Paper Menu >>
Journal Menu >>
Wireless Sensor Network, 2010, 2, 74-84 doi:10.4236/wsn.2010.21011 anuary 2010 (http://www.SciRP.org/journal/wsn/). Copyright © 2010 SciRes. WSN Published Online J Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace Yichao JIN1, Ruchuan WANG 1,2,3, Haiping HUANG1, Lijuan SUN 1,3 1College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China 2State Key Laboratory of Information Security, Graduate School of Ch inese Academy of Sciences, Beijing, China 3Institute of Computer Technology, Nanjing University of Posts and Telecommunications, Nanjing, China Email: tcjyc@yahoo.cn, {wangrc, hhp, sunlj}@njupt.edu.cn Received September 3, 2009; revised Septe mber 23, 2009; accepted September 24, 2009 Abstract Agent-oriented approach is increasingly showing its magic power in a diversity of fields, specifically, ubiq- uitous computing and smart environment. Meanwhile, it is considered the next creative issue is to intercon- nect and integrate isolated smart spaces in real world together into a higher level space known as a hyper- space. In this paper, an agent-oriented architecture, which involves the techniques of mobile agents, middle- ware, and embedded artificial intelligence, is proposed. Detailed implementations describe our efforts on the design of terminal device, user interface, agents, and AI computing module to combine two single smart spaces, UbiLab and UbiDorm, into a practical smart hyperspace. Keywords: Agent-Oriented, Ubiquitous Computing, Smart Hyperspace, Middleware, Embedded Artificial Intelligence 1. Introduction The progressive advances in computer system together with the simultaneous improvement in Wireless Sensor Networks (WSNs) [1] and other related fields, contribute to the ubiquitous c omputing era, when our p hy si cal space will be filled with different kinds of smart devices, which possess the capability of computing and communication. At the same time, pervasive network, which are formed by ubiquitous devices interconnected with each other through wireless communications, internet and other medium, supply services and useful information to us instantly and constantly? Thus, Mark Weiser’s ubiqui- tous computing, “services can be provided to users any- time and anywhere with any devices” [2], which was first propounded in 1991, is approaching. And we name this kind of physical space as smart environment, where the knowledge about its users and the surroundings could all be acquired and applied based on the ubiquitous computing, in order to adapt to users and meet the goals of convenience and efficiency. However, the tendency that a variety of smart devices such as laptops, handhold PDAs, tiny sensor nodes etc. are becoming common facilities in people’s daily life, not only offers us with the fundamental platforms, but also raises issues on how to take advantage of these het- erogeneous devices to realize ubiquitous computing. Be- sides, in order to deploy such smart environment, context, which is defined as “any information that can be used to characterize the situation of entities (i.e. whether a per- son, place or object) that are considered relevant to the interaction between a user and an application, including the user and applications themselves” [3], is of para- mount importance. Meanwhile, with the emergence of a number of context-aware systems and smart environment projects, the increasing natural demand on interconnect- ing and integrating isolated smart spaces in real world together into a higher level space known as a hyperspace, also raises essential difficulties on how to implement context-aware systems in large-scale intelligent envi- ronment and how to expand context-awareness to dy- namic, open systems. As a feasible solution to those problems, agent-ori- ented approach provides our research with the key fea- ture of autonomy, collaboration and especially intelli- gence. Furthermore, a novel architecture with multi- agents to realize a smart hyperspace (including two sin- gle physical intelligent environments, UbiLab and Ubi- Dorm) is adopted by us. The rest of this paper is organized as follows. Section Y. C. JIN ET AL. 75 2 contains relevant researches on the fields of ubiquitous computing, smart environment and agent-based approac- hes. Section 3 explains the overview of our paradigm’s framework and two essential components, namely, mid- dleware and AI computing model. Section 4 details the design and implementation of our experimental smart hyperspace. Section 5 discusses the results and the analysis of this work. And finally the conclusion and future works are given in Section 6. 2. Related Works 2.1. Ubiquitous Computing Industries as well as academia have advanced lots of ub- iquitous projects, over the last two decades. SAFE-RD [4], MARKS [5 ] and ETS [6 ] characterize the works car- ried out by M. Sharmin, S. Ahmed, and S. I. Ahamed in the field of ubiquitous computing, in which security, ad a- ptability, efficiency, middleware, resource discovery and self-healing are mainly investigated. MIT’s Oxygen pro- ject [7], Carnegie Mellon University’s Aura project [8], UC. Berkeley’s Endeavour Project [9] also devote their efforts to a number of different aspects in realizing ubiq- uitous computing (i.e. large-scale computing, QoS, task scheduling, context awareness) in some particular condit- ions, significantly accelerating the growth of smart spaces. 2.2. Smart Environment So far, in spite of no existing explicit definition of what smart environment exactly is, massive endeavors towards proposing such prototypes are already ongoing. Accord- ing to Mark Weiser, smart environment is “a physical world that is richly and invisibly interwoven with sen sors, actuators, displays, and computational elements, embed- ded seamlessly in the everyday objects of our lives, and connected through a continuous network” [10]. The Aw- are Home Research Initiative at Georgia Tech, which is viewed as one of the first living laboratories, aimed at multidisciplinary exploration of emerging technologies and services based in smart home [11]. Another relevant research launched by The University of Texas at Arling- ton which was known as MavH ome (Manag ing an Ad ap- tive Versatile Home) project, focus on the creation of an intelligent and versatile home environment with state-of- the-art algorithms and protocols used to provide a cus- tomized, personal environment to the users of this space [12]. Besides, the increased interests of industrial labs in constructing smart environments are evidenced by Micr- osoft’s Easy Living project [13], IBM’s BlueEyes project [14], and the Speakeasy project at Xerox PARC [15], etc. 2.3. Agent-Oriented Solution An agent is a software entity that has some properties of a human such as autonomy, reasoning, learning, and knowledge level communication, etc. [16]. Agent-ori- ented approach, which is highly expected to play a vital role in achieving smart space in high level, has already expressed energetic effects on ubiquitous computing and smart environments in numerous applications. Essex’s iDorm project targets to realize the vision of ambient intelligence in health care environments by combining the use of unobtrusive sensors and effectors with intelli- gent embedded-agents [17]. A novel type-2 fuzzy sys- tems based adaptive architecture for agents embedded in ambient intelligent environments, a hierarchical fuzzy genetic multi-agent architecture for building learning mechanism, together with another novel life-long learn- ing approach based on intelligent agents are addressed by Essex’s group in [18–20], respectively. Other Contem- porary researches also cover the following areas: using a neural networks agent based approach to recognize dif- ferent high level activities [21], systematic and useful methodology to develop agent-based system [22], intel- ligent agents involving case-based reasoning (CBR) and Bayesian Network [23] etc. Based on these aforementioned technologies and theo- ries, a foundation for our work had been laid. However, dissimilar with the related projects, we introduce the mobile agent to our intelligent hyperspace, in which im- proved operation efficiency, minimal manual interaction, seamless context exchange between multiple smart spaces, optimal control strategy for a large and dynamic environment are all ensured by us. 3. Framework 3.1. System Architecture Figure 1 shows the configuration of our experimental smart hyperspace, which involves the UbiLab and Ubi- Dorm. We select laboratory and dormitory to build our prototype, because they are the most common places a researcher’s daily activities may cover. In our research, both of them are furnished with many various devices ranging from small ones like RFID and embedded nodes suited wireless sensor networks (WSNs), to middle ones such as PDAs, mobile phones and gateway, and to large ones represented by laptops and PCs. These either mo- bile or immobile devices are distributed over their local physical space, constituting a smart network, which is capable of obtaining context, computing, and providing services to users. These two physical separate spaces co- nnect with each other by telecommunication net such as GPRS and GSM, Internet, etc. So they can be regarded as the conceptual smart large environment as a whole. C opyright © 2010 SciRes. WSN Y. C. JIN ET AL. Copyright © 2010 SciRes. WSN 76 Figure 1. Smart hyperspac e configuration. Figure 2. Agent-based architecture for smart hyperspace. As depicted in Figure 2, the architecture for smart hyperspace is a hierarchy of rational agents, which are able to accomplish their specific tasks to meet the overall goal, and a set of concrete functional layers, which co- operate to realize our system. The following details the interpretation of each layer. a) Device Layer (DL): The Device Layer contains the very basic hardware including daily appliances (i.e. fan, light, alarm, etc.), wireless sensor nodes, network hard- ware such as gateway, and user interface devices involv- ing PCs, PDAs, and mobile phones. This layer takes charge of gathering context directly from surroundings through sensors installed in tiny wireless nodes or from user interface devices and other sources, controlling ap- pliances according to the upper layer’s commands, ex- changing physical bytes throughout heterogeneous net- works. b) Logical Interface Layer (LIL): The main task of this Layer, whose crucial part is middleware, is formatting and extracting the data either from the lower layer, DL, or the higher layer, LCM. It is also responsible for man- aging some necessary information between the agents and users. c) Local Context Management Layer (LCM): This layer takes the responsibility of gathering, storing, and generating useful knowledge to make our experimental prototype operating as a smart entity. Besides, its duties also consist of integrating both contextual information and the message came from Space Interconnection Layer, mining data, making proper decisions, and coordinating the tasks allocated to different agents. In particular, a database and a computing module with sufficient artifi- cial intelligence play the most important role in this layer. d) Space Interconnection Layer (SIL): In order to re- alize a hyperspace, we lay this layer in the top of our hierarchical framework. Internet, GSM, and some other widespread nets provide basic platforms to this layer. Y. C. JIN ET AL. 77 Due to its existence, it is possible to build up the effec- tive and efficient links between two physical separate spaces (or further, among more than two spaces). 3.2. Middleware Figure 3 shows the architecture of DisWare developed by us [24]. This mobile agent-based middleware, which chiefly contains interface for instructions, agent man- agement module, system management module, and in- terface for network communication, mediates between mobile agents and OS layer (and device layer). It sepa- rates applications from the specific design of system. Consequently, the flexibility and availability of the whole system are greatly improved. There are four major parts com po si ng our Dis Wa re. a) Instructions Interface (II): This interface provides the instruction set for mobile agent, so that we could re- alize different types of agents by simply modifying the particular code of agent. b) Agent Management (AM): Agent Resource Man- agement, Agent Transfer Control, and Execution Man- agement constitute the Agent Management module. This module views agent as a certain class, management of agent’s resource, dispatch and retraction of agent, man- agement of execution queue etc. as functions in this class. Some characteristics such as modular, encapsulation etc., which exist in object-oriented programming, are also emphasized here to benefit the design of agent. c) System Management (SM): This System Manage- ment comprises Network Management, Device Man- agement, and Memory Management. Information man- Figure 3. Architecture of DisWare. Figure 4. The construction of DisWare agent. agement of neighbor related with nodes and sensors, al- location of both local and remote memory are involved in this module. d) Network Communication Interface (NCI): This in- terface takes charge of the contact with OS layer, device layer and SM. The differences among heterogeneous operating systems (we choose TinyOS and MantisOS for WSNs, WinCE for PDA and smart phone, and WinXP for PCs in our DisWare) are eliminated thanks to this interface as well. As a result, System Management mod- ule could call some corresponding functions directly to configure the wired or wi r el ess commu ni c at ion. 3.3. Mobile Agent Mobile agents are programs that can migrate from host to host in a network, at times and to places of their own choosing. The state of the running program is saved, transported to the new host, and restored, allowing the program to continue where it left off [25]. To meet this requirement, our DisWare agent pos- sesses these three components: static code, context stor- age, and state management as demonstrated in Figure 4. Our DisWare agent runs static code which contains some static functions to fulfill the particular missions. The code size is usually much smaller than data size in mo- bile agent. Context storage takes charge of storing all kinds of useful context information including sensor data gathered from physical environment, agent ID, program counter, operation pointer and the address of different kinds of static codes etc. Recording the agent’s state (running states, migration states etc.) is achieved by state management. 3.4. Embedded Artificial Intelligence Automation was initially targeted as soon as the concept of pervasive computing and smart spaces first came into our view. It is widely accepted that the development of artificial intelligence (AI) is the k ey so lution to th is pro b- lem. In our research, we combine the benefits of diverse AI algorithms into our UbiLab and UbiDorm environ- ment. Owing to the DisWare, real-time context gained by hardware devices can be easily obtained by agents. Be- C opyright © 2010 SciRes. WSN Y. C. JIN ET AL. 78 sides the communication between different agents be- come convenient, and other functions like sensor recon- figuration, dynamic reprogramming, and remote task assignment which are difficult to achieve by some tradi- tional methods are all available. Based on these advan- tages, we import a data mining module to clarify the useful information from historical records, and a fuzzy module [20] to fuzz the real-time context to reduce the computing complexity. The neural network [21], which has the ability of learning, adapting, predicting, making suitable decisions, is considered as the essential part in AI module, and genetic algorithm [19] is used to tun e the neural networks. A rule management is set here to store both the general knowledge and the correct rules. Even- tually, a fault tolerance module filters the actions gener- ated by the Decision Module. And then the behaviors which are carried out finally, feed back to the History Module. Figure 5 illustrates how these components col- laborate with each other to improve the overall perform- ance in our smart hyperspace. The fuzzy module extracts information by categoriz- ing the real-time context into a set of fuzzy membership functions, so that a simple but effective approach is formed to build models at a certain level of information granularity. Once the agent has extracted the member- ship functions and the set of rules from the user input data, the fuzzy module has learnt how to fuzz those con- texts. The sample rule is as follows: IF Temperature is X1(It) and Light is X2(Il) and Humidity is X3(Ih) THEN O is Y(CF). (1) Where X1, X2, X3 are conditions of fuzzy logic member- ships function. It, Il, Ih, are the sense data, representing the exact values of temperature, light and humidity re- spectively. Y is the fuzzy output, and CF is the confi- dence factor attached to consequent part of this rule. Our neural network is a multi-input multi-output con- nection ist feed forwar d architecture with two hidd en lay- ers. The conditions about surroundings, current time, and the state of various kinds of home appliances are all con- sidered as inputs, while the outputs are the related com- mands taking charge of controlling corresponding effec- tors. As soon as the users change the context, the neural network is triggered to enter a new training. Iterations of each training are set at 2000. And the genetic algorithm’s experimental setup is as follows: Probability of crossovers: 90%; Probability of muta- tion: 0.1%; Population: 20; Generation: 2000. Fitness function: Fitness = 2 [] n desiredoutputactual output (2) Where n represents the total amount of outputs. 4. Implementation 4.1. Terminal Device To implement our experimental smart hyperspace, de- signing terminal devices, which have the first contact with users or surroundings, are expected as the primary step. Figure 6(a) exhibits the UbiCell node with a sen- sor board installed on it, which was designed by us be- fore especially for such applications to perceive humid- ity, temperature, and luminance information at one time. Figure 6(b) displays the UbiDot node equipped with pulse, body temperature and blood oxygen sensors. Similarly, it can acquire all the three types of physio- logical information simultaneously [26]. Figure 6(c) expresses the gateway, whose mission is exchanging messages throughout wireless sensor networks, GSM/ GPRS, and Internet. The wireless multimedia sensor node used to capture sound and images is described in Figure 6(d). Figure 5. Hybrid AI te chniques into smart hyper space. Figure 6. Various terminal devices. Copyright © 2010 SciRes. WSN Y. C. JIN ET AL. 79 Figure 7. Snapshots of GUI in various devices. Figure 8. The architecture of DisWare agent. 4.2. User Interface In our smart hyperspace, services should be supplied to users conveniently through efficient interfaces on the human interaction devices. Hence, graphical user inter- faces (GUIs) are designed to hit this target. Figure 7(a) presents the GUI of real-time monitor on temperature, humidity and luminance [27] in PC. Their values would be updated periodically according to the information the agents transmits, so the changes could be identified viv- idly. Unlike the PC, even a notebook PC device, devoid of mobility is no longer th e problem of some PDA based or smart phone based solutions. Figure 7(b) indicates the mobile phone wireless application interface. Figure 7(c) shows the initial welcome screen with five choices, while one instance of history query interface is portrayed by Figure 7(d). In our experiment, the GUIs in PC are achieved using Visual C# in Visual Studio 2005. And the GUIs in PDA or smart phone are implemented in win- dows CE.net framework 2.0. 4.3. Design of Agent The programming framework and strategies involved in JACK Intelligent Agent [28] are consulted here in order to carry out the agent-based solution. The advantages of BDI [28] and feedback structure are mixed with each other in the agent based on our DisWare, which could also be called as DisWare agent. Hence, DisWare agent could perform either some event-driven reactions or aim-oriented processes on its initiative. In detailed im- plementation, we compile our DisWare agent language code into pure nesC (a programming language for deeply networked systems), and calls the nesC compiler to gen- erate executions for the nodes in wireless sensor net- works. And we use C# language to realize the same function in PCs, PDAs or smart phones. Figure 8 de- scribes the components of our DisWare agent [24]. 4.4. Learning Phase In our work, the learning is achieved through interaction with the actual environment. During the learning phase, every request offered by users, together with the corre- sponding environment states and other related informa- tion captured by the mobile agents will be viewed as an input sample. And whenever the request is received, this neural network with the assistance of other AI techniques discussed before, are trained based on the new sample set. In our implementation, the summation of samples is no more than 2000 due to the limitation of computational resource. Case there are already 2000 samples, which are stored in our system, when the new sample is added, the earliest sample would be deleted from the database si- multaneously. Thus, an in cremental and lifelong learning phase is formed. 4.5. Experimental Scenario All of the components mentioned above are involved in our experimental test bed, the UbiLab workplace envi- ronment as shown in Figure 9(a) and the UbiDorm as represented in Figure 9(b) and Figure 9(c). Custom power line control automates all the lights, fans, air- conditioner, and other appliances such as fire alarm, hu- midifier, etc. Perception of light, humidity, and tempera- ture, smoke, motion, and switch settings is performed through wireless sensor networks or wireless multimedia sensor networks. Identity check-up was accomplished b y RFID techniques and motion sensors as soon as the users entered either UbiLab or UbiDorm, not only to prevent illegal persons from our smart hyperspace, but also to record the context about when the every single valid user reached there and how many authorized experimenters in C opyright © 2010 SciRes. WSN Y. C. JIN ET AL. Copyright © 2010 SciRes. WSN 80 the UbiLab in any specific time etc. The security of our smart hyperspace is also insured by the smoke sensors and the fire alarm. A gateway fulfills the target of inter- connection among isolated physical spaces. And Figure 9(d) demonstrates a base node also can integrate the in- formation, and communicate with PCs and other terminal devices. Figure 10 and Figure 11 show both the sensor layout and the actuator layout in UbiLab and UbiDorm, where six kinds of sensors or devices, three sorts of physio- logical sensors, and a variety of effectors are involved. Some UbiCell nodes are pre-installed to monitor the en- vironment, while others, which are connected with ef- fectors, take charge of controlling them. DisWare is in- stalled in every single terminal device in order to manage mobile agents. Volunteers in UbiDorm are additional required to wear the UbiDot node to sensor the physio- logical index. Figure 9. The UbiLab and UbiDorm. Figure 10. The UbiLab layout. Figure 11. The UbiDorm layout. Y. C. JIN ET AL. 81 Figure 12. The precision on test set against experimental time. Finally, as an illustration of techniques used in our re- search, a continuous evaluation on this prototype system, which lasted three weeks, has been conducted by us. During this period, volunteers who didn’t take part in the development of our system executed their daily work in our UbiLab in the daytime, and one of them occupied the UbiDorm in the night time. Both the lights, fans, others effectors in laboratory and the home appliance such as air-conditioner were the pre-configured instruments, which could be operated by users in accordance with their own feeling via the interface we designed in all kinds of devices. For instance, when the user felt hot, he would probab ly turn on the air-cond itioner. To achieve a higher level goal, the condition that the user certainly wanted to enter his cool dorm during harsh summer, is under consideration too. So he could turn on the Ubi- Dorm’s air-conditioner when he was about to leave for UbiDorm a few minutes later, but still stayed in UbiLab. A more complex situation would be as follow, if the us er felt nervous partly because of the high temperature and low level of humidity, consequently, his pulse would become higher than usual. At this time, the user would turn on the air-conditioner and humidifier, and be likely to enjoy some bright music. Subsequently, after the ini- tial monitor phase, our system would try to predict user’s action based on the trained embedded artificial intelligent module, and then automate corresponding actuators. Meantime, for users, they were hardly aware of the cycle that new introduced samples brought modification and adaptation to our system every now and then. 5. Results and Analysis Each day in this experimental period, we estimated the performance of this system twice per day (at 9:00AM and 9:00PM), which used our agent-based solution, by inputting 30 simulated data (not including multimedia information), and then identified whether the outputs are correct by human. Meanwhile, in order to prove the availability of learning mechanism using h ybrid AI tech- niques, we disable only Fuzzy Module, only Genetic Algorithm, both Fuzzy Module and Genetic Algorithm, respectively, under the same samples. Figure 12 summarizes the experiment’s consequence. The Y-value in Figure 12 presents the quotient which was obtained by the number of outputs match the simu- lative environmental con dition to user’s demand dividing by the sum of input data, while the X-value illustrates the experiment time. It is obvious that because of insufficient samples, the first three days’ (that is, the initial monitor phase’s) execution seems not so ideal. However, with the increment of samples, the precision grows. Besides, Fig- ure 12 also addresses that the AI computing module without Fuzzy module act a little inferior to that of hy- brid AI. And if there’s no Genetic Algorithm adding in- telligence to our system, there are no apparent relation- ships between the amount of samples and its precision, under what condition, the prototype performed much worse. In addition, we also established the solution with no fuzzy module under the same situation, and then we C opyright © 2010 SciRes. WSN Y. C. JIN ET AL. 82 Figure 13. The received packets against experimental time. Figure 14. The number of manual interaction with our system. compared our system with that by counting the overall received packets in every 12 hours. Figure 13 clarifies the result of this comparison. Obviously, the non-fuzzy solution’s overload is much higher than that of our full functional system. And during our experimental time both solutions perform stably in the every certain inter- val. Furthermore, the number of manual interaction with our proposed system was recorded by us each day. Ow- ing to the existence of the predicting and decision mod- ule, the interactions were reduced apparently according to Figure 14. 6. Conclusions and Future Work In this paper, we have proposed an agent-oriented archi- tecture for ubiquitous computing, as well as an actual paradigm of smart hyperspace based on this novel struc- ture, which is context-aware, capable of monitoring and providing automation to researchers. It is proved that this novel architecture involving DisWare, AI computing module, multi-agents, a diversity of terminal devices and user interfaces can be put together harmoniously and successfully into practice. And the results also address our propounded hybrid AI techniques perform availably, Copyright © 2010 SciRes. WSN Y. C. JIN ET AL. 83 effectively and efficiently. Our future work experimental program includes the plans about adding more physical spaces which can cover almost each aspect of a person’s daily activities such as classroom and car to our paradigm under this architecture. In addition, we also aim to extend the types of both sensors and actuators to complete a full func- tional smart hyperspace, which really acts a unique test bed for relevant further researches, and provides poten- tial value to commercial activities. 7. Acknowledgements We are grateful that the subject is sponsored by the Na- tional Natural Science Foundation of P.R. China (No. 60773041), the Natural Science Foundation of Jiangsu Province(BK2008451), National 863 High Technology Research Program of P.R. China (No. 2006AA01Z219), High Technology Research Pro gram of Nanjing City (N o. 2007RZ106, 2007RZ127), Foundation of National La- boratory for Modern Communications (No. 9140C11050 40805), Jiangsu Provincial Research Program on Natural Science for Higher Education Institutions (No. 07KJB 520083) and Special Fund for Software Technology of Jiangsu Province. Postdoctoral Foundation of Jiangsu Province(0801019C), Science & Technology Innovation Fund for higher education institutions of Jiangsu Prov- ince(CX08B-085Z、CX08B-086Z ), and the six kinds of Top Talent of Jiangsu Province. 8. References [1] F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Networks (Elsevier), Vol. 38–4, pp. 393–422, 2002. [2] M. Weise, “The compute r for the 21st century,” Scientific American, pp. 94–104, September 1991. [3] A. K. Dey, D. Salber, and G. D. Abowd, “A conceptual framework and a toolkit for supporting the rapid proto- typing of context-aware applications,” Human-Computer Interaction, Vol. 16, No. 2–4, pp. 97–166, 2001. [4] M. Sharmin, S. Ahmed, and S. I. Ahamed, “SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments,” IEEE international Conference on Information Technology (ITCC 2005), Las Vegas, NV, pp. 271–276, April 2005. [5] M. Sharmin, S. Ahmed, and S. I. Ahamed. “MARKS (middleware adaptability for resource discovery, knowl- edge usability and self-healing) for mobile devices of pervasive computing environments,” In Proceedings of the Third International Conference on Information Tech- nology: New Generations (ITNG 2006), Las Vegas, Ne- vada, April 2006. [6] S. Ahmed, M. Sharmin, and S. I. Ahamed. “ETS (effi- cient, transparent, and secured) self-healing service for pervasive computing applications,” International Journal of Network Security, Vol. 4, pp. 271–281, 2007. [7] The Oxygen Project, http://oxygen.lcs.mit.edu/overvview. html. [8] Project Aura, http://www.cs.cmu.edu/~aura/. [9] The Endeavour Project, http://endeavour.cs.berkeley.edu/. [10] C. Diane and D. Sajal, “Smart environments: Technology, protocols and applications,” Wiley-Interscience, ISBN 0-471-54448-5, 2004. [11] Essa, “Ubiquitous sensing for smart and aware environ- ments: Technologies towards the building of an aware home,” Position Paper for the DARPA/NSF/NIST Work- shop on Smart Environments, July 1999. [12] S. K. Das and D. J. Cook, “Designing smart home envi- ronments: A paradigm based on learning and prediction,” In: Mobile, Wireless, and Sensor Networks: Technology, Applications and Future Directions (Eds. R. Shorey, et al.), Chapter 13, pp. 337–356, John Wiley, 2006. [13] The Easy Livi ng Project, http://research.microsoft.com/ easyliving/. [14] The BlueEyes Project, http://www.almaden.ibm.com/cs/ BlueEyes/. [15] W. K. Edwards, M. Newman, and J. Z. Sedivy, “The case for recombinant networking,” Xerox PARC Technical Report, 2001. [16] M. Wooldridge, “Agent-based computing,” Interoperable Comm. Networks, Vol. 1, No. 1, pp. 71–97, 1998. [17] H. Hagras, V. Callaghan, M. Colley, G. Clarke, A. Pounds-Cornish, and H. Duman, “Creating an ambi- ent-intelligence environment using embedded agents,” IEEE Intelligent Systems, Vol. 19, pp. 12–20, 2004. [18] F. Doctor, H. Hagras, and V. Callaghan, “A fuzzy em- bedded agent-based approach for realizing ambient intel- ligence in intelligent inhabited environments,” IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 35, No. 1, pp. 55–65, 2005. [19] H. Hagras, et al., “A hierarchical fuzzy genetic multi-agent architecture for intelligent buildings learning, adaptation and control,” International Journal of Informa- tion Sciences, Vol. 150, pp. 33-54, March 2003. [20] H. Hagras, F. Doctor, V. Callaghan, and A. Lopez, “An incremental adaptive life long learning approach for type-2 fuzzy embedded agent in ambient intelligent envi- ronments,” IEEE Transactions on Fuzzy Systems, Vol. 15, No. 1, pp. 41–55, 2007. [21] F. R. Illingworth, V. Callaghan, and H. Hagras, “A neural network agent based approach to activity detection in AmI environments,” In Proceedings of IEEE Interna- tional Workshop on Intelligent Environments (IE05), 2005. [22] S. Lee and T. Kim, “Generic engineering approach for agent-based system development,” In Proceedings of MATA 2002, LNCS, Vol. 2521, pp. 58–71, 2002. C opyright © 2010 SciRes. WSN Y. C. JIN ET AL. Copyright © 2010 SciRes. WSN 84 [23] N. Kushwaha, M. Kim, D. Y. Kim, and W. D. Cho, “An intelligent agent for ubiquitous computing environments: smart home UT-AGENT,” In Proceedings of IEEE Workshop on Software Technologies for Future Embed- ded and Ubiquitous Systems, pp.157–159, 2004. [24] W. F. Li, “Research on agent-oriented middleware key technologies of wireless sensor networks,” Ph.D. disser- tation, Nanjing University of Posts and Telecommunica- tions, pp. 113–139, 2008. [25] D. Kotz and R. Gray, “Mobile agents and the future of the internet,” ACM SIGOPS Operating Systems Review, Vol. 33, No. 3, pp. 7–13, July 1999. [26] The UbiCell, UbiDot, http://www.wsns.net.cn/. [27] R. C. Wang, L. J. Sun, et al., “Mobile agent-based wire- less sensor network middleware,” Technical Report for National 863 High Technology Research Program of China, pp.188–249, December 2008. [28] JACK Intelligent Agents, http://www.agent-software. com/. |