46 research outputs found

    Multi-Sensor Context-Awareness in Mobile Devices and Smart Artefacts

    Get PDF
    The use of context in mobile devices is receiving increasing attention in mobile and ubiquitous computing research. In this article we consider how to augment mobile devices with awareness of their environment and situation as context. Most work to date has been based on integration of generic context sensors, in particular for location and visual context. We propose a different approach based on integration of multiple diverse sensors for awareness of situational context that can not be inferred from location, and targeted at mobile device platforms that typically do not permit processing of visual context. We have investigated multi-sensor context-awareness in a series of projects, and report experience from development of a number of device prototypes. These include development of an awareness module for augmentation of a mobile phone, of the Mediacup exemplifying context-enabled everyday artifacts, and of the Smart-Its platform for aware mobile devices. The prototypes have been explored in various applications to validate the multi-sensor approach to awareness, and to develop new perspectives of how embedded context-awareness can be applied in mobile and ubiquitous computing

    Supporting Device Discovery and Spontaneous Interaction with Spatial References

    Get PDF
    The RELATE interaction model is designed to support spontaneous interaction of mobile users with devices and services in their environment. The model is based on spatial references that capture the spatial relationship of a user’s device with other co-located devices. Spatial references are obtained by relative position sensing and integrated in the mobile user interface to spatially visualize the arrangement of discovered devices, and to provide direct access for interaction across devices. In this paper we discuss two prototype systems demonstrating the utility of the model in collaborative and mobile settings, and present a study on usability of spatial list and map representations for device selection

    Sensing and visualizing spatial relations of mobile devices

    Get PDF
    Location information can be used to enhance interaction with mobile devices. While many location systems require instrumentation of the environment, we present a system that allows devices to measure their spatial relations in a true peer-to-peer fashion. The system is based on custom sensor hardware implemented as USB dongle, and computes spatial relations in real-time. In extension of this system we propose a set of spatialized widgets for incorporation of spatial relations in the user interface. The use of these widgets is illustrated in a number of applications, showing how spatial relations can be employed to support and streamline interaction with mobile devices

    A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data

    Get PDF
    The profusion of wireless enabled mobile devices in daily life routine and advancement in pervasive computing has opened new horizons to analyse and model the contextual information. This contextual information (for example, proximity data and location information) can be very helpful in analysing the human behaviours. Wireless proximity data can provide important information about the behaviour and daily life routines of an individual. In this paper, we used Bluetooth proximity data to validate this concept by detecting repeated activity patterns and behaviour of low entropy mobile people by using n-gram and correlative matrix techniques. Primary purpose is to find out whether contextual information obtained from Bluetooth proximity data is useful for activities and behaviour detection of individuals. Repeated patterns found in Bluetooth proximity data can also show the long term routines such as, monthly or yearly patterns in an individual's daily life that can further help to analyse more complex and abnormal routines of human behaviour

    Remote health monitoring systems for elderly people: a survey

    Get PDF
    This paper addresses the growing demand for healthcare systems, particularly among the elderly population. The need for these systems arises from the desire to enable patients and seniors to live independently in their homes without relying heavily on their families or caretakers. To achieve substantial improvements in healthcare, it is essential to ensure the continuous development and availability of information technologies tailored explicitly for patients and elderly individuals. The primary objective of this study is to comprehensively review the latest remote health monitoring systems, with a specific focus on those designed for older adults. To facilitate a comprehensive understanding, we categorize these remote monitoring systems and provide an overview of their general architectures. Additionally, we emphasize the standards utilized in their development and highlight the challenges encountered throughout the developmental processes. Moreover, this paper identifies several potential areas for future research, which promise further advancements in remote health monitoring systems. Addressing these research gaps can drive progress and innovation, ultimately enhancing the quality of healthcare services available to elderly individuals. This, in turn, empowers them to lead more independent and fulfilling lives while enjoying the comforts and familiarity of their own homes. By acknowledging the importance of healthcare systems for the elderly and recognizing the role of information technologies, we can address the evolving needs of this population. Through ongoing research and development, we can continue to enhance remote health monitoring systems, ensuring they remain effective, efficient, and responsive to the unique requirements of elderly individuals

    Real-Time Context-Aware Computing with Applications in Civil Infrastructure Systems.

    Full text link
    This dissertation contributes a structured understanding of the fundamental processes involved in developing context-aware computing applications for the civil infrastructure industry. The civil infrastructure industry is characterized by mobile human and machine agents actively engaged in real-time decision-making tasks in a dynamic and unstructured workspace environment. This distinguishes context-aware computing from other computing technologies in three aspects: 1) it has the ability to perceive, interpret, and adapt to the agent’s evolving workspace; 2) It streamlines project data and presents the agent with information pertinent to its context, thus eliminating the agent’s tasks to accomplish the same; 3) By leveraging contextual information, it supplements decision-making tasks in real-time. This research has successfully investigated technical approaches to address fundamental aspects of introducing context-aware applications to civil engineering, including: the ubiquitous localization of mobile agents in dynamic, unstructured environments; abstraction of the spatial-context and identifying the objects of interest to the agent; and the suitability of using standard models to manage and organize data for context-aware computing applications. A computational framework for designing context-aware applications to support real-time decision-making has also been implemented. The framework allows researchers and other end users to leverage currently available context-sensing technology to design and implement innovative solutions to domain specific problems. The researched methods have been validated through several experiments conducted at the University of Michigan, the National Institute of Standards and Technology, and the Michigan Department of Transportation. These experiments have resulted in the implementation of several applications – to support real-life decision-making tasks – that not only serve to illustrate the usefulness of the framework, but also have significant social and economic implications. Among these applications are the controlled drilling system that warns drilling personnel when the drill bit tip is about to strike rebar or utility lines, thus helping preserve the structural integrity of concrete decks and preventing utility strike accidents; an automated fault detection system that diagnoses faulty components of an underperforming HVAC distribution network; and an innovative bridge inspection solution that supports condition assessment decision-making, thus introducing objectivity to visual condition assessment by providing concurrence with the Structural Health Monitoring data.PhDCivil EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/99816/1/akulaman_1.pd

    Private and censorship-resistant communication over public networks

    Get PDF
    Society’s increasing reliance on digital communication networks is creating unprecedented opportunities for wholesale surveillance and censorship. This thesis investigates the use of public networks such as the Internet to build robust, private communication systems that can resist monitoring and attacks by powerful adversaries such as national governments. We sketch the design of a censorship-resistant communication system based on peer-to-peer Internet overlays in which the participants only communicate directly with people they know and trust. This ‘friend-to-friend’ approach protects the participants’ privacy, but it also presents two significant challenges. The first is that, as with any peer-to-peer overlay, the users of the system must collectively provide the resources necessary for its operation; some users might prefer to use the system without contributing resources equal to those they consume, and if many users do so, the system may not be able to survive. To address this challenge we present a new game theoretic model of the problem of encouraging cooperation between selfish actors under conditions of scarcity, and develop a strategy for the game that provides rational incentives for cooperation under a wide range of conditions. The second challenge is that the structure of a friend-to-friend overlay may reveal the users’ social relationships to an adversary monitoring the underlying network. To conceal their sensitive relationships from the adversary, the users must be able to communicate indirectly across the overlay in a way that resists monitoring and attacks by other participants. We address this second challenge by developing two new routing protocols that robustly deliver messages across networks with unknown topologies, without revealing the identities of the communication endpoints to intermediate nodes or vice versa. The protocols make use of a novel unforgeable acknowledgement mechanism that proves that a message has been delivered without identifying the source or destination of the message or the path by which it was delivered. One of the routing protocols is shown to be robust to attacks by malicious participants, while the other provides rational incentives for selfish participants to cooperate in forwarding messages
    corecore