Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

download Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

of 10

Transcript of Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    1/10

    Ubiquitous computing enabling greater cooperation

    among members of a familyRoushdat Elaheebocus

    School of Electronics and Computer

    ScienceUniversity of [email protected]

    ABSTRACTThe scenario is set in the year 2020. A decade ago major

    technological breakthroughs caused speculations about whether

    technology, specially computer-science related, was really our ally

    or foe, whether it would tear the society apart or bring us closer

    together. In this paper we go through one of these possible

    outcomes to demonstrate how large scale distributed and

    ubiquitous computing systems enables more cooperation among

    individuals, specially members of a family. The Echelon familyconsists of four members that we will follow during a day in their

    normal life.

    KeywordsDistributed systems, ubiquitous computing, family, futurology

    1. INTRODUCTION

    While many researchers have produced research work based on

    smart-homes [1, 2, 3, 4] or ubiquitous devices, few have focussed

    on the cooperation among individuals that such pervasive and

    distributed systems will enable. Based on Mark Weiser's

    ubiquitous computing vision [5] of a world where individuals

    seamlessly interact with computers just like they breathe-in airwithout realising the mechanism behind, we present the

    cooperation that pervasive technologies will make possible among

    individuals, in this case, among family members in the future. The

    scenario is also supported by current research work going on in

    terms of ubiquitous technologies.

    The layout of this technical report is such that a description of the

    family and its members is given followed by an in-depth

    description of a smart-device known as the SD that all individuals

    will possess in the future and finally, some main activities

    performed by one or more members of that family during one day,

    each being separated under different sub-headings. For each

    activity, there are two parts; firstly a description of the activity as

    seen and experienced, and the second part is a brief literature

    review grounding the activity into research work that has beendone so far in that context and the technologies behind it.

    Echelon which happens to coincide with the name of the

    infamous widely distributed signal intelligence collection and

    analysis network operated by five countries including the UK and

    the United States of America [1], here refers merely to a family

    name. Daniel Echelon and his wife Sarah live together with their

    20 years old daughter Flora and their newborn son Ryan in the

    southern city of Southampton, UK. Daniel is a senior lecturer and

    researcher at the University of Southampton for the School of

    Electronics and Computer Science while his wife has recently

    taken up a part-time job at a supermarket a few meters away from

    their house. Flora is an undergraduate student in computer

    science and wants to follow the footsteps of her father.

    We are currently in the year 2020 and Weiser's prediction of

    technology weaving themselves into the fabric of everyday life

    until they are indistinguishable from it [5] is now a reality. It has

    taken almost five decades for what was research work some ten to

    twenty years ago to mature into widespread usage of ubiquitous

    computing.

    2. THE SMART-DEVICE (SD)Facing stiff competition in the smart phone and PDA markets,

    companies have found themselves compelled to adopt a more

    inter-operable approach supported by standards to develop thenew generations of 'smart phones'.

    A large-screen, data-centric, hand-held device designed to offer

    complete phone functions whilst simultaneously functioning as a

    personal digital assistant (PDA). [6]. Such is the definition of a

    smart phone widely accepted across the community. However in

    recent years, we have witnessed a surge in new functionalities

    being added to smart phones that the original and major function

    which was: 'making phone calls' has blurred into the background.

    Thus in the near future, researchers may even consider dropping

    the word 'phone' from 'smart phone' and perhaps replace it with

    'device' as we have done in this futurology report. We will be

    referring to the new generation of smart phones as 'smart devices'

    (SD for short).

    All citizens of this pervasive computing era has an SD.Comparable to the wearing of watches on our wrists, individuals

    go everywhere with it to enabling them to interact ubiquitously

    with their environment. In one sentence, the SD has become the

    sixth sense of the human race.

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    2/10

    Figure 1. The SD with some of its capabilities andfunctionalities

    2.1 Connectivity features of the SDAs shown in Figure 1, several connectivity options are already

    being embedded in smart phones such as Bluetooth, WiFi, the less

    popular Infra-red and the widespread GPRS. While Bluetooth is

    suitable for short-range communication due to its low energy

    consumption, WiFi provides a larger bandwidth with a longer

    range, typically 250 metres but at the same time is a greedy energy

    consumer. GPRS on the other hand is a paid alternative making it

    less attractive for frequent usage [7].

    What has not been seen so far is Peer-To-Peer networking

    capabilities in these smart devices but we are not far from there.

    Bluetooth enabled devices support simultaneous connection with

    up to seven other devices forming a piconet and several piconetscan join together to form a larger scatternet. This shall be the basis

    for Peer-To-Peer in SDs and can be further expanded via the

    Internet through devices having Internet connectivity. Coupled

    with GPS data, the devices will enable applications to determine

    locations and thus set up these ad-hoc Peer-To-Peer networks

    based on proximity.

    2.2 Interacting with objects and appliancesSome researchers have focused on using future SDs as input

    devices [8] than can act as a wireless mouse, use their cameras for

    gesture recognition or even handwriting recognition on their

    touch-screen using limited computation and memory [9]. While

    these will be useful functionalities, in a distributed and ubiquitous

    environment, users will want to use these devices for much more

    interaction with appliances in their surroundings. [10] proposedthe use of Elope middleware that will allow SDs to configure

    themselves and communicate with tagged objects and let users

    invoke services. Tagging here mainly refers to Radio frequency

    identification (RFID) [11] that enables RFID scanners to read the

    information without the requirement that barcodes has: direct line-

    of-sight. These RFID readers will possibly be embedded in SDs

    [12].

    So far, the major obstacle that remains to be overcome is the wide

    range of appliances and the fact that they are produced by

    different manufacturers. Thus most of them will have different

    interfaces. A solution proposed [7] is the use of a single

    framework that can manage the different interaction models that

    SDs are capable of engaging in, such as:

    Universal Remote Control whereby each SD should store theinterfaces of entities it interacts with. Since pre-storing them all is

    impractical and require too much memory for storage, allowing

    the entities to 'teach' the SD their interfaces can be an option.

    However, not all entities will have such capabilities rendering it

    only partially successful.

    Dual Connectivity overcomes the limitation of Universal Remote

    Control by requiring an object to only provide its identity to the

    SD, usually through Bluetooth. The SD then downloads the

    required interface from an interface-bank on the Internet using

    either WiFi or GPRS and can thus interact with the object.

    A wider scale model is the Gateway Connectivity whereby the SD

    connects to a gateway station using Bluetooth or WiFi that knows

    at least one of the entity that the SD want to interact with and then

    acts as a relay. The entities on the other side may communicate

    among themselves in a Peer-To-Peer fashion.Peer-To-Peer Connectivity has the main advantage of overcoming

    the distance limitation of the other models since it allows the

    sharing of information and data without users being in direct

    proximity of one another.

    Generating interfaces on-the-fly for a wide range of appliances

    from the abstract specifications of their functionalities is another

    approach [13]. However it will require that all the appliances are

    capable of communicating this crucial information in a way that

    the SD can understand.

    2.3 Accessing ubiquitous services Not only will SDs allow their users to interact with home

    appliances but also benefit from services offered by third-parties.

    A Mobile Service Toolkit (MST) was developed [14] for this

    purpose and examples such as ticket machines, interactive product

    catalogues and electronic information kiosks were some of the

    services given as examples. Since information were being

    provided to third-parties in return for personalised services,

    privacy concerns were addressed by providing users with the

    ability to choose among three privacy levels that are: 'Always

    disclose' , 'Ask for confirmation before disclosure' and 'Request

    pin number to authorise disclosure'. However, only services in

    fixed locations can be accessed this way. For discovering services

    that are mobile and ubiquitous in nature, SDIPP, a protocol

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    3/10

    implemented by extending the Bluetooth Service Discovery

    Protocol (SDP) with web access, personalisation, context and

    location awareness [15] can be used. SDIPP enables on-the-fly

    service discovery and supports a method of anonymous payment

    based on electronic cash. Anonymity is preserved by using

    device-based authentication through the IMEI number of the SD

    instead of user-based.

    2.4 Digital identityAlso shown in the image, digital identity and e-certificates are

    also a highly desirable features of the SDs. Digital identity is

    important to be established for some services such as banking and

    authentication of certificates to function. This is discussed in [16]

    where its importance for law-enforcement is highlighted. Since

    the SD will be used for authentication and trust establishment

    [17], it has been compared to a wallet, in this case: an electronic

    wallet and its characteristic of having many functionalities

    embedded into one device is drawn from the Swiss Army Knife

    analogy.

    2.5 Other functionalitiesWhile listing all the functionalities of an SD is difficult, a set of

    useful ones will now be briefly listed, mainly based from [18]. The SD will include all the features of the smartphones

    currently available.

    Speech recognition enabling talks from a group of

    participants in a meeting for example to be recorded,

    classified person-wise and a text-script generated and

    archived.

    Act as an intelligent agent capable of gathering,

    reasoning and inferring information from the Web,

    made possible with the semantic web.

    In-built projector allows a user to have a much larger

    screen to be displayed on any flat surface and the SD's

    camera detects and recognises gestures made by the user

    on the projected image.

    Act as a personal health monitoring system [19] by

    communicating with wireless bio-sensors and analysing

    the data in real time. If necessary, ambulance or pre-

    assigned care-givers are contacted automatically. The

    system can also provide medical advice to the user.

    2.6 Challenges to be overcomeWhile much of the technologies for developing the various

    functionalities in the SDs are already available, there remain

    several challenges to be addressed. Privacy is a major concern for

    such devices since they will be gathering, holding and sharing so

    much data about individuals when the latter start to rely more on

    such pervasive devices [20]. Most research work are inclined at

    outputting new functionalities and have largely ignored privacy.One of the possibility to tackle this concern is by delegating the

    task of privacy level assignment to users [14] whereby they

    specify different levels of privacy for different pieces of

    information.

    Along with privacy, trust and security are also important issues as

    discussed in [15, 18] which also mentioned energy consumption

    as a constraint that has to be taken into consideration since SDs as

    most mobile devices will be running on batteries that have limited

    power.

    3. ACTIVITIES

    3.1 Wake upScenario

    With a vibrating pillow under his head, Daniel is woken up at six

    in the morning by the bed's alarm system that has obtained data

    from his personal calendar service through his SD. Five minutes

    later, the alarm system detects that Daniel is still in bed withminimal movements and concludes that he has fallen asleep again

    and thus give him another vibration, a little harder this time.

    While Daniel's day has already begun, Sarah, is still sleeping in

    the same bed, undisturbed, since she works as a part-timer in the

    afternoon, she will woken up at 8a.m with the latest soft music

    tunes that she has enjoyed listening recently or that her SD has

    recommended to the alarm system.

    Flora, with the deadline of one her assignment and the end of year

    examinations approaching, the alarm system is requested by the

    latter's SD to consider these as parameters. The bed sensors has

    detected however that she has been sleeping for only five hours

    and concludes based on her sleep patterns and other data, that she

    requires at least two more hours of sleep.

    Related Research

    Tracking movements in bed has been done for monitoring patients

    at a hospital [21]. In that case, passive infra-red sensors were used

    and movement data was being recorded for batch processing. In

    our case, a real time system will be desirable as described in [22]

    whereby not only movements but also sleeping patterns will be

    monitored and analysed. This will require sensors embedded into

    the mattress and pillows as well.

    Interestingly, alarm systems have been largely ignored by the

    research community. However an innovative alarm system [23]

    makes use of vibrating pillows connected to an alarm for setting

    the time was patented. Using vibrations instead of sounds make it

    possible to wake up an individual without disturbing others still

    sleeping in the same bed.

    By providing the alarm system with some form of artificial

    intelligence to allow reasoning, connecting it with the sleep-

    monitoring sensor network and enabling interaction with devices

    such as the SD normally through a wireless connection such

    Bluetooth or WiFi, we effectively obtain a smart alarm system that

    has been demonstrated in the scenario.

    3.2 Lost CombScenario

    Sarah has the habit of always combing her hair as the first thing

    when she is up from bed. The previous day , Flora used her

    mother's comb and has not put it back in its place. Now since the

    latter is still sleeping, Sarah, cannot ask her about the comb's

    location. Fortunately, since the comb, as most objects in thehouse, has an RFID tag, Sarah, just pick up her SD and search for

    the comb's location. The room in which it currently is and the

    approximate distance from another bigger object in that room is

    provided. With these information, the lost object is very quickly

    located.

    Related Research

    The idea of using ubiquitous technology to find lost objects such

    keys, purse, and in our case, a comb, commonly referred to as

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    4/10

    Frequently Lost Objects (FLO) [24] has been around for the past

    decades. Most systems [24, 26, 27] have proposed the use of low

    cost radio-frequency tags, known as RFID [25] attached to objects

    and that can be read without line-of-sight unlike conventional

    barcodes. While the sole use of RFID present some challenges

    such as the limited detection range or that the lost object has been

    taken out of the house for instance, the smart floor solution is

    proposed [24], whereby the information is provided to the userabout the last location that the object was detected and with

    whom. All this information is transmitted from the wireless sensor

    network to a display unit, in our case, the SD. A step further will

    be the use of mobile robots [28] to help locate the object. An

    important target population for such systems has been for people

    suffering from Alzheimer [29].

    3.3 Smart RefrigeratorScenario

    As Daniel takes out the milk from the refrigerator for breakfast,

    the latter records that action and if the milk bottle is not returned

    back, the stock level will be decreased. The Echelon family need

    not worry about any items from the refrigerator getting out of

    stock since the stock level is constantly monitored by therefrigerator management system. Along with stock levels, expiry

    dates are also monitored and family members are notified

    whenever an item's expiry date is approaching.

    Sarah wanted to speak to her father about some computer-related

    assignment she is currently working. But since Daniel has been

    rather busy lately, he has not been able to discuss it with her at

    home. As both individuals will be on the campus today, Daniel

    thought that maybe they can meet up there. So he writes a note on

    the modern 'stick-notes' on the refrigerator's door: a touch screen

    used as a display panel for the refrigerator's system, acts as a

    notice board for 'sticking' notes for other family members and

    finally, is an interface for the kitchen management system

    providing recipes for example. The appliance is also WiFi enabled

    and provides a web interface for the family to access when theyare away from home as shown below infigure 2.

    Related Research

    The smart refrigerator, as described in [22, 30] does not only store

    food but can also generate shopping list, manages stock levels, re-

    order some common items online automatically, while

    considering expiry dates of products stored. It must be highlighted

    here that RFID [25] will facilitate the refrigerator's monitoring

    task; equipped with an RFID reader, it will be able to accurately

    keep track of its content . Furthermore, taking the traditional role

    of the empty refrigerator door acting as a notice board, a touch

    screen can be embedded into it as proposed in [31, 32], providing

    a more aesthetically pleasing look and also enabling messages to

    be sent through the web from the display to the family member's

    SDs or vice versa.

    3.4 Car Navigation & Automated DrivingScenario

    After breakfast, Daniel gets ready for work. In the mean-time,

    Sarah prepares Ryan so that his father can drop him at the

    kindergarten on his way to university. Since dropping the baby

    before going to work is an everyday routine, the car navigation

    system has already programmed itself for taking that route.

    However occasionally, Sarah may not send Ryan with his dad. In

    these cases, the car's sensors will detect that there is no baby on

    board and thus modify the route. Traffic jam is no longer an issue

    now since most of the time, cars auto-drive themselves at constant

    speed.

    Cars communicate with one another and also with road-side nodesthat they encounter on their way, sharing information about their

    destination and traffic flow. With these data, routing is optimised

    and time to reach destination is calculated in real-time. With

    automatic navigation, cars are able to travel closely to one another

    while passengers can relax. Car sensors and cameras detect the

    mood of the passengers and react accordingly for example by

    playing some soft music by recognising who is currently in the car

    and adapting to their taste.

    Related Research

    While navigation systems using GPS technology is now

    widespread [33], cars having automated driving capabilities are

    still not on our roads although research works and prototypes

    have been produced since the early 90's [34]. The idea of having

    one human driver in a vehicle and several other vehicles following

    it in automated mode forming a platoon was explored in France in

    1993 [34]. The automated highway project demonstrated the

    feasibility of automated driving using several technologies

    including vision based, radar-based and also platoon-based

    [35].It has been shown that the automated system is safer than

    having human drivers [36, 37]. One major obstacle that hindered

    the success of these early systems was a lack of appropriate

    wireless communication technology such as Bluetooth and WiFi.

    These were explored in [38] which suggested that cars should

    share information about their destination, and the route they

    intend to take with other cars. This will allow cars to process

    information and optimise their routing. A peer-to-peer network is

    used to establish communication with cars over a long range. This

    system can be further enhanced by placing road-side nodes tocollect and distribute these information to passing cars. A recent

    work studied how ants do not have traffic jam problems [39]. This

    is attributed to the fact that they do not overtake one another, are

    able to travel very closely to their neighbours and also maintain a

    constant speed even when traffic density increases. Comparing

    this with cars, it will be very difficult if not impossible for human

    drivers to control cars with such precision. Thus, an automated car

    navigation and driving system is the ultimate solution.

    Figure 2. Interaction between Smart Refrigerator and SD

    via the Web

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    5/10

    3.5 Daniel at workScenario

    Being an academic staff for the 'Intelligence, Agents, Multi-Media

    Group' (IAM), it is not surprising that Daniel and his colleagues

    are taking full advantage of advanced computer agents to help

    them in their various tasks. This morning, Daniel wants to set up a

    meeting for the group to discuss about some importantdevelopment in a research project that they are currently working

    on. Since he has already logged-in into his personal computer, he

    'summons' the computer agent and provides the latter with some

    information including his intention of setting up a meeting, the

    group of people he wants to attend it, the urgency level and the

    time range. The agent first interacts with Daniel's SD to make sure

    he doesn't have any other appointment himself in case of which,

    he will be warned. The agent then proceeds to contact the other

    people concerned through their own agents that will each have

    information about their masters. A consensus is reached among

    the agents, a meeting room is booked and their respective masters

    are notified about the meeting being scheduled including the time

    and location.

    During the meeting, each individual uses his SD to jot down

    comments, take notes as well as making reviews about different

    ideas being discussed. Participants may choose to share comments

    directly from their SDs to the other attendees.

    Through an email on his SD, Daniel is informed about a

    conference being held next month and his agent on the SD has

    already annotated the date and time of the conference with a

    comment that Daniel will probably be free based on his current

    calendar data. A link has also been added to book air and train

    tickets. Daniel clicks on the link and the agent proceeds to book

    the tickets on his behalf. The information is then recorded in his

    calendar.

    Related Research

    Autonomous agents have as primary objective to reduce the

    cognitive loads of their users by performing calendar managementon their behalf [40, 46]. The use of agents for meeting scheduling

    is considered as an inherently distributed task [41, 42] whereby

    agents have to find the right balance between protecting their

    users' privacy and preferences with the overall organisation which

    in our case will include availability of other agents' users,meeting

    room, equipments and other resources. The negotiation process

    among agents is described as a distributed search process [41]

    in which agents have to choose the optimal strategies [43].

    As far as reviewing is concerned, the mobility of the Web enabled

    by smart phones and in the future by SDs make this activity

    possible [44]. With the connectivity among SDs collaborative

    work will be greatly facilitated.

    The scenario of agent understanding emails,annotating them and

    performing bookings online is made possible through the

    semantic web [45] whereby data is given meaning through the use

    of ontologies expressed in RDF or OWL for example and thus

    allowing agents to perform reasoning and make inferences.

    3.6 Looking after baby RyanScenario

    From time to time both Sarah and Daniel look after the baby

    during the day by connecting to the kindergarten's Web Interface

    through their SDs. They are able to see Ryan via a camera

    installed in his bed at the kindergarten. Ryan can also see and hear

    them through an LCD display embedded in every baby's bed.

    Through the interface, Sarah usually look at what time Ryan has

    been fed his meals, and read comments made by the care-givers

    looking after him. The feeding time, quantity can also be edited by

    Sarah or Daniel online. At these specified time, the staff at the

    kindergarten are reminded by the system.

    Ryan also wears a special diaper that can detect when it needs to

    be replaced by detecting moisture level. Thus the care-givers do

    not need to keep checking the baby manually.

    Related Research

    Video-conferencing is already widespread but with time, the cost

    of equipments will drop significantly. As demonstrated in [47]

    baby-care through the Internet using video link reduces cost and

    in this situation allows parents to look after their babies even

    when they are away. Research has been carried out in facial

    expression recognition for babies to detect when they are in pain

    [48]. In future research works, recognition of other kind of

    expressions such as hunger and joy may also be possible and thus

    relayed back to parents.

    With low cost RFID tags [25], a smart-diaper has been developedthat uses semi-passive tags that are activated when moisture is

    detected [49]. RFID readers incorporated in the beds can thus

    detect signals emitted from these tags and transmit them to the

    baby-care monitoring system with information about which bed's

    occupant requires a diaper change.

    3.7 Lunch timeScenario

    At 11am, Sarah starts preparing a quick lunch for herself since she

    is the only one at home. She accesses the kitchen advisor system

    through the touch-screen on the refrigerator's door, choose the

    option of 'lunch preparation advice' and select 10 minutes as the

    preparation time. Based on her food preferences, which

    ingredients are available and what she has eaten recently, tunasalad and scrambled eggs are the two options advised to her. She

    selects tuna salad and the system provides her with the

    preparation steps as well as the location of the different

    ingredients.

    At the university, Daniel decides to go to the Piazza restaurant on

    the campus to eat something. Since most of his colleagues that he

    usually enjoys lunch with have left for a conference, he ends up

    going to eat alone. But his SD's agent also knows about the lunch-

    mates absence since their agents shared that information. The SD

    search for potential people that can accompany Daniel. Her

    daughter Flora happens to be going for lunch and She wanted to

    discuss with her dad about an assignment. Daniel's SD is aware

    about the fact that he had written a note on the refrigerator's

    digital notice board. Flora's SD is contacted using an ad hoc peerto peer network and she is asked whether she wants to join her

    dad. Both entities agree and the meet-up location is shared by

    their SDs share : 'The piazza' enabling both family members to

    share a nice lunch-time together while discussing about Flora's

    assignment.

    Related Research

    The kitchen advisor system, is linked to the smart-refrigerator

    system described earlier. Since the system is connected to the

    Web, the Semantic Web to be more precise, information such as

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    6/10

    recipes, preparation time and ingredients are pulled in real-time

    from several websites in real-time as described by Tim Berners

    Lee [45]. In addition to these information, the system also use

    data collected by SDs such as the kind of food that Sarah usually

    orders and runs some recommender system algorithms based on

    these parameters.

    Ad hoc peer to peer networking [7] is one of the four modes of

    communication that the SD is capable of. As described in moredetails in the 'Smart Device' section, this allows communication

    among individuals although they may be out of range for

    Bluetooth or WiFi to function.

    3.8 Sarah at workScenario

    At noon, Sarah walks to work at the nearby supermarket. She is

    working on the afternoon shift today. As soon as she enters the

    building, her presence is acknowledged along with the time of

    entry by the supermarket's staff attendance system which has

    identified Sarah through her SD coupled with a face recognition

    process.

    At the supermarket, the shopping carts now have digital touch

    screen displays ( figure 3) that can be used to advertise products

    currently on discounts. Shoppers normally download there

    shopping list from their SDs to the digital display of the carts

    since it is larger in size. The display then convert it into a

    checklist, guiding the shoppers to the items' shelf locations as

    well as providing suggestions and advice about each product. As

    soon as a product is added to the cart, it is marked accordingly in

    the digital list.

    Checkout is simply about rolling the cart nearby an exit space and

    the SD then ask the user to confirm payment for the items

    purchased and a digital receipt is issued.

    Sarah's job, although being called a cashier, is no longer like the

    traditional one. She rarely performs checkout, she just need to be

    present for special cases where a customer has trouble with theself-checkout system.

    At the end of her shift, Sarah use her SD to query the home

    refrigerator's system for a shopping list as depicted in figure 2.

    Within seconds, a list is sent to her. Knowing that prices at the

    supermarket can be higher than elsewhere or the suggestions by

    the supermarket can be biased, Sarah's SD camera is used to

    detect gestures made with her fingers and perform actions such as

    price comparison of a product with several other supermarkets.

    Reviews made by customers are also downloaded from the Web

    and shown to her. One of the items in the list: 'Corn' is out of

    stock at the supermarket. So the SD advises Sarah to delegate this

    item to Daniel who can purchase it on his way back home from

    somewhere else. Sarah agrees and a few more items that were out

    of stock at the supermarket are also delegated to Daniel's SD.

    Related Research

    As discussed in the SD and the smart-refrigerator sections, they

    can interact with one another through several methods. In this

    case, the SD communicates with the refrigerator system through

    the Web.

    Radio Frequency Identification tagging [25], is once again used

    on all products instead of barcodes. A large portion of the

    scenario above has been derived from an experimental store

    developed by the METRO Group [50] that have referred to the

    system of intelligent shopping cart as personal selling assistants

    (PSAs). These are WiFi enabled with Internet connectivity and

    equipped is RFID readers thus enabling them to know the exact

    content of the cart. This information is sent back to the store's

    main system at the moment of checkout and thus avoiding the

    need for scanning each item one by one as is currently being done.

    There is a video clip that demonstrates how these technologies

    work together [51].

    3.9 The dinnerScenario

    On Friday nights, the Echelon family usually dines outside in

    different the restaurants located in the city. Tonight it it is Flora's

    turn to choose which restaurant they will go, so she grabs her SD

    and start flipping through the digital business-cards of restaurants

    that had been automatically sent to her while she was within 100

    meter range of them previously. Her SD has automatically

    classified them into categories and assigned ratings based on her

    personal preference of food. These data were collected every time

    she spent time in a restaurant and ordered specific dishes.

    Having marked a few top desirable restaurants, she summons her

    SD's AI-agent to help her come up with a final selection. The

    latter connects to the restaurants websites and download their

    latest menu updates including special offers.

    Once Flora has decided on the restaurant, its GPS coordinates are

    sent via Bluetooth to the in-built car navigation system while an

    Figure 3. Shopping cart with LCD

    touch-screen display [51]

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    7/10

    entry is made to the online family-blog about the restaurant-dinner

    online to be edited and approved later on by a member of the

    family. The latter which is WiFi enabled, downloads the latest

    updates from the transport-department to know current traffic-

    flow status, whether any particular road have been closed for

    road-works between their current location (home) and the

    restaurant. Finally it generates the optimal path to reach

    destination.

    Two minutes prior to reach destination, the car-navigation system

    queries the transport-department for available parking spaces

    closest to the destination and also queries the law-enforcement-

    department for theft and other related crime in that area and

    advise Daniel about these.

    When they enter the restaurant, the menu is downloaded onto

    their SDs . Other dinners' reviews are also made available to the

    family. They make their choice which is then sent directly to the

    restaurant management system. Their SDs also store the

    information about the food ordered. After having completed

    dinner, the family members are requested by their SDs to review

    the food.

    Related Research

    Mobile-based advertising has for long been subject of research,

    starting with the short message service (SMS) [57]. However the

    advertising could not be targeted and required that users opt in

    voluntarily. With Technologies such as Bluetooth and WiFi being

    embedded in mobile phones, location awareness was used to

    target users [58] but still from a group of people passing at a

    location it was difficult to know about them, their habits and

    preferences. With the SD, users can choose to share some

    information about them and thus enable advertisers to better

    personalised advertising and do better targeting as mentioned in

    [59]. Users will accept to share information to advertisers since

    they can also benefit from advertising to some extent as pointed

    out in [57].

    As far as trusting reviews made by other dinners, trust and distrust

    values among people [60], probably by grouping people with

    similar food taste will give an indication about how much one can

    rely on a review usually made on mobile devices as demonstrated

    in [44].

    3.10 Going to CinemaScenario

    After a wonderful dinner, the family decides to go to watch a

    movie. Since Sarah's birthday was a few day away, she gets to

    choose the movie. She grabs her SD and request for a list of latest

    movies. The SD is aware about Sarah's taste and which movies

    she has already watched. She is then asked with whom will she be

    going: Daniel only, complete family or friends. When she selects'family', the other family members' SDs are contacted via

    Bluetooth and their movie preferences queried. Finally Sarah's SD

    provide a final list of suggestions that will please everybody and

    also taking their current location into consideration, with Sarah's

    taste having a higher priority. Sarah make the final decision, the

    SD proceeds to purchase the tickets for the family members on the

    Web and the location for the cinema building is uploaded to the

    car's navigation system. Reaching the cinema, their seats locations

    are transferred to their respective SD which is then able to guide

    them inside the dimly-light building to their seats.

    Related Research

    The above scenario is made possible due to the semantic web

    explained in [45] making data available for agents to reason upon.

    And the remaining capabilities have already been described in the

    Smart Device section earlier.

    3.11 The family blog (Flog)Scenario

    The family blog has enabled an effortless way of keeping a 'family

    diary'. One blog post is made daily by pulling together different

    activities automatically from devices such as SDs and the car

    navigation system.

    For example today, a picture was snapped automatically when

    Daniel was taking Ryan to the car and annotated accordingly.

    While Sarah was preparing the quick lunch at home, the kitchen

    cameras made a high-quality movie of her cooking, this was also

    included in the blog post. Similarly, when the family went out for

    dinner, the car-navigation system sent the destination and time

    data to the blogging system which then downloaded the comments

    and reviews each family member had made from there SDs.

    While the final blog post is very interesting for the familymembers to learn how the others spent their day, privacy can be

    an issue. There are some information that they would not like to

    share. Thus there exist some privacy features such as by default

    everything about each family member is made private to himself

    or herself. Then there is the allow-list and group-privacy levels for

    example, a group of relatives are allowed to see the different

    activities of the family when they were together, another one for

    particular member of the family only and another without time

    and precise details making it just some kind of summarised post.

    Related Research

    While automated-blogging as described in this scenario has not

    been research much, some work in this direction has already been

    done. Mobilog [52] is a framework that automates the creation ofblog posts by pulling together information from different websites

    and weather services to incorporate contextual information in a

    post and thus saving user's time. They just need to go through the

    automatically-generated post, add some personal text if they want

    and approve it for posting. Mobile blogging has also been

    investigated in [53] while adding video in blog posts been

    explored in [54]. While these automated and mobile blog posts

    are very interesting, they are not of much use for machine, in our

    case, agents to crawl and understand their contents. Since the

    Semantic Web has been made for machines to understand,

    similarly, Semantic blogs are now being designed to give meaning

    to data [55, 56].

    4. CONCLUSIONThe extent to which ubiquitous computing will change the life ofindividuals is difficult to imagine. But what has been presented in

    this paper is not fiction, for most of the systems presented,

    research works have been published and prototypes implemented.

    One of the most common technologies that has been used in

    pervasive computing is RFID mainly because of its low cost,

    wireless capability and it does not require line-of sight to be

    scanned.

  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    8/10

    We have demonstrated that pervasive computing will enable

    greater cooperation among individuals however the biggest

    challenge of such technologies remains their adoption by society

    since it is them, that will be the users and their lifestyles will be

    changed. Studying how users adopt and use innovative

    technologies in itself is a science, as has been the case for the

    Web, which has given birth to Web Science, perhaps we will

    need a Ubiquitous Computing Science to better understand it.[61].

    5. REFERENCES[1] Meyer, S., and Rakotonirainy, A. A survey of research on

    context-aware homes. InProceedings of the Australasian

    information security workshop conference on ACSW

    frontiers 2003 - Volume 21, 159-168. Adelaide, Australia:

    Australian Computer Society, Inc., 2003.

    [2] Choi, J., Shin, DongKyoo., and Dongil Shin, Dongil.

    Research and implementation of the context-aware

    middleware for controlling home appliances. Consumer

    Electronics, IEEE Transactions on 51, no. 1 (2005): 301-

    306.

    [3] Intille, S.S. Designing a home of the future.PervasiveComputing, IEEE1, no. 2 (2002): 76-82.

    [4] Edwards, W., and Grinter, R. At Home with Ubiquitous

    Computing: Seven Challenges. In Ubicomp 2001:

    Ubiquitous Computing, 256-272, 2001.

    [5] Weiser,M.. The computer for the 21st century, Scientific

    American, 1991.

    [6] Best,J. Analysis: What is a smart phone? - Networks -

    Breaking Business and Technology News at silicon.com.

    http://networks.silicon.com/mobile/0,39024665,39156391,00

    .htm. Accessed on 23 May 2009

    [7] Iftode,L., Borcea,C., Ravi,N., Kang,P. and Zhou, P. Smart

    Phone: an embedded system for universal interactions,

    Distributed Computing Systems, 2004. FTDCS 2004.Proceedings. 10th IEEE International Workshop on Future

    Trends of, 2004, pp. 88-94.

    [8] R. Ballagas, J. Borchers, M. Rohs, and J. Sheridan, The

    smart phone: a ubiquitous input device,Pervasive

    Computing, IEEE, vol. 5, 2006, pp. 70-77.

    [9] E. Anquetil and H. Bouchereau, Integration of an on-line

    handwriting recognition system in a smart phone device,

    Pattern Recognition, 2002. Proceedings. 16th International

    Conference on, 2002, pp. 192-195 vol.3.

    [10] Pering,T., Ballagas,R. and Want,R. Spontaneous marriages

    of mobile devices and interactive spaces, Commun. ACM,

    vol. 48, 2005, pp. 53-59.

    [11] Want,R. Enabling ubiquitous sensing with RFID,Computer, vol. 37, 2004, pp. 84-86.

    [12] Penttila,K., Pere,N., Sioni,M., Sydanheimo,L. and

    Kivikoski,M. Use and interface definition of mobile RFID

    reader integrated in a smart phone, Consumer Electronics,

    2005. (ISCE 2005). Proceedings of the Ninth International

    Symposium on, 2005, pp. 353-358.

    [13] Nichols, J. and Myers, B., Controlling Home and Office

    Appliances with Smart Phones,Pervasive Computing,

    IEEE, vol. 5, 2006, pp. 60-67.

    [14] Toye, E., Sharp, R., Madhavapeddy, A. and Scott,D., Using

    smart phones to access site-specific services,Pervasive

    Computing, IEEE, vol. 4, 2005, pp. 60-66.

    [15] Ravi, N., Stern, P., Desai, N. and Iftode, L., Accessingubiquitous services using smart phones, Pervasive

    Computing and Communications, 2005. PerCom 2005.Third

    IEEE International Conference on, 2005, pp. 383-393.

    [16] Camp, J., Digital identity, Technology and Society

    Magazine, IEEE, vol. 23, 2004, pp. 34-41.

    [17] Satyanarayanan, M., Swiss Army Knife or Wallet?,

    Pervasive Computing, IEEE, vol. 4, 2005, pp. 2-3.

    [18] Ai, N., Lu, Y. and Deogun, J., The smart phones of

    tomorrow, SIGBED Rev., vol. 5, 2008, pp. 1-2.

    [19] Leijdekkers, P. and Gay, V., Personal Heart Monitoring and

    Rehabilitation System using Smart Phones, Mobile

    Business, 2006. ICMB '06. International Conference on ,

    2006, p. 29.[20] Satyanarayanan, M., Pervasive computing: vision and

    challenges, Personal Communications, IEEE [see also IEEE

    Wireless Communications] 8, no. 4 (2001): 10-17

    [21] Banerjee, S., Steenkeste, F., Couturier, P., Debray, M. and

    Franco, A., Telesurveillance of elderly patients by use of

    passive infra-red sensors in a 'smart' room.J Telemed

    Telecare 9, no. 1 (February 1, 2003): 23-29.

    [22] Helal, S., Mann, W., El-Zabadani, H., King, J., Kaddoura,

    Y., and Jansen, E., The Gator Tech Smart House: a

    programmable pervasive space. Computer38, no. 3 (2005):

    50-60.

    [23] Schettino, Cecilia, C. Pillow alarm device, May 22, 2001.

    Patent Numer :6236621, U.S. Classification: 368/10; 368/12;5639; 5904 ; International Classification: G04B 4700; A47G

    900

    [24] Cory,K., Orr, R., Abowd, G., Atkeson, C., Essa,I.,

    MacIntyre,B., Mynatt,E., Starner, T., and Newstetter, W.,

    The Aware Home: A Living Laboratory for Ubiquitous

    Computing Research. In Cooperative Buildings. Integrating

    Information, Organizations and Architecture, 191-198,

    1999.

    [25] Sarma, S., Weis, S., and Engels, D., RFID Systems and

    Security and Privacy Implications. In Cryptographic

    Hardware and Embedded Systems - CHES 2002, 1-19, 2003.

    [26] Sanders, J.M., Sensing the subtleties of everyday life.

    Research Horizons, Winter,2000. [Tec02] RF Technologies.

    Pinpoint local positioning systems.

    [27] Basrur, P. and Parry, D. (2006, October), Where are my

    Glasses?: An Object Location System within the Home.

    Bulletinof Applied Computing and Information Technology

    Vol. 4, Issue 2. ISSN 1176-4120.

    http://networks.silicon.com/mobile/0,39024665,39156391,00.htmhttp://networks.silicon.com/mobile/0,39024665,39156391,00.htmhttp://networks.silicon.com/mobile/0,39024665,39156391,00.htmhttp://networks.silicon.com/mobile/0,39024665,39156391,00.htmhttp://networks.silicon.com/mobile/0,39024665,39156391,00.htm
  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    9/10

    [28] Dengler, S., Awad, A. and Dressier, D., Sensor/Actuator

    Networks in Smart Homes for Supporting Elderly and

    Handicapped People. In Advanced Information Networking

    and Applications Workshops, 2007, AINAW '07. 21st

    International Conference, 2:863-868, 2007.

    [29] Hideaki,K., Nakada, T., Tsuruma, G. and Kunifuji, S., An

    Aware-Environment Enhanced Group Home: AwareRium.

    InAdvances in Hybrid Information Technology, 425-436,2007.

    [30] Jiang, L., Liu, D. and Yang, B., Smart home research. In

    Machine Learning and Cybernetics, 2004. Proceedings of

    2004 International Conference on, 2:659-663 vol.2, 2004.

    [31] Taylor, A., Harper, R., Swan, L., Izadi, S., Sellen, A. and

    Perry, M., Homes that make us smart.Personal and

    Ubiquitous Computing11, no. 5 (June 1, 2007): 383-393.

    [32] Park, S., Won, S.H., Lee, J.B. and Kim, S.W., Smart home

    digitally engineered domestic life.Personal and

    Ubiquitous Computing7, no. 3 (July 1, 2003): 189-196.

    [33] Obradovic, D., Lenz, H. and Schupfner, M., Sensor fusion

    in siemens car navigation system. In Machine Learning for

    Signal Processing, 2004. Proceedings of the 2004 14thIEEE Signal Processing Society Workshop , 655-664, 2004.

    [34] Parent, M., and P. Daviet. Automatic Driving For Small

    Public Urban Vehicles. InIntelligent Vehicles '93

    Symposium, 402-407, 1993.

    [35] Thorpe, C., Jochem, T. and Pomerleau, D., The 1997

    automated highway free agent demonstration. InIntelligent

    Transportation System, 1997. ITSC '97., IEEE Conference

    on, 496-501, 1997.

    [36] Puri, A., and Varaiya, P., Driving safely in smart cars. In

    American Control Conference, 1995. Proceedings of the,

    5:3597-3599 vol.5, 1995.

    [37] Vahidi, A., and A. Eskandarian. Research advances in

    intelligent collision avoidance and adaptive cruise control.Intelligent Transportation Systems, IEEE Transactions on 4,

    no. 3 (2003): 143-153.

    [38] Yamashita, T., Izumi,K., Kurumatani, K. and Nakashima, H.,

    Smooth traffic flow with a cooperative car navigation

    system. InProceedings of the fourth international joint

    conference on Autonomous agents and multiagent systems,

    478-485. The Netherlands: ACM, 2005.

    [39] Alexander, J. , Schadschneider, A., Chowdhury, D. and

    Nishinari, K., Trafficlike Collective Movement of Ants on

    Trails: Absence of a Jammed Phase.Physical Review

    Letters 102 (March 1, 2009): 108001

    [40] Modi, P.J., Veloso, Stephen M.F.S, and Oh, J., CMRadar:

    A Personal Assistant Agent for Calendar Management. InAgent-Oriented Information Systems II, 169-181, 2005.

    [41] Sen, S., and Edmund H.D., A Formal Study of Distributed

    Meeting Scheduling. Group Decision and Negotiation 7,

    no. 3 (May 1, 1998): 265-289.

    [42] Leonardo, G. and Sycara, K., Multi-Agent Meeting

    Scheduling: Preliminary Experimental Results. Article,

    1996.

    [43] Crawford, E., and Veloso, M., Learning to Select

    Negotiation Strategies in Multi-agent Meeting Scheduling.

    InProgress in Artificial Intelligence, 584-595, 2005.

    [44] Karpf, D., Why Bowl Alone When You Can Flashmob the

    Bowling Alley?: Implications of the Mobile Web for Online-

    Offline Reputation Systems,. Proceedings of the WebSci'09:

    Society On-Line, 18-20 March 2009, Athens, Greece.

    [45] Berners-Lee, T., Hendler, J. and Lassila, O., The Semantic

    Web: Scientific American. Scientific American Magazine,

    May 17, 2001.

    [46] Franzin, M. S., Rossi, F., Freuder, E.C. and Wallace, R.,

    Multi-Agent Constraint Systems with Preferences:

    Efficiency, Solution Quality, and Privacy Loss.

    Computational Intelligence 20, no. 2 (2004): 264-286.

    [47] Gray, J.E., Safran, Roger, C., Davis B., Pompilio-

    Weitzner,G., Stewart, J.E., Zaccagnini, L. and Pursley,D.W.,

    Baby CareLink: Using the Internet and Telemedicine to

    Improve Care for High-Risk Infants.Pediatrics 106, no. 6

    (December 1, 2000): 1318-1324.

    [48] Xavier Balda,X., de Cassia, R., Guinsburg,R., Fernanda

    Branco de Almeida,M., de Araujo Peres, C., Miyoshi, M.H.,and Kopelman, B.I., The Recognition of Facial Expression

    of Pain in Full-Term Newborns by Parents and Health

    Professionals.Arch Pediatr Adolesc Med154, no. 10

    (October 1, 2000): 1009-1016.

    [49] Siden, J., Koptioug, A. and Gulliksson, M., The "smart"

    diaper moisture detection system. In Microwave Symposium

    Digest, 2004 IEEE MTT-S International, 2:659-662 Vol.2,

    2004.

    [50] Kalyanam, K., Lal, R., and Wolfram, G., Future Store

    Technologies and Their Impact on Grocery Retailing. In

    Retailing in the 21st Century, 95-112, 2006.

    [51] METRO Group,Smart Fridge and future of shopping,

    2007. http://www.youtube.com/watch?v=oHKcDTY2v7sAccessed 24 May 2009.

    [52] Cemerlang, P., J.-H. Lim, J.H., You, Y., Zhang, J. and

    Chevallet, J.P., Towards Automatic Mobile Blogging. In

    Multimedia and Expo, 2006 IEEE International Conference

    on, 2033-2036, 2006.

    [53] Russell, B., Mobile blogging: experiences of

    technologically inspired design. In CHI '06 extended

    abstracts on Human factors in computing systems, 225-230.

    Montral, Qubec, Canada: ACM, 2006.

    [54] Parker, C., and Pfeiffer, S., Video blogging: content to the

    max. Multimedia, IEEE12, no. 2 (2005): 4-8.

    [55] Karger, D.R., and Quan, D., What Would It Mean to Blog

    on the Semantic Web?. In The Semantic Web ISWC 2004,214-228, 2004.

    [56] Cayzer, S., What next for Semantic Blogging?.Digital

    Media Systems Laboratory, HP Laboratories Bristol, October

    31, 2006.

    [57] Barwise, P., and Strong, C., Permission-based mobile

    advertising.Journal of Interactive Marketing16, no. 1

    (2002): 14-24.

    http://www.youtube.com/watch?v=sSlEa1udYGwhttp://www.youtube.com/watch?v=sSlEa1udYGw
  • 8/14/2019 Ubiquitous Computing Enabling Greater Cooperation Among Members of a Family

    10/10

    [58] Aalto, L., Gthlin,N., Korhonen, J., and Ojala, T.,

    Bluetooth and WAP push based location-aware mobile

    advertising system. InProceedings of the 2nd international

    conference on Mobile systems, applications, and services,

    49-58. Boston, MA, USA: ACM, 2004.

    [59] Yunos, H.M., Zeyu Gao, J. and Shim, S., Wireless

    Advertising's Challenges and Opportunities. Computer36,

    no. 5 (2003): 30-37.

    [60] Victor, P., Cornelis, C., De Cock, M. and Teredesai, A.,

    Trust- and Distrust-Based Recommendations for

    Controversial Reviews,. Proceedings of the WebSci'09:

    Society On-Line, 18-20 March 2009, Athens, Greece.

    [61] Berners-Lee, T., Hall,W., Hendler, J.A., O'Hara, K.,

    Shadbolt, N. and Weitzner, D.J., A framework for web

    science.Found. Trends Web Sci. 1, no. 1 (2006): 1-130.