This presentation is about contextual computing and context awareness in software applications and an experimental project which we did in this area for the new Mary Idema Pew Library of Grand Valley State University using Estimote Beacon devices.
For more details on contextual apps visit: http://emberify.com/blog
Using the sensors in the mobile phone, developers can build enriched apps. The simple lifecycle of Sense, Understand and Adapt can be implemented in an app using simple APIs. What sets contextual apps apart from other mobile apps is their ability to figure out your needs and anticipate your interests. . Apps like Google Now, Tempo, Sherpa, Sunrise and Cortana use a contextual lifecycle to predict habits and interests. Using APIs to access the GPS, accelerometer, social networks, Gyroscope and other information from the device developers can easily create context aware.
A presentation I put together to demonstrate seamless integration of mobile, cloud, desktop and NUI applications. This was shown internally at SunGard, as well as for Industry Analyst Groups, Houston Tech Fest, Philly.NET Code Camp.
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004Jason Hong
Some older research I did looking at one way of building privacy-sensitive apps for ubiquitous computing environments. The core idea is to focus on locality, where all of the data is sensed and processed locally as much as possible.
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.
Authors are Jason Hong and James Landay
For more details on contextual apps visit: http://emberify.com/blog
Using the sensors in the mobile phone, developers can build enriched apps. The simple lifecycle of Sense, Understand and Adapt can be implemented in an app using simple APIs. What sets contextual apps apart from other mobile apps is their ability to figure out your needs and anticipate your interests. . Apps like Google Now, Tempo, Sherpa, Sunrise and Cortana use a contextual lifecycle to predict habits and interests. Using APIs to access the GPS, accelerometer, social networks, Gyroscope and other information from the device developers can easily create context aware.
A presentation I put together to demonstrate seamless integration of mobile, cloud, desktop and NUI applications. This was shown internally at SunGard, as well as for Industry Analyst Groups, Houston Tech Fest, Philly.NET Code Camp.
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004Jason Hong
Some older research I did looking at one way of building privacy-sensitive apps for ubiquitous computing environments. The core idea is to focus on locality, where all of the data is sensed and processed locally as much as possible.
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.
Authors are Jason Hong and James Landay
Big Data with IOT approach and trends with case studySharjeel Imtiaz
The Big Data with IOT approach and trends. It will give you complete exposure of data science process and also will give insight how the step by step data science process explore the big data of TripAdvisor case study.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Engaging Your Audience Through Online Technologies: Session 2HRMM
Presented at the Museums in Conversation Conference, April 15, 2013, Syracuse, NY. This presentation covers a more in-depth overview of some of the specific technologies you can use in the museum.
For PDFs of print materials developed for this conference and links to research conducted for this presentation, please visit http://engagingyouraudience.wordpress.com
The Internet of Things (IOT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
This IOT makes a new environment for living people. Using this IOT we can manage huge amount of electricity and using this IOT we can secure our home and environment without any authorized users. I hope that this IOT is boon for all over the world.The Internet of Things also includes people – this is particularly important in areas such as home automation, where humans can control the environment via mobile applications. Through services, such as cloud services, massive volumes of data (“big data”) are being processed and turned into valuable information.
For developers, having the data where it is needed is a non-trivial challenge. Mobile, IoT, and edge computing challenge cloud-centric solutions where data and processing is done centrally. Decentralized computing along with data locality bring back autonomous apps, which don't depend but coexist symbiotically with the cloud. This does not only reduce cloud costs, but also increases security by reducing the amount of data shared with central instances. Can blockchain be part of the solution?
The presentation looks at the following: 1) Long range view of fundamental trends and shifts in computing and User Experience, 2)
What does IoT and context mean for ambient conversational AI?, 3)
How does Conversational AI work?
Self-Learning: Implicit and explicit customer feedback based learning.
Presentation from Symposium on Mobile Technologies in Library Services (22 Nov 2012, Dublin), organised by the Acquisitions Group of Ireland (AGI) and the LIR HEAnet User Group for Libraries.
Quality of Experience in Smart EnvironmentsPedro Costa
The democratisation of powerful mobile devices and ubiquitous communication networks have paved the way for smart environments, whose main goal is to enhance users' experiences. In this talk we will briefly explore some of the opportunities and challenges in such an environment. A user-centric framework is proposed for the assessment of users' quality of experience, as well as the delivery of personalised services with the potential to improve their experience and influence behaviour. A version of the platform is currently being implemented in the context of public transportation, which will be presented alongside some preliminary results.
Mobile devices are becoming more and more powerful. They come with all sorts of wonderful hardware like cpu/gpus, tons of ram and blazing fast download times. Smart phones have become commoditized in a sense. What's the next evolution of mobile? Now these devices are coming with a really solid set of sensors and apis that allow developers to determine a user's context. How does that work? Developers fuse the sensor output to infer context and infer events from the data. This talk will discuss ways to do it, challenges and drawbacks.
With the increasing focus on globalization of products and services, the need to understand user experience in distant markets is more urgent. However, conducting global user research can be confusing and is a significant risk of time and resources. In this webinar, we talk through several methods for global research. We’ll present these various methods and the tradeoffs and considerations for choosing one method over another. We’ll also step through the elements of success in conducting a global study – from planning to results.
This webinar is not about localization or globalization of user interfaces, it will instead focus on methods and practices for how one conducts successful global user research.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
More Related Content
Similar to Context-Awareness & Occupancy/Traffic Monitoring
Big Data with IOT approach and trends with case studySharjeel Imtiaz
The Big Data with IOT approach and trends. It will give you complete exposure of data science process and also will give insight how the step by step data science process explore the big data of TripAdvisor case study.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Engaging Your Audience Through Online Technologies: Session 2HRMM
Presented at the Museums in Conversation Conference, April 15, 2013, Syracuse, NY. This presentation covers a more in-depth overview of some of the specific technologies you can use in the museum.
For PDFs of print materials developed for this conference and links to research conducted for this presentation, please visit http://engagingyouraudience.wordpress.com
The Internet of Things (IOT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
This IOT makes a new environment for living people. Using this IOT we can manage huge amount of electricity and using this IOT we can secure our home and environment without any authorized users. I hope that this IOT is boon for all over the world.The Internet of Things also includes people – this is particularly important in areas such as home automation, where humans can control the environment via mobile applications. Through services, such as cloud services, massive volumes of data (“big data”) are being processed and turned into valuable information.
For developers, having the data where it is needed is a non-trivial challenge. Mobile, IoT, and edge computing challenge cloud-centric solutions where data and processing is done centrally. Decentralized computing along with data locality bring back autonomous apps, which don't depend but coexist symbiotically with the cloud. This does not only reduce cloud costs, but also increases security by reducing the amount of data shared with central instances. Can blockchain be part of the solution?
The presentation looks at the following: 1) Long range view of fundamental trends and shifts in computing and User Experience, 2)
What does IoT and context mean for ambient conversational AI?, 3)
How does Conversational AI work?
Self-Learning: Implicit and explicit customer feedback based learning.
Presentation from Symposium on Mobile Technologies in Library Services (22 Nov 2012, Dublin), organised by the Acquisitions Group of Ireland (AGI) and the LIR HEAnet User Group for Libraries.
Quality of Experience in Smart EnvironmentsPedro Costa
The democratisation of powerful mobile devices and ubiquitous communication networks have paved the way for smart environments, whose main goal is to enhance users' experiences. In this talk we will briefly explore some of the opportunities and challenges in such an environment. A user-centric framework is proposed for the assessment of users' quality of experience, as well as the delivery of personalised services with the potential to improve their experience and influence behaviour. A version of the platform is currently being implemented in the context of public transportation, which will be presented alongside some preliminary results.
Mobile devices are becoming more and more powerful. They come with all sorts of wonderful hardware like cpu/gpus, tons of ram and blazing fast download times. Smart phones have become commoditized in a sense. What's the next evolution of mobile? Now these devices are coming with a really solid set of sensors and apis that allow developers to determine a user's context. How does that work? Developers fuse the sensor output to infer context and infer events from the data. This talk will discuss ways to do it, challenges and drawbacks.
With the increasing focus on globalization of products and services, the need to understand user experience in distant markets is more urgent. However, conducting global user research can be confusing and is a significant risk of time and resources. In this webinar, we talk through several methods for global research. We’ll present these various methods and the tradeoffs and considerations for choosing one method over another. We’ll also step through the elements of success in conducting a global study – from planning to results.
This webinar is not about localization or globalization of user interfaces, it will instead focus on methods and practices for how one conducts successful global user research.
Similar to Context-Awareness & Occupancy/Traffic Monitoring (20)
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
3. We collect big data
• What do we do with it?
• Recommendation Engines
• More relevant and useful content for each individual
• Better user experience and more value
9. Context depends on domain
• Based on the application
• Problem it is solving
• The Domain
“Any information that can be used in order to
describe the situation of an entity relevant to
interaction between user and the application is
considered Context.”
10. What can be improved on
campus?
• Looking for a book?
• Campus Tour Guide?
12. Meeting with library staff
• new books notification
while they’re passing by
different sections
• Traffic and
Occupancy Monitoring
In certain areas
13. Occupancy monitoring wins
• Library staff are more interested in occupancy
monitoring
• That’s an actual problem
• Students can get help on where is less crowded to
study/work
14. How to solve it
• Install Beacon devices in 3rd Floor Innovation Zone
& 4th Floor Study Room
• Add a traffic/occupancy monitoring feature to a
popular application which is used by majority of
students
• Collect and process traffic data and get real-time
information for those areas
16. Client application
• Laker Mobile
• Used by Majority of Students
• Has a Library Section
• Need to make it more useful
• Add a context-aware background
service for monitoring traffic
activities (e.g. Enter, Exit)
17. ibeacon
• Wireless devices transmitting radio signals to smart
devices
• Devices can hear these signals (via BLE scanning)
• Communicate with beacons
• Estimate their proximity from them
18. Ibeacon (cont.)
• Introduced by Apple in iOS 7
• Core Location Library
• Works with Bluetooth Low Energy (BLE)
• Proximity Calculation and Context Awareness
19. Main functionalities
• Region Monitoring
• Can detect Enter/Exit for a monitored region/area
• Region Change detection
• Beacon Ranging
• Can calculate the proximity to a certain beacon device
in a given region
• Proximity levels Far, Near, Immediate, Unknown
• Identifiable through UUID, Major and Minor numbers
21. Ruby on rails web server
• Receiving traffic data
• Returns traffic information in a given period in
conventional format: JSON, CSV
• Gives real-time information on population of
monitored areas
• Shows a heat map associated with monitored areas
• All the other BORING parts of a web service
26. Quick peak on Implementation
• CLBeaconManager From Core Location Library
• When a device enters a monitored area
• Certain callback gets invoked by beacon manager
• (void)beaconManager:(ESTBeaconManager*)didEnterRegion:(ESTBea
conRegion)
• Context-Aware logic of the application is here or
triggered here
28. Region monitoring &
beacon ranging
• Region Monitoring can happen both in background
and foreground
• Beacon Ranging can only happen when the
application is in foreground
• Proximity calculation
• Signal Strength calculation
• Solving the problem of overlapping areas
29. Frequency of ble scan
• Ranging happens quite frequently when application
is in foreground
• Almost every few seconds
• Region Monitoring depends on few things
Condition Max time to detect Range
Change
notifyEntryStateOnDisplay = YES
& Phone Awakened
1 second
notifyEntryStateOnDisplay = NO
& Phone Awakened
NEVER
Application is just running in
background
From few seconds up to 15
minutes
30. Subtleties on server
• Device is On border of a region
• Two subsequent traffic data can be submitted with
EXACT same time
• Which one do you consider in Area Population
calculation?
31. What we can find out?
• How long a users occupy a given area
• Enter at 9:00 AM
• Exit at 13 PM
• Taking a break or temporarily leaving the area
• Exit at 18:35
• Enter at 18:44
• Taking a break, Finding a book, meeting someone, etc.
• Just walking by a monitored area closely
• Enter at 17:35:07
• Exit at 17:35:40
36. Lessons learned (CONT.)
• Dealing with new and unfamiliar technology
• Technical Side = Advertisement and Promoting
• ??A lot of unknowns, unfamiliar obstacles??
• Building a infrastructure, platform, framework
• Core logic is interchangeable
37. Lessons learned (cont.)
• Dealing with other organizations
• IT was worried about WiFi interference
• Bluetooth & WiFi 2.4 GHz frequency
• Students will face Internet connection problems
38. Wifi disconnects
• Could not connect to WiFi through my laptop???!!!
• Everything else was connected (iPhone, iPad, etc.)
• The conversation with IT hit me
• we have an Estimote beacon in our lab
• Stackoverflow to the rescue
39. Context matters
• Human-Human interaction is very effective at this
• We want the human-computer interaction to be
efficient and valuable
• recommending appropriate things, showing relevant
content
• Why not better? We know one more missing
piece of the puzzle
• Context is a Caved in Stone
40. Special thanks to
• Professor Jonathan Engelsma
• Carlos Rodriguez
• Kyle Felker
• Kristin Meyer
• Ehsan Valizadeh
• Davoud Qorashi
• All the students who used the application and
collaborated in this work
41.
42. References
• Dey AK, Abowd GD. Towards a better understanding of context
and context-awareness. CHI’2000 Workshop on the
What, Who, Where, When, and How of Context-Awareness.
• Yin, Chuantao, Bertrand David, and Rene Chalon. "Use
your mobile computing devices to learn-Contextual mobile
learning system design and case studies."Computer
Science and Information Technology, 2009. ICCSIT 2009.
2nd IEEE International Conference on. IEEE, 2009.
• Prophet Kitchen application for Rubens House in Antwerp
Belgium. http://vimeo.com/84760383
• Estimote official website. http://estimote.com/
• API documentation of Estimote.
http://estimote.com/api/index.html
44. References (cont.)
• Frequency of region monitoring and beacon ranging.
http://developer.radiusnetworks.com/2013/11/13/ibe
acon-monitoring-in-the-background-and-
foreground.html
• Estimote on coexistence of WiFi and Beacon
devices. https://community.estimote.com/hc/en-
us/articles/201186046-Do-Wi-Fi-Networks-Interfere-
with-Beacons-
Editor's Notes
Our devices have different sensors in order to provide more and more information. How are we using this information in our applications?
Context, current context and situational information (And context is not necessarily the location of the user! That is big part of it but it’s not ALL)
You have an app that suggests good restaurants, close by! When humans are talking about the same thing they consider the contextIt is raining but the app is suggesting a restaurant, which ONLY has sitting area outside! BUT humans never do that.
It is a relative concept and can be completely different based on different domains and situations
Most of apps in this category consider user interests, previous activities and where they are BUT not who they are hanging Out with at the time!
Getting appropriate information based on what art piece you’re looking at! That is the context here (kind of an indoor GPS and the fact that You are near which art piece)
Looking around for finding a book and jumping aroundCampus tour is happening all the time and can be automated as well for people (not a huge fan of this one myself)
One of those moments that you come up with an idea and then realize it’sAgainst what you believe and get consider it a No-Go option!
We thought of meeting with library staff and see what kinds of problems they have which Are good candidate for a context-aware application or feature to solve them.
Consist of the following items: * Client device (iOS device in this project) * Estimote beacons * Ruby on Rails web server * PaaS which is Heroku in this project(joke about area is higher than Cloud [internet] and airplane cabin monitoring) :D
To make it more useful we changed its content to the computer availability of Library which according to library staff is a very popular feature Also we allow users to turn on/off the feature if they wish. Everything else is happening in Background and no UI involved in this feature (mostly a background service)
In the case of Estimote, UUID is representing the manufacturer, major an minor number specify each Individual beacon device
Exit can only come once since the device left the area and is not in the range/region at allBut enter can come again within few minutes and population will be wrong in that moment But after that will be accurate but if we consider Enter only and the reality was Exit, until the End of the day that population would have wrong information in it (Also the scenario that phone dies after Enter)
Y axis is the population of the monitored areas and X axis is the last two weeks of monitoring on an hourly basis from 9:00 AM until 2:00 AMAs we get closer to exam week the population grows until it drops again at the end of it since a lot of students are done with the semester at this point And say bye to the library until the next semester
Around lunch time population drops suddenlyAlso the same thing happens close to 6 since a lot of students have class at that timeThe population grows from morning till noon and then again after lunch until before classes
In total it was about 80 devices that we collected traffic data for. Again the result of not advertising and promoting The application shows how it can affect the usage of it and users not knowing about what’s going on
Green shows the users running the latest versionImpact of simplicity and ease of installation and updating handled by Apple
Example of advertisement in last year project and its impactThis year we did a very small amount of advertisement and promoting the app but Even that small advertisement made N (extract out of DB) number of users turn on their bluetoothAnd use this feature and help the library. So better advertisement better results. Specially when it is dealing with some sensitive areas: Bluetooth Unique IdentifierNo stackoverflow questions, or the few ones are answered by developers of companies Manufacturing beacons and their SDK developers * Mostly source code * Mailing lists * Issue trackersThe interface of interacting with technology, is stable and reusableIn order to solve a new problem in a new domain use the building blocks Related to the context-awareness technology and change the core logic to solve things
And a bunch of other devices work with 2.4 GHz frequency Since WiFi is everywhere, so are Bluetooth devices Bluetooth Smart is using Adapting Frequency Hopping approach which is solving interference problem and it’s not on a fixed frequency. They can coexist in in peace with no problem.