SlideShare a Scribd company logo
“PERVASIVE COMPUTING”
CONTENTS 24-Mar-11 2 Gandhi Engineering College
“The most profound technologies are those that disappear .They weave themselves into the fabric of every-day life until they are indistinguishable from it .” Mark Weiser 24-Mar-11 3 Gandhi Engineering College
Pervasive Computing A Web of computing devices and sensors embedded in everyday objects ranging from cars to house. The devices are context sensitive and user aware. INTRODUCTION 24-Mar-11 4 Gandhi Engineering College
Aspects of Pervasive Environment User Interaction Userinteractswithspeech, gesturesandmovements      The sensors and communication devices are ‘aware’ of  the user and they are also aware of his/her intent . Proactively The computing devices should interact and query devices on transparency. Technology has to be transparent      Behalf on user and his intent.  Device Interaction       Frequent multiparty interactions 	No central authority or third party 24-Mar-11 5 Gandhi Engineering College
24-Mar-11 Gandhi Engineering College 6 Solution: Biometrics? ,[object Object]
Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.
Examples
Physical Biometrics
Fingerprint
Hand Geometry
Iris patterns
Behavioral Biometrics
Handwriting
Signature
Speech
Gait
Chemical/Biological Biometrics
Perspiration
Skin composition(spectroscopy),[object Object]
24-Mar-11 Gandhi Engineering College 8 Framework for Interaction S1 S2 Speaker  Recognition Speech  Recognition parsing and arbitration SK SN
24-Mar-11 Gandhi Engineering College 9 Framework for Interaction S1 Switch on Channel 9 S2 Speaker  Recognition Speech  Recognition parsing and arbitration SK SN

More Related Content

What's hot

Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
sreelesh balan
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Mohit Jaju
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
Karishma Patro
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Aditya Dwivedi
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
Prateek Soni
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
Jagan Mohan Bishoyi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Joud Khattab
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
Mohammad Ilyas Malik
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
vipluv mittal
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud ComputingRajshri Mohan
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Bhupender Singh Jadon
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptshibamughal
 

What's hot (20)

Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

Viewers also liked

Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
Phearin Sok
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
Robin Teigland
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
Mediabistro
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science Fiction
Joshua Murdock
 
Wearable technology by Rahul Shakya
Wearable technology by Rahul ShakyaWearable technology by Rahul Shakya
Wearable technology by Rahul Shakya
Rahul Shakya
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On BitcoinTouroxy
 
Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology Design
Jeffrey Funk
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
Pantech ProLabs India Pvt Ltd
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
Nuth Otanasap
 
Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn
 
Wearable Technology Report
Wearable Technology ReportWearable Technology Report
Wearable Technology Report
Rohini Vaze
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 

Viewers also liked (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science Fiction
 
Wearable technology by Rahul Shakya
Wearable technology by Rahul ShakyaWearable technology by Rahul Shakya
Wearable technology by Rahul Shakya
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 
Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology Design
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016
 
Wearable Technology Report
Wearable Technology ReportWearable Technology Report
Wearable Technology Report
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Seminar on pervasive computing

An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
ijtsrd
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
Partha Sarathi Kar
 
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
IRJET - Driving Safety Risk Analysis using Naturalistic Driving DataIRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
IRJET Journal
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
Carl Jackson
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
14 june
14 june14 june
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
Enterprise Wired
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
IJECEIAES
 
IRJET- A Survey on Application of Automobile Safety Features
IRJET-  	  A Survey on Application of Automobile Safety FeaturesIRJET-  	  A Survey on Application of Automobile Safety Features
IRJET- A Survey on Application of Automobile Safety Features
IRJET Journal
 
Ambient intelligence
Ambient intelligence Ambient intelligence
Ambient intelligence
Ankita Srivastava
 
IoT Real world Applications.pdf
IoT Real world Applications.pdfIoT Real world Applications.pdf
IoT Real world Applications.pdf
Pyingkodi Maran
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
Carl Jackson
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16Alex Lima
 
White Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital MobilityWhite Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital Mobility
Carl Jackson
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
gerogepatton
 
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
gerogepatton
 
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITYDRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
IJTRET-International Journal of Trendy Research in Engineering and Technology
 

Similar to Seminar on pervasive computing (20)

An IOT based solution for Road Accidents
An IOT based solution for Road AccidentsAn IOT based solution for Road Accidents
An IOT based solution for Road Accidents
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
IRJET - Driving Safety Risk Analysis using Naturalistic Driving DataIRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
IRJET - Driving Safety Risk Analysis using Naturalistic Driving Data
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
14 june
14 june14 june
14 june
 
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
Smart Transportation Technologies: Definition, Benefits, And Impact | Enterpr...
 
The VII propject-V3
The VII propject-V3The VII propject-V3
The VII propject-V3
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
IRJET- A Survey on Application of Automobile Safety Features
IRJET-  	  A Survey on Application of Automobile Safety FeaturesIRJET-  	  A Survey on Application of Automobile Safety Features
IRJET- A Survey on Application of Automobile Safety Features
 
Ambient intelligence
Ambient intelligence Ambient intelligence
Ambient intelligence
 
IoT Real world Applications.pdf
IoT Real world Applications.pdfIoT Real world Applications.pdf
IoT Real world Applications.pdf
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
 
White Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital MobilityWhite Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital Mobility
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
SMART CROSSWALK: MACHINE LEARNING AND IMAGE PROCESSING BASED PEDESTRIAN AND V...
 
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITYDRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
 
1.pdf
1.pdf1.pdf
1.pdf
 

More from Likan Patra

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & Equipments
Likan Patra
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz Questions
Likan Patra
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15
Likan Patra
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its Products
Likan Patra
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
Likan Patra
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid Lenses
Likan Patra
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
Likan Patra
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
Likan Patra
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
Likan Patra
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
Likan Patra
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
Likan Patra
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)
Likan Patra
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In Depth
Likan Patra
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedIn
Likan Patra
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
Likan Patra
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representationLikan Patra
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printingLikan Patra
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 

More from Likan Patra (20)

Sewn Product Machinary & Equipments
Sewn Product Machinary & EquipmentsSewn Product Machinary & Equipments
Sewn Product Machinary & Equipments
 
SMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz QuestionsSMArt Contest- Smart Quiz Questions
SMArt Contest- Smart Quiz Questions
 
RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15RC Shri Jagannath Dham- Club Activity Report 2014-15
RC Shri Jagannath Dham- Club Activity Report 2014-15
 
Quiz about Google and its Products
Quiz about Google and its ProductsQuiz about Google and its Products
Quiz about Google and its Products
 
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
e-ENERGY METERING BOX (Smart Meter by KPMP Electronics)
 
Everything you want to know about Liquid Lenses
Everything you want to know about Liquid LensesEverything you want to know about Liquid Lenses
Everything you want to know about Liquid Lenses
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
What is Optical fiber ?
What is Optical fiber ?What is Optical fiber ?
What is Optical fiber ?
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Computer Tomography (CT Scan)
Computer Tomography (CT Scan)Computer Tomography (CT Scan)
Computer Tomography (CT Scan)
 
Akshaya patra foundation - In Depth
Akshaya patra foundation - In DepthAkshaya patra foundation - In Depth
Akshaya patra foundation - In Depth
 
So, He got a JOB through LinkedIn
So, He got a JOB through LinkedInSo, He got a JOB through LinkedIn
So, He got a JOB through LinkedIn
 
4g technology
4g technology4g technology
4g technology
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representation
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Seminar on pervasive computing

  • 2. CONTENTS 24-Mar-11 2 Gandhi Engineering College
  • 3. “The most profound technologies are those that disappear .They weave themselves into the fabric of every-day life until they are indistinguishable from it .” Mark Weiser 24-Mar-11 3 Gandhi Engineering College
  • 4. Pervasive Computing A Web of computing devices and sensors embedded in everyday objects ranging from cars to house. The devices are context sensitive and user aware. INTRODUCTION 24-Mar-11 4 Gandhi Engineering College
  • 5. Aspects of Pervasive Environment User Interaction Userinteractswithspeech, gesturesandmovements The sensors and communication devices are ‘aware’ of the user and they are also aware of his/her intent . Proactively The computing devices should interact and query devices on transparency. Technology has to be transparent Behalf on user and his intent. Device Interaction Frequent multiparty interactions No central authority or third party 24-Mar-11 5 Gandhi Engineering College
  • 6.
  • 7. Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.
  • 17. Gait
  • 20.
  • 21. 24-Mar-11 Gandhi Engineering College 8 Framework for Interaction S1 S2 Speaker Recognition Speech Recognition parsing and arbitration SK SN
  • 22. 24-Mar-11 Gandhi Engineering College 9 Framework for Interaction S1 Switch on Channel 9 S2 Speaker Recognition Speech Recognition parsing and arbitration SK SN
  • 23. 24-Mar-11 Gandhi Engineering College 10 Framework for Interaction Who is speaking? S1 S2 Speaker Recognition Speech Recognition parsing and arbitration SK Annie David Cathy SN “Authentication”
  • 24. 24-Mar-11 Gandhi Engineering College 11 Framework for Interaction What is he saying? S1 S2 Speaker Recognition Speech Recognition parsing and arbitration SK On,Off,TV Fridge,Door SN “Understanding”
  • 25. 24-Mar-11 Gandhi Engineering College 12 Framework for Interaction What is he talking about? S1 S2 Speaker Recognition Speech Recognition parsing and arbitration SK Channel->TV Dim->Lamp On->TV,Lamp “Switch”,”to”,”channel”,”nine” SN “Inferring and execution”
  • 26. Applications Health-Care Remote sensors and monitoring technology will allow continuous capture of human physiological data . Medical staff could be immediately alerted to any detected irregularities. The continuous collection of data could provide accurate pattern/trend analysis of long term conditions such as heart disease, diabetes and epilepsy. Wearable sensors may offer greater patient mobility and freedom within hospitals and save both time and money by reducing the number of repeated testing. Hospital administration could also be transformed . 24-Mar-11 13 Gandhi Engineering College
  • 27. Environmental Monitoring Pervasive computing provides improved methods to monitor the environment. It will allow for continuous real time data collection and analysis via remote, wireless devices. 24-Mar-11 14 Gandhi Engineering College
  • 28. Intelligent Transport System Pervasive Computing is being employed to alleviate the traffic congestion and accident costs. Electronic devices could be directly integrated into transport infrastructure and vehicles themselves with the aim of better monitoring and managing air, road and sea transport systems. The vehicles could become capable of receiving and exchanging information ‘on the move’ via wireless technologies and be able to communicate with devices integrated into the vehicles alerting drivers of traffic congestion, accident hotspots and road closures. 24-Mar-11 15 Gandhi Engineering College
  • 29. Privacy,Security and Safety Privacy With personal information transmitted and stored in greater volume the opportunities of data interception, theft and ubiquitous surveillance(official, unofficial) will be heightened. PCS could be installed in places considered private and many aspects of personal life could be recorded and stored, with the risk of breaches of privacy. 24-Mar-11 16 Gandhi Engineering College
  • 30. Privacy,Security and Safety Pervasive computing also gives debate over safety. Integrated transport systems could involve road vehicles having actuating devices that intervene in the driving process, possibly responding to hazards more quickly than humans. For eg:The new Mercedes S-class features an active-braking system that can detect rapidly slowing vehicles in front, activating the brakes without driver intervention. While this may help avoid accidents ,there are also potential risks, for example the security of the vehicles software is breached. 24-Mar-11 17 Gandhi Engineering College
  • 31. Advantages Invisible Socialization Decision-making Information processing Convergence 24-Mar-11 18 Gandhi Engineering College
  • 32. Applications 24-Mar-11 19 Gandhi Engineering College
  • 33. Conclusions There is a wide range of potential benefits for government, service providers and consumers as computing technologies become more pervasive. There is a debate over how to address concerns over privacy,security safety and sustainability while still realising the benefits of pervasive computing. 24-Mar-11 20 Gandhi Engineering College
  • 34. References www.wikipaedia.com MIT Project Oxygen. http://oxygen.lcs.mit.edu/videometaglue.html CMU Project Aura. http://www-2.cs.cmu.edu/ aura/. IBM Planet Blue. http://researchweb.watson.ibm.com/compsci/planetblue.html 24-Mar-11 21 Gandhi Engineering College
  • 35. 24-Mar-11 Gandhi Engineering College 22 Thank-You LikanPatra & SisirNaik

Editor's Notes

  1. This template can be used as a starter file for presenting training materials in a group setting.SectionsRight-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors.NotesUse the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production)Coordinated colors Pay particular attention to the graphs, charts, and text boxes.Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale.Graphics, tables, and graphsKeep it simple: If possible, use consistent, non-distracting styles and colors.Label all graphs and tables.
  2. Give a brief overview of the presentation. Describe the major focus of the presentation and why it is important.Introduce each of the major topics.To provide a road map for the audience, you can repeat this Overview slide throughout the presentation, highlighting the particular topic you will discuss next.
  3. This is another option for an Overview slides using transitions.