SlideShare a Scribd company logo
1 of 27
PERVASIVE
COMPUTING
Temportary for rishuu reference
slide...delete it
 Pervasive computing refers to embedding computers and communication in our
environment. Pervasive computing provides an attractive vision for the future of
computing. The idea behind the pervasive computing is to make the computing power
disappear in the environment, but will always be there whenever needed or in other
words it means availability and invisibility. These invisible computers won’t have
keyboards or screens, but will watch us, listen to us and interact with us. Pervasive
computing makes the computer operate in the messy and unstructured world of real
people and real objects. Distributed devices in this environment must have the ability
to dynamically discover and integrate other devices. The prime goal of this
technology is to make human life more simple, safe and efficient by using the
ambient intelligence of computers.
Out Line
 What is Pervasive Computing?
 Why Pervasive Computing?
 Examples
 Founder of Pervasive Computing
 History
 Goal
 How? (Pervasive Computing Technologies)
 MIT- OXYGEN PROJECT
 Issues
What is PERVASIVE COMPUTING?
Computing
 Everywhere
 Anytime
PERVASIVE COMPUTING
 􀂄 Technology View
Computers everywhere – embedded into
fridges, washing machines, door locks, cars,
furniture, people etc.
intelligent environment
 􀂄 User View
Invisible: implicit interaction with the environment
 􀂄 Pervasive = mobile computing + intelligent
environment
 Pervasive (Ubiquitous, Omnipresent)
Computing integrates computation into the
environment, rather than having computers
which are distinct objects.
 It enables people to interact with
information-processing devices more
naturally and casually, in whatever location
or context they are.
Why Pervasive Computing?
 Around Eight billion embedded
microprocessors are produced each year.
 This number is expected to rise dramatically
over the next decade, making electronic
devices ever more pervasive.
 They may be interconnected via wired and
wireless technologies into broader, more
capable, networks.
Pervasive Computing Example
• For instance, your washing machine or TV
could detect its own failure and notify its
maintenance company to arrange for a
repair.
Mark Weiser’s (founder) VISION
“In the 21st century the technology
revolution will move into the
everyday, the small and the
invisible…”
“The most profound technologies are those that
disappears. They weave themselves into the fabrics of
everyday life until they are indistinguishable from it.”
Mark Weiser (1952 –1999), XEROX PARC
History
 Pervasive computing is the third wave of computing
technologies to emerge since computers first appeared:
 First Wave - Mainframe computing era: one computer
shared by many people, via workstations.
 Second Wave - Personal computing era: one computer
used by one person, requiring a conscious interaction.
Users largely bound to desktop.
 Third Wave – Pervasive computing era: one person,
many computers. Millions of computers embedded in the
environment, allowing technology to recede into the
background.
Goals of Pervasive Computing
Invisible technology
Integration of virtual and physical worlds
(virtual reality)
Throughout desks, rooms, buildings,
and life
Pervasive Applications
Magic Mirror
 A magic mirror that shows
personal data and actions of those
users who face it in a meeting.
 Physical integration: the mirror can sense the
presence of users in a meeting and can
record their actions, in addition to its normal
physical function
 Instantaneous interoperation: the mirror
would interact with the room’s other
components the moment you switch it on and
would make spontaneous association with all
relevant local sources of information about
users.
Smart Clothing
 Conductive textiles and inks
 print electrically active
patterns directly onto fabrics
 Sensors based on fabric
 e.g., monitor pulse, blood
pressure, body temperature
 Invisible collar microphones
 Kidswear
 integrated GPS-driven
locators
 integrated small cameras (to
keep the parents calm)?
Interactive Map
 Foldable
You are here!
 A visitor brings his/her laptop into a
meeting room and without manually
configuring it in any way uses it to
send his presentation to the room’s
projector
 Physical integration: the projector can be
activated from any laptop in the room
 Instantaneous interoperation: A laptop
can spontaneously interact with the
projector and control the presentation
 Can be made context-sensitive, e.g.,
allowing only a particular visitor to do so
Pervasive Computing Technologies
 Pervasive computing involves three converging
areas of Information and Communications
Technology:
Computing (‘smart devices’),
Communications (‘connectivity’)
User interfaces
Smart Devices – can communicate
with each other and act intelligently
 sensors: input devices that detect
environmental changes, user
behaviors, human commands etc;
 processors: electronic systems
that interpret and analyze input-
data;
 actuators: output devices that
respond to processed information
by altering the environment via
electronic or mechanical means.
For example, air temperature
control is often done with actuators.
However the term can also refer to
devices which deliver information
rather than altering the environment
physically.
Smart Devices (cont.)
 Can remember important events
 They have a memory
 Show context-sensitive behavior
 They may have sensors
 Location/situation/context
awareness
 Are responsive/proactive
 Communicate with environment
 Networked with other smart objects
Connectivity (network)
 Pervasive computing systems rely on the
interlinking of independent electronic devices
into broader networks.
 This can be achieved via both wired and
wireless networking technologies (such as WiFi
or Bluetooth), with the devices themselves being
capable of assessing the most effective form of
connectivity in any given scenario.
 The effective development of pervasive
computing systems depends on their degree of
interoperability, as well as on the convergence
of standards for wired and wireless
technologies.
User Interfaces
 New user interfaces are developed that is capable
of sensing and supplying more information about
users, and the broader environment, to the
computer for processing.
 For example recognizing a person’s face, or
responding to gestures. It might also be based on
sound, scent or touch recognition, or other
sensory information like temperature.
 The output might also be in any of these formats.
Applications for Pervasive Computing
 Healthcare
Intelligent bandages that can tell how the
injury is doing or video consultations with
doctors, that can treat patients at home.
 Home care
 Transport
 Environmental Monitoring
 Industry & Academia
MIT- OXYGEN PROJECT
 For over forty years, computation has centered
about machines, not people. We were/are
pampering them in air-conditioned rooms or
carrying them around with us.
 But in the near future computation will be
human-centered. It will be freely available
everywhere, like oxygen in the air we breathe. It
will enter the human world, handling our goals
and needs and helping us to do more while
doing less.
Issues
 Engineering Issues
Current lack of low cost technology to locate
devices and the lack of suitable power
sources.
Communications, software and hardware
are likely to suffer from faults.
Also faulty systems may be harder to repair
because of the degree of interconnection.
Issues
 Privacy, security and safety
Gathers sensitive data, for example on users
everyday interactions, movements,
preferences and attitudes, without user
intervention or consent;
Retrieves and use information from large
databases/archives of stored data;
Alters the environment via actuating devices.
•Pervasive Computing (IEEE)
•Personal and Ubiquitous Computing (Springer)
•Pervasive and Mobile Computing journal, PMC (Elsevier)
•Ubiquitous Computing and Communication Journal –
UbiCC Journal
Journal
THANK YOU…

More Related Content

Similar to pervasive-computing-09022014092937-pervasive-computing.ppt

pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation Assem mousa
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignDave Shaw
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha Maheshwari
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Smart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing GameSmart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing Gameguest218195
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 

Similar to pervasive-computing-09022014092937-pervasive-computing.ppt (20)

pervasive computing
pervasive computingpervasive computing
pervasive computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10Shradha maheshwari wearable computers 11-09-10
Shradha maheshwari wearable computers 11-09-10
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Smart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing GameSmart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing Game
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

pervasive-computing-09022014092937-pervasive-computing.ppt

  • 2. Temportary for rishuu reference slide...delete it  Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive vision for the future of computing. The idea behind the pervasive computing is to make the computing power disappear in the environment, but will always be there whenever needed or in other words it means availability and invisibility. These invisible computers won’t have keyboards or screens, but will watch us, listen to us and interact with us. Pervasive computing makes the computer operate in the messy and unstructured world of real people and real objects. Distributed devices in this environment must have the ability to dynamically discover and integrate other devices. The prime goal of this technology is to make human life more simple, safe and efficient by using the ambient intelligence of computers.
  • 3. Out Line  What is Pervasive Computing?  Why Pervasive Computing?  Examples  Founder of Pervasive Computing  History  Goal  How? (Pervasive Computing Technologies)  MIT- OXYGEN PROJECT  Issues
  • 4. What is PERVASIVE COMPUTING? Computing  Everywhere  Anytime
  • 5. PERVASIVE COMPUTING  􀂄 Technology View Computers everywhere – embedded into fridges, washing machines, door locks, cars, furniture, people etc. intelligent environment  􀂄 User View Invisible: implicit interaction with the environment  􀂄 Pervasive = mobile computing + intelligent environment
  • 6.  Pervasive (Ubiquitous, Omnipresent) Computing integrates computation into the environment, rather than having computers which are distinct objects.  It enables people to interact with information-processing devices more naturally and casually, in whatever location or context they are.
  • 7. Why Pervasive Computing?  Around Eight billion embedded microprocessors are produced each year.  This number is expected to rise dramatically over the next decade, making electronic devices ever more pervasive.  They may be interconnected via wired and wireless technologies into broader, more capable, networks.
  • 8. Pervasive Computing Example • For instance, your washing machine or TV could detect its own failure and notify its maintenance company to arrange for a repair.
  • 9. Mark Weiser’s (founder) VISION “In the 21st century the technology revolution will move into the everyday, the small and the invisible…” “The most profound technologies are those that disappears. They weave themselves into the fabrics of everyday life until they are indistinguishable from it.” Mark Weiser (1952 –1999), XEROX PARC
  • 10. History  Pervasive computing is the third wave of computing technologies to emerge since computers first appeared:  First Wave - Mainframe computing era: one computer shared by many people, via workstations.  Second Wave - Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.  Third Wave – Pervasive computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
  • 11. Goals of Pervasive Computing Invisible technology Integration of virtual and physical worlds (virtual reality) Throughout desks, rooms, buildings, and life
  • 12. Pervasive Applications Magic Mirror  A magic mirror that shows personal data and actions of those users who face it in a meeting.  Physical integration: the mirror can sense the presence of users in a meeting and can record their actions, in addition to its normal physical function  Instantaneous interoperation: the mirror would interact with the room’s other components the moment you switch it on and would make spontaneous association with all relevant local sources of information about users.
  • 13.
  • 14. Smart Clothing  Conductive textiles and inks  print electrically active patterns directly onto fabrics  Sensors based on fabric  e.g., monitor pulse, blood pressure, body temperature  Invisible collar microphones  Kidswear  integrated GPS-driven locators  integrated small cameras (to keep the parents calm)?
  • 16.  A visitor brings his/her laptop into a meeting room and without manually configuring it in any way uses it to send his presentation to the room’s projector  Physical integration: the projector can be activated from any laptop in the room  Instantaneous interoperation: A laptop can spontaneously interact with the projector and control the presentation  Can be made context-sensitive, e.g., allowing only a particular visitor to do so
  • 17. Pervasive Computing Technologies  Pervasive computing involves three converging areas of Information and Communications Technology: Computing (‘smart devices’), Communications (‘connectivity’) User interfaces
  • 18. Smart Devices – can communicate with each other and act intelligently  sensors: input devices that detect environmental changes, user behaviors, human commands etc;  processors: electronic systems that interpret and analyze input- data;  actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. For example, air temperature control is often done with actuators. However the term can also refer to devices which deliver information rather than altering the environment physically.
  • 19. Smart Devices (cont.)  Can remember important events  They have a memory  Show context-sensitive behavior  They may have sensors  Location/situation/context awareness  Are responsive/proactive  Communicate with environment  Networked with other smart objects
  • 20. Connectivity (network)  Pervasive computing systems rely on the interlinking of independent electronic devices into broader networks.  This can be achieved via both wired and wireless networking technologies (such as WiFi or Bluetooth), with the devices themselves being capable of assessing the most effective form of connectivity in any given scenario.  The effective development of pervasive computing systems depends on their degree of interoperability, as well as on the convergence of standards for wired and wireless technologies.
  • 21. User Interfaces  New user interfaces are developed that is capable of sensing and supplying more information about users, and the broader environment, to the computer for processing.  For example recognizing a person’s face, or responding to gestures. It might also be based on sound, scent or touch recognition, or other sensory information like temperature.  The output might also be in any of these formats.
  • 22. Applications for Pervasive Computing  Healthcare Intelligent bandages that can tell how the injury is doing or video consultations with doctors, that can treat patients at home.  Home care  Transport  Environmental Monitoring  Industry & Academia
  • 23. MIT- OXYGEN PROJECT  For over forty years, computation has centered about machines, not people. We were/are pampering them in air-conditioned rooms or carrying them around with us.  But in the near future computation will be human-centered. It will be freely available everywhere, like oxygen in the air we breathe. It will enter the human world, handling our goals and needs and helping us to do more while doing less.
  • 24. Issues  Engineering Issues Current lack of low cost technology to locate devices and the lack of suitable power sources. Communications, software and hardware are likely to suffer from faults. Also faulty systems may be harder to repair because of the degree of interconnection.
  • 25. Issues  Privacy, security and safety Gathers sensitive data, for example on users everyday interactions, movements, preferences and attitudes, without user intervention or consent; Retrieves and use information from large databases/archives of stored data; Alters the environment via actuating devices.
  • 26. •Pervasive Computing (IEEE) •Personal and Ubiquitous Computing (Springer) •Pervasive and Mobile Computing journal, PMC (Elsevier) •Ubiquitous Computing and Communication Journal – UbiCC Journal Journal