Analysis, Ranking and Prediction in Pervasive Computing Trails
نویسندگان
چکیده
Many pervasive computing applications involve the recording of user interaction with physical and digital resources in the environment. Such records can be used to establish context histories that can be subsequently used for user behaviour analysis, pattern recognition, prediction, and the provision of context aware services. In this paper we use trails as the principal data processing primitive for analysis and prediction. We define a trail as the sequence of recorded interactions with the pervasive computing space. Trails contain patterns of space usage and they can be used for the provision of different services, space usage analysis or sociological information of people using the environment simultaneously. Trail analysis requires considerable storage and computational resources to discover such patterns. Moreover no single method exists that identifies significant trails based on different metrics for a variety of different pervasive computing application. In this paper, we introduce a trail based analysis approach, an associated model for the representation of trails and trail aggregates, and suitable data structures for efficient storage, filtering and retrieval. Also, we propose several related algorithms and associated metrics for ranking and identifying significant trails. We use these techniques in 2 different case studies to extract valuable information about the pervasive system environment usage and evaluate the summarizability and the predictive power of our model.
منابع مشابه
A context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملAn application framework for mobile, context-aware trails
In this paper we describe the design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications. A trail is a contextually scheduled collection of activities and represents a generic model that can be used to satisfy the activity management requirements of a wide range of context-based time management applications. Tra...
متن کاملA Compromise Ratio Ranking Method of Triangular Intuitionistic Fuzzy Numbers\ and Its Application to MADM Problems
Triangular intuitionistic fuzzy numbers (TIFNs) is a special case of intuitionistic fuzzy (IF) set and the ranking of TIFNs is an important problem. The aim of this paper is to develop a new methodology for ranking TIFNs by using multiattribute decision making methods (MADM). In this methodology, the value and ambiguity indices of TIFNs may be considered as the attributes and the TIFNs in compa...
متن کاملRanking Efficient DMUs Using the Ideal point and Norms
In this paper, presenting two simple methods for ranking of efficient DMUs in DEA models that included to add one virtual DMU as ideal DMU and is using the additive model. Note that, we use an ideal point just for comparing efficient DMUs with. Although these methods are simple, they have ability for ranking all efficient DMUs, extreme points and the others, also they are capable of ranking t...
متن کامل