Post on 05-Apr-2018
transcript
7/31/2019 Seminar Report(3481)
1/24
7/31/2019 Seminar Report(3481)
2/24
Vishwakarma Institute of Information Technology 2010-11 Page 2
CERTIFICATE
This is to certify that the following student of T.E. Computer, Vishwakarma Institute
of Information Technology, Pune
RAJA .R. JAINOSWAL
has successfully completed the Seminar and Technical Communication Report on
APPLICATIONS OF PERVASIVE COMPUTING
in the partial fulfillment of the requirements for the completion of T.E. in Computer
Engineering in 2010-11 as prescribed by the University of Pune.
Guide Head of Department
Prof. A.V. Dhumane Prof. R. S. Prasad.
Principal
Dr. A. S. Tavildar.
7/31/2019 Seminar Report(3481)
3/24
Vishwakarma Institute of Information Technology 2010-11 Page 3
Department of Computer Engineering
Seminar Approval Sheet For T.E. Students
ROLL NO STUDENTS
3481 RAJA JAINOSWAL
Sr.
No.
Date Details Date Remarks By
Guide
Signature
of Guide
1 Initial Discussion of
Topic with Guide.
17/2/2011
2 Discussion of Zero
Draft.
Contents
AppropriateFormat
Presentation
18/2/2011
3 Final Approval of
Seminar Report by
Guide.
4/3/2011
4 Any other Comments
7/31/2019 Seminar Report(3481)
4/24
Vishwakarma Institute of Information Technology 2010-11 Page 4
ABSTRACT
Pervasive computing is a post-desktop model of human-computer interaction in
which information processing has been thoroughly integrated into everyday objects
and activities. As opposed to the desktop paradigm, in which a single user consciously
engages a single device for a specialized purpose, someone "using" pervasive
computing engages many computational devices and systems simultaneously, in the
course of ordinary activities, and may not necessarily even be aware that they are
doing so, (orin other words it means availability and invisibility).
Pervasive computing environments involve the interaction, coordination, and
cooperation of numerous, casually accessible, and often invisible computing devices.
These devices will connect via wired and wireless links to one another as well as to the
global networking infrastructure to provide more relevant information and integrated
services.
At their core, all models of pervasive computing share a vision of small,
inexpensive, robust networked processing devices, distributed at all scales
throughout everyday life and generally turned to distinctly quotidian ends.
For example, a domestic pervasive computing environment might
interconnect lighting and environmental controls with personal biometric
monitors woven into clothing so that illumination and heating conditions in
a room might be modulated, continuously and imperceptibly. Another
common scenario posits refrigerators "aware" of their suitably-tagged
contents, able to both plan a variety of menus from the food actually onhand, and warn users of stale or spoiled food.
7/31/2019 Seminar Report(3481)
5/24
Vishwakarma Institute of Information Technology 2010-11 Page 5
TABLE OF CONTENTS
1. INTRODUCTION.....................................................................................6
2. WHAT IS PERVASIVE COMPUTING.................................................7
3. PERSPECTIVE OF PERVASIVE COMPUTING...............................9
3.1 User view.......................................................................................9
3.2 Technological view........................................................................9
4. APPLICATIONS OF PERVASIVE COMPUTING............................10
4.1 Antilocking brake system..............................................................10
4.2Air Bag...........................................................................................11
4.3Comfortableness and Convinience.134.4Advanced Diagnostics System...13
4.5Advanced Parking System..13
4.6 Health care..14
4.7 Domicilary care...................................15
4.8 Environmental mornitoring.............................................................16
4.9Intelligent Transport System............................................................16
4.10Safety and Security........................................................................17
4.11 Technological measures.................................................................17
4.12 Environment...................................................................................18
4.13 Perfect Example of Smart home....................................................19
5. ADVANTAGES OF PERVASIVE COMPUTING.................................20
6. CONCLUSION.............................................................................................22
LIST OF FIGURES
Fig 1 - AIR BAG................................................................................................10
Fig 2 DOMICILARY CARE..........................................................................14
Fig 3 PERFECT EXAMPLE OF SMART HOME .........................................18
7/31/2019 Seminar Report(3481)
6/24
Vishwakarma Institute of Information Technology 2010-11 Page 6
1. INTRODUCTION
Pervasive computing environments involve the interaction, coordination,
and cooperation of numerous, casually accessible, and often invisible computing
devices. These devices will connect via wired and wireless links to one another as
well as to the global networking infrastructure to provide more relevant information
and integrated services. Existing approaches to building distributed applications,
including client/server computing, are ill suited to meet this challenge. They are
targeted at smaller and less dynamic computing environments and lack sufficient
facilities to manage changes in the network configurations. Networked computing
devices will proliferate in the users landscape, being embedded in objects ranging
from home appliances to clothing. Applications will have greater awareness of
context, and thus will be able to provide more intelligent services that reduce the
burden on users to direct and interact with applications. Many applications will
resemble agents that carry out tasks on behalf of users by exploiting the rich sets of
services available within computing environments.
Mobile computing and communication is one of the major parts of the pervasive
computing system. Here data and computing resources are
shared among the various devices. The coordination between these devices is
maintained through communication, which may be wired or wireless. With the advent
of Bluetooth and Ad hoc networking technologies the wireless communication has
overtaken the wired counter part.
7/31/2019 Seminar Report(3481)
7/24
Vishwakarma Institute of Information Technology 2010-11 Page 7
2. WHAT IS PERVASIVE COMPUTING?
Remote communicationprotocol layering, RPC, end-to-end args . . .
Fault toleranceACID, two-phase commit, nested transactions . .
High Availability Distributed systems Mobile computing Pervasive computingreplication, rollback recovery, . . .
Remote information accessdist. file systems, dist. databases, caching, . . .
Distributed securityencryption, mutual authentication.
Mobile networkingMobile IP, ad hoc networks, wireless TCP fixes, . . .
Mobile information accessdisconnected operation, weak consistency, . . .
Adaptive applicationsproxies, transcoding, agility, . . .
Energy-aware systemsgoal-directed adaptation, disk spin-down, . . .
Location sensitivityGPS, WaveLan triangulation, context-awareness, . .
Smart spaces
Invisibility
Localized scalability
Uneven conditioning
Pervasive computing is the trend towards increasingly ubiquitous (another name for
the movement is ubiquitous computing), connected computing devices in the
environment, a trend being brought about by a convergence of advanced electronic -
and particularly, wireless technologies and the Internet. Pervasive computing devices
are not personal computers as we tend to think of them, but very tiny - even invisible -
devices, either mobile or embedded in almost any type of object imaginable, including
cars, tools, appliances, clothing and various consumer goods - all communicating
through increasingly interconnected networks. According to Dan Russell, director of
the User Sciences and Experience Group at IBM's Almaden Research Center, by 2010
computing will have become so naturalized within the environment that people will
7/31/2019 Seminar Report(3481)
8/24
Vishwakarma Institute of Information Technology 2010-11 Page 8
not even realize that they are using computers. Russell and other researchers expect
that in the futuresmartdevices all around us will maintain current information about
their locations, the contexts in which they are being used, and relevant data about the
users.
Imagine a world filled with all sorts of electronic devices traditional desktop
computers, wireless laptops, small PDAS, smart cell phones, tiny wristwatch pagers,
clever little coffee pots. Imagine all these devices talking easily to one another to bring
you the news you need when you need it, regardless of where you are. You have just
imagined the future of Pervasive Computing .
7/31/2019 Seminar Report(3481)
9/24
7/31/2019 Seminar Report(3481)
10/24
Vishwakarma Institute of Information Technology 2010-11 Page 10
4.Applications for pervasive computing
Pervasive computing could have a range of applications, many of which may not
yet have been identified. Applications in healthcare, home care, transport andenvironmental monitoring are among the most frequently cited, as discussed below.
Research is taking place in industry and academia, often collaboratively, and some
government activities are underway
4.1 ANTILOCKING BRAKE SYSTEM
Stopping a car in a hurry on a slippery road can be very challenging. Anti-lock braking
systems (ABS) take a lot of the challenge out of this sometimes nerve-wracking event.
In fact, on slippery surfaces, even professional drivers can't stop as quickly without
ABS as an average driver can with ABS.
There are four main components to an ABS system:
Speed sensors
Pump
Valves
Controller
1.Speed Sensors
The anti-lock braking system needs some way of knowing when a wheel is about to
lock up. The speed sensors, which are located at each wheel, or in some cases in the
differential, provide this information.
2.Valves
There is a valve in the brake line of each brake controlled by the ABS. On some
systems, the valve has three positions:
In position one, the valve is open; pressure from the master cylinder is passed right
through to the brake.
7/31/2019 Seminar Report(3481)
11/24
Vishwakarma Institute of Information Technology 2010-11 Page 11
In position two, the valve blocks the line, isolating that brake from the master cylinder.
This prevents the pressure from rising further should the driver push the brake pedal
harder.
In position three, the valve releases some of the pressure from the brake.
3.Pump
Since the valve is able to release pressure from the brakes, there has to be some way to
put that pressure back. That is what the pump does; when a valve reduces the pressure
in a line, the pump is there to get the pressure back up.
4.Controller
The controller is a computer in the car. It watches the speed sensors and controls the
valves.
4.2 AIR BAG
Fig 1
THREE PARTS:
BAG
SENSOR
INFLATION SYSTEM
7/31/2019 Seminar Report(3481)
12/24
Vishwakarma Institute of Information Technology 2010-11 Page 12
When a car is speeding along at 50 Km per hour it has a tendency ('Inertia') to keep
moving at the same speed and in the same direction unless some force acts on it. The
car accelerates its occupants to its own speed so that they seem to be moving as asingle unit. The inertia of the occupants is, however, independent of the inertia of the
car. If the car were to crash into a tree, the force of the tree would bring the car to an
abrupt halt. The speed of the occupants, however, would remain the same because of
their independent inertia and they would bang into the steering wheel, the dashboard
or the windshield. The force exerted by the steering wheel or the windshield would
then bring the occupants to a stop but may in the process cause injury to vulnerable
body parts such as the head and the face. Car manufacturers use 2 different restraint
systems to help stop the occupants while doing as little damage to him or her as
possible. The oldest and till now the most trusted device for restraining the passengers
has been the seatbelt that spreads this stopping force across sturdier parts of the body
over a longer period of time to minimize damage. The air bag is the second and a more
recently developed system that is used to supplement the slowing down by the seat
belt by deploying a rapidly inflating cushion in the space between the passenger and
the steering wheel or dash board to prevent crash injuries. The Air Bag typically
consists of the following 3 parts:
The bag itself is made of a thin, nylon fabric, which is folded into the steering
wheel or dashboard or, more recently, the seat or door.
The sensor is the device that tells the bag to inflate. Inflation happens when there is
a collision force equal to running into a brick wall at 10 to 15 miles per hour (16 to 24
km per hour). Sensors detect the crash using a mechanical switch that closes when a
mass shifts and an electrical contact is made. Electronic sensors use a tiny
accelerometer that has been etched on a silicon chip.
The air bag's inflation system uses the rapid pulse of hot nitrogen gas from the
chemical reaction of sodium azide (nan3) and potassium nitrate (kno3) to inflate the
bag.
7/31/2019 Seminar Report(3481)
13/24
Vishwakarma Institute of Information Technology 2010-11 Page 13
4.3 COMFORTABLENESS AND CONVINIENCE
1. To make people feel better when they are driving.
2. Navigational system which can provide the real time location information of the car.3. Digital music opens a new door to the car entertainment
4.4 ADVANCED DIAGNOSTICS SYSTEM
Samples the system from different parts of the whole car. When abnormal signals are
detected , the diagnostic computer will notify the driver and stores the status.
4.5 ADVANCED PARKING SYSTEMS(APS)
Advanced Parking Systems obtain information about available parking spaces,
process it and then present it to drivers by means of variable message signs (VMS).
APS is used in two ways: to guide drivers in congested areas to the nearest parking
facility with empty parking spaces and to guide drivers within parking facilities to
empty spaces. Although the former function is more common, guidance systems
within parking lots are becoming more common. This growing number of guidance
systems addresses drivers' need for more information about the position and number of
the spaces that are actually available within a parking structure. These systems reduce
time and fuel otherwise wasted while searching for empty spaces and helps the car
park operate more efficiently.
The need for APS is most prominent in highly dense areas, where the search for
parking facilities congests and interrupts traffic flows. While European cities haveshown the most interest in APS, having implemented it since the late 1970s,
American cities have only begun testing APS in the past decade. See our
Telecommunications Diagram on Parking Management for more information.
Parking Guidance and Information (PGI) systems, or Car Park Guidance Systems
systems are based primarily on the use of message signs to give drivers information
regarding parking availability. The systems combine traffic monitoring,
7/31/2019 Seminar Report(3481)
14/24
Vishwakarma Institute of Information Technology 2010-11 Page 14
communication, processing and variable-message sign technologies to provide the
service. PGI systems are designed to aid the in the search for vacant parking spaces by
directing drivers to car parks where occupancy levels are low.
The availability of parking spaces in each facility is obtained from sensors that
count the number of cars entering and exiting or, in other cases, by comparing the
tickets issued at machines or cash registers to the capacity of the facility. This
information is sent to a central or main computer that processes it, determining the
locations of available parking. Availability is generally expressed in terms of "full" or
"empty," but in some cases the actual number of spaces is given.
A problem with showing actual numbers is that when the number is small, drivers
tend not to enter because they think that all of the spaces will be taken by cars already
in the facility. This would not actually happen because the availability takes into
account cars that have already entered the facility. The systems include VMS that
show parking availability and nearest parking facilities. In some cases static signs
guide drivers to the facilities. Other means of providing availability information are
via roadside radio terminals, where small static VMS show the frequency at which it is
being broadcast; by phone, where automated answering machines can give information
on congestion and parking availability; via the Internet, where one of the main services
is to provide information and parking reservations; and via in-vehicle navigation
systems.
4.6 HEALTHCARE:
Pervasive computing offers opportunities for future healthcare provision in the UK,
both for treating and managing disease, and for patient administration. For instance,
remote sensors and monitoring technology might allow the continuous capture and
analysis of patients physiological data. Medical staff could be
immediately alerted to any detected irregularities. Data collection on this scale could
also provide for more accurate pattern/trend analysis of long-term conditions such as
heart disease, diabetes and epilepsy. Wearable sensors may offer greater patient
mobility and freedom within hospitals and save both time and money by
7/31/2019 Seminar Report(3481)
15/24
Vishwakarma Institute of Information Technology 2010-11 Page 15
reducing the need for repeated and intrusive testing.Hospital administration could also
be transformed. Patients might be tagged with wristbands containing digital
photographs and medical notes. These wristbands would allow patients to be traced
more effectively through hospital administration systems, reducing the
risk of misidentification and treatment errors.
4.7 DOMICILARY CARE:
Fig 2
Over the next 20 years there will be a rise in the proportion of people over 65 years
old in most developed countries. In the UK the over-65s will increase from 20%
to 40% of the total population by 2025. These people may increasingly require care
from a diminishing working population. PCS may help address the consequences of
this imbalance. Improved methods for monitoring health and wellbeing could allow
people to live longer in their own homes. Sensors embedded in items of clothing, for
example, might allow constant monitoring of heart rates, body-mass index, blood
pressure and other physiological variables. Further sensors embedded throughout the
7/31/2019 Seminar Report(3481)
16/24
7/31/2019 Seminar Report(3481)
17/24
Vishwakarma Institute of Information Technology 2010-11 Page 17
effective targeted marketing. However, because data mining activities can detect
unknown relationships in data, some argue that there is the potential to violate
existing legislation. There is debate over how privacy can be protected while still
realising the benefits of pervasive computing, and whether new legislation will be
required.
4.10 SAFETY AND SECURITY:
Pervasive computing also gives rise to debate over safety. Integrated transport
systems could involve road vehicles having actuating devices that intervene in the
driving process, possibly responding to hazards more quickly than humans. For
example the new Mercedes S-Class features an active braking system that can detect
rapidly slowing vehicles in front, activating the brakes without driver intervention.
While this may help avoid accidents, there are also potential risks, for example if the
security of the vehicle's controlling software is breached. Similar concerns exist over
prospective PCS applications in domiciliary care. Breaches of security could expose
vulnerable individuals to malicious acts within their own homes for example the
withholding or over-prescribing of medications.
4.11 TECHNOLOGICAL MEASURES:
It is argued that privacy, safety and security can be better protected if appropriate
procedures and protocols are integrated into PCS at the design level rather than
implemented retrospectively. Three measures are frequently cited as vital in
establishing robust security measures:
the volume of transmitted data should be kept to a minimum;
data that require transmission should be encrypted and sent anonymously (without
reference to the owner);
security should be treated as an ongoing and integral element of PCS.
7/31/2019 Seminar Report(3481)
18/24
Vishwakarma Institute of Information Technology 2010-11 Page 18
These principles are accepted by many centres of PCS research and development.
However, consumer groups such as the NCC say that developers need to give more
consideration to privacy issues. The NNC argues that in the case of RFID,
privacy issues were considered only late in development and have still not been fully
addressed.
4.12 ENVIRONMENT:
While the consumption of natural resources might be reduced through the
miniaturisation of PCS devices, any gains are likely to be offset by technological
proliferation. This may be compounded by problems of treating microelectronic waste
embedded in other objects and has implications for recycling because of the possibility
of such waste contaminating recycling channels. While some of these issues are likely
to be covered by the transposition into UK law of the EC Directive on Waste
Electrical and Electronic Equipment, further action (including further regulation) may
be required
4.13 A PERFECT EXAMPLE OF A SMART HOME
7/31/2019 Seminar Report(3481)
19/24
Vishwakarma Institute of Information Technology 2010-11 Page 19
(Fig 3)
The Bill Gates home is a perfect example of a home where ground breaking
technologies have been applied to make the home more livable. It could serve as an
epitome of the application of pervasive
computing. A hundred microcomputers and the software that controls them have been
embedded inthe home and it makes you experience the home without paying any
attention to the technology at its
heart.
It provides an intelligent environment around with features like :
1. It allows you to listen to your choice of music when you enter the room.
2. The lights goes on when you enter the room , its brightness adjusted to suit the
weather outside.
3.High resolution displays present electronic versions of your favourite art on the walls
of the room.
4. The room by itself adjusts to the temperature according to the time of the day.
5. The home is also equipped with energy saving instruments.
7/31/2019 Seminar Report(3481)
20/24
Vishwakarma Institute of Information Technology 2010-11 Page 20
ADVANTAGES
1) INVISIBLE:
"Smart" environments will be embedded with computing technologies that will be
mostly out-of-sight. Architecture will gain many more capabilities - with less visual
clutter.
2) SOCIALIZATION:
Interactions with architecture will be more social in nature. "Smart" buildings will
illicit a more social response from occupants as computers user interfaces embed
themselves within architecture. (1)
3) DECISION-MAKING:
"Smart" environments will help occupants to make better choices as they go about
their everyday lives. At key moments within architectural experiences, a good
architectural design will make "smart" environments helpful. Such architecture will be
more proactive than passive.
4) EMERGENT BEHAVIOR:
Buildings are now becoming more and more kinetic in form and function. Their
movements and constructed designs come together dynamically to yield behaviors that
make them more adaptive. Buildings will learn how to learn - in order to run
efficiently and aesthetically.
5) INFORMATION PROCESSING:
Since architecture will be gaining a type of "nervous system", information processing
will be gaining a whole new meaning. Architecture will go from crunching data to
making sense of data; therefore, eliminating our need to constantly input adjustments.
6) ENHANCING EXPERIENCE:
As computers ubiquitously embed themselves in our environments, sensors and
actuators will create "smart" environments where architectural space will be goal-
7/31/2019 Seminar Report(3481)
21/24
Vishwakarma Institute of Information Technology 2010-11 Page 21
oriented. Therefore, more occupant needs will be better met.
7) CONVERGENCE:
Much of our environment will be supplemented with interconnected digital
technologies. Such interconnectivity will allow for a new type of "sharing" that will
serve to eliminate many mundane tasks. Also, fewer errors will occur as systems pull
data from shared digital locations (instead of having numerous copies to keep up-to-
date).
7/31/2019 Seminar Report(3481)
22/24
Vishwakarma Institute of Information Technology 2010-11 Page 22
CONCLUSION:
There is a wide range of potential benefits for government, service providers and
consumers as computing technologies become more pervasive.
There is debate over how to address concerns over privacy, security, safety and
sustainability while still realising the benefits of pervasive computing.
Such concerns may need to be addressed by means of voluntary guidelines,
legislative measures, physical design, or a combination of these.
Many say there is a need for greater public debate on the implications of pervasive
computing.
7/31/2019 Seminar Report(3481)
23/24
Vishwakarma Institute of Information Technology 2010-11 Page 23
ACKNOWLEDGEMENTS
Apart from my efforts, the success of the seminar presentation depends largely on
the encouragement and guidelines of many others. I take this opportunity to express
my gratitude to the people who have been instrumental in the successful completion of
this seminar presentation.
I would like to show my appreciation to my seminar guide Prof. A.V.DHUMANE,
our Head of Department Prof. Mr. R. S. Prasad and our Principal Dr. A. S. Tavildar
whose encouragement, guidance and support from the initial to the final level enabled
me to develop an understanding of the topic. I cant say thank you enough for their
tremendous support and help. I am very grateful for all their support.
7/31/2019 Seminar Report(3481)
24/24
Vi h k I i f I f i T h l 2010 11 P 24
REFERENCES
http://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdf
Wikipedia -Mark Weiser, Ubiquitous Computing, HCI, AI
Video-http://www.youtube.com/watch?v=ngKSirE7zJA
http://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdfhttp://www.youtube.com/watch?v=ngKSirE7zJAhttp://www.youtube.com/watch?v=ngKSirE7zJAhttp://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdf