1 / 19

Outline

Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F. Siegemund and C. Florkemeier Outline Introduction Interaction with Smart Objects classification 3 Scenarios Technical Realization

johana
Download Presentation

Outline

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003F. Siegemund and C. Florkemeier

  2. Outline • Introduction • Interaction with Smart Objects • classification • 3 Scenarios • Technical Realization • Conclusions

  3. Introduction • What equipments? • Passive RFID • Unobtrusive Bluetooth-enabled active tags • Mobile phones • Smart objects: • objects with RFID tags • objects that can interact with human • Goal: how human interact with these devices and smart objects

  4. Interaction with Smart Objects • initiated by users: • user has to have the intention • user has to address the smart object • explicit: • push bottom, voice control, etc. • implicit: • a person approaching an automatic door, a movement in the range of an automatic light switch, a specific medicine being removed from a medicine cabinet. • Initiated by smart objects: • predefined rules: • a simple notification service: whom to contact under what conditions • implicit: • a simple notification service: a smart object would try to find who is in its vicinity

  5. Classification of Interaction

  6. Scenario 1: Smart Product Monitoring

  7. Design Objectives • An egg carton to represent a fragile object. • Augmented function: • to detect whenever it is dropped • to detect whenever it is not stored within the appropriate temperature • goal: • monitor the object unobtrusively • associate the appropriate contact person without explicit manual pre-configuration

  8. Devices • BT node • sensor board: • temperature sensor • acceleration sensor • Context-aware: • sensing of a context change (e.g., broken eggs) will trigger the alarm to the user via SMS (short messages) • The SMS also contains a sequence of commands that allow the user to interact with the smart object. (See next page.)

  9. Which Person (phone number) to Contact? • User’s GSM phone is attached with a RFID tag • which can be read by an RFID reader in the vicinity of the smart object • Inside the RFID tag, it describes how the user can be contacted (either a phone number, or a PDA). • This information is broadcast to the BT node in the egg cartons.

  10. Scenario 2: Remote Interaction with Smart Objects and Locations • Each smart object is associated with a phone number. • Users can use SMS to remotely interact with these smart objects. • Example: • querying a smart office (next page)

  11. Challenges • Users do not want to memorize all the phone numbers. • Users do not want to install all these SMS templates. • Solutions: • phone books and SMS templates are predefined as interaction stubs in smart objects. • Through BT, an interaction stub is downloaded to a mobile phone depending on how long and how often he/she stays in that smart office.

  12. Scenario 3: Smart Medicine Cabinet • goal: • reminding people to take some medicine • check availability of some medicine • out-of-date drugs, product recalls • Smart cabinet: • RFID tags (on drugs), RFID reader, and an active BT node (see next page)

  13. Design Details • The RFID reader checks information of medicine and user’s prescription. • Drug usage is determined by appearance/disappearance of a tag and approaching of a user (with BT-enabled GSM phone). • This information is sent to a remote virtual counterpart, which contains the user’s prescription. • Through GSM, when the user is nearby. • Alarm to take a medication: • installed inside the user’s mobile phone, which will check with the virtual counterpart. • see next page.

  14. Conclusions • Smart objects • How to reduce interactions with smart objects, without losing necessary interactions? • invisible pre-selection • 3 interesting scenarios • Homework: • technical realization? • Can you come up with more interesting scenarios of smart objects?

More Related