SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
CONTEXT AWARE COMPUTING

     By Swati A. Sonawane
          M.E. (SSA)
Overview
Context
  Definition
  Categorization
  Characteristics
Context Awareness
Context Aware Computing
Need For Context Aware (CA) Computing
Context-Aware Application Development
  Approach
  Categorization of features
  Model / Framework Properties
  Example
Issues and Challenges
References
Who is “ANNA” ??
Google Search Results
2-3 months before :
First search result for                            WHY ?
                          Current Search     Complex Searching
“ANNA”                    Shows : First      Algorithms Takes
                          Search Result as   Following In
Anna Kournikova
                                             Consideration
(Famous Tennis            Anna Hajare.
Player / Model )                             1. IP based Location
                                             2. Current Activity on
                                                Internet Searches
                                             3. Page Ranking etc ..

                                                   “ CONTEXT ”
Context
The word context is derived from the Latin “contextus”,
which means “connection of words, coherence,” and
from contexere “to weave together.”

No clear boundary divides what is and is not context.

Most interesting kinds of context are those that humans do
not explicitly provide.

With advances in sensing and automated means of
perceiving the physical environment, we can automatically
collect much more implicit context.
Context            ( cont…)
SOME OTHER DEFINITIONS ….

In the work that first introduces the term context-aware, Schilit and Theimer
(1994) refer to context as location, identities of nearby people and objects, and
changes to those objects.

In a similar definition, Brown et al. (1997) define context as location, identities of
the people around the user, the time of day, season, temperature, etc.

Ryan et al. (1998) define context as the user’s location, environment, identity, and
time.

Dey (1998) enumerated context as the user’s emotional state,focus of attention,
location and orientation, date and time, and objects and people in the user’s
environment.

Finally, Pascoe (1998) defines context to be the subset of physical and conceptual
states of interest to a particular entity.

Context defines some rules of inter-relationship of features in processing any
entities as a binding clause.
Context           ( cont…)


FINAL INTERPRETATION

“ Context is any information that can be used to characterize the situation of
   an entity. An entity is a person, place, or object that is considered relevant
   to the interaction between a user and an application, including the user
   and the application themselves.”
                                      -- Dey and Abowd, 2000

   Context: the interrelated conditions in which something exists or occurs.
                                    -- Merriam-Webster Dictionary

   Specifically, in context-aware computing, we use the term context to refer
   to the circumstances under which a specific computational program is
   being executed, such as the current occupation of the user while some
   device is being used, or the current state of the environment in terms of
   which it can be fully understood and asserted
Examples of Context


                      TIME
  LIGHT                      LOCATION




IDENTITY
                             SOCIAL


           PRESSURE
Context Helps us to do things better
Context influences how we perceive information.

Context enables us to manage the vast amount of
information that surrounds us.

Context guides us through the information surrounding us.

Context allows to discriminate “what is important” and
“what is not” .

Context helps us to adapt to our surroundings.
Context Categorization
Human factors
 – information on the user (knowledge of habits, emotional state,
   biophysiological conditions)
 – the user’s social environment (co-location of others, social interaction,
   group dynamics)
 – and the user’s tasks (spontaneous activity, engaged tasks, general
   goals).

Physical Context
 – Active context: influences the behaviour of the application.
   where active context-awareness autonomously changes the
   application behavior according to the sensed information.

 – Passive context: context that is relevant but not critical.
   Passive context-awareness presents updated context or sensor
   information to the user but lets the user decide how to change the
   application behavior.
Context Categorization
Schilit, Adams, and Want (1994) attempted to define context by
   specifying three categories of context:

   Computing context: For example, network connectivity,
  communication bandwidth,nearby resources like printers, displays;

  User context: For example, user’s profile,location, emotional state,
  people nearby,current activity;

   Physical context: For example, lighting,noise level, traffic
  conditions, temperature

  Some of researchers consider TIME Context as another category.
  (time of the day , month , year )
Context Categorization
Others….

Primary Context :
    More important than others, e.g. location (where),
  identity (who), time (when), and activity (what)



Secondary Context :
  Which can derived from primary contraints, e.g. Distances,
  Relationships
Characteristics of context
Context information exhibits a range of temporal
characteristics

Context information is imperfect

Context has many alternative representations

Context information is highly interrelated
Context Awareness
Computers can both sense, and react based on their environment.

Devices may have information about the circumstances under which they
are able to operate and based on rules, or an intelligent stimulus, react
accordingly.

Context aware devices may also try to make assumptions about the user's
current situation.


The term context-awareness in ubiquitous computing was introduced by
Schilit (1994).

Applications that use context, whether on a desktop or in a mobile or
ubiquitous computing environment, are called context-aware.
Context Awareness
  Remember Past Events

  Reminders for future events
      Using Triggers

  Sharing Experiences


Dey and Abowd (2000) define context awareness more generally with
  the following statement:

A system is context-aware if it uses context to provide relevant
   information and/or services to the user, where relevancy depends
   on the user’s task.
Context Awareness
Thus context-awareness was more or less regarded as synonymous
with adaptivity.

Adaptivity thereby comprises principally:

   Restricting the user interface to the relevant input possibilities and
   relevant data;

   Adapting dynamically to the user’s context how the information is
   presented and how it can be accessed, for example, use of audio
   output instead of visual output if the user is currently driving;

   Automating actions for the user.
Context Aware Computing
Schilit, Adams, & Want (1994) defines “Context-aware
  computing” as

  “software that examines and reacts to an individual’s
        changing context.”

 Means “…aware of its user’s state and surroundings, and help
 to adapt its behavior”
Need For Context Aware (CA) Computing


                 Human to Human
                 communication




Situational                  Past and future events,
information such as
facial expressions,          The existence of other people in
                          the room
Emotions,
                             The process of building this
Voice tone                shared understanding      between
                          two people is called grounding .
Need For Context Aware (CA) Computing


                    Human and Computer
                    communication



Following Tasks Cannot be easily done by Computers :
   Understanding and Interpreting our language
    • We need to be very specific about giving commands
    • OR asking for information

  Cannot sense information about the current situation
  • Sensing Facial expression
  • Presence of other people near by.
Need For Context Aware (CA) Computing


                     Human and Computer
                     communication




   Information is provided to computers, typically using a
keyboard and mouse

   As a result , Producing an effect contrary to the promise of
transparency in Weiser’s vision of ubiquitous computing
Need For Context Aware (CA) Computing

Need of Context in Ubicomp Environment

   Context, critically required in Ubicomp Environment .

   Mobile computing and ubiquitous computing have given users the
expectation that they can access whatever information and services they
want, whenever they want, and wherever they are.

    With computers being used in such a wide variety of situations,
interesting new problems arise, and the need for context is clear: users are
trying to obtain different information from the same services or systems in
different situations.

  Context can be used to help determine what information or services to
make available or to bring to the forefront for users.
Need For Context Aware (CA) Computing

  Input deficiency is resolved, by two basic approaches:

      Improving the language that humans can use to interact with
    Computers

      Increasing the amount of situational information, or context, that is
    made available to computers

   Need for explicitness does exist in human–computer interactions,
because the computer does not share this implicit situational information
or context


   The goal of context-aware computing is to use context as an implicit cue
to enrich the impoverished interaction from humans to computers, making
it easier to interact with computers.
Need For Context Aware (CA) Computing
 Smart phones having great computing power.

 Hi-Speed internet and wireless services.

 Above two makes user’s context more dynamic.

   With ubiquitous computing, users move throughout an environment and
interact with computer-enhanced objects within that environment.

  This also allows them to have access to remote information and services

  Our wearable system contains a radio link that connects the user to
computing resources and services from the Internet.

 The use of context in mobile device is receiving increasing attention in
mobile and ubiquitous computing research.
Context Aware Applications
“A system is context-aware if it uses context to provide
relevant information and/or services to the user, where
relevancy depends on the user’s task.”
E.g. Smart Phones screen goes Brighter when exposed to light
( using photo sensors), And goes dimmer on low battery .

   Some of the
   context Aware
   Apps For
   Android
Context Aware Applications
Architecture

               Context Input




    Explicit   Context Aware   Explicit
    Input       Application    Output
Context Aware Applications
Context-aware applications look at the
 –   who’s,
 –   where’s,
 –   when’s, and
 –   what’s (i.e., what activities are occurring)
of entities and use this information to determine why a situation is
occurring.

An application does not actually determine why a situation is occurring,
but the designer of the application does.



The designer uses incoming context to determine the user’s intent, or why
a situation is occurring, and uses this to encode some action in the
application that helps to satisfy this intent.
Categorization of features CA Applications

 First provided by Schilit et al. (1994) and had two orthogonal
dimensions: whether the task is to obtain information or
to execute a command, and whether the task is executed
manually or automatically.

 Proximate selection applications.

 Automatic contextual applications.

Contextual command applications.

Context triggered actions.
Categorization of features CA Applications

Categorization By

    Pascoe
•   contextual sensing - detect and present to user
•   context adaptation - execute or modify a service automatically
•   contextual resource discovery - locate and exploit resources and services
•   contextual augmentation (associating digital data with user’s context)

    Dey:
•    presentation of information/services to a user according to current
    context
•    automatic execution of a service when in a certain context
•    tagging context to information for later retrieval
Categorization of features CA Applications

Two Major Benefits of Categorization of features

  The first is that it further specifies the types of applications
  that researchers provide support for.

  The second benefit is that it describes the types of features
  that developers should be thinking about when building
  ContextAware applications.
Approach to context-aware application
               development
To collect implicit contextual information through automated
means ( using Sensors , Camera etc .)

Make it easily available to a computer’s runtime
environment,

 And let the application designer decide what information is
relevant and how to deal with it.
Properties of Context Aware “Model/Framework”

Adapt interfaces ( Context sensing and acquisition )

Increase the precision of information retrieval,

Tailor the set of application-relevant data ( Processing,
aggregation and reasoning of contextual data )

Context modeling, representation and storing,

Context-aware application adaptation,
Properties of Context Aware “Model/Framework”


Integration of context-awareness into service-oriented
architectures

Security and privacy of context data,

Discover services
   2G , 3G or Wifi connect to best of available.


Make the user interaction implicit, or build smart
environments.
Example (Google Latitude)

Uses the following ways to locate exact position on Earth
 –   Global Positioning System
 –   Tower Signal INFO
 –   IP address, If wifi connnected .
 –   Digital Compass Signal To show the direction.

Context
 – Location
 – Time

It also shows your Friends location on map, if they are using same
application and sharing location
Example (Google Latitude)




Application Can be written
on top of this , like

location based alarm ,

near friend notifier.
Example (Bump)
Bump two phones together to share
– Photos
– contacts
– apps
Without knowing Email id / IP address.
Bump makes sharing with people as simple as
bumping two phones together.

Context Collected via
– Vibration/motion sensor
– Location detectors (for verification)
Time is most important as context.
Issues and Challenges
  Errors Occurred because of wrong interpretation of
  Context :

When the system does the wrong thing
  – Auto-locking car doors
  – Screen saver during presentation
  – Microphone amplifying a whisper


  In these examples, is the system or the user at fault?
Issues and Challenges
Challenges in Context-Aware Computing
– How to represent context internally? (Storage)
– Data structures and algorithms
– How frequently does the system need to be updated on
  context changes?
– How often to poll? ( in case limited power )
– How often to change behavior?
– What sensors infrastructure, or sensors are necessary?
– What is the fallback condition?
– How to sense location information?
Issues and Challenges
• Issues to Consider when Building Context-Aware
  Applications
   – Context Is a Proxy for Human Intent
   – Context Inferencing
       • is the act of making sense of these input data from sensors and other
         sources, to determine or infer the user’s situation.
   –   Context Ambiguity
   –   “Rules” versus “Machine Learning”
   –   Privacy
   –   Evaluation
   –   End User Issues
       • Understanding of Application’s behavior
       • How much control on application user should have
References
• Handbook of Research on Ubiquitous Computing
  Technology for Real Time Enterprises
         ---Max Mahlhauser, Iryna Gurevych
• Ubiquitous Computing Fundamentals
         ---John Krumm
• Advances in Ubiquitous Computing Future
  Paradigms and Directions
        ----Mostefaoui, Maamar,Giaglis
THANK YOU!!

Weitere ähnliche Inhalte

Was ist angesagt?

Question bank soft computing
Question bank   soft computingQuestion bank   soft computing
Question bank soft computingMohit Singh
 
M2M and IoT Design Methodologies
M2M and IoT Design MethodologiesM2M and IoT Design Methodologies
M2M and IoT Design MethodologiesSelvaraj Seerangan
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representationSravanthi Emani
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I Hemantha Kulathilake
 
Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Pallepati Vasavi
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.SomitSamanto1
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)FabMinds
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networksSi Haem
 
Context model
Context modelContext model
Context modelUbaid423
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 

Was ist angesagt? (20)

Question bank soft computing
Question bank   soft computingQuestion bank   soft computing
Question bank soft computing
 
M2M and IoT Design Methodologies
M2M and IoT Design MethodologiesM2M and IoT Design Methodologies
M2M and IoT Design Methodologies
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Sharpening spatial filters
Sharpening spatial filtersSharpening spatial filters
Sharpening spatial filters
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Issues in knowledge representation
Issues in knowledge representationIssues in knowledge representation
Issues in knowledge representation
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I
 
Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols Classification
 
Unit 4
Unit 4Unit 4
Unit 4
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networks
 
Context model
Context modelContext model
Context model
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 

Ähnlich wie context aware computing

context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptxnassmah
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptxnassmah
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMartin Wolpers
 
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxRunning Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxtodd271
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchKelly Lipiec
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
 
An Operational Definition Of Context
An Operational Definition Of ContextAn Operational Definition Of Context
An Operational Definition Of ContextSandra Valenzuela
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
 
Creating intelligent devices
Creating intelligent devicesCreating intelligent devices
Creating intelligent devicesHåkan Jonsson
 
The empathic companion_a_character-based_interface
The empathic companion_a_character-based_interfaceThe empathic companion_a_character-based_interface
The empathic companion_a_character-based_interfaceCociaPodinaIoanaRoxa
 
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Adrien Joly
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platformdi8it
 
International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)CSCJournals
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...UltraUploader
 

Ähnlich wie context aware computing (20)

context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptx
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptx
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 Nov
 
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docxRunning Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
Running Head CONTEXT IN MOBILE COMPUTING1CONTEXT IN MOBILE C.docx
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing Research
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A review
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
An Operational Definition Of Context
An Operational Definition Of ContextAn Operational Definition Of Context
An Operational Definition Of Context
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
 
Scurtis 2009 Book
Scurtis 2009 BookScurtis 2009 Book
Scurtis 2009 Book
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
Interaction Paradigms
Interaction ParadigmsInteraction Paradigms
Interaction Paradigms
 
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
 
Creating intelligent devices
Creating intelligent devicesCreating intelligent devices
Creating intelligent devices
 
The empathic companion_a_character-based_interface
The empathic companion_a_character-based_interfaceThe empathic companion_a_character-based_interface
The empathic companion_a_character-based_interface
 
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
Tangible Contextual Tag Clouds towards Controlled and Relevant Social Inter...
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platform
 
International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

context aware computing

  • 1. CONTEXT AWARE COMPUTING By Swati A. Sonawane M.E. (SSA)
  • 2. Overview Context Definition Categorization Characteristics Context Awareness Context Aware Computing Need For Context Aware (CA) Computing Context-Aware Application Development Approach Categorization of features Model / Framework Properties Example Issues and Challenges References
  • 4. Google Search Results 2-3 months before : First search result for WHY ? Current Search Complex Searching “ANNA” Shows : First Algorithms Takes Search Result as Following In Anna Kournikova Consideration (Famous Tennis Anna Hajare. Player / Model ) 1. IP based Location 2. Current Activity on Internet Searches 3. Page Ranking etc .. “ CONTEXT ”
  • 5. Context The word context is derived from the Latin “contextus”, which means “connection of words, coherence,” and from contexere “to weave together.” No clear boundary divides what is and is not context. Most interesting kinds of context are those that humans do not explicitly provide. With advances in sensing and automated means of perceiving the physical environment, we can automatically collect much more implicit context.
  • 6. Context ( cont…) SOME OTHER DEFINITIONS …. In the work that first introduces the term context-aware, Schilit and Theimer (1994) refer to context as location, identities of nearby people and objects, and changes to those objects. In a similar definition, Brown et al. (1997) define context as location, identities of the people around the user, the time of day, season, temperature, etc. Ryan et al. (1998) define context as the user’s location, environment, identity, and time. Dey (1998) enumerated context as the user’s emotional state,focus of attention, location and orientation, date and time, and objects and people in the user’s environment. Finally, Pascoe (1998) defines context to be the subset of physical and conceptual states of interest to a particular entity. Context defines some rules of inter-relationship of features in processing any entities as a binding clause.
  • 7. Context ( cont…) FINAL INTERPRETATION “ Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves.” -- Dey and Abowd, 2000 Context: the interrelated conditions in which something exists or occurs. -- Merriam-Webster Dictionary Specifically, in context-aware computing, we use the term context to refer to the circumstances under which a specific computational program is being executed, such as the current occupation of the user while some device is being used, or the current state of the environment in terms of which it can be fully understood and asserted
  • 8. Examples of Context TIME LIGHT LOCATION IDENTITY SOCIAL PRESSURE
  • 9. Context Helps us to do things better Context influences how we perceive information. Context enables us to manage the vast amount of information that surrounds us. Context guides us through the information surrounding us. Context allows to discriminate “what is important” and “what is not” . Context helps us to adapt to our surroundings.
  • 10. Context Categorization Human factors – information on the user (knowledge of habits, emotional state, biophysiological conditions) – the user’s social environment (co-location of others, social interaction, group dynamics) – and the user’s tasks (spontaneous activity, engaged tasks, general goals). Physical Context – Active context: influences the behaviour of the application. where active context-awareness autonomously changes the application behavior according to the sensed information. – Passive context: context that is relevant but not critical. Passive context-awareness presents updated context or sensor information to the user but lets the user decide how to change the application behavior.
  • 11. Context Categorization Schilit, Adams, and Want (1994) attempted to define context by specifying three categories of context: Computing context: For example, network connectivity, communication bandwidth,nearby resources like printers, displays; User context: For example, user’s profile,location, emotional state, people nearby,current activity; Physical context: For example, lighting,noise level, traffic conditions, temperature Some of researchers consider TIME Context as another category. (time of the day , month , year )
  • 12. Context Categorization Others…. Primary Context : More important than others, e.g. location (where), identity (who), time (when), and activity (what) Secondary Context : Which can derived from primary contraints, e.g. Distances, Relationships
  • 13. Characteristics of context Context information exhibits a range of temporal characteristics Context information is imperfect Context has many alternative representations Context information is highly interrelated
  • 14. Context Awareness Computers can both sense, and react based on their environment. Devices may have information about the circumstances under which they are able to operate and based on rules, or an intelligent stimulus, react accordingly. Context aware devices may also try to make assumptions about the user's current situation. The term context-awareness in ubiquitous computing was introduced by Schilit (1994). Applications that use context, whether on a desktop or in a mobile or ubiquitous computing environment, are called context-aware.
  • 15. Context Awareness Remember Past Events Reminders for future events Using Triggers Sharing Experiences Dey and Abowd (2000) define context awareness more generally with the following statement: A system is context-aware if it uses context to provide relevant information and/or services to the user, where relevancy depends on the user’s task.
  • 16. Context Awareness Thus context-awareness was more or less regarded as synonymous with adaptivity. Adaptivity thereby comprises principally: Restricting the user interface to the relevant input possibilities and relevant data; Adapting dynamically to the user’s context how the information is presented and how it can be accessed, for example, use of audio output instead of visual output if the user is currently driving; Automating actions for the user.
  • 17. Context Aware Computing Schilit, Adams, & Want (1994) defines “Context-aware computing” as “software that examines and reacts to an individual’s changing context.” Means “…aware of its user’s state and surroundings, and help to adapt its behavior”
  • 18. Need For Context Aware (CA) Computing Human to Human communication Situational Past and future events, information such as facial expressions, The existence of other people in the room Emotions, The process of building this Voice tone shared understanding between two people is called grounding .
  • 19. Need For Context Aware (CA) Computing Human and Computer communication Following Tasks Cannot be easily done by Computers : Understanding and Interpreting our language • We need to be very specific about giving commands • OR asking for information Cannot sense information about the current situation • Sensing Facial expression • Presence of other people near by.
  • 20. Need For Context Aware (CA) Computing Human and Computer communication Information is provided to computers, typically using a keyboard and mouse As a result , Producing an effect contrary to the promise of transparency in Weiser’s vision of ubiquitous computing
  • 21. Need For Context Aware (CA) Computing Need of Context in Ubicomp Environment Context, critically required in Ubicomp Environment . Mobile computing and ubiquitous computing have given users the expectation that they can access whatever information and services they want, whenever they want, and wherever they are. With computers being used in such a wide variety of situations, interesting new problems arise, and the need for context is clear: users are trying to obtain different information from the same services or systems in different situations. Context can be used to help determine what information or services to make available or to bring to the forefront for users.
  • 22. Need For Context Aware (CA) Computing Input deficiency is resolved, by two basic approaches: Improving the language that humans can use to interact with Computers Increasing the amount of situational information, or context, that is made available to computers Need for explicitness does exist in human–computer interactions, because the computer does not share this implicit situational information or context The goal of context-aware computing is to use context as an implicit cue to enrich the impoverished interaction from humans to computers, making it easier to interact with computers.
  • 23. Need For Context Aware (CA) Computing Smart phones having great computing power. Hi-Speed internet and wireless services. Above two makes user’s context more dynamic. With ubiquitous computing, users move throughout an environment and interact with computer-enhanced objects within that environment. This also allows them to have access to remote information and services Our wearable system contains a radio link that connects the user to computing resources and services from the Internet. The use of context in mobile device is receiving increasing attention in mobile and ubiquitous computing research.
  • 24. Context Aware Applications “A system is context-aware if it uses context to provide relevant information and/or services to the user, where relevancy depends on the user’s task.” E.g. Smart Phones screen goes Brighter when exposed to light ( using photo sensors), And goes dimmer on low battery . Some of the context Aware Apps For Android
  • 25. Context Aware Applications Architecture Context Input Explicit Context Aware Explicit Input Application Output
  • 26. Context Aware Applications Context-aware applications look at the – who’s, – where’s, – when’s, and – what’s (i.e., what activities are occurring) of entities and use this information to determine why a situation is occurring. An application does not actually determine why a situation is occurring, but the designer of the application does. The designer uses incoming context to determine the user’s intent, or why a situation is occurring, and uses this to encode some action in the application that helps to satisfy this intent.
  • 27. Categorization of features CA Applications First provided by Schilit et al. (1994) and had two orthogonal dimensions: whether the task is to obtain information or to execute a command, and whether the task is executed manually or automatically. Proximate selection applications. Automatic contextual applications. Contextual command applications. Context triggered actions.
  • 28. Categorization of features CA Applications Categorization By Pascoe • contextual sensing - detect and present to user • context adaptation - execute or modify a service automatically • contextual resource discovery - locate and exploit resources and services • contextual augmentation (associating digital data with user’s context) Dey: • presentation of information/services to a user according to current context • automatic execution of a service when in a certain context • tagging context to information for later retrieval
  • 29. Categorization of features CA Applications Two Major Benefits of Categorization of features The first is that it further specifies the types of applications that researchers provide support for. The second benefit is that it describes the types of features that developers should be thinking about when building ContextAware applications.
  • 30. Approach to context-aware application development To collect implicit contextual information through automated means ( using Sensors , Camera etc .) Make it easily available to a computer’s runtime environment, And let the application designer decide what information is relevant and how to deal with it.
  • 31. Properties of Context Aware “Model/Framework” Adapt interfaces ( Context sensing and acquisition ) Increase the precision of information retrieval, Tailor the set of application-relevant data ( Processing, aggregation and reasoning of contextual data ) Context modeling, representation and storing, Context-aware application adaptation,
  • 32. Properties of Context Aware “Model/Framework” Integration of context-awareness into service-oriented architectures Security and privacy of context data, Discover services 2G , 3G or Wifi connect to best of available. Make the user interaction implicit, or build smart environments.
  • 33. Example (Google Latitude) Uses the following ways to locate exact position on Earth – Global Positioning System – Tower Signal INFO – IP address, If wifi connnected . – Digital Compass Signal To show the direction. Context – Location – Time It also shows your Friends location on map, if they are using same application and sharing location
  • 34. Example (Google Latitude) Application Can be written on top of this , like location based alarm , near friend notifier.
  • 35. Example (Bump) Bump two phones together to share – Photos – contacts – apps Without knowing Email id / IP address. Bump makes sharing with people as simple as bumping two phones together. Context Collected via – Vibration/motion sensor – Location detectors (for verification) Time is most important as context.
  • 36. Issues and Challenges Errors Occurred because of wrong interpretation of Context : When the system does the wrong thing – Auto-locking car doors – Screen saver during presentation – Microphone amplifying a whisper In these examples, is the system or the user at fault?
  • 37. Issues and Challenges Challenges in Context-Aware Computing – How to represent context internally? (Storage) – Data structures and algorithms – How frequently does the system need to be updated on context changes? – How often to poll? ( in case limited power ) – How often to change behavior? – What sensors infrastructure, or sensors are necessary? – What is the fallback condition? – How to sense location information?
  • 38. Issues and Challenges • Issues to Consider when Building Context-Aware Applications – Context Is a Proxy for Human Intent – Context Inferencing • is the act of making sense of these input data from sensors and other sources, to determine or infer the user’s situation. – Context Ambiguity – “Rules” versus “Machine Learning” – Privacy – Evaluation – End User Issues • Understanding of Application’s behavior • How much control on application user should have
  • 39. References • Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises ---Max Mahlhauser, Iryna Gurevych • Ubiquitous Computing Fundamentals ---John Krumm • Advances in Ubiquitous Computing Future Paradigms and Directions ----Mostefaoui, Maamar,Giaglis