You are on page 1of 6

Volume 1, Issue 1 (2018)

Article No. 2
PP 1-6

UBIQUITOUS COMPUTING
Its Paradigm, Systems & Middleware
Pallavi Vartak 1
1
(Computer Engineering Department, VIVA Institute of Technology, India)

Abstract: This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Keywords – Ubiquitous Computing, Ubiquitous Computing Paradigm, Context-Aware Systems, Pervasive
Computing Middleware.

1. INTRODUCTION
The principle focus of ubiquitous computing is on the powerful and efficient use of clever spaces,
invisibility, localized scalability, and context-focus. The goal of ubiquitous computing studies is to refine devices
to the factor in which their use is transparent. For lots of packages transparent operation requires that the device
be context-aware. Lamentably, the context-aware devices of a man or woman can be used to deduce particularly
non-public information. Consequently, these gadgets ought to be carefully designed; in any other case they may
emerge as a ubiquitous surveillance system. Hence, existing latest ubiquitous systems want to be examined from
the perspective of attacks which can be moderately expected towards those structures. Ubiquitous computing is a
concept in which computing is made to seem anywhere the use of any tool, in any region and in any format [3].In
ubiquitous computing environments computation is embedded. With advancements in laptop technological
knowhow and era the PC applications are seamlessly incorporated into our daily lives. The devices labored in
networked and standalone surroundings and capable of conversation with the human and with each different.
Those devices support context-conscious software, nomadic customers, area aware services, and cell records
access. Ubiquitous structures provide everywhere and every time get admission to facts and various services while
making the presence of the machine “invisible” to the consumer.

1.2 Traits of Ubiquitous Computing (Ubicom) Systems

Three fundamental houses for ubicom structures had been proposed through M. Weiser [28], [29]
specifically distributed computation, invisibility, and context-attention. The distributed computation method the
computer systems/structures need to be networked, dispensed and transparently on hand. They could have
interaction with human beings in addition to with each other’s. the invisibility property approach that the computer
interaction with people wishes to be extra hidden, and in the end the third assets proposed via Weiser is
contextattention that implies that so as to optimize device operation of their physical and human surroundings it's
far necessary to make the structures aware about environmental context.
Kang and Pisan [16] argue that the precept aim of ubiquitous computing is to be person-centric that
allows users to engage with the device in natural and non-intrusive manner. Abowd house et al. [3] proposed that
ubiquitous computing aim is to help users in everyday existence.

1
www.viva-technology.org/New/IJRI
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6

The fig.1 summarizes five core houses of the ever present computing solutions [21]. It isn't always
required for ubiquitous computing answers to completely support all five residences. It is able to not be useful or
usable in many instances in exercise to aid all 5 middle properties.

Fig.1. Five Properties of Ubiquitous Computing

2. LITERATURE SURVEY
This study is going to include extensive research about the ubiquitous computing as well as its influence
on the users. We will also examine the different techniques, mechanisms and design principles.

2.1 Service Composition Mechanisms

The concept of ubiquitous (pervasive) computing is to provide new offerings to customers by way of
combining the existing services. Researchers have substantially studied and discover a function of the ever-present
computing that lets in transparently compose the offerings from diverse gadgets in a more or much less adverthoc
way. In amigo [12], the focal point of the provider composition mechanism used was to construct an
“international” automaton device. The use of owl-s [5] offerings are suggested as semantic web services inside
the amigo provider composition mechanism [4]. In that, the atomic strategies have the qos attributes with values
acquired from runtime measurements. Icrafter [24] is an example that allows customers to mix offerings from
exceptional gadgets and have an aggregated person interface generated. With Ubidev [23] an application
developer gives person interfaces, ontology, and classifiers for services included in a software. The classifiers are
used to map sources on gadgets into principles in the ontology.

We located that during service composition three characteristics are needed namely, usability,
adaptability and efficiency. The usability is a situation approximately how easy for customers to perform a
preferred venture the use of the machine. The adaptability is the functionality of the gadget to evolve to specific
environment and context. The performance is the belongings of the machine to provide appropriate response and
overall performance to the user requests or movements within a stipulated time. The three traits we have
mentioned in this paper are not explored in earlier service compositions mechanisms. Consequently, there's a need
and possibility of research to be had within the service composition mechanisms.

2.2 Context-Aware Systems And Design Principles

Region information based totally context-conscious structures are extensively utilized by customers in
their daily sports and call for them is likewise developing because of growth in reputation of cellular devices. for
instance, numerous vacationer guide initiatives [6], [10], [13], [19] that offer statistics (which include resorts,
eating places, museums, live shows halls, and many others) to the users based totally on their cutting-edge
locations. To acquire region information diverse sensors and modules are to be had which include gps satellites,
mobile smartphone towers, proximity detector sensors, cameras, barcode and magnetic card readers. Those
proximity sensors or gadgets are usually used within the structures to discover the region of the user and offer
offerings to the user primarily based on the detected location.

In context-conscious device challenge majority of them used and focused most effective on the vicinity
awareness but context-awareness may be stepped forward via the usage of exceptional context aware sensors

2
www.viva-technology.org/New/IJRI
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6

consisting of noise detectors, motion detector, mild and smoke detectors. Integrating those factors and utilizing
the statistics collected from one or extra of these sensors can allow to design and expand extra useful, adaptive,
efficient and usable structures. Munoz et al. [2] presented a context-conscious structures infrastructure that adds
context cognizance to guide statistics management in hospitals by way of the usage of instant messaging paradigm.
Deva Raju et al. [1] proposed a framework for a context collecting that uses the sensor records model, messaging
system, verbal exchange protocols and application programming interfaces (API). He additionally analyzes
approaches for sensory information acquisition for sensory records acquisition.

The principles of the context-conscious device designing encompass strategies of context information
acquisition and context control models. Chen et al. [7] provided 3 exclusive techniques of context records
acquisitions: direct sensor get entry to, middleware infrastructure and context server. Winograd [31] defined 3
one-of-a-kind context management models: widgets, networked services and blackboard model.

We observed that the prevailing answers and research efforts specially focused and used physical sensors
for context attention. However, we believed that logical and digital sensors also are useful and able to offering
more contextual in-formation. Digital and logical sensors want to be included in ongoing research solutions and
structures.

2.3 Pervasive Computing Middlewares


The aim of pervasive computing is to create a smart environment the usage of embedded sensors and
networked computing gadgets that offer customers transparent get entry to of services. Examples of current
pervasive computing middleware structures are air of secrecy [11], [25], Gaia [8], [22], Cortex [26], Scenes [15]
and frequent wise gadgets (uio) [27]. Abhijeet [17] offers a complete survey of mobile healthcare problems and
want of should help pervasive devices.We observed that pervasive computing middleware’s enables builders to
design the software in more than one ways. It’s most important feature is, it provides gadget abstraction to
developers that help them to awareness handiest on the utility good judgment instead of traumatic about lowdegree
implementation information. Another characteristic of pervasive middleware systems is to offer management of
system sources together with ser-vice management, context management and data control of context the usage of
ontology allows the software of diverse measures of semantic similarity based at the shape of the ontology.

3. USER SURVEY
To identify person requirements for consumer interface design and features of ubiquitous gadgets, we
performed a user survey of 1000 engineering students. Even though the range of people participated within the
survey are very small in numbers and some distance from supplying end but it presents an indicative figures of
consumer preferences [20]. The survey included following seven questions. To every person identical set of
questions and alternatives have been given. The table shown below provides a detailed view about the survey.
Could you prefer an average smart tool to be single user operated or more than one users operated? Overall 819
customers favored a smart tool single user operated, 96 customers preferred more than one person operated and
85 customers surely don’t care. Could you select an average smart device to be specific for a single task or have
to assist more than one responsibilities? Overall 427 users desired a smart tool should be single task unique, 519
customers’ favored multi-task operations and 54 users genuinely don’t care.
A ubiquitous tool should be stand-alone my own or networked? General 124 users favored a clever tool
need to be stand-on my own, 873 customer’s preferred networked operated tool and 3 customers honestly don’t
care. For regular networked clever gadgets might you pick stressed connectivity or Wi-Fi connectivity? Overall
967 customers preferred a smart device need to have Wi-Fi, 24 users desired wired connectivity and 9 user actually
don’t care.
What form of haptic enter must be supported by a normal smart tool? One-handed, two-handed, hands
free]. Overall 356 users preferred one-handed enter approach, forty six users favored -passed and 598 favored
hand-unfastened input technique.
Have to a typical smart tool offer a safe exploration which could permit user to undo operations or attempt
various things. Total 995 users preferred a safe exploration, 5 users don’t care. Does a smart device need to support
instant comments that could permit customers to peer on the spot impact of a motion they carry out? Total 964
customers preferred immediately feedback, 34 customers preferred cumulative remarks and customers don’t care.

3
www.viva-technology.org/New/IJRI
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6

Table.1. Survey results [20]

Multiple User
Using a Smart Single User Neutral
Tool
819 96 85
Single Multitasking
Unsure
Tasking Tasking
427 319 54
Standalone or Stand-alone Networked Unsure
Networked
124 83 3

Wired Wireless Unsure


Connectivity
24 967 9
1- 2- Handsfree
Haptic Entry Handedness Handedness
techniques
356 46 598
Safe
Safe NA Unsure
Exploration
Exploration
995 NA 5
Instant Cumulative
Unsure
Feedback Feedback Feedback
964 34 2

4. SYSTEM ARCHITECTURE
This phase gives a novel gadget structure designed to guide ubiquitous computing programs. Ubiquitous
computing is categorized with the aid of the interaction of diverse heterogeneous gadgets, starting from high-end
servers to tiny cell sensors. Devices may be connected to each different using Wi-Fi communique technologies
like Bluetooth, IrDA or wireless (IEEE 802.11). The fig.2 suggests the foremost components of the proposed
architecture.

Fig.2. System Architecture

4
www.viva-technology.org/New/IJRI
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6

It includes various sorts of sensors and actuators and drivers and controllers to handle them, it is usually
numerous profiles including aid profiles to address resources optimally, user profiles to manage user settings and
possibilities, execution profiles to control execution of processes. The multi-project scheduler module is used to
handle a couple of obligations successfully and aid multi-venture environment inside the software. The
multiperson enter handler and virtual person surroundings modules provides support to multi-consumer as well
as context and consumer design management. The user db module enables to authenticate users. The opposite
modules along with gear, monitoring, replication, communication, localization supports various functions in the
ubiquitous computing packages.

5. CONCLUSION
This research work supplied a survey of ubiquitous computing studies. We provided a classification of
the research areas at the ubiquitous computing paradigm and supplied commonplace architecture ideas of
ubiquitous structures and examine important factors in context-aware ubiquitous structures. This work
additionally presented novel device structure, a distributed outline design to support ubiquitous computing
applications. This study paper serves as a guideline for researchers who are new-fangled to ubiquitous computing
and want to make valuable contributions to this research place.

REFERENCES
[1] Anusuriya Devaraju, Simon Hoh and Michael Hartley, “A Context gathering Framework for Context-Aware Mobile Solutions”,
Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International
Symposium on Computer Human Interaction in Mobile Technology, pp. 39-46, 2007.

[2] Miguel A. Muñoz, Victor M. Gonzalez, Marcela Rodríguez and Jesus Favela, “Supporting Context-Aware Collaboration in a
Hospital: An Ethnographic informed Design”, Groupware: Design, Implementation, and Use, pp. 330-344, 2003.

[3] Gregory D. Abowd and Elizabeth D. Mynatt, “Charting Past, Present, and Future Research in Ubiquitous Computing”, ACM
Transactions on Computer-Human Interaction, Vol. 7, No. 1, pp. 29-58, 2000.

[4] Mathieu Vallée, Fano Ramparany and Laurent Vercouter, “Flexible Composition of Smart Device Services”, Proceedings of the
International Conference on Pervasive Systems and Computing, pp. 27-30, 2005.

[5] David Martin, et al., “Bringing Semantics to Web Services: The Owl-S Approach”, Proceedings of First International Workshop
on Semantic Web Services and Web Process Composition, pp. 26-42, 2004.

[6] Clemens Kerer, Schahram Dustdar, Mehdi Jazayeri, Danilo Gomes, Akos Szego and Jose A. Burgos Caja, “Presence-Aware
Infrastructure using Web Services and RFID Technologies”, Proceedings of the 2nd European Workshop on Object Orientation and
Web Services, 2004.

[7] Harry Chen, “An Intelligent Broker Architecture for Pervasive Context-Aware Systems”, Ph.D Thesis, University of Maryland,
2004.

[8] Shiva Chetan, J. Al-Muhtadi, R. Campbell and M.D. Mickunas, “Mobile Gaia: A Middleware for Ad-Hoc Pervasive Computing”,
Proceedings of Second IEEE Consumer Communications and Networking Conference, pp. 223-228, 2005.

[9] David Sánchez, Montserrat Batet, David Isern and Aida Valls, “Ontology-Based Semantic Similarity: A New Feature-Based
Approach”, Expert Systems with Applications, Vol. 39, No. 9, pp. 7718-7728, 2012.

[10] Fredrik Espinoza, Per Persson, Anna Sandin, Hanna Nyström, Elenor Cacciatore and Markus Bylund, “Geonotes: Social and
Navigational Aspects of Location-based Information Systems”, Ubicomp 2001: Ubiquitous Computing, Vol. 2201, pp. 2-17, 2001.

[11] D Garlan, D P Siewiorek, A Smailagic and P Steenkiste, “Project Aura: toward Distraction-Free Pervasive Computing”, IEEE
Pervasive Computing, Vol. 1, No. 2, pp. 22-31, 2002.

[12] Nikolaos Georgantas, et al., “The Amigo Service Architecture for the Open Networked Home Environment”, Proceedings of the
Fifth Working IEEE/IFIP Conference on Software Architecture, pp. 295-296, 2005.

[13] Jenna Burrell and Geri K. Gay, “E-graffiti: Evaluating Real-World Use of a Context-Aware System”, Interacting with Computers,
Vol. 14, No. 4, pp. 301-312, 2002.

[14] K. Saruladha, “Semantic Similarity Measures for Information Retrieval Systems using Ontology”, Ph.D dissertation, Department
of Computer Science, School of Engineering and Technology, Pondicherry University, 2011.

[15] Yong Bin Kang and Yusuf Pisan, “A Survey of Major Challenges and Future Directions for Next Generation Pervasive
Computing”, Proceedings of the 21st International Symposium on Computer and Information Sciences, pp. 755-764, 2006.

[16] Abhijeet S. Kurle and Kailas Patil, “Survey on Privacy Preserving Mobile Health Monitoring System using Cloud Computing”,
International Journal of Electrical, Electronics and Computer Systems, Vol. 3, No. 4, pp. 31-36, 2015.

[17] Marc Ehrig, Peter Haase, Mark Hefke and Nenad Stojanovic, “Similarity for Ontologies - A Comprehensive Framework”,
Proceedings of the European Conference on Information Systems, 2005.

5
www.viva-technology.org/New/IJRI
Volume 1, Issue 1 (2018)
Article No. 2
PP 1-6

[18] Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, Wiley-Blackwell, 2009.

[19] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell and K. Nahrstedt, “A Middleware Infrastructure to Active
Spaces”, IEEE Pervasive Computing, Vol. 1, No. 4, pp. 74-83, 2002.

[20] M. Affioletti, S. Kouadri Mostefaoui and B. Hirsbrunner, “Automatic Resource and Service Management for Ubiquitous
Computing Environments”, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications
Workshops, 2004.

[21] Shankar R. Ponnekanti, Brian Lee, Armando Fox, Pat Hanrahan and Terry Winograd, “ICrafter: A Service Framework for
Ubiquitous Computing Environments”, Ubiquitous Computing, Vol. 2201, pp. 56-75, 2001.

[22] Joao Pedro Sousa and David Garlan, “Aura: An Architectural Framework for User Mobility in Ubiquitous Computing
Environments”, Proceedings of the 3rd International Federation for Information Processing, Vol. 97, pp. 29-43, 2002.

[23] P. Verissimo et al., “Cortex: Towards Supporting Autonomous and Cooperating Sentient Entities”, Proceedings of the European
Wireless, pp. 595-601, 2002.

[24] Miaomiao Wang, Jiannong Cao, J.I. Siebert, V. Raychoudhury and Jing Li, “Ubiquitous Intelligent Object: Modeling and
Applications”, Proceedings of the 3rd International Conference on Semantics, Knowledge and Grid, pp. 236-241, 2007.

[25] Mark Weiser, “The Computer for the 21st Century”, Scientific American, Vol. 265, No. 3, pp. 66-75, 1991.

[26] Mark Weiser, “The World is not a Desktop”, Interactions, Vol. 1, No. 1, pp. 7-8, 1994.

[27] Ubiquitous Computing, Available at: https://en.wikipedia.org/ wiki/ Ubiquitous computing.

[28] T. Winograd, “Architectures for Context”, Human-Computer Interaction, Vol. 16, No. 2, pp. 401-419, 2001.

6
www.viva-technology.org/New/IJRI

You might also like