Internet & Web

A Seminar Report On UBIQUITOUS COMPUTING Submitted By Under the guidance of

Description
A Seminar Report On UBIQUITOUS COMPUTING Submitted By Under the guidance of
Categories
Published
of 39
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
  ASeminar Report On UBIQUITOUS NETWORK Submitted By PRITI SINGH  -  111P020HAYYUNA ANSARI  -  122P003PANKAJ GUPTA  -  111P024 Under the guidance of  Prof. SHIBURAJ PAPPU Department of Computer Engineering Rizvi College of Engineering New Rizvi Educational Complex, Off-Carter Road,Bandra(w), Mumbai - 400050Affiliated to University of Mumbai  Rizvi College of Engineering Department of Computer Engineering New Rizvi Educational Complex, Off-Carter Road,Bandra(w), Mumbai - 400050 CERTIFICATE This is certify that PRITI SINGHHAYYUNA ANSARIPANKAJ GUPTA of   Third Year Computer Engineering  have completed the seminar work entitled  ”UBIQUITOUSNETWORK”  under my supervision at Rizvi College of Engineering, Mumbai under the University of Mumbai.Prof. Shiburaj Pappu Prof. Dinesh B. Deore Project Guide HOD, Computer DepartmentInternal Examiner External Examiner Date:  Acknowledgements I am profoundly grateful to  Prof. Shiburaj Pappu  for his expert guidance and continuous encourage-ment throughout to see that this report rights its target since its commencement to its completion.I would like to express deepest appreciation towards  Dr. Varsha Shah , Principal RCOE, Mumbai and Prof. Dinesh B. Deore  HOD Computer Department whose invaluable guidance supported me in com-pleting this report.At last I must express my sincere heartfelt gratitude to all the staff members of Computer EngineeringDepartment who helped me directly or indirectly during this course of work.PRITI SINGHHAYYUNA ANSARIPANKAJ GUPTA  ABSTRACT Ubiquitous computing refers to embedding computers and communication in our environment. Ubiqui-tous computing provides an attractive vision for the future of computing. The idea behind the ubiquitouscomputing is to make the computing power disappear in the environment, but will always be there when-ever needed or in other words it means availability and invisibility.These invisible computers will not have keyboards or screens, but will watch us, listen to us and interact with us. Ubiquitous computingenvironments involve the interaction, coordination, and cooperation of numerous, casually accessible,and often invisible computing devices. One is happy when ones desires are fulfilled.The highest ideal of ubicomp is to make a computer so imbedded, so fitting, so natural, that we use it without even thinkingabout it. Ubiquitous computing is referred as pervasive computing throughout the paper. One of thegoals of ubiquitous computing is to enable devices to sense changes in their environment and to auto-matically adapt and act based on these changes based on user needs and preferences The prime goal of this technology is to make human life more simple, safe and efficient by using the ambient intelligenceof computers. Ubiquitous computing therefore induces a paradigm shift in the way we use computers: Instead of bringing the world into the computer (the Virtual Realityparadigm), computational power isnow brought to the objects of the physica world. Eventually, the vision of Ubiquitous Computing inducesa new way of thinking about computers in the world, one that takes into account the natural human en-vironment and allows the computers themselves to vanish into the background. This paper presents anumber of compelling applications using ubiquitous computing and addresses the associated securityand usability concerns. Keywords :Ubiquitous Computing, Pervasive Computing Ambient Intelligence, Distributed Sys- tems,Human-Machine Systems, Socio-Technical Systems, Internet-Based Technology  I NDEX 1 Introduction 1 1.1 What is ubiquitous computing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Characterstics of ubiquitous computing . . . . . . . . . . . . . . . . . . . . . . . . . . 21.3 Goals of ubiquitous computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.3.1 Experience Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.3.2 Design Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.3.3 Engineering goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 History 5 2.1 Weisers vision of UC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52.2 UC versus Virtual Reality (VR): . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.3 UC versus Artificial Intelligence (AI): . . . . . . . . . . . . . . . . . . . . . . . . . . . 62.4 UC versus User Agents (UA): . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72.5 Mark Weisers three key devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3 The coming age of Ubiquitous Computing 10 3.1 The Major Trends in Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103.1.1 The Mainframe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103.1.2 Personal computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103.1.3 Transition - The internet and distributed computing . . . . . . . . . . . . . . . . 103.1.4 Ubiquitous Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113.2 Calm-Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123.2.1 Characteristics of ideal Calm Technology . . . . . . . . . . . . . . . . . . . . . 123.2.2 Example of Calm Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4 Context Awareness 14 4.1 What is Context Awareness? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144.2 Types of context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154.3 Context Awareness and Ubiquitous Computing . . . . . . . . . . . . . . . . . . . . . . 174.3.1 Proactive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174.3.2 Invisible . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174.3.3 Adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184.4 Context Awareness and Ubiquitous Assistive Technologies . . . . . . . . . . . . . . . . 184.4.1 HATT model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184.5 Importance of context awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194.6 Example of context awareness technology . . . . . . . . . . . . . . . . . . . . . . . . . 19
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks