Information Sciences 230 (2013) 1–2
Contents lists available at SciVerse ScienceDirect
Information Sciences journal homepage: www.elsevier.com/locate/ins
Editorial
Mobile and internet services in ubiquitous and pervasive computing environments
The development of mobile technologies and the associated web services has led to the recent snowballing of Ubiquitous and Pervasive Computing (UPC) on the Internet. UPC technologies enable the creation of a human-oriented computing environment where computer chips are found everywhere and are embedded in everyday objects, allowing individuals to communicate with the surrounding physical world. UPC technologies have been in design for a number of years and are now the practical embodiment of many visionary activities of scientists who have recently been able to create this advanced infrastructure for computers to intelligently communicate with one another and also interact with the humans using them. It is worth noting that UPC technologies allow people to get online even while moving around, thus giving them almost permanent access to their preferred Internet services. In the future, such capabilities will enable the implementation of further projects related not just to the fast, wireless (mobile) delivery of information regardless of where you are, but also to extending those services to perform more advanced tasks connected with intelligent services in Ambient Intelligence. This will support the delivery or rapid exchange of information as well as executing complex tasks ordered by a user, or supporting and optimizing his/her activities. It is easy to imagine a person voice-controlling a car, which, if the driver suddenly becomes incapacitated, will take over the further navigation and also take action so that the driver quickly receives assistance. The performance of such tasks will be possible due to ubiquitous computers providing communication and information access but also with smart chips embedded in clothes and all devices surrounding us. Such tasks will also be possible due to deploying a secure information exchange between such devices and introducing modern computational paradigms which will allow all the collected data to be intelligently analysed and complex situations to be assessed in a way similar to what a human would do. Thus the available web services will be developed by using UPC in a way that satisfies the emerging needs of the information society. The development and application of UPC environments in mobile and Internet services will be particularly connected with following aspects: intelligent and cognitive models and paradigms of computation, embedded systems and wearable computers, knowledge-based and information systems for Internet services, mobile computing and Internet management, privacy, trust and security issues and protocols for Internet services in UPC, and efficient and secure authentication and access control protocols. These topics, as well as some others, are the focus of this special issue of ‘‘Mobile and Internet Services in Ubiquitous and Pervasive Computing Environments’’. The special issue is organized as follows: A paper by Agustinus Borgy Waluyo, David Taniar, Wenny Rahayu et al., describes a new token-passing based multi-point relays (TOSS) data dissemination scheme in mobile P2P environments. The TOSS is designed to support reliability and efficiency of the peers to disseminate messages to other peers in mobile environment. It also incorporates a location-based scheduling technique as a means to determine the most optimal scheduling for the peers to receive messages whilst taking into account the location and mobility of the peers. In a paper by Prasan Kumar Sahoo, Jang-Ping Sheu, and Kun-Ying Hsieh, sequential boundary node selection (SBNS) and distributed boundary node selection (DBNS) algorithms are proposed to find out the boundary nodes of the wireless sensor network. In addition, a target tracking protocol is proposed to detect the entry and exit of the targets using those boundary nodes. Such algorithms may be useful in various applications such as campus security, surveillance, habitat and battlefield monitoring. A paper by Ying-Xun Lai, Chin-Feng Lai, Yueh-Min Huang, and Han-Chieh Chao, presents a set of multi-appliance recognition systems, which applied a single smart meter using a current sensor, as well as a voltage sensor in combination with a microprocessor, to control multi-appliances work and efficiency. After fuzzy-processing of the power information and extracting the power features, electric appliances are classified using the hybrid Support Vector Machine/Gaussian Mixture 0020-0255/$ - see front matter Ó 2013 Published by Elsevier Inc. http://dx.doi.org/10.1016/j.ins.2013.01.026
2
Editorial / Information Sciences 230 (2013) 1–2
Model (SVM/GMM). Household appliances can than be recognized by the household power supply terminal, and next the obtained information can be reported to users to achieve ubiquitous recognition service. A paper by Chen-Yuan Chuang, Yi-Bing Lin, and Zhihao Julie Ren, presents efficient techniques which allow preloading a small number of chapters into the buffer of a mobile E-Reader device for Digital Right Management protected e-books, and avoids the user waiting time in accessing content-protected information. A paper by Jong-Hyouk Lee, Thierry Ernst, and Jean-Marie Bonnin, presents a new handover optimized ticket-based authentication algorithm (HOTA) which enables a mobile device to securely reuse a credential issued by an authentication server, when the mobile node performs handover authentication in different access networks. The proposed procedure reduces the handover latency, and simplifies a handover authentication procedure. A paper by Chen Yu, Dezhong Yao, Xi Li et al., proposes a new service discovery scheme, which considers both discovery efficiency and privacy protection. This scheme is based on polar coordinate description and semantic service description, which make it possible to efficiently build overlay networks, and also provide location-based searching, as well as alleviate traffic congestion The usage of semantic description allows finding services more quickly and efficiently, while protecting mobile nodes’ private information. In the paper by Sung-Hwa Lim, Se Won Lee, Mye Sohn and Byoung-Hoon Lee, there is proposed a method to determine the optimal consistency policy that minimizes the overhead energy expenditure for mobile devices in wireless web environments. It introduces an optimal mathematical model, and conducts a simulation for the purpose of its validation. Thanks to this method, and by using caching schemes, it is possible to reduce the costs of communication and enhance performance by keeping and reusing recently used data. We strongly believe that the papers presented in this special issue make a significant contribution to the work and studies conducted by academic researchers, industry professionals, students, and everyone in the area of mobile and Internet services in UPC. We would like also to express our sincere appreciation of the valuable contributions made by all the authors. Our special thanks go to Prof. Witold Pedrycz, Editor in Chief of Information Sciences Journal, for inviting us to prepare this special issue and for his great support throughout the entire publication process. Ilsun You Korean Bible University, Seoul, South Korea E-mail address:
[email protected] URL: http://isyou.hosting.paran.com/ Marek R. Ogiela AGH University of Science and Technology, Krakow, Poland E-mail address:
[email protected] URLs: http://www.cci.up.krakow.pl/, http://www.home.agh.edu.pl/~mogiela/uk/ Yuh-Shyan Chen National Taipei University, Taiwan E-mail address:
[email protected] URL: http://www.csie.ntpu.edu.tw/~yschen/ Qingfeng Huang C8 MediSensors Inc., USA E-mail address:
[email protected] URL: http://www.qhuang.com