190 likes | 451 Views
Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F. Siegemund and C. Florkemeier Outline Introduction Interaction with Smart Objects classification 3 Scenarios Technical Realization
E N D
Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003F. Siegemund and C. Florkemeier
Outline • Introduction • Interaction with Smart Objects • classification • 3 Scenarios • Technical Realization • Conclusions
Introduction • What equipments? • Passive RFID • Unobtrusive Bluetooth-enabled active tags • Mobile phones • Smart objects: • objects with RFID tags • objects that can interact with human • Goal: how human interact with these devices and smart objects
Interaction with Smart Objects • initiated by users: • user has to have the intention • user has to address the smart object • explicit: • push bottom, voice control, etc. • implicit: • a person approaching an automatic door, a movement in the range of an automatic light switch, a specific medicine being removed from a medicine cabinet. • Initiated by smart objects: • predefined rules: • a simple notification service: whom to contact under what conditions • implicit: • a simple notification service: a smart object would try to find who is in its vicinity
Design Objectives • An egg carton to represent a fragile object. • Augmented function: • to detect whenever it is dropped • to detect whenever it is not stored within the appropriate temperature • goal: • monitor the object unobtrusively • associate the appropriate contact person without explicit manual pre-configuration
Devices • BT node • sensor board: • temperature sensor • acceleration sensor • Context-aware: • sensing of a context change (e.g., broken eggs) will trigger the alarm to the user via SMS (short messages) • The SMS also contains a sequence of commands that allow the user to interact with the smart object. (See next page.)
Which Person (phone number) to Contact? • User’s GSM phone is attached with a RFID tag • which can be read by an RFID reader in the vicinity of the smart object • Inside the RFID tag, it describes how the user can be contacted (either a phone number, or a PDA). • This information is broadcast to the BT node in the egg cartons.
Scenario 2: Remote Interaction with Smart Objects and Locations • Each smart object is associated with a phone number. • Users can use SMS to remotely interact with these smart objects. • Example: • querying a smart office (next page)
Challenges • Users do not want to memorize all the phone numbers. • Users do not want to install all these SMS templates. • Solutions: • phone books and SMS templates are predefined as interaction stubs in smart objects. • Through BT, an interaction stub is downloaded to a mobile phone depending on how long and how often he/she stays in that smart office.
Scenario 3: Smart Medicine Cabinet • goal: • reminding people to take some medicine • check availability of some medicine • out-of-date drugs, product recalls • Smart cabinet: • RFID tags (on drugs), RFID reader, and an active BT node (see next page)
Design Details • The RFID reader checks information of medicine and user’s prescription. • Drug usage is determined by appearance/disappearance of a tag and approaching of a user (with BT-enabled GSM phone). • This information is sent to a remote virtual counterpart, which contains the user’s prescription. • Through GSM, when the user is nearby. • Alarm to take a medication: • installed inside the user’s mobile phone, which will check with the virtual counterpart. • see next page.
Conclusions • Smart objects • How to reduce interactions with smart objects, without losing necessary interactions? • invisible pre-selection • 3 interesting scenarios • Homework: • technical realization? • Can you come up with more interesting scenarios of smart objects?