Context awareness
Context awareness is a property of mobile devices that is defined complementarily to location awareness. Whereas location may determine how certain processes around a contributing device operate, context may be applied more flexibly with mobile users, especially with users of smart phones. Context awareness originated as a term from ubiquitous computing or as so-called pervasive computing which sought to deal with linking changes in the environment with computer systems, which are otherwise static. The term has also been applied to business theory in relation to contextual application design and business process management issues.
Qualities of context
Various categorizations of context have been proposed in the past. Dey and Abowd distinguish between the context types location, identity, activity and time. Kaltz et al. identified the categories user&role, process&task, location, time and device to cover a broad variety of mobile and web scenarios. They emphasize yet for these classical modalities that any optimal categorization depends very much on the application domain and use case. Beyond more advanced modalities may apply when not only single entities are addressed, but also clusters of entities that work in a coherence of context, as e.g. teams at work or also single bearers with a multiplicity of appliances.Some classical understanding of context in business processes is derived from the definition of AAA applications with the following three categories:
- Authentication, which means i.e. confirmation of stated identity
- Authorisation, which means i.e. allowance to accrual or access to location, function, data
- Accounting, which means i.e. the relation to order context and to accounts for applied labour, granted license, and delivered goods,
Computer science
In computer science context awareness refers to the idea that computers can both sense, and react based on their environment. Devices may have information about the circumstances under which they are able to operate and based on rules, or an intelligent stimulus, react accordingly. The term context awareness in ubiquitous computing was introduced by Schilit.Context-aware devices may also try to make assumptions about the user's current situation. Dey define context as "any information that can be used to characterize the situation of an entity."
While the computer science community initially perceived the context as a matter of user location, as Dey discuss, in the last few years this notion has been considered not simply as a state, but part of a process in which users are involved; thus, sophisticated and general context models have been proposed, to support context-aware applications which use them to adapt interfaces, tailor the set of application-relevant data, increase the precision of information retrieval, discover services, make the user interaction implicit, or build smart environments.
For example: a context-aware mobile phone may know that it is currently in the meeting room, and that the user has sat down. The phone may conclude that the user is currently in a meeting and reject any unimportant calls.
Context-aware systems are concerned with the acquisition of context, the abstraction and understanding of context, and application behaviour based on the recognized context.
As the user's activity and location are crucial for many applications, context awareness has been focused more deeply in the research fields of location awareness and activity recognition.
Context awareness is regarded as an enabling technology for ubiquitous computing systems.
Context awareness is used to design innovative user interfaces, and is often used as a part of ubiquitous and wearable computing. It is also beginning to be felt in the internet with the advent of hybrid search engines.
Schmidt, Beigl & Gellersen
define human factors and physical environment as two important aspects relating to computer science. More recently, much work has also been done to ease the distribution of context information; Bellavista, Corradi, Fanelli & Foschini survey the several middleware solutions that have been designed to transparently implement context management and provisioning in the mobile system. Grifoni, D'Ulizia & Ferri provided a review of several context-aware location-based service systems using big data by analysing the methodological and practical choices that their developers made during the main phases of the context awareness process. Perera, Zaslavsky, Christen, & Georgakopoulos have performed a comprehensive survey on context-aware computing from Internet of Things perspective by reviewing over 50 leading projects in the field. Further, Perera has also surveyed a large number of industrial products in the existing IoT marketplace from context-aware computing perspective. Their survey is intended to serve as a guideline and a conceptual framework for context-aware product development and research in the IoT paradigm. The evaluation has been done using the theoretical framework developed by Dey and Abowd more than a decade ago. The combination of the Internet and emerging technologies transform everyday objects into smart objects that can understand and react to their contexts.
Human factors related context is structured into three categories: information on the user, the user's social environment, and the user's tasks. Likewise, context related to physical environment is structured into three categories: location, infrastructure, and physical conditions.
Applications in situational or social awareness
Context awareness has been applied to the area of computer-supported cooperative work to help individuals work and collaborate more efficiently with each other. Since the early 1990s, researchers have developed a large number of software and hardware systems that can collect contextual information from users. This information is then openly shared with other users, thereby improving their situational awareness, and allowing them to identify natural opportunities to interact with each other. In the early days of context-aware computing, many of the systems developed for this purpose were specifically designed to assist businesses or geographically separated work teams collaborate on shared documents or work artifacts. More recently, however, there has been a growing body of work that demonstrates how this technique can also be applied to groups of friends or family members to help keep them apprised of each other's activities.To date, systems that use context awareness to improve situational awareness can be characterised by:
- the context that they collect from each user, and
- the method by which they convey this information to other users
Another popular context to share is a user's work activity, often by sharing video. In the Community Bar system, researchers developed a desktop application that periodically took screenshots of the user's display. This information was then shared with the user's co-workers so that they could know what documents/artifacts their teammates was working on, and provided a common frame of reference so that users could n talk about these artifacts as if they were collocated. In Montage, users are given the ability to remotely activate the webcam on another user's computer for a brief amount of time. This capability to "glance" at another user lets users see if they are busy or preoccupied, which in turn helps them better determine the most opportune time to initiate a conversation.
A third type of context to share to improve or enhance situational awareness is the user's audio. In the Thunderwire system, researchers developed an audio-only media space that allowed friends to share raw audio from their mobile devices' microphones. This system, which in essence was a perpetual conference-call, allowed users to listen to other users' audio in order to determine if and when they were participating in a conversation. The WatchMe and ListenIn systems also rely heavily on audio in order to determine if and when a user was potentially interruptible. Unlike Thunderwire, however, these systems rely on machine learning algorithms in order to analyze the user's audio and determine if the user is talking. This allows the system to provide other users with the same context without having to share the actual audio, thereby making it more privacy centric.
A fourth type of context that is commonly shared is the user's overall activity. In the Hubbub and Conchat systems, researchers developed a series of instant messenger applications that monitored when the user was active or idle using either software, or environmental sensors, respectively. This information could then be provided to other users to let them know if and when their friends were available to respond to their messages. In the Digital Family Portrait system, researchers developed a digital picture frame that provides qualitative visualizations of a user's daily activities. This visualization is then provided to the user's adult children so that they could "check up" on their parents without having to explicitly bother them, thereby allowing them to "age in place."
Although these system demonstrate how context awareness can be used to support situational and social awareness, the long term effectiveness of these systems are not yet fully understood. Many of the systems described above have only been evaluated at a conceptual level, or to demonstrate that the system is technically feasible. Consequently, while initial results from these studies suggest that context awareness can support situational awareness tasks, more longitudinal data is required.
Application in health care
Context-aware mobile agents are a best suited host implementing any context-aware applications. Modern integrated voice and data communications equips the hospital staff with smart phones to communicate vocally with each other, but preferably to look up the next task to be executed and to capture the next report to be noted.However, all attempts to support staff with such approaches are hampered till failure of acceptance with the need to look up upon a new event for patient identities, order lists and work schedules. Hence a well suited solution has to get rid of such manual interaction with a tiny screen and therefore serves the user with
- automated identifying actual patient and local environment upon approach,
- automated recording the events with coming to and leaving off the actual patient,
- automated presentation of the orders or service due on the current location and with
- supported documentation to provide such qualities for EHR.
Applications in industrial production
However, all attempts to support staff with such approaches are hampered by fixed production schedules unless the information for customer demand and product configuration can be matched with parts supply. Hence a well suited solution has to get rid of missing interaction of production plan and production line occurrence of relevant information and material by means of
- automated identifying actually available parts delivered from stock or out of buffer supplies,
- automated presenting of the integration requirements for on-demand configuration,
- automated detecting and reporting of the actually mounted configuration
The key requirement is to implement a solution free from manual interaction of worker with information handling. Otherwise the error rate will rise with the rise in information requirements.
Additionally, none of the conventional RFID, WLAN or RTLS locating solutions advertising for most precise locating serve the required quality, as determining a location in conventional attitude looking for absolute coordinates fails either technically or economically. Other approaches based on fuzzy locating promise better return on investment.