SlideShare a Scribd company logo
1 of 20
Class: SE-IT-A
College: Pillai Institute of Information Technology,
Engineering, Media Studies & Reseaarch.
Members: Sabiha Chougle, Ronak Bhatia, Allwyn
Symon, Grace Sam.
What is Ubiquitous Computing?
 Ubiquitous computing (ubicomp) is an
advanced computing concept where
computing is made to appear everywhere
and anywhere.
 The idea behind this sort of computing is
to make the computing power disappear in
the environment, but will always be there
whenever needed or in other words it
means availability and invisibility.
Example of a Ubiquitous
Environment:
Lights, Air conditioning, TV's
automatically switch on or off when you
enter or leave.
Sit on your chair and the TV sets your
favourite channel which you usually
watch ay this time of the day.
Route input from 'virtual' keyboard to
nearest suitable display.
WHERE DID IT COME FROM
 The underlying technologies to support
ubiquitous computing include Internet,
advanced middleware, operating
system, mobile code, sensors,
microprocessors, new I/O and user
interfaces, networks, mobile protocols,
location and positioning and new
materials.
HARDWARE
REQUIREMENTS
 Sensors: A sensor is a converter that measures a
physical quantity and converts it into a signal
which can be read by an observer or by an
instrument.
 Actuators: An actuator is a type of motor for
moving or controlling a mechanism or system. It is
operated by a source of energy, typically electric
current, hydraulic fluid pressure, and converts that
energy into motion.
HARDWARE
REQUIREMENTS
 PORTABLE WIRELESS RFID READER/WRITER:
Radio-frequency identification (RFID) is the wireless
non-contact use of radio-frequency electromagnetic
fields to transfer data, for the purposes of automatically
identifying and tracking tags attached to objects.
HARDWARE
REQUIREMENTS
1.Display Devices:
 Liquid Crystal technologies (LCD)
 Organic LED based Display
2.Storage technologies:
 Non-volatile Flash Memory
 Battery-backed RAM
DESIGNING
 Nanotechnology:
 The trend toward miniaturization of computer
components down to an atomic scale is known
as nanotechnology. Nanotechnology involves
building highly miniaturized computers from
individual atoms or molecules acting as
transistors, which are the heart of the
computer chip. The number of transistors in a
chip is indicative of its power. Therefore,
nanotechnology’s extreme miniaturization of
transistors allows for impressive levels of
computing power to be put into tiny packages,
which can then be unobtrusively tucked away.
DESIGNING
 Wireless:
 Wireless computing refers to the use of wireless
technology to connect computers to a network.
Wireless computing is so attractive because it allows
workers to escape the tether of a network cable and
access network and communication services from
anywhere within reach of a wireless network.
Wireless computing has attracted enormous market
interest, as witnessed by consumer demand for
wireless home networks, which can be purchased for
several hundred dollars. The second author has a
three-computer wireless network in his home.
DESIGNING
 Another approach is to implement the
target system in a simulator and do the
testing there. Although the focus of this
technique should lie on the design of the
protocols, a lot of time goes into the
implementation instead of the design.
Addressed tests are generally done under
unrealistic conditions with a very small
subset of features, a small number of
nodes and unrealistic environment. The
predictability gained from those isolated
tests is basically zero
DESIGNING
Applications
1. Smart Home for Elderly
 An elderly person lives in an apartment
with being handicapped in various
ways.
 His relatives wants to keep an eye on
him 24/7.
Objectives
 To develop a monitoring and sensing
system.
 To capture vital signs of elderly.
 To gather data and make it accessible.
System Architecture
 Database Server.
 Cameras & Microphones.
 Sensors.
a. Floor Pressure.
b. Infra-red.
c. Light.
d. Pulse oximeter & Blood pressure.
An overall layout of the elderly
monitoring system
Database stores the information.
Cameras and Microphones gathers video and audio
information.
FPS is used to track residents or detect furniture positions
Infra-red sensor to detect infra-red sources.
Pulse oximeter & Blood pressure are medical wearable
sensors.
Health Monitoring
 postoperative monitoring of patients;
 monitoring of patients with chronic
diseases;
 social networking of relatives and peers
for monitoring of elderly;
 lifestyle and general well-being
monitoring (e.g., to deal with obesity);
Health Monitoring
 wellness and exercise monitoring;
 monitoring vitals and status of soldiers
and firefighters;
 emergency medical care and mass
casualty events;
 computer-assisted rehabilitation and
therapy; and
 development of new emergency
services with prolonged monitoring.
CONCLUSION
 The Ubiquitous computing due to its context
awareness and the natural interaction provides an
intelligent environment in which user can easily avail
desired services in an intelligent manner such as
identification of user likings place time etc.
 In the long term as pervasive computing is integrated
into everyday objects, they become networked
information control systems that are presently
centralized in industry, transport, the service industry
and the public sector can be decentralized.
 Thus we can say that ubiquitous computing could be
the next wave in the technology of computers

More Related Content

What's hot

Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
Scope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringScope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringRajesh Kumar
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...JOLLUSUDARSHANREDDY
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...Mustafa Sadiq
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI) Maneesh B.S
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencejoshuasimon97
 
Smartphone HW Architecture
Smartphone HW ArchitectureSmartphone HW Architecture
Smartphone HW ArchitectureYong Heui Cho
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSMD HABIBULLAH
 
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...Ahmad Lotfi
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 

What's hot (20)

Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Scope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringScope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineering
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...
 
Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
 
IoT
IoTIoT
IoT
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Smartphone HW Architecture
Smartphone HW ArchitectureSmartphone HW Architecture
Smartphone HW Architecture
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Iot
IotIot
Iot
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 

Viewers also liked

How to get education loan in india
How to get education loan in indiaHow to get education loan in india
How to get education loan in indiaMyLoanCare
 
Introduccion a las técnicas de programación
Introduccion a las técnicas de programaciónIntroduccion a las técnicas de programación
Introduccion a las técnicas de programaciónMarionCastro
 
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015hunben
 
CV - Suyash
CV - SuyashCV - Suyash
CV - Suyashsuyash .
 
"Lyotard and Postmodernism" Key Terms and Ideas
"Lyotard and Postmodernism" Key Terms and Ideas"Lyotard and Postmodernism" Key Terms and Ideas
"Lyotard and Postmodernism" Key Terms and IdeasMaricelaJJBB
 
Linux Initialization Process (1)
Linux Initialization Process (1)Linux Initialization Process (1)
Linux Initialization Process (1)shimosawa
 
Linux Kernel Booting Process (2) - For NLKB
Linux Kernel Booting Process (2) - For NLKBLinux Kernel Booting Process (2) - For NLKB
Linux Kernel Booting Process (2) - For NLKBshimosawa
 
Linux Initialization Process (2)
Linux Initialization Process (2)Linux Initialization Process (2)
Linux Initialization Process (2)shimosawa
 
Linux Kernel Module - For NLKB
Linux Kernel Module - For NLKBLinux Kernel Module - For NLKB
Linux Kernel Module - For NLKBshimosawa
 
Prenatal and postnatal growth & development of maxilla and palate presented b...
Prenatal and postnatal growth & development of maxilla and palate presented b...Prenatal and postnatal growth & development of maxilla and palate presented b...
Prenatal and postnatal growth & development of maxilla and palate presented b...Dr. Himanshu Gorawat
 

Viewers also liked (12)

How to get education loan in india
How to get education loan in indiaHow to get education loan in india
How to get education loan in india
 
Introduccion a las técnicas de programación
Introduccion a las técnicas de programaciónIntroduccion a las técnicas de programación
Introduccion a las técnicas de programación
 
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015
Presentación asamblea Associaciò de veïns i veïnes de Natzaret 2015
 
CV - Suyash
CV - SuyashCV - Suyash
CV - Suyash
 
Pronouns and verb to be
Pronouns   and  verb to bePronouns   and  verb to be
Pronouns and verb to be
 
KALAI-RESUME[1]
KALAI-RESUME[1]KALAI-RESUME[1]
KALAI-RESUME[1]
 
"Lyotard and Postmodernism" Key Terms and Ideas
"Lyotard and Postmodernism" Key Terms and Ideas"Lyotard and Postmodernism" Key Terms and Ideas
"Lyotard and Postmodernism" Key Terms and Ideas
 
Linux Initialization Process (1)
Linux Initialization Process (1)Linux Initialization Process (1)
Linux Initialization Process (1)
 
Linux Kernel Booting Process (2) - For NLKB
Linux Kernel Booting Process (2) - For NLKBLinux Kernel Booting Process (2) - For NLKB
Linux Kernel Booting Process (2) - For NLKB
 
Linux Initialization Process (2)
Linux Initialization Process (2)Linux Initialization Process (2)
Linux Initialization Process (2)
 
Linux Kernel Module - For NLKB
Linux Kernel Module - For NLKBLinux Kernel Module - For NLKB
Linux Kernel Module - For NLKB
 
Prenatal and postnatal growth & development of maxilla and palate presented b...
Prenatal and postnatal growth & development of maxilla and palate presented b...Prenatal and postnatal growth & development of maxilla and palate presented b...
Prenatal and postnatal growth & development of maxilla and palate presented b...
 

Similar to Ubiquitous Computing

Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxMd.Jamilur Rahman
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing BhaktiKarale
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOTKarthikeyan T
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 

Similar to Ubiquitous Computing (20)

Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
Intro to wsn
Intro to wsnIntro to wsn
Intro to wsn
 
Intro_to_WSN.ppt
Intro_to_WSN.pptIntro_to_WSN.ppt
Intro_to_WSN.ppt
 
Intro_to_WSN.ppt
Intro_to_WSN.pptIntro_to_WSN.ppt
Intro_to_WSN.ppt
 
Intro_to_WSN.ppt
Intro_to_WSN.pptIntro_to_WSN.ppt
Intro_to_WSN.ppt
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
NFC Health Monitoring System
NFC Health Monitoring SystemNFC Health Monitoring System
NFC Health Monitoring System
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

Ubiquitous Computing

  • 1. Class: SE-IT-A College: Pillai Institute of Information Technology, Engineering, Media Studies & Reseaarch. Members: Sabiha Chougle, Ronak Bhatia, Allwyn Symon, Grace Sam.
  • 2. What is Ubiquitous Computing?  Ubiquitous computing (ubicomp) is an advanced computing concept where computing is made to appear everywhere and anywhere.  The idea behind this sort of computing is to make the computing power disappear in the environment, but will always be there whenever needed or in other words it means availability and invisibility.
  • 3. Example of a Ubiquitous Environment: Lights, Air conditioning, TV's automatically switch on or off when you enter or leave. Sit on your chair and the TV sets your favourite channel which you usually watch ay this time of the day. Route input from 'virtual' keyboard to nearest suitable display.
  • 4. WHERE DID IT COME FROM
  • 5.  The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, networks, mobile protocols, location and positioning and new materials.
  • 6. HARDWARE REQUIREMENTS  Sensors: A sensor is a converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument.  Actuators: An actuator is a type of motor for moving or controlling a mechanism or system. It is operated by a source of energy, typically electric current, hydraulic fluid pressure, and converts that energy into motion.
  • 7. HARDWARE REQUIREMENTS  PORTABLE WIRELESS RFID READER/WRITER: Radio-frequency identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
  • 8. HARDWARE REQUIREMENTS 1.Display Devices:  Liquid Crystal technologies (LCD)  Organic LED based Display 2.Storage technologies:  Non-volatile Flash Memory  Battery-backed RAM
  • 9. DESIGNING  Nanotechnology:  The trend toward miniaturization of computer components down to an atomic scale is known as nanotechnology. Nanotechnology involves building highly miniaturized computers from individual atoms or molecules acting as transistors, which are the heart of the computer chip. The number of transistors in a chip is indicative of its power. Therefore, nanotechnology’s extreme miniaturization of transistors allows for impressive levels of computing power to be put into tiny packages, which can then be unobtrusively tucked away.
  • 10. DESIGNING  Wireless:  Wireless computing refers to the use of wireless technology to connect computers to a network. Wireless computing is so attractive because it allows workers to escape the tether of a network cable and access network and communication services from anywhere within reach of a wireless network. Wireless computing has attracted enormous market interest, as witnessed by consumer demand for wireless home networks, which can be purchased for several hundred dollars. The second author has a three-computer wireless network in his home.
  • 11. DESIGNING  Another approach is to implement the target system in a simulator and do the testing there. Although the focus of this technique should lie on the design of the protocols, a lot of time goes into the implementation instead of the design. Addressed tests are generally done under unrealistic conditions with a very small subset of features, a small number of nodes and unrealistic environment. The predictability gained from those isolated tests is basically zero
  • 13. Applications 1. Smart Home for Elderly  An elderly person lives in an apartment with being handicapped in various ways.  His relatives wants to keep an eye on him 24/7.
  • 14. Objectives  To develop a monitoring and sensing system.  To capture vital signs of elderly.  To gather data and make it accessible.
  • 15. System Architecture  Database Server.  Cameras & Microphones.  Sensors. a. Floor Pressure. b. Infra-red. c. Light. d. Pulse oximeter & Blood pressure.
  • 16. An overall layout of the elderly monitoring system
  • 17. Database stores the information. Cameras and Microphones gathers video and audio information. FPS is used to track residents or detect furniture positions Infra-red sensor to detect infra-red sources. Pulse oximeter & Blood pressure are medical wearable sensors.
  • 18. Health Monitoring  postoperative monitoring of patients;  monitoring of patients with chronic diseases;  social networking of relatives and peers for monitoring of elderly;  lifestyle and general well-being monitoring (e.g., to deal with obesity);
  • 19. Health Monitoring  wellness and exercise monitoring;  monitoring vitals and status of soldiers and firefighters;  emergency medical care and mass casualty events;  computer-assisted rehabilitation and therapy; and  development of new emergency services with prolonged monitoring.
  • 20. CONCLUSION  The Ubiquitous computing due to its context awareness and the natural interaction provides an intelligent environment in which user can easily avail desired services in an intelligent manner such as identification of user likings place time etc.  In the long term as pervasive computing is integrated into everyday objects, they become networked information control systems that are presently centralized in industry, transport, the service industry and the public sector can be decentralized.  Thus we can say that ubiquitous computing could be the next wave in the technology of computers