Nobody downloaded yet

Pervasive Context-Aware Systems - Term Paper Example

Comments (0) Cite this document
Summary
The present discourse “Pervasive Context-Aware Systems” elaborates key requirements for building pervasive environments. The project presents an ontology of a smart home, in particular, elderly self-care home. Web semantic language has been chosen to build the context-aware prototype ontology…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Pervasive Context-Aware Systems
Read TextPreview

Extract of sample "Pervasive Context-Aware Systems"

Download file to see previous pages Protégé-OWL 4.1 was used to build OWL representation of the elderly smart home. The presented ontology implements reasoning set on the rules of the ontology and elimination of the rules outside of the ontology.
In recent years, rapid advances in technology have paved the way for the creation of pervasive environments. A pervasive environment is a user-centric environment in which there are a number of devices (sensors, computers) and services (such as Web services) that help users to achieve their various application goals. Smart environments represent the evolutionary development of pervasive environments. Smart environment  is able to acquire knowledge about its inhabitants and their surroundings, and adapt to the inhabitants’ behaviour or preferences in order to improve their living experiences. The type of inhabitants’ experiences may vary from the safety of the users to the progress of an independent living environment. An important characteristic of smart environments is the interaction of smart devices including sensors and computer systems used for acquiring inhabitants’ contexts such as locations, activities, or vital signs. Therefore, context awareness is a key issue for improving inhabitants’ independent living experience. Context awareness is about the situation an inhabitant is in and also about adapting the smart devices’ reaction to that situation. Ontology language is the context representation technology which maximises the context awareness of the smart devices. It is a set of vocabulary to describe the conceptualisation of a particular domain.
One of the goals of this project is to build a context-aware ontology based on the acquired context from a smart environment and the inhabitants. The context in this project consists of location, time, and information on inhabitant’s vital signs. The ontology represents concepts and relations for the acquired context. The aim is to represent all the acquired information in context form to reduce the dependency of the framework on rules outside of the ontology. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Pervasive Context-Aware Systems Term Paper Example | Topics and Well Written Essays - 4250 words - 1, n.d.)
Pervasive Context-Aware Systems Term Paper Example | Topics and Well Written Essays - 4250 words - 1. Retrieved from https://studentshare.org/information-technology/1751788-project
(Pervasive Context-Aware Systems Term Paper Example | Topics and Well Written Essays - 4250 Words - 1)
Pervasive Context-Aware Systems Term Paper Example | Topics and Well Written Essays - 4250 Words - 1. https://studentshare.org/information-technology/1751788-project.
“Pervasive Context-Aware Systems Term Paper Example | Topics and Well Written Essays - 4250 Words - 1”, n.d. https://studentshare.org/information-technology/1751788-project.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Pervasive Context-Aware Systems

Pervasive Computiong

...and trust can be major risks and issues. In addition, privacy has always been a critical issue in distributed systems and mobile computing. In this scenario there are number issues and aspects that are still hindering in the successful implementations and applications of pervasive computing technology. These issues can comprise identity theft, hacking, data theft, virus attacks, etc. (Answers Corporation; Duquenoy and Burmeister). Ethical Aspects The ethical issues and challenges of pervasive computing merge due to the blend of different technologies and exchange methods, the invisibility of the system and its capability for data-handling, imprudent technologies...
5 Pages(1250 words)Research Paper

Pervasive Computing Case Study

...Pervasive Computing Case Study QUESTION According to the article from Anne Fisher "How telecommuters can stay connected" in 2003 4.4 million Americans were working from home and by the end of 2004 they were 8.1 million1. The increase in the number of teleworkers in the United States can be explained by many factors. First many firms or federal agencies have increased their efforts to encourage telework. "The Status of Telework in the Federal Government"2 states that the Department of Defense has implemented a telework policy to offer the opportunity to existing workers to work from home. However, we have to consider this increase to come from a real demand from the workers. Teleworking offers a greater flexibility in...
12 Pages(3000 words)Essay

Pervasive Computing in Security

...Running head: Pervasive Computing in Security The Importance of Pervasive Computing In Security By _________________________ Introduction The new revolutionary computing technology that we are confronting today upholds a paradigm that envisions a world surrounded by processors, computers, sensors, and digital communications. Pervasive computing provides us with the opportunity to develop an enriched environment with a comfortable and convenient information era equipped with the required secure measures to protect physical and computational infrastructures into an incorporated environment. This incorporation highlights the needs of perfect security of computing devices and sensors that...
7 Pages(1750 words)Essay

Flexibility in Information Systems Context

..., IT security risk management becomes a challenge where the IT departments do not have a cross-functional commitment to analyzing the impact of change on a system-wide security posture (Mayer, 2008). That is why silo-centric approaches can be wasteful and less effective. To overcome the demerits of IT silos concepts such as inter-silo communications, cross-training, cross-silo activities and sensitization efforts towards team building have been proposed. To harness the power of silos the organization requires planning, establishing of internal processes, process controls and strong leadership (Marquis, 2006).  Once this is done the organization moves on to the second phase of flexibility, which is standardization. Cloud...
8 Pages(2000 words)Essay

Wireless Networks and Pervasive Computing

...Wireless Networks and Pervasive Computing Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are internet protocols that have different uses. I have chosen these tutorials because they have a lot of information I would like to know. As defined by Kozierok (2005), TCP is an internet protocol that requires connection and is the most commonly used because it provides error correction. It can make a connection from client to server resulting to instant delivery. When using TCP, the computer sending data connects with the one receiving the data, and remains connected for some time until the data is sent correctly and safely, and then they disconnect. This method has several advantages such as it is reliable,...
2 Pages(500 words)Essay

Context aware

...Topic:  Context Awareness Context awareness is the employment of information to a particular situation of entity. More specifically, context awareness is related to the user and application system relevant to mobile usage. The context awareness in relation to entity refers to a place, object or person. When the mobile is in usage, the interaction of the application of the device is depended on its connectivity with device and environment. A)Features of Context Awareness In the case of mobile devices, there is no general feature to be highlighted, as every mobile device has its own unique application. According to Chian(2009)“When designing context aware tools, especially for mobile computing technologies it is crucial to recognize... the...
2 Pages(500 words)Essay

Student with pervasive developmental disorders

...to be able to address the disorder and ensure that students suffering from it develop in a “normal” way. Some of the students suffering from this disorder may not be able to speak at all, while others may speak in limited conversations and phrases (Rondeau et al, 2011). In other cases, students suffering from this disorder may have language development that is relatively normal. As such, parents and teachers should be aware that children suffering from this disorder may not necessarily display similar symptoms and it is important that they pay attention to various symptoms that may point to a possibility of this disorder (Syriopoulou- Deli, 2011). While scientists have not fully understood the causes of...
6 Pages(1500 words)Essay

Techno-Optimism is pervasive

...Techno- Optimism Technological development, innovations and inventionshave been a common phenomenon in the world. Its benefits have been crucial in improving living standards and easing human life thereby making life more bearable (Harrington, 2009, p 26). The benefits have resulted in a techno- pervasive notion in society whereby, many believe that a more efficient technology will clear various problems in the world. However, technology advancements is not a bad, but being too much assured of its success in solving world problems is similar to living in an ideal world (Top 10 Failures, 2015, p 1). Techno – optimism is universal despite presence of numerous and serious shortcomings as well as consequences of past...
1 Pages(250 words)Essay

Pervasive Decision VA9-02166

...Running head: Pervasive Decision PERVASIVE DECISION Goes Here al Affiliation Goes Here The assignment is an argument in favor of a claimant, who was harassed by Sri Lankan state agents, as he was suspected to be a member of the LTTE. The claimant is being detained by the Sri Lankan authorities. Pervasive Decision At the hearing, the argument was made by the counsel for the Minister of Public Safety and Emergency Preparedness regarding the presently changed circumstances in Sri Lanka that the Sri Lankan government or army or any other paramilitary agencies would not target, harass, or carry out other persecutory acts toward the claimant, if he were to return to Sri Lanka as he was neither...
1 Pages(250 words)Essay

Interface Design for Pervasive Computing

... explanations, and then to go after by means of an iterative plan technique. This necessitates carrying out the suitable usability tests and via the result to create transforms to the website (Nielsen, 2000). Pervasive Computing Environments This section will discuss about the pervasive computing technologies. Here I will elaborate the pervasive computing technologies and its interactions to usability parameters of the web design. As pervasive computing technologies turn out to be more and more prevalent as well as as community awareness of related information gathering carry out raises, recognition of these situations as well as carry out will have to be attended through a considerably comfortable, however explicable, set... of...
13 Pages(3250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Pervasive Context-Aware Systems for FREE!

Contact Us