scispace - formally typeset
Search or ask a question

Showing papers on "Smart device published in 2004"


Patent
16 Dec 2004
TL;DR: Smart process objects as discussed by the authors have both graphical and simulation elements, which can be used to create one or more graphic displays and one/more process simulation modules, each having elements which may communicate with one another and with devices within a process plant to model and depict the operation of a process.
Abstract: Smart process objects, which have both graphical and simulation elements, may be used to create one or more graphic displays and one or more process simulation modules, each having elements which may communicate with one another and with devices within a process plant to model and depict the operation of a process plant. The smart process objects may include one or more device objects, which represent physical devices within the process plant, and may include one or more smart connection objects which represent and model the flow of a material, such as a gas, a liquid, a composition of solid, electricity, etc., through a connection between entities within the process plant. The smart process objects may also include one or more smart stream objects, which also may represent and model the flow of a material at a particular point in the process plant. The smart device, connection, and stream objects may be interconnected to model the flow of material through the actual physical devices within the process plant thereby enabling enhanced simulation and modeling capabilities with the smart connection and stream objects providing a convenient manner of enabling different entities and sections of a process model to be tied to one another.

111 citations


Book ChapterDOI
01 Jan 2004
TL;DR: It is proved that despite what the authors claimed, an attacker can track the banknotes by using the access-key as a marker, circumventing the randomized encryption scheme that aims at thwarting such attacks.
Abstract: Radio Frequency Identification systems are in the limelight for a few years and become pervasive in our daily lives. These smart devices are nowadays embedded in the consumer items and may come soon into our banknotes. At Financial Cryptography 2003, Juels and Pappu proposed a practical cryptographic banknote protection scheme based on both Optical and Radio Frequency Identification systems. We demonstrate however that it severely compromises the privacy of the banknotes’ bearers. We describe some threats and show that, due to the misuse of the secure integration method of Fujisaki and Okamoto, an attacker can access and modify the data stored in the smart device without optical access to the banknote. We prove also that despite what the authors claimed, an attacker can track the banknotes by using the access-key as a marker, circumventing the randomized encryption scheme that aims at thwarting such attacks.

86 citations


Patent
17 Mar 2004
TL;DR: In this paper, the authors present a system for providing a user with water at a desired temperature comprising a piping system that includes a hot water pipe and a cold water pipe, a pump coupled to the piping system and a smart water delivery device coupled with the pump and operative to allow circulation of water from the hot water pipeline to the cold water pipeline prior to delivery of water to the user.
Abstract: A system for providing a user with water at a desired temperature comprising a piping system that includes a hot water pipe and a cold water pipe, a pump coupled to the piping system and a smart water delivery device coupled to the piping system and to the pump and operative to allow circulation of water from the hot water pipe to the cold water pipe prior to delivery of water at a desired temperature to the user. The smart water delivery device includes two smart valves coupled to hot and cold water inlets, a smart outlet valve coupled to a device outlet, a microcontroller for controlling the actuation of the pump and of the smart valves, and at least one temperature sensor coupled to the microcontroller and used for sensing the water temperature.

57 citations


Journal Article
TL;DR: The advantages of using VoiceXML technology for voice-enabled, construction field applications are discussed, a pilot application of voice technology for inventory management is presented, and the direction of future research in the area of voice and multimodal communications that enable information mobility in AEC industry is outlined.
Abstract: The availability of real time, complete information exchange with the project information repository is critical for decision-making in construction, as information frequently has to be transmitted to and received from the project repository right on site. Information and Communication Technology, specifically wireless communications through mobile device, is seen as a key enabler of leading edge, innovative and powerful field solutions. However, the widespread usage of mobile devices is limited by antiquated and cumbersome interfaces. Speech recognition, along with VoiceXML technology on handheld smart device, should play a major role in overcoming user interface limitations for mobile devices and improve their usability for industrial field applications. This paper discusses the advantages of using VoiceXML technology for voice-enabled, construction field applications. It presents a pilot application of voice technology for inventory management, and outlines the direction of future research in the area of voice and multimodal communications that enable information mobility in AEC industry.

16 citations


Book ChapterDOI
15 Jul 2004
TL;DR: The two contributions of this paper are the proposal of SVA (Semantic Virtual Agent) and component-level adaptive mechanism, which uses SIP to communicate and auto-update themselves and to achieve self-adaptation and reflection of component- level, the component hook mechanism.
Abstract: With the increasing demands for adaptive middleware of real-time embedded systems in ubiquitous computing environments, the need for novel software architecture and programming infrastructure to manage data is widely recognized. In this paper, we present SAM (Semantic and Adaptive Middleware), an efficient middleware architecture that supports for real-time embedded system in smart vehicle space. The SAM’s architecture is based on embedded real-time OS and CAN-based communication environment, which includes tinyORB kernel, distributed components, distributed meta objects, services and tools. In SAM, we mainly utilize context-sensitive repository and knowledge management technology to realize adaptive characteristic. The two contributions of this paper are the proposal of SVA (Semantic Virtual Agent) and component-level adaptive mechanism. The SVAs use SIP (Semantic Interface Protocol) to communicate and auto-update themselves. To achieve self-adaptation and reflection of component-level, the component hook mechanism is introduced. In addition, we have brought into further discussion of the hardware infrastructure and one application of SAM to manage heterogeneous data.

15 citations


Proceedings ArticleDOI
14 Mar 2004
TL;DR: This work proposes an e-Fuzion integration with ubiquitous computer environments of smart devices and active spaces using a system called Gaia, and enhances the effectiveness of the existing system by taking advantage of the ubiquitous nature ofsmart devices and their unique communication capabilities.
Abstract: We introduce a system called e-Fuzion based on using computing devices, such as Tablet PCs, that empower students and teachers with better technologies for educational interaction. We propose an e-Fuzion integration with ubiquitous computer environments of smart devices and active spaces using a system called Gaia. At present, e-Fuzion facilitates electronic communication in a seamless, integrated classroom, giving students additional ways to interact with faculty and each other. E-Fuzion encourages students to participate actively even in large scale class settings. By integrating e-Fuzion into an active space, we enhance the effectiveness of the existing system by taking advantage of the ubiquitous nature of smart devices and their unique communication capabilities. The end result is that students are able to interact, record data and share ideas more quickly than in the traditional classroom.

15 citations


01 Jan 2004
TL;DR: This paper discusses a computer vision based approach for enhancing a common device (display) with machine perception capabilities using techniques for assessing the distance and orientation of a target from the camera to become aware about user’s presence and his interaction intentions.
Abstract: This paper discusses a computer vision based approach for enhancing a common device (display) with machine perception capabilities. Using techniques for assessing the distance and orientation of a target from the camera, a “smart device” becomes aware about user’s presence and his interaction intentions. In other words, the “smart device” is aware when it becomes the user’s focus of attention and it knows to respond accordingly. Our solution uses low-cost cameras adapted with infrared technology and is designed to be robust to lighting variations typical of home and work environments.

13 citations


Patent
08 Apr 2004
TL;DR: In this paper, a power supply module is configured as a smart device and connected to at least one of the control modules for the purpose of data exchange and, in case of a malfunction, transforming the control module(s) to one of a stand-alone operating mode and a cut-off state.
Abstract: An electrical system comprised of at least two control modules as well as at least one power supply module. The present invention improves functional reliability of electrical systems by configuring a power supply module as a smart device and connecting it to at least one of the control modules for the purpose of data exchange and, in case of a malfunction, transforming the control module(s) to one of a stand-alone operating mode and a cut-off state.

11 citations


Journal ArticleDOI
TL;DR: It is suggested that rather than use (random) digit identifiers, patient biometrics would provide a much better access mechanism – in other words comparing freshly captured biometric identifiers with those stored on the smart device.
Abstract: Access, ownership and privacy of medical records are fundamental to the success of any real-world telemedicine application. Such considerations are discussed within the context of smart devices – such as smartcards and iKeys – which are admirably suited not only to providing access to remotely stored Electronic Health Records, but also in emergency situations (Fulcher, 2003). Smart devices offer a limited amount of on-board storage, encrypted and/or compressed as required. Emergency information in the case of cardiac or diabetes patients can be read on any suitably configured computer (i.e. smartcard reader or simply USB port). In non-emergency situations, such as consultations in doctors' surgeries, the smart device can serve as a secure access mechanism for patient data stored remotely on a centralised server, thereby providing a much more comprehensive picture than that given by the limited record stored on the smart device itself. Unique Patient Identifiers need to be defined before such a scheme would receive widespread adoption. The broader community would also need assurance as to compliance with privacy and other similar legislation. It is further suggested that rather than use (random) digit identifiers, patient biometrics would provide a much better access mechanism – in other words comparing freshly captured biometric identifiers with those stored on the smart device. The overriding considerations then become accuracy, efficiency, non-intrusiveness and the amount of additional computer equipment needed to implement such a smart_ID system. Experiences gained from a field trial involving the use of USB iKeys for remote access of diabetes patient records are reported upon, and recommendations made for the future adoption of such systems.

5 citations


Book ChapterDOI
Min Li1, Xiaobo Wu1, Menglian Zhao1, Hui Wang1, Xiaolang Yan1 
25 Aug 2004
TL;DR: Heterogeneous grid computing is proposed that enables mobile device to migrate work load to other computers, which have far more resources and are powered by AC, and an UPnP based architecture is developed that leverages a lot of industry standard.
Abstract: There is a lot of existing research focusing on low power mobile computing, but only a fraction of it takes systematic view toward the whole system. Our research is motivated by two important facts: the first is that processor, SDRAM and chipset consume more than 60% energy on mobile device, and the second is that mobile device usually moves inside a heterogeneous “computer community” that are interconnected by heterogeneous network. Targeting on low power mobile computing, we propose heterogeneous grid computing that enables mobile device to migrate work load to other computers, which have far more resources and are powered by AC. The offloading can reduce majority of local computation related energy consumption. Meanwhile, since most mobile applications have asymmetric UI, the energy consumption on wireless interface will not be significantly increased. In order to support the proposed heterogeneous grid computing, we develop an UPnP based architecture that leverages a lot of industry standard. Three applications are developed on our tested: multimedia streaming, 3D game and Text to Speech. Experiments show that battery life time is radically prolonged.

5 citations


Proceedings ArticleDOI
01 Aug 2004
TL;DR: A brief study on needs for a User Interface in handheld devices and then a comparative analysis of these two technologies by means of developing a 'Math Tutoring Game' in both the environments are described.
Abstract: Today, handheld devices play an important role in human's life. Pocket PCs, Palms and Mobile devices are good examples of handhelds; one of the main concerns when we use these devices is how the interface in these devices works and what characteristics are important in creating a good User Interface. This paper describes a brief study on needs for a User Interface in handheld devices and then we will compare and explores the needs for creating the most efficient User Interface in these devices. Different factors such as application, platform and device in the context of .NET Compact Framework and J2ME were described for developing a good interface in this paper. .NET Compact Framework and J2ME are platforms for development of applications for smart devices. Here we overview these two leading platforms for smart device development. We discuss and do a comparative analysis of these two technologies by means of developing a 'Math Tutoring Game' in both the environments.

Book ChapterDOI
21 Jan 2004
TL;DR: This work presents an integrated framework applicable to both user- and network-oriented adaptation, that uses a common base for sensing context, within a pervasive computing environment.
Abstract: Research in ubiquitous computing has traditionally focused on sensing and making use of user-related context. However, a pervasive computing environment is also a mobile computing environment, where QoS adaptation is often a major concern. We present an integrated framework applicable to both user- and network-oriented adaptation, that uses a common base for sensing context. Smart wireless access points called M-WASPs provide a wireless network infrastructure, and perform sensing, adaptation and other cognitive functions in a distributed fashion, within a pervasive computing environment.

Book
01 Jan 2004
TL;DR: "Smart Card Research and Advanced Applications VI" presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography.
Abstract: In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of the personal environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security grows rapidly. Smart cards will play a very large role in ID management in secure systems. In many computer science areas, smart cards introduce new dimensions and opportunities. Disciplines like hardware design, operating systems, modeling systems, cryptography and distributed systems find new areas of applications or issues; smart cards also create new challenges for these domains. CARDIS, the IFIP Conference on Smart Card Research and Advanced Applications, gathers researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices. This volume contains the 20 papers that have been selected by the CARDIS Program Committee for presentation at the 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), which was held in conjunction with the IFIP 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP). With 20 per cent of the papers coming from Asia, 20 per cent from America, and 60 per cent from Europe, the competition was particularly severe this year, with only 20 papers selected out of 45 very good submissions. "Smart Card Research and Advanced Applications VI" presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography.

Book ChapterDOI
Chie Noda1, Thomas Walter1
10 Mar 2004
TL;DR: The middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity, and a service delivery pattern for user-centric service provisioning by applying mobile agents to smart devices is presented.
Abstract: Ubiquitous computing requires new paradigms to assist users organizing and performing daily tasks. Supporting autonomy and providing secured execution environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart devices enables them to provide capacity to host personal agents, implemented as mobile agents. Mobile agents perform essential tasks such as service negotiation in order to enable automated dynamic service delivery. This paper presents our middleware and a service delivery pattern for user-centric service provisioning by applying mobile agents to smart devices. We further discuss how the middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity.

Patent
25 Jun 2004
TL;DR: In this paper, a secure mode indicator for a smart phone or a PDA (Personal Digital Assistant) executing security applications is provided to inform a user that a smart device is in secure mode by installing the secure mode indicators to the smart device executing the security applications.
Abstract: PURPOSE: A secure mode indicator for a smart phone or a PDA(Personal Digital Assistant) executing security applications is provided to inform a user that a smart device is in a secure mode by installing the secure mode indicator to the smart device executing the security applications. CONSTITUTION: The indicator(155) such as an LED(Light Emitting Diode) is connected to the GPIO(General Purpose Input/Output) latch(154) and is lighten by responding to the GPIO. The GPIO latch is recorded by one logical value and is accessed by a core(103) through a peripheral device bus(156). Operations of the GPIO are controlled by a security signal(152) under control of an SSM(Security State Machine)(150). The GPIO latch is recorded when the security signal is in a security state that a processor(102) indicates the operation of a security software routine.