SlideShare a Scribd company logo
1 of 25
CONTEXT - AWARE
2017 / 5 / 10
isapanah.com
@sadra_amlashi
@Amlashi
Sadra
Isapanah Amlashi
1st GENERATION OF
COMPUTING
Some engineering needed to work with just one computer
2nd GENERATION OF COMPUTING
Every person has his/her own personal computer
3rd GENERATION OF COMPUTING
Every person has access to various devices
in 3rd generation we believe:
Instead of we drowned in the virtual world,
computers came to our real lives!
we call 3rd generation
Ubiquitous computing
( or Ubicomp )
Computing anytime at anywhere
Context
The word context is derived from the Latin “contextus”,
which means
“connection of words, coherence,”
and from contexere “to weave together.”
The interrelated conditions in which something exists or
occurs : environment, setting
merriam-webster
Context (in papers)
Schilit and Theimer (1994) refer to context as location, identities of nearby people
and objects, and changes to those objects.
In a similar definition, Brown et al. (1997) define context as location, identities of the
people around the user, the time of day, season, temperature, etc
Dey (1998) enumerated context as the user’s emotional state, focus of attention,
location and orientation, date and time, and objects and people in the user’s
environment.
Context
Context is any information that can be used to
characterize the situation of an entity.
An entity is a person, place, or object that is considered
relevant to the interaction between a user and an
application, including the user and the application
themselves.
Dey and Abowd, 2000
Light
Time
Location
IdentityTemperature
Social Network
Example of Context
Context helps us to do things better
Context influences how we perceive information.
Context enables us to manage the vast amount of information that
surrounds us.
Context allows to discriminate “what is important” and “what is not”.
Context helps us to adapt to our surroundings.
Context Categorization
Computing context: For example, network connectivity, communication
bandwidth, nearby resources like printers, displays;
User context: For example, user’s profile, location, emotional state, people
nearby, current activity;
Physical context: For example, lighting, noise level, traffic conditions,
temperature
Some of researchers consider TIME Context as another category. (time of the
day , month , year )
Divided Into Two Main Group
Primary Context :
More important than others, e.g. location (where),
identity (who), time (when), and activity (what)
Context Categorization
Secondary Context :
Which can derived from primary constraints, e.g.
Distances, Relationships
Applications that use context, whether on a desktop or in
a mobile or ubiquitous computing environment, are called
context-aware.
Context Awareness
In fact, it is the Computer that can both sense, and react
based on their environment.
A system is context-aware if it uses context to provide
relevant information and/or services to the user, where
relevancy depends on the user’s task.
Context Awareness
Dey and Abowd (2000)
Context-aware applications look at the
• who’s
• where’s
• when’s
• what’s (i.e., what activities are occurring)
of entities and use this information to determine why a
situation is occurring.
Context Awareness Application
E.g. Smart Phones screen goes Brighter when exposed
to light ( using photo sensors), And goes dimmer on low
battery.
“software that examines and reacts to an individual’s
changing context.”
“...aware of its user’s state and surroundings, and help to
adapt its behavior ”
Context Awareness Computing
Schilit, Adams, & Want (1994)
Proximate selection
Automatic contextual reconfiguration
Contextual information and commands
Context-triggered actions
Categorization of features CA Applications
Based on whether the task is to obtain information or to
execute a command, and whether the task is executed
manually or automatically, divided into 4 category:
Schilit, Adams, & Want (1994)
Uses the following ways to locate exact position on
• Earth – Global Positioning System
• Tower Signal INFO
• IP address, If wifi connected
• Digital Compass Signal To show the direction
Example (Google Latitude)
Context
• Location
• Time
Issue
It also shows your Friends location on map, if they are using same application and
sharing location
Example (Google Latitude)
Application Can be written on
top of this, like:
Location Based Alarm
Near Friend Notifier
Example (Bump)
Context
• Vibration/motionsensor
• Location detectors (for verification)
• Time (is most important)
Issue
Bump makes sharing (Photos, Contacts, apps) with people as simple as bumping two
phones together.
Issues and Challenges in
Context-Aware Computing
How to represent context internally? (Storage)
Data structures and algorithms
How frequently does the system need to be updated on context changes?
How often to poll? ( in case limited power )
How often to change behavior?
What sensors infrastructure, or sensors are necessary?
What is the fallback condition?
How to sense location information?
And ...

More Related Content

What's hot

States, state graphs and transition testing
States, state graphs and transition testingStates, state graphs and transition testing
States, state graphs and transition testingABHISHEK KUMAR
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdfDrBasemMohamedElomda
 
peas description of task environment with different types of properties
 peas description of task environment with different types of properties peas description of task environment with different types of properties
peas description of task environment with different types of propertiesmonircse2
 
Agents in Artificial intelligence
Agents in Artificial intelligence Agents in Artificial intelligence
Agents in Artificial intelligence Lalit Birla
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdfJayanthi Kannan MK
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking TechnologyVinayak Hegde
 
5.2 primitive recursive functions
5.2 primitive recursive functions5.2 primitive recursive functions
5.2 primitive recursive functionsSampath Kumar S
 
05012013150050 computerised-paper-evaluation-using-neural-network
05012013150050 computerised-paper-evaluation-using-neural-network05012013150050 computerised-paper-evaluation-using-neural-network
05012013150050 computerised-paper-evaluation-using-neural-networknimmajji
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 

What's hot (20)

Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
States, state graphs and transition testing
States, state graphs and transition testingStates, state graphs and transition testing
States, state graphs and transition testing
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Network security essentials applications and standards - 17376.pdf
Network security essentials  applications and standards - 17376.pdfNetwork security essentials  applications and standards - 17376.pdf
Network security essentials applications and standards - 17376.pdf
 
peas description of task environment with different types of properties
 peas description of task environment with different types of properties peas description of task environment with different types of properties
peas description of task environment with different types of properties
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Smart quill
Smart quillSmart quill
Smart quill
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 
Agents in Artificial intelligence
Agents in Artificial intelligence Agents in Artificial intelligence
Agents in Artificial intelligence
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
AI
AIAI
AI
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
5.2 primitive recursive functions
5.2 primitive recursive functions5.2 primitive recursive functions
5.2 primitive recursive functions
 
05012013150050 computerised-paper-evaluation-using-neural-network
05012013150050 computerised-paper-evaluation-using-neural-network05012013150050 computerised-paper-evaluation-using-neural-network
05012013150050 computerised-paper-evaluation-using-neural-network
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 

Similar to Context aware

context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchKelly Lipiec
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxRunning Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxtodd271
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptxnassmah
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMartin Wolpers
 
DOTI North - Data and Design; Prof Matthew Chalmers
DOTI North - Data and Design; Prof Matthew ChalmersDOTI North - Data and Design; Prof Matthew Chalmers
DOTI North - Data and Design; Prof Matthew ChalmersSnook
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...UltraUploader
 
context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptxnassmah
 
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationUsing Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationShalin Hai-Jew
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
Debs 2010 context based computing tutorial
Debs 2010 context based computing tutorialDebs 2010 context based computing tutorial
Debs 2010 context based computing tutorialOpher Etzion
 
Cert Overview
Cert OverviewCert Overview
Cert Overviewmattnik
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devicesijasuc
 
Transmission Of Multimedia Data Over Wireless Ad-Hoc Networks
Transmission Of Multimedia Data Over Wireless Ad-Hoc NetworksTransmission Of Multimedia Data Over Wireless Ad-Hoc Networks
Transmission Of Multimedia Data Over Wireless Ad-Hoc NetworksJan Champagne
 
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...csandit
 
Spatial Information Systems yesterday, today and tomorrow
Spatial Information Systems yesterday, today and tomorrowSpatial Information Systems yesterday, today and tomorrow
Spatial Information Systems yesterday, today and tomorrowBeniamino Murgante
 

Similar to Context aware (20)

context aware computing
context aware computingcontext aware computing
context aware computing
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing Research
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxRunning Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptx
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 Nov
 
DOTI North - Data and Design; Prof Matthew Chalmers
DOTI North - Data and Design; Prof Matthew ChalmersDOTI North - Data and Design; Prof Matthew Chalmers
DOTI North - Data and Design; Prof Matthew Chalmers
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A review
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...
 
context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptx
 
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationUsing Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
Debs 2010 context based computing tutorial
Debs 2010 context based computing tutorialDebs 2010 context based computing tutorial
Debs 2010 context based computing tutorial
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ambiences on the-fly usage of available resources through personal devices
Ambiences  on the-fly usage of available resources through personal devicesAmbiences  on the-fly usage of available resources through personal devices
Ambiences on the-fly usage of available resources through personal devices
 
Transmission Of Multimedia Data Over Wireless Ad-Hoc Networks
Transmission Of Multimedia Data Over Wireless Ad-Hoc NetworksTransmission Of Multimedia Data Over Wireless Ad-Hoc Networks
Transmission Of Multimedia Data Over Wireless Ad-Hoc Networks
 
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...
CLASSIFICATION OF SMART ENVIRONMENT SCENARIOS IN COMBINATION WITH A HUMANWEAR...
 
Spatial Information Systems yesterday, today and tomorrow
Spatial Information Systems yesterday, today and tomorrowSpatial Information Systems yesterday, today and tomorrow
Spatial Information Systems yesterday, today and tomorrow
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Context aware

  • 3. 1st GENERATION OF COMPUTING Some engineering needed to work with just one computer
  • 4. 2nd GENERATION OF COMPUTING Every person has his/her own personal computer
  • 5. 3rd GENERATION OF COMPUTING Every person has access to various devices
  • 6. in 3rd generation we believe: Instead of we drowned in the virtual world, computers came to our real lives!
  • 7. we call 3rd generation Ubiquitous computing ( or Ubicomp ) Computing anytime at anywhere
  • 8. Context The word context is derived from the Latin “contextus”, which means “connection of words, coherence,” and from contexere “to weave together.” The interrelated conditions in which something exists or occurs : environment, setting merriam-webster
  • 9. Context (in papers) Schilit and Theimer (1994) refer to context as location, identities of nearby people and objects, and changes to those objects. In a similar definition, Brown et al. (1997) define context as location, identities of the people around the user, the time of day, season, temperature, etc Dey (1998) enumerated context as the user’s emotional state, focus of attention, location and orientation, date and time, and objects and people in the user’s environment.
  • 10. Context Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves. Dey and Abowd, 2000
  • 12. Context helps us to do things better Context influences how we perceive information. Context enables us to manage the vast amount of information that surrounds us. Context allows to discriminate “what is important” and “what is not”. Context helps us to adapt to our surroundings.
  • 13. Context Categorization Computing context: For example, network connectivity, communication bandwidth, nearby resources like printers, displays; User context: For example, user’s profile, location, emotional state, people nearby, current activity; Physical context: For example, lighting, noise level, traffic conditions, temperature Some of researchers consider TIME Context as another category. (time of the day , month , year )
  • 14. Divided Into Two Main Group Primary Context : More important than others, e.g. location (where), identity (who), time (when), and activity (what) Context Categorization Secondary Context : Which can derived from primary constraints, e.g. Distances, Relationships
  • 15. Applications that use context, whether on a desktop or in a mobile or ubiquitous computing environment, are called context-aware. Context Awareness In fact, it is the Computer that can both sense, and react based on their environment.
  • 16. A system is context-aware if it uses context to provide relevant information and/or services to the user, where relevancy depends on the user’s task. Context Awareness Dey and Abowd (2000)
  • 17. Context-aware applications look at the • who’s • where’s • when’s • what’s (i.e., what activities are occurring) of entities and use this information to determine why a situation is occurring. Context Awareness Application
  • 18. E.g. Smart Phones screen goes Brighter when exposed to light ( using photo sensors), And goes dimmer on low battery.
  • 19. “software that examines and reacts to an individual’s changing context.” “...aware of its user’s state and surroundings, and help to adapt its behavior ” Context Awareness Computing Schilit, Adams, & Want (1994)
  • 20. Proximate selection Automatic contextual reconfiguration Contextual information and commands Context-triggered actions Categorization of features CA Applications Based on whether the task is to obtain information or to execute a command, and whether the task is executed manually or automatically, divided into 4 category: Schilit, Adams, & Want (1994)
  • 21. Uses the following ways to locate exact position on • Earth – Global Positioning System • Tower Signal INFO • IP address, If wifi connected • Digital Compass Signal To show the direction Example (Google Latitude) Context • Location • Time Issue It also shows your Friends location on map, if they are using same application and sharing location
  • 22. Example (Google Latitude) Application Can be written on top of this, like: Location Based Alarm Near Friend Notifier
  • 23. Example (Bump) Context • Vibration/motionsensor • Location detectors (for verification) • Time (is most important) Issue Bump makes sharing (Photos, Contacts, apps) with people as simple as bumping two phones together.
  • 24. Issues and Challenges in Context-Aware Computing How to represent context internally? (Storage) Data structures and algorithms How frequently does the system need to be updated on context changes? How often to poll? ( in case limited power ) How often to change behavior? What sensors infrastructure, or sensors are necessary? What is the fallback condition? How to sense location information?

Editor's Notes

  1. Ubiquitous: present, appearing, or found everywhere.
  2. orientation: جهت و سویی که اون کاربر واستاده
  3. کانتکست چیزیه که بتونه اطلاعاتی درباره اون انتیتی که در اون موقعیت قرار داره به ما بده. حالا اون انتیتی میتونه یه شخص، یه مکان یا هر شی باشه،‌ که مرتبط با اینتر-اکشنی که کاربر ما با اون اپلیکیشن داره. درواقع روی رفتار هم کاربر با اپلیکیشن و اپلیکیشین نسبت به کاربر تاثیر میگذاره.
  4. ۱- کانتکس روی درک ما از اطلاعات تاثیر میگذارن ۲- کانتکس به ما این توانایی رو میده تا بتونیم اطلاعات و دیتاهای مختلفی که اطراف مارو احاطه کرده مدیریت کنیم ۳- کانتکس به ما اجازه میده که بفهمیم چی مهمه و چی مهم نیست ۴- کانتکس به ما کمک میکنه تا ما خودمون رو با محیط اطرافمون وفق بدیم
  5. ۱- همه اپلیکیشن هایی که از کانتکس استفاده میکنن (حالا چه رو موبایل باشه چه رو دسکتاپ) و بطور دائم درحال محاسبه محیط و شرایط هستن رو بهشون میگن کانتکست اویر ۲- درواقع به دیوایس های اتلاق میشه که بر اساس شرایط محیطی بتونن سنس کنن و واکنش نشون بدن
  6. سیستمی کانتکست اویر هست، که بتونه از کاتکست استفاده کنه و یه سری اطلاعات و سرویس مرتبط فراهم کنه، که این ها باید مطابقت داشته باشه با تسکی که کاربر انتظارشو داره
  7. اپلیکیشن کاتکست اور میاد wwww دریافتی رو بررسی میکنه و از اطلاعات دریافتی استفاده میکنه تا بفهمه اطرافش چه خبره و چه واکنشی باید نشون بده.
  8. ۱- نرم افزاریه یا پروسسه ای که به تغییرات ارسال شده از کانتکس رو تخمین زده و نسبت بهش واکنش مناسب نشون بده ۲- اینکه بتونه وضعیت خود کاربر و اطرافشو شناسایی کنه و کمک کنه تا بتونیم رفتار مناسب با اون موقعیت رو داشته باشیم
  9. ۱- یه تکنیک ui که با قرار دادن اشیا در جاهای مخصوص احتمال انتخاب شدندش رو بیشتر و آسونتر میکنه. ۲- به پروسه اضافه کردن اضافه کردن کامپوننت جدید و حذف کامپوننت قبلی یا تغییر دادن رابطه بین کامپوننت ها بر اثر تغییر کردن کانتکست ۳- که نتیجه های مختلفی بر اسا اینکه در چه کانتکستی مطرح شدن تولید میکنه ۴- یه سری قوانین ایف/دن ساده که مشخص میکنن سیستم های کاتکست-اویر چطوری باید خودشونو وفق بدن Proximate selection Context-Aware Computing a user-interface technique where the objects located nearby are emphasized or otherwise made easier to choose. Automatic contextual reconfiguration a process of adding new components, removing existing components, or altering the connections between components due to context changes. Contextual information and commands which can produce different results according to the context in which they are issued. Context-triggered actions simple IF-THEN rules used to specify how context-aware systems should adapt.