High-precision identification of contextual information in location-aware engineering applications

نویسندگان

  • Hiam M. Khoury
  • Vineet R. Kamat
چکیده

1474-0346/$ see front matter 2009 Elsevier Ltd. A doi:10.1016/j.aei.2009.04.002 * Corresponding author. Tel.: +1 734 764 4325; fax E-mail addresses: [email protected] (H.M. Khou Kamat). 1 Tel.: +1 734 764 4325; fax: +1 734 764 4292. This paper presents research that investigated algorithms for high-precision identification of contextual information in location-aware engineering applications. The primary contribution of the presented work is the design and implementation of a dynamic user-viewpoint tracking scheme in which mobile users’ spatial context is defined not only by their position (i.e., location), but also by their three-dimensional head orientation (i.e., line of sight). This allows the identification of objects and artifacts visible in a mobile user’s field of view with much higher accuracy than was possible by tracking position alone. For outdoor applications, a georeferencing based algorithm has been developed using the Global Positioning System (GPS) and magnetic orientation tracking devices [5] to track a user’s dynamic viewpoint. For indoor applications, this study explored the applicability of wireless technologies, in particular Indoor GPS, for dynamic user position tracking in situations where GPS is unavailable. The objectives of this paper are to describe the details of the three-stage-algorithm that has been designed and implemented, and to demonstrate the extent to which positioning technologies such as GPS and Indoor GPS can be used together with high-precision orientation trackers to accurately interpret the fully-qualified spatial context of a mobile user in challenging environments such as those found on construction sites. The obtained results highlight the potential of using location-aware technologies for rapidly identifying and retrieving contextual information in engineering applications. 2009 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wlan Based User Position Tracking for Contextual Information Access in Indoor Construction Environments

This paper presents research that is investigating the requirements of an automated location-based methodology to rapidly identify and retrieve contextual project information on indoor and outdoor construction sites for supporting decision-making tasks of site personnel. The proposed approach to this retrieval task is the design and implementation of a dynamic user-viewpoint tracking scheme tha...

متن کامل

Context-aware systems: concept, functions and applications in digital libraries

Background and Aim Among the places that context-aware systems and services would be very useful, are libraries. The purpose of this study is to achieve a coherent definition of context aware systems and applications, especially in digital libraries. Method: This was a review article that was conducted by using Library method by searching articles and e-books on websites and databases. Results:...

متن کامل

The Impact of Situation Clustering in Contextual-Bandit Algorithm for Context-Aware Recommender Systems

Most existing approaches in Context-Aware Recommender Systems (CRS) focus on recommending relevant items to users taking into account contextual information, such as time, location, or social aspects. However, few of them have considered the problem of user’s content dynamicity. We introduce in this paper an algorithm that tackles the user’s content dynamicity by modeling the CRS as a contextua...

متن کامل

The contextual map: detecting and exploiting affinity between contextual information in context-aware mobile environments

Context-aware computing generally focuses on abstracting the situation of individual entities, such as persons, places and objects, making this information available for further computational exploitation. Those resulting entities’ contexts allow a wide spectrum of application cases in various domains, foremost in mobile computing and internet applications. With contexts from multiple entities ...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Advanced Engineering Informatics

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2009