Wearable (1)
Upcoming SlideShare
Loading in...5
×
 

Wearable (1)

on

  • 969 views

Wearable (1)

Wearable (1)

Statistics

Views

Total Views
969
Views on SlideShare
969
Embed Views
0

Actions

Likes
1
Downloads
26
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Today, I will talk about wearable computing. My talk has three parts: First, What is Wearable computing, where we will get a feeling of what is wearable computing and how cool it is. Second, Wearable computing implementation. where I introduce you the basic idea of what makes the wearable computing possible Fianlly, we will talk about Wearable computing and Ubiquitous computing. When wearable computing is combined with ubiquitous computing, it can be become more powerful, more useful and more cooler. Ok, let's first have a feeling of what is wearable computer. (first slide) When I prepare for this presentation, I learned a very cool girl named Kio. She wears her computer as clothes all the time, everywhere. Although she has no social life, she stays constant contact with her friends at any time. first, let's look at her interface, a six-petal ring, which allows her to control volume, channels and functions by pressing the petals in a certain order. The ring also responds to certain hand motions. Depending on her mood, she decides how accessible she wants to be and she let the system know through the ring. It does the rest. Wearables are situation aware, and the more I use them, the more they learn about me. For example, my phone interface has just learned that if I’m with my new boyfriend and my mother calls, the call goes directly to voicemail. Cool or what? (second slide) This is her 'message wand’, which is another input device. It’s kind of translucent and displays messages spinning inside. It can be used like pen. The RF system let her write on any surface, even in the air, and the signal is transmitted back to her system so she can see the writing on a screen. With handwriting recognition capability software, I’ll be able to input information, notes from class, just about anything (3td slide) This is the output device, a really coll bug-eye monocle. It connects to the audio piece and works like a tiny monitor that projects an image into my eye. with a camera, she can have video chats with her friends while she is walking down the street! All the accessories are connected by a short range radio data network, so you just need to choose the one you want to use and put it on. (4th slide) Let's look at the belt. this is the base Unit. it contains the central processor, memory, short/long range wireless communications and power unit, as well as GPS capability. So, as we have seen, wearable computering makes computers disapper into our clothes and accessaries and has the following main features: Wearable Portable while operational Hand-free or one-handed operation Augmented reality situation aware unobtrusive Even if I am just wearing the base module I can interact with the network. Just by sitting in front of one of the computers at the library, the network recognizes me and brings up my files, my desktop, my system. I can get my e-mail or surf the web without lugging around a laptop. The system itself is really amazing. The GPS capability lets me post messages to my roommate so that she’ll get them when they’ll have the most impact. For instance, I can send her a reminder to clean up her stuff and have it post just as she’s opening the door to our room. The last thing I want to tell you about this scenario is that this dead cool girl is from future. However, I believe from not very far future. In fact, these are what we have now.
  • The rest of the system--its central processing unit (CPU), which includes a microprocessor, RAM, and hard drive--is worn in a belt around the waist. The
  • Others of the input devices - eye and head trackers, for example, are not yet generally available. One hand or hand free Application-specific Military and industrial applications for wearables especially emphasize their hands-free aspect, and concentrate on speech input and heads-up display or voice output. Other wearables might also use chording keyboards, dials, and joysticks to minimize the tying up of a user's hands.
  • The most appropriate output device to be used with wearable computers again depends on the task to be performed but a wide variety of possible output devices were mentioned by the attendees at the breakout. These were: head mounted displays (HMDs), flat panels, text to speech, tactile output, non speech auditory output, paper and olfactory output (scent). Of these we discussed in more detail HMDs and flat panels.
  • Advantages and disadvantages should be discussed

Wearable (1) Wearable (1) Presentation Transcript

  • Wearable Computing Yuanfang Cai Dec. 6, 2000
  • Discussion Outline What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing
  • What is wearable computing  Wearable  Portable while operational  Hand-free or one- handed operation  unobtrusive  Augmented reality  situation aware
  • >>Wearable Computer Implementation Overall System Block Diagram : Input Device Display Device Com port VGA out Frame grabber Network card Wireless Wireless Network Network Video Camera Main Unit Parallel port Back plane Low Power Indicator Power Supply
  • >>Wearable Computer Implementation>>Input Device  speech recognizer  keyboard alternative including chording keyboards and special purpose keyboards  mouse alternatives including trackballs, joysticks  tab alternatives including buttons, dial  eye trackers  head trackers  pen  gesturing  bar code reader  video capture devices, microphones, GPS locators  other exotic devices such as skin sensors
  • >>Wearable Computer Implementation>>Input DeviceWireless Finger Ring Detection of finger-tip typing Wireless Link Block Diagrams Chording METHOD
  • Wearable Computer Implementation>>Input Device Wireless finger Ring>>Detection of finger-tip typing
  • Wearable Computer Implementation>>Input Device Wireless finger Ring>>Wireless Link
  • Wearable Computer Implementation>>Input Device Wireless finger Ring>>Block Diagrams
  • Wearable Computer Implementation>>Input Device Wireless finger Ring>>Chording Method
  • >>Wearable Computer Implementation>>OutputDevice head mounted displays (HMDs) flat panels, text to speech tactile output non speech auditory output paper and olfactory output (scent)
  • >>Wearable Computer Implementation>>OutputDevice Augmented Reality Typical Augmented Reality System Display Technologies in Augmented Reality
  • >>Wearable Computer Implementation>>OutputDevice Augmented Reality>> Typical Augmented Reality System
  • >>Wearable Computer Implementation>>OutputDevice Augmented Reality>> Display Technologies in Augmented Reality Video See-through Augmented Reality Display Optical See-through Augmented Reality Display
  • >>Wearable Computer Networking General requirements Security requirements  Short-ranged  Privacy  Simple in design  Data Confidentiality  Low power consumption  Data integrity  Self-configuration  Access Control  Restricted to the user  Availability  Security  Source Authentication
  • >>Wearable Computer Networking BlueTooth Security>>Security Architecture
  • >>Wearable Computer Networking BlueTooth Security>>Key Management PIN PIN E2 E2 Authenticatio n Link Key Link Key E3 E3 Encryption Encryption Key Encryption Key Encryption and Key Control
  • >>Wearable Computer Networking BlueTooth Security>>Authentication Verifier Verifier (User A) (User B)SRES’ = E(key, IDB, RAND) RAND SRES = E(key, IDB, RAND) SRES Checks:SRES’ = SRES Challenge-response for symmetric key system
  • Wearable Computing & UbiquitousComputing  Properties and Problems with Ubiquitous Computing  Privacy issues  Difficulty with personalized information:  Properties and Problem with Wearable Computing  Localized information:  Localized control  Resource management:  The Combination-Hive and Locust Swarm  A General Scenario
  • Wearable Computing & Ubiquitous Computing  Properties and Problems with Ubiquitous Computing Hi all, I am Mike,  Privacy issues your new Boss  Difficulty with personalized information : I am Tom ! Tom: Oh, it’s Tom Oh, it’s Tom Me Too! Tom: Let me25 Age: check Let me checkOK, let me check It’s really my databse Age: 25I mynew man! MyOK, will databse god, a play Email: his email troublesome! I have to update this song Tt@yahoo.com Favorite Song: my database! My heart will go on
  • Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! OK, I will play this song Tom:OK, let me check Age: 25 his email Favorite Song: My heart will go on Email: Tt@yahoo.com
  • Wearable Computing & UbiquitousComputingProperties and Problem with Wearable Computing  1. Localized information :  2. Localized control Where is the A New device! I am Tom ! printer’s driver? It should be should I added to my DB. install it? Device Table: Device Table: -------------------- -------------------- 1.Computer 1.Computer 2.Recorder 2.Recorder 3.Printer
  • Wearable Computing & UbiquitousComputingProperties and Problem with Wearable Computing  Resource management : Hi all, I am MikeI am Tom ! Oh my, What should I do? Tom: Mike: Age: 25 Age: 30 Favorite Song: Favorite Song: My heart will go on Salvage Garden Email: Email: Tt@yahoo.com Mm@yahoo.com
  • Wearable Computing & UbiquitousComputing The Combination-Hive and Locust Swarm Why Hive?  Agents are Autonomous  Agents are proactive  Agents can interact  Agents can be mobile What is Locust Swarm?
  • Wearable Computing & UbiquitousComputing Reaping the best of both worlds