Mobile Sensors and Context-Aware Computing
()
About this ebook
Mobile Sensors and Context-Aware Computing is a useful guide that explains how hardware, software, sensors, and operating systems converge to create a new generation of context-aware mobile applications. This cohesive guide to the mobile computing landscape demonstrates innovative mobile and sensor solutions for platforms that deliver enhanced, personalized user experiences, with examples including the fast-growing domains of mobile health and vehicular networking.
Users will learn how the convergence of mobile and sensors facilitates cyber-physical systems and the Internet of Things, and how applications which directly interact with the physical world are becoming more and more compatible. The authors cover both the platform components and key issues of security, privacy, power management, and wireless interaction with other systems.
- Shows how sensor validation, calibration, and integration impact application design and power management
- Explains specific implementations for pervasive and context-aware computing, such as navigation and timing
- Demonstrates how mobile applications can satisfy usability concerns, such as know me, free me, link me, and express me
- Covers a broad range of application areas, including ad-hoc networking, gaming, and photography
Manish J. Gajjar
Manish J. Gajjar is a technical program manager and early prototyping lead for sensor solutions at Intel Corporation He has 20 years of experience at Intel in chipsets and graphics products, including roles as validation architect, design/validation and emulation lead to post silicon validation program manager. Manish has also served on the Industry advisory board of California State University and as a faculty member there.
Related to Mobile Sensors and Context-Aware Computing
Related ebooks
Security in IoT Social Networks Rating: 0 out of 5 stars0 ratingsRIoT Control: Understanding and Managing Risks and the Internet of Things Rating: 5 out of 5 stars5/5Deep Learning on Edge Computing Devices: Design Challenges of Algorithm and Architecture Rating: 0 out of 5 stars0 ratingsReal World Multicore Embedded Systems Rating: 3 out of 5 stars3/5Ascend AI Processor Architecture and Programming: Principles and Applications of CANN Rating: 0 out of 5 stars0 ratingsComputer Science on your Mobile Rating: 0 out of 5 stars0 ratingsDesigning Embedded Internet Devices Rating: 0 out of 5 stars0 ratingsThe Art of Designing Embedded Systems Rating: 0 out of 5 stars0 ratingsEmbedded Controller Hardware Design Rating: 2 out of 5 stars2/5How to Save Money and Save Energy Rating: 0 out of 5 stars0 ratingsProblem-solving in High Performance Computing: A Situational Awareness Approach with Linux Rating: 0 out of 5 stars0 ratingsFPGA prototyping The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsTensor Analysis and Elementary Differential Geometry for Physicists and Engineers Rating: 0 out of 5 stars0 ratingsAutomated Theorem Proving in Software Engineering Rating: 0 out of 5 stars0 ratingsPower Management in Mobile Devices Rating: 0 out of 5 stars0 ratingsBuilding NFTs with Ethereum: Learn how to create, deploy, and sell NFTs on Ethereum (English Edition) Rating: 0 out of 5 stars0 ratingsHandbook of Human Centric Visualization Rating: 0 out of 5 stars0 ratingsMicrosoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7 Rating: 0 out of 5 stars0 ratingsPractical Knowledge Engineering Rating: 0 out of 5 stars0 ratingsIntroduction to Sensors in IoT and Cloud Computing Applications Rating: 0 out of 5 stars0 ratingsBio-inspired Algorithms for Engineering Rating: 0 out of 5 stars0 ratingsNetwork Processors: Architecture, Programming, and Implementation Rating: 0 out of 5 stars0 ratingsIntel Galileo Essentials Rating: 0 out of 5 stars0 ratingsIntro to Bluetooth Low Energy: Learn Bluetooth Low Energy in a single weekend Rating: 0 out of 5 stars0 ratingsSemiconductor Silicon Wafer A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsEdge Cloud Operations: A Systems Approach Rating: 0 out of 5 stars0 ratingsIoT Communication Protocols Second Edition Rating: 0 out of 5 stars0 ratingsInstant StyleCop Code Analysis How-to Rating: 0 out of 5 stars0 ratings
Computers For You
CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsMastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Childhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsDark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Going Text: Mastering the Command Line Rating: 4 out of 5 stars4/5AP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5
Reviews for Mobile Sensors and Context-Aware Computing
0 ratings0 reviews
Book preview
Mobile Sensors and Context-Aware Computing - Manish J. Gajjar
Amani.
Chapter 1
Introduction
Abstract
This chapter provides introduction to mobile computing, its constraints and market influence, trends and future growth area examples.
Keywords
Introduction to mobile computing; constraints; market trends; growth areas
Information in This Chapter
• Definition of Mobile Computing
• Constraints and the Challenges Faced by Mobile Computing System
• Historical Perspectives and the Influences of Market
• Market Trends and Growth Areas
Definition of Mobile Computing
Mobile computing refers to the computing that happens when the user interacts while the computer or parts of the computer are in motion during the use. Hardware components (like computing silicon, various sensors, and input/output devices), software components (like programs that communicates with underlying hardware, device drivers, applications, and software stacks to support communication protocols), and communication protocols like Wi-Fi protocols and hypertext transfer protocol (HTTP) are some of the main components of mobile computing. Through these components user-to-computer or computer-to-computer communications/computing happens.
The following are the three main classes of mobile computing:
• Mobile phones: Mobile phones are primarily used for voice calls and voice communication but with the advent of smartphones these devices are now used for computing applications, games, and data access over Wi-Fi or other wireless networks. These devices are increasingly adding to computational capabilities.
• Portable computers: Portable computers are devices with only essential computing components and input/output devices. These are lighter in weight than desktops, and weight reduction is achieved through removal of nonessential input/output devices like disc drives, use of compact hard drives, and so on. Extra connecting ports like USB and Firewire are used to connect external I/O drives or other devices if needed. These compact, lightweight computers have full-character-set keyboards and host software like Windows, Android, and Mac OS. Examples are laptops, notebooks, tablets, notepads, and so on.
• Wearable computers: These are mobile computing devices that have the technology that users may want to put on their body with the dual purpose of fashion plus computation/connection to the external world through wireless or communication protocols. These devices are capable of sensing, computing, running applications/software, reporting, and connecting. Examples are watches, wristbands, necklaces, keyless implants, and so on, which can take voice commands, or sense various environmental or health parameters and communicate either with mobile phones, portable computers, or the Internet.
Let us evaluate the differences of mobile computing devices versus other computing devices, as shown in Table 1.1.
Table 1.1
Quick Comparison Between Different Forms of Mobile Computing Devices
Constraints and the Challenges Faced by Mobile Computing Systems
Mobile computing devices have a smaller form factor than traditional desktops. There is need to impose constraints on space, weight, and form factors of these devices since their users are on the move while computing or connecting. These constraints in turn impose various technological and design restrictions on the devices. Let us briefly look at those restrictions:
Resource Poor
A computer system requires various components to process, compute, or connect. Hence any device in the computer system or connected to the computer system is a resource or system resource. These resources can be physical or virtual component. Example of such resources include the CPU, RAM, hard disks, storage devices, various input/output devices like printers, and connectivity components like Wi-Fi or modem. Mobile computing devices are resource limited. For example, their screens and keyboards are small, they have reduced I/O connections, reduced RAM, power storage, and so forth. This makes them challenging to use, program, and operate.
Resource restrictions can be mitigated with the use of alternate methods for input, storage, processing, and so on. For example, alternate input methods of speech or handwriting recognition can be used instead of keyboards, alternate storage methods such as cloud storage can be used instead of hard disks, and cloud computing can be used for certain processing instead of more power hungry on device CPU. These methods however require training of the devices and efficient communication capabilities.
Less Secured/Reliable
All compute devices have important resources and store valuable data and/or programs. It is important to protect access to all of these compute resources and data through user recognition and user authentication. Appropriate gatekeeper procedures and mechanisms should be deployed to protect the underlying data, programs, and applications while enforcing appropriate privacy guidelines and protocols. Since mobile devices are mostly in transit, their security becomes increasingly more challenging since these devices may use wireless channels, public resources, or networks that can provide easy access to these mobile systems.
With the explosion in smartphone usage, a lot of personal information is now saved and stored on smartphones. Users employ smartphones for communication, planning, organizing, and accessing and processing financial transactions.
Hence smartphones and information systems supporting them carry increasingly more sensitive data, thereby introducing new security risks while posing serious privacy access and processing complexities.
Some of the sources of security risks are
• Through messaging systems like SMS, MMS
• Through connection channels like Wi-Fi networks, GSM
• Through software/OS vulnerabilities to external attacks
• Through malicious software and user ignorance about it.
Some of the mitigation options are
• Use of encryption methods (Wired Equivalent Privacy: WEP, Wi-Fi Protected Access: WPA/WPA2) encryption
• Using VPN or HTTPS to access Wi-Fi/Internet
• Allow only known MAC addresses to join or connect to known MAC addresses only.
Intermittent Connectivity [1]
Mobile computing devices may be away from various communication infrastructures like Wi-Fi or the Internet for considerable periods of time. However to access required data and programs stored at remote locations, they need to be connected even if possible only intermittently. Such intermittent connectivity needs a different kind of data transfer mechanism that can handle power management issues, package loss issues, and the like.
Mobile devices need data to be buffered in the case where only intermittent connections to the network are possible. To prevent any data loss, the data transfer mechanisms in mobile devices need to handle cases when data is generated or received more frequently than the available connectivity. There could also be interruptions, interference, downtime, and so on that cause interruptions in communication links. Power scarcity can also cause a device to throttle communication or a connection. In such cases mobile devices and their data transfer mechanisms should be able to effectively and efficiently manage all available resources and connection time while avoiding user noticeable data loss.
Mobile devices should also be able to handle and deploy additional mechanisms to support interoperability (rate, routing, and addressing methodology) among communication protocols because it may dynamically move from one protocol to another during device transit.
Energy Constrained [2]
The lack of a readily available power source, smaller and compact size and resources for power storage and complex data management, security requirements, and connectivity requirements make energy availability and battery life a key constraint for mobile devices.
In addition, mobile devices use power-hungry sensing, storage, and communication capabilities but have some very stringent power and thermal budgets. These devices are without fans, are often in close skin contact with the user, and have restricted surface area; hence they are limited by peak power consumption since the user experience is affected by the temperature of the device. This further underscores why power management and battery life are key design parameters and constraints for mobile devices.
A mitigation plan for these challenges includes power management with an emphasis on platform power optimization and user experience:
• Platform power and optimization: the power management policy should be inclusive of available hardware resources of the mobile platform and manage their operation for energy efficiency.
• User experience: the usage of mobile devices extends from CPU- or graphics-intensive usage to sensor-heavy usage. Various location-based services and applications would require sensors like accelerometers, gyrometers, and cameras. Applications using touch capabilities would require quick exit from power-managed states and gaming applications would require higher throughput with brighter display. Thus power management system should consider these use cases, and corresponding system responsiveness requirements.
Thus mobile devices need hardware resources that provide various low-power states along with energy-aware operating systems and applications. Both hardware and software should be intelligent to incorporate user interaction, sensor inputs, and computational and protocol optimizations and their dynamic behavior/loads.
Historical Perspectives and the Influences of Market
The following are some of the key factors influencing the move to mobile computing. Some of these factors also influence the form factors within mobile computing options.
Enhanced User Experience
Mobile computing changes our approach to connectivity: in how we connect to different geographical locations, different people, cultures, and processes. It changes the way we gather, interact with, and process the information based on various sensing applications and location-based services. It enhances our perception of the digital world and merges that digital world with our physical world. It increases our computing power over our traditional standalone and stationary computers while enabling us to carry this enhanced computing experiences to carry it around wherever we desire.
Improved applications have been developed to harness hardware resources: various leading providers (such as Apple and Google) are offering many applications that extend the range of functionality of smartphones and other mobile devices, such as application to measure the heart rate using the rear camera of a smartphone. Such applications use hardware for functions other than their primary functions thereby extending the capabilities of mobile devices beyond traditional usage.
Improved Technology
With improved technology, mobile devices now have improved battery life, faster processors, user-friendly and lightweight manufacturing materials, power-efficient flexible displays, and high-bandwidth networks. The devices also have numerous sensors like biometric sensors, temperature and pressure sensors, pollution sensors, and location sensors. There are also infrared keyboards, gesture and retina tracking sensors, enhanced artificial intelligence, and new context-aware user interfaces. All these features increase the clarity of videos, images, text, and the like while generating new use cases and applications, making it possible to manufacture mobile devices in various shapes, forms, and designs.
New Form Factors
The way the user interacts with and uses mobile devices will change with advancements in the underlying technology. For example, a user has to reach his/her pocket many times a day (typically 150 times a day) to access a smartphone, but as the proliferation of wearables increases over time, much of this access will become hands-free. The amount of data and content uploaded from mobile devices is also increasing at an amazing growth rate. The uploaded content includes images, video, music, and so forth, but with increasing use of wearable devices (such as Nike Fuel and Google Glass), more personal data related to fitness, financial information, location services, and so on would be uploaded.
Increased Connectivity/Computing Options
There is now an abundance of wireless connectivity through various means like cellular mobile networks, wireless LAN, Bluetooth, ZigBee, ultra-wideband networks, Wi-Fi, and satellite networks. Additionally, with the birth of cloud computing, users are now also offered shared resources along with connectivity. The user is no longer tied to a particular location or device to upload, access, or share data. Availability of such a wide variety of connectivity and shared computing
options has enabled both personal and business users to add more mobile devices/computing on such networks to improve their mobility and reduce infrastructure costs for business/personal data sharing.
Market Trends and Growth Areas
There are three fundamental driving factors for the growth of mobile computing devices: new sensor technology and products, sensor fusion, and new application areas.
New Sensor Technology and Products [3–5]
Sensors are fundamental to the growth in mobile device functionality. Technological progress and enhanced functionalities of mobile MEMS (micro-electronics-mechanical systems) sensors like microphones, cameras, accelerometers, gyroscopes, and magnetometers have enabled services like navigation, context awareness, location-based services, and augmented reality in the mobile computing devices.
Cameras and display technologies are showing considerable innovation with touch sensors, flexible and energy-efficient displays that brings reality to images, videos, and even 3D perception. For example, multiple cameras are being used to track user eye movements to highlight only relevant sections of the display while masking the not needed
text or images on other parts of the display.
There is also an emergence of wearable technology, particularly related to health and fitness, which rely heavily on sensors that measures temperature, pressure, humidity, physical activity, and other key aspects of the body.
The worldwide wearable computing device market [6] (wearables) is expected to reach 126.1 million units by year 2019, with higher volumes expected to be driven by increasing end-user acceptance of wearables and increasing number of vendors entering the market with more device variations.
The key takeaways from the current market analysis are:
• Basic wearables that do not run third party applications will reach 52.3 million units in 2019.
• Smart wearables which run third party applications on them will grow at a faster rate than the basic wearables and is expected to reach 73.8 million units in 2019.
• Wrist worn wearables will account for 80% of all wearable shipments by 2019.
• The worldwide wearables market revenue opportunity is expected to reach 27.9 billion by 2019.
The market analysis could be impacted by the following potential scenarios over the next 5 years:
• The mobile market plateaus and the PC regains traction, thereby cooling off the MEMS market. This might seem unlikely but 5 years ago no one would have predicted that the PC market would stall in the way that it has.
• Wearables take off in a big way, with Google Glass leading to Kindle Glass and iGlass, giving MEMS sensors an even bigger boost.
• New classes of devices emerge, fueling even greater demand for MEMS.
Fig. 1.1 shows the worldwide wearables shipment for basic and smart wearables.
Figure 1.1 Worldwide wearables shipments by product category, 2017–19 [7].
Fig. 1.2 shows the worldwide wearables average selling price for basic and smart wearables.
Figure 1.2 Worldwide wearable technology ASP by product category, 2017–19 [7].
Fig. 1.3 shows the worldwide wearables revenue for basic and smart wearables.
Figure 1.3 Worldwide wearables revenue by product category, 2017–19 [7].
Sensor Fusion
Sensor fusion [7] is the process of merging data from different sensors such that final output data conveys more information than each of the individual sensors whose data was merged.
Today’s smartphones and tablets are not exactly ideal sensing platforms, due to their inability to harness and redefine the power of inherent sensors. As manufacturers today try to keep their products compact and competitively priced, the reliability of underlying sensors is compromised, while the sensor measurements are adversely affected by increasing electrical noise as they are subjected to magnetic anomalies, temperature variations, shock, and vibrations.
Developers today may think that sensor data are not accurate or reliable and refrain from developing applications that use or enhance the usage of underlying sensor data. Following are the two dependencies that affect the accuracy and reliability the sensor data:
• Operating systems of the mobile devices with sensors: Android, IOS, and Windows Phone may not be designed to handle real-time tasks such as on-demand sensor sampling. Hence the time stamps on sensor samples are unreliable.
• Filtering/dead-banding of sensor data: Sensor data today are manipulated using low-pass filtering and dead-banding methods that can discard otherwise useful data making sensing less reliable and less responsive. (A dead band is a band where no actions occur.)
For example, a gyroscope will have numerous error sources. One of the error sources is gyroscope bias. Bias is the signal output when the gyro is not experiencing any rotation. It represents a rotational velocity. This bias error will vary with temperature, time, noise, and so on. A gyroscope with XY°/second bias may appear to be spinning when the device is at rest (Fig. 1.4).
Figure 1.4 Gyroscope basics [8].
A magnetometer measures Earth’s magnetic field and its readings are used to calculate the heading of the rigid body. But it also suffers from errors resulting in heading errors (such as those from magnetic materials in the sensor, noise from magnetic components inside the sensor, or from nearby ferrous objects).
Accelerometers measure proper/g-force acceleration. This is the acceleration an object experiences relative to freefall and is the acceleration felt by people and objects. But it also suffers from bias. This bias is the difference between the ideal 0g output and the 0g output reported by the sensor. On a perfectly horizontal surface, if there were no bias error, then the sensor output would read the ideal 0g offset voltage on the x- and y-axis, +1g output voltage on the z-axis but due to bias error, it would show values other than ideal values.
So each of the individual sensors have biases and errors. An algorithm can be developed where sensor measurements from different sensors of the same event can be processed to separate out the real data and noise/sensor errors. This process is known as sensor fusion. With appropriate implementation of such algorithms, the perception of ideal responsiveness can be maintained while offsetting errors and shortcomings of individual sensors, thereby providing useful and reliable results.
For example, if a gyroscope is used along with an accelerometer and magnetometer to determine the device’s absolute orientation (the 3D rotation angle), then the sensor fusion process can be used to generate an interpreted event by collecting data from the three different sensors, performing mathematical calculations to remove individual sensor biases and errors, converting resultant data into format suitable to the developer and representing it in the same form of interpreted events.
Such interpreted events can be considered as output of virtual sensors
and be represented in the same form as original sensor events. These virtual sensors provide a solution and measurements that cannot be obtained from any single sensor. Measurements from virtual sensors are in between what can actually be measured on real sensors and the ideal measurement desired by the developers. Sensor fusion algorithms can reside in low-level code, in the sensor itself, or as part of application, and they can remove the biases and errors, thus providing designers with greater flexibility in selecting and combining sensor