SlideShare une entreprise Scribd logo
1  sur  18
Sultan Qaboos University
College of Engineering
Department of Electrical and Computer
Engineering
Outline
 Definition
 History
 Goals
 Applications
 Advantages & Disadvantages
 Conclusion
2
o Ubiquitous: existing or being everywhere at
the same time [1].
o Ubiquitous Computing:
Computing is made to appear everywhere and
anywhere. It can occur using any device, in
any location, and in any format [2].
o Also called Pervasive Computing.
What is Ubiquitous Computing
?
3
[3]
4
1
2
3
Yesterday … Mainframes
5
Tomorrow … Ubiquitous
Computing
6
Where it came from ?
o The idea of ubiquitous computing was
first articulated by Mark Weiser in 1988 in
Computer Science Lab at Xerox PARC [4].
7
o Invisible technology.
o Integration with virtual and physical
worlds.
Goals of Ubiquitous
Computing
8
 Health care
 Home care
 Intelligent transport system
 Environmental monitoring
Applications of Ubiquitous
Computing
9
o Smart phones.
o The replacement of old electric meters
with smart meters [5].
Existing Examples of Ubiquitous
Computing
FYP Projects
o School Children Tracking System.
o Smart Traffic Information System.
o Shopping Cart System.
o Augmented reality Concept Targeting
Tourism Sector
10
o When you enter your room, the lights
come on automatically and when you
leave they go off.
o Your smart car will suggest the optimal
route by assessing the traffic along a smart
city network.
Life with Ubiquitous Computing
11
o A touch screen on your desk will show
today’s high priority tasks.
o Your room temperature will adjust to your
preference.
12
o It is designed to place computers into a
human environment instead of making
humans enter computer environments and
adding extra stress to learning the process.
o Quick, efficient and effortless.
o It supports a new class of intelligent and
portable appliances or "smart devices"
Advantages of Ubiquitous
Computing
13
o Power consumption.
o Wireless connectivity.
o Not secure.
o Very expensive [7].
Limiting Factors
14
 Ubiquitous computing is about making
our lives simpler through digital
environments that are sensitive, adaptive,
and responsive to human needs.
 Many applications.
15
Conclusion
o [1]”Oxford”, Oxford University, China 2007
o [2] Ubiquitous computing: Wikipedia the free
encyclopedia. Available fromURL:
http://en.wikipedia.org/wiki/Ubiquitous_comput
ing.
o [3] The major tend in computing: ask. Available
from
URL:http://www.ask.com/question/advantages-
of-the-use-of-ubiquitous-computing
o [4] Ubiquitous computing: sul.stanford.
Available from URL:
http://wwwsul.stanford.edu/weiser/Ubiq.html
References
16
o [5] Pervasive computing: Networking search.
Available from URL:
http://searchnetworking.techtarget.com/definition/
pervasive-computing.
o [6] Pervasive computing: Benefits and
considerations: Computerworld. Available from
URL:http://www.computerworld.com/s/article/78
478/Pervasive_computing_Benefits_and_consider
ations.
o [7] Ubiquitous computing. Available from URL:
www.belarabia.com/2014/01/ubiquitous-
computing.html
17
Any Questions

Contenu connexe

Tendances

Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingDaniel Kornev
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable ComputerSaumya Shah
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 

Tendances (20)

Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 

Similaire à Ubiquitous computing

Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...Malik Sajjad Ahmad Awan
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
PUC unit1 knv26.8.18.pptx
PUC unit1 knv26.8.18.pptxPUC unit1 knv26.8.18.pptx
PUC unit1 knv26.8.18.pptxshrik16
 
The Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the WebThe Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the WebAndreas Kamilaris
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0jan aljan
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxMd.Jamilur Rahman
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computerVivek Kumar
 
Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Muragesh Kabbinakantimath
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيتjinanAlmousawy
 

Similaire à Ubiquitous computing (20)

UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
PUC unit1 knv26.8.18.pptx
PUC unit1 knv26.8.18.pptxPUC unit1 knv26.8.18.pptx
PUC unit1 knv26.8.18.pptx
 
The Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the WebThe Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the Web
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
 
Ubiquitous
UbiquitousUbiquitous
Ubiquitous
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
 

Dernier

Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 

Dernier (20)

Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 

Ubiquitous computing

  • 1. Sultan Qaboos University College of Engineering Department of Electrical and Computer Engineering
  • 2. Outline  Definition  History  Goals  Applications  Advantages & Disadvantages  Conclusion 2
  • 3. o Ubiquitous: existing or being everywhere at the same time [1]. o Ubiquitous Computing: Computing is made to appear everywhere and anywhere. It can occur using any device, in any location, and in any format [2]. o Also called Pervasive Computing. What is Ubiquitous Computing ? 3
  • 7. Where it came from ? o The idea of ubiquitous computing was first articulated by Mark Weiser in 1988 in Computer Science Lab at Xerox PARC [4]. 7
  • 8. o Invisible technology. o Integration with virtual and physical worlds. Goals of Ubiquitous Computing 8
  • 9.  Health care  Home care  Intelligent transport system  Environmental monitoring Applications of Ubiquitous Computing 9
  • 10. o Smart phones. o The replacement of old electric meters with smart meters [5]. Existing Examples of Ubiquitous Computing FYP Projects o School Children Tracking System. o Smart Traffic Information System. o Shopping Cart System. o Augmented reality Concept Targeting Tourism Sector 10
  • 11. o When you enter your room, the lights come on automatically and when you leave they go off. o Your smart car will suggest the optimal route by assessing the traffic along a smart city network. Life with Ubiquitous Computing 11
  • 12. o A touch screen on your desk will show today’s high priority tasks. o Your room temperature will adjust to your preference. 12
  • 13. o It is designed to place computers into a human environment instead of making humans enter computer environments and adding extra stress to learning the process. o Quick, efficient and effortless. o It supports a new class of intelligent and portable appliances or "smart devices" Advantages of Ubiquitous Computing 13
  • 14. o Power consumption. o Wireless connectivity. o Not secure. o Very expensive [7]. Limiting Factors 14
  • 15.  Ubiquitous computing is about making our lives simpler through digital environments that are sensitive, adaptive, and responsive to human needs.  Many applications. 15 Conclusion
  • 16. o [1]”Oxford”, Oxford University, China 2007 o [2] Ubiquitous computing: Wikipedia the free encyclopedia. Available fromURL: http://en.wikipedia.org/wiki/Ubiquitous_comput ing. o [3] The major tend in computing: ask. Available from URL:http://www.ask.com/question/advantages- of-the-use-of-ubiquitous-computing o [4] Ubiquitous computing: sul.stanford. Available from URL: http://wwwsul.stanford.edu/weiser/Ubiq.html References 16
  • 17. o [5] Pervasive computing: Networking search. Available from URL: http://searchnetworking.techtarget.com/definition/ pervasive-computing. o [6] Pervasive computing: Benefits and considerations: Computerworld. Available from URL:http://www.computerworld.com/s/article/78 478/Pervasive_computing_Benefits_and_consider ations. o [7] Ubiquitous computing. Available from URL: www.belarabia.com/2014/01/ubiquitous- computing.html 17