SlideShare a Scribd company logo
The Computing of 21st Century !!!
Seminar On
ThreeWaves of Computing
 Mainframe computing (60’s-80’s)
 Desktop computing (80’s-90’s)
 Ubiquitous computing(00’s-?)
2
 Ubiquitous computing is the method of enhancing
computer use by making many computers available
throughout the physical environment, but making
them effectively invisible to the user
– Mark Weiser
 Ubiquitous computing (ubicomp) is a post-desktop
model of human-computer interaction in which
information processing has been thoroughly
integrated into everyday objects and activities.
3
Classification of Ubiquitous Computing
The Major trends in Computing
(Source : Image © MarkWeiser/PARC)
4
 Mark Weiser is the father of ubiquitous computing. He
coined the phrase "ubiquitous computing" around 1988
 He was working as ChiefTechnologist at the
CS Lab of Xerox Palo Alto Research Center in
the late 1980’s and was articulated the current
of computing
 He wrote some of the earliest papers on the subject, largely
defining it and sketching out its major concerns
 He developed the initial initiatives of ubiquitous computing in the
form of tabs, pads, and boards, built at Xerox PARC, 1988-1994.
5
EnablingTechnologies :
• Processing
• Cheaper, faster, smaller,
more energy efficient
• Storage
• Big, fast and small in size.
• Networking
• Global, local, ad-hoc, low-
power, high bandwidth,
low latencies
• Sensors
• Types,speed,accuracy,price
and robustness.
• Displays
• Projection, flexible
materials, low power
• Actuators
• Computer controlled
What makes Ubiquitous Computing Possible
6
 There are three general features that are shared
across a wide variety of ubicomp applications.
 These features are :
 the ability to provide transparent interfaces
 the ability to automatically adapt the behavior of a
program based on knowledge of the context of its use,
 the ability to automate the capture of live experiences
for later recall.
7
 UbicompVision: “pervasive computation without
intrusion.”
 Remove the physical barrier between user and
computational device
 Keyboard and mouse are still the most commonly used
interfaces !!
 Need:
 Flexible interfaces
 Varied interfaces that can provide similar functionality
8
 Context – information about the environment in which the
application operates and reacts accordingly.
 LOCATION andTIME are simple examples of context !
 Context aware application:
 is one which can capture the context
 assign meaning to it
 change behavior accordingly
 Need:
 Applications with context awareness allow rapid personalization
of their services.
9
 Capture everyday experiences and make the records
available for later use.
 Constraints:
 Multiple streams of information
 Their time synchronization
 Their correlation and integration
 Need:
 Automated tools that support capture, integration and future
access of info.
10
11
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
12
 An environment in which people
interact with embedded (and
mostly invisible) computers
(processors) and in which
networked devices are aware of
their surroundings and peers
and are able to provide services
or use services from peers
effectively.
 It subsumes Distributed
Computing and Mobile
Computing .
13
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
14
 Wearable computers, also known as body-borne computers or
wearable are miniature electronic devices that are worn by the
bearer under, with or on top of clothing.
 This class of wearable technology has been developed for general or
special purpose information technologies and media development.
 Wearable computers are especially useful for applications that
require more complex computational support than just hardware
coded logics.
 Features:
 There is a constant interaction
between the computer and user.
 The ability to multi-task
15
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
16
 In computing , Ambient Intelligence refers to electronic
environments that are sensitive and responsive to the
presence of people. Ambient intelligence is a vision on the
future of consumer electronics ,telecommunications
and computing.
 As these devices grow smaller, more connected and more
integrated into our environment, the technology
disappears into our surroundingsTOWARDS UBIQUITY !!!
17
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
18
 Mobile computing is HCI by which a
computer is expected to be
transported during normal usage.
 Mobile computing involves mobile
communication, mobile hardware, and
mobile software.
 Communication issues include ad hoc
and infrastructure networks as well as
communication properties, protocols,
data formats and concrete
technologies.
 Hardware includes mobile devices or
device components. Mobile software
deals with the characteristics and
requirements of mobile applications.
19
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
20
 Distributed computing is a field of computer science that studies
distributed systems.
 A distributed system is a software system in which components
located on networked computers communicate and coordinate their
actions by passing messages.
 The components interact with each other in order to achieve a
common goal.
 Three significant characteristics of distributed systems are:
 concurrency of components ,
 lack of a global clock ,
 independent failure of components.
21
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
22
 Context-aware computing refers to a general class of mobile
systems that can sense their physical environment, and adapt their
behavior accordingly.
 Context-aware systems are a component of a ubiquitous computing
or pervasive computing environment.
 Three important aspects of context are: where you are; who you are
with; and what resources are nearby. Although location is a primary
capability, location-aware does not necessarily capture things of
interest that are mobile or changing.
 Context-aware in contrast is used more generally to include nearby
people, devices, lighting, noise level, network availability, and even
the social situation, e.g., whether you are with your family or a
friend from school.
23
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
24
 AWireless Sensor Network (WSN) of spatially distributed
autonomous sensors to monitor physical or environmental
conditions, such as temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to a main
location.
 The more modern networks are bi-directional, also enabling control
of sensor activity.
 The development of wireless sensor networks was motivated by
military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications,
such as industrial process monitoring and control, machine health
monitoring, and so on.
25
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive System
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
26
 Augmented Reality (AR) is a live, copy, view of a physical, real-world
environment whose elements are augmented by computer-
generated sensory input such as sound, video, graphics or GPS data.
 As a result, the technology functions by enhancing one’s current
perception of reality.
 With the help of advanced AR technology (e.g. adding computer
vision and object recognition) the information about the real world
of the user becomes interactive and digitally manipulable.
27
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
28
 Sentient Computing is a form of ubiquitous computing which uses
sensors to perceive its environment and react accordingly. A
common use of the sensors is to construct a world model which
allows location-aware or context-aware applications to be
constructed
29
1. Pervasive Computing
2. Wearable Computing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. Sentient Computing
10. Human Computer Interaction
30
 HCI involves the study, planning, design and uses of the interaction
between people (users) and computers. It is often regarded as the
intersection of computer science, behavioral sciences, design and
several other fields of study.
 Because HCI studies a human and a machine in conjunction, it draws
from supporting knowledge on the machine as well the human side.
 On the machine side, techniques in computer graphics, operating
systems, programming languages, and development environments
are relevant.
 On the human side, communication theory, graphic and industrial
design disciplines, linguistics, social sciences, cognitive psychology,
social psychology, and human factors such as computer user
satisfaction are relevant.
31
 Supplies tools to manage information Quickly, Efficiently and
Effortlessly.
 Dramatically increased automation without much obtrusive or
visible use of computer infrastructure
 It supports a new class of intelligent and portable appliances or
"smart devices" .
 Helps people make effective use of computing tools without
requiring the knowledge of complex devices
 It gives people convenient access to relevant information .
 It removes the complexity of new technologies and enables us to be
more efficient in our work.
 It simplifies life by combining open standards-based applications
with everyday activities.
32
 Healthcare
 Personal Scheduling
 Remote computers will monitor our heath statistics
 Cars will use the Internet to find an open parking space or the
nearest vegetarian restaurant for their owners
 Used in Digi-tickers or implanted heart monitors
 In development of Smart Clothes and Smart watches .
 Flight Schedules:Your phone rings. Its the computer at American
Airlines.Your flight departure is delayed by 20 minutes.
 Advancement in Fire Fighters tools.
 Speech Recognition on Face/Thumbprint Detection.
 Instant presentation given with the help of Surface Computing.
33
 The trends in Pervasive Computing are increasing the diversity and
heterogeneity of networks and their constituent devices .
 Pervasive computing is expected to bring an explosion in the
number of devices in our local environments.
 UbiComp encompasses :
 System infrastructure, networking, security,UI,embedded systems, AI,
perception, speech recognition.
 With more progress in the fields like MANET, Artificial Intelligence,
Natural language processing capabilities and energy management,
the infrastructure limitation present currently is supposed to be
broken, which will result in revolutionary changes through the
implementation of Pervasive computing technology.
34
Questions ???
35

More Related Content

What's hot

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
OMAN1991
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
Govind Raj
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
Vishwajeet Vatharkar
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Pragya Srivastava
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Aashish Jain
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
Hongseok Kim
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
Hamza Malik
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
BhaktiKarale
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Kelly Zhang
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
abhisheksaini
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsJosephHowerton
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Ankita Gupta
 

What's hot (20)

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart Environments
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Viewers also liked

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Kevin Regan
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
logus2k
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social Singapore
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
We Are Social Singapore
 
Key Digital Trends for 2017
Key Digital Trends for 2017Key Digital Trends for 2017
Key Digital Trends for 2017
Ogilvy Consulting
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
We Are Social Singapore
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
We Are Social Singapore
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
John Maeda
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
We Are Social Singapore
 

Viewers also liked (11)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Key Digital Trends for 2017
Key Digital Trends for 2017Key Digital Trends for 2017
Key Digital Trends for 2017
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similar to UBIQUITOUS COMPUTING

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
RishabhRathore71
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
Eswar Publications
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
Dhiraj Shinde
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
VENKATA RAMANA PRABHALAVEEDU
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
BRNSSPublicationHubI
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
vivatechijri
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
anror264
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
Dave Shaw
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
Hina Afzal
 

Similar to UBIQUITOUS COMPUTING (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 

More from Rutvik Pensionwar

Optimized cluster index generation
Optimized cluster index generationOptimized cluster index generation
Optimized cluster index generation
Rutvik Pensionwar
 
Kayak Prototype using MERN Stack
Kayak Prototype using MERN StackKayak Prototype using MERN Stack
Kayak Prototype using MERN Stack
Rutvik Pensionwar
 
Team pioneers presents halloween night
Team pioneers presents halloween nightTeam pioneers presents halloween night
Team pioneers presents halloween night
Rutvik Pensionwar
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Rutvik Pensionwar
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
Rutvik Pensionwar
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Rutvik Pensionwar
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
Rutvik Pensionwar
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 

More from Rutvik Pensionwar (9)

Optimized cluster index generation
Optimized cluster index generationOptimized cluster index generation
Optimized cluster index generation
 
Kayak Prototype using MERN Stack
Kayak Prototype using MERN StackKayak Prototype using MERN Stack
Kayak Prototype using MERN Stack
 
Team pioneers presents halloween night
Team pioneers presents halloween nightTeam pioneers presents halloween night
Team pioneers presents halloween night
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

UBIQUITOUS COMPUTING

  • 1. The Computing of 21st Century !!! Seminar On
  • 2. ThreeWaves of Computing  Mainframe computing (60’s-80’s)  Desktop computing (80’s-90’s)  Ubiquitous computing(00’s-?) 2
  • 3.  Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser  Ubiquitous computing (ubicomp) is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. 3
  • 4. Classification of Ubiquitous Computing The Major trends in Computing (Source : Image © MarkWeiser/PARC) 4
  • 5.  Mark Weiser is the father of ubiquitous computing. He coined the phrase "ubiquitous computing" around 1988  He was working as ChiefTechnologist at the CS Lab of Xerox Palo Alto Research Center in the late 1980’s and was articulated the current of computing  He wrote some of the earliest papers on the subject, largely defining it and sketching out its major concerns  He developed the initial initiatives of ubiquitous computing in the form of tabs, pads, and boards, built at Xerox PARC, 1988-1994. 5
  • 6. EnablingTechnologies : • Processing • Cheaper, faster, smaller, more energy efficient • Storage • Big, fast and small in size. • Networking • Global, local, ad-hoc, low- power, high bandwidth, low latencies • Sensors • Types,speed,accuracy,price and robustness. • Displays • Projection, flexible materials, low power • Actuators • Computer controlled What makes Ubiquitous Computing Possible 6
  • 7.  There are three general features that are shared across a wide variety of ubicomp applications.  These features are :  the ability to provide transparent interfaces  the ability to automatically adapt the behavior of a program based on knowledge of the context of its use,  the ability to automate the capture of live experiences for later recall. 7
  • 8.  UbicompVision: “pervasive computation without intrusion.”  Remove the physical barrier between user and computational device  Keyboard and mouse are still the most commonly used interfaces !!  Need:  Flexible interfaces  Varied interfaces that can provide similar functionality 8
  • 9.  Context – information about the environment in which the application operates and reacts accordingly.  LOCATION andTIME are simple examples of context !  Context aware application:  is one which can capture the context  assign meaning to it  change behavior accordingly  Need:  Applications with context awareness allow rapid personalization of their services. 9
  • 10.  Capture everyday experiences and make the records available for later use.  Constraints:  Multiple streams of information  Their time synchronization  Their correlation and integration  Need:  Automated tools that support capture, integration and future access of info. 10
  • 11. 11
  • 12. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 12
  • 13.  An environment in which people interact with embedded (and mostly invisible) computers (processors) and in which networked devices are aware of their surroundings and peers and are able to provide services or use services from peers effectively.  It subsumes Distributed Computing and Mobile Computing . 13
  • 14. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 14
  • 15.  Wearable computers, also known as body-borne computers or wearable are miniature electronic devices that are worn by the bearer under, with or on top of clothing.  This class of wearable technology has been developed for general or special purpose information technologies and media development.  Wearable computers are especially useful for applications that require more complex computational support than just hardware coded logics.  Features:  There is a constant interaction between the computer and user.  The ability to multi-task 15
  • 16. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 16
  • 17.  In computing , Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people. Ambient intelligence is a vision on the future of consumer electronics ,telecommunications and computing.  As these devices grow smaller, more connected and more integrated into our environment, the technology disappears into our surroundingsTOWARDS UBIQUITY !!! 17
  • 18. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 18
  • 19.  Mobile computing is HCI by which a computer is expected to be transported during normal usage.  Mobile computing involves mobile communication, mobile hardware, and mobile software.  Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies.  Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications. 19
  • 20. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 20
  • 21.  Distributed computing is a field of computer science that studies distributed systems.  A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.  The components interact with each other in order to achieve a common goal.  Three significant characteristics of distributed systems are:  concurrency of components ,  lack of a global clock ,  independent failure of components. 21
  • 22. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 22
  • 23.  Context-aware computing refers to a general class of mobile systems that can sense their physical environment, and adapt their behavior accordingly.  Context-aware systems are a component of a ubiquitous computing or pervasive computing environment.  Three important aspects of context are: where you are; who you are with; and what resources are nearby. Although location is a primary capability, location-aware does not necessarily capture things of interest that are mobile or changing.  Context-aware in contrast is used more generally to include nearby people, devices, lighting, noise level, network availability, and even the social situation, e.g., whether you are with your family or a friend from school. 23
  • 24. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 24
  • 25.  AWireless Sensor Network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location.  The more modern networks are bi-directional, also enabling control of sensor activity.  The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. 25
  • 26. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive System 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 26
  • 27.  Augmented Reality (AR) is a live, copy, view of a physical, real-world environment whose elements are augmented by computer- generated sensory input such as sound, video, graphics or GPS data.  As a result, the technology functions by enhancing one’s current perception of reality.  With the help of advanced AR technology (e.g. adding computer vision and object recognition) the information about the real world of the user becomes interactive and digitally manipulable. 27
  • 28. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 28
  • 29.  Sentient Computing is a form of ubiquitous computing which uses sensors to perceive its environment and react accordingly. A common use of the sensors is to construct a world model which allows location-aware or context-aware applications to be constructed 29
  • 30. 1. Pervasive Computing 2. Wearable Computing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. Sentient Computing 10. Human Computer Interaction 30
  • 31.  HCI involves the study, planning, design and uses of the interaction between people (users) and computers. It is often regarded as the intersection of computer science, behavioral sciences, design and several other fields of study.  Because HCI studies a human and a machine in conjunction, it draws from supporting knowledge on the machine as well the human side.  On the machine side, techniques in computer graphics, operating systems, programming languages, and development environments are relevant.  On the human side, communication theory, graphic and industrial design disciplines, linguistics, social sciences, cognitive psychology, social psychology, and human factors such as computer user satisfaction are relevant. 31
  • 32.  Supplies tools to manage information Quickly, Efficiently and Effortlessly.  Dramatically increased automation without much obtrusive or visible use of computer infrastructure  It supports a new class of intelligent and portable appliances or "smart devices" .  Helps people make effective use of computing tools without requiring the knowledge of complex devices  It gives people convenient access to relevant information .  It removes the complexity of new technologies and enables us to be more efficient in our work.  It simplifies life by combining open standards-based applications with everyday activities. 32
  • 33.  Healthcare  Personal Scheduling  Remote computers will monitor our heath statistics  Cars will use the Internet to find an open parking space or the nearest vegetarian restaurant for their owners  Used in Digi-tickers or implanted heart monitors  In development of Smart Clothes and Smart watches .  Flight Schedules:Your phone rings. Its the computer at American Airlines.Your flight departure is delayed by 20 minutes.  Advancement in Fire Fighters tools.  Speech Recognition on Face/Thumbprint Detection.  Instant presentation given with the help of Surface Computing. 33
  • 34.  The trends in Pervasive Computing are increasing the diversity and heterogeneity of networks and their constituent devices .  Pervasive computing is expected to bring an explosion in the number of devices in our local environments.  UbiComp encompasses :  System infrastructure, networking, security,UI,embedded systems, AI, perception, speech recognition.  With more progress in the fields like MANET, Artificial Intelligence, Natural language processing capabilities and energy management, the infrastructure limitation present currently is supposed to be broken, which will result in revolutionary changes through the implementation of Pervasive computing technology. 34