1 / 25

Wearable Computing

Wearable Computing. Yuanfang Cai Dec. 6, 2000. Discussion Outline. What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing. What is wearable computing. Wearable Portable while operational

jfogg
Download Presentation

Wearable Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wearable Computing Yuanfang Cai Dec. 6, 2000

  2. Discussion Outline What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing

  3. What is wearable computing • Wearable • Portable while operational • Hand-free or one-handed operation • unobtrusive • Augmented reality • situation aware

  4. Input Device Display Device Low Power Indicator Power Supply >>Wearable Computer Implementation Overall System Block Diagram : Com port VGA out Frame grabber Network card Wireless Network Video Camera Main Unit Parallel port Back plane

  5. >>Wearable Computer Implementation>>Input Device speech recognizer keyboard alternative including chording keyboards and special purpose keyboards mouse alternatives including trackballs, joysticks tab alternatives including buttons, dial eye trackers head trackers pen gesturing bar code reader video capture devices, microphones, GPS locators other exotic devices such as skin sensors

  6. >>Wearable Computer Implementation>>Input Device Wireless Finger Ring • Detection of finger-tip typing • Wireless Link • Block Diagrams • Chording METHOD

  7. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Detection of finger-tip typing

  8. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Wireless Link

  9. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Block Diagrams

  10. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Chording Method

  11. >>Wearable Computer Implementation>>Output Device head mounted displays (HMDs) flat panels, text to speech tactile output non speech auditory output paper and olfactory output (scent)

  12. >>Wearable Computer Implementation>>Output Device Augmented Reality Typical Augmented Reality System Display Technologies in Augmented Reality

  13. >>Wearable Computer Implementation>>Output Device Augmented Reality>> Typical Augmented Reality System

  14. Optical See-through Augmented Reality Display Video See-through Augmented Reality Display >>Wearable Computer Implementation>>Output Device Augmented Reality>> Display Technologies in Augmented Reality

  15. >>Wearable Computer Networking General requirements • Short-ranged • Simple in design • Low power consumption • Self-configuration • Restricted to the user • Security Security requirements • Privacy • Data Confidentiality • Data integrity • Access Control • Availability • Source Authentication

  16. >>Wearable Computer Networking BlueTooth Security>>Security Architecture

  17. >>Wearable Computer Networking BlueTooth Security>>Key Management PIN PIN E2 E2 Authentication Link Key Link Key E3 E3 Encryption Encryption Key Encryption Key Encryption and Key Control

  18. >>Wearable Computer Networking BlueTooth Security>>Authentication Verifier (User A) Verifier (User B) RAND SRES = E(key, IDB, RAND) SRES’ = E(key, IDB, RAND) SRES Checks:SRES’ = SRES Challenge-response for symmetric key system

  19. Wearable Computing & Ubiquitous Computing • Properties and Problems with Ubiquitous Computing • Privacy issues • Difficulty with personalized information: • Properties and Problem with Wearable Computing • Localized information: • Localized control • Resource management: • The Combination-Hive and Locust Swarm • A General Scenario

  20. Me Too! It’s really troublesome! Oh, it’s Tom Let me check my databse Oh, it’s Tom Let me check my databse OK, let me check his email OK, I will play this song My god, a new man! I have to update my database! Tom: Age: 25 Email: Tt@yahoo.com Tom: Age: 25 Favorite Song: My heart will go on Wearable Computing & Ubiquitous Computing Hi all, I am Mike, your new Boss • Properties and Problems with Ubiquitous Computing • Privacy issues • Difficulty with personalized information: I am Tom !

  21. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! OK, I will play this song Tom: Age: 25 Favorite Song: My heart will go on Email: Tt@yahoo.com OK, let me check his email

  22. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing • 1. Localized information: • 2. Localized control I am Tom ! A New device! It should be added to my DB. Where is the printer’s driver? should I install it? Device Table: -------------------- 1.Computer 2.Recorder 3.Printer Device Table: -------------------- 1.Computer 2.Recorder

  23. Hi all, I am Mike I am Tom ! Tom: Age: 25 Favorite Song: My heart will go on Email: Tt@yahoo.com Mike: Age: 30 Favorite Song: Salvage Garden Email: Mm@yahoo.com Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing • Resource management: Oh my, What should I do?

  24. Wearable Computing & Ubiquitous Computing The Combination-Hive and Locust Swarm Why Hive? • Agents are Autonomous • Agents are proactive • Agents can interact • Agents can be mobile What is Locust Swarm?

  25. Wearable Computing & Ubiquitous Computing Reaping the best of both worlds

More Related