簡易檢索 / 詳目顯示

研究生: 莊詠升
Chuang, Yung-Sheng
論文名稱: 提昇情境感知應用程式執行可靠度之可信賴情境資訊管理機制
A Mechanism of Context Information Management to Improve the Reliability of Context-Aware Applications
指導教授: 郭耀煌
Kuo, Yau-Hwang
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 52
中文關鍵詞: 智慧生活環境感測裝置服務提供裝置情境資訊管理機制情境感知
外文關鍵詞: Context Management Mechanism (CMM), actuator, sensor, context-aware, Smart living space
相關次數: 點閱:141下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在智慧型生活環境裡,一個可靠的情境感知應用程式必須要能夠適應環境狀態的改變,盡其所能完成使用者的需求。所以,情境感知應用程式若要執行順利的話,必須同時擁有感測裝置提供的可信賴情境資訊和具備優良執行品質的服務提供裝置。然而,感測裝置可能受外在環境的影響,導致感測的訊息產生錯誤或是遺漏,所以當情境感知應用程式利用不確定的資訊來決定回應使用者要求的方法,就會產生不可預期的執行結果。另一方面,即使情境感知應用程式可以正確的得知環境的狀態,但如果沒有品質良好的執行裝置也無法提供給使用者完善的情境感知服務。
    為了解決上述問題,本篇論文利用推薦系統的概念與統計學上的方法,提出一個情境資訊管理機制(Context Management Mechanism, CMM)用來評估由感測裝置所提供的情境資訊的可信度以及服務提供裝置的執行品質。CMM除了考量感測裝置與服務提供裝置的特性外,也會根據情境感測程式的不同需求來調整給予情境感知資訊的可信度和裝置的執行品質程度。
    論文最後透過實驗來驗證CMM方法的可靠度,實驗首先驗證由CMM評估的情境資訊的信賴度是否能夠真實反映情境資訊的狀態。其次,實驗藉由不同情境感知程式提出的需求,驗證是否CMM可以依照不同需求提供適當的情境感知訊息和適當的服務提供裝置。

    In the smart living space, a reliable context-aware application has to adapt the variable environment and is devoted to complete the user’s requirement. Therefore, if a context-aware application expects to achieve the user’s requirement smoothly, it must understand the environment status according to the trustworthy context information and provide the efficiency service using the high-quality service providers. Unfortunately, the context information influenced by the environment status may be wrong or lost. If a context-aware application responds the user’s requirement using the uncertain context information, it will lead to the unpredicted result. On the other hand, without the high-quality service provider, the context-aware application still can not provide the good service.
    In order to resolve the above-mentioned problems, this thesis proposes Context Management Mechanism (CMM) to evaluate the trustworthiness of context information and the efficiency of service provider on the basis of the recommender system and statistics. When CMM recommends the trustworthy context information or the efficiency of service provider, it considers not only the key features of context information, but also the different requirements of the context-aware application.
    Finally, the thesis proposes the experiment to verify the reliability of CMM. The experiment firstly attempts to verify whether the trustworthiness of context information recommended by CMM can represent the real status. Secondly, the experiment verifies whether CMM can provide appropriate context information or service provider according to different requirements of context-aware application.

    中文摘要 .............................................................................. V Chapter 1. Introduction ...................................................... 1 1.1. Motivation ................................................................................................. 2 1.2. Organization .............................................................................................. 3 Chapter 2. Background and Related Work ......................... 4 Chapter 3. A Mechanism of Context Management ............ 8 3.1. The Components of CMM ........................................................................ 9 3.2. The Procedure of CMM .......................................................................... 10 3.3. The Categorization of Context Information ............................................. 11 3.4. The Properties Evaluation of the Context Information ........................... 12 3.4.1. The Properties of Sensors’ Context Information ............................ 13 3.4.2. The Properties of Actuators’ Context Information ......................... 19 3.5. The Recommendation Evaluation ........................................................... 22 3.5.1. The Recommendation for the Sensors’ Context Information ......... 22 3.5.2. The Recommendation for the Quality of Actuators ....................... 23 Chapter 4. Experiment and Analysis ................................ 25 4.1. Experiment for the Trustworthiness of Sensors’ Context Information.... 25 4.1.1. Experimental Environment ............................................................ 25 4.1.2. Environmental Configuration ......................................................... 27 4.1.3. Experimental Procedure ................................................................. 28 4.1.4. Experimental Analysis ................................................................... 33 4.2. Experiment for the Quality of Actuators’ Context Information .............. 38 4.2.1. Experimental Environment ............................................................ 38 4.2.2. Environmental Configuration ......................................................... 39 4.2.3. Experimental Procedure ................................................................. 40 4.2.4. Experimental Analysis ................................................................... 42 Chapter 5. Conclusion and Future Work .......................... 45 Reference……………………………..................................47

    [Abe03] K. Aberer, P. Cudre-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Pun-ceva and R. Schmidt, “P-Grid: a self-organizing structured P2P system”, ACM SIGMOD Record 32 (2003) (3), pp. 29-33.
    [Buc03] Thomas Buchholz, Axel Kupper, Michael Schiffers, “Quality of Context: What It Is And Why We Need It”, in Proceedings of the 10th HP-OVUA workshop, Geneva, Switzerland, 2003.
    [Car01] J Carbo, JM Molina, J Davila, “A BDI agent architecture for reasoning about reputation”, in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, vol. 2, 2001, pp. 817-822.
    [Cha05] E Chang, T Dillon, F Hussain, “Trust and reputation relationships in ser-vice-oriented environments”, in Proceedings of the ICITA 2005 third Interna-tional Conference on Information Technology and Applications, vol. 1, 2005, pp. 4-14.
    [Cha06] Maria Chantzara, Miltiades Anagnostou, Efstathios Sykas, “Designing a quali-ty-aware discovery mechanism for acquiring context information”, in Proceed-ings of the 20th International Conference on Advanced Information Network-ing and Applications, AINA 2006, vol. 1, 2006, pp. 6.
    [Hal02] A. Halberstadt, L. Mui, M. Mohtashemi, ” A computational model of trust and reputation”, in Proceedings of the 35th Hawaii International Conference on System Science (HICSS), January 7-10, 2002.
    [Hen04] Karen Henricksen and Jadwiga Indulska, “Modelling and Using Imperfect Context Information”, in Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, p.33, March 14-17, 2004.
    [Hue04] Markus C. Huebscher and Julie A. McCann, “Adaptive middleware for context-aware applications in smart-homes”, in Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing, p.111-116, October 18-22, 2004, Toronto, Ontario, Canada.
    [IST] “The Context IST Project : Active Creation, Delivery and. Management of Ef-ficient Context Aware Services”, IST-. 2001-38142-CONTEXT, available from: http://context. upc.es
    [Jud03] Glenn Judd and Peter Steenkiste, “Providing Contextual Information to Perva-sive Computing Applications”, in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, p.133, March 23-26, 2003.
    [Jos05] A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision”, Decision Support Systems, 2005.
    [Kam03] SD Kamvar, MT Schlosser, H Garcia-Molina, “The Eigentrust algorithm for reputation management in P2P networks”, in Proceedings of the 12th interna-tional conference on World Wide Web, May 20-24, 2003, Budapest, Hungary.
    [Kra06] van Kranenburg, H.; Bargh, M.S.; Iacob, S.; Peddemors, A., “A context management framework for supporting context-aware distributed applications”, in Proceedings of Communications Magazine, IEEE, vol. 44, Issue 8, Aug. 2006, pp. 67 – 74.
    [Lei02] Hui Lei, Daby M. Sow, John S. Davis, II, Guruduth Banavar, Maria R. Ebling, “The design and applications of a context service”, ACM SIGMOBILE Mobile Computing and Communications Review, v.6 n.4, p.45-55, October 2002.
    [Puj02] JM Pujol, R Sangüesa, J Delgado, “Extracting Reputation in Multi-Agent Sys-tems by Means of Social Network Topology” in Proceedings of First Int'l Joint Conference on Autonomous Agents and Multiagent Systems, 2002.
    [Rub01] JC Rubiera, JMM Lopez, JD Muro, “A fuzzy model of reputation in mul-ti-agent systems” in Proceedings of 5th International Conference on Autonom-ous Agents, Montreal, Canada, ACM Press, May/June, 2001.
    [Raz05] MA Razzaque, S Dobson, P Nixon, “Categorization and Modeling of Quality in Context Information”, Systems Research Group, School of Computer Science and Informatics. University College, Dublin IE, 2005.
    [Rei05] Rein, G.L., “Reputation Information Systems: A Reference Model”, in Proceedings of the 38th Annual Hawaii International Conference on System Sciences 2005 (HICSS '05), Jan. 2005, pp.26a - 26a.
    [Sch02] R. Schmidt, “Gridella: an open and efficient Gnutella-compatible Peer-to-Peer System based on the P-Grid approach”, EPFL Technical Report IC/2002/71, Master’s Thesis at the Technical University of Vienna.
    [Son04] Weihua Song, Phoha, V.V., Xin Xu, “An adaptive recommendation trust model in multiagent system”, in Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT’04), 2004, pp. 462-465.
    [Son04] Weihua Song and Phoha, V.V., “Neural network-based reputation model in a distributed system”, in Proceedings of the IEEE International Conference on e-Commerce Technology CEC 2004, 2004, pp. 321-324.
    [Shi06] Bing Shi, Xianping Tao, Jian Lu, “Rewards-based negotiation for providing context information”, in Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006).
    [Wan03] Y Wang, J Vassileva, ”Bayesian network-based trust model”, in Proceedings of the IEEE/WIC International Conference on Web Intelligence 2003, issue Oct. 2003 pp. 372 - 378.
    [Wan05] Ping Wang and Zili Zhang, “A computation trust model with trust network in multi-agent systems”, in Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005), 2005, pp. 389-392.
    [Wan05] Yuan-Kai Wang and L. W. Liao, "Gaussian Mixture Modeling for Location Po-sitioning in Wireless-LAN," Mobile Computing , TaoYuan , Taiwan , 2005.
    [Xio03] L. Xiong and L. Liu., “A reputation-based trust model for peer-to-peer ecom-merce communities”, in Proceedings of IEEE Conference on E-Commerce (CEC'O3), 2003.
    [Xio04] Li Xiong and Ling Liu, “PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities”, in Proceedings of the IEEE Transactions on Knowledge and Data Engineering, vol. 16, issue 7, 2004, pp. 843-857.
    [Xu05] Chang Xu , S. C. Cheung, Inconsistency detection and resolution for con-text-aware middleware support, Proceedings of the 10th European software en-gineering conference held jointly with 13th ACM SIGSOFT international sym-posium on Foundations of software engineering, September 05-09, 2005, Lisbon, Portugal.
    [Yu03] B. Yu and M.P. Singh., “Detecting Deception in Reputation Management”, in Proceedings of the Second Int. Joint Conference on Autonomous Agents & Mul-tiagent Systems (AAMAS), ACM, 2003, pp.73-80.
    [Ye06] Ying-Han Ye and Yau-Hang Kuo, “Development of A Multi-agent Software Plat-form for Context-aware Digital Home Applications and Its Environment Simula-tor”, Department of Computer Science and Information Engineering, Na-tional Cheng Kung University, Tainan, Taiwan, ROC, 2006.
    [Zac00] G. Zacharia and P. Maes, “Trust Management through Reputation Mechanisms” Applied Artificial Intelligence, vol. 14, no. 9, pp. 881-907, 2000.
    [Zho05] Minghui Zhou, Wenpin Jiao, Hong Me, “Customizable framework for managing trusted components deployed on middleware”, in Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005, 2005, pp. 283-291.

    下載圖示 校內:2009-08-28公開
    校外:2009-08-28公開
    QR CODE