A paper on
UBIQUITOUS COMPUTING
(PERVASIVE COMPUTING)
INFORMATION TECHNOLOGY
SRI SAI ADITYA INST OF SCI & TECH
SURAMPALEM
BY
K.BHEEMA RAJU,
III B.TECH,
Email:BHEEMESHYOURS@YAHOO.COM
Ph.no:903020925
P.Devi Sruthi
8125525354
UBIQUITOUS COMPUTING
(PERVASIVE COMPUTING)
computers that include
equally convenient
Abstract.
displays, a network that
One is happy when ones
ties them all together, and
desires are fulfilled. The
software systems
highest ideal of Ubicomp
implementing ubiquitous
is to make a computer so
applications. Current
imbedded, so fitting, so
trends suggest that the
natural, that we use it
first requirement will
without even thinking
easily be met.
about it. Pervasive
computing is referred as
Ubiquitous computing
through out the paper.
One of the goals
Our preliminary
of ubiquitous computing
approach: Activate the
is to enable devices to
world. Provide hundreds
sense changes in their
of wireless computing
environment and to
devices per person per
automatically adapt and
office, of all scales. This
act based on these
has required network in
changes based on user
operating systems, user
needs and preferences.
interfaces, networks,
The technology required
wireless, displays, and
for ubiquitous computing
many other areas. We
comes in three parts:
call our work ubiquitous
cheap, low- power
computing. This is
different from PDAs,
1. How Ubiquitous
dynabooks, or
Networking will
information at your
work
fingertips. It is invisible;
Ubicomp integrates
everywhere computing
computation into the
that does not live on a
environment, rather than
personal device of any
having computers, which
sort, but is in the
are distinct objects. Another
woodwork everywhere.
term for this ubicomp is
Single-room networks
PERVASIVE COMPUTING.
based on infrared or
This Ubicomp is roughly
newer electromagnetic
the opposite of virtual
technologies have
reality. Where virtual reality
enough channel capacity
puts people inside a
for ubiquitous computers,
computer-generated world,
but they can only work
i.e., it forces the computer
indoors.
to live out here in the world
Cryptographic techniques
with people. Ubiquitous
already exist to secure
computing encompasses a
messages from one
wide range of research
ubiquitous computer to
topics, including distributed
another and to safeguard
computing, mobile
private information stored
computing, sensor
in networked systems.
networks, human-computer
We suggest using cell
interaction, and artificial
phone device available in
intelligence.
the market for Ubicomp
By using a small radio
also i.e., the handheld
transmitters and a building
device will be used for
full of special sensors, your
both Ubicomp and also
desktop can be anywhere
as a cell phone.
you are. At the press of a
button, the computer
closest to you in any room
becomes your computer for
long as you need it.
embedded transmitter,
2. In the Zone
which allows it to
In order for a computer
communicate with the
program to track its user a
central controller using a bi-
system should be
directional 433-MHz radio
developed that could locate
link.
both people and devices
Bats are about the size of a
i.e., ultrasonic location
paper. These small devices
system. This location
are powered by a single
tracking system has three
3.6-volt lithium thionyl
parts:
chloride battery, which has
Bats
:-
The devices also contain
Small ultrasonic
transmitters, worn by users.
Receivers
a lifetime of six months.
:-
two buttons, two lightemitting diodes and a
piezoelectric speaker,
Ultrasonic signal detectors
allowing them to be used
embedded in ceiling.
as ubiquitous input and
Central Controller
:-
output devices, and a
Co-
voltage monitor to check
ordinates the bats and
the battery status.
receiver chains.
A bat will transmit an
ultrasonic signal, which will
be detected by receivers
located in the ceiling
approximately 4 feet apart
in a square grid. If a bat
Fig. 1. The Bat
Users within the system will
wear a bat, a small device
that transmits a 48-bit code
to the receivers in the
ceiling. Bats also have an
needs to be located, the
central controller sends the
bats ID over a radio link to
the bat. The bat will detect
its ID and send out an
ultrasonic pulse. The
central controller measures
the time it looks for that
3. Ubi-Finger
pulse to reach the receiver.
Here, in contrast, Ubi-
Since the speed of sound
Finger is the gesture-i/p
at which the ultrasonic
device, which is simple,
pulse reached three other
compact and optimized for
sensors.
mobile use. Using our
By finding the position of
systems, a user can detect
two or more bats, the
a target device by pointing
system can determine the
with his/her index finger,
orientation of a bat. The
and then control it flexibly
central controller can also
by performing natural
determine which way a
gestures of fingers (Fig. 2).
person is facing by
analyzing the pattern of
receivers that detected the
ultrasonic signal and the
strength of the signal.
The central controller
crates a zone around every
person and object within
the location system. The
computer uses a spatial
monitor to detect if a users
zone overlaps with the
zone of a device. Computer
desktops can be created
that actually follow their
owners anywhere with in
the system just by
approaching any computer
display in the building, the
bat can enable the virtual
network computing desktop
to appear on that display.
By pointing a light and
push a switch.The light
making a gesture like
will turn on!
Fig. 2. An example to
control Home Appliances
As shown in Fig. 3, UbiFinger consists of three
sensors to detect gestures
of fingers, an infrared
transmitter to select a
target device in real world
and a microcomputer to
control these sensors and
communicate with a host
computer. Each sensor
generates the information
of motions as follows: (1) a
bending degree of the
index finger, (2) tilt angles
of the wrist, (3) operations
of touch sensors by a
thumb. We use (1) and (2)
for recognition of gestures,
and use (3) for the trigger
mechanism to start and
stop gesture recognition.
Fig. 3
4. Mouse Field
Although various
interaction technologies for
handling information in the
ubiquitous computing
environment have been
proposed, some
technologies are too simple
for performing rich
interaction, and others
require special expensive
equipments to be installed
everywhere, and cannot
soon be available in our
everyday environment.
Here there is a new simple
and versatile i/p device
called the Mouse Field,
which enables users to
control various information
applications easily without
huge amount of cost.
A mouse field consists of
an ID recognizer and
motion sensors that can
detect an object and its
movement after the object
is placed on it. The system
can interpret the users
action as a command to
control the flow of
information.
"Placing" (detecting an
"Moving" (detecting its
object)
movement)
Fig. 4. Basic concept of
optical mouses are
Mouse Field
connected to a PC
Mouse Field is a device
through a USB cable, and
which combines an ID
they can detect the ID
reader and motion
and the motion of the
sensing devices into one
object put on the device.
package. Fig. 4 shows an
When a user puts an
implementation of Mouse
object with an RFID on
Field, which consist of
the Mouse Field, it first
two motion sensors and
detects what was kept on
an RFID reader hidden
the RFID reader. When
under the surface. The
the use moves or rotates
RFID reader and the two
the object, motion sensor
detects the direction and
rotation of the object.
Front view
Back View
Fig. 5 Implementation
of a Mouse Field
Device.
Fig. 5 shows how a user
can enjoy music using a
Mouse Field and CD
jackets which represent
the music in the CD. All
the music in the CD is
saved in a music server,
and an RFID tag is
attached to each jacket.
These
are
used
to
control
various
parameters without special parameters.
5. Information Hoppers and Smart
Posters
pressing the posters button. Posters
can be created with several buttons on
it.
Ultrasonic location systems will require
Once these zones are setup, computers
us
on
some
Traditionally, we have used our files,
interesting capabilities. The system will
and we may back up these files on a
help to store and retrieve data in an
network server. This ubiquitous network
Information hopper. This is a timeline of
will enable all computers in a building to
information that keeps track of when
transfer ownership and store all our files
data is created. The hopper knows who
in a central timeline.
the
network
will
have
created it, where they were and who
they were with.
to
think
6. Moving
outside
towards
of
the
box.
future
of
Ubiquitous Computing
Another application that will come out of
We suggest a new method to carry all of
this ultrasonic location system is the
your personal media with you in a
smart poster.
convenient pocket form factor, and have
convention
computer
interface
wireless access to it when standing in
requires us to click on a button on your
front of a PC, kiosk, or large display,
computer screen. In this new system, a
anywhere
button can be placed anywhere in your
significantly
workplace, not just on the computer
computing experience.
display. The idea behind smart posters
Intel researchers are developing a new
is that a button can be a piece of paper
class of mobile device that leverages
that is printed out and struck on a wall.
advances in processing, storage, and
in
the
world
improve
that
your
might
mobile
Smart posters will be used to
communications technologies to provide
control any device that is plugged into
ubiquitous access to personal information
the network. The poster will know where
and applications through the existing fixed
to send a file and a users preferences.
infrastructure.
Smart posters could also be used in
personal server is a small, lightweight
advertising new services. To press a
computer with high-density data storage
button on a smart poster, a user will
capability. It requires no display, so it can
simply place his or her bat in the smart
be smaller than a typical PDA. A wireless
poster button and click the bat. The
interface enables the user to access
system automatically knows who is
content stored in the device through
The
device,
called
whatever displays are available in the
Panasonic Center: Realizing a
local environment. For example, in the
Ubiquitous network society.
digital home, the personal server could
wirelessly stream audio and video stored
Ubiquitous Computing
Management Architecture.
on the device to a PC or digital home TV.
Introduction to UC.
The technology to enable these scenarios
UC in Education.
and more is now being explored.
Designing Ubiquitous Computer
7. Conclusion
Resources.
We are moving toward a future in which
computing
will
be ubiquitous,
woven
seamlessly into the fabric of everyday life.
Researchers are engaged in several
projects to explore technologies and
usage models for everyday uses of
computing. In their research, they are
addressing fundamental issues that must
be resolved in order to enable anytime,
anywhere computing.
To make ubiquitous computing a reality
will
require
the
collaboration
of
researchers in a broadband of disciplines,
within computer science and beyond.
Research works on UC
Ichiro Satohs Research work on
UC.
Bill Schilits work on UC.
Matthias Lampes work on UC.
Pekka Ala Siurus work on UC.
Louise Barkhuus work on UC.
George Roussos work on
ubiquitous commerce.
Dr. Albrecht Schmidts Research
work on Ubiquitous Computing.
Resources
Application Coordination
Infrastructure for Ubiquitous
Computing Rooms.
Ubiquitous Bio-Information
Computing (UBIC 2)
What is Ubiquitous Computing?
Overview and resources.
How Ubiquitous Networking will
work? Kevin Bensor.
UC Research
Research in UC and
Applications at University of
California, Irvine.
Fuego: Future Mobile and
Ubiquitous Computing
Research.
The Ubiquitous Computing
Research Group at the
University of Victoria.
Research in Ubiquitous
Computing.
GGF Ubiquitous Computing
Research Group.
Distributed Software Engineering
Group Research into Ubiquitous
Computing.
Mobile Ubiquitous Security
Environment (MUSE).