0% found this document useful (0 votes)
49 views11 pages

Sri Sai Aditya Inst of Sci & Tech: A Paper On Ubiquitous Computing

seminar7

Uploaded by

gvsr4187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views11 pages

Sri Sai Aditya Inst of Sci & Tech: A Paper On Ubiquitous Computing

seminar7

Uploaded by

gvsr4187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 11

A paper on

UBIQUITOUS COMPUTING
(PERVASIVE COMPUTING)

INFORMATION TECHNOLOGY

SRI SAI ADITYA INST OF SCI & TECH


SURAMPALEM

BY
K.BHEEMA RAJU,
III B.TECH,

Email:[email protected]
Ph.no:903020925

P.Devi Sruthi
8125525354

UBIQUITOUS COMPUTING
(PERVASIVE COMPUTING)

computers that include


equally convenient
Abstract.

displays, a network that

One is happy when ones

ties them all together, and

desires are fulfilled. The

software systems

highest ideal of Ubicomp

implementing ubiquitous

is to make a computer so

applications. Current

imbedded, so fitting, so

trends suggest that the

natural, that we use it

first requirement will

without even thinking

easily be met.

about it. Pervasive


computing is referred as
Ubiquitous computing
through out the paper.
One of the goals

Our preliminary

of ubiquitous computing

approach: Activate the

is to enable devices to

world. Provide hundreds

sense changes in their

of wireless computing

environment and to

devices per person per

automatically adapt and

office, of all scales. This

act based on these

has required network in

changes based on user

operating systems, user

needs and preferences.

interfaces, networks,

The technology required

wireless, displays, and

for ubiquitous computing

many other areas. We

comes in three parts:

call our work ubiquitous

cheap, low- power

computing. This is

different from PDAs,

1. How Ubiquitous

dynabooks, or

Networking will

information at your

work

fingertips. It is invisible;

Ubicomp integrates

everywhere computing

computation into the

that does not live on a

environment, rather than

personal device of any

having computers, which

sort, but is in the

are distinct objects. Another

woodwork everywhere.

term for this ubicomp is

Single-room networks

PERVASIVE COMPUTING.

based on infrared or

This Ubicomp is roughly

newer electromagnetic

the opposite of virtual

technologies have

reality. Where virtual reality

enough channel capacity

puts people inside a

for ubiquitous computers,

computer-generated world,

but they can only work

i.e., it forces the computer

indoors.

to live out here in the world

Cryptographic techniques

with people. Ubiquitous

already exist to secure

computing encompasses a

messages from one

wide range of research

ubiquitous computer to

topics, including distributed

another and to safeguard

computing, mobile

private information stored

computing, sensor

in networked systems.

networks, human-computer

We suggest using cell

interaction, and artificial

phone device available in

intelligence.

the market for Ubicomp

By using a small radio

also i.e., the handheld

transmitters and a building

device will be used for

full of special sensors, your

both Ubicomp and also

desktop can be anywhere

as a cell phone.

you are. At the press of a


button, the computer
closest to you in any room
becomes your computer for

long as you need it.

embedded transmitter,

2. In the Zone

which allows it to

In order for a computer

communicate with the

program to track its user a

central controller using a bi-

system should be

directional 433-MHz radio

developed that could locate

link.

both people and devices

Bats are about the size of a

i.e., ultrasonic location

paper. These small devices

system. This location

are powered by a single

tracking system has three

3.6-volt lithium thionyl

parts:

chloride battery, which has

Bats

:-

The devices also contain

Small ultrasonic
transmitters, worn by users.
Receivers

a lifetime of six months.

:-

two buttons, two lightemitting diodes and a


piezoelectric speaker,

Ultrasonic signal detectors

allowing them to be used

embedded in ceiling.

as ubiquitous input and

Central Controller

:-

output devices, and a

Co-

voltage monitor to check

ordinates the bats and

the battery status.

receiver chains.

A bat will transmit an


ultrasonic signal, which will
be detected by receivers
located in the ceiling
approximately 4 feet apart
in a square grid. If a bat

Fig. 1. The Bat


Users within the system will
wear a bat, a small device
that transmits a 48-bit code
to the receivers in the
ceiling. Bats also have an

needs to be located, the


central controller sends the
bats ID over a radio link to
the bat. The bat will detect
its ID and send out an
ultrasonic pulse. The
central controller measures

the time it looks for that

3. Ubi-Finger

pulse to reach the receiver.

Here, in contrast, Ubi-

Since the speed of sound

Finger is the gesture-i/p

at which the ultrasonic

device, which is simple,

pulse reached three other

compact and optimized for

sensors.

mobile use. Using our

By finding the position of

systems, a user can detect

two or more bats, the

a target device by pointing

system can determine the

with his/her index finger,

orientation of a bat. The

and then control it flexibly

central controller can also

by performing natural

determine which way a

gestures of fingers (Fig. 2).

person is facing by
analyzing the pattern of
receivers that detected the
ultrasonic signal and the
strength of the signal.
The central controller
crates a zone around every
person and object within
the location system. The
computer uses a spatial
monitor to detect if a users
zone overlaps with the
zone of a device. Computer
desktops can be created
that actually follow their
owners anywhere with in
the system just by
approaching any computer
display in the building, the
bat can enable the virtual
network computing desktop
to appear on that display.

By pointing a light and

push a switch.The light

making a gesture like

will turn on!

Fig. 2. An example to
control Home Appliances
As shown in Fig. 3, UbiFinger consists of three
sensors to detect gestures
of fingers, an infrared
transmitter to select a
target device in real world
and a microcomputer to
control these sensors and
communicate with a host
computer. Each sensor
generates the information
of motions as follows: (1) a
bending degree of the
index finger, (2) tilt angles
of the wrist, (3) operations
of touch sensors by a
thumb. We use (1) and (2)
for recognition of gestures,
and use (3) for the trigger
mechanism to start and
stop gesture recognition.

Fig. 3
4. Mouse Field
Although various
interaction technologies for
handling information in the
ubiquitous computing
environment have been
proposed, some
technologies are too simple
for performing rich
interaction, and others
require special expensive
equipments to be installed
everywhere, and cannot
soon be available in our
everyday environment.
Here there is a new simple
and versatile i/p device

called the Mouse Field,


which enables users to
control various information
applications easily without
huge amount of cost.
A mouse field consists of
an ID recognizer and
motion sensors that can
detect an object and its
movement after the object
is placed on it. The system
can interpret the users
action as a command to
control the flow of
information.

"Placing" (detecting an

"Moving" (detecting its

object)

movement)

Fig. 4. Basic concept of

optical mouses are

Mouse Field

connected to a PC

Mouse Field is a device

through a USB cable, and

which combines an ID

they can detect the ID

reader and motion

and the motion of the

sensing devices into one

object put on the device.

package. Fig. 4 shows an

When a user puts an

implementation of Mouse

object with an RFID on

Field, which consist of

the Mouse Field, it first

two motion sensors and

detects what was kept on

an RFID reader hidden

the RFID reader. When

under the surface. The

the use moves or rotates

RFID reader and the two

the object, motion sensor

detects the direction and

rotation of the object.

Front view
Back View
Fig. 5 Implementation
of a Mouse Field
Device.
Fig. 5 shows how a user
can enjoy music using a
Mouse Field and CD
jackets which represent
the music in the CD. All
the music in the CD is
saved in a music server,
and an RFID tag is
attached to each jacket.

These

are

used

to

control

various

parameters without special parameters.


5. Information Hoppers and Smart
Posters

pressing the posters button. Posters


can be created with several buttons on
it.
Ultrasonic location systems will require

Once these zones are setup, computers

us

on

some

Traditionally, we have used our files,

interesting capabilities. The system will

and we may back up these files on a

help to store and retrieve data in an

network server. This ubiquitous network

Information hopper. This is a timeline of

will enable all computers in a building to

information that keeps track of when

transfer ownership and store all our files

data is created. The hopper knows who

in a central timeline.

the

network

will

have

created it, where they were and who


they were with.

to

think

6. Moving

outside

towards

of

the

box.

future

of

Ubiquitous Computing

Another application that will come out of

We suggest a new method to carry all of

this ultrasonic location system is the

your personal media with you in a

smart poster.

convenient pocket form factor, and have

convention

computer

interface

wireless access to it when standing in

requires us to click on a button on your

front of a PC, kiosk, or large display,

computer screen. In this new system, a

anywhere

button can be placed anywhere in your

significantly

workplace, not just on the computer

computing experience.

display. The idea behind smart posters

Intel researchers are developing a new

is that a button can be a piece of paper

class of mobile device that leverages

that is printed out and struck on a wall.

advances in processing, storage, and

in

the

world

improve

that

your

might
mobile

Smart posters will be used to

communications technologies to provide

control any device that is plugged into

ubiquitous access to personal information

the network. The poster will know where

and applications through the existing fixed

to send a file and a users preferences.

infrastructure.

Smart posters could also be used in

personal server is a small, lightweight

advertising new services. To press a

computer with high-density data storage

button on a smart poster, a user will

capability. It requires no display, so it can

simply place his or her bat in the smart

be smaller than a typical PDA. A wireless

poster button and click the bat. The

interface enables the user to access

system automatically knows who is

content stored in the device through

The

device,

called

whatever displays are available in the

Panasonic Center: Realizing a

local environment. For example, in the

Ubiquitous network society.

digital home, the personal server could


wirelessly stream audio and video stored

Ubiquitous Computing
Management Architecture.

on the device to a PC or digital home TV.

Introduction to UC.

The technology to enable these scenarios

UC in Education.

and more is now being explored.

Designing Ubiquitous Computer

7. Conclusion

Resources.

We are moving toward a future in which


computing

will

be ubiquitous,

woven

seamlessly into the fabric of everyday life.


Researchers are engaged in several
projects to explore technologies and
usage models for everyday uses of
computing. In their research, they are
addressing fundamental issues that must
be resolved in order to enable anytime,
anywhere computing.
To make ubiquitous computing a reality
will

require

the

collaboration

of

researchers in a broadband of disciplines,


within computer science and beyond.

Research works on UC
Ichiro Satohs Research work on
UC.
Bill Schilits work on UC.
Matthias Lampes work on UC.
Pekka Ala Siurus work on UC.
Louise Barkhuus work on UC.
George Roussos work on
ubiquitous commerce.
Dr. Albrecht Schmidts Research
work on Ubiquitous Computing.

Resources
Application Coordination
Infrastructure for Ubiquitous
Computing Rooms.
Ubiquitous Bio-Information
Computing (UBIC 2)
What is Ubiquitous Computing?
Overview and resources.
How Ubiquitous Networking will
work? Kevin Bensor.

UC Research
Research in UC and
Applications at University of
California, Irvine.
Fuego: Future Mobile and
Ubiquitous Computing
Research.
The Ubiquitous Computing
Research Group at the
University of Victoria.

Research in Ubiquitous
Computing.
GGF Ubiquitous Computing
Research Group.

Distributed Software Engineering


Group Research into Ubiquitous
Computing.
Mobile Ubiquitous Security
Environment (MUSE).

You might also like