10 resultados para Context-Aware and Adaptable Architectures
em Helda - Digital Repository of University of Helsinki
Resumo:
Portable music players have made it possible to listen to a personal collection of music in almost every situation, and they are often used during some activity to provide a stimulating audio environment. Studies have demonstrated the effects of music on the human body and mind, indicating that selecting music according to situation can, besides making the situation more enjoyable, also make humans perform better. For example, music can boost performance during physical exercises, alleviate stress and positively affect learning. We believe that people intuitively select different types of music for different situations. Based on this hypothesis, we propose a portable music player, AndroMedia, designed to provide personalised music recommendations using the user’s current context and listening habits together with other user’s situational listening patterns. We have developed a prototype that consists of a central server and a PDA client. The client uses Bluetooth sensors to acquire context information and logs user interaction to infer implicit user feedback. The user interface also allows the user to give explicit feedback. Large user interface elements facilitate touch-based usage in busy environments. The prototype provides the necessary framework for using the collected information together with other user’s listening history in a context- enhanced collaborative filtering algorithm to generate context-sensitive recommendations. The current implementation is limited to using traditional collaborative filtering algorithms. We outline the techniques required to create context-aware recommendations and present a survey on mobile context-aware music recommenders found in literature. As opposed to the explored systems, AndroMedia utilises other users’ listening habits when suggesting tunes, and does not require any laborious set up processes.
Resumo:
Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.
Resumo:
Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.
Resumo:
This book is a study on learning, teaching/counselling, and research on the two. My quest has been to find a pedagogically-motivated way of researching learning and teaching interaction, and in particular counselling, in an autonomous language-learning environment. I have tried to develop a method that would make room for lived experience, meaning-making and narrating, because in my view these all characterise learning encounters between language learners and counsellors, and learners and their peers. Lived experience as a source of meaning, telling and co-telling becomes especially significant when we try to listen to the diverse personal and academic voices of the past as expressed in autobiographical narratives. I have aimed at researching various ALMS dialogues (Autonomous Learning Modules, University of Helsinki Language Centre English course and programme), and autobiographical narratives within them, in a way that shows respect for the participants, and that is relevant, reflective and, most importantly, self-reflexive. My interest has been in autobiographical telling in (E)FL [(English as a) foreign language], both in students first-person written texts on their language- learning histories and in the sharing of stories between learners and a counsellor. I have turned to narrative inquiry in my quest and have written the thesis as an experiential narrative. In particular, I have studied learners and counsellors in one and the same story, as characters in one narrative, in an attempt to avoid the impression that I am telling yet another separate, anecdotal story, retrospectively. Through narrative, I have shed light on the subjective dimensions of language learning and experience, and have come closer to understanding the emotional aspects of learning encounters. I have questioned and rejected a distanced and objective approach to describing learning and teaching/counselling. I have argued for a holistic and experiential approach to (E)FL encounters in which there is a need to see emotion and cognition as intertwined, and thus to appreciate learners and counsellors emotionally-charged experiences as integral to their identities. I have also argued for a way of describing such encounters as they are situated in history, time, autobiography, and the learning context. I have turned my gaze on various constellations of lived experience: the data was collected on various occasions and in various settings during one course and consists of videotaped group sessions, individual counselling sessions between students and their group counsellor, biographic narrative interviews with myself, open-ended personally-inspired reflection texts written by the students about their language-learning histories, and student logs and diaries. I do not consider data collection an unproblematic occasion, or innocent practice, and I defend the integrity of the research process. Research writing cannot be separated from narrative field work and analysing and interpreting the data. The foci in my work have turned to be the following: 1) describing ALMS encounters and specifying their narrative aspects; 2) reconceptualising learner and teacher autonomy in ALMS and in (E)FL; 2) developing (E)FL methodologically through a teacher-researcher s identity work; 4) research writing as a dialogical narrative process, and the thesis as an experiential narrative. Identity and writing as inquiry, and the deeply narrative and autobiographical nature of the (E)FL teaching/counselling/researching have come to the fore in this research. Research writing as a relational activity and its implications for situated ways of knowing and knowledge turned out to be important foci. I have also focussed on the context-bound and local teacher knowledge and ways of knowing about being a teacher, and I have argued for personal ways of knowing about, and learning and studying foreign languages. I discuss research as auto/biography: as a practising counsellor I use my own life and (E)FL experience to understand and interpret the stories of the research participants even though I was not involved in their course work. The supposedly static binaries of learner/teacher, and also learner autonomy/teacher autonomy, are thus brought into the discussion. I have highlighted the infinite variability and ever-changing nature of learning and teaching English, but the book is also of relevance to foreign language education in general.
Resumo:
The attempt to refer meaningful reality as a whole to a unifying ultimate principle - the quest for the unity of Being - was one of the basic tendencies of Western philosophy from its beginnings in ancient Greece up to Hegel's absolute idealism. However, the different trends of contemporary philosophy tend to regard such a speculative metaphysical quest for unity as obsolete. This study addresses this contemporary situation on the basis of the work of Martin Heidegger (1889-1976). Its methodological framework is Heidegger's phenomenological and hermeneutical approach to the history of philosophy. It seeks to understand, in terms of the metaphysical quest for unity, Heidegger's contrast between the first (Greek) beginning or "onset" (Anfang) of philosophy and another onset of thinking. This other onset is a possibility inherent in the contemporary situation in which, according to Heidegger, the metaphysical tradition has developed to its utmost limits and thereby come to an end. Part I is a detailed interpretation of the surviving fragments of the Poem of Parmenides of Elea (fl. c. 500 BC), an outstanding representative of the first philosophical beginning in Heidegger's sense. It is argued that the Poem is not a simple denial of apparent plurality and difference ("mortal acceptances," doxai) in favor of an extreme monism. Parmenides' point is rather to show in what sense the different instances of Being can be reduced to an absolute level of truth or evidence (aletheia), which is the unity of Being as such (to eon). What in prephilosophical human experience is accepted as being is referred to the source of its acceptability: intelligibility as such, the simple and undifferentiated presence to thinking that ultimately excludes unpresence and otherness. Part II interprets selected key texts from different stages in Heidegger's thinking in terms of the unity of Being. It argues that one aspect of Heidegger's sustained and gradually deepening philosophical quest was to think the unity of Being as singularity, as the instantaneous, context-specific, and differential unity of a temporally meaningful situation. In Being and Time (1927) Heidegger articulates the temporal situatedness of the human awareness of meaningful presence. His later work moves on to study the situational correlation between presence and the human awareness. Heidegger's "postmetaphysical" articulation seeks to show how presence becomes meaningful precisely as situated, in an event of differentiation from a multidimensional context of unpresence. In resigning itself to this irreducibly complicated and singular character of meaningful presence, philosophy also faces its own historically situated finitude. This resignation is an essential feature of Heidegger's "other onset" of thinking.
Resumo:
Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we turn to desktop search. Users often possess multiple devices, and synchronize (subsets of) information between them. This makes file synchronization more important. This thesis presents Dessy, a desktop search and synchronization framework for mobile devices. Dessy uses desktop search techniques, such as indexing, query and index term stemming, and search relevance ranking. Dessy finds files by their content, metadata, and context information. For example, PDF files may be found by their author, subject, title, or text. EXIF data of JPEG files may be used in finding them. User–defined tags can be added to files to organize and retrieve them later. Retrieved files are ranked according to their relevance to the search query. The Dessy prototype uses the BM25 ranking function, used widely in information retrieval. Dessy provides an interface for locating files for both users and applications. Dessy is closely integrated with the Syxaw file synchronizer, which provides efficient file and metadata synchronization, optimizing network usage. Dessy supports synchronization of search results, individual files, and directory trees. It allows finding and synchronizing files that reside on remote computers, or the Internet. Dessy is designed to solve the problem of efficient mobile desktop search and synchronization, also supporting remote and Internet search. Remote searches may be carried out offline using a downloaded index, or while connected to the remote machine on a weak network. To secure user data, transmissions between the Dessy client and server are encrypted using symmetric encryption. Symmetric encryption keys are exchanged with RSA key exchange. Dessy emphasizes extensibility. Also the cryptography can be extended. Users may tag their files with context tags and control custom file metadata. Adding new indexed file types, metadata fields, ranking methods, and index types is easy. Finding files is done with virtual directories, which are views into the user’s files, browseable by regular file managers. On mobile devices, the Dessy GUI provides easy access to the search and synchronization system. This thesis includes results of Dessy synchronization and search experiments, including power usage measurements. Finally, Dessy has been designed with mobility and device constraints in mind. It requires only MIDP 2.0 Mobile Java with FileConnection support, and Java 1.5 on desktop machines.
Resumo:
The object of this study is Jacopo Bassano (c. 1510 1592) as a fresco painter and the significance of frescoes in his late production. The research focuses on the only surviving cycle of frescoes of his later years in the Cartigliano parish church, bearing the date 1575. The other cycle studied here was painted for the 16th century parish church of Enego. It contained one of the most extensive fresco decorations executed by Jacopo Bassano together with his eldest son Francesco. However, nothing has survived of the fresco cycle and the ceiling paintings of the church, nor is any visual documentation of them left. Only the small altarpiece attributed to Jacopo Bassano and depicting Saints Justine, Sebastian, Anthony Abbott, and Roch (dated to c. 1555/1560) has been preserved. I have suggested that the frescoes of the Cartigliano parish church should be examined in the interpretational context of the spirituality of the post-Tridentine period. This period frames the historical context for the frescoes and functions as a basis for the iconographical interpretation that I have proposed. I have shown that the iconographic programme of the frescoes in the choir of the Cartigliano parish church has obvious points of contact with the Catholic doctrines reconfirmed by the Council of Trent (1545 1563). I also argue that the fresco cycle and the ceiling paintings of the Enego church should be placed in the same interpretational context as the frescoes of Cartigliano. I present a reconstruction of the frescoes in the choir attributed to Jacopo Bassano and of those on the walls of the nave attributed to his son Francesco Bassano. According to my reconstruction, the frescoes in the choir and nave walls formed a coherent cycle with a unitary iconographic programme which included the 28 paintings with Old Testament subjects in the nave ceiling. The reconstruction includes the dating and the iconography of the fresco programme and its interpretative basis. The reconstruction is based on visitation records and inventories from the 16th and 17th centuries as well as on the oldest relevant literature, namely the descriptions offered by Carlo Ridolfi (1648) and G. B. Verci (1775). I also consider the relationship of the large compositional sketches attributed to Jacopo Bassano and depicting Christological subjects to the lost frescoes in Enego. These studies have been executed with coloured chalks, and many of them are also dated 1568 or 1569 by the painter. I suggest in this study that these large studies in coloured chalks were preparatory drawings for the fresco cycle in Enego, depicting scenes from the life and suffering of Christ. All the subjects of the aforesaid drawings were included in the Enego cycle.
Resumo:
The aim of this qualitative study is to chart the operational context of the upper-secondary school principals and the historical, cultural and structural factors that steer their day-to-day work. The concepts regarding the study environment and operational culture are defined and analysed in terms of how they are interrelated. Furthermore it is explained why the upper-secondary schools must describe their operational culture within the curriculum. The study also aims to connect the description of the operational culture with the operational system of the upper-secondary school and to analyse the descriptions of the five upper-secondary schools in relation to the commitment to developing a study environment conducive to learning and participation, as well as conducive to supporting interaction. Interview data is used to provide the background for the description of the operational culture and to particularise the results of the analysis. According to the theory used in this study, the steering sources of the day-to-day work of the upper-secondary school are the rules system of the state, the municipality, the curriculum, and on the level of the upper-secondary school administration. The research data consist of the literature concerning the steering, steering forms and the principals professional picture in general terms, from 1950 to the present, and the steering texts concerning the educational environment and operational culture. Furthermore the research data include five descriptions of the operational culture concerning the upper-secondary school, the action reports and student guides. The methods of analysis include the level model and content analysis. The first is a part of the theory used in this study. For the purpose of content analysis, moreover, classifying grounds are established on the basis of theoretical and empirical research data. A result of this study is that, from the perspective of steering, the function of describing the operational culture is clearly linked to the evaluation supporting the goals and the vision of a learning organization. From an administrative point of view, a description is a problem-solving strategy and an instrument of evaluation. The study environment is a structural context in and through which the actors of the school create, change and renew the elements of the structure rooted in the context; this structure is their historically and culturally mediated way of thinking and acting. The initial situation and orientation of the students affect the emphasis of the operational culture descriptions; principals also have their own personal style of leadership. Key words: source of steering, educational environment, operational culture, self-evaluation, learning organisation
Resumo:
Delay and disruption tolerant networks (DTNs) are computer networks where round trip delays and error rates are high and disconnections frequent. Examples of these extreme networks are space communications, sensor networks, connecting rural villages to the Internet and even interconnecting commodity portable wireless devices and mobile phones. Basic elements of delay tolerant networks are a store-and-forward message transfer resembling traditional mail delivery, an opportunistic and intermittent routing, and an extensible cross-region resource naming service. Individual nodes of the network take an active part in routing the traffic and provide in-network data storage for application data that flows through the network. Application architecture for delay tolerant networks differs also from those used in traditional networks. It has become feasible to design applications that are network-aware and opportunistic, taking an advantage of different network connection speeds and capabilities. This might change some of the basic paradigms of network application design. DTN protocols will also support in designing applications which depend on processes to be persistent over reboots and power failures. DTN protocols could also be applicable to traditional networks in cases where high tolerance to delays or errors would be desired. It is apparent that challenged networks also challenge the traditional strictly layered model of network application design. This thesis provides an extensive introduction to delay tolerant networking concepts and applications. Most attention is given to challenging problems of routing and application architecture. Finally, future prospects of DTN applications and implementations are envisioned through recent research results and an interview with an active researcher of DTN networks.
Resumo:
While extant studies have greatly advanced our understanding of corruption, we still know little of the processes through which specific practices or events come to be labeled as corruption. In a time when public attention devoted to corruption and other forms of corporate misbehavior has exploded, this thesis raises – and seeks to answer – crucial questions related to how the phenomenon is socially and discursively constructed. What kinds of struggles are manifested in public disputes about corruption? How do constructions of corruption relate with broader conceptions of (il)legitimacy in and around organizations? What are the discursive dynamics involved in the emergence and evolution of corruption scandals? The thesis consists of four essays that each employ different research designs and tackle these questions in slightly different theoretical and methodological ways. The empirical focus is on the media coverage of a number of significant and widely discussed scandals in Norway in the period 2003-2008. By illuminating crucial processes through which conceptions of corruption were constructed, reproduced, and transformed in these scandals, the thesis seeks to paint a more nuanced picture of corruption than what is currently offered in the literature. In particular, the thesis challenges traditional conceptions of corruption as a dysfunctional feature of organizations in and of itself by emphasizing the ambiguous, temporal, context-specific, and at times even contradictory features of corruption in public discussions.