基于RFID的上下文感知若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术、计算技术的发展,计算模式正发生着深刻的变革,已经逐渐从传统分布式移动计算发展到普适计算模式。普适计算的本质特征是融合物理空间和信息空间,为人提供透明的、无处不在的服务。本文研究的是普适计算环境的一个重要分支领域——上下文感知计算。上下文感知计算对于实现普适计算是至关重要的。
     在普适计算的背景下,本文首先分析和研究了现有上下文感知计算的理论和相关关键技术,包括上下文建模方法,上下文推理研究现状,上下文存储以及上下文感知系统框架研究现状,总结了这些研究和技术的成果与不足之处。
     然后,本文提出了基于RFID的本体上下文模型,模型采用层次化的建模方式,上下文本体按领域进行划分,对各种不同类型的上下文采用统一的格式管理,实例证明该模型能够快速地构建上下文感知系统最基本需求的领域本体。
     在此基础上,提出了RFID上下文感知服务模型框架,该框架包括底层通信环境、上下文感知中间件层、上下文服务层,详细阐述了框架中各模块的功能以及相互间的联系。然后用两个应用实例对本体上下文模型和服务模型进行进一步阐述和验证。
     最后在研究分析了现有无线环境下的缓存置换算法后,提出了种适合于普适计算环境的上下文缓存置换算法——RCRA。算法根据上下文未来被访问的概率、上下文历史访问频率、上下文新鲜度等加权来判断上下文的价值,当有新的上下文需要加入缓冲池或缓冲池己满有必要对上下文缓冲池进行清理时,以上下文价值为依据决定是否将上下文剔除出缓存池。通过实验将RCRA和LRU对比从三个方面证明RCRA的命中率得到了很大提高。
With the rapid development of the information and computing technology, the computing mode is also undergoing profound reform. The computing model has gradually developed from the traditional distributed mobile computing to pervasive computing model. The essential characteristic of pervasive computing is the integration of physical space and information space, which provides transparent and ubiquitous services for people. In this thesis, we mainly concern on context-aware computing? an important branch of pervasive computing. Context-aware computing is crucial to the realization of pervasive computing.
     In the background of pervasive computing, this thesis firstly summarizes and analyzes the research satus of context-aware computing including context modeling methods, context reasoning, context storing and context-aware system framework.
     Then this thesis proposes an ontology context model based on RFID. The model uses hierarchical modeling method. Context ontologies are categorized by field and managed using unified format. The experimental results show that the model can rapidly build domain ontology for the context-aware system.
     On that basis, this thesis gives a RFID based context-aware service framework. It includes underlying communication environment layer, context-aware middleware layer and service layer. The function of each module in the framework and the relationships between modules are elaborated. Then two examples are given to illustrate the context model and service model further.
     Based on the analysis and research of the existing caching replacement algorithms under wireless environment, this thesis proposes a context caching replacement algorithm RCRA which is suitable for pervasive computing environment. In the algorithm, the value of the context is determined by its access probability, history access frequency and freshness. When new context is to be added into the cache or the cache is full, the algorithm removes context from the cache based on the value of the context. Finally, experiments are carried out to compare RCRA with LRU. The result shows that the RCRA improves the hit rate of the cache.
引文
[1]Mark W. The Computer for the twenty-first Century. Scientific American,1991, 265(3):94-104
    [2]徐光裕,史元春,谢伟凯.普适计算,计算机学报,2003,26(9):1042-1050
    [3]徐光裕,陶霖密,史元春,张翔.普适计算模式下的人机交互,计算机学报,2007,30(7):1041-1053
    [4]李蕊,李仁发.上下文感知计算及系统框架综述.计算机研究与发展,2007,44(2):269-276
    [5]Schilit B, Adams N, Want R. Context-aware computing applications. In: Proceedings of the Workshop on Mobile Computing Systems and Applications (WMCSA'94), Santa Cruz,CA,DEC,1994:85-90
    [6]Brown P J, Bovey J D, Chen X. Context-Aware Applications:from the Laboratory to the Marketplace. IEEE Personal Communications,1997,4(5):58-64
    [7]Anind K D, Gregory D A, Daniel S. A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction,2001,16(2-4):97-166
    [8]Dey A K, Saltier D, Abowd G D. A conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction (HCI),2001,16(2-4):97-166
    [9]Gwizdka J. What's in the context. CHI2000 Workshop,2000
    [10]Joyce H, Stephen S I. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. Proceedings of the SIGCHI conference on Human factors in computing systems, New York, USA,2005
    [11]Hung K P, Tao G, Wen W X, et al. Context-aware middleware for pervasive elderly homecare. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,2009,27(4):510-524
    [12]Matthias B, Schahram D, Florian R. A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing.2007,2(4):263-277
    [12]Hong J Y, Suh E H, Kim S J. Context-aware systems:A literature review and classification. Expert Systems with Applications,2009,36(4):8509-8522
    [13]Hwe-Mo K, Kyong-Ho L. Device-independent web browsing based on CC/PP and annotation. Interaction with Computers,2006,18(2):283-303
    [14]Henricksen K. Developing context-aware pervasive computing applications: Models and approach. Journal of Pervasive and Mobile Computing,2005,2(1): 37-64
    [15]Jong-yi H, Eui-ho S, Sung-Jin K. Context-aware systems:A literature review and classification. Expert Systems with Applications,2009,36(4):8509-8522
    [16]Gu T, Pung H K, Zhang D Q. A Service-Oriented Middleware for Building Context-Aware Services. Journal of Network and Computer Applications,2005, 28(1):1-18
    [17]Lee J Y, Seo D W, Rhee G. Visualization and interaction of pervasive services using context-aware augmented reality. Expert Systems with Applications,2008, 35(4):1873-1882
    [18]Lee Y, Kwon O. A index-based privacy preserving service trigger in context-aware computing environments. Expert Systems with Applications,2010, 37(7):5192-5200
    [19]Hong J, Suh E H, Kim J, et al. Context-aware system for proactive personalized service based on context history. Expert Systems with Applications,2009, 36(4):7448-7457
    [20]Garbinato B, Holzer A, Vessaz F. Context-aware broadcasting approaches in mobile ad hoc networks. Computer Networks,2010,54(7):1210-1228
    [21]Christos D, Nikos L, Michalis V. Context-aware media independent information server for optimized seamless handover procedures. Electronic Notes in Theoretical Computer Science,2006,146(1):101-116,
    [22]Sharat K, Jukka R. A context based storage system for mobile computing applications. Mobile Computing and Communications Review,2005,9(1):64-68
    [23]蒋发群,李锦涛,苏晓丽等.基于上下文感知的普适服务框架.计算机工程,2008,34(13):16-18
    [24]Graham K, Franklin R, Chris W, et al. Compsite Capability/Preference Profiles(CC/PP):Structure and Vocabularis 1.0 W3C Recommendation 15. http://www.w3.org/TR/CCPP-struct-vocab/. January 2004
    [25]Matsuyama K, Kraus M, Kitagawa K, Saito N. A path-based RDF query language for CC/PP and UAProf. Pervasive Computing and Communications Workshops,2004
    [26]Achilleas A, Kun Y, Nektarios G. Context modelling and a context-aware framework for pervasive service creation:A model-driven approach. Pervasive and Mobile Computing,2010,6(2):281-296
    [27]Kao T.H, Yuan S.M. Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT. Computer Standards & Interfaces,2004,26(5):377-399
    [28]Dan B, Miller L. FOAF Vocabulary Specification 0.91. Namespace Document 2 November 2007. http://www.xmlns.com/foaf/spec/20071002.html. November 20007
    [29]Zhou B, Wu C. Social Networking Interoperability through Extended FOAF Vocabulary and Service. Information Sciences and Interaction Sciences (ICIS), June 2010,50-55
    [30]Jamie B, Alisdair M, James I. FOAF:improving detected social network accuracy. In proceeding of the 12th ACM international conference adjunct papers on Ubiquitous computing, New York, USA,2010
    [31]中华人民共和国科学技术部等十五部委.中国射频识别(RFID)技术政策白皮书,2006,6
    [32]Yeh T C, Wang Y J, Kuo T C, et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications,2010, 37(12):7678-7683
    [33]Enabling Ubiquitous Sensing with RFID.Computer,2004,37(4):84-86
    [34]Lorraine S L, Kirk D F, Jeffery S S. Radio frequency indentification(RFID) implementation in the service sector:A customer-facing diffusion model. International Journal of Production Economics,2008,112(2):587-600
    [35]Jaekwan P, Bonghee H, Chaehoon B. A query index for continuous queries on RFID streaming data. Science in China Series F:Information Sciences,2008, 51(12):2047-2061
    [36]Lonsdale D, David W E, Ding Y H, et al. Reusing ontologies and language components for ontology generation. Data & Knowledge Engineering,2010, 69(4):318-330
    [37]Garshol L M. The Linear Topic Map Notation, Definition and introduction, version 1.3. http//www.ontopia.net/download/ltm.html.2006,6,17
    [38]Fensel D, V.Harmelen F, Horrocks I, et al. OIL:an ontology infrastructure for the Semantic Web. Intelligent Systems, IEEE.2001,16(2):38-45
    [39]M.Robert M. Inside the LOOM description classifier. ACM Special issue on implemented knowledge representation and reasoning systems,1991,2(3):88-92
    [40]OWL 2 Web Ontology Language Document Overview. http://www.w3.org/TR/owl2-overview/. W3C Recommendation, October 2009
    [41]Sean B, Frank V H, Jim H, et al. OWL Web Ontology Language Reference. http://www.w3.org/TR/owl-features/. W3C Recommendation 10, February 2004
    [42]Martin D, Burstein M, Hobbs J, et al. OWL-S:Semantic Markup for Web Services, http://www.ai.sri.com/daml/services/owl-s/1.2/overview/
    [43]Horrocks I, Boley H, Tabet S, et al. SWRL:A Semantic Web Rule Language Combining OWL and RuleML. http://www.daml.org/2004/11/fol/rules-all.Draft Version 0.7 of 2 November 2004
    [44]Antoniou G, Harmelen F V. Web Ontology Language:OWL. Information Systems, 2009,1:91-110
    [45]Horrocks I, Schneider P F, Harmelen F V. From SHIQ and RDF to OWL:the making of a Web Ontology Language. Web Semantics:Science, Services and Agents on the World Wide Web,2003,1(1):7-26
    [46]岳静,张自力.本体表示语言研究综述.计算机科学,2006,33(2):158-162
    [47]杜小勇,李曼,王珊.本体学习研究综述.软件学报,2006,17(9):1837-1847
    [48]Zimmermann L. EPC 2000-State of play nearly two years on. World Patent Information,2010,32(7-10):313-316
    [49]Context-aware Based RFID Privacy Control System and Personal Privacy Protection Method Using the Same. United States Patent Application,2009
    [50]王雪莉,卢才武,顾清华等.无线定位技术及其在地下矿山的应用.金属矿山,2009,4:121-125
    [51]Bettini C, Brdiczka O, Henricksen K, et al. A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing,2010,6(2):161-180
    [52]郑笛,贾焰,韩伟红等.普适计算环境下基于构件化中间件的上下文管理技术研究.计算机工程与科学,2008,30(5):106-109
    [53]于海波.基于规则和本体的应用安全策略研究:[博士学位论文].长春:吉林大学.2006
    [54]宋俊峰.面向语义Web的领域本体表示、推理、集成及其应用研究:[工学博士学位论文].长沙:国防科技大学.2006
    [55]周建新,张兴凯,刘晓宇等.非煤矿山安全标准化在安全生产中的地位和作用.金属矿山,2007,4:1-6
    [56]邓明,张国枢,陈蕴.一种新型的矿山安全监测系统网络互联的研究.金属矿山,2009,2:118-120
    [57]Natalya F N, Ray W F, Mark A M. The Knowledge Model of Protege-2000: Combining Interoperability and Flexibility. KNWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT METHODS, MODELS, AND TOOLS,2000, 1937/2000:69-82
    [58]Dickinson I. Jena Ontology API. http://jena.sourceforge.net/ontology/index.html. 2009,2,24
    [59]秦明军.精确灌溉及前景分析.东北水利水电,2009,27(295):38-41
    [60]张英才,于伟.触摸屏在设施农业灌溉施肥智能化中的应用.自动化与仪表,2009,24(8):49-52
    [61]SAFA H, ARTAIL H, NAHHAS M. A cache invalidation strategy for mobile networks. Journal of Network and Computer Applications,2010,22(2):168-182
    [62]ACHARYA S, ALONSO R, FRANKLIN M. Broadcast disks:Data Management for asymmetric communications environments. Proceedings of ACMSIGMOD Conf. Management of Data, May,1995:199-210
    [63]KHANNA S, LIBERATORE V. On broadcast disk paging. Journal of Computing, 2000,29(5):1683-1702
    [64]XU J, TANG X, LEE D L. Performance analysis of Location-Dependent cache invalidation schemes for mobile environment. IEEE Trans Knowledge and Data Engineering,2003,15(2):474-488
    [65]XU J, HU Q, Lee W C. Performance evaluation of an optimal cache replacement policy for Wireless data dissemination. IEEE Transactions on Knowledge and Data Engineering (TKDE),2004,16(1):125-139
    [66]ANANDARAJAH M, ROBINSON R. Caching Context information in pervasive systems. Proceedings of the 3rd international Middleware doctoral symposium. Melbourne, Australia,2006:20-27
    [67]Olston C, Loo BT, Widom J. Adaptive precision setting for cached approximate values. ACM SIGMOD Record,2001,30(2):355-366
    [68]Zheng B, Xu J, Lee D. Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments. IEEE Transactions on Computers,2002,51(10):1141-1153
    [69]林欣,李善平,杨朝晖,徐建.普适环境中面向推理的上下文缓存置换算法.计算机研究与发展,2009,46(4):549-557

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700