Encapsulation and entity-based approach of interconnection between sensor platform and middleware of pervasive computing

被引:0
|
作者
Lim, Shinyoung [1 ]
Helal, Abdelsalam [1 ]
机构
[1] Univ Florida, Coll Engn, Mobile & Pervas Comp Lab, Informat Sci & Engn Dept, Gainesville, FL 32611 USA
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a unique mechanism that enables seamless interconnection and scalability of the interface between the sensor platform layer and the middleware layer in pervasive computing. The disadvantages of using one-to-one hard coding for various device drivers and firmware for interfacing sensor platform and middleware layers are primarily a lack of flexibility and scalability when the system changes environments. The encapsulation of access point of the sensor platform layer provides developers and designers with an effective way of interconnecting and scaling up with diverse and various kinds of sensors and actuators. In this paper, we define encapsulation of the access point of the sensor platform layer. The module for encapsulating the detected sensor data is called 'context representer'. The context representer converts detected sensor data to raw context. For interconnecting with the sensor platform layer and the middleware layer, 'entity manager' module in the middleware layer for each entity of context representer is defined. The entity manager is for transforming the raw context to a general context. Then, the middleware is able to interact with context-aware applications according to the reasoning with context in the middleware layer, upper layer requests and lower layer status, without being influenced by a change of sensor node and sensor platform environments. We present the encapsulation mechanism and entity manager for efficient interfacing and scalability of context-aware applications and compare them with other approaches.
引用
收藏
页码:500 / 515
页数:16
相关论文
共 50 条
  • [31] Sensor network structure and group routing strategy based pervasive computing
    Shi, WR
    Zhao, YY
    Huang, R
    Ni, X
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2005, 2 : 810 - 815
  • [32] Good manners for pervasive computing - an approach based on the ambient calculus
    Schiele, Gregor
    Handte, Marcus
    Becker, Christian
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 585 - +
  • [33] A Middleware-Based Approach for Heterogeneous Wireless Sensor Networks
    Graziosi, F.
    Pomante, L.
    Pacifico, D.
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS: NEW ASPECTS OF COMMUNICATIONS, 2008, : 52 - +
  • [34] Maintaining privacy in pervasive computing - enabling acceptance of sensor-based services
    Soppera, A
    Burbridge, T
    BT TECHNOLOGY JOURNAL, 2004, 22 (03) : 106 - 118
  • [35] A Sensor Network-Based Data Stream Clustering Algorithm for Pervasive Computing
    Ye Ning
    Wang Ruchuan
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (02): : 255 - 258
  • [36] Analyzing the structure of parent-moderated narratives from children with ASD using an entity-based approach
    Chaspari, Theodora
    Provost, Emily Mower
    Narayanan, Shrikanth
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 2429 - 2433
  • [37] Pervasive computing scene apperceive model based on agent and wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban), 2008, 2 (75-79):
  • [38] An ontology-based approach to context modeling and reasoning in pervasive computing
    Ejigu, Dejene
    Scuturici, Marian
    Brunie, Lionel
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 14 - +
  • [39] A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
    Zhang, Weishan
    Schuette, Julian
    Ingstrup, Mads
    Hansen, Klaus M.
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 404 - +
  • [40] A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
    Iltaf, Naima
    Hussain, Mukhtar
    Kamran, Farrukh
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 702 - +