Search results

11 – 20 of over 5000
Article
Publication date: 10 August 2012

Chang‐su Kim, B.G. Son and Michael Bourlakis

The principal purpose of this paper is to determine the distinguishing characteristics of the factors that affect the successful adoption of ubiquitous computing technology (UCT…

1125

Abstract

Purpose

The principal purpose of this paper is to determine the distinguishing characteristics of the factors that affect the successful adoption of ubiquitous computing technology (UCT) in supply chain management (SCM) in different settings.

Design/methodology/approach

Based on the relevant literature, this paper analyses the adoption of UCT in SCM operations, and describes the series of shaping processes. These processes are influenced largely by management and technical factors such as strong support from top management and by convenient user interfaces in global ubiquitous computing settings. These two factor types (management and technical) support the formulation of a theoretical framework that can be examined in two national environments (UK and Korea).

Findings

The results highlight the key differences in terms of UCT adoption in supply chain contexts between the two national environments examined, and indicate that these differences are affected by the different national industrial foundations, organizational network infrastructures, and perspectives on system development, as well as by issues related to the costs and practical benefits of using this technology in SCM.

Practical implications

This study raises some major implications for researchers and practitioners alike. Specifically, the paper stresses the role of management and technical issues in terms of UCT adoption in SCM operations, and expands current theoretical understanding of the subject. It also provides a set of management implications, including the need for managers to have strong support from top management and the need for a convenient user interface.

Originality/value

There is a scarcity of papers in SCM that examine issues related to ubiquitous computing. This is addressed via the current paper that reports the results of a comparative study of UCT implementation in SCM operations for firms operating in two national environments (UK and Korea). The paper will be beneficial to the strategic thinking of supply chain managers and will support further empirical research work in this academic field of study.

Details

The International Journal of Logistics Management, vol. 23 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 13 June 2016

Danping Ren, JiJun Zhao and Jinhua Hu

User-oriented seamless service handoff is prosperous in the ubiquitous computing environment. This paper aims to present an open architecture for the user-oriented seamless…

Abstract

Purpose

User-oriented seamless service handoff is prosperous in the ubiquitous computing environment. This paper aims to present an open architecture for the user-oriented seamless service handoff across heterogeneous platforms. The migration of service environment is the key to implement the user-oriented service handoff. A distributed service handoff scheme based on the binary sensor network and context-aware middleware has been proposed.

Design/methodology/approach

To validate this scheme, a test-bed has been constructed in the lab environment.

Findings

The experimental results show that the proposed scheme can reduce the service handoff delay compared to the centralized scheme.

Originality/value

The experimental results show that the scheme can reduce the delay of service handoff compared to the traditional centralized scheme.

Details

World Journal of Engineering, vol. 13 no. 3
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 31 December 2006

Maria Strimpakou, Ioanna Roussaki, Carsten Pils and Miltiades Anagnostou

Context awareness is one of the key aspects of pervasive computing systems. In such systems, a plethora of dynamic context information needs to be constantly retrieved, soundly…

Abstract

Context awareness is one of the key aspects of pervasive computing systems. In such systems, a plethora of dynamic context information needs to be constantly retrieved, soundly interpreted, rapidly processed, maintained in various repositories, and securely disseminated. Thus, a flexible, scalable and interoperable context representation scheme needs to be established and solid context management mechanisms need to be adopted, which will perform well in large‐scale distributed pervasive systems. This paper elaborates on the COMPACT context middleware that has been designed to cope with the issues above and saturate pervasive computing environments with context awareness functionality.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 8 June 2010

Nayat Sanchez‐Pi and Jose Manuel Molina

Taking into account the importance of e‐commerce and the current applications of AI techniques in this area, this research aims to adequate the design of a multi‐agent system for…

Abstract

Purpose

Taking into account the importance of e‐commerce and the current applications of AI techniques in this area, this research aims to adequate the design of a multi‐agent system for the provisioning of e‐services in u‐commerce environments. This proposal is centred on the methods of evaluation in a u‐e‐commerce environment.

Design/methodology/approach

The multi‐agent systems (MAS) approach is based on an MAS model developed for AmI that has been redesigned to support u‐commerce. The use of a recommendation system, previously developed by the research group, is suggested for this MAS. The methodological proposal centres on the evaluation of this type of system.

Findings

The evaluation of this type of system is the principal problem of current research. Therefore, this is the main contribution of the paper.

Research limitations/implications

The different evaluation methods that are proposed, whether qualitative or quantitative, offer the possibility of measuring the added value that the context can give to the use of e‐services in different domains of application. Qualitative evaluation should consider the customer as a central piece in the system. In addition, quantitative methods should objectively evaluate the contribution of context to the application.

Practical implications

At present, there is no single method for evaluating the benefits of different u‐commerce systems, so a new method needs to be found based on these techniques.

Originality/value

The research proposes an MAS designed for u‐commerce domains, analyzes the capacity of trust management techniques in this environment, and proposes several evaluation methods to show the benefits of context information in the use of e‐services. Several real developments are described to show the different applications of MAS in u‐commerce and how evaluation is carried out.

Details

Internet Research, vol. 20 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 10 August 2010

Kalpana Shankar

The purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy…

486

Abstract

Purpose

The purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly.

Design/methodology/approach

The paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home‐based ubiquitous computing devices were created and deployed in a home‐like living lab setting; elders were brought to the lab to interact with the prototypes, then brought together in focus groups to discuss their insights and concerns.

Findings

Initial analyses suggest that extant metaphors of privacy may be inadequate for understanding pervasive computing in the home. Concepts of data, affective concerns, and the creation of appropriate prototypes for eliciting privacy are considered. Considerations for future studies of the elderly and privacy are made.

Research limitations/implications

The homogeneity of the study population in terms of socioeconomic status, location, and community networks suggests that the study needs to be repeated with wider populations.

Originality/value

Although a number of projects and studies have examined the usability of home‐based ubiquitous computing and design for aging, there has been little integration of privacy and ethical concerns into general research discourse.

Details

Journal of Information, Communication and Ethics in Society, vol. 8 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 7 June 2013

Younghee Noh

This study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of…

2987

Abstract

Purpose

This study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of digital libraries, and proposed context‐aware services that can be applied to any situation by illustrating some library contexts.

Design/methodology/approach

The paper investigated both theoretical research and case analysis studies before suggesting a service model for context‐awareness‐based libraries by examining the context, context‐awareness, and context‐awareness technology in depth.

Findings

This paper derived possible library services which could be provided if context‐awareness services are implemented by examining and analyzing case studies and systems constructed in other fields. A library‐applied context‐aware system could recognize users entering the library and provide optimal services tailored to each situation for both new and existing users. In addition, the context‐awareness‐based library could provide context‐awareness‐based reference services, context‐awareness‐based loan services, and cater to other user needs in the stacks, research space, and a variety of other information spaces. The context‐awareness‐based library could also recognize users in need of emergency assistance by detecting the user's behavior, movement path, and temperature, etc. Comfort or climate‐control services could provide the user with control of the temperature, humidity, illumination and other environmental elements to fit the circumstances of users, books, and instruments through context‐aware technology.

Practical implications

Next‐generation digital libraries apply new concepts such as semantic retrieval, real‐time web, cloud computing, mobile web, linked data, and context‐awareness. Context‐awareness‐based libraries can provide applied context‐awareness access service, reactive space according to the user's access, applied context‐awareness lobbies, applied context‐awareness reference services, and applied context‐awareness safety services, context‐awareness‐based comfort services and so on.

Originality/value

Real instances of libraries applying context‐aware technology are few, according to the investigative results of this study. The study finds that the next‐generation digital library using context‐awareness technology can provide the best possible service for the convenience of its users.

Content available
1047

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 1
Type: Research Article
ISSN: 1742-7371

Article
Publication date: 22 November 2010

Hen‐I Yang, Chao Chen, Bessam Abdulrazak and Sumi Helal

A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of…

Abstract

Purpose

A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of consensus about the best approaches to create such systems or how to evaluate them. To address these issues, this paper aims to develop a performance evaluation framework for pervasive computing systems.

Design/methodology/approach

Based on the authors' experience in the Gator Tech Smart House – an assistive environment for the elderly, they established a reference scenario that was used to guide the analysis of the large number of systems they studied. An extensive survey of the literature was conducted, and through a thorough analysis, the authors derived and arrived at a broad taxonomy that could form a basic framework for evaluating existing and future pervasive computing systems.

Findings

A taxonomy of pervasive systems is instrumental to their successful evaluation and assessment. The process of creating such taxonomy is cumbersome, and as pervasive systems evolve with new technological advances, such taxonomy is bound to change by way of refinement or extension. This paper found that a taxonomy for something so broad as pervasive systems is very complex. It overcomes the complexity by focusing the classifications on key aspects of pervasive systems, decided purely empirically and based on the authors own experience in a real‐life, large‐scale pervasive system project.

Originality/value

There are currently no methods or frameworks for comparing, classifying, or evaluating pervasive systems. The paper establishes a taxonomy – a first step toward a larger evaluation methodology. It also provides a wealth of information, derived from a survey of a broad collection of pervasive systems.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 August 2021

Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a…

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 April 2008

K.L. Eddie Law and Sunny So

With rapid advances in wireless portable devices, ubiquitous computing seems becoming a reality everyday. The paper aims to explore the possibility of offering real‐time content…

Abstract

Purpose

With rapid advances in wireless portable devices, ubiquitous computing seems becoming a reality everyday. The paper aims to explore the possibility of offering real‐time content adaptation on set of data streams using the active pervasive network infrastructure.

Design/methodology/approach

With different relative importance among the data sets, traffic control and discrimination with different operations on content adaptation are examined. Piggyback extension to users' preferences messages is proposed to smoothly enhance the active pervasive network infrastructure design.

Findings

Content adaptation is achieved transparently to both clients and server systems. Real‐time delivery services overcome stochastic network situations and abruptly changing bottleneck link bandwidth problem while retaining information integrity and preserving critical data at the best of the limit of an environment.

Originality/value

The paper explores real‐time content adaptation on data streams using the active pervasive network infrastructure.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

11 – 20 of over 5000