supporting Meeting Roles | p. 369 |
Learning How to Respond | p. 370 |
Projects on Meetings | p. 371 |
Recordings and Sensors | p. 372 |
Annotations and Layers of Analysis | p. 372 |
Applications and Tasks | p. 373 |
Conclusions | p. 374 |
Acknowledgments | p. 374 |
References | p. 374 |
Handling Uncertain Context Information in Pervasive Computing Environments | p. 379 |
Extending Ontologies of Context with Fuzzy Logic | p. 380 |
The Fuzzy Ontology | p. 381 |
The Membership Function Class | p. 381 |
The Fuzzy Rule Class | p. 383 |
The Similar Class | p. 383 |
The Fuzzy Inference Class | p. 383 |
The Fuzzy Inference of Context | p. 384 |
Defining Linguistic Terms and Generating Membership Functions | p. 387 |
Building the Inductive Fuzzy Tree | p. 389 |
Rule Generation and Inference Process | p. 392 |
Prototype Implementation: The Event-Notification Service | p. 396 |
Fuzzy Inference in the Event-Notification Service | p. 396 |
Semantic Inference in the Event-Notification Service | p. 396 |
Conclusions | p. 399 |
References | p. 400 |
Anomaly Detection in Web Documents Using Computationally Intelligent Methods of Fuzzy-Based Clustering | p. 401 |
Introduction | p. 401 |
The Problem | p. 403 |
Cosine-Based Algorithms | p. 404 |
Crisp Cosine Clustering (CCC) | p. 405 |
Fuzzy-Based Cosine Clustering (FCC) | p. 405 |
Local Fuzzy-Based Cosine Clustering (LFCC) | p. 405 |
Fuzzy-based Global Clustering | p. 407 |
A New Distance Measure | p. 407 |
The General Scheme | p. 409 |
Application: Terrorist Detection System | p. 411 |
The Experiment | p. 412 |
The Results | p. 412 |
Conclusions | p. 413 |
Acknowledgments | p. 414 |
References | p. 414 |
Intelligent Automatic Exploration of Virtual Worlds | p. 417 |
Introduction | p. 417 |
Why Explore Virtual Worlds? | p. 418 |
Simple Virtual World Understanding | p. 419 |
Nondegenerated View | p. 419 |
Direct Approximate Viewpoint Calculation | p. 420 |
Iterative Viewpoint Calculation | p. 421 |
Direct Exhaustive Viewpoint Calculation | p. 422 |
What is Visual Complexity of a Scene? | p. 422 |
How to Compute Visual Complexity | p. 424 |
Accurate Visual Complexity Estimation | p. 424 |
Fast Approximate Estimation of Visual Complexity | p. 426 |
Virtual World Exploration | p. 427 |
Incremental Outside Exploration | p. 428 |
Viewpoint Entropy-Based Exploration | p. 429 |
Other Methods | p. 431 |
Future Issues | p. 431 |
Online Exploration of Virtual Worlds | p. 432 |
Offline Exploration of Virtual Worlds | p. 432 |
Conclusions | p. 433 |
References | p. 435 |
Index | p. 437 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.