ebook img

Intelligent Spaces: The Application of Pervasive ICT PDF

437 Pages·2006·8.784 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Intelligent Spaces: The Application of Pervasive ICT

Computer Communications and Networks The Computer Communications andNetworks series is a range of textbooks, monographs and handbooks. It sets out to provide students, researchers and non-specialistsalikewith asuregroundingincurrentknowledge,togetherwith comprehensible access to the latest developments in computer communica tions and networking. Emphasis is placed on clear and explanatory styles that support a tutorial approach,so that even the most complex of topics ispresented in a lucid and intelligiblemanner. Alsoin thisseries: AnInformation SecurityHandbook John M;D.Hunter 1-85233-180-1 MultimediaInternetBroadcasting: Quality, Technologyand Interface Andy Sloane andDave Lawrence (Eds) 1-85233-283-2 The QuintessentialPIC'"Microcontroller SidKatzen 1-85233-309-X InformationAssurance: Surviving in the Information Environment AndrewBlythand Gerald 1. Kovacich 1-85233-326-X UMTS:Origins, Architectureand the Standard PierreLescuyer (TranslationEditor:FrankBott) 1-85233-676-5 DesigningSoftware for the Mobile Context:APractitioner's Guide Roman Longoria 1-85233-785-0 OSSfor Telecom Networks Kundan Misra 1-85233-808-3 The QuintessentialPIC"Microcontroller2nd edition SidKatzen 1-85233-942-X From P2Pto Web ServicesandGrids:Peers in aClient/ServerWorld Ian J.Taylor 1-85233-869-5 Alan Steventon and Steve Wright (Eds) Intelligent Spaces The Application of Pervasive ICT ~ Springer Alan Steventon, BSc,MTech, PhD, SteveWright, MA,PhD, CEng,MIEE CPhys, MInstP BTGroup, Ipswich, UK [udalAssociatesLtd, UK Series editor ProfessorA.J.Sammes,BSc,MPhil, PhD, FBCS,CEng CISMGroup, CranfieldUniversity, RMCS,Shrivenham,SwindonSN68LA, UK BritishLibraryCataloguinginPublicationData Acatalogue record forthisbookisavailablefromtheBritishLibrary LibraryofCongressControlNumber:2005929866 ComputerCommunicationsand NetworksISSN1617-7975 ISBN-10:1-84628-002-8 Printedonacid-free paper 1SBN-13:978-1-84628-002-3 ©Springer-VerlagLondon Limited2006 Apartfromanyfairdealingforthepurposesofresearch orprivatestudy,orcriticismorreview,as permittedundertheCopyright,Designsand PatentsAct1988,thispublicationmayonlyberepro duced,storedortransmitted,inanyformorbyanymeans,withthepriorpermissioninwritingof thepublishers,orinthecaseofreprographicreproductioninaccordancewiththeterms oflicences issuedbytheCopyright LicensingAgency.Enquiriesconcerningreproductionoutsidethoseterms should besenttothepublishers. The use of registered names, trademarks, etc. in this publication does not imply, even in the absenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantlawsandregulations and thereforefreeforgeneral use. The publisher makes no representation,express or implied, with regard to the accuracyof the informationcontainedinthis book and cannotaccept anylegalresponsibilityorliabilityforany errorsoromissionsthat maybemade. Printed intheUnitedStatesofAmerica(EB) 9 8 7 6 5 4 3 2 1 SpringerScience+BusinessMedia springeronline.com Contents Contributors xi Introduction xv 1 IntelligentSpaces- The Vision, the Opportunities,and the Barriers 1 SWrightandASteventon 1.1 A Vision ofIntelligent Spaces I 1.2 Applications 3 1.3 TechnologyCapabilities 6 1.4 Roadmap tothe Vision 9 1.5 Research Challenges 12 1.6 Summary 16 2 TheSocio-Economic ImpactofPervasiveComputing- 19 IntelligentSpaces and the OrganisationofBusiness MHLyons, REllisJ MMPotter,DAMHolm, andR Venousiou 2.1 Introduction 19 2.2 Commercial Opportunities 20 2.3 New OrganisationalForms- The EmergingValueNets 21 2.4 Creatingthe AdaptiveCompany 26 2.5 Changingthe WayWeWork 28 2.6 Summary 32 3 No PervasiveComputingWithoutIntelligentSystems 37 SGThompson andBAzvine 3.1 Introduction 37 3.2 NeedsIdentification 39 3.3 Problems from UbiquitousComputing - Solutions from 41 IntelligentSystemsResearch 3.4 ComponentUnderstandability- Soft Computing 46 3.5 ComponentAdaptivity- Machine Learning 48 3.6 Summary 50 VI IntelligentSpaces:TheApplicationofPervasiveICl' 4 TheSupplyChain 55 DLuckett 4.1 Introductionand BackgroundtoRFID 55 4.2 Retail/SupplyChain 57 4.3 WhatAbout theConsumer? 60 4.4 Summary 63 5 Carein theCommunity 65 SBrown,NHine,ASixsmith,andPGarner 5.1 Introduction 65 5.2 The Conceptof'Well-Being' 66 5.3 How toMeasure ChangesinWell-Being 68 5.4 System Design,Deployment,and ServiceIssues 73 5.5 Summary and KeyTechnicalChallenges 78 6 PervasiveHomeEnvironments 81 PBull,RLimb,andRPayne 6.1 Introduction 81 6.2 Vision 82 6.3 Technical Challenges 84 6.4 CommercialOpportunities 89 6.5 Summary 90 7 Traffimatics- IntelligentCo-operativeVehicle Highway Systems 93 GBilchev, DMarston,NHristov, EPeytchev, andN Wall 7.1 Introduction 93 7.2 VisionofIntelligent Co-operativeVehicleHighwaySystems 94 7.3 VisionImplementation 96 7.4 Market OpportunitiesandBarriers 104 7.5 Summary 107 8 Mixed-RealityApplicationsin Urban Environments 109 JBulman,BCrabtree,A Gower, A Oldroyd,andJSutton 8.1 Introduction 109 8.2 3D Virtual-RealityandMixed-RealityScene Rendering 110 8.3 PervasiveGaming- Gaming inUrbanEnvironments III 8.4 Workforce ManagementApplication 116 8.5 Military OperationsinUrban Environments 119 8.6 Future 123 8.7 Summary 123 Contents Vll 9 ASensorNetworkfor Glaciers 125 K Martinez,A Riddoch,JHart,andROng 9.1 Introduction 125 9.2 TheGlacsweb Project 126 9.3 System Architecture Version2 128 9.4 Example Results 137 9.5 Summaryand Future Work 138 10 Co-operation in the Digital Age- EngenderingTrustin 141 ElectronicEnvironments A Seleznyov,M0 Ahmed,andSHailes 10.1 Introduction 141 10.2 SecurityIssuesin Ubicomp 142 10.3 DecentralisedTrust Management 145 10.4 ADAM 147 10.5 Summary 154 11 MaintainingPrivacy in PervasiveComputing- Enabling 157 AcceptanceofSensor-basedServices A Sopperaand TBurbridge 11.1 Introduction 157 11.2 Emerging Pervasive Computing- Opportunities andThreats158 11.3 Understanding Privacy inPervasiveComputing 161 11.4 Technical Approaches to Privacy 167 11.5 ResearchChallenges 173 11.6 Summary 174 12 RFID Securityand Privacy- Issues,Standards,and Solutions 179 A Soppera, TBurbridge.andDMolnar 12.1 Introduction 179 12.2 RFID TagsTechnology- AnOverview 181 12.3 Understanding Privacy inPervasiveComputing 185 12.4 Privacyas aMultilayer Problem 186 12.5 TransferofOwnershipattheApplication Level 192 12.6 Summary 196 13 AmbientTechnology- NowYouSeeIt,NowYouDon't 199 RPayneandBMacDonald 13.1 Introduction 199 13.2 Living ina Moore's Law World 201 13.3 HardwareTechnology lnfluencersandIssues 202 13.4 The Key HardwareTechnologies for Enabling iSpaces 204 13.5 Summary 215 Vlll IntelligentSpaces: TheApplicationofPervasiveiCl' 14 IntegratedSensorNetworksfor Monitoringthe Healthand 219 Well-BeingofVulnerableIndividuals DJ THeatley,RSKalawsky, 1Neild,andPABowman 14.1 Introduction 219 14.2 ImportanceofWell-Being Care Provision 220 14.3 ActivitiesofDaily Living 220 14.4 Ethical Considerations 221 14.5 SensingActivitiesofDaily Living 223 14.6 MultipleOccupancyIssues 224 14.7 Sensor Fusion 225 14.8 SensorNetworks 227 14.9 ExperimentalWork 234 14.10 Summary 235 15 Segmentationand TrackingofMultipleMovingObjectsfor 239 IntelligentVideo Analysis L-QXU, JLLandabaso, andBLei 15.1 Introduction 239 15.2 MovingObjects Segmentationwith ShadowRemoval 243 15.3 Multi-ObjectTracking Using Temporal Templates 247 15.4 Experimental Results 251 15.5 Summary 253 16 An Attention-basedApproach to Content-based Image 257 Retrieval ABamidele,F WMStentiford, andJ Morphett 16.1 Introduction 257 16.2 State ofthe Art 258 16.3 CurrentResearch 260 16.4 Results 264 16.5 Discussion 267 16.6 Summaryand FutureWork 269 17 Eye Trackingas a New InterfaceforImageRetrieval 273 o KOyekoyaandF WMStentiford 17.1 Introduction 273 17.2 State oftheArt 273 17.3 CurrentResearchObjectives 276 17.4 Discussion 283 17.5 Summary 284 Contents ix 18 The Implications ofPervasiveComputingonNetworkDesign 287 RBriscoe 18.1 Introduction 287 18.2 Architecture 288 18.3 ComponentServices 297 18.4 Business Implications 315 18.5 Summary 317 19 AutonomicComputingfor Pervasive ICT- AWhole-System 323 Perspective MShackleton.FSajfre,R Tateson,EBonsma,andCRoadknight 19.1 Introduction 323 19.2 IllustrativeExampleSystems 324 19.3 DiscussionofExampleSystems 330 19.4 TheNeed for 'Complex Systems' Theoryand Modelling 332 19.5 Summary 333 20 Scale-FreeTopologyfor Pervasive Networks 337 FSajfre, HJovanovic.CHoile,andSNicolas 20.1 Introduction 337 20.2 Methodology 340 20.3 Results 340 2004 Summary 348 21 NEXUS - Resilient IntelligentMiddleware 351 NKaveh andR Ghanea Hercock 21.1 Introduction 351 21.2 Motivating Scenario 352 21.3 NEXUS Architecture 353 21.4 NEXUS Prototype 355 21.5 Related Work 356 21.6 Summary 358 22 IntelligentData Analysisfor DetectingBehaviourPatterns 361 iniSpaces DDNauck,B Majeed,andB-SLee 22.1 Introduction 361 22.2 Approaches to iSpaces 362 22.3 IntelligentDataAnalysis inSensorNetworks 363 22.4 Detecting UnusualPatterns 367 22.5 Summary 374

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.