A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secured Smart System Desing in Pervasive Computing Environment Using VCS
2015
International Journal of UbiComp
In this paper, we made an attempt to propose a new security algorithm for providing security to Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security ...
The information generated by these devices is a big task in collection and storage. For further, the data transmission to the intended destination is delay tolerant. ...
If the Digital Door opens then all Smart Sensors and GSM module will be activated; and will be allowed to control the home appliances of Pervasive Computing Environment. ...
doi:10.5121/iju.2015.6202
fatcat:bu5dnfv7gffgfju3qmubngolpq
Investigation of the waste-removal chain through pervasive computing
2011
IBM Journal of Research and Development
With the Trash Track project, the MIT SENSEable City Laboratory is exploring how new pervasive sensor technologies can be used to transform and understand cities. ...
Pervasive monitoring and analysis can also improve environmental sustainability by revealing inefficiencies in the waste-removal chain to municipalities and waste service providers, as well as monitoring ...
., in the United States, other countries, or both. ...
doi:10.1147/jrd.2010.2089564
fatcat:kfqin7e6prazncaluv2dnvo2e4
Wireless Data Acquisition System For Real Time Applications
2015
Zenodo
The information ought to be stra ightforwardly exchanged through SMS by GSM to GSM correspondence to the PC. By util izing MATLAB yields are plotted on PC. ...
The fundamen tal center of the framework is implanted equipment which uses center ARM-7 process or to fulfil the information securing of the shut environment. ...
environment. ...
doi:10.5281/zenodo.1469992
fatcat:ipg75tn745b7zpvuekxa573xxu
Report of HotMobile 2010
2010
IEEE pervasive computing
Ahmad Rahmati (Rice University) talked about "Enabling Pervasive Mobile Applications with the FM Radio Broadcast Data System." ...
PER VA SI V E computing www.computer.org/pervasive CONFERENCES CONFERENCES analyze mass movement patterns in urban areas. ...
doi:10.1109/mprv.2010.64
fatcat:fxftutjbybbtjnjbvmgsohj6ou
Explaining mobile government social media continuance from the valence perspective: A SEM-NN approach
2021
PLoS ONE
The research model was calculated by using data collected from 509 citizens who are the mobile GSM users in China. ...
affect mobile GSM continuance. ...
First, it is worth noting that the data in our study were collected from mobile GSM users in a single developing country, e.g., China. ...
doi:10.1371/journal.pone.0246483
pmid:33539466
fatcat:wop45ik34vgubfmekon6rmqwda
The Service Ecosystem: Dynamic Self-Aggregation of Pervasive Communication Services
2007
First International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE '07)
The continuous growth in ubiquitous computing and network connectivity in our everyday environments calls for a deep rethinking of traditional communication service architectures. ...
problem we will tackle in the rest of the paper: i.e. the need to fulfill a communication request, aggregating available pervasive services in an autonomic, self-reconfiguring and situation-aware fashion ...
The technologies needed to capture contextual data are becoming increasingly available (e.g., sensorial data, location systems, user profiling tools) and these data must be exposed to services in the environment ...
doi:10.1109/sepcase.2007.11
fatcat:mzmbob5iebd6rnttyqrel4qxou
Green House Remote Monitoring System Using Embedded Controlled Sensor Network
2016
INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY
In this system ARM based microcontroller and wireless sensors are used to control the various parameters and to monitor the information regarding the environment in greenhouse using Zig bee and GSM technologies ...
The framework of the monitoring system is based on a combination of pervasive distributed sensing units, information system for data aggregation, and reasoning and context awareness. ...
GSM module is used for long distance control of devices and monitoring of environment of Greenhouse. ...
doi:10.18535/ijetst/v3i02.14
fatcat:2u4qjxwbafbh3l3i3grsjbtgee
Integrated Wireless Technologies for Smart Homes Applications
[chapter]
2010
Smart Home Systems
Having pervasive computing environment provides the infrastructure that supports advancements in context-aware computing. ...
A high level architectural view of GSM/GPRS is shown in Fig. 6 . The mobile wireless system such as GSM/GPRS is used to deliver both voice and data communications. ...
Smart homes are intelligent environments that interact dynamically and respond readily in an adaptive manner to the needs of the occupants and changes in the ambient conditions. ...
doi:10.5772/8412
fatcat:qr4im37lg5dozpj5zxlun5vyla
Utilization Of Advanced Data Storage Technology To Conduct Construction Industry On Clear Environment
2010
Zenodo
The transmission of data to the central database will be carried out with the help of Global System for Mobile Communications (GSM). ...
Construction projects generally take place in uncontrolled and dynamic environments where construction waste is a serious environmental problem in many large cities. ...
data in a spatially referenced environment. ...
doi:10.5281/zenodo.1334220
fatcat:e2e6w4hbajbibbvjfszpcnbzja
Minitrack Introduction
2006
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
It presents an innovative mobile RFID solution which utilizes cellular networks with data package communication (GSM/GPRS), web technology. ...
Diffusion of Internet, web services as well as deployment of mobile and pervasive technologies result in both industry wide and organizational transformations with far reaching micro-and macro economic ...
It presents an innovative mobile RFID solution which utilizes cellular networks with data package communication (GSM/GPRS), web technology. ...
doi:10.1109/hicss.2006.279
dblp:conf/hicss/KrcmarLL06
fatcat:jh4qg7p7vnea7hnyxs2kratfzy
Capture the Flag: Mixed-Reality Social Gaming with Smart Phones
2006
IEEE pervasive computing
PERVASIVE computing 65 Red team captures flag near blue base. Chat communication between players. Both teams set their bases. Alert after two minutes to pick up flag. ...
ACKNOWLEDGMENTS Special thanks to Li Yu for helping out in all graphic designs. ...
Third, CTF explores novel tangible aspects of human physical movement and perception, both in the real-world playing environment and in interaction with the virtual world. ...
doi:10.1109/mprv.2006.25
fatcat:qbkpwk5mp5conb6dg3dseco3ly
Secured Policy based Resource Access and User Authentication in Ubiquitous Computing Environment
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
During this epoch, the mobile phone plays a significant role in info access in a ubiquitous environment. ...
Policy-based resource access and data sharing are the most specific in context-aware computing. ...
As a continuous addendum to the features, this model will extend to virtualization using video streaming and GSM-MMS services in a pervasive environment. ...
doi:10.35940/ijitee.a4731.119119
fatcat:4znlyd2twnakvc7fgd3bz6uxpe
Place Lab: Device Positioning Using Radio Beacons in the Wild
[chapter]
2005
Lecture Notes in Computer Science
We present experimental results showing that 802.11 and GSM beacons are sufficiently pervasive in the greater Seattle area to achieve 20-30 meter median accuracy with nearly 100% coverage measured by availability ...
in people's daily lives. ...
Other similar systems that use specific radio sources in the environment include RightSpot and Laasonen et al's GSM based system. ...
doi:10.1007/11428572_8
fatcat:4tez5v7fi5g4hbiukvbh7b2i2q
Differences Among Children Whose Mothers Have Been in Contact with the Criminal Justice System
2007
Women & Criminal Justice
To that end, the analyses described in this article explore the heterogeneity in parent and family risks among a group of children whose mothers had contact with the criminal justice system. ...
Using data from an epidemiologic study of youth, results showed that the two most prevalent problems in the backgrounds of this group of youth were poverty (61.5%) and maternal mental health problems ( ...
Data used in the present analyses are based on information from the family environment and life events sections of the CAPA (Costello, Angold, March & Fairbank, 1998) . ...
doi:10.1300/j012v17n02_04
fatcat:jkkng7mngrbzdpr5qxsuv4guuu
Mobility Detection Using Everyday GSM Traces
[chapter]
2006
Lecture Notes in Computer Science
This paper explores how coarse-grained GSM data from mobile phones can be used to recognize high-level properties of user mobility, and daily step count. ...
Our mobility detection system was evaluated with GSM traces from the everyday lives of three data collectors over a period of one month, yielding an overall average accuracy of 85%, and a daily step count ...
Susumu Harada, Dmitri Chmelev, and Fred Potter helped collect part of the data used for this research. ...
doi:10.1007/11853565_13
fatcat:wkuvdhpwynedta3npjypate5pu
« Previous
Showing results 1 — 15 out of 1,822 results