Ubiquitous Computing-Approach to Intelligence Building
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Ubiquitous computing (often abbreviated to “ubicomp”) refers to a new genre of computing in which the computer completely permeates the life of the user. In ubiquitous computing, computers become a helpful but invisible force, assisting the user in meeting his or her needs without etting in the way. The Industrial- rganizational Psychologist on website (http://www.ubiq.com/hypertext/weiser/UbiH ome.html), Xerox PARC’s Mark Weiser, the originator of the term “ubiquitous computing,” described it this way: “… [Ubiquitous computing] highest idea one is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it.”
Authors and Affiliations
R. N. Khobragade , S. N. Sawalkar
A New Method for Finding an Optimal Solution for Transportation Problems
In this paper a new method named ASM-Method is proposed for finding an optimal solution for a wide range of transportation problems, directly. A numerical illustration is established and the optimality of the result yiel...
Optimization of Association Rule Mining through Genetic Algorithm
Strong rule generation is an important area of data mining. In this paper we design a novel method for generation of strong rule. In which a general Apriori algorithm is used to generate the rules after that we use the o...
Building Classification System to Predict Risk factors of Diabetic Retinopathy Using Text mining
This Making medical decisions such as diagnosing the diseases that cause a patient’s illness is often a complex task. The Diabetic retinopathy is one of the complications of iabetes and Diabetic retinopathy is one of th...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern Mining
The sequential pattern mining generates the sequential patterns. It can be used as the input of another program for retrieving the information from the large collection of data. It requires a large amount of memory as we...
HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION
In Computer Communications, collecting and storing characteristics about connections into a data set is needed to analyze its behaviour. Generally this data set is multidimensional and larger in size. When this data set...