180 likes | 362 Views
Location based System for mobile GSM devices. Using services from the PATS-Lab Program for advanced telecom services. Overview. Objectives. Explore the technology What have been done in the past Implement a Location Based system
E N D
Location based System for mobile GSM devices Using services from the PATS-Lab Program for advanced telecom services
Objectives • Explore the technology • What have been done in the past • Implement a Location Based system • Look at articles on the subject (context aware, location, mobile) • What are the possibilities
Exploring the technology • How is GSM positioning done • How accurate is it • Pros and contras • How to combine telecom network with ip • Different API’s • Map data • Automatic Call setup based on context
What have been done? • Lots of interesting services have been developed • AMIGOS, Sheep Location, Children Guard, Rental Service, Emergency Alarm…..
Implement a Location based system • Develop a system in Java • Experiment with services • Object tracker, for instance: Locate your lost dog, Get an alarm when your son is down town at 03.00 Saturday night, or not if his older brother is there too • Explore the Parlay (x) API
Context Aware Traffic News Fig: ActorFrame Developers guide, G.Melby
Articles • Context-Aware Communication • Wearable Computing Meets Ubiquitous Computing
Context-Aware Communication • How the changing information about an individual’s location,environment andsocial situation can be used to initiate and facilitate people’s interactions with one another. • Autonomy regarding: Context sensing and Communication action • Design issues
Context-Aware Communication • Applications examines and react to a user’ s changing context in order to help promote and mediate people’s interactions with each other and their environment • Applications that apply knowledge of people’s context to reduce communication barriers • Subset of context-aware computing • The line is not always clear
Context-Aware Communication Not obvious that application designers should simultaneously try to maximize autonomy in both dimensions since this removes human common sense. (Tom Erickson: At best awfully hard to implement) Looks at five different applications, organized functionally: Routing, addressing, messaging, providing caller awareness and screening Receptionist assistant and Ether-phone
Context-Aware Communication • Improving relevance • Minimizing disruption • Improving awareness • Reducing overload • Selecting channels
Wearable Computing Meets Ubiquitous Computing • Two different paradigms • Wearable: Problems with localized information, resource control and resource management between multiple people • Ubiquitous: Problems with privacy and personalization • Solution: Peer-to-peer network, mix of the two. HIVE distributed agent architecture
Wearable Computing Meets Ubiquitous Computing Ubiquitous computing in the purest form, all computation is contained in the environment Privacy risk: Potential leak from systems Personalized information: Worst case, every time a person joins a work-group Profile must be added to every device Wearable computing, all computation is handled by the wearable Localized information: Maintaining information Localized control:More CPU power, network demands, needs code to control devices Resource management: Wants more intelligent system than simply allowing the last request
Wearable Computing Meets Ubiquitous Computing • Automatic diary (PR) • Proximate Selection of Big Screen Display (PR,LR) • Theme Music (PR,PE,LR) • DJ (PR,PE,LR,RM) • Remembrance Agent (PR,PE,LI) • Context-aware alert filtering (PR,PE,LI) • “Where’s Brad?” (PR,PE,LR)