Managing sensitive data in dynamic and high-stakes environments,such as healthcare,requires access control frameworks that offer real-time adaptability,scalability,and regulatory compliance.BIG-ABAC introduces a trans...Managing sensitive data in dynamic and high-stakes environments,such as healthcare,requires access control frameworks that offer real-time adaptability,scalability,and regulatory compliance.BIG-ABAC introduces a transformative approach to Attribute-Based Access Control(ABAC)by integrating real-time policy evaluation and contextual adaptation.Unlike traditional ABAC systems that rely on static policies,BIG-ABAC dynamically updates policies in response to evolving rules and real-time contextual attributes,ensuring precise and efficient access control.Leveraging decision trees evaluated in real-time,BIG-ABAC overcomes the limitations of conventional access control models,enabling seamless adaptation to complex,high-demand scenarios.The framework adheres to the NIST ABAC standard while incorporating modern distributed streaming technologies to enhance scalability and traceability.Its flexible policy enforcement mechanisms facilitate the implementation of regulatory requirements such as HIPAA and GDPR,allowing organizations to align access control policies with compliance needs dynamically.Performance evaluations demonstrate that BIG-ABAC processes 95% of access requests within 50 ms and updates policies dynamically with a latency of 30 ms,significantly outperforming traditional ABAC models.These results establish BIG-ABAC as a benchmark for adaptive,scalable,and context-aware access control,making it an ideal solution for dynamic,high-risk domains such as healthcare,smart cities,and Industrial IoT(IIoT).展开更多
The integration of Unmanned Aerial Vehicles(UAVs)into Intelligent Transportation Systems(ITS)holds trans-formative potential for real-time traffic monitoring,a critical component of emerging smart city infrastructure....The integration of Unmanned Aerial Vehicles(UAVs)into Intelligent Transportation Systems(ITS)holds trans-formative potential for real-time traffic monitoring,a critical component of emerging smart city infrastructure.UAVs offer unique advantages over stationary traffic cameras,including greater flexibility in monitoring large and dynamic urban areas.However,detecting small,densely packed vehicles in UAV imagery remains a significant challenge due to occlusion,variations in lighting,and the complexity of urban landscapes.Conventional models often struggle with these issues,leading to inaccurate detections and reduced performance in practical applications.To address these challenges,this paper introduces CFEMNet,an advanced deep learning model specifically designed for high-precision vehicle detection in complex urban environments.CFEMNet is built on the High-Resolution Network(HRNet)architecture and integrates a Context-aware Feature Extraction Module(CFEM),which combines multi-scale feature learning with a novel Self-Attention and Convolution layer setup within a Multi-scale Feature Block(MFB).This combination allows CFEMNet to accurately capture fine-grained details across varying scales,crucial for detecting small or partially occluded vehicles.Furthermore,the model incorporates an Equivalent Feed-Forward Network(EFFN)Block to ensure robust extraction of both spatial and semantic features,enhancing its ability to distinguish vehicles from similar objects.To optimize computational efficiency,CFEMNet employs a local window adaptation of Multi-head Self-Attention(MSA),which reduces memory overhead without sacrificing detection accuracy.Extensive experimental evaluations on the UAVDT and VisDrone-DET2018 datasets confirm CFEMNet’s superior performance in vehicle detection compared to existing models.This new architecture establishes CFEMNet as a benchmark for UAV-enabled traffic management,offering enhanced precision,reduced computational demands,and scalability for deployment in smart city applications.The advancements presented in CFEMNet contribute significantly to the evolution of smart city technologies,providing a foundation for intelligent and responsive traffic management systems that can adapt to the dynamic demands of urban environments.展开更多
In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The mi...In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The middleware,which offers services in such environments,should support the automation services suited for the user using various types of situational information around the user.In this paper,based on context-aware workflow language(CAWL),we propose a CAWL based composite workflow handler for supporting composite workflow services,which can integrate more than two service flows and handle them.The test results shows that the proposed CAWL handler can provide the user with the composite workflow services to cope with various demands on a basis of a scenario document founded on CAWL.展开更多
Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have ...Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have been made, we find a lack of fully context-aware smart cars. This study presents a general architecture of smart cars from the viewpoint of context- awareness. A hierarchical context model is proposed for description of the complex driving environment. A smart car prototype including software platform and hardware infrastructures is built to provide the running environment for the context model and applications. Two performance metrics were evaluated: accuracy of the context situation recognition and efficiency of the smart car. The whole response time of context situation recognition is nearly 1.4 s for one person, which is acceptable for non-time critical applications in a smart car.展开更多
The rapid development of information and communication technologies(ICTs)and cyber-physical systems(CPSs)has paved the way for the increasing popularity of smart products.Context-awareness is an important facet of pro...The rapid development of information and communication technologies(ICTs)and cyber-physical systems(CPSs)has paved the way for the increasing popularity of smart products.Context-awareness is an important facet of product smartness.Unlike artifacts,various bio-systems are naturally characterized by their extraordinary context-awareness.Biologically inspired design(BID)is one of the most commonly employed design strategies.However,few studies have examined the BID of context-aware smart products to date.This paper presents a structured design framework to support the BID of context-aware smart products.The meaning of context-awareness is defined from the perspective of product design.The framework is developed based on the theoretical foundations of the situated function-behavior-structure ontology.A structured design process is prescribed to leverage various biological inspirations in order to support different conceptual design activities,such as problem formulation,structure reformulation,behavior reformulation,and function reformulation.Some existing design methods and emerging design tools are incorporated into the framework.A case study is presented to showcase how this framework can be followed to redesign a robot vacuum cleaner and make it more context-aware.展开更多
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M...The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.展开更多
This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of conte...This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of context-aware service during preparation,organization and delivery,as well as the resulting changes in service acceptance of consumers.Because of these changes,the context-aware service modes in the cloud computing environment change are intelligent,immersive,highly interactive,and real-time.According to active and responded service,and authorization and non-authorized service,the paper drew a case diagram of context-aware service in Unified Modeling Language(UML) and established four categories of context-aware service modes.展开更多
Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a...Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience.展开更多
With the development of communication and ubiquitous computing technologies, context-aware services, which acquire contextual information of users and environment, have become critical applications providing customiza...With the development of communication and ubiquitous computing technologies, context-aware services, which acquire contextual information of users and environment, have become critical applications providing customization in mobile commerce. Meanwhile, tourism has attracted increasing attention as a high value-added service and a hot academic topic. However, the research on how to provide tour services based on context-aware services is in fact still at an early stage, limited to concept elaboration, service framework discussion, prototype system development etc. In this paper, we summarized the previous researches on context-aware services to establish the research foundation, put forward a way of analyzing a tour planning problem with a modified model of Traveling Salesman Problem (TSP) and Vehicle Routing Problem (VRP), and we applied an innovated Resource Constrain Project Scheduling Problem (RCPSP) mathematical model to solve the tour planning problem based on context information. The simulation under branch and bound algoritban evaluated the validity of our solution.展开更多
The digital technologies that run based on users’content provide a platform for users to help air their opinions on various aspects of a particular subject or product.The recommendation agents play a crucial role in ...The digital technologies that run based on users’content provide a platform for users to help air their opinions on various aspects of a particular subject or product.The recommendation agents play a crucial role in personalizing the needs of individual users.Therefore,it is essential to improve the user experience.The recommender system focuses on recommending a set of items to a user to help the decision-making process and is prevalent across e-commerce and media websites.In Context-Aware Recommender Systems(CARS),several influential and contextual variables are identified to provide an effective recommendation.A substantial trade-off is applied in context to achieve the proper accuracy and coverage required for a collaborative recommendation.The CARS will generate more recommendations utilizing adapting them to a certain contextual situation of users.However,the key issue is how contextual information is used to create good and intelligent recommender systems.This paper proposes an Artificial Neural Network(ANN)to achieve contextual recommendations based on usergenerated reviews.The ability of ANNs to learn events and make decisions based on similar events makes it effective for personalized recommendations in CARS.Thus,the most appropriate contexts in which a user should choose an item or service are achieved.This work converts every label set into a Multi-Label Classification(MLC)problem to enhance recommendations.Experimental results show that the proposed ANN performs better in the Binary Relevance(BR)Instance-Based Classifier,the BR Decision Tree,and the Multi-label SVM for Trip Advisor and LDOS-CoMoDa Dataset.Furthermore,the accuracy of the proposed ANN achieves better results by 1.1%to 6.1%compared to other existing methods.展开更多
Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the c...Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.展开更多
In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workf...In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments.展开更多
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwardin...Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.展开更多
In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger....In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.Many traditional solutions have been proposed based on the creation of random routes,such as random walk and fake sources approach,which will lead to serious packet delay and high energy consumption.Instead of applying the routing in a blind way,this article proposes a novel solution for source location privacy in WSNs by utilizing sensor ability of perceiving the presence a mobile attacker nearby,for patient attackers in particular to increase the safety period and decrease the data delivery delay.The proposed strategy forms an intelligent silent zone(ISZ)by sacrificing only a minority of sensor nodes to entice patient attackers away from real packet routing path.The analysis and simulation results show that the proposed scheme,besides providing source location privacy energy efficiently,can significantly reduce real event reporting latency compared with the existing approaches.展开更多
In this paper,an interactive method is proposed to describe computer animation data and accelerate the process of animation generation.First,a semantic model and a resource description framework(RDF)are utilized to an...In this paper,an interactive method is proposed to describe computer animation data and accelerate the process of animation generation.First,a semantic model and a resource description framework(RDF)are utilized to analyze and describe the relationships between animation data.Second,a novel context model which is able to keep the context-awareness was proposed to facilitate data organization and storage.In our context model,all the main animation elements in a scene are operated as a whole.Then sketch is utilized as the main interactive method to describe the relationships between animation data,edit the context model and make some other user operations.Finally,a context-aware computer animation data description system based on sketch is generated and it also works well in animation generation process.展开更多
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ...APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.展开更多
The existing dataset for visual dialog comprises multiple rounds of questions and a diverse range of image contents.However,it faces challenges in overcoming visual semantic limitations,particularly in obtaining suffi...The existing dataset for visual dialog comprises multiple rounds of questions and a diverse range of image contents.However,it faces challenges in overcoming visual semantic limitations,particularly in obtaining sufficient context from visual and textual aspects of images.This paper proposes a new visual dialog dataset called Diverse History-Dialog(DS-Dialog)to address the visual semantic limitations faced by the existing dataset.DS-Dialog groups relevant histories based on their respective Microsoft Common Objects in Context(MSCOCO)image categories and consolidates them for each image.Specifically,each MSCOCO image category consists of top relevant histories extracted based on their semantic relationships between the original image caption and historical context.These relevant histories are consolidated for each image,and DS-Dialog enhances the current dataset by adding new context-aware relevant history to provide more visual semantic context for each image.The new dataset is generated through several stages,including image semantic feature extraction,keyphrase extraction,relevant question extraction,and relevant history dialog generation.The DS-Dialog dataset contains about 2.6 million question-answer pairs,where 1.3 million pairs correspond to existing VisDial’s question-answer pairs,and the remaining 1.3 million pairs include a maximum of 5 image features for each VisDial image,with each image comprising 10-round relevant question-answer pairs.Moreover,a novel adaptive relevant history selection is proposed to resolve missing visual semantic information for each image.DS-Dialog is used to benchmark the performance of previous visual dialog models and achieves better performance than previous models.Specifically,the proposed DSDialog model achieves an 8% higher mean reciprocal rank(MRR),11% higher R@1%,6% higher R@5%,5% higher R@10%,and 8% higher normalized discounted cumulative gain(NDCG)compared to LF.DS-Dialog also achieves approximately 1 point improvement on R@k,mean,MRR,and NDCG compared to the original RVA,and 2 points improvement compared to LF andDualVD.These results demonstrates the importance of the relevant semantic historical context in enhancing the visual semantic relationship between textual and visual representations of the images and questions.展开更多
A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, ...A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.展开更多
Communication or the lack of it has been complained to be a major contributor to medical errors in healthcare.To enhance communication in hospital,diverse communication mechanisms are proposed.However,human directed c...Communication or the lack of it has been complained to be a major contributor to medical errors in healthcare.To enhance communication in hospital,diverse communication mechanisms are proposed.However,human directed communication in a complex clinical setting in which many people play diverse roles and need to collaborate in many parallel tasks is always in chaos and inefficient.Context-aware communication which can help target who should be communicated and what information should be provided for different scenarios has the potential to improve the communication in hospital.This paper proposes a flexible,automated and asynchronous context-aware medical instant message(IM)middleware which support dispatch,forward and routing different message to the right person in the right time based on the context information.A prototype of this IM communication middleware was implemented in real clinical setting for evaluation.The preliminary results demonstrate its novel features and clinical feasibility.展开更多
文摘Managing sensitive data in dynamic and high-stakes environments,such as healthcare,requires access control frameworks that offer real-time adaptability,scalability,and regulatory compliance.BIG-ABAC introduces a transformative approach to Attribute-Based Access Control(ABAC)by integrating real-time policy evaluation and contextual adaptation.Unlike traditional ABAC systems that rely on static policies,BIG-ABAC dynamically updates policies in response to evolving rules and real-time contextual attributes,ensuring precise and efficient access control.Leveraging decision trees evaluated in real-time,BIG-ABAC overcomes the limitations of conventional access control models,enabling seamless adaptation to complex,high-demand scenarios.The framework adheres to the NIST ABAC standard while incorporating modern distributed streaming technologies to enhance scalability and traceability.Its flexible policy enforcement mechanisms facilitate the implementation of regulatory requirements such as HIPAA and GDPR,allowing organizations to align access control policies with compliance needs dynamically.Performance evaluations demonstrate that BIG-ABAC processes 95% of access requests within 50 ms and updates policies dynamically with a latency of 30 ms,significantly outperforming traditional ABAC models.These results establish BIG-ABAC as a benchmark for adaptive,scalable,and context-aware access control,making it an ideal solution for dynamic,high-risk domains such as healthcare,smart cities,and Industrial IoT(IIoT).
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia through research group No.(RG-NBU-2022-1234).
文摘The integration of Unmanned Aerial Vehicles(UAVs)into Intelligent Transportation Systems(ITS)holds trans-formative potential for real-time traffic monitoring,a critical component of emerging smart city infrastructure.UAVs offer unique advantages over stationary traffic cameras,including greater flexibility in monitoring large and dynamic urban areas.However,detecting small,densely packed vehicles in UAV imagery remains a significant challenge due to occlusion,variations in lighting,and the complexity of urban landscapes.Conventional models often struggle with these issues,leading to inaccurate detections and reduced performance in practical applications.To address these challenges,this paper introduces CFEMNet,an advanced deep learning model specifically designed for high-precision vehicle detection in complex urban environments.CFEMNet is built on the High-Resolution Network(HRNet)architecture and integrates a Context-aware Feature Extraction Module(CFEM),which combines multi-scale feature learning with a novel Self-Attention and Convolution layer setup within a Multi-scale Feature Block(MFB).This combination allows CFEMNet to accurately capture fine-grained details across varying scales,crucial for detecting small or partially occluded vehicles.Furthermore,the model incorporates an Equivalent Feed-Forward Network(EFFN)Block to ensure robust extraction of both spatial and semantic features,enhancing its ability to distinguish vehicles from similar objects.To optimize computational efficiency,CFEMNet employs a local window adaptation of Multi-head Self-Attention(MSA),which reduces memory overhead without sacrificing detection accuracy.Extensive experimental evaluations on the UAVDT and VisDrone-DET2018 datasets confirm CFEMNet’s superior performance in vehicle detection compared to existing models.This new architecture establishes CFEMNet as a benchmark for UAV-enabled traffic management,offering enhanced precision,reduced computational demands,and scalability for deployment in smart city applications.The advancements presented in CFEMNet contribute significantly to the evolution of smart city technologies,providing a foundation for intelligent and responsive traffic management systems that can adapt to the dynamic demands of urban environments.
基金The MSIP(Ministry of Science,ICT&Future Planning),Korea,under the ITRC(Information Technology Research Center)support program(NIPA-2013-H0301-13-2006)supervised by the NIPA(National IT Industry Promotion Agency)
文摘In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The middleware,which offers services in such environments,should support the automation services suited for the user using various types of situational information around the user.In this paper,based on context-aware workflow language(CAWL),we propose a CAWL based composite workflow handler for supporting composite workflow services,which can integrate more than two service flows and handle them.The test results shows that the proposed CAWL handler can provide the user with the composite workflow services to cope with various demands on a basis of a scenario document founded on CAWL.
基金Project supported by the National Hi-Tech Research and Develop-ment Program (863) of China (Nos. 2006AA01Z198, and2008AA01Z132)the National Natural Science Foundation of China(No. 60533040)the National Science Fund for Distinguished Young Scholars of China (No. 60525202)
文摘Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have been made, we find a lack of fully context-aware smart cars. This study presents a general architecture of smart cars from the viewpoint of context- awareness. A hierarchical context model is proposed for description of the complex driving environment. A smart car prototype including software platform and hardware infrastructures is built to provide the running environment for the context model and applications. Two performance metrics were evaluated: accuracy of the context situation recognition and efficiency of the smart car. The whole response time of context situation recognition is nearly 1.4 s for one person, which is acceptable for non-time critical applications in a smart car.
基金This work was supported in part by the project of the National Natural Science Foundation of China(51875030).
文摘The rapid development of information and communication technologies(ICTs)and cyber-physical systems(CPSs)has paved the way for the increasing popularity of smart products.Context-awareness is an important facet of product smartness.Unlike artifacts,various bio-systems are naturally characterized by their extraordinary context-awareness.Biologically inspired design(BID)is one of the most commonly employed design strategies.However,few studies have examined the BID of context-aware smart products to date.This paper presents a structured design framework to support the BID of context-aware smart products.The meaning of context-awareness is defined from the perspective of product design.The framework is developed based on the theoretical foundations of the situated function-behavior-structure ontology.A structured design process is prescribed to leverage various biological inspirations in order to support different conceptual design activities,such as problem formulation,structure reformulation,behavior reformulation,and function reformulation.Some existing design methods and emerging design tools are incorporated into the framework.A case study is presented to showcase how this framework can be followed to redesign a robot vacuum cleaner and make it more context-aware.
基金Supported by the National Natural Science Foundation of China(71662014 and 61602219)the Natural Science Foundation of Jiangxi Province of China(20132BAB201050)the Science and Technology Project of Jiangxi Province Educational Department(GJJ151601)
文摘The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.
基金the National Key Basic Research Program of China,the National Natural Science Foundation of China,the Ministry of Education of the People's Republic of China,the Fundamental Research Funds for the Central Universities of China
文摘This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of context-aware service during preparation,organization and delivery,as well as the resulting changes in service acceptance of consumers.Because of these changes,the context-aware service modes in the cloud computing environment change are intelligent,immersive,highly interactive,and real-time.According to active and responded service,and authorization and non-authorized service,the paper drew a case diagram of context-aware service in Unified Modeling Language(UML) and established four categories of context-aware service modes.
基金Supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2009CB320504the National High Technology Development 863 Program of China under Grant No.2007AA01Z206 and No.2009AA01Z210the EU FP7 Project EFIPSANS (INFSO-ICT-215549)
文摘Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience.
基金supported in partby the National Natural Science Foundation of China under Grants No. 70972048,No. 71071140,No. 71272076,No. 71201011,No. 51108209,No. 60903014Shanghai Philosophy,Social Science Funds for Youth under Grant No. 2008EZH002
文摘With the development of communication and ubiquitous computing technologies, context-aware services, which acquire contextual information of users and environment, have become critical applications providing customization in mobile commerce. Meanwhile, tourism has attracted increasing attention as a high value-added service and a hot academic topic. However, the research on how to provide tour services based on context-aware services is in fact still at an early stage, limited to concept elaboration, service framework discussion, prototype system development etc. In this paper, we summarized the previous researches on context-aware services to establish the research foundation, put forward a way of analyzing a tour planning problem with a modified model of Traveling Salesman Problem (TSP) and Vehicle Routing Problem (VRP), and we applied an innovated Resource Constrain Project Scheduling Problem (RCPSP) mathematical model to solve the tour planning problem based on context information. The simulation under branch and bound algoritban evaluated the validity of our solution.
文摘The digital technologies that run based on users’content provide a platform for users to help air their opinions on various aspects of a particular subject or product.The recommendation agents play a crucial role in personalizing the needs of individual users.Therefore,it is essential to improve the user experience.The recommender system focuses on recommending a set of items to a user to help the decision-making process and is prevalent across e-commerce and media websites.In Context-Aware Recommender Systems(CARS),several influential and contextual variables are identified to provide an effective recommendation.A substantial trade-off is applied in context to achieve the proper accuracy and coverage required for a collaborative recommendation.The CARS will generate more recommendations utilizing adapting them to a certain contextual situation of users.However,the key issue is how contextual information is used to create good and intelligent recommender systems.This paper proposes an Artificial Neural Network(ANN)to achieve contextual recommendations based on usergenerated reviews.The ability of ANNs to learn events and make decisions based on similar events makes it effective for personalized recommendations in CARS.Thus,the most appropriate contexts in which a user should choose an item or service are achieved.This work converts every label set into a Multi-Label Classification(MLC)problem to enhance recommendations.Experimental results show that the proposed ANN performs better in the Binary Relevance(BR)Instance-Based Classifier,the BR Decision Tree,and the Multi-label SVM for Trip Advisor and LDOS-CoMoDa Dataset.Furthermore,the accuracy of the proposed ANN achieves better results by 1.1%to 6.1%compared to other existing methods.
文摘Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.
基金supported by the The Ministry of Knowledge Economy,Korea,the ITRC(Information Technology Research Center)support program(ⅡTA-2009-(C1090-0902-0007))
文摘In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments.
基金Supported by the National Natural Science Foundation of China(61373040,61173137)the Ph.D.Programs Foundation of Ministry of Education of China(20120141110002)the Key Project of Natural Science Foundation of Hubei Province(2010CDA004)
文摘Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.
基金supported by the National Natural Science Foundation of China (Nos.61373015,61300052, 41301047)the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe Important National Science and Technology Specific Project(No. BA2013049)
文摘In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.Many traditional solutions have been proposed based on the creation of random routes,such as random walk and fake sources approach,which will lead to serious packet delay and high energy consumption.Instead of applying the routing in a blind way,this article proposes a novel solution for source location privacy in WSNs by utilizing sensor ability of perceiving the presence a mobile attacker nearby,for patient attackers in particular to increase the safety period and decrease the data delivery delay.The proposed strategy forms an intelligent silent zone(ISZ)by sacrificing only a minority of sensor nodes to entice patient attackers away from real packet routing path.The analysis and simulation results show that the proposed scheme,besides providing source location privacy energy efficiently,can significantly reduce real event reporting latency compared with the existing approaches.
基金Supported by the National Key Research and Development Plan(2016YFB1001200)the National Natural Science Foundation of China(U1435220,61232013)
文摘In this paper,an interactive method is proposed to describe computer animation data and accelerate the process of animation generation.First,a semantic model and a resource description framework(RDF)are utilized to analyze and describe the relationships between animation data.Second,a novel context model which is able to keep the context-awareness was proposed to facilitate data organization and storage.In our context model,all the main animation elements in a scene are operated as a whole.Then sketch is utilized as the main interactive method to describe the relationships between animation data,edit the context model and make some other user operations.Finally,a context-aware computer animation data description system based on sketch is generated and it also works well in animation generation process.
基金partially supported by the NSFC-General Technology Basic Research Joint Fund (U1536204)the National Key Technologies R&D Program (2014BAH41B00)+3 种基金the National Nature Science Foundation of China (61672394 61373168 61373169)the National High-tech R&D Program of China (863 Program) (2015AA016004)
文摘APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.
文摘The existing dataset for visual dialog comprises multiple rounds of questions and a diverse range of image contents.However,it faces challenges in overcoming visual semantic limitations,particularly in obtaining sufficient context from visual and textual aspects of images.This paper proposes a new visual dialog dataset called Diverse History-Dialog(DS-Dialog)to address the visual semantic limitations faced by the existing dataset.DS-Dialog groups relevant histories based on their respective Microsoft Common Objects in Context(MSCOCO)image categories and consolidates them for each image.Specifically,each MSCOCO image category consists of top relevant histories extracted based on their semantic relationships between the original image caption and historical context.These relevant histories are consolidated for each image,and DS-Dialog enhances the current dataset by adding new context-aware relevant history to provide more visual semantic context for each image.The new dataset is generated through several stages,including image semantic feature extraction,keyphrase extraction,relevant question extraction,and relevant history dialog generation.The DS-Dialog dataset contains about 2.6 million question-answer pairs,where 1.3 million pairs correspond to existing VisDial’s question-answer pairs,and the remaining 1.3 million pairs include a maximum of 5 image features for each VisDial image,with each image comprising 10-round relevant question-answer pairs.Moreover,a novel adaptive relevant history selection is proposed to resolve missing visual semantic information for each image.DS-Dialog is used to benchmark the performance of previous visual dialog models and achieves better performance than previous models.Specifically,the proposed DSDialog model achieves an 8% higher mean reciprocal rank(MRR),11% higher R@1%,6% higher R@5%,5% higher R@10%,and 8% higher normalized discounted cumulative gain(NDCG)compared to LF.DS-Dialog also achieves approximately 1 point improvement on R@k,mean,MRR,and NDCG compared to the original RVA,and 2 points improvement compared to LF andDualVD.These results demonstrates the importance of the relevant semantic historical context in enhancing the visual semantic relationship between textual and visual representations of the images and questions.
基金Supported by the National Natural Science Foundation of China (60573119, 604973098) and IBM joint project
文摘A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.
基金the National High Technology Research and Development Program(863)of China(No.2012AA02A601)the National Science and Technology Major Project of China(No.2013ZX03005012)
文摘Communication or the lack of it has been complained to be a major contributor to medical errors in healthcare.To enhance communication in hospital,diverse communication mechanisms are proposed.However,human directed communication in a complex clinical setting in which many people play diverse roles and need to collaborate in many parallel tasks is always in chaos and inefficient.Context-aware communication which can help target who should be communicated and what information should be provided for different scenarios has the potential to improve the communication in hospital.This paper proposes a flexible,automated and asynchronous context-aware medical instant message(IM)middleware which support dispatch,forward and routing different message to the right person in the right time based on the context information.A prototype of this IM communication middleware was implemented in real clinical setting for evaluation.The preliminary results demonstrate its novel features and clinical feasibility.