pervasive computing 02

Upload: abhineetkumar

Post on 08-Oct-2015

245 views

Category:

Documents


2 download

DESCRIPTION

Pervasive Computing

TRANSCRIPT

PERVASIVE COMPUTINGThis template can be used as a starter file for presenting training materials in a group setting.

SectionsRight-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors.

NotesUse the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production)

Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale.

Graphics, tables, and graphsKeep it simple: If possible, use consistent, non-distracting styles and colors.Label all graphs and tables.

1CONTENTS24-Mar-112Gandhi Engineering CollegeGive a brief overview of the presentation. Describe the major focus of the presentation and why it is important.Introduce each of the major topics.To provide a road map for the audience, you can repeat this Overview slide throughout the presentation, highlighting the particular topic you will discuss next.2The most profound technologies are those that disappear .They weave themselves into the fabric of every-day life until they are indistinguishable from it . Mark Weiser24-Mar-113Gandhi Engineering College3Pervasive Computing

A Web of computing devices and sensors embedded in everyday objects ranging from cars to house.The devices are context sensitive and user aware.

INTRODUCTION24-Mar-114Gandhi Engineering CollegeThis is another option for an Overview slides using transitions.

4Aspects of Pervasive EnvironmentUser Interaction User interacts with speech, gestures and movements The sensors and communication devices are aware of the user and they are also aware of his/her intent .ProactivelyThe computing devices should interact and query devices on transparency.Technology has to be transparent Behalf on user and his intent. Device Interaction Frequent multiparty interactionsNo central authority or third party

24-Mar-115Gandhi Engineering College524-Mar-11Gandhi Engineering College6Solution: Biometrics?DefinitionBiometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.ExamplesPhysical Biometrics FingerprintHand GeometryIris patternsBehavioral Biometrics HandwritingSignatureSpeechGaitChemical/Biological BiometricsPerspirationSkin composition(spectroscopy)

624-Mar-11Gandhi Engineering College7General Biometric SystemDatabaseBiometricSensorFeature ExtractionBiometricSensorFeature ExtractionMatching

ID : 8809AuthenticationEnrollmentResult724-Mar-11Gandhi Engineering College8Framework for Interaction

Speaker RecognitionSpeech RecognitionparsingandarbitrationS1S2SKSN824-Mar-11Gandhi Engineering College9Framework for Interaction

Speaker RecognitionSpeech RecognitionparsingandarbitrationSwitch on Channel 9

S1S2SKSN924-Mar-11Gandhi Engineering College10Framework for Interaction

Speaker RecognitionSpeech RecognitionparsingandarbitrationWho is speaking?

AnnieDavidCathyS1S2SKSNAuthentication1024-Mar-11Gandhi Engineering College11Framework for Interaction

Speaker RecognitionSpeech RecognitionparsingandarbitrationWhat is he saying?

On,Off,TVFridge,Door

S1S2SKSNUnderstanding1124-Mar-11Gandhi Engineering College12Framework for Interaction

Speaker RecognitionSpeech RecognitionparsingandarbitrationWhat is he talking about?Channel->TVDim->LampOn->TV,LampS1S2SKSNSwitch,to,channel,nineInferring and execution12 ApplicationsHealth-Care Remote sensors and monitoring technology will allow continuous capture of human physiological data . Medical staff could be immediately alerted to any detected irregularities. The continuous collection of data could provide accurate pattern/trend analysis of long term conditions such as heart disease, diabetes and epilepsy. Wearable sensors may offer greater patient mobility and freedom within hospitals and save both time and money by reducing the number of repeated testing. Hospital administration could also be transformed .24-Mar-1113Gandhi Engineering College13Environmental MonitoringPervasive computing provides improved methods to monitor the environment.It will allow for continuous real time data collection and analysis via remote, wireless devices.24-Mar-1114Gandhi Engineering College14Intelligent Transport SystemPervasive Computing is being employed to alleviate the traffic congestion and accident costs.Electronic devices could be directly integrated into transport infrastructure and vehicles themselves with the aim of better monitoring and managing air, road and sea transport systems.The vehicles could become capable of receiving and exchanging information on the move via wireless technologies and be able to communicate with devices integrated into the vehicles alerting drivers of traffic congestion, accident hotspots and road closures.24-Mar-1115Gandhi Engineering College15Privacy,Security and SafetyPrivacyWith personal information transmitted and stored in greater volume the opportunities of data interception, theft and ubiquitous surveillance(official, unofficial) will be heightened.PCS could be installed in places considered private and many aspects of personal life could be recorded and stored, with the risk of breaches of privacy.

24-Mar-1116Gandhi Engineering College16Privacy,Security and SafetyPervasive computing also gives debate over safety. Integrated transport systems could involve road vehicles having actuating devices that intervene in the driving process, possibly responding to hazards more quickly than humans.For eg:The new Mercedes S-class features an active-braking system that can detect rapidly slowing vehicles in front, activating the brakes without driver intervention. While this may help avoid accidents ,there are also potential risks, for example the security of the vehicles software is breached.

24-Mar-1117Gandhi Engineering College17 AdvantagesInvisibleSocializationDecision-makingInformation processingConvergence

24-Mar-1118Gandhi Engineering College18Applications

24-Mar-1119Gandhi Engineering College19 ConclusionsThere is a wide range of potential benefits for government, service providers and consumers as computing technologies become more pervasive.There is a debate over how to address concerns over privacy,security safety and sustainability while still realising the benefits of pervasive computing.

24-Mar-1120Gandhi Engineering College20 Referenceswww.wikipaedia.comMIT Project Oxygen. http://oxygen.lcs.mit.edu/videometaglue.htmlCMU Project Aura. http://www-2.cs.cmu.edu/ aura/.IBM Planet Blue. http://researchweb.watson.ibm.com/compsci/planetblue.html

24-Mar-1121Gandhi Engineering College2124-Mar-11Gandhi Engineering College22

Thank-YouLikan Patra & Sisir Naik22