Pervasive Computing


Presentation Description

PLEASE COMMENT and download... Thanks for your kind opinion and spending PRECIOUS time to Share your VALUABLE ideas...


By: baalakool (96 month(s) ago)

its too good

By: niyazkhan007 (105 month(s) ago)

hii....please mail me this will be very helpful for id

By: plarun (111 month(s) ago)

sent this to my mail

By: pl_arun (115 month(s) ago)

Send me ur mail id to get this ppt

By: suzz (115 month(s) ago)

ohh thankz


Presentation Transcript

Slide 1: 


Presented & performed by : 

Presented & performed by Arunachalam. PL COMPUTER ENGINEERING

Slide 3: 

Introduction PC Aims.. Current technology Mobile computing Context adaptation Intelligent environment Adaptive architecture Security, privacy and management Bibliography Concluding remarks Agenda

Slide 4: 

Pervasive Computing everywhere, for everyone, at all times. It refers to visionary new ways of applying information and communication  technologies to our daily lives. "Pervasive Computing" means “Convenient access, through a new class of applications, to relevant information with the ability to easily take action on it when and where you need to.”

Slide 5: 

PC aims at…. Making our lives simpler through the use of tools that allow us to manage information easily. So conceptually, every thing (ships, aircrafts, cars, bridges, tunnels, machines, refrigerators, door handles, lighting fixtures, shoes, and even things like our coffee mugs and even the human body etc..) will have embedded with chips to connect to an infinite network.

Slide 6: 

PC Appliances @ Present Optical Keyboard Gamers chair Carpet alarm Wrist pen drive Drivers mood sensors Mp3 player Wearable computers

Slide 7: 

Phone/camera PDA/mobile phone Softphone Current Technology

Slide 8: 

Web Server Best friend Current Technology National Defense- Surveillance Platform

Pill Cam : 

Pill Cam Everything in a small tiny capsule…. 1. Optical dome 2. Lens holder 3. Lens (MEMS) 4. LEDs 5. CMOS 6. Battery 7. ASIC transmitter 8. Antenna NO MORE ENDOSCOPY MEMS stands for Micro Electro Mechanical Systems.

Slide 10: 

Pervasive technologies in general - will be exploited through a digital environment that is many of the chips around us will sense their environment in simple but effective ways. Cell phones will ask the landline phone what its telephone number is and will forward our calls to it. Remote computers will monitor our health statistics and will determine when one is in trouble and will take appropriate action for rescue. Pervasive Computing Tomorrow!...

Slide 11: 

Mobile computing Computing & communication on the move Mostly voice based or embedded Nomadic computing Usual environment available Mobility

Slide 12: 

Digi-tickers or implanted heart monitors in heart patients will talk wirelssly to computers, which will be trained to keep an eye open for abnormalities. IMPLEMENTATION

Slide 13: 

Common user interface for workstation and mobile device applications Adaptive information display Imitate characteristics of paper-based notebooks for robustness, universality Flexible voice based input-output Voice recognition + text to speech conversion Motion or Sign recognition Usability

Slide 14: 


Pervasive Computing Vision : 

Pervasive Computing Vision Universal connectivity – anywhere, anytime Accommodate heterogeneity of networks and communicators Ubiquitous intelligent environment –embedded computers everywhere Easy user interaction Context independent access to services + context dependent information

Slide 16: 

GSM phone 9.6 Kbps, GPRS typical 28Kbps, theoretical 172Kbps max Wireless LAN IEEE 802.11b 200 m range 2.4 Ghz band: 11 Mbps Bluetooth 10 m range2.4 Ghz band: 1 data (700 kbps) & 3 voice channels Infrared – direct line of sight: 4Mbs Wireless Communication

Slide 17: 

Networking with no fixed infrastructure Use other devices as routers But, security concerns and usage of scarce battery power for relaying – possibly more suited to sensor than user networks Ad-hoc networking

Slide 18: 

Context defined by: Current location Need location detection eg GPS or base station Indoors – radio beacon, IR User activity Walking, driving a car, running for a bus Ambient environment In theatre, alone, in meeting Local resources or services available Device capabilities Screen, input, processing power, battery life … Context Awareness

Slide 19: 

Smart dust is the term used to describe a network of tiny wireless microelectromechanical systems (MEMS) sensors, robots, or devices, installed with wireless communications, that can detect (for example) light, temperature, or vibration. Autonomous sensing and communication in a cubic millimeter – “dust motes” Typical Applications Defense related battlefield sensors, motion detectors etc. Inventory control on boxes which communicate with trucks, plane etc to tell you where they are Smart Dust

Slide 20: 

Smart Dust Technology

Slide 21: 

Processor: 4MHz RAM Memory: 128 Kbytes On-Board Flash: 512 K bytes Radio: 916 Mhz, 52K bps Antenna: On-board, optional external TinyOS from Berkeley Commercial Motes This concept is also called smart dust and wireless sensing networks.

Slide 22: 

Intelligent paper with integrated radio replace current displays Smart paint monitors vibrations and detect or changes color to react to temperature, lighting etc. Intelligent glass can filter sunlight, become opaque no need for curtains Smart garments or inject able sensors for people monitoring Download design and printable motes for < 1c mote Printable batteries Future Smart Dust

Slide 23: 

Lights, air conditioning, TV automatically switch on and off when you enter or leave rooms Sit on your favorite chair and TV switches on to the program you usually watch at this time of the day Use communicator/PDA for phone, remote control, keys payments, passport, health records, authenticator. Route input from ‘virtual’ keyboard to nearest suitable display. Automatic detection of new items to control and physical layout in a room or office, using computer vision Future Intelligent Environment

Slide 24: 

Interactions cross multiple organizational boundaries Specification, analysis and integration for heterogeneous OS, databases, firewalls, routers Lessons from history: Cell phones, IR garage doors, CATV decoders Everything worth hacking gets hacked Security

Slide 25: 


Slide 26: 

Universal PDA/communicator Explosion in embedded sensors/actuators Context-aware intelligent environment Privacy will be a major issue Out of the box security Adaptive self-management is needed – biological paradigms

Slide 27: 

“A journey of a thousand sites begins with a single click Full effort is full victory .” Its time for small Demo…

This Paper has been submitted under the guidance of : 

This Paper has been submitted under the guidance of Over headed by Mr.M. Saravanan (M.E) – Senior Lecturer (Computer Engg). K. Megala B.E – Lecturer (Computer Engg). MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Engineering Mr.M. Ramesh Kumar, MCA.,Mphil – HOD i/c (Computer Engg).

Bibliography : 

Pervasive Computing IEEE Pervasive Computing Magazine Intelligent Environment Wearable Computers Wireless communications Mobile computing Bibliography

Slide 30: 

Thank You very much….. Create Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Seminar - Knowledge Sharing And Acquiring Environment Apply Knowledge Assimilate Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Create Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge

Slide 31: 

authorStream Live Help