Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 936125, 19 pages
http://dx.doi.org/10.1155/2015/936125
Research Article

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

1Dipartimento di Ingegneria dell’Informazione, Ingegneria Elettrica e Matematica Applicata, Università degli Studi di Salerno, 84084 Fisciano, Italy
2Consorzio di Ricerca Sistemi ad Agenti, Università degli Studi di Salerno, 84084 Fisciano, Italy
3Dipartimento di Informatica, Università degli Studi di Salerno, 84084 Fisciano, Italy

Received 1 December 2013; Accepted 25 February 2014

Academic Editor: David Taniar

Copyright © 2015 Giuseppe D’Aniello et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. T. Watson, “U-commerce the ultimate,” ACM Ubiquitous Information Everywhere.
  2. A. Vasilakos and W. Pedrycz, Ambient Intelligence, Wireless Networking, and Ubiquitous Computing, Artech House, Norwood, Mass, USA, 2006.
  3. M. Gaeta, G. R. Mangione, F. Orciuoli, and S. Salerno, “Ambient e-Learning: a metacognitive approach,” Journal of Ambient Intelligence and Humanized Computing, vol. 4, no. 1, pp. 141–154, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Weiser, “The computer for the 21st century,” Scientific American, 1991, http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html. View at Google Scholar
  5. A. R. Prasad, P. Schoo, and H. Wang, “An evolutionary approach towards ubiquitous communications: a security perspective,” in Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops) (SAINT-W '04), p. 689, IEEE Computer Society, Washington, DC, USA, 2004.
  6. M. Napoli, M. Parente, and A. Peron, “Specification and verification of protocols with time constraints,” Electronic Notes in Theoretical Computer Science, vol. 99, pp. 205–227, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Palmieri, U. Fiore, and A. Castiglione, “Automatic security assessment for next generation wireless mobile networks,” Mobile Information Systems, vol. 7, no. 3, pp. 217–239, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Amato, V. Di Lecce, and V. Piuri, “A new graphical interface for web search engine,” in Proceedings of the IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems (VECIMS '07), pp. 42–46, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Keegan, G. M. P. O'Hare, and M. J. O'Grady, “Easishop: ambient intelligence assists everyday shopping,” Information Sciences, vol. 178, no. 3, pp. 588–611, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. S. La Torre, M. Napoli, M. Parente, and G. Parlato, “Verification of scope-dependent hierarchical state machines,” Information and Computation, vol. 206, no. 9-10, pp. 1161–1177, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. G. D'Aniello, M. Gaeta, V. Loia, F. Orciuoli, and S. Tomasiello, “A dialogue-based approach enhanced with situation awareness and reinforcement learning for ubiquitous access to linked data,” in Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS '14), pp. 249–256, 2014.
  12. A. Kofod-petersen and J. Cassens, “Explanations and context in ambient intelligent systems,” in Modeling and Using Context, vol. 4635 of Lecture Notes in Computer Science, pp. 303–316, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  13. K.-J. Lin, T. Yu, and C.-Y. Shih, “The design of a personal and intelligent pervasive-commerce system architecture,” in Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS '05), pp. 163–173, IEEE Computer Society, Munich, Germany, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Pan, L. Zhang, Z. Wu et al., “Pervasive service bus: smart SOA infrastructure for ambient intelligence,” IEEE Intelligent Systems, vol. 29, no. 4, pp. 52–60, 2014. View at Publisher · View at Google Scholar
  15. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar
  16. H. Turner, J. White, B. Dougherty, and D. Schmidt, “Building mobile sensor networks using smartphones and web services: ramifications and development challenges,” Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, pp. 502–521, 2011. View at Google Scholar
  17. G. Chavira, S. W. Nava, R. Hervás et al., “Services through nfc technology in ami environment,” in Proceedings of the 10th International Conference on Information Integration and Web-Based Applications and Services (iiWAS '08), pp. 666–669, ACM, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. Ecma International, Near Field Communication Interface and Protocol (NFCIP-1), ECMA-340, Rev. 2, Ecma International, 2006.
  19. ECMA, “Near field communication interface and protocol-2 (NFCIP-1),” Ecma International Standard ECMA-352, Rev. 1, 2003. View at Google Scholar
  20. NFC Data Exchange Format (NDEF), “NFC forum technical specification,” Rev. 1.0, NDEF, 2006. View at Google Scholar
  21. R. Want, “Near field communication,” IEEE Pervasive Computing, vol. 10, no. 3, pp. 4–7, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. V. Issarny, N. Georgantas, and S. B. Mokhtar, “Networking semantic services for pervasive computing,” ERCIM News, no. 67, pp. 36–37, 2006. View at Google Scholar
  23. M. Hepp, “Goodrelations: an ontology for describing products and services offers on the web,” in Knowledge Engineering: Practice and Patterns: 16th International Conference (EKAW '08), Acitrezza, Italy, September 29–October 2, 2008, vol. 5268 of Lecture Notes in Computer Science, pp. 329–346, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  24. M. Gaeta, F. Orciuoli, P. Ritrovato, G. D'Aniello, and A. De Vivo, “A collective knowledge system for business partner co-operation,” in Proceedings of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS '13), pp. 757–762, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. K. Anyanwu, H. Kim, and P. Ravindra, “Algebraic optimization for processing graph pattern queries in the cloud,” IEEE Internet Computing, vol. 17, no. 2, pp. 52–61, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Biancalana, F. Gasparetti, A. Micarelli, and G. Sansonetti, “An approach to social recommendation for context-aware mobile services,” ACM Transactions on Intelligent Systems and Technology, vol. 4, no. 1, article 10, 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. D. Zeng, S. Guo, Z. Cheng, and A. T. Pham, “IF-THEN in the internet of things,” in Proceedings of the 3rd International Conference on Awareness Science and Technology (iCAST '11), pp. 503–507, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. G. D'Aniello, F. Orciuoli, M. Parente, and A. Vitiello, “Enhancing an AmI-based framework for U-commerce by applying memetic algorithms to plan shopping,” in Proceedings of the 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS ’14), pp. 169–175, 2014.
  29. A. Wojciechowski and J. Musial, “Towards optimal multi-item shopping basket management: heuristic approach,” in On the Move to Meaningful Internet Systems: OTM 2010 Workshops: Proceedings of the International Conference on On the Move to Meaningful Internet Systems (OTM '10), Hersonissos, Greece, October 25–29, 2010, vol. 6428 of Lecture Notes in Computer Science, pp. 349–357, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  30. J. Blazewicz, M. Kovalyov, J. Musial, A. Urbanski, and A. Wojciechowski, “Internet shopping optimization problem,” International Journal of Applied Mathematics and Computer Science, vol. 20, no. 2, pp. 385–390, 2010. View at Publisher · View at Google Scholar
  31. I. De Falco, A. D. Cioppa, and E. Tarantino, “Mutation-based genetic algorithm: performance evaluation,” Applied Soft Computing, vol. 1, no. 4, pp. 285–299, 2002. View at Google Scholar
  32. K. Sugihara, “Measures for performance evaluation of genetic algorithms (extended abstract),” in Proceedings of the 3rd Joint Conference on Information Sciences (JCIS '97), pp. 172–175, 1997.
  33. European Payments Council, “Epc white paper on mobile payments,” Tech. Rep. 1, European Payments Council, Brussels, Belgium, 2010. View at Google Scholar