PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION



Similar documents
Towards a Transparent Proactive User Interface for a Shopping Assistant

NFC Based Equipment Management Inventory System

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP

aloe-project.de White Paper ALOE White Paper - Martin Memmel

MOBIlearn - A Model For Interoperability

Management Dashboard in a Retail Environment

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Alcatel-Lucent Office Communication Solutions

Systèmes d information diffus avec l environnement SPREAD

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

remote data capture (rdc)

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

Cellular and Networks Application and Data Usage

Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

The preliminary design of a wearable computer for supporting Construction Progress Monitoring

Quick Start Guide.

EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION

Ipiphony Phone System. User Manual. 1 P a g e

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Assets Location Management Solution Based on the Combination of SmartLocator and RFID

Call Answer/Message Manager with Aliant Voic Online

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Step-by-Step Setup Guide Wireless File Transmitter

Vodafone Plus. User Guide for Windows Mobile

Evolving Bar Codes. Y398 Internship. William Holmes

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0

Remote Access with Outlook 2003 Using RPC over HTTPS

TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query)

v.5 Use Shelby to Communicate Electronically

Discovering Computers Chapter 3 Application Software

Basic Network Design

DSG SoftPhone & USB Phone Series User Guide

User Manual GSM Alarm System. All rights reserved by Delta Security Co., Ltd

CHAPTER 2: USING THE CAMERA WITH THE APP

How To Set Up Dataprotect

XpoLog Center Suite Data Sheet

Preparing Log-ic 360 USB Loggers for Use

Open source integrated remote systems and network management with OpenRSM. M. Kalochristianakis E. Varvarigos

UNICORN 7.0. Administration and Technical Manual

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects

Managed File Transfer

AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0

End User Configuration

VPAT Summary. VPAT Details. Section Web-based Internet information and applications - Detail

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space

Evaluation for Cargo Tracking Systems in Railroad Transportation

E-Blocks Easy RFID Bundle

SuperNav for Heavy Equipment

Online Monitoring User Guide

Gatekeeper Systems. NaviGate USA (Underground Service Alert) Software Product Description. Product Summary. Product Description.

Step-by-Step Setup Guide Wireless File Transmitter

ivms-4200 Client Software Quick Start Guide V1.02

A Study on Integrated Security Service Control Solution Development about CRETA Security

Phone System Guide Handout

Introduction to Computer Networks and Data Communications

Enabling the secure use of RFID

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

Exchange 2003 Mailboxes

PVNMS Brochure All rights reserved. Proxim Wireless Corporation. 1

User guide. Push to Talk

Chapter 1 Basic Introduction to Computers. Discovering Computers Your Interactive Guide to the Digital World

IPRO Viewer. Installation

Creating your own service profile for SJphone

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

FAQ for ipad (ios 5.x)

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA (206) Computer and Phone Support Handbook

Enterprise Remote Control 5.6 Manual

Mobile Commerce and Ubiquitous Computing. Chapter 6

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision CENIT AG Author: Stefan Bettighofer

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Welcome to ebeam Meeting Sharing

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Wireless Multimedia Technologies for Assisted Living

MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT

D-Link Central WiFiManager Configuration Guide

ACCESSING WEB ARCHIVES

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM)

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications

Pervasive Computing. (A Very Short Introduction)

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

TeleMagic Enterprise White Paper Albert Lane Phone Beachwood, Ohio 44122

Allworx Installation Course

XpoLog Center Suite Log Management & Analysis platform

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone

General Product Questions Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

Wireless LAN g USB Adapter

Business Internet service from Bell User Guide

Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Cre-X-Mice Database. User guide

SCADA/HMI MOVICON TRAINING COURSE PROGRAM

Discovering Computers Chapter 9 Communications and Networks

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Getting Started. Install the Omni Mobile Client

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services

Transcription:

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. bowbowshen@yahoo.com.tw Abstract. The objective of the paper is to explore how the personal mobile devices help the user to interact with space and get personal service. We embed the RFID tag in PDA for the sake of identifying the space. The space adapts itself to fit the user s need by reading the data on the electronic tag. And the user uses PDA to interact with the space and record the interactive experience. We establish an interactive scenario between the user and the space to experiment how the system work. 1. Introduction Until recently, personal mobile devices were increasingly used to deal with the personal tasks in daily life. The functions of personal mobile devices include: (i) Cell phone, (ii) Organizing personal information or schedule, (iii) Accessing internet, (iv) Sending or receiving e-mail, (v) Remote controll, (vi) Spatial navigation (GPS). The most popular personal mobile device is the cell phone. Cell phones are largely used to support the subtitles of our everyday life. In addition, people use PDA to organize personal data, schedule tasks, and remind meetings. Increasingly, people connect to the internet using personal mobile devices to explore websites or send and receive mails. In addition to these functions, we regard personal mobile devices as personal digital agents. Besides, as it is argued that humans are surrounded with successive artificial skins that continually vary in number and character according to changing needs and circumstances (Mitchell, 2003), we expect the agents to play an important role of a channel helping people to connect with the next skin of space. The skin of space consists of multimedia and ubiquitous computers that vanish into the background. When we use personal mobile devices to interact with space, the space becomes human explicit boundaries. However, there is a problem, that is, how to compute across the boundaries between private and public, implicit and explicit, personal and multi-user, permanent and temporary interactions. In other words, the personal mobile devices should be considered as media that help us to interact with space for personal services. When we access a space, the space can identify our positions and identification by connecting our personal mobile

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 383 devices such as PDAs. We interact with the space by PDAs that ensure that interaction is personal. Moreover, these daily experiences of interaction can be stored and retrieved by PDA. So our human experience is accumulated and incrementally modified with the interleaving interactions between personal digital devices and interactive spaces. 2. The Scenario In this paper, we regard personal mobile devices as personal digital agents. We use personal mobile devices to extend personal identification in the environment. And the environment can also identify us through the personal mobile devices. So we become unique to the environment. The personal mobile devices become our second skins the digital skins. The second skins not only demonstrate our identification, but store and retrieve our memory and experience. In this paper, we develop a scenario to describe how the personal mobile devices help people to extend their digital skins. This scenario pays attention to the interaction between exhibition spaces and people. 1. The user holds the PDA embedded with an RFID tag. The user imports his personal data in the electronic tag including personal ID, habits, interests, etc. When the user accesses the exhibition space, the exhibition space has an RFID reader to detect the electronic tag embedded in PDA and conveys the data to server PC in the back space. By means of those data, the exhibition identifies the user and modifies its setting to match the user s interest. The operations include projecting welcome messages on the wall, turning on the air conditioner, and showing some hints such as sparking LED lights to attract the user s attention based on the user s interest. These operations occur as soon as the user steps into the exhibition space. 2. At the same time, the user uses PDA to connect with the backend server by Wireless LAN and gets the corresponding information displayed on PDA s screen. The corresponding information supported by the server PC shows some icons and messages to suggest the next step. The user clicks on the icon on the PDA s screen and gets further hints, suggesting his going to the area of sparking LED light. The area of sparking LED light shows some information based on the user s interest which is imported in the RFID tag in advance. The user goes to the area of sparking LED light and visits multimedia exhibitions. During the visit, the user picks up a physical model. As this moment, the projector starts to project a set of 3D animation to introduce information of this model. When the user puts the physical model down, the animation stops and changes to the original setting. In the meanwhile, the server PC remotely delivers the website about the information

384 YANG-TING SHEN, TAY-SHENG TENG of 3D animation and saves it in the user s PDA. After exploring the area, the user may want to visit different information. So the user modifies his personal data in the RFID tag by the RFID writer in the exhibition space. The exhibition space re-detects the modified RFID tag and starts a new pattern of interaction. 3. After exploring the exhibition area, the user moves to another exhibition area. The user interacts with the new exhibition space again through his PDA embedded tag. The user gets new interaction patterns that are different from the previous exhibition space because the personal electronic tag has been modified. 3. Interaction Experience In this scenario, one of the main concepts is provision of personal service. The RFID tag embedded in PDA makes the exhibition space proactively identify the user. And the exhibition space can adapt itself to fit the user s need by reading habits, interests, and records. Different users interact with the exhibition space and have different interaction based on personal data stored in personal RFID tags. The service of space is customized, that is, people act in the same place but get different experiences. Another main concept is adaptive design of personal digital database. In the past, people s daily experiences come from long-term memories in this brains, but the memories aren t supported or augmented by any computational devices. By wearing the RFID tag embedded in PDA, human experience can be recorded, modified, and reused. If the computer detects the changed data, the computer changes the spatial setting to adapt to the new interaction rules. Furthermore, the new rules may trigger new interaction and create new experiences. The personal digital database is correspondingly extended and modified continuously. Besides, the user can take the personal digital database away and reuse it in other places. However, there will be a new mode of interaction because of the modified tag embedded in PDA. 4. Implementation We divide the implementation of the system into three layers: (i) Import (ii) Information processing (ii) Export. This architecture is shown as follows. Figure 1 shows three functional requirements of the personal services including import, information processing, and export function. On Layer 1, there are four devices to receive signals, and import signals into the server database and tag database. When the server database receives the signals from Layer 1, the backend server database analyzes the digital signals and transform the signals into the

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 385 Figure 1. Three parts of implementation. identifiable information. Then the server database exports the identifiable information to Layer 3. So the devices on Layer 3 come up with some responses based on the signals on Layer 1. Figure 2. The system architecture of PDA in ambient media exhibition space. Figure 2 shows that the user holds PAD embedded RFID tag into exhibition space. The RFID tag has imported some personal data. We plan four grids including ID, Habit, Interest, Record (Tag Database of Layer two) to record personal data in

386 YANG-TING SHEN, TAY-SHENG TENG the FID tag. First, we transform the personal data into code for the sake of writing into the RFID tag. The other reason is to make the RFID device identify the electronic tag by the code. For example, the user may enjoy a physical environment with air conditioning and yellow lighting. Once the user goes into the exhibition and approache the RFID device, the latter detects the RFID tag and receives the binary codes in this tag. The RFID device delivers those codes to server PC in the backspace of the exhibition space. The backend server database analyzes those codes and transforms the codes into scripts which the server PC can identify. Based on those scripts, the server starts to activate the devices on Layer 3 through the RF device. For example, the projector may project some texts and images to welcome the user. The air conditioning is activated. The yellow light turns on. The LED in the part of the exhibition area sparks to attract the user s attention. This is so because of the codes recorded in the RFID tag s grid. At the same time, the user uses PDA to connect to server PC by Wireless LAN for the sake of synchronous information to get the scenario supported by the server in the exhibition space (synchronous information of Layer 3). The processes of scenario consist of three parts: (i) Receiving and analyzing data (ii) Computing processing program (iii) Visualizing the result of computing. The PDA only needs to synchronize with the server to get the visual result of the scenario. The PDA needs no computing or pre-loads of any programmes. The visual scenario supported by the server shows some hints to the user. By reading those hints, the user knows how to interact with the exhibition space further. In the process of interaction, the visual scenario may suggest to the user to pick up the related model or go through the floor boards for further interaction. There are some sensors embedded for the sake of detecting the user s action. Once those sensors detect the user s action, they convey some signals to the server. After the backend database analysis, the exhibition shows some virtual information like animation corresponding to the user s action. At the same time, the user can request the server to send the website of the virtual information to save in the PDA. When the user finishes the interactive scenario, the user can modify the RFID tag via the RFID Writer device to save his experience (Tag Database of Layer 2 Record). Therefore, the personal experience is recorded and accumulated continuously by PDA. 5. Conclusion This paper describes how the personal mobile devices help the user to extend his digital boundary and get personal service in an interactive space. The interaction occurs between users and spaces. In the future, we attempt to extend the domain to study the connecting of two or more spaces by the personal mobile devices when the user takes the personal mobile devices from one space to others. The personal information should follow the user flowing from one place to another. The spaces

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 387 work synchronously or asynchronously to exchange users information by interacting with the personal mobile devices. Finally, we could construct a ubiquitous personal database by the personal mobile devices.