This document summarizes context-aware artifacts and mobile phones. It discusses two approaches for context-aware artifacts: self-supported and infrastructure-supported. It provides examples of self-supported artifacts like smart furniture, mirrors, and chairs that have embedded sensors. It also discusses how infrastructure can perceive contexts related to artifacts. Examples of context-aware mobile phones are described that use self-contained sensors or external infrastructure for context-awareness. Frameworks like ContextPhone and Situation-Aware Phone that enable context-aware applications on mobile devices are summarized.
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...Ahmad Lotfi
Ambient Intelligence refers to a digital environment that proactively supports people in their daily lives. It is an emerging discipline that brings intelligence to our living environments, makes those environments sensitive to us, and adapting according to the user’s needs. By enriching an environment with appropriate sensors and interconnected devices, the environment would be able to sense changes and support decisions that benefit the users of that environment. Such smart environments could help to reduce energy consumption and thus the cost of facilities, improve safety and security, while at the same time increase user’s comfort.
One specific area of interest is the application of ambient intelligence in Ambient Assisted Living, where the home environment provides assistance with daily living activities for people with different cognitive and physical disabilities. For example, technologies are available to help older adults to live longer and more independently in their own homes. To enhance the intelligence of the environment, Computational Intelligence techniques as a set of nature-inspired computational methodologies are available to address such complex problems for which traditional approaches are ineffective.
This lecture will provide a review of the technologies and environments that comprise Ambient Intelligence, as well as how changes in the environment are reflected in the overall design of an adaptive ambient intelligence environment.
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...Ahmad Lotfi
Ambient Intelligence refers to a digital environment that proactively supports people in their daily lives. It is an emerging discipline that brings intelligence to our living environments, makes those environments sensitive to us, and adapting according to the user’s needs. By enriching an environment with appropriate sensors and interconnected devices, the environment would be able to sense changes and support decisions that benefit the users of that environment. Such smart environments could help to reduce energy consumption and thus the cost of facilities, improve safety and security, while at the same time increase user’s comfort.
One specific area of interest is the application of ambient intelligence in Ambient Assisted Living, where the home environment provides assistance with daily living activities for people with different cognitive and physical disabilities. For example, technologies are available to help older adults to live longer and more independently in their own homes. To enhance the intelligence of the environment, Computational Intelligence techniques as a set of nature-inspired computational methodologies are available to address such complex problems for which traditional approaches are ineffective.
This lecture will provide a review of the technologies and environments that comprise Ambient Intelligence, as well as how changes in the environment are reflected in the overall design of an adaptive ambient intelligence environment.
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
Pervasive Computing or Ubiquitous computing is one of the latest trends in computing. Get to know the principles, mechanism and the possible applications of pervasive computing. Come, let us pervade our future.
For the IoTweek 2019 conference in Aarhus Denmark 8 concepts were presented to an audience of Industry and higher education, which demonstrate the capabilities of the IoTCrawler and their potential to generate an impact within different domains.
Read more about the partners and test-beds presented at: https://iotcrawler.eu/index.php/partners/
Blue Eyes Technology gives Perceptional Abilities To a Computer Using Bluetooth,Eye Gaze Tacker,Emotion Recognizing Mouse,There By making it to interact with human Being.
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
Pervasive Computing or Ubiquitous computing is one of the latest trends in computing. Get to know the principles, mechanism and the possible applications of pervasive computing. Come, let us pervade our future.
For the IoTweek 2019 conference in Aarhus Denmark 8 concepts were presented to an audience of Industry and higher education, which demonstrate the capabilities of the IoTCrawler and their potential to generate an impact within different domains.
Read more about the partners and test-beds presented at: https://iotcrawler.eu/index.php/partners/
Blue Eyes Technology gives Perceptional Abilities To a Computer Using Bluetooth,Eye Gaze Tacker,Emotion Recognizing Mouse,There By making it to interact with human Being.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...Matteo Ferroni
Mobile devices take an important part in everyday life. They are now cheaper and widespread, but still a lot of time is spent by the users to configure them: users adapt to their own device, not vice versa. Can our smartphones do something smarter? In this work, we propose a framework to support the development of context-aware applications for Android devices: the goal of such applications is to reduce as much as possible the interaction with the user, making use of automatic and intelligent components. Moreover, these components should consume as less power and computational resources as possible, being them part of a mobile ecosystem whose battery and hardware are highly constrained. The work implies the study of a methodology that fits the Android framework and the design of a highly extensible software architecture. An open-source framework based on the proposed methodology is then described. Some use cases are finally presented, analyzing the performances and the limitations of the proposed methodology.
Full paper: http://ieeexplore.ieee.org/abstract/document/6962264
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
How to Get CNIC Information System with Paksim Ga.pptx
Review 1 부분1
1. 상 황 인 식 시 스 템
기말 고사 Review
Architecture for a New Breed of
Applications
상황인식 2010 가을 1
2. Context-Aware
ArtiFacts
윤 용운
2010.10.14
상황인식 2010 가을 2
3. Context-Aware Artifacts : Smart things
Review examples of context-aware artifacts
• everyday objects, appliances, and handheld devices
• how they can be made context aware
• Sentient and smart, describing objects.
self-supported context awareness Vs infrastructure-supported context
awareness
explore in detail of a software system for context-aware mobile phones
상황인식 2010 가을 7 주차 3
4. Aware Objects
Robot : perform human-level tasks
Soft toy : responding and reacting to its user’s handling context or
hearing warm greetings
Intelligent shelves : self introducing and self marketing
Cell phones : automatically behaving in the right way under the right circumstances
Context-aware behavior in devices, appliances, and everyday objects are an
emerging new experience.
Context-aware artifact, Smart artifacts
• Able to perceive the situation of a user and Reacts sensibly to it
• Promise to enhance the relationships among participants in distributed
working groups, maintaining personal mobility while offering opportunities for
the collaboration, informal communication, and social awareness that
contribute to the synergy and cohesiveness inherent in collocated teams.
Galatea: Personalized Interaction with Augmented Objects, 2005 , Gatenby Master
thesis, MIT
상황인식 2010 가을 7 주차 4
5. infrastructure-supported context-aware artifacts
Sensor added context-aware artifacts
• Limitations in the number and type of sensors that can be attached
• Limited computational and networking capabilities
limit the reasoning and prevent them to acquiring information from internet
such as weather report or traffic condition
infrastructure-supported context-aware artifacts
• Utilizes a hardware and software infrastructure external to the artifact
• The idea shifts from the artifact perceiving situations
to an external party perceiving situations related to the artifact
• Complex reasoning with an infrastructure + Sensors in the artifact itself
EX) CUP situations
collection of sensors attached to the CUP
infrastructure observe the CUP & its situations from outside the CUP
상황인식 2010 가을 7 주차 5
6. 2 approaches to Context-Aware Artifacts
Context-aware Artifacts : 2 development approaches, 2006. Loke
Self-supported context awareness
• H/W, S/W with ability to perceive context and utilize context in its behaviors
Infrastructure-supported context awareness
• acquires context-aware capabilities by utilizing H/W and S/W infrastructure
external to the artifact
• Infrastructure - the environment of the artifact
and shared by other artifacts and applications
The relationship between context-aware artifacts and
the context-awareness infrastructure.
The infrastructure first receives the contextual
information and, if appropriate, reasons with it
The infrastructure uses a feedback mechanism to
determine the commands it issues and the context
information it shares with various artifacts.
상황인식 2010 가을 7 주차 6
7. A Smart Wheelchair , 2006, Cascado, Spain
Self- The Diet-Aware Dining Table: 2006, Chang, Taiwan
Supported Smart couch, 2002, trinity colleage, Dublin
Context Intelligent Environments Using Smart Daily Objects, 2005, Nakajima, Japan
Aware Chameleon tables, 2002, Selker et al, MIT
Case A History tablecloth, 2006, William Gaver, UK
studies The smart table, 2003, Steurer, UCLA
The sense table , 2001, Patten, MiT
Shelf with pressure sensors, 2005, Metzger
Smart furniture, 2003, Ito, Japan
Aware Mirror, 2005, Fujinami, japan
Mediacups, 2001, Beigl, Germany
chameleon mug, 2006, MiT
Context-Aware Pill Bottle with RFID, 2005, Agarawala
Intelligent spoon at MIT
Smart sink, 2005, Mit
Context-aware doll, , 2001, Yonezawa, Japan
context-aware camera, 2003, Hakansson et al., 2003
Smart wear - the SensVest, 2004, Knight
상황인식 2010 가을 7 주차 7
8. Self-Supported CA Case studies
Building Intelligent Environments Using Smart Daily Objects and Personal Devices ,
2005, Tatsuo Nakajima, 와세다대학
Sentient Chair
Sitting on it, then the activity at the
chair is narrowed
sensors to detect a person, sitting or
not, and his or her orientation
Aware mirror – detection a person
displays information relevant to him
suggests an ideal interaction between
a person and a computer embedded
into our daily lives
Sentient Personal devices (PDA)
different types of sensors for a user’s
context
control some applications
상황인식 2010 가을 7 주차 8
9. Self-Supported CA Case studies
Smart Furniture: Improvising Ubiquitous Hot-spot Environment, 2003, Masaki Ito, Keio
SF2: Smart Furniture for Creating Ubiquitous Applications, 2004, Hideyuki Tokuda
Smart Furniture :
Convert legacy non-smart space into a Smart Hot-Spot
which can provide the accessibility to the Internet,
location-based context-aware services, service roaming,
and personalization services.
Equipped with networked computers, sensors and various
I/O devices
Personalized Message Board : displays commercial
messages on a Smart Furniture
Environmental Monitor : keeps track of number of users
inside the sensing area, and changes the color of lamp
type Smart Furniture accordingly
mobile TV-phone : Display and Camera on Smart
Furniture is enabled
Smart Spaces are characterized by following features;
(1) Identification and detection of activity of users
(2) Sensing users’ and devices’ location
(3) control and coordination of devices.
상황인식 2010 가을 7 주차 9
10. Self-Supported CA Case studies
Aware Mirror: A Personalized Display Using a Mirror, 2005, Kaori Fujinami
A Mirror and Its Augmentation
A toothbrush : an identification tool by the owner of the toothbrush
proximity sensors have been utilized to detect a person’s position (in front of the mirror)
three types of information that can
affect a user’s decision
•transportation information by
his/her schedule
•Weather forecasting at the
destination
•Time to leave and schedule
상황인식 2010 가을 7 주차 10
11. Context-aware mobile Phones
Context aware hand-held devices, 2000, Tuulari, VTT Finland
Tuulari‘s Sensor box (2000)
Personal technology devices for mobile users :
Wristwatch, Heart monitor, Mobile Phone, GPS-Navigator, MP3, Camera…
Key problem is user interface (small size keyboard, display)
Research questions
• What is the role of context-awareness in personal technology devices ?
• Why is context awareness of personal technology important ?
• What are the contexts that are associated with hand-held devices ?
• How can hand-held devices, with limited resources, identify these context ?
Prototype system : self-supported context-awareness mobile phone
• Sensor box with sensors for acceleration, temperature, humidity, light, conductance
• Exploit context-awareness in reducing the interaction in the user interface,
modifying interaction to more suitable for mobile use.
• Implement rule-based behaviors such as “if the phone rings and it is picked up, it
should stop ringing.”
. 상황인식 2010 가을 7 주차 11
12. Context-aware mobile Phones
ContextPhone: A Prototyping Platform for Context-Aware Mobile Applications, 2005,
Raento, Helsinki Univ.
ContextPhone (2005, Raento) for Nokia Series 60 Smartphone platform & Symbian OS
Software platform with following design goals:
• Provide context as a resource for social interaction.
• incorporate existing applications.
• fast interaction and unobtrusiveness.
• Ensure robustness - automatically recover
• Emphasize timeliness for fast response
• Enable rapid development for adding new context data, building new application
상황인식 2010 가을
7 주차 12
13. ContextPhone -2
The ContextPhone platform. Four interconnected Modules
1. modules for sensing
• Location information (by GSM cell IDs, GPS via a bluetooth GPS receiver ),
• Phone information (charger status and alarm profile)
• Communication behavior(calls, call attempts & recording, SMS content)
• Optical marker recognition using a built-in phone camera
2. communications :
• Wide area network : Generalized Packet Radio Service (GPRS),
• Local : Bluetooth and infrared networking,
• SMS or MMS messaging
3. Customizable applications
• ContextLogger : Studying mobility patterns
logs details of the communication’s nature, timing, participants
• ContextContacts : Automatic context sharing
• ContextMedia : Sharing mobile media : situated annotating services
• The automatic annotation includes features such as location and nearby
Bluetooth devices
4. background services, error logging and recovery, and the Status display
상황인식 2010 가을 7 주차 13
14. ContextPhone-3
The ContextPhone platform.
4 interconnected Modules
상황인식 2010 가을 7 주차 14
15. Context-Aware mobile Phones: An illustration
Self-supported context-aware mobile phones – previously described
Situation-Aware phone (Wang, 2004)
• Ontology-based approach to recognize & reason the context
• Using supporting infrastructure
Context-Aware Phone (Connelly, 2000)
• Using infrastructure representing the space in which the phone is situated in
• the space and phone would negotiate in determining suitable actions on the
phone
Space control over the phone
• for compliance reasons : abide by some policy concerning phone usage and
behavior
• for convenience reasons : the actions can be carried out on the phone
automatically, reducing user intervention)
상황인식 2010 가을 7 주차 15
16. Situation-Aware phone
Semantic Space: An Infrastructure for Smart Spaces, 2004, Wang
Semantic Space : a context infrastructure for the following issues
• Explicit representation , Context querying, Context reasoning. :
Ex) Who is in the room with Yoon?
• Context-aware applications must adapt to changing situations,
they need a detailed model of users’ activities and surroundings that lets
them share users’ perceptions of the real world
• Ontology : Smart spaces cover a range of environment types such as homes,
offices, workplaces, classrooms, and vehicles
The context infrastructure consists of several context wrappers, an context
aggregator, a knowledge base, a query engine, and a reasoner.
Rachel wishes to contact her friend Joey, so she instructs her mobile phone to arrange a call.
Upon request, Joey’s mobile phone checks the calendar and realizes he’s currently attending a
seminar. The phone determines on his behalf that he shouldn’t be interrupted and schedules a
call back when the seminar ends. Soon after the seminar, Professor Geller asks Joey to have a
discussion in his office. Before the phone reminds Joey of the missed call as scheduled earlier, it
wants to know whether his current situation is suitable for receiving the call. Based on contextual
information (Where are you? Who are you with? What is the noise level? Is the door open or
closed?) gathered in the smart space, the Phone infers that Joey is in a conversation with his
supervisor and decides to postpone the call until he’s available. A few minutes later, when the
conversation ends and Joey leaves the office, the phone finally reminds him of the missed call.
상황인식 2010 가을 7 주차 16
17. An upper-level context ontology , The Semantic Space
extended context ontologies. context infrastructure.
Building a prototype:
Networked sensors and devices
the RFID indoor location system
the GUI for configuring the response mode in each situation.
상황인식 2010 가을 7 주차 17
18. Context-Aware Phone
On Negotiating Automatic Device Configuration in Smart Environments, 2004, Kay
Connelly and Ashraf Khalil
• Architecture for automatic device configuration in smart environments
• negotiating between the user’s wishes and owner of the smart environment
• User Intervention
• Agent-based negotiation : to decide the best negotiation strategy given the
limitation (computing, battery, and memory) of mobile devices.
Another challenge is finding the correct metrics that quantify both the space
and device preferences
• Where to reside resolution logic ?
Device modes on Cell phone
Quiet Mode: ringer should be disabled
Noisy Mode: user is in a loud environment
Disable Mode: all incoming and outgoing
calls should be disabled
Default Mode: normal conditions
상황인식 2010 가을 7 주차 18
19. Overview of a Framework of The CAMP-UP System
CAMP-UP (Context-Aware Mobile Phone with User Preferences)
• the level of access (from external parties) to phone functionality can be adjusted,
based on the context and user preferences
The architecture of the system :
A server side & A client side
two classes of users :
device (mobile phone) user
space administrator
two types of interactions
• The user and his mobile phone
- Set his preferences for the device
- Set the type of functionalities
, exposed and controlled by external parties
• The space administrator and the Space Manager component of the system
- Defines a space policy, which is a set of rules that determines certain device
functionalities to be set to certain modes based on current context
상황인식 2010 가을 7 주차 19