1 / 36

PERVASIVE OR UBIQUITOUS COMPUTING

PERVASIVE OR UBIQUITOUS COMPUTING. M.HANZALA ALI ABBASS. PERVASIVE OR UBIQUITOUS?. Ubiquitous OR pervasive computing (ubicomp) integrates computation into the environment, rather than having computers which are distinct objects.

brandya
Download Presentation

PERVASIVE OR UBIQUITOUS COMPUTING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS

  2. PERVASIVE OR UBIQUITOUS? • Ubiquitous OR pervasive computing (ubicomp) integrates computation into the environment, rather than having computers which are distinct objects. • The idea of ubicomp enable people to interact with information-processing devices more naturally and casually, and in ways that suit whatever location or context they find themselves in.

  3. Other Names • Pervasive Computing • Sentient computing • Ubiquitous Computing • Ambient Intelligence • Wearable Computing

  4. Goals of Pervasive (Ubiquitous) Computing • Ultimate goal: • Invisible technology • Integration of virtual and physical worlds • Throughout desks, rooms, buildings, and life • Take the data out of environment, leaving behind just an enhanced ability to act

  5. Pervasive (Ubiquitous) Computing Vision • “In the 21st century the technology revolution will move into the everyday, the small and the invisible…” “The most profound technologies are those that disappear. They weave themselves into the fabrics of everyday life until they are indistinguishable from it.” Mark Weiser (1952 –1999), XEROX PARC

  6. The Trends in Computing Technology and Pervasive Computing 1970s 1990s Late 1990s Now and Tomorrow ?

  7. Pervasive Computing Era

  8. Pervasive Computing Enablers • Moore’s Law of IC Technologies • Communication Technologies • Material Technologies • Sensors/Actuators

  9. Moore’s Law • Computing power (or number of transistors in an integrated circuit) doubles every 18 months

  10. 2nd Enabler: Communication • Bandwidth of single fibers ~10 Gb/s • ~20 Tb/s with wavelength multiplex • Powerline • coffee maker “automatically” connected to the Internet • Wireless • mobile phone: GSM, GPRS, 3G • wireless LAN (> 10 Mb/s) • PAN (Bluetooth), BAN

  11. 4th Enabler: Sensors/Actuators

  12. Miniaturized cameras, microphones,... • Fingerprint sensor • Radio sensors • RFID • Infrared • Location sensors • e.g., GPS

  13. Distributed System Pervasive Computing Mobile Computing

  14. Pervasive Devices Embedded Devices Handle Devices

  15. H21s a.k.a HANDY’s21and Enviro21s a.k.a E21s HANDHELD DEVICES THE VISION: • Person-centered devices provide universal personal appliances that are inexpensive and carried and used anywhere (portability). • They are equipped with perceptual transducers such as a microphone, speaker, video camera, and display. • Provide mobile access points for users both within and without the intelligent spaces controlled by E21s. • Reconfigure themselves to support multiple communication protocols • Recognize human input

  16. Embedded devices • Create intelligent spaces. (computation embedded in ordinary envoirnments defines intelligent spaces and control for physical entities) People interact in intelligent spaces naturally without being aware that computation is present. • E21s provide large amounts of embedded computation • Users communicate naturally in the spaces created by the E21s

  17. Evolution

  18. Scenario 1 • John opens his refrigerator to take out a soda, and he notices that there is only one can left. John then scans the UPC of the soda with the scanner attached to the refrigerator. John plans to have guests over this weekend, and makes a note on the refrigerator device that he needs to replenish his soda by Friday The next day. • on his way home from work, John happen to approach a local supermarket. His car signals to John that he is near a grocery store, and if it is convenient, that he should stop by. Suppose John does not act on the opportunity, Friday rolls around and he still have not bought the drinks, a notification will be sent to John’s PDA by the refrigerator to alert John

  19. Scenario 1 – What Happened? • John’s virtual shopping list is maintained by his refrigerator. • When John scanned the soda, the refrigerator adds soda to the shopping list. • When John notes down Friday, the refrigerator notifies his car about the need for soda. • When John is on the road, his car constantly monitors the available services; when his car detects the supermarketservice, it notifies John. • When it’s Friday, and the refrigerator has not received a “soda purchased” notification, it sends a notification to John’s PDA.

  20. Data Management • Getting information into the temporal or spatial context in which it will be most useful, instead of where the information is created, and using pervasive devices to accept or deliver it • In the first scenario, John created his shopping list in his refrigerator, but he needed it the most when he’s near a supermarket.

  21. Data Management Challenges in PER-COM • Instead of the conventional client-proxy-server model, pervasive computing requires a mobile distributed database system, where each device maintains its own database • No centralized control of each device database • Assume data can be communicated in a neutral format between devices • Each part of a data object may reside on different device database • Devices move in ad-hoc networks, therefore no guarantee of fixed set of devices

  22. In particular to pervasive computing environments where devices are dynamic • Data and data source availability • Lack of global data and schema • No guarantee of reconnection • No guarantee of collaboration • => query responses are highly based on luck

  23. CASE STUDY PERVASIVE PATIENT MONITORING A vast majority of long-term patients in the world don’t take their medication in time, intentionally or not. In the U.S. alone, this represents an additional $100 billion yearly expense due to unexpected emergency hospital admissions. It is therefore crucial to gather accurately patient medical data in real time. For this purpose, a team at IBM Zurich Research Laboratory has developed a mobile health toolkit to perform this task. With this toolkit consisting of a Java-based middleware and Bluetooth-enabled sensors, all the medical patient data can be wirelessly exported to a doctor’s office via a PC or a cell phone.

  24. Facts and figures • About 55% of all long-term patients in the US and in Europe, it is estimated, do not take their medication (either not taking the prescribed medication at all or more than 14 hours late) Around 12% of all hospital admissions in the UK are due to this non-compliance, the damage to the US taxpayer is an estimated USD 100 billion a year. Most of the patients that do not comply are simply forgetful (about 10% deliberately do not want to take the medication).

  25. How this can be solved? • Gathering current patient medical data promptly and accurately is vital to proper health care. • The usefulness of electronic data capture (EDC) has been demonstrated in applications such as the home monitoring of at-risk heart patients via devices that transmit blood pressure from the home to a central database. • Removing transcription effort (and associated inaccuracies) alone is worth the institution of EDC; but the side benefit of timeliness offers the hope of identifying and responding to trends as they occur, perhaps preventing a dangerous event, instead of simply allowing its diagnosis after the danger has manifest.

  26. So …… • This is why IBM has developed its mobile health toolkit, “for gathering measurement data from a range of devices,such as • H21’s and E21’s connected through the N21’s(discussed earlier) • and present it to management software via a well defined, and easily implemented interface.”

  27. mobile health care: why go mobile? • ● Monitoring patients in the • community • • Long-term patients, early • release patients, elderly • patients, young patients • • Medication • compliance/adherence • monitoring • • Symptoms monitoring • ● Healthcare professionals

  28. • On-the spot patient record • updating • • Direct patient data input • ● Self Monitoring & lifestyle • • Help consumers take an • active part in their well- • being/disease • • Caring for relatives • ● Objectives: • • Improve data quality and availability • • Improve quality of life for patients • • Reduce costs

  29. Here are some details about this toolkit • The IBM mobile health toolkit provides a Java-based middleware — using J2ME MIDP 2.0 (Java Mobile Information Device Profile) and JSR 082 (Java APIs for Bluetooth) — running on a personal (mobile) hub device to which sensors can connect wirelessly. • We can perform local processing on the data, and forward the result to one or more fixed network connections. • Data-handling modules can easily be added to the MIDlet suite (application suite compliant with Java Mobile Information Device Profile) on the hub, as can drivers for new sensor devices.

  30. References • Zurich Research Laboratory website, • [1] http://sdforum.org/p/calEvent.asp?CID=751&mo=4&yr=2002 • [1] Mark Weiser, Chief Technologist of Xerox PARC, Palo Alto Research Center (PARC), the company's renowned high-technology incubator is widely regarded as the 'father' of ubiquitous computing; his web page contains links to many papers on the topic: http://www.ubiq.com/hypertext/weiser/UbiHome.html. • [1] http://www.computer.org/pervasive/ • [1] http://web.media.mit.edu/~neilg/ • [1] 'Beyond the Internet', published by the RAND Organisation http://www.rand.org/scitech/stpi/ourfuture/Internet/section4.html • [1] http://oxygen.lcs.mit.edu/ • [1] http://cuneus.ai.mit.edu:8000/research/miketalk/miketalk.html • if offline, see the technical paper: • http://citeseer.nj.nec.com/ezzat98miketalk.html • [1] http://www-lce.eng.cam.ac.uk/~dl231/ • [1] http://www-lce.eng.cam.ac.uk/~dl231/publications.html • [1] http://www.usa.siemens.com/about/innovations/feature_stories/simpad_22801.html • [1] http://www.nist.gov/smartspace/ • [1] http://www.itl.nist.gov/ • [1] http://www.nist.gov/ • [1] http://www.computer.org/pervasive/ • [1] http://www.nature.com/nsu/011122/011122-11.html • [1] http://www.nature.com/nsu/010913/010913-3.html • [1] http://www.nature.com/nsu/020520/020520-4.html • [1] http://www.playresearch.com/ • [1] http://www.viktoria.informatik.gu.se/groups/play/projects/slowtech/installations.html • [1] http://www.ambientdevices.com/cat/applications.html • [1] http://www.nature.com/nsu/020429/020429-7.html • [1] http://www-lce.eng.cam.ac.uk/~dl231/

More Related