• Title/Summary/Keyword: Context model

Search Result 2,710, Processing Time 0.025 seconds

Design Patterns for Building Context-Aware Transactional Services in PaaS-Enabled Systems

  • Ettazi Widad;Riane Driss;Nassar Mahmoud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.91-100
    • /
    • 2023
  • Pervasive computing is characterized by a key characteristic that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, Cloud computing paradigm introduced flexibility of use according to the user's profile and needs. In this paper, we aimed to provide Context-Aware Transactional Service applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. Being able to compose is not enough, each service and application must be able to offer a well-defined behavior. This behavior must be controlled to meet the dynamicity and adaptability necessary for the new user's requirements. The motivation in this paper is to offer design patterns that will provide a maximum of automatism in order to guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

An Empirical Study on the Factors Influencing the Acceptance of Mobile Banking Services (모바일뱅킹서비스 수용요인에 관한 실증연구)

  • Ryu Il;Shin Seon-Jin;So Soon-Hoo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.2
    • /
    • pp.67-86
    • /
    • 2006
  • Based on literature relating to the TAM (technology acceptance model) and TPB (theory of planned behavior), this study extends the TAM in a mobile banking context. The extended model was tested using LISREL analysis on the sample of 222 users who have experience with the banking service. The model was partially supported in a mobile banking context, accounting for 49% of the variance in the usage intention. The results showed that the perceived usefulness, the perceived credibility, and the perceived financial cost play a significant role in influencing the usage intention of the mobile banking service. In addition, instant connectivity and perceived credibility were found to influence the perceived usefulness, and self-efficacy and instant connectivity were found to influence the perceived ease of use. Implications of these findings are discussed for researchers and practitioners.

  • PDF

Context-Aware Ad Contents Scheduling over DOOH Networks based on Factorization Machine

  • Nguyen, Van Hoang;Nguyen, Thanh Binh;Chung, Sun-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.515-526
    • /
    • 2019
  • DOOH(Digital Out Of Home) advertising targets for reaching consumers through outdoor digital display medias. Traditionally, scheduling of advertisement contents over DOOH medias is usually done by operator's strategy, but an efficient ad scheduling strategy is not easy to find under various advertising contexts. In this paper, we present a context-aware factorization machine-based recommendation model for the scheduling under various advertising contexts, and provide analysis for understanding of the contexts' effects on advertising based on the recommendation model. Through simulation results on the dataset adapted from a real dataset of RecSys challenge 2015, it is shown that the proposed model and analysis based on the model will be effective for better scheduling of ad contents under advertising contexts over DOOH networks.

Fiber-reinforced micropolar thermoelastic rotating Solid with voids and two-temperature in the context of memory-dependent derivative

  • Alharbi, Amnah M.;Said, Samia M.;Abd-Elaziz, Elsayed M.;Othman, Mohamed I.A.
    • Geomechanics and Engineering
    • /
    • v.28 no.4
    • /
    • pp.347-358
    • /
    • 2022
  • The main concern of this article is to discuss the problem of a two-temperature fiber-reinforced micropolar thermoelastic medium with voids under the effect rotation, mechanical force in the context four different theories with memory-dependent derivative (MDD) and variable thermal conductivity. The three-phase-lag model (3PHL), dual-phase-lag model (DPL), Green-Naghdi theory (G-N II, G-N III), coupled theory, and the Lord-Shulman theory (L-S) are employed to solve the present problem. Analytical expressions of the physical quantities are obtained by using Laplace-Fourier transforms technique. Numerical results are shown graphically and the results obtained are analyzed. The most significant points are highlighted.

Hardware Implementation of HEVC CABAC Context Modeler (HEVC CABAC 문맥 모델러의 하드웨어 구현)

  • Kim, Doohwan;Moon, Jeonhak;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.254-259
    • /
    • 2015
  • CABAC is a context-based adaptive binary arithmetic coding method. It increases the encoding efficiency by updating the probability based on the information of the previously coded symbols. Context modeler is a core block of CABAC, which designs a probability model according to the symbol considering statistical correlations. In this paper, an efficient hardware architecture of CABAC context modeler is proposed. The proposed context modeler was designed in Verilog HDL and it was implemented in 0.18 um technology. Its gate count is 29,832 gates including memory. Its operating speed and throughput are 200 MHz and 200 Mbin/s, respectively.

Attention Capsule Network for Aspect-Level Sentiment Classification

  • Deng, Yu;Lei, Hang;Li, Xiaoyu;Lin, Yiou;Cheng, Wangchi;Yang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1275-1292
    • /
    • 2021
  • As a fine-grained classification problem, aspect-level sentiment classification predicts the sentiment polarity for different aspects in context. To address this issue, researchers have widely used attention mechanisms to abstract the relationship between context and aspects. Still, it is difficult to effectively obtain a more profound semantic representation, and the strong correlation between local context features and the aspect-based sentiment is rarely considered. In this paper, a hybrid attention capsule network for aspect-level sentiment classification (ABASCap) was proposed. In this model, the multi-head self-attention was improved, and a context mask mechanism based on adjustable context window was proposed, so as to effectively obtain the internal association between aspects and context. Moreover, the dynamic routing algorithm and activation function in capsule network were optimized to meet the task requirements. Finally, sufficient experiments were conducted on three benchmark datasets in different domains. Compared with other baseline models, ABASCap achieved better classification results, and outperformed the state-of-the-art methods in this task after incorporating pre-training BERT.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Fuzzy Logic-based Context-Aware Access Control Model for the Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 퍼지 논리 기반 상황인식 접근 제어 모델)

  • Jing, Si Da;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.51-60
    • /
    • 2011
  • Authentication model in the wireless environment has many security vulnerabilities. However, there is no adapting standard method in this field. Therefore, we propose a fuzzy logic based authentication model to enhance the security level in the authentication environment. We use fuzzy logic based classification to construct our model, and also additionally utilize improved AHP and case-based reasoning for an appropriate decision making. We compute the context information by using the improved AHP method, use the proposed model to compute the security level for the input data, and securely apply the proposed model to the wireless environment which has diverse context information. We look forward to better security model including cloud computing by extending the proposed method in the future.