SlideShare a Scribd company logo
1 of 14
Download to read offline
A
Technical Seminar
On
PERVASIVE COMPUTING
Under the Guidance of:
Mr.D.S CHANDRAMOULI M.Tech
Assistant professor
Department of C.S.E
Presented By:
P.VENKATARAMANA
16L41A05166
IV B.Tech- C.S.E
Abstract
 Pervasive Computing environment gracefully integrates networked
computing devices from tiny sensors to extremely dynamic and powerful
devices – with people and their ambient environment. Service discovery is an
essential element for pervasive computing to achieve “anytime, anywhere”
computing without users’ active attention to computing devices and network
services . Therefore, devices and network services may be unprotected personal
privacy may be sacrificed; and devices and network services may be
inconvenient to use. In particular will focus on how pervasive computing
provides various features like security, safety, convenience, telemetric etc.
Introduction
 Pervasive computing environments involve the interaction, coordination,
and cooperation of numerous, casually accessible, and often invisible
computing devices.
 These devices will connect via wired and wireless links to one another as
well as to the global networking infrastructure to provide more relevant
information and integrated services.
 Existing approaches to building distributed applications, including
client/server computing, are ill suited to meet this challenges
 Mobile computing and communication is one of the major parts of the
pervasive computing system. Here data and computing resources are shared
among the various devices.
Existing system
 “Mark Weiser” is the father of Pervasive Computing. He coined the term
“Ubiquitous Computing” for this in 1988, during his tenure as Chief
Technologist of the Xerox Palo Alto Research Centre.
 Pervasive Computing is considered to be the third wave of computer
technologies to emerge since the computers were first appeared:
1.Distributed system era:
2: mobile computing era :
3: Pervasive computing era :
Proposed system
In last few year ago pervasive computing devices are tinny sensors ,microchips
(small devices for computations), But now pervasive computing devices have
evolved to include:
 Laptops ,Smart phones,tablets,wearable devices and notebooks
 The Internet of things has largely evolved out of pervasive computing
Structure of pervasive computing
TECHNOLOGYAND APPLICATIONS
 Information access
 Text retrieval
 Multimedia document
retrieval
 Automatic indexing
 Pervasive devices
 Palm top computers
 Smart badges
 Electronic books
 User sensitive devices
 Mobility and networking
 Device discovery
 Wireless protocols
 Security
 Voice and video over IP
 Perceptive interfaces
 Biometric person ID
 Speech recognition
 Gesture recognition
Uses of Pervasive computing
REAL TIME APPLICATIONS
 IBM ‘s “smarter
planet “
 The project is about
building a smarter
planet by including
everyday case
scenarios like parking
the car in a place by
communicating with
another car.
ONGOING RESEARCH PROJECTS
CONCLUSION
 Pervasive computing in an increasingly networked world continues to affect
more and more of the world's population. Although this is a global
phenomenon, regional and national social and cultural factors will directly
influence the technologies and promise of pervasive computing.
 Pervasive Computing - the next era of computer science.
 PervasiveComputing.net is intended to be a information and news website.
It will cover various new developments happening in pervasive computing
area - basically mobile computing, sensors, networking, security/privacy,
ubiquitous access to information, and related fields.
 Let’s not throw the first stone, but make the first step!
PERVASIVE COMPUTING

More Related Content

What's hot

Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud ComputingSeungyun Lee
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.Balvant Biradar
 
Artificial intelligence of things(AIoT): What is AIoT: AIoT applications
Artificial intelligence of things(AIoT): What is AIoT: AIoT applicationsArtificial intelligence of things(AIoT): What is AIoT: AIoT applications
Artificial intelligence of things(AIoT): What is AIoT: AIoT applicationsAnusha Aravindan
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesJason TC HOU (侯宗成)
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingPriyodarshini Dhar
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 

What's hot (20)

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Artificial intelligence of things(AIoT): What is AIoT: AIoT applications
Artificial intelligence of things(AIoT): What is AIoT: AIoT applicationsArtificial intelligence of things(AIoT): What is AIoT: AIoT applications
Artificial intelligence of things(AIoT): What is AIoT: AIoT applications
 
Iot
IotIot
Iot
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 

Similar to PERVASIVE COMPUTING

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
Introduction to computers and networking
Introduction to computers and networkingIntroduction to computers and networking
Introduction to computers and networkingAbhishekMondal42
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A SurveyCheryl Brown
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsVictoria Romero-Gomez
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 

Similar to PERVASIVE COMPUTING (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Introduction to computers and networking
Introduction to computers and networkingIntroduction to computers and networking
Introduction to computers and networking
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of Things
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

PERVASIVE COMPUTING

  • 1. A Technical Seminar On PERVASIVE COMPUTING Under the Guidance of: Mr.D.S CHANDRAMOULI M.Tech Assistant professor Department of C.S.E Presented By: P.VENKATARAMANA 16L41A05166 IV B.Tech- C.S.E
  • 2. Abstract  Pervasive Computing environment gracefully integrates networked computing devices from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environment. Service discovery is an essential element for pervasive computing to achieve “anytime, anywhere” computing without users’ active attention to computing devices and network services . Therefore, devices and network services may be unprotected personal privacy may be sacrificed; and devices and network services may be inconvenient to use. In particular will focus on how pervasive computing provides various features like security, safety, convenience, telemetric etc.
  • 3. Introduction  Pervasive computing environments involve the interaction, coordination, and cooperation of numerous, casually accessible, and often invisible computing devices.  These devices will connect via wired and wireless links to one another as well as to the global networking infrastructure to provide more relevant information and integrated services.  Existing approaches to building distributed applications, including client/server computing, are ill suited to meet this challenges  Mobile computing and communication is one of the major parts of the pervasive computing system. Here data and computing resources are shared among the various devices.
  • 4. Existing system  “Mark Weiser” is the father of Pervasive Computing. He coined the term “Ubiquitous Computing” for this in 1988, during his tenure as Chief Technologist of the Xerox Palo Alto Research Centre.  Pervasive Computing is considered to be the third wave of computer technologies to emerge since the computers were first appeared: 1.Distributed system era: 2: mobile computing era : 3: Pervasive computing era :
  • 5. Proposed system In last few year ago pervasive computing devices are tinny sensors ,microchips (small devices for computations), But now pervasive computing devices have evolved to include:  Laptops ,Smart phones,tablets,wearable devices and notebooks  The Internet of things has largely evolved out of pervasive computing
  • 7. TECHNOLOGYAND APPLICATIONS  Information access  Text retrieval  Multimedia document retrieval  Automatic indexing  Pervasive devices  Palm top computers  Smart badges  Electronic books  User sensitive devices  Mobility and networking  Device discovery  Wireless protocols  Security  Voice and video over IP  Perceptive interfaces  Biometric person ID  Speech recognition  Gesture recognition
  • 8. Uses of Pervasive computing
  • 10.
  • 11.  IBM ‘s “smarter planet “  The project is about building a smarter planet by including everyday case scenarios like parking the car in a place by communicating with another car. ONGOING RESEARCH PROJECTS
  • 12.
  • 13. CONCLUSION  Pervasive computing in an increasingly networked world continues to affect more and more of the world's population. Although this is a global phenomenon, regional and national social and cultural factors will directly influence the technologies and promise of pervasive computing.  Pervasive Computing - the next era of computer science.  PervasiveComputing.net is intended to be a information and news website. It will cover various new developments happening in pervasive computing area - basically mobile computing, sensors, networking, security/privacy, ubiquitous access to information, and related fields.  Let’s not throw the first stone, but make the first step!