Seminar Report(3481)

Embed Size (px)

Citation preview

  • 7/31/2019 Seminar Report(3481)

    1/24

  • 7/31/2019 Seminar Report(3481)

    2/24

    Vishwakarma Institute of Information Technology 2010-11 Page 2

    CERTIFICATE

    This is to certify that the following student of T.E. Computer, Vishwakarma Institute

    of Information Technology, Pune

    RAJA .R. JAINOSWAL

    has successfully completed the Seminar and Technical Communication Report on

    APPLICATIONS OF PERVASIVE COMPUTING

    in the partial fulfillment of the requirements for the completion of T.E. in Computer

    Engineering in 2010-11 as prescribed by the University of Pune.

    Guide Head of Department

    Prof. A.V. Dhumane Prof. R. S. Prasad.

    Principal

    Dr. A. S. Tavildar.

  • 7/31/2019 Seminar Report(3481)

    3/24

    Vishwakarma Institute of Information Technology 2010-11 Page 3

    Department of Computer Engineering

    Seminar Approval Sheet For T.E. Students

    ROLL NO STUDENTS

    3481 RAJA JAINOSWAL

    Sr.

    No.

    Date Details Date Remarks By

    Guide

    Signature

    of Guide

    1 Initial Discussion of

    Topic with Guide.

    17/2/2011

    2 Discussion of Zero

    Draft.

    Contents

    AppropriateFormat

    Presentation

    18/2/2011

    3 Final Approval of

    Seminar Report by

    Guide.

    4/3/2011

    4 Any other Comments

  • 7/31/2019 Seminar Report(3481)

    4/24

    Vishwakarma Institute of Information Technology 2010-11 Page 4

    ABSTRACT

    Pervasive computing is a post-desktop model of human-computer interaction in

    which information processing has been thoroughly integrated into everyday objects

    and activities. As opposed to the desktop paradigm, in which a single user consciously

    engages a single device for a specialized purpose, someone "using" pervasive

    computing engages many computational devices and systems simultaneously, in the

    course of ordinary activities, and may not necessarily even be aware that they are

    doing so, (orin other words it means availability and invisibility).

    Pervasive computing environments involve the interaction, coordination, and

    cooperation of numerous, casually accessible, and often invisible computing devices.

    These devices will connect via wired and wireless links to one another as well as to the

    global networking infrastructure to provide more relevant information and integrated

    services.

    At their core, all models of pervasive computing share a vision of small,

    inexpensive, robust networked processing devices, distributed at all scales

    throughout everyday life and generally turned to distinctly quotidian ends.

    For example, a domestic pervasive computing environment might

    interconnect lighting and environmental controls with personal biometric

    monitors woven into clothing so that illumination and heating conditions in

    a room might be modulated, continuously and imperceptibly. Another

    common scenario posits refrigerators "aware" of their suitably-tagged

    contents, able to both plan a variety of menus from the food actually onhand, and warn users of stale or spoiled food.

  • 7/31/2019 Seminar Report(3481)

    5/24

    Vishwakarma Institute of Information Technology 2010-11 Page 5

    TABLE OF CONTENTS

    1. INTRODUCTION.....................................................................................6

    2. WHAT IS PERVASIVE COMPUTING.................................................7

    3. PERSPECTIVE OF PERVASIVE COMPUTING...............................9

    3.1 User view.......................................................................................9

    3.2 Technological view........................................................................9

    4. APPLICATIONS OF PERVASIVE COMPUTING............................10

    4.1 Antilocking brake system..............................................................10

    4.2Air Bag...........................................................................................11

    4.3Comfortableness and Convinience.134.4Advanced Diagnostics System...13

    4.5Advanced Parking System..13

    4.6 Health care..14

    4.7 Domicilary care...................................15

    4.8 Environmental mornitoring.............................................................16

    4.9Intelligent Transport System............................................................16

    4.10Safety and Security........................................................................17

    4.11 Technological measures.................................................................17

    4.12 Environment...................................................................................18

    4.13 Perfect Example of Smart home....................................................19

    5. ADVANTAGES OF PERVASIVE COMPUTING.................................20

    6. CONCLUSION.............................................................................................22

    LIST OF FIGURES

    Fig 1 - AIR BAG................................................................................................10

    Fig 2 DOMICILARY CARE..........................................................................14

    Fig 3 PERFECT EXAMPLE OF SMART HOME .........................................18

  • 7/31/2019 Seminar Report(3481)

    6/24

    Vishwakarma Institute of Information Technology 2010-11 Page 6

    1. INTRODUCTION

    Pervasive computing environments involve the interaction, coordination,

    and cooperation of numerous, casually accessible, and often invisible computing

    devices. These devices will connect via wired and wireless links to one another as

    well as to the global networking infrastructure to provide more relevant information

    and integrated services. Existing approaches to building distributed applications,

    including client/server computing, are ill suited to meet this challenge. They are

    targeted at smaller and less dynamic computing environments and lack sufficient

    facilities to manage changes in the network configurations. Networked computing

    devices will proliferate in the users landscape, being embedded in objects ranging

    from home appliances to clothing. Applications will have greater awareness of

    context, and thus will be able to provide more intelligent services that reduce the

    burden on users to direct and interact with applications. Many applications will

    resemble agents that carry out tasks on behalf of users by exploiting the rich sets of

    services available within computing environments.

    Mobile computing and communication is one of the major parts of the pervasive

    computing system. Here data and computing resources are

    shared among the various devices. The coordination between these devices is

    maintained through communication, which may be wired or wireless. With the advent

    of Bluetooth and Ad hoc networking technologies the wireless communication has

    overtaken the wired counter part.

  • 7/31/2019 Seminar Report(3481)

    7/24

    Vishwakarma Institute of Information Technology 2010-11 Page 7

    2. WHAT IS PERVASIVE COMPUTING?

    Remote communicationprotocol layering, RPC, end-to-end args . . .

    Fault toleranceACID, two-phase commit, nested transactions . .

    High Availability Distributed systems Mobile computing Pervasive computingreplication, rollback recovery, . . .

    Remote information accessdist. file systems, dist. databases, caching, . . .

    Distributed securityencryption, mutual authentication.

    Mobile networkingMobile IP, ad hoc networks, wireless TCP fixes, . . .

    Mobile information accessdisconnected operation, weak consistency, . . .

    Adaptive applicationsproxies, transcoding, agility, . . .

    Energy-aware systemsgoal-directed adaptation, disk spin-down, . . .

    Location sensitivityGPS, WaveLan triangulation, context-awareness, . .

    Smart spaces

    Invisibility

    Localized scalability

    Uneven conditioning

    Pervasive computing is the trend towards increasingly ubiquitous (another name for

    the movement is ubiquitous computing), connected computing devices in the

    environment, a trend being brought about by a convergence of advanced electronic -

    and particularly, wireless technologies and the Internet. Pervasive computing devices

    are not personal computers as we tend to think of them, but very tiny - even invisible -

    devices, either mobile or embedded in almost any type of object imaginable, including

    cars, tools, appliances, clothing and various consumer goods - all communicating

    through increasingly interconnected networks. According to Dan Russell, director of

    the User Sciences and Experience Group at IBM's Almaden Research Center, by 2010

    computing will have become so naturalized within the environment that people will

  • 7/31/2019 Seminar Report(3481)

    8/24

    Vishwakarma Institute of Information Technology 2010-11 Page 8

    not even realize that they are using computers. Russell and other researchers expect

    that in the futuresmartdevices all around us will maintain current information about

    their locations, the contexts in which they are being used, and relevant data about the

    users.

    Imagine a world filled with all sorts of electronic devices traditional desktop

    computers, wireless laptops, small PDAS, smart cell phones, tiny wristwatch pagers,

    clever little coffee pots. Imagine all these devices talking easily to one another to bring

    you the news you need when you need it, regardless of where you are. You have just

    imagined the future of Pervasive Computing .

  • 7/31/2019 Seminar Report(3481)

    9/24

  • 7/31/2019 Seminar Report(3481)

    10/24

    Vishwakarma Institute of Information Technology 2010-11 Page 10

    4.Applications for pervasive computing

    Pervasive computing could have a range of applications, many of which may not

    yet have been identified. Applications in healthcare, home care, transport andenvironmental monitoring are among the most frequently cited, as discussed below.

    Research is taking place in industry and academia, often collaboratively, and some

    government activities are underway

    4.1 ANTILOCKING BRAKE SYSTEM

    Stopping a car in a hurry on a slippery road can be very challenging. Anti-lock braking

    systems (ABS) take a lot of the challenge out of this sometimes nerve-wracking event.

    In fact, on slippery surfaces, even professional drivers can't stop as quickly without

    ABS as an average driver can with ABS.

    There are four main components to an ABS system:

    Speed sensors

    Pump

    Valves

    Controller

    1.Speed Sensors

    The anti-lock braking system needs some way of knowing when a wheel is about to

    lock up. The speed sensors, which are located at each wheel, or in some cases in the

    differential, provide this information.

    2.Valves

    There is a valve in the brake line of each brake controlled by the ABS. On some

    systems, the valve has three positions:

    In position one, the valve is open; pressure from the master cylinder is passed right

    through to the brake.

  • 7/31/2019 Seminar Report(3481)

    11/24

    Vishwakarma Institute of Information Technology 2010-11 Page 11

    In position two, the valve blocks the line, isolating that brake from the master cylinder.

    This prevents the pressure from rising further should the driver push the brake pedal

    harder.

    In position three, the valve releases some of the pressure from the brake.

    3.Pump

    Since the valve is able to release pressure from the brakes, there has to be some way to

    put that pressure back. That is what the pump does; when a valve reduces the pressure

    in a line, the pump is there to get the pressure back up.

    4.Controller

    The controller is a computer in the car. It watches the speed sensors and controls the

    valves.

    4.2 AIR BAG

    Fig 1

    THREE PARTS:

    BAG

    SENSOR

    INFLATION SYSTEM

  • 7/31/2019 Seminar Report(3481)

    12/24

    Vishwakarma Institute of Information Technology 2010-11 Page 12

    When a car is speeding along at 50 Km per hour it has a tendency ('Inertia') to keep

    moving at the same speed and in the same direction unless some force acts on it. The

    car accelerates its occupants to its own speed so that they seem to be moving as asingle unit. The inertia of the occupants is, however, independent of the inertia of the

    car. If the car were to crash into a tree, the force of the tree would bring the car to an

    abrupt halt. The speed of the occupants, however, would remain the same because of

    their independent inertia and they would bang into the steering wheel, the dashboard

    or the windshield. The force exerted by the steering wheel or the windshield would

    then bring the occupants to a stop but may in the process cause injury to vulnerable

    body parts such as the head and the face. Car manufacturers use 2 different restraint

    systems to help stop the occupants while doing as little damage to him or her as

    possible. The oldest and till now the most trusted device for restraining the passengers

    has been the seatbelt that spreads this stopping force across sturdier parts of the body

    over a longer period of time to minimize damage. The air bag is the second and a more

    recently developed system that is used to supplement the slowing down by the seat

    belt by deploying a rapidly inflating cushion in the space between the passenger and

    the steering wheel or dash board to prevent crash injuries. The Air Bag typically

    consists of the following 3 parts:

    The bag itself is made of a thin, nylon fabric, which is folded into the steering

    wheel or dashboard or, more recently, the seat or door.

    The sensor is the device that tells the bag to inflate. Inflation happens when there is

    a collision force equal to running into a brick wall at 10 to 15 miles per hour (16 to 24

    km per hour). Sensors detect the crash using a mechanical switch that closes when a

    mass shifts and an electrical contact is made. Electronic sensors use a tiny

    accelerometer that has been etched on a silicon chip.

    The air bag's inflation system uses the rapid pulse of hot nitrogen gas from the

    chemical reaction of sodium azide (nan3) and potassium nitrate (kno3) to inflate the

    bag.

  • 7/31/2019 Seminar Report(3481)

    13/24

    Vishwakarma Institute of Information Technology 2010-11 Page 13

    4.3 COMFORTABLENESS AND CONVINIENCE

    1. To make people feel better when they are driving.

    2. Navigational system which can provide the real time location information of the car.3. Digital music opens a new door to the car entertainment

    4.4 ADVANCED DIAGNOSTICS SYSTEM

    Samples the system from different parts of the whole car. When abnormal signals are

    detected , the diagnostic computer will notify the driver and stores the status.

    4.5 ADVANCED PARKING SYSTEMS(APS)

    Advanced Parking Systems obtain information about available parking spaces,

    process it and then present it to drivers by means of variable message signs (VMS).

    APS is used in two ways: to guide drivers in congested areas to the nearest parking

    facility with empty parking spaces and to guide drivers within parking facilities to

    empty spaces. Although the former function is more common, guidance systems

    within parking lots are becoming more common. This growing number of guidance

    systems addresses drivers' need for more information about the position and number of

    the spaces that are actually available within a parking structure. These systems reduce

    time and fuel otherwise wasted while searching for empty spaces and helps the car

    park operate more efficiently.

    The need for APS is most prominent in highly dense areas, where the search for

    parking facilities congests and interrupts traffic flows. While European cities haveshown the most interest in APS, having implemented it since the late 1970s,

    American cities have only begun testing APS in the past decade. See our

    Telecommunications Diagram on Parking Management for more information.

    Parking Guidance and Information (PGI) systems, or Car Park Guidance Systems

    systems are based primarily on the use of message signs to give drivers information

    regarding parking availability. The systems combine traffic monitoring,

  • 7/31/2019 Seminar Report(3481)

    14/24

    Vishwakarma Institute of Information Technology 2010-11 Page 14

    communication, processing and variable-message sign technologies to provide the

    service. PGI systems are designed to aid the in the search for vacant parking spaces by

    directing drivers to car parks where occupancy levels are low.

    The availability of parking spaces in each facility is obtained from sensors that

    count the number of cars entering and exiting or, in other cases, by comparing the

    tickets issued at machines or cash registers to the capacity of the facility. This

    information is sent to a central or main computer that processes it, determining the

    locations of available parking. Availability is generally expressed in terms of "full" or

    "empty," but in some cases the actual number of spaces is given.

    A problem with showing actual numbers is that when the number is small, drivers

    tend not to enter because they think that all of the spaces will be taken by cars already

    in the facility. This would not actually happen because the availability takes into

    account cars that have already entered the facility. The systems include VMS that

    show parking availability and nearest parking facilities. In some cases static signs

    guide drivers to the facilities. Other means of providing availability information are

    via roadside radio terminals, where small static VMS show the frequency at which it is

    being broadcast; by phone, where automated answering machines can give information

    on congestion and parking availability; via the Internet, where one of the main services

    is to provide information and parking reservations; and via in-vehicle navigation

    systems.

    4.6 HEALTHCARE:

    Pervasive computing offers opportunities for future healthcare provision in the UK,

    both for treating and managing disease, and for patient administration. For instance,

    remote sensors and monitoring technology might allow the continuous capture and

    analysis of patients physiological data. Medical staff could be

    immediately alerted to any detected irregularities. Data collection on this scale could

    also provide for more accurate pattern/trend analysis of long-term conditions such as

    heart disease, diabetes and epilepsy. Wearable sensors may offer greater patient

    mobility and freedom within hospitals and save both time and money by

  • 7/31/2019 Seminar Report(3481)

    15/24

    Vishwakarma Institute of Information Technology 2010-11 Page 15

    reducing the need for repeated and intrusive testing.Hospital administration could also

    be transformed. Patients might be tagged with wristbands containing digital

    photographs and medical notes. These wristbands would allow patients to be traced

    more effectively through hospital administration systems, reducing the

    risk of misidentification and treatment errors.

    4.7 DOMICILARY CARE:

    Fig 2

    Over the next 20 years there will be a rise in the proportion of people over 65 years

    old in most developed countries. In the UK the over-65s will increase from 20%

    to 40% of the total population by 2025. These people may increasingly require care

    from a diminishing working population. PCS may help address the consequences of

    this imbalance. Improved methods for monitoring health and wellbeing could allow

    people to live longer in their own homes. Sensors embedded in items of clothing, for

    example, might allow constant monitoring of heart rates, body-mass index, blood

    pressure and other physiological variables. Further sensors embedded throughout the

  • 7/31/2019 Seminar Report(3481)

    16/24

  • 7/31/2019 Seminar Report(3481)

    17/24

    Vishwakarma Institute of Information Technology 2010-11 Page 17

    effective targeted marketing. However, because data mining activities can detect

    unknown relationships in data, some argue that there is the potential to violate

    existing legislation. There is debate over how privacy can be protected while still

    realising the benefits of pervasive computing, and whether new legislation will be

    required.

    4.10 SAFETY AND SECURITY:

    Pervasive computing also gives rise to debate over safety. Integrated transport

    systems could involve road vehicles having actuating devices that intervene in the

    driving process, possibly responding to hazards more quickly than humans. For

    example the new Mercedes S-Class features an active braking system that can detect

    rapidly slowing vehicles in front, activating the brakes without driver intervention.

    While this may help avoid accidents, there are also potential risks, for example if the

    security of the vehicle's controlling software is breached. Similar concerns exist over

    prospective PCS applications in domiciliary care. Breaches of security could expose

    vulnerable individuals to malicious acts within their own homes for example the

    withholding or over-prescribing of medications.

    4.11 TECHNOLOGICAL MEASURES:

    It is argued that privacy, safety and security can be better protected if appropriate

    procedures and protocols are integrated into PCS at the design level rather than

    implemented retrospectively. Three measures are frequently cited as vital in

    establishing robust security measures:

    the volume of transmitted data should be kept to a minimum;

    data that require transmission should be encrypted and sent anonymously (without

    reference to the owner);

    security should be treated as an ongoing and integral element of PCS.

  • 7/31/2019 Seminar Report(3481)

    18/24

    Vishwakarma Institute of Information Technology 2010-11 Page 18

    These principles are accepted by many centres of PCS research and development.

    However, consumer groups such as the NCC say that developers need to give more

    consideration to privacy issues. The NNC argues that in the case of RFID,

    privacy issues were considered only late in development and have still not been fully

    addressed.

    4.12 ENVIRONMENT:

    While the consumption of natural resources might be reduced through the

    miniaturisation of PCS devices, any gains are likely to be offset by technological

    proliferation. This may be compounded by problems of treating microelectronic waste

    embedded in other objects and has implications for recycling because of the possibility

    of such waste contaminating recycling channels. While some of these issues are likely

    to be covered by the transposition into UK law of the EC Directive on Waste

    Electrical and Electronic Equipment, further action (including further regulation) may

    be required

    4.13 A PERFECT EXAMPLE OF A SMART HOME

  • 7/31/2019 Seminar Report(3481)

    19/24

    Vishwakarma Institute of Information Technology 2010-11 Page 19

    (Fig 3)

    The Bill Gates home is a perfect example of a home where ground breaking

    technologies have been applied to make the home more livable. It could serve as an

    epitome of the application of pervasive

    computing. A hundred microcomputers and the software that controls them have been

    embedded inthe home and it makes you experience the home without paying any

    attention to the technology at its

    heart.

    It provides an intelligent environment around with features like :

    1. It allows you to listen to your choice of music when you enter the room.

    2. The lights goes on when you enter the room , its brightness adjusted to suit the

    weather outside.

    3.High resolution displays present electronic versions of your favourite art on the walls

    of the room.

    4. The room by itself adjusts to the temperature according to the time of the day.

    5. The home is also equipped with energy saving instruments.

  • 7/31/2019 Seminar Report(3481)

    20/24

    Vishwakarma Institute of Information Technology 2010-11 Page 20

    ADVANTAGES

    1) INVISIBLE:

    "Smart" environments will be embedded with computing technologies that will be

    mostly out-of-sight. Architecture will gain many more capabilities - with less visual

    clutter.

    2) SOCIALIZATION:

    Interactions with architecture will be more social in nature. "Smart" buildings will

    illicit a more social response from occupants as computers user interfaces embed

    themselves within architecture. (1)

    3) DECISION-MAKING:

    "Smart" environments will help occupants to make better choices as they go about

    their everyday lives. At key moments within architectural experiences, a good

    architectural design will make "smart" environments helpful. Such architecture will be

    more proactive than passive.

    4) EMERGENT BEHAVIOR:

    Buildings are now becoming more and more kinetic in form and function. Their

    movements and constructed designs come together dynamically to yield behaviors that

    make them more adaptive. Buildings will learn how to learn - in order to run

    efficiently and aesthetically.

    5) INFORMATION PROCESSING:

    Since architecture will be gaining a type of "nervous system", information processing

    will be gaining a whole new meaning. Architecture will go from crunching data to

    making sense of data; therefore, eliminating our need to constantly input adjustments.

    6) ENHANCING EXPERIENCE:

    As computers ubiquitously embed themselves in our environments, sensors and

    actuators will create "smart" environments where architectural space will be goal-

  • 7/31/2019 Seminar Report(3481)

    21/24

    Vishwakarma Institute of Information Technology 2010-11 Page 21

    oriented. Therefore, more occupant needs will be better met.

    7) CONVERGENCE:

    Much of our environment will be supplemented with interconnected digital

    technologies. Such interconnectivity will allow for a new type of "sharing" that will

    serve to eliminate many mundane tasks. Also, fewer errors will occur as systems pull

    data from shared digital locations (instead of having numerous copies to keep up-to-

    date).

  • 7/31/2019 Seminar Report(3481)

    22/24

    Vishwakarma Institute of Information Technology 2010-11 Page 22

    CONCLUSION:

    There is a wide range of potential benefits for government, service providers and

    consumers as computing technologies become more pervasive.

    There is debate over how to address concerns over privacy, security, safety and

    sustainability while still realising the benefits of pervasive computing.

    Such concerns may need to be addressed by means of voluntary guidelines,

    legislative measures, physical design, or a combination of these.

    Many say there is a need for greater public debate on the implications of pervasive

    computing.

  • 7/31/2019 Seminar Report(3481)

    23/24

    Vishwakarma Institute of Information Technology 2010-11 Page 23

    ACKNOWLEDGEMENTS

    Apart from my efforts, the success of the seminar presentation depends largely on

    the encouragement and guidelines of many others. I take this opportunity to express

    my gratitude to the people who have been instrumental in the successful completion of

    this seminar presentation.

    I would like to show my appreciation to my seminar guide Prof. A.V.DHUMANE,

    our Head of Department Prof. Mr. R. S. Prasad and our Principal Dr. A. S. Tavildar

    whose encouragement, guidance and support from the initial to the final level enabled

    me to develop an understanding of the topic. I cant say thank you enough for their

    tremendous support and help. I am very grateful for all their support.

  • 7/31/2019 Seminar Report(3481)

    24/24

    Vi h k I i f I f i T h l 2010 11 P 24

    REFERENCES

    http://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdf

    Wikipedia -Mark Weiser, Ubiquitous Computing, HCI, AI

    Video-http://www.youtube.com/watch?v=ngKSirE7zJA

    http://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdfhttp://www.youtube.com/watch?v=ngKSirE7zJAhttp://www.youtube.com/watch?v=ngKSirE7zJAhttp://www.research.ibm.com/PIMA/Documents/Mobicom2000.pdf