SlideShare a Scribd company logo
1 of 3
Download to read offline
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 1 Issue 12 ǁ September. 2017 ǁ PP 30-32
| Volume 1 | Issue 12 | www.ijrtem.com | 30 |
Pervasive Computing
1
Matthew N. O. Sadiku , 1
Sarhan M. Musa , 2
Osama M. Musa
1
Roy G. Perry College of Engineering Prairie View A&M University Prairie View, TX 77446
2
Ashland Inc. Bridgewater, NJ 08807
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into
networks and these devices communicate with each other without any interactions required by the user. It plays a major role in
our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive
computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
I. INTRODUCTION
Pervasive computing (PvC), also synonymously known as ubiquitous computing, deals with computers that are accessible
anywhere and anytime. (Pervasive means “penetrate everywhere”). It is fundamentally shifting the computing paradigm toward
everywhere computing. It allows the vision of invisible computation that weaves into the fabric of day-to-day life to be an
objective within reach. It is so pervasive that it covers all aspects of human activity and becomes so banal as to be seemingly
invisible. The term "ubiquitous computing" was coined in1988 by Mark Weiser, then chief technology officer for Xerox’s Palo
Alto Research Center. He described a future where invisible computers would be embedded in objects to enable everyday
activities. The terms ubiquitous and pervasive signify "existing everywhere. Pervasive computing is an advanced computing
paradigm which makes computing available everywhere and anywhere. Unlike desktop computing, pervasive computing can
occur using any device, in any location at anytime. Pervasive computing is about making our lives simpler by creating
environments that are sensitive, adaptive, and responsive to human needs. Both wired and wireless devices can be used to provide
service.
The main idea behind pervasive computing is that almost any device (ranging from home appliances to cars to the human body)
can be imbedded with microchips (or microprocessors) to connect the device to a boundless network of other devices. The goal of
pervasive computing is a billion people interacting with a million businesses online via a zillion intelligent, interconnected
devices. Pervasive computing devices are network-connected and always available. It is useful to think of the devices as forming a
three-tier pyramid with each tier representing a different device class, as shown in Figure 1 [1]. Pervasive computing subsumes
Internet of Things (IoT); it covers all that IoT covers and more. It is assumed that IoT will be one of the main requirements of
pervasive computing. As pervasiveness increases, IoT will become “Internet of Things and People” [2]. Technologies that enable
pervasive computing include wireless communications, mobile computing, voice recognition, global networking, artificial
intelligence, embedded systems, wearable computers, sensors, and RFID tags.
II. APPLICATIONS
The technological advances required to develop a pervasive computing environment fall into four broad areas [3]:
• Devices: These include of light-emitting diodes (LEDs), palmtops, mobile devices, cell phones, smart devices, and embedded
sensors. These devices will have small, inexpensive processors with limited memory and little storage.
• Networking: The pervasive computing devices will be connected by networks without the direct intervention of users. Global
networks like the Internet must integrate these devices into existing social systems.
• Middleware: The middleware consists mostly of firmware and software bundles designed to support application
development. Middleware resides between the operating system and the application layer. It helps the programmer develop
applications in several ways.
• Applications: Applications are often developed for specific system platforms, leading to separate versions of the same
application for handhelds, desktops, and cluster-based servers.
Although pervasive computing can be applied in almost every aspect of human life and activity, only few applications are
currently made. This lack of applications stems largely from the fact that it is currently too hard to design, build, and deploy
applications in the pervasive computing environment. In spite of this, a significant number of prototypes, applications, and
interaction interfaces have emerged. Pervasive computing applications have expanded from smart appliances in the early days to
systems of broader scope such as smart cities and smart transportation.
Pervasive Computing .
| Volume 1 | Issue 12 | www.ijrtem.com | 31 |
They include smart-spaces, logistics, health-care, elderly care, assisted living, and entertainment. Pervasive computing has be used
to address common challenges faced by those caring for individuals with autism or elderly individuals with chronic conditions,
such as diabetes or cancer [4]. The introduction of pervasive computing into car technology provides better security, safety,
comfortableness, and conveniences for drivers. Microprocessors can be found in almost any subsystem of a car, and the
applications of embedded computers in enhancing the qualities of cars. Pervasive computing is also used in car to find
free space for parking the car [5].
III. ISSUES AND CHALLENGES
Pervasive computing introduces some challenges that are not present in traditional desktop computing. Privacy is the most often-
cited challenge of pervasive computing and may be the greatest barrier to its long-term success. Since pervasive computing
devices will be everywhere and will affect every aspect of our life, they introduce many privacy risks at a rate that social and legal
mechanisms norms cannot keep up [6]. The privacy may be in form of threats to the loss of control over personal information. In
order to enjoy a distraction-free experience, users may have to sacrifice some of their privacy. Another related problem with
pervasive computing is that devices and technologies do not lend themselves well to typical data security because they are
combined in an ad hoc manner. Pervasive computing poses some potential risks to health, society, and environment, particularly
in emission of electromagnetic radiation, stress on users, and threats to ecological sustainability [7]. Battery powered computing
devices are limited by their energy efficiency. This raises design questions in terms of the energy transmission’s range, physical
size of the transmitters and receivers. Wireless energy transfer (using Qi chargers that exploit magnetic induction and resonance)
is a promising solution when recharging is necessary and feasible [8]. Mobility in pervasive computing introduces severe
constraints on resource supply and usage. Mobility is the ability to guarantee uninterrupted computing experiences when users
move across devices. It breaks down all fixed and static bindings between the user, device, application and environment. But in
order to support seamless application mobility, one must face some challenges in breaking the bindings between users, devices,
and the execution environments [9].
IV. CONCLUSION
Pervasive computing is a multidisciplinary field which has evolved substantially since its inception. It is gaining attention in
academia and industry. It is being taught at several institutions. It’s impact on education, cannot be ignored [10]. Personalized
learning can benefit from the ability of pervasive computing to transparently collect and utilize information about a student’s
background, interests, and needs. More information on pervasive computing is available in several books in Amazon.com and
journals. Two major journals are exclusively devoted to providing information on pervasive computing. They are IEEE
Pervasive Computing and Pervasive and Mobile Computing Journal (PMC). These are professional, peer-reviewed journals that
publish articles covering all aspects of pervasive computing. They are designed for researchers, practitioners, and educators.
REFERENCES
[1] J. Hong, “The privacy landscape of pervasive computing,” IEEE Pervasive Computing, vol. 16, no. 2, July-September 2017, pp. 40-
48.
[2] C. Marinagi, O. Belsis, and C. Skourlas, “New directions for pervasive computing in logistics,” Procedia – Social and Behavioral
Sciences, vol. 73, 2013, pp. 495-502.
[3] D. Saha and A. Mukherjee, “Computing: a paradigm for the 21st Century,” Computer, vol. 36, no. 3, March 2003, pp. 25-31.
[4] Julie A. Kientz et al., “Pervasive computingandautism: assistingcaregivers of childrenwith special needs,”IEEE Pervasive Computing, vol. 6, no.
1, January-March 2007, pp 28-35.
[5] S. M. A. Prakash and T. Naveen, “Pervasive computing application in vehicular technology,” Proceedings of the National Conference
on Innovations in Emerging Technology, Tamilnadu, India, 2011, pp.165-169.
[6] S. Dritsas, D. Gritzalis, and C. Lambrinoudakis, “Protecting privacy and anonymity in
pervasive computing: trends and perspectives,” Telematics and Informatics, vol. 23, 2006, pp. 196–210.
[7] L. M. Hilty, C. Som, and A. Kohler, “Assessing the human, social, and environmental risks of pervasive computing,” Human and
Ecological Risk Assessment: An International Journal, vol. 10, no. 5, 2004, pp. 853-874.
[8] D. E. Boyle et al., “Energy Provisionand StorageforPervasive Computing,” IEEE Pervasive Computing, vol. 15, no. 4, October-December
2016, pp.28-35.
[9] P. Yua et al., “Application mobility in pervasive computing: a survey,” Pervasive and Mobile Computing, vol. 9, 2013, pp. 2–17.
[10] F. Oluwagbemi, S. Misra, and N. Omoregbe, “Pervasive computing in classroom environments and applications,” Global Summit on
Computer & Information Technology, June 2014, pp.
AUTHORS
Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie View A&M
University, Prairie View, Texas. He is the author of several books and papers. His areas of research interest include
computational electromagnetics and computer networks. He is a fellow of IEEE.
Pervasive Computing .
| Volume 1 | Issue 12 | www.ijrtem.com | 32 |
Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M University, Texas. He has
been the director of Prairie View Networking Academy, Texas, since 2004. He is an LTD Sprint and Boeing Welliver Fellow.
Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also serves as a member
of the Advisory Board at Manhattan College’s Department of Electrical and Computer Engineering as well as a member of the
Board of Trustees at Chemists' Club of NYC. Additionally, he sits on the Advisory Board of the International Journal of
Humanitarian Technology (IJHT).
Figure 1: The three tiers of pervasive computing [1].

More Related Content

What's hot

Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networksijtsrd
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
Internet of Nanothings A Primer
Internet of Nanothings A PrimerInternet of Nanothings A Primer
Internet of Nanothings A Primerijtsrd
 
Conclusion
ConclusionConclusion
Conclusionhanmya
 
Analysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A ReviewAnalysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A Reviewijtsrd
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET Journal
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...acijjournal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A SurveyIJCSES Journal
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...IJECEIAES
 

What's hot (20)

Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistance
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
Internet of Nanothings A Primer
Internet of Nanothings A PrimerInternet of Nanothings A Primer
Internet of Nanothings A Primer
 
Conclusion
ConclusionConclusion
Conclusion
 
Analysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A ReviewAnalysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A Review
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
Future Of It
Future Of ItFuture Of It
Future Of It
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 

Similar to Pervasive Computing

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01Partha Sarathi Kar
 
Nomadic Computing A Primer
Nomadic Computing A PrimerNomadic Computing A Primer
Nomadic Computing A Primerijtsrd
 
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...CrimsonpublishersMedical
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
A Short Literature Review On The Internet Of Things Research And Development...
A Short Literature Review On The Internet Of Things  Research And Development...A Short Literature Review On The Internet Of Things  Research And Development...
A Short Literature Review On The Internet Of Things Research And Development...Nicole Heredia
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrencyPriyanka Goswami
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 

Similar to Pervasive Computing (20)

Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
Nomadic Computing A Primer
Nomadic Computing A PrimerNomadic Computing A Primer
Nomadic Computing A Primer
 
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
A Short Literature Review On The Internet Of Things Research And Development...
A Short Literature Review On The Internet Of Things  Research And Development...A Short Literature Review On The Internet Of Things  Research And Development...
A Short Literature Review On The Internet Of Things Research And Development...
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 

More from journal ijrtem

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...journal ijrtem
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...journal ijrtem
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...journal ijrtem
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0journal ijrtem
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERjournal ijrtem
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...journal ijrtem
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principlesjournal ijrtem
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management journal ijrtem
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...journal ijrtem
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessjournal ijrtem
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...journal ijrtem
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...journal ijrtem
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...journal ijrtem
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident journal ijrtem
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management journal ijrtem
 

More from journal ijrtem (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...
 
ORGANIC FOODS
ORGANIC FOODSORGANIC FOODS
ORGANIC FOODS
 
MOLECULAR COMPUTING
MOLECULAR COMPUTINGMOLECULAR COMPUTING
MOLECULAR COMPUTING
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principles
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Pervasive Computing

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 1 Issue 12 ǁ September. 2017 ǁ PP 30-32 | Volume 1 | Issue 12 | www.ijrtem.com | 30 | Pervasive Computing 1 Matthew N. O. Sadiku , 1 Sarhan M. Musa , 2 Osama M. Musa 1 Roy G. Perry College of Engineering Prairie View A&M University Prairie View, TX 77446 2 Ashland Inc. Bridgewater, NJ 08807 ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing. Key Words : pervasive computing, ubiquitous computing, Internet of things I. INTRODUCTION Pervasive computing (PvC), also synonymously known as ubiquitous computing, deals with computers that are accessible anywhere and anytime. (Pervasive means “penetrate everywhere”). It is fundamentally shifting the computing paradigm toward everywhere computing. It allows the vision of invisible computation that weaves into the fabric of day-to-day life to be an objective within reach. It is so pervasive that it covers all aspects of human activity and becomes so banal as to be seemingly invisible. The term "ubiquitous computing" was coined in1988 by Mark Weiser, then chief technology officer for Xerox’s Palo Alto Research Center. He described a future where invisible computers would be embedded in objects to enable everyday activities. The terms ubiquitous and pervasive signify "existing everywhere. Pervasive computing is an advanced computing paradigm which makes computing available everywhere and anywhere. Unlike desktop computing, pervasive computing can occur using any device, in any location at anytime. Pervasive computing is about making our lives simpler by creating environments that are sensitive, adaptive, and responsive to human needs. Both wired and wireless devices can be used to provide service. The main idea behind pervasive computing is that almost any device (ranging from home appliances to cars to the human body) can be imbedded with microchips (or microprocessors) to connect the device to a boundless network of other devices. The goal of pervasive computing is a billion people interacting with a million businesses online via a zillion intelligent, interconnected devices. Pervasive computing devices are network-connected and always available. It is useful to think of the devices as forming a three-tier pyramid with each tier representing a different device class, as shown in Figure 1 [1]. Pervasive computing subsumes Internet of Things (IoT); it covers all that IoT covers and more. It is assumed that IoT will be one of the main requirements of pervasive computing. As pervasiveness increases, IoT will become “Internet of Things and People” [2]. Technologies that enable pervasive computing include wireless communications, mobile computing, voice recognition, global networking, artificial intelligence, embedded systems, wearable computers, sensors, and RFID tags. II. APPLICATIONS The technological advances required to develop a pervasive computing environment fall into four broad areas [3]: • Devices: These include of light-emitting diodes (LEDs), palmtops, mobile devices, cell phones, smart devices, and embedded sensors. These devices will have small, inexpensive processors with limited memory and little storage. • Networking: The pervasive computing devices will be connected by networks without the direct intervention of users. Global networks like the Internet must integrate these devices into existing social systems. • Middleware: The middleware consists mostly of firmware and software bundles designed to support application development. Middleware resides between the operating system and the application layer. It helps the programmer develop applications in several ways. • Applications: Applications are often developed for specific system platforms, leading to separate versions of the same application for handhelds, desktops, and cluster-based servers. Although pervasive computing can be applied in almost every aspect of human life and activity, only few applications are currently made. This lack of applications stems largely from the fact that it is currently too hard to design, build, and deploy applications in the pervasive computing environment. In spite of this, a significant number of prototypes, applications, and interaction interfaces have emerged. Pervasive computing applications have expanded from smart appliances in the early days to systems of broader scope such as smart cities and smart transportation.
  • 2. Pervasive Computing . | Volume 1 | Issue 12 | www.ijrtem.com | 31 | They include smart-spaces, logistics, health-care, elderly care, assisted living, and entertainment. Pervasive computing has be used to address common challenges faced by those caring for individuals with autism or elderly individuals with chronic conditions, such as diabetes or cancer [4]. The introduction of pervasive computing into car technology provides better security, safety, comfortableness, and conveniences for drivers. Microprocessors can be found in almost any subsystem of a car, and the applications of embedded computers in enhancing the qualities of cars. Pervasive computing is also used in car to find free space for parking the car [5]. III. ISSUES AND CHALLENGES Pervasive computing introduces some challenges that are not present in traditional desktop computing. Privacy is the most often- cited challenge of pervasive computing and may be the greatest barrier to its long-term success. Since pervasive computing devices will be everywhere and will affect every aspect of our life, they introduce many privacy risks at a rate that social and legal mechanisms norms cannot keep up [6]. The privacy may be in form of threats to the loss of control over personal information. In order to enjoy a distraction-free experience, users may have to sacrifice some of their privacy. Another related problem with pervasive computing is that devices and technologies do not lend themselves well to typical data security because they are combined in an ad hoc manner. Pervasive computing poses some potential risks to health, society, and environment, particularly in emission of electromagnetic radiation, stress on users, and threats to ecological sustainability [7]. Battery powered computing devices are limited by their energy efficiency. This raises design questions in terms of the energy transmission’s range, physical size of the transmitters and receivers. Wireless energy transfer (using Qi chargers that exploit magnetic induction and resonance) is a promising solution when recharging is necessary and feasible [8]. Mobility in pervasive computing introduces severe constraints on resource supply and usage. Mobility is the ability to guarantee uninterrupted computing experiences when users move across devices. It breaks down all fixed and static bindings between the user, device, application and environment. But in order to support seamless application mobility, one must face some challenges in breaking the bindings between users, devices, and the execution environments [9]. IV. CONCLUSION Pervasive computing is a multidisciplinary field which has evolved substantially since its inception. It is gaining attention in academia and industry. It is being taught at several institutions. It’s impact on education, cannot be ignored [10]. Personalized learning can benefit from the ability of pervasive computing to transparently collect and utilize information about a student’s background, interests, and needs. More information on pervasive computing is available in several books in Amazon.com and journals. Two major journals are exclusively devoted to providing information on pervasive computing. They are IEEE Pervasive Computing and Pervasive and Mobile Computing Journal (PMC). These are professional, peer-reviewed journals that publish articles covering all aspects of pervasive computing. They are designed for researchers, practitioners, and educators. REFERENCES [1] J. Hong, “The privacy landscape of pervasive computing,” IEEE Pervasive Computing, vol. 16, no. 2, July-September 2017, pp. 40- 48. [2] C. Marinagi, O. Belsis, and C. Skourlas, “New directions for pervasive computing in logistics,” Procedia – Social and Behavioral Sciences, vol. 73, 2013, pp. 495-502. [3] D. Saha and A. Mukherjee, “Computing: a paradigm for the 21st Century,” Computer, vol. 36, no. 3, March 2003, pp. 25-31. [4] Julie A. Kientz et al., “Pervasive computingandautism: assistingcaregivers of childrenwith special needs,”IEEE Pervasive Computing, vol. 6, no. 1, January-March 2007, pp 28-35. [5] S. M. A. Prakash and T. Naveen, “Pervasive computing application in vehicular technology,” Proceedings of the National Conference on Innovations in Emerging Technology, Tamilnadu, India, 2011, pp.165-169. [6] S. Dritsas, D. Gritzalis, and C. Lambrinoudakis, “Protecting privacy and anonymity in pervasive computing: trends and perspectives,” Telematics and Informatics, vol. 23, 2006, pp. 196–210. [7] L. M. Hilty, C. Som, and A. Kohler, “Assessing the human, social, and environmental risks of pervasive computing,” Human and Ecological Risk Assessment: An International Journal, vol. 10, no. 5, 2004, pp. 853-874. [8] D. E. Boyle et al., “Energy Provisionand StorageforPervasive Computing,” IEEE Pervasive Computing, vol. 15, no. 4, October-December 2016, pp.28-35. [9] P. Yua et al., “Application mobility in pervasive computing: a survey,” Pervasive and Mobile Computing, vol. 9, 2013, pp. 2–17. [10] F. Oluwagbemi, S. Misra, and N. Omoregbe, “Pervasive computing in classroom environments and applications,” Global Summit on Computer & Information Technology, June 2014, pp. AUTHORS Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie View A&M University, Prairie View, Texas. He is the author of several books and papers. His areas of research interest include computational electromagnetics and computer networks. He is a fellow of IEEE.
  • 3. Pervasive Computing . | Volume 1 | Issue 12 | www.ijrtem.com | 32 | Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M University, Texas. He has been the director of Prairie View Networking Academy, Texas, since 2004. He is an LTD Sprint and Boeing Welliver Fellow. Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also serves as a member of the Advisory Board at Manhattan College’s Department of Electrical and Computer Engineering as well as a member of the Board of Trustees at Chemists' Club of NYC. Additionally, he sits on the Advisory Board of the International Journal of Humanitarian Technology (IJHT). Figure 1: The three tiers of pervasive computing [1].