SlideShare une entreprise Scribd logo
1  sur  35
The Computing of 21st Century !!!
Seminar On
ThreeWaves of Computing
 Mainframe computing (60’s-80’s)
 Desktop computing (80’s-90’s)
 Ubiquitous computing(00’s-?)
2
 Ubiquitous computing is the method of enhancing
computer use by making many computers available
throughout the physical environment, but making
them effectively invisible to the user
– Mark Weiser
 Ubiquitous computing (ubicomp) is a post-desktop
model of human-computer interaction in which
information processing has been thoroughly
integrated into everyday objects and activities.
3
Classification of Ubiquitous Computing
The Major trends in Computing
(Source : Image © MarkWeiser/PARC)
4
 Mark Weiser is the father of ubiquitous computing. He
coined the phrase "ubiquitous computing" around 1988
 He was working as ChiefTechnologist at the
CS Lab of Xerox Palo Alto Research Center in
the late 1980’s and was articulated the current
of computing
 He wrote some of the earliest papers on the subject, largely
defining it and sketching out its major concerns
 He developed the initial initiatives of ubiquitous computing in the
form of tabs, pads, and boards, built at Xerox PARC, 1988-1994.
5
EnablingTechnologies :
• Processing
• Cheaper, faster, smaller,
more energy efficient
• Storage
• Big, fast and small in size.
• Networking
• Global, local, ad-hoc, low-
power, high bandwidth,
low latencies
• Sensors
• Types,speed,accuracy,price
and robustness.
• Displays
• Projection, flexible
materials, low power
• Actuators
• Computer controlled
What makes Ubiquitous Computing Possible
6
 There are three general features that are shared
across a wide variety of ubicomp applications.
 These features are :
 the ability to provide transparent interfaces
 the ability to automatically adapt the behavior of a
program based on knowledge of the context of its use,
 the ability to automate the capture of live experiences
for later recall.
7
 UbicompVision: “pervasive computation without
intrusion.”
 Remove the physical barrier between user and
computational device
 Keyboard and mouse are still the most commonly used
interfaces !!
 Need:
 Flexible interfaces
 Varied interfaces that can provide similar functionality
8
 Context – information about the environment in which the
application operates and reacts accordingly.
 LOCATION andTIME are simple examples of context !
 Context aware application:
 is one which can capture the context
 assign meaning to it
 change behavior accordingly
 Need:
 Applications with context awareness allow rapid personalization
of their services.
9
 Capture everyday experiences and make the records
available for later use.
 Constraints:
 Multiple streams of information
 Their time synchronization
 Their correlation and integration
 Need:
 Automated tools that support capture, integration and future
access of info.
10
11
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
12
 An environment in which people
interact with embedded (and
mostly invisible) computers
(processors) and in which
networked devices are aware of
their surroundings and peers
and are able to provide services
or use services from peers
effectively.
 It subsumes Distributed
Computing and Mobile
Computing .
13
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
14
 Wearable computers, also known as body-borne computers or
wearable are miniature electronic devices that are worn by the
bearer under, with or on top of clothing.
 This class of wearable technology has been developed for general or
special purpose information technologies and media development.
 Wearable computers are especially useful for applications that
require more complex computational support than just hardware
coded logics.
 Features:
 There is a constant interaction
between the computer and user.
 The ability to multi-task
15
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
16
 In computing , Ambient Intelligence refers to electronic
environments that are sensitive and responsive to the
presence of people. Ambient intelligence is a vision on the
future of consumer electronics ,telecommunications
and computing.
 As these devices grow smaller, more connected and more
integrated into our environment, the technology
disappears into our surroundingsTOWARDS UBIQUITY !!!
17
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
18
 Mobile computing is HCI by which a
computer is expected to be
transported during normal usage.
 Mobile computing involves mobile
communication, mobile hardware, and
mobile software.
 Communication issues include ad hoc
and infrastructure networks as well as
communication properties, protocols,
data formats and concrete
technologies.
 Hardware includes mobile devices or
device components. Mobile software
deals with the characteristics and
requirements of mobile applications.
19
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
20
 Distributed computing is a field of computer science that studies
distributed systems.
 A distributed system is a software system in which components
located on networked computers communicate and coordinate their
actions by passing messages.
 The components interact with each other in order to achieve a
common goal.
 Three significant characteristics of distributed systems are:
 concurrency of components ,
 lack of a global clock ,
 independent failure of components.
21
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
22
 Context-aware computing refers to a general class of mobile
systems that can sense their physical environment, and adapt their
behavior accordingly.
 Context-aware systems are a component of a ubiquitous computing
or pervasive computing environment.
 Three important aspects of context are: where you are; who you are
with; and what resources are nearby. Although location is a primary
capability, location-aware does not necessarily capture things of
interest that are mobile or changing.
 Context-aware in contrast is used more generally to include nearby
people, devices, lighting, noise level, network availability, and even
the social situation, e.g., whether you are with your family or a
friend from school.
23
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
24
 AWireless Sensor Network (WSN) of spatially distributed
autonomous sensors to monitor physical or environmental
conditions, such as temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to a main
location.
 The more modern networks are bi-directional, also enabling control
of sensor activity.
 The development of wireless sensor networks was motivated by
military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications,
such as industrial process monitoring and control, machine health
monitoring, and so on.
25
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive System
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
26
 Augmented Reality (AR) is a live, copy, view of a physical, real-world
environment whose elements are augmented by computer-
generated sensory input such as sound, video, graphics or GPS data.
 As a result, the technology functions by enhancing one’s current
perception of reality.
 With the help of advanced AR technology (e.g. adding computer
vision and object recognition) the information about the real world
of the user becomes interactive and digitally manipulable.
27
1. Pervasive Computing
2. WearableComputing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. SentientComputing
10. Human Computer Interaction
28
 Sentient Computing is a form of ubiquitous computing which uses
sensors to perceive its environment and react accordingly. A
common use of the sensors is to construct a world model which
allows location-aware or context-aware applications to be
constructed
29
1. Pervasive Computing
2. Wearable Computing
3. Ambient Intelligence
4. Mobile Computing
5. Distributed Computing
6. Context Aware Pervasive Systems
7. Wireless Sensor Networking
8. Augmented Reality
9. Sentient Computing
10. Human Computer Interaction
30
 HCI involves the study, planning, design and uses of the interaction
between people (users) and computers. It is often regarded as the
intersection of computer science, behavioral sciences, design and
several other fields of study.
 Because HCI studies a human and a machine in conjunction, it draws
from supporting knowledge on the machine as well the human side.
 On the machine side, techniques in computer graphics, operating
systems, programming languages, and development environments
are relevant.
 On the human side, communication theory, graphic and industrial
design disciplines, linguistics, social sciences, cognitive psychology,
social psychology, and human factors such as computer user
satisfaction are relevant.
31
 Supplies tools to manage information Quickly, Efficiently and
Effortlessly.
 Dramatically increased automation without much obtrusive or
visible use of computer infrastructure
 It supports a new class of intelligent and portable appliances or
"smart devices" .
 Helps people make effective use of computing tools without
requiring the knowledge of complex devices
 It gives people convenient access to relevant information .
 It removes the complexity of new technologies and enables us to be
more efficient in our work.
 It simplifies life by combining open standards-based applications
with everyday activities.
32
 Healthcare
 Personal Scheduling
 Remote computers will monitor our heath statistics
 Cars will use the Internet to find an open parking space or the
nearest vegetarian restaurant for their owners
 Used in Digi-tickers or implanted heart monitors
 In development of Smart Clothes and Smart watches .
 Flight Schedules:Your phone rings. Its the computer at American
Airlines.Your flight departure is delayed by 20 minutes.
 Advancement in Fire Fighters tools.
 Speech Recognition on Face/Thumbprint Detection.
 Instant presentation given with the help of Surface Computing.
33
 The trends in Pervasive Computing are increasing the diversity and
heterogeneity of networks and their constituent devices .
 Pervasive computing is expected to bring an explosion in the
number of devices in our local environments.
 UbiComp encompasses :
 System infrastructure, networking, security,UI,embedded systems, AI,
perception, speech recognition.
 With more progress in the fields like MANET, Artificial Intelligence,
Natural language processing capabilities and energy management,
the infrastructure limitation present currently is supposed to be
broken, which will result in revolutionary changes through the
implementation of Pervasive computing technology.
34
Questions ???
35

Contenu connexe

Tendances

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingOMAN1991
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applicationsHamza Malik
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing BhaktiKarale
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingabhisheksaini
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MMary Margarat
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsJosephHowerton
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 

Tendances (20)

Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart Environments
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

En vedette

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKevin Regan
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social Singapore
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)We Are Social Singapore
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017John Maeda
 

En vedette (11)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
We Are Social's Guide to Social, Digital and Mobile Around the World (Feb 2013)
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Key Digital Trends for 2017
Key Digital Trends for 2017Key Digital Trends for 2017
Key Digital Trends for 2017
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similaire à UBIQUITOUS COMPUTING

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxanror264
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignDave Shaw
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 

Similaire à UBIQUITOUS COMPUTING (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 

Plus de Rutvik Pensionwar

Optimized cluster index generation
Optimized cluster index generationOptimized cluster index generation
Optimized cluster index generationRutvik Pensionwar
 
Kayak Prototype using MERN Stack
Kayak Prototype using MERN StackKayak Prototype using MERN Stack
Kayak Prototype using MERN StackRutvik Pensionwar
 
Team pioneers presents halloween night
Team pioneers presents halloween nightTeam pioneers presents halloween night
Team pioneers presents halloween nightRutvik Pensionwar
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programmingRutvik Pensionwar
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksRutvik Pensionwar
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
 

Plus de Rutvik Pensionwar (9)

Optimized cluster index generation
Optimized cluster index generationOptimized cluster index generation
Optimized cluster index generation
 
Kayak Prototype using MERN Stack
Kayak Prototype using MERN StackKayak Prototype using MERN Stack
Kayak Prototype using MERN Stack
 
Team pioneers presents halloween night
Team pioneers presents halloween nightTeam pioneers presents halloween night
Team pioneers presents halloween night
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Introduction to C programming
Introduction to C programmingIntroduction to C programming
Introduction to C programming
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor NetworksAchieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
Achieving Efficient Data Acquisition Techniques in Wireless Sensor Networks
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

UBIQUITOUS COMPUTING

  • 1. The Computing of 21st Century !!! Seminar On
  • 2. ThreeWaves of Computing  Mainframe computing (60’s-80’s)  Desktop computing (80’s-90’s)  Ubiquitous computing(00’s-?) 2
  • 3.  Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser  Ubiquitous computing (ubicomp) is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. 3
  • 4. Classification of Ubiquitous Computing The Major trends in Computing (Source : Image © MarkWeiser/PARC) 4
  • 5.  Mark Weiser is the father of ubiquitous computing. He coined the phrase "ubiquitous computing" around 1988  He was working as ChiefTechnologist at the CS Lab of Xerox Palo Alto Research Center in the late 1980’s and was articulated the current of computing  He wrote some of the earliest papers on the subject, largely defining it and sketching out its major concerns  He developed the initial initiatives of ubiquitous computing in the form of tabs, pads, and boards, built at Xerox PARC, 1988-1994. 5
  • 6. EnablingTechnologies : • Processing • Cheaper, faster, smaller, more energy efficient • Storage • Big, fast and small in size. • Networking • Global, local, ad-hoc, low- power, high bandwidth, low latencies • Sensors • Types,speed,accuracy,price and robustness. • Displays • Projection, flexible materials, low power • Actuators • Computer controlled What makes Ubiquitous Computing Possible 6
  • 7.  There are three general features that are shared across a wide variety of ubicomp applications.  These features are :  the ability to provide transparent interfaces  the ability to automatically adapt the behavior of a program based on knowledge of the context of its use,  the ability to automate the capture of live experiences for later recall. 7
  • 8.  UbicompVision: “pervasive computation without intrusion.”  Remove the physical barrier between user and computational device  Keyboard and mouse are still the most commonly used interfaces !!  Need:  Flexible interfaces  Varied interfaces that can provide similar functionality 8
  • 9.  Context – information about the environment in which the application operates and reacts accordingly.  LOCATION andTIME are simple examples of context !  Context aware application:  is one which can capture the context  assign meaning to it  change behavior accordingly  Need:  Applications with context awareness allow rapid personalization of their services. 9
  • 10.  Capture everyday experiences and make the records available for later use.  Constraints:  Multiple streams of information  Their time synchronization  Their correlation and integration  Need:  Automated tools that support capture, integration and future access of info. 10
  • 11. 11
  • 12. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 12
  • 13.  An environment in which people interact with embedded (and mostly invisible) computers (processors) and in which networked devices are aware of their surroundings and peers and are able to provide services or use services from peers effectively.  It subsumes Distributed Computing and Mobile Computing . 13
  • 14. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 14
  • 15.  Wearable computers, also known as body-borne computers or wearable are miniature electronic devices that are worn by the bearer under, with or on top of clothing.  This class of wearable technology has been developed for general or special purpose information technologies and media development.  Wearable computers are especially useful for applications that require more complex computational support than just hardware coded logics.  Features:  There is a constant interaction between the computer and user.  The ability to multi-task 15
  • 16. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 16
  • 17.  In computing , Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people. Ambient intelligence is a vision on the future of consumer electronics ,telecommunications and computing.  As these devices grow smaller, more connected and more integrated into our environment, the technology disappears into our surroundingsTOWARDS UBIQUITY !!! 17
  • 18. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 18
  • 19.  Mobile computing is HCI by which a computer is expected to be transported during normal usage.  Mobile computing involves mobile communication, mobile hardware, and mobile software.  Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies.  Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications. 19
  • 20. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 20
  • 21.  Distributed computing is a field of computer science that studies distributed systems.  A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.  The components interact with each other in order to achieve a common goal.  Three significant characteristics of distributed systems are:  concurrency of components ,  lack of a global clock ,  independent failure of components. 21
  • 22. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 22
  • 23.  Context-aware computing refers to a general class of mobile systems that can sense their physical environment, and adapt their behavior accordingly.  Context-aware systems are a component of a ubiquitous computing or pervasive computing environment.  Three important aspects of context are: where you are; who you are with; and what resources are nearby. Although location is a primary capability, location-aware does not necessarily capture things of interest that are mobile or changing.  Context-aware in contrast is used more generally to include nearby people, devices, lighting, noise level, network availability, and even the social situation, e.g., whether you are with your family or a friend from school. 23
  • 24. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 24
  • 25.  AWireless Sensor Network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location.  The more modern networks are bi-directional, also enabling control of sensor activity.  The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. 25
  • 26. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive System 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 26
  • 27.  Augmented Reality (AR) is a live, copy, view of a physical, real-world environment whose elements are augmented by computer- generated sensory input such as sound, video, graphics or GPS data.  As a result, the technology functions by enhancing one’s current perception of reality.  With the help of advanced AR technology (e.g. adding computer vision and object recognition) the information about the real world of the user becomes interactive and digitally manipulable. 27
  • 28. 1. Pervasive Computing 2. WearableComputing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. SentientComputing 10. Human Computer Interaction 28
  • 29.  Sentient Computing is a form of ubiquitous computing which uses sensors to perceive its environment and react accordingly. A common use of the sensors is to construct a world model which allows location-aware or context-aware applications to be constructed 29
  • 30. 1. Pervasive Computing 2. Wearable Computing 3. Ambient Intelligence 4. Mobile Computing 5. Distributed Computing 6. Context Aware Pervasive Systems 7. Wireless Sensor Networking 8. Augmented Reality 9. Sentient Computing 10. Human Computer Interaction 30
  • 31.  HCI involves the study, planning, design and uses of the interaction between people (users) and computers. It is often regarded as the intersection of computer science, behavioral sciences, design and several other fields of study.  Because HCI studies a human and a machine in conjunction, it draws from supporting knowledge on the machine as well the human side.  On the machine side, techniques in computer graphics, operating systems, programming languages, and development environments are relevant.  On the human side, communication theory, graphic and industrial design disciplines, linguistics, social sciences, cognitive psychology, social psychology, and human factors such as computer user satisfaction are relevant. 31
  • 32.  Supplies tools to manage information Quickly, Efficiently and Effortlessly.  Dramatically increased automation without much obtrusive or visible use of computer infrastructure  It supports a new class of intelligent and portable appliances or "smart devices" .  Helps people make effective use of computing tools without requiring the knowledge of complex devices  It gives people convenient access to relevant information .  It removes the complexity of new technologies and enables us to be more efficient in our work.  It simplifies life by combining open standards-based applications with everyday activities. 32
  • 33.  Healthcare  Personal Scheduling  Remote computers will monitor our heath statistics  Cars will use the Internet to find an open parking space or the nearest vegetarian restaurant for their owners  Used in Digi-tickers or implanted heart monitors  In development of Smart Clothes and Smart watches .  Flight Schedules:Your phone rings. Its the computer at American Airlines.Your flight departure is delayed by 20 minutes.  Advancement in Fire Fighters tools.  Speech Recognition on Face/Thumbprint Detection.  Instant presentation given with the help of Surface Computing. 33
  • 34.  The trends in Pervasive Computing are increasing the diversity and heterogeneity of networks and their constituent devices .  Pervasive computing is expected to bring an explosion in the number of devices in our local environments.  UbiComp encompasses :  System infrastructure, networking, security,UI,embedded systems, AI, perception, speech recognition.  With more progress in the fields like MANET, Artificial Intelligence, Natural language processing capabilities and energy management, the infrastructure limitation present currently is supposed to be broken, which will result in revolutionary changes through the implementation of Pervasive computing technology. 34