<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Understanding and recognizing usage situations using context data available in mobile phones</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pekka Ala-Siuru</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tapani Rantakokko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>VTT Technical Research Center of Finland</institution>
          ,
          <addr-line>Mobile, Interaction, P.O.Box 1100, FI-90571 Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2006</year>
      </pub-date>
      <volume>18</volume>
      <issue>2006</issue>
      <abstract>
        <p>In this paper we introduce a hybrid method for personalizing different interface features in a mobile phone. We give a description how to use combined data from GSM base stations and Bluetooth sources to determine user location and change the user profile automatically according to the location context. We give detailed information about our data logging experiments and the learning algorithms which were developed and tested.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Context-awareness</kwd>
        <kwd>Personalization</kwd>
        <kwd>Mobile Computing</kwd>
        <kwd>Location-Based Services</kwd>
        <kwd>Case-Based Reasoning</kwd>
        <kwd>Bluetooth</kwd>
        <kwd>GSM Cell Id</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Management,</p>
    </sec>
    <sec id="sec-2">
      <title>1. INTRODUCTION</title>
      <p>
        One of the challenging areas of mobile computing device and
software personalization is to use sensory data to obtain context
information for personalization. This has been one of the main
research issues in the pervasive computing community. Several
research groups have been working to get the relevant sensory
information to be used to build services for the users. Already in
1999 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] Schmidt et al introduced experimental use of low
sensory data in a mobile phone to be used to define different kind
of contexts.
      </p>
      <p>Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.</p>
    </sec>
    <sec id="sec-3">
      <title>2. LOGGING CONTEXT DATA</title>
      <p>Data logging was made by logging software which was running in
a Bluetooth (BT) enabled mobile phone. The software for
collecting information from smartphone usage and usage
situations was developed in the Adamos project1. The software
starts automatically when the phone is turned on, runs in the
background without disturbing normal use of the device, and logs
various data types into a file using consistent file format. The
software is simply installed to the test user’s phone, and after the
test period the log file is copied from the phone to a computer for
offline analysis. Consistent format for different data types allow
automatic statistical analysis and easy comparison of data
gathered from different users or usage situations.</p>
      <p>
        Currently our logger collects various usage data such as keypad
lock status, user activity, call status, foreground application,
battery strength and charger status. Also usage situation data is
1 ADAMOS : Adaptive Mobile Services –
http://www.mshalpes.prd.fr/ADAMOS/
logged, for example Bluetooth neighborhood as well as network
area code and cell id, which provide rough location information.
Collected data has been used for usability and user experience
studies, automatic learning of users’ home and work locations,
and as inputs for context-based actions. In the latter case, a
welldefined context framework [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] provided means for personalizing
various phone operations by combining context input sets to
actions via simple XML scripts. The scripts can be generated with
a simple user interface by the user or operator, or even
automatically by learning algorithms.
      </p>
      <p>The goal of our experimentation was, by determining user’s
location automatically, to change the user’s phone profile to
appropriate setting (e.g. in the work profile there could be
different kind of applications available than in home or other
place).</p>
      <p>In earlier experiments we used only the GSM cell ids (CID) for
location determination, but generally the CIDs give too rough
coordinates. For instance in town areas where there are several
base stations the cell data usually overlaps each other. Thus the id
can change from one to another in same location several times in
minutes. We used also logged time data together with the CID
information. That gave a little bit more precision to the location
determination.</p>
      <p>Because of the use of Bluetooth for close area data
communication in mobile phones we decided to log the BT
address information and use it together with the CIDs for even
better location accuracy.</p>
    </sec>
    <sec id="sec-4">
      <title>2.1 Bluetooth</title>
      <p>Bluetooth (BT) can be used to build a Personal Area Network
(PAN). It is defined as an open standard for short-range
transmission of digital voice and data between mobile devices
(laptops, PDAs, phones) and desktop devices. Bluetooth devices
are generally divided to two categories: Class 2 devices operate in
the short distance (10-30 meters) and class 1 devices up to 100
meters. The main bandwidth for class 2 BT devices is 2.1 Mbit/s
with speed of 2.4 GHz. This bandwidth is generally known as the
Industry/Science/Medical (ISM) free band.</p>
      <p>A BT device is identified by its MAC (Media Access Control)
address and a possible user name as seen in the example given in
the Table 1. From the data we can see that two BT devices has
come into the range of the logger and one (D400) is not anymore
available.
Further we can observe the Bluetooth device type, its MAC
address and name (laptop PC D800), data whether the device is in
Home
analyze
logged data
use notebook
info
The scanning software was on all the time and the logged data
was downloaded to PC afterwards. To help the analyzing phase
we used notebook markings (place, time and some situations) all
the time (figure 2). The BT enabled devices which were found
active were PCs, Laptops, PDAs and mobile phones. We didn’t
use any fixed BT or WLAN beacons.
range or not, time of logging, and the running application in the
logging phone.</p>
    </sec>
    <sec id="sec-5">
      <title>2.2 Bluetooth logging (scanning)</title>
      <p>To get information about BT data we walked thru different places.
One route (figure 1) went from home to workplace and from there
to university (distance ~ 500m), by car to downtown (distance 5
Kms) and back home. In the university we walked from library to
cafeteria, bookstore and places where people were gathering
together.</p>
      <p>Workplace
walk
Downtown:
shops,
restaurants..</p>
      <p>Scanning radio beacons in the
environment: GSM Cell ID, (CID) and
Bluetooth (BT) device data</p>
      <p>University: main
library, halls,
rest., other lib.
compose case
(context) rules
change
profile
phone</p>
    </sec>
    <sec id="sec-6">
      <title>2.3 GSM Cell ID (CID) observations</title>
      <p>In general the GSM CID can give location information, but as we
mentioned earlier it needs some supporting data to be useful.
The data in table 2 shows that in the same physical location the
CID have changed back and forth between two cells in five
minutes. These CIDs shown in this example were picked up from
earlier experiments to indicate work situation.</p>
      <p>But actually this CID data can give misinformation if used alone.
In the experiment environment the university area is close to our
workplace and the CIDs can change although no mobility is
observed. At least the other CID seen in the table 2 example
appeared also in the university area.</p>
      <p>To avoid this overlapping cell data, logged time data (time of day,
weekend/weekday) was also used and gave better results. Based
on these observations we decided to examine the BT data together
with CID information.</p>
    </sec>
    <sec id="sec-7">
      <title>3. EXPERIMENTATION FINDINGS</title>
      <p>From the logged data we concentrated to examine four basic
parameters. The amount of BT devices in range during given
time slice, the difference of the seen BT device amount with
different CIDs, the intensity of BT device occurrences in the scan
(log) and the occurrence of one BT device with same BT devices
(to define BT groups).</p>
      <p>We analyzed the most CID occurrences known to appear in the
work location and used them with the average amount of observed
BT devices in the work location (Figure 3). Based on that study
we derived these case rules:
The max parameters were explicitly counted from the logged data
and in this situation (figure 1) the parameters FreetimeBTMax
was 4 and WorkBTmax was 16. The logged data showed also
such amounts of BT devices which could indicate WORK
situation but the CID didn’t support that. In the case rule example
nBTmax is the count of BT devices (work/leisure). The parameter
CurrentProfile was changed accordingly.</p>
      <p>When checking the reoccurrence of same BT devices it must be
realized that the only significant BT -parameter is the BT MAC
address. One must match the addresses from the log data one by
one, because they don’t show always in the same order.
The following table gives one example of the BT device
occurrences in a workplace.
1
2
typically in our observations there was variation of
scanned BT devices between work and other places
the amount of BT devices in the work time/place was in
one test double than elsewhere
the smallest amount of BT devices was at home (1-2)
in restaurant and shop environments there was some
increase (4-5) of BT devices as well as in the university
area</p>
    </sec>
    <sec id="sec-8">
      <title>3.1 Further experiment results</title>
      <p>To further investigate the use of BT data we decided to make a
longer scan (48 hours) and in different situations and places. Still
the basic idea was to find out the usefulness of the BT data in
defining different contexts. We had a partially predefined route as
in the earlier experiment. During the test period we found 163 BT
“InRange” occurrences (partially same devices). The earlier
defined work CIDs could be mapped easily to the Bluetooth
devices in the workplace. The same finding applied also to home
location: the earlier experienced pair: (Same CIDs &amp; Same BTs =
Same Place). In this experiment we noticed also that 10-15 BTs
were scanned only once or twice in a short time slice and
according to notebook markings they were passers by or devices
in a shop or restaurant.</p>
      <p>B T InRange
18.00
18.30
19.00
19.30
20.00</p>
      <p>Figure 4 gives BT device occurrence data during parents meeting
in the evening. The peak in the occurrence (11 devices scanned in
same time) happened when nearly all teachers and parents were in
the school’s main hall in 10-20 meters proximity to each other.
The use of this kind of information is quite demanding and hard to
say if the situation will ever happen again. However, it gives
some hints and reasoning advice. If we define this situation as a
situation case with the known parameters (BTs + CIDs observed
in given time) we can possibly afterwards use it as a basic case for
learning same kind of situations.</p>
      <p>The location change from home to work can be easily seen in
figure 5, where the BT device amount changes strongly when one
arrives to work place. So we can make some situation and
location type conclusions based on the sudden change of scanned
BT device amount together with the known CID data.
12
10
8
6
4
2
0
B T InRange</p>
      <p>Based partially to the case described in figure 4 we derived a case
definition for a basic group (work, home, other). Assume that if a
basic group of BT devices occurs several times together in given
time slice and there are only couple of other devices seen
sporadically we could define this as a basic group case. For this
basic group we can define also guest groups from all those
sporadically seen BT MACs.</p>
      <p>CASE BasicGroupA</p>
    </sec>
    <sec id="sec-9">
      <title>4. CONCLUSIONS AND FUTURE WORK</title>
      <p>We have described in this paper how to collect primary context
data for a mobile phone and specially described our experiments
in combining GSM CID data with Bluetooth data collected from
mobile and other BT enabled devices (e.g. PCs and Laptops).
We defined some cases based on the logged CID and BT data. For
changing the user profile in the mobile (smart) phone we defined
case rules which have been tested and implemented first only as
rules. This will be further studied. The use of BT data increased
the accuracy of work location definition. Generally we found that
CBR method seems to be useful: we found data which can be
used to build cases.</p>
      <p>
        CID with BT MAC address can be used to define
profile cases
with help of learning case data CID and BT data can be
used to build group cases
We were also thinking about the social and privacy issues when
using the scanning software. We didn’t mention anybody that we
were scanning because according to our knowledge Bluetooth,
WLAN, etc. access points are legal to scan in EU. Furthermore
users of Bluetooth enabled devices can explicitly define if they
release the data or not (BT enable/disable) and Bluetooth name
can be left as unknown (table 4). Also according to [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] social
denial is not fear, because people tend to disclose location and
other context data if they think it will be useful for them.
The data logging method that we used (walking and scanning)
reminds the WarDriving2 method:
      </p>
      <p>Using WarDriven (-Walked) data from Web could give
more location information
Oulu not yet WarDriven
WarDrive = Driving in public areas with WLAN &amp; BT -devices
scanning the public network with GPS device and mapping the
areas with explicit coordinate data.</p>
      <p>WarWalking = same but by walking one can get more accurate
data from for instance fixed BT beacons.</p>
    </sec>
    <sec id="sec-10">
      <title>5. ACKNOWLEDGMENTS</title>
      <p>This work has been a part of the Finnish-French project
ADAMOS (Adaptive Mobile Services). The work was supported
by the Academy of Finland and French Science funding
institutions. The partners were University of Oulu, VTT
Technical Research Centre of Finland, CEA Leti, University of J.
Fourier, CNRS, MSH Alpes, ST Microelectronics and France
Telecom R&amp;D. Thanks to all the active partners giving advice
and commenting on this work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Borriello</given-names>
            <surname>Gaetano</surname>
          </string-name>
          , Chalmers Matthew,
          <source>LaMarca Anthony and Nixon Paddy</source>
          ,
          <source>Delivering REAL-WORLD Ubiquitous Location Systems, Communications of the ACM, March</source>
          <year>2005</year>
          , Vol
          <volume>48</volume>
          , No.
          <volume>3</volume>
          .
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . ACM Press
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Consolvo</given-names>
            <surname>Sunny</surname>
          </string-name>
          ,
          <string-name>
            <surname>Smith Ian</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matthews</surname>
            <given-names>Tara</given-names>
          </string-name>
          , LaMarca Anthony, Tabert Jason, Powledge Pauline, Location Disclosure to Social Relations: Why, When, &amp; What People Want to Share,
          <source>CHI 2005 Conference Proceedings</source>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>90</lpage>
          , ACM 2005
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Danezis</given-names>
            <surname>George</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Lewis</given-names>
            <surname>Stephen</surname>
          </string-name>
          and
          <string-name>
            <given-names>Anderson</given-names>
            <surname>Ross</surname>
          </string-name>
          .
          <article-title>How Much is Location Privacy Worth?</article-title>
          .
          <source>Fourth Workshop on the Economics of Information Security (WEIS</source>
          <year>2005</year>
          ). Harvard University,
          <fpage>2</fpage>
          -
          <lpage>3</lpage>
          June 2005.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Eagle</given-names>
            <surname>Nathan</surname>
          </string-name>
          ,
          <article-title>Pentland Alex (Sandy), Reality mining: sensing complex social systems</article-title>
          , Personal and
          <string-name>
            <given-names>Ubiquitous</given-names>
            <surname>Computing</surname>
          </string-name>
          ,
          <year>Nov 2005</year>
          , Pages 1 -
          <fpage>14</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Järkvik</surname>
          </string-name>
          et al . Group Detection Using Bluetooth,
          <source>Poster presentation at UbiComp</source>
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Kang</given-names>
            <surname>Jong</surname>
          </string-name>
          <string-name>
            <surname>Hee</surname>
          </string-name>
          , Welbourne William, Stuart Benjamin, Borriello Gaetano,
          <source>Extracting Places from Traces of Locations, ACM SIGMOBILE Mobile Computing and Communications Review</source>
          , Vol.
          <volume>9</volume>
          ,
          <issue>Nr</issue>
          . 3,
          <issue>2005</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Kofod-Petersen</surname>
            <given-names>Anders</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Aamodt</given-names>
            <surname>Agnar</surname>
          </string-name>
          ,
          <article-title>Case-Based Situation Assessment in a Mobile Context-Aware System</article-title>
          ,
          <source>Proceedings of the Ubicomp 2003 Workshop on Artificial Intelligence in Mobile System</source>
          <year>2003</year>
          , October 12, Seattle, USA.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Korpipää</given-names>
            <surname>Panu</surname>
          </string-name>
          .
          <article-title>Blackboard-based software framework and tool for mobile device context awareness</article-title>
          .
          <source>Doctoral thesis. VTT Electronics</source>
          , Espoo,
          <year>2005</year>
          . 225p. VTT Publications :
          <volume>579</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Schilit</surname>
            ,
            <given-names>B. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LaMarca</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borriello</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Griswold</surname>
            ,
            <given-names>W. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDonald</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lazowska</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balachandran</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Iverson</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Challenge: ubiquitous location-aware computing and the "place lab" initiative</article-title>
          .
          <source>In Proceedings of the 1st ACM international Workshop on Wireless Mobile Applications and Services on WLAN Hotspots</source>
          (San Diego, CA, USA, September
          <volume>19</volume>
          -
          <issue>19</issue>
          ,
          <year>2003</year>
          ).
          <source>WMASH '03</source>
          . ACM Press, New York, NY,
          <fpage>29</fpage>
          -
          <lpage>35</lpage>
          . DOI= http://doi.acm.
          <source>org/10</source>
          .1145/941326.941331
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Schmidt</surname>
            <given-names>Albrecht</given-names>
          </string-name>
          , Aidoo Kofi Asante, Takaluoma Antti, Tuomela Urpo, Van Laerhoven Kristof, Van de Velde Walter,
          <source>Advanced Interaction in Context, Lecture Notes in Computer Science</source>
          , Volume
          <volume>1707</volume>
          ,
          <string-name>
            <surname>Jan</surname>
            <given-names>1999</given-names>
          </string-name>
          , Page 89.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>