Knowledge Usability and Its Characteristics For Pe

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/221228355

Knowledge Usability and its Characteristics for Pervasive Computing.

Conference Paper · January 2005


Source: DBLP

CITATIONS READS
21 391

3 authors:

Shameem Ahmed Moushumi Sharmin


Western Washington University Western Washington University
40 PUBLICATIONS 459 CITATIONS 60 PUBLICATIONS 1,056 CITATIONS

SEE PROFILE SEE PROFILE

Sheikh Iqbal Ahamed


Marquette University
139 PUBLICATIONS 1,874 CITATIONS

SEE PROFILE

All content following this page was uploaded by Moushumi Sharmin on 13 May 2014.

The user has requested enhancement of the downloaded file.


Knowledge Usability and its Characteristics for
Pervasive Computing
Shameem Ahmed, Moushumi Sharmin, and Sheikh I. Ahamed
Department of Mathematics, Statistics, and Computer Science
Marquette University
Milwaukee, Wisconsin, U.S.A.

Abstract - This paper appends a new thread to the must be considered. In that case, the previous
attributes of user applications running in the pervasive features can be extended to include a fourth one
computing environment. This thread, the core of our termed Knowledge Usability which means the
scheme, is named Knowledge Usability. Context- analysis of the user's information to make an
sensitivity, Situation-awareness and Ad hoc
appropriate decision.
communication; the discussed features of the user
applications till date, are inadequate to analyze the Since the information about the user’s past, present,
knowledge related to the user. The concept of “Knowledge and future are all part of a certain situation, someone
Usability” is derived to eliminate those limitations. This might be perplexed about the novelty of Knowledge
feature does not deny the importance of others; it goes Usability. However, to date, the situation is described
side by side with the existing ones to facilitate the user from a different outlook. Dey [4] described situation
needs. Moreover, we discuss the necessity of Knowledge as a description of the states of relevant entities. S.
Usability in pervasive computing environment with some Yau et al. [3] considered user’s location, light, time
day-to-day life illustrative examples. etc. as context as well as situation; they did not
include any specific behavioral pattern of a particular
Keywords: Pervasive computing, Context-awareness,
Knowledge Usability. user in a similar type of situation. This compels the
inclusion of a new branch that deals with user-
oriented knowledge.
1.0 Introduction In Section 2, Knowledge, Knowledge Usability and
Pervasive computing environments mainly focus on its characteristics are described along with some
integrating computing and communications with the scenarios to show why the currently considered
surrounding physical environment to make features fail to accomplish user’s needs where
computing and communications transparent to the Knowledge Usability never fails. Section 3 deals
users. There are three characteristics of user with algorithms to mine and store the knowledge. In
applications in a typical pervasive computing section 4, we illustrate an example that follows those
environment [1]. Those are: Context-sensitivity, Ad algorithms. In section 5, we concentrate on the
hoc Communication, and Situation-awareness [2, 3]. current state of the art. Section 6 contains our future
The ability of a device to sense its present context direction and concluding remarks.
and changes in contextual data is called Context-
sensitivity; with the change of contexts, mobility of 2.0 Knowledge Usability
devices and availability of resources, the
instantaneous establishment and termination of the 2.1 Notion of Knowledge Usability
communication channel among the applications is
called Ad hoc communication; a device’s capability Knowledge, with respect to application running on
not only to capture but also to analyze the user (U) device, is a set of activity states (α1, α2, α3,
relationship among multiple contexts and actions α4,..) of U where αi (i>=1) represents U’s
over a span of time is termed Situation-awareness. preferences. Knowledge Usability (Ku) is nothing but
According to S. Yau et al. [3], these three properties an autonomous technique to not only determine αi
are sufficient to describe all the user applications in but also analyze it to decide U’s appropriate action at
pervasive computing. But there are some applications a particular time. In formal definition,
where the user’s past, present and future knowledge KU = M ({Pa, Pr, Fu}, t, c),
where, M means Mechanism, {Pa, Pr, Fu} means monetary perspective. It will, additionally, provide
{User’s Past, Present, and Future Information}, t the driving direction to that shop. Figure 2 shows this
means time, and c means the current context. scenario.
1 2 3 4 5 6 7
2.2 Uses of Knowledge about Past (Pa)
If the system has knowledge about the user’s daily
activities then it can provide good quality
information at times of need. For example, if a
person takes coffee around 5 pm daily then the
system can store this information and use it when
necessary. Suppose one day the user is in front of E C
Lake Michigan and the time is about 5 pm then the
system can search for coffee shops reachable in a few Figure 3. Suggesting the shortest path
minutes and provide the user this information. The system will also propose the user to start from a
particular aisle in the selected shop to minimize the
shop1
shopping time. The suggested path inside the shop is
Shopping shown in figure 3. The item list that the user needs to
centre 1
shop2 buy includes coffee, some gift items, plants, and a
User is inside
PDA is suggesting
shop
Outdoor • Go to aisle # 1 for coffee
mall 1 • Go straight & then right
shop 3
for gift item in aisle # 2
• Go straight for flowers in
aisle # 5
Figure 1. Selecting shops • Turn right and go straight
in aisle # 6 for table
• Pay in cash counter in
2.3 Uses of Knowledge about Present (Pr) PDA aisle # 7

Suppose a user is going to a shop to buy various


items. If the item list is provided to the system, it can Enlarged PDA Screen
consult the shop’s database. Then it can suggest the
Figure 4. PDA suggesting direction within the shop
user how to shop to not only minimize the shopping
time but also help him to find the appropriate thing. table. Considering the aisle plan of the shop and the
• Pick shop 3 needed items, the system suggests him to start with
• Go straight up to 2nd aisle 1, then go to aisle 2, next head to aisle 5 and 6.
junction and turn left
• Go straight up to next E and C represent the entrance and cash counter in
junction
• Turn left and go up to figure 3. The user will ignore aisle number 3 and 4 as

next junction
Turn right and go straight
these aisles contain electronic goods that he does not
PDA to shop 3 intend to buy now. The sequence of shopping plan
offered by the system is rendered in figure 4.

Enlarged PDA Screen 2.4 Uses of Knowledge about Future (Fu)


Figure 2. PDA suggesting driving directions to the shop
The user’s schedule can be very useful for the
In figure 1, from user’s current location, there are system. For example, the user is walking towards a
three shops, one shopping centre, and one outdoor room and the system knows that he is going to a
mall. Shopping centre 1 is the closest one and shop 3 meeting (consulting the To-Do list) where the ringer
is the farthest. The system collects the location of a cell phone will not be appreciated. At the
information, consults the databases for item moment the user enters the room, the system will
availability and item price. After analyzing all change the mode of cell phone to “text-message and
relevant information, it will suggest the user to go to
shop 3, which is most economic from time and
Communicates with
3.4 Knowledge Storing
Cell Phone

Cell Phone Vibrates All gathered information can be stored in a device


with huge storage capacity (e.g. desktop PC). A part
of it needs to be stored in the mobile device. To cope
with the memory constraint, the mobile devices
should have some optimization capability. A matrix
PDA
based knowledge dissemination approach can be
Figure 5. PDA changes the ringer -mode used in this regard. The dimensions of the two
voice-message” and turn the ringer off. This scenario dimensional matrix represents the time frame of each
is presented in figure 5. Again the system can restore day and days of the week. Each cell of the matrix
the ringer mode as soon as the user leaves the points out a specific user task. A standard will be
meeting room. However, to support all these things, used to assign number for each typical activity. The
it needs to know the future schedule of the user. irregular task (user dependent) will be allocated some
other pre-specified number. The concept of number
is introduced to guarantee the best possible use of the
2.5 Characteristics of Knowledge Usability
storage capacity. For example, the regular tasks like
To incorporate the concept of Knowledge Usability taking lunch, attending a meeting, buying groceries
in applications, some knowledge centric features will have the number like 1, 2, 3, and so on. Taking
along with context-oriented characteristics should be piano lessons, a very user centric activity, should
addressed. The important features of knowledge have some pre-specified number like 500. Mapping
usability include knowledge adaptability, multi-hop, of numbers with activities should be distributed in all
energy efficiency, and storage efficiency and the devices of close proximity. It will ensure the
other significant ones will come from context optimum storage utilization of all the devices. The
awareness namely accessibility, consistency, matrix will be dispersed (if it is very large) among
security, fault tolerance, scalability, transparency etc. other devices residing in the same ad-hoc network.

3.0 Knowledge Mining and Storing 4.0 An Illustrative Example


Suppose Sam and John have a meeting with Dr.
3.1 Pa accumulation algorithm
Simms at 1:00 pm at Friday and all the necessary
L1. Arrange user’s activity X day wise to get Y,
documents are stored in Sam’s desktop PC. At 10:00
user’s daily activity for one month
am, John informs Sam that they will have to attend a
L2. Cluster Y and search for general pattern of user
presentation where people from multiple disciplines
activities to find Z, user’s weekly activity
will come. So Sam has to go to the presentation place
L3. Store all those information categorically in Pa
immediately. The system running on Sam’s device
knows about his schedule and also knows that Sam
3.2 Pr accumulation algorithm would not be able to return before 1:00 pm. So the
L1. pr_info ={ } // the present information set system will upload all the necessary documents for
L2. pr_info += { Context} the meeting from the PC. Pa accumulation algorithm
L3. pr_info += {N} // collected information is used in this regard. To add the information that
L4. pr_info+={U} // information provided by U Sam will have to attend a presentation at 10:30 am, it
L5. Store pr_info in Pr uses the Pr accumulation algorithm. At 12:45 pm, if
the presentation goes on and the meeting place is 10
3.3 Fu accumulation algorithm
minutes driving distance from the presentation place
L1. fu_info ={ } // future information set
then the system will suggest the user to choose either
L2. fu_info += {TD}//To-Do List
the presentation or the meeting based on the priority
L3. If TD collides Pa then Pb={Pa-collide Activity}
which follows Fu accumulation algorithm.
else Pb = Pa
L4. fu_info += {Pb} 5.0 Current State of the Art
L6. Store fu_info in Fu
Cheverst et al. in their Guide [5] system uses location
to provide service to the user. Chen et al. 7.0 References
differentiate the applications based on whether the
application changes its behavior depending on the [1] M. Weiser. “Some Computer Science Problems in
context [6]. Schmidt et al. defined context as the Ubiquitous Computing”. Communications of the
knowledge about the user’s and IT devices state [7]. ACM, 36(7): 75--85, July 1993.
But our definition of Knowledge includes all relevant
and important information about the user’s schedule, [2] G. Abowd, and E.D Mynatt. “Charting Past,
preference etc. Present, and Future Research in Ubiquitous
Opportunity Knock system of D. J. Patterson et al. Computing”. ACM Trans. Computer Human
[8] is based on a combined architecture made up of a Interaction, 7(1): 29--58, Mar 2000.
Bluetooth sensor beacon that broadcasts GPS data, a
GPRS-enabled cell-phone, and remote activity [3] S. Yau, Y. Wang, and F. Karim. “Development of
inference software. The system copes with its Situation-Aware Application Software for
activities through remote communication with a Ubiquitous Computing Environments”. Proceedings
remote database, which is not suitable for ad-hoc of Computer Software and Application Conf., 233--
network. We propose matrix based knowledge 238, 2002.
dissemination approach that not only ensures the ad-
hoc nature of the network but also copes with the [4] A. K. Dey. “Understanding and Using Context”.
memory constraints. Personal and Ubiquitous Computing Journal 5(1): 4--
A personal assistant named Specter [9] is designed 7, 2001.
which keeps track of the user's actions and affective
states. But their focus is different from ours as they [5] K. Cheverst, N. Davies, K. Mitchell, A. Friday,
deal with extension of perception, learning about and C. Efstratiou. “Developing a Context-Aware
behavior and affect, augmentation of decision- Electronic Tourist Guide: Some Issues and
making and effecting, reflection and introspection, Experiences”. Proceedings of the 2000 Conference
usability engineering, and system integration. on Human Factors in Computing Systems, Hague,
Netherlands, 17--24, Apr 2000.
6.0 Discussions and Future Work
[6] G. Chen and D. Kotz. “A survey of context
In this paper, Knowledge Usability, an aware mobile computing research”. Dartmouth
imperative yet ignored feature till date, is Computer Science Technical Report TR2000-381.
appended as the fourth characteristic of the
applications running in a pervasive computing [7] A. Schmidt, K. Aidoo, A. Takaluoma, U.
environment. Besides, the characteristics of this new Tuomela, K. V. Laerhoven, and W. V. Velde.
thread are also addressed. We have also tried to “Advanced interaction in context”. Proceedings of
provide different dimensions as well as the First International Symposium on Handheld and
motivation to adopt the new concept. Ubiquitous Computing. 89--101, Sep 1999.
Currently, we are implementing this Knowledge
Usability as a service of our ongoing middleware [8] D. J. Patterson, L. Liao, K. Gajos, M. Collier, N.
project named MARKS (Middleware adaptability for Livic, K. Olson, S. Wang, D. Fox, and H. Kautz.
resource discovery, knowledge usability and self- “Opportunity Knocks: a System to Provide Cognitive
healing) on pocket PCs (Dell Axiom 30) using C# Assistance with Transportation”. Proceedings of
on .NET Compact framework. We are implementing sixth international conference on Ubiquitous
some applications for PDAs, which will use the Computing. Nottingham, England, Sep 2004.
“Knowledge Usability” as a service. To distribute
knowledge in a secured manner and to protect the [9] SPECTER: Context- and Affect-Aware Personal
privacy of the user’s information, the concept of Assistance in Instrumented Environments.
“secret sharing” will be used. To increase the level of
adaptability of the application in different situations,
the hidden markov model concept will be employed.

View publication stats

You might also like