Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. Eg:laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.
•It is also termed as ambient intelligence, Ubiquitous computing ,everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’.
Pervasive Computing : You're Already Knee Deep In ItRob Manson
Presentation for Web Directions South 2009 on Pervasive Computing that outlines 5 key metrics that can be used to measure how pervasive computing is collapsing your sense of space.
These measurements can be used to define and refine specific elements of a business model to make your operating and distribution platforms more pervasive.
Ubiquitous Computing Applications
Outline
Ubiquitous Computing
Virtual Reality
Augmented Reality
Information and Data Visualization.
What is ubiquitous computing?
Any computing technology that permits human interaction away from a single workstation.
This includes
pen-based technology,
handheld or portable devices,
large-scale interactive screens,
voice or vision technology.
Human-centered vision with these technologies presents many challenges. Here we Focus
defining the appropriate physical interaction experience;
discovering general application features;
theories for designing and evaluating the human experience within ubiquitous computing.
Scales of devices
Mark Weiser proposed three basic forms for ubiquitous system devices:
Inch
Foot
Yard
Implications for device size as well as relationship to people.
Pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information.
The words pervasive and ubiquitous mean "existing everywhere”.
It is also called “Ubiquitous computing”
Distributed Computing “two or more computers communicating and co-ordinating by message passing”.
Its also called as "Parallel computing”.
Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. Eg:laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.
•It is also termed as ambient intelligence, Ubiquitous computing ,everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’.
Pervasive Computing : You're Already Knee Deep In ItRob Manson
Presentation for Web Directions South 2009 on Pervasive Computing that outlines 5 key metrics that can be used to measure how pervasive computing is collapsing your sense of space.
These measurements can be used to define and refine specific elements of a business model to make your operating and distribution platforms more pervasive.
Ubiquitous Computing Applications
Outline
Ubiquitous Computing
Virtual Reality
Augmented Reality
Information and Data Visualization.
What is ubiquitous computing?
Any computing technology that permits human interaction away from a single workstation.
This includes
pen-based technology,
handheld or portable devices,
large-scale interactive screens,
voice or vision technology.
Human-centered vision with these technologies presents many challenges. Here we Focus
defining the appropriate physical interaction experience;
discovering general application features;
theories for designing and evaluating the human experience within ubiquitous computing.
Scales of devices
Mark Weiser proposed three basic forms for ubiquitous system devices:
Inch
Foot
Yard
Implications for device size as well as relationship to people.
Pervasive computing is the growing trend towards embedding microprocessors in everyday objects so they can communicate information.
The words pervasive and ubiquitous mean "existing everywhere”.
It is also called “Ubiquitous computing”
Distributed Computing “two or more computers communicating and co-ordinating by message passing”.
Its also called as "Parallel computing”.
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social Singapore
This is the February 2013 edition of We Are Social Singapore’s guide to Social, Digital and Mobile around the world. You'll find more in this series of reports at http://wearesocial.sg/tag/sdmw
This report presents all the key statistics, data and behavioural indicators for social, digital and mobile channels around the world. Alongside regional pictures that capture the stats for every nation on Earth, we also present in-depth analyses for 24 of the world's largest economies: Argentina, Australia, Brazile, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Mexico, Nigeria, Poland, Russia, Saudi Arabia, Singapore, South Africa, South Korea, Turkey, Thailand, the UAE, the UK, and the USA. For other reports in this series, please visit http://wearesocial.sg/tag/sdmw
The official Ogilvy Key Digital Trends for 2017. A yearly trend report outlining both where we believe the digital and social landscape is headed and what brands and agency partners should do about it. By Marshall Manson and James Whatley
We Are Social's comprehensive new report covers internet, social media and mobile usage statistics from all over the world. It contains more than 350 infographics, including global snapshots, regional overviews, and in-depth profiles of 30 of the world's largest economies. For a more insightful analysis of these numbers, please visit http://bit.ly/SDMW2015
PDF, audio, and voiceover are now available on designintechreport.wordpress.com
Today’s most beloved technology products and services balance design and engineering in a way that perfectly blends form and function. Businesses started by designers have created billions of dollars of value, are raising billions in capital, and VC firms increasingly see the importance of design. The third annual Design in Tech Report examines how design trends are revolutionizing the entrepreneurial and corporate ecosystems in tech. This report covers related M&A activity, new patterns in creativity × business, and the rise of computational design.
We Are Social's comprehensive new Digital in 2016 report presents internet, social media, and mobile usage statistics and trends from all over the world. It contains more than 500 infographics, including global data snapshots, regional overviews, and in-depth profiles of the digital landscapes in 30 of the world's key economies. For a more insightful analysis of the numbers contained in this report, please visit http://bit.ly/DSM2016ES.
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
Presentation on Ubiqutous Computing. Describes basic aspects of this computing. How it can be deployed in our day-to-day life. applications and advantages.
The year of the Internet of Things; The Internet of Things probably already influences your life. And if it doesn’t, it soon
will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were
mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at
each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into
the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing.
Ubiquitous computing is essentially the term for human interaction with computers in virtually everything.
Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated
world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse
power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social
sciences.
The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1"
displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many
other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your
fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork
everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox
PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a
commercial product now):
Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With laborintensive
components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled
resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that
feed into a consumer’s phone
www.itu.int/en/Lists/consultation2015/Attachments/41/45.3104.pdf
http://docplayer.net/search/?q=assem+abdel+hamed+mousa
https://www.waset.org/abstracts/5638
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
With the emergence of ubiquitous computing, whole scenario of computing has been changed. It affected many inter disciplinary fields. This paper visions the impact of ubiquitous computing on video surveillance system. With increase in population and highly specific security areas, intelligent monitoring is the major requirement of modern world .The paper describes the evolution of surveillance system from analog to multi sensor ubiquitous system. It mentions the demand of context based architectures. It draws the benefit of merging of cloud computing to boost the surveillance system and at the same time reducing cost and maintenance. It analyzes some surveillance system architectures which are made for ubiquitous deployment. It provides major challenges and opportunities for the researchers to make surveillance system highly efficient and make them seamlessly embed
in our environments.
Ubiquitous computing will surround users
with a comfortable and convenient information environment and a smart
space that merges physical and computational infrastructures into an integrated
habitat. This habitat will feature a proliferation of hundreds or thousands of
computing devices and sensors that will provide new functionality, offer specialized
services, and boost productivity
and interaction among the devices and
the
users.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
Indexes are used to expedite the query execution time without which the pointer would traverse from the first row till the last entry of the table/view to notice the relevant row. Larger the database (table), more is the cost of execution. However, if the index is already set, irrelevant entries are skipped, thus advancing the search.
1. Developed a travel metasearch engine using MERN stack
2. The online travel application features services like listing/booking hotels, flights or cars, administrative tools and billing
Technologies used:
SQL, Mongo, Express.js, Node.js, React.js, Apache Kafka, HTML, CSS, BootStrap, JMeter, Mocha
1. Developed an arcade game using Phaser (Pixi.js) – a HTML5 Game Framework
2. Involved implementation of design patterns for large-scale software reusability and effective developer communication
3. Trail around with Agile, Scrum and Kanban methodologies using GitHub, CFD and Sprint burn-down charts
C is a general-purpose high level language that was originally developed by Dennis Ritchie for the Unix operating system. It was first implemented on the Digital Equipment Corporation PDP-11 computer in 1972.
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
With the development in data acquisition system, information-collection plays an increasingly important role in the field of Wireless Technology. There has been tremendous increase in the use of sensors in each and every field. In order to get fast response from these sensors the delay should be reduced. Also the congestion in the network should be tackled to increase the efficiency. Wireless Sensor Networks (WSNs) consist of many tiny wireless sensors which operate in an environment in order to collect data. In a typical WSN, data is gathered from environment by sensor nodes and then transmitted to a base station. All these operations are executed by sensor nodes with keeping in mind the limitation of power. Reliable communication, power efficiency, network congestion issues are among major concerns. So in our project our main focus is to avoid the packet loss by increasing the network efficiency and handling the congestion in the network by proper buffer management. Finally visualization of processed data is done at the base station and the future enhancement could be to directly send the sensed data to cloud storage.
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
1. Introduce to Wireless Sensor Network and various data retrieval techniques.
2. Present different algorithms used in Wireless Sensor Network to achieve efficiency and manage power effectively.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
3. Ubiquitous computing is the method of enhancing
computer use by making many computers available
throughout the physical environment, but making
them effectively invisible to the user
– Mark Weiser
Ubiquitous computing (ubicomp) is a post-desktop
model of human-computer interaction in which
information processing has been thoroughly
integrated into everyday objects and activities.
3
5. Mark Weiser is the father of ubiquitous computing. He
coined the phrase "ubiquitous computing" around 1988
He was working as ChiefTechnologist at the
CS Lab of Xerox Palo Alto Research Center in
the late 1980’s and was articulated the current
of computing
He wrote some of the earliest papers on the subject, largely
defining it and sketching out its major concerns
He developed the initial initiatives of ubiquitous computing in the
form of tabs, pads, and boards, built at Xerox PARC, 1988-1994.
5
6. EnablingTechnologies :
• Processing
• Cheaper, faster, smaller,
more energy efficient
• Storage
• Big, fast and small in size.
• Networking
• Global, local, ad-hoc, low-
power, high bandwidth,
low latencies
• Sensors
• Types,speed,accuracy,price
and robustness.
• Displays
• Projection, flexible
materials, low power
• Actuators
• Computer controlled
What makes Ubiquitous Computing Possible
6
7. There are three general features that are shared
across a wide variety of ubicomp applications.
These features are :
the ability to provide transparent interfaces
the ability to automatically adapt the behavior of a
program based on knowledge of the context of its use,
the ability to automate the capture of live experiences
for later recall.
7
8. UbicompVision: “pervasive computation without
intrusion.”
Remove the physical barrier between user and
computational device
Keyboard and mouse are still the most commonly used
interfaces !!
Need:
Flexible interfaces
Varied interfaces that can provide similar functionality
8
9. Context – information about the environment in which the
application operates and reacts accordingly.
LOCATION andTIME are simple examples of context !
Context aware application:
is one which can capture the context
assign meaning to it
change behavior accordingly
Need:
Applications with context awareness allow rapid personalization
of their services.
9
10. Capture everyday experiences and make the records
available for later use.
Constraints:
Multiple streams of information
Their time synchronization
Their correlation and integration
Need:
Automated tools that support capture, integration and future
access of info.
10
13. An environment in which people
interact with embedded (and
mostly invisible) computers
(processors) and in which
networked devices are aware of
their surroundings and peers
and are able to provide services
or use services from peers
effectively.
It subsumes Distributed
Computing and Mobile
Computing .
13
15. Wearable computers, also known as body-borne computers or
wearable are miniature electronic devices that are worn by the
bearer under, with or on top of clothing.
This class of wearable technology has been developed for general or
special purpose information technologies and media development.
Wearable computers are especially useful for applications that
require more complex computational support than just hardware
coded logics.
Features:
There is a constant interaction
between the computer and user.
The ability to multi-task
15
17. In computing , Ambient Intelligence refers to electronic
environments that are sensitive and responsive to the
presence of people. Ambient intelligence is a vision on the
future of consumer electronics ,telecommunications
and computing.
As these devices grow smaller, more connected and more
integrated into our environment, the technology
disappears into our surroundingsTOWARDS UBIQUITY !!!
17
19. Mobile computing is HCI by which a
computer is expected to be
transported during normal usage.
Mobile computing involves mobile
communication, mobile hardware, and
mobile software.
Communication issues include ad hoc
and infrastructure networks as well as
communication properties, protocols,
data formats and concrete
technologies.
Hardware includes mobile devices or
device components. Mobile software
deals with the characteristics and
requirements of mobile applications.
19
21. Distributed computing is a field of computer science that studies
distributed systems.
A distributed system is a software system in which components
located on networked computers communicate and coordinate their
actions by passing messages.
The components interact with each other in order to achieve a
common goal.
Three significant characteristics of distributed systems are:
concurrency of components ,
lack of a global clock ,
independent failure of components.
21
23. Context-aware computing refers to a general class of mobile
systems that can sense their physical environment, and adapt their
behavior accordingly.
Context-aware systems are a component of a ubiquitous computing
or pervasive computing environment.
Three important aspects of context are: where you are; who you are
with; and what resources are nearby. Although location is a primary
capability, location-aware does not necessarily capture things of
interest that are mobile or changing.
Context-aware in contrast is used more generally to include nearby
people, devices, lighting, noise level, network availability, and even
the social situation, e.g., whether you are with your family or a
friend from school.
23
25. AWireless Sensor Network (WSN) of spatially distributed
autonomous sensors to monitor physical or environmental
conditions, such as temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to a main
location.
The more modern networks are bi-directional, also enabling control
of sensor activity.
The development of wireless sensor networks was motivated by
military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications,
such as industrial process monitoring and control, machine health
monitoring, and so on.
25
27. Augmented Reality (AR) is a live, copy, view of a physical, real-world
environment whose elements are augmented by computer-
generated sensory input such as sound, video, graphics or GPS data.
As a result, the technology functions by enhancing one’s current
perception of reality.
With the help of advanced AR technology (e.g. adding computer
vision and object recognition) the information about the real world
of the user becomes interactive and digitally manipulable.
27
29. Sentient Computing is a form of ubiquitous computing which uses
sensors to perceive its environment and react accordingly. A
common use of the sensors is to construct a world model which
allows location-aware or context-aware applications to be
constructed
29
31. HCI involves the study, planning, design and uses of the interaction
between people (users) and computers. It is often regarded as the
intersection of computer science, behavioral sciences, design and
several other fields of study.
Because HCI studies a human and a machine in conjunction, it draws
from supporting knowledge on the machine as well the human side.
On the machine side, techniques in computer graphics, operating
systems, programming languages, and development environments
are relevant.
On the human side, communication theory, graphic and industrial
design disciplines, linguistics, social sciences, cognitive psychology,
social psychology, and human factors such as computer user
satisfaction are relevant.
31
32. Supplies tools to manage information Quickly, Efficiently and
Effortlessly.
Dramatically increased automation without much obtrusive or
visible use of computer infrastructure
It supports a new class of intelligent and portable appliances or
"smart devices" .
Helps people make effective use of computing tools without
requiring the knowledge of complex devices
It gives people convenient access to relevant information .
It removes the complexity of new technologies and enables us to be
more efficient in our work.
It simplifies life by combining open standards-based applications
with everyday activities.
32
33. Healthcare
Personal Scheduling
Remote computers will monitor our heath statistics
Cars will use the Internet to find an open parking space or the
nearest vegetarian restaurant for their owners
Used in Digi-tickers or implanted heart monitors
In development of Smart Clothes and Smart watches .
Flight Schedules:Your phone rings. Its the computer at American
Airlines.Your flight departure is delayed by 20 minutes.
Advancement in Fire Fighters tools.
Speech Recognition on Face/Thumbprint Detection.
Instant presentation given with the help of Surface Computing.
33
34. The trends in Pervasive Computing are increasing the diversity and
heterogeneity of networks and their constituent devices .
Pervasive computing is expected to bring an explosion in the
number of devices in our local environments.
UbiComp encompasses :
System infrastructure, networking, security,UI,embedded systems, AI,
perception, speech recognition.
With more progress in the fields like MANET, Artificial Intelligence,
Natural language processing capabilities and energy management,
the infrastructure limitation present currently is supposed to be
broken, which will result in revolutionary changes through the
implementation of Pervasive computing technology.
34