pervasive computing n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Pervasive Computing PowerPoint Presentation
Download Presentation
Pervasive Computing

Loading in 2 Seconds...

play fullscreen
1 / 22

Pervasive Computing - PowerPoint PPT Presentation


  • 218 Views
  • Uploaded on

Pervasive Computing. World tomorrow…. - Sachin Singh Sushil Puradkar Mayura Bhandarkar -Dikhsa Agarwal. Topics of Discussion. Introduction to Pervasive Computing. Examples of Pervasive Computing. Issues. Our work. Future plans. Introduction to Pervasive Computing.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Pervasive Computing' - lundy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
pervasive computing

Pervasive Computing

World tomorrow…

-Sachin Singh

  • Sushil Puradkar
  • Mayura Bhandarkar

-Dikhsa Agarwal

UDIC Presentation

topics of discussion
Topics of Discussion
  • Introduction to Pervasive Computing.
  • Examples of Pervasive Computing.
  • Issues.
  • Our work.
  • Future plans

UDIC Presentation

introduction to pervasive computing
Introduction to Pervasive Computing
  • What is Pervasive Computing
    • “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” – Mark Weiser
    • Example of pervasive technology – “Writing”
    • Writing vs. current computer usage
  • What is not Pervasive Computing.
    • The ability to carry computers at beach, jungle or airport
    • Virtual reality – ‘A world inside computer’

UDIC Presentation

example of pervasive computing
Example of Pervasive Computing.
  • Follow Me
    • Files, Music …
  • Global Access
    • At home, In office, at KFC …
  • Services
    • What can I do for you?
  • Know you know me
    • Who’s the Boss?

UDIC Presentation

whole lots of issues
Whole lots of issues

UDIC Presentation

some issues
Some Issues
  • Effective use of smart spaces.
  • Invisibility.
  • Localized Scalability.
  • Privacy and Security.
  • Implementation Issues.
    • User Intent.
    • Cyber Foraging.
    • Client Thickness.
    • Context Awareness.

UDIC Presentation

our work problem space
Our Work : Problem Space
  • Pervasive computing systems developed till now are ad-hoc.
  • Isolated Autonomous systems.
  • There is lots of information present on web which is not organized and utilized by us.

UDIC Presentation

scenario 1
Scenario 1

Mr. X

His Boss

Office

Hospital

Club

UDIC Presentation

our work vision
Our Work : Vision
  • Humans, devices and abstract concepts … all will have unique identity.
  • Using power of semantic web to share information over the web, protecting privacy of individual at the same time.

UDIC Presentation

our work concept
Our Work : Concept

AS Head

Unit2

Device1

Unit1

Unit3

Device3

AutonomousSystem

Device2

UDIC Presentation

our work concept1
Our Work : Concept

AS Head

AS Head

AS Head

UDIC Presentation

our work identity
Our Work : Identity
  • Every Autonomous system will have unique URI (ex: uri://umkc.edu/AS1)
  • One can extend the URI within the AS
    • EX(uri://umkc.edu/AS1/G1) (uri://umkc.edu/AS1/G2)
  • Every sensor device will have ID
    • URI (ex: uri://umkc.edu/AS1/G1/S1)

UDIC Presentation

our work semantic web
Our Work : Semantic Web
  • Each type specification will point to a rich semantic description on the semantic web
  • Has information like
    • Functionalities
    • Technical details
    • Inputs/Outputs

UDIC Presentation

our work pervasive profile
Our Work : Pervasive Profile
  • Profile has all user information has security policies
  • Personal profile has a unique URI
  • Personal server can be any device which can give me profile URI

UDIC Presentation

our work pervasive authentication
Our Work : Pervasive Authentication
  • Biometric authentication
  • Pervasive profile gives user authentication inputs
  • Global identity/ Local authentication

UDIC Presentation

our work pervasive service
Our Work : Pervasive Service
  • New concept – Pervasive services.
  • These are the services which are described on the web. If you want to implement them you just need to get the description at your end and you will be ready to use this service.

UDIC Presentation

our work pervasive service1
Our Work : Pervasive Service
  • Semantic Service descriptions on semantic web with the URI
  • Analogous to DAML-S descriptions
  • Dynamically configurable services
    • Example “Pervasive Buddies”

UDIC Presentation

our work conclusion
Our Work : Conclusion
  • This approach is on an abstract level
  • Global pervasive computing woven across semantic web
  • Make sensors do basic work, while managers interpret the semantics and drive the sensors together to provide service(s) within the AS.

UDIC Presentation

next steps
Next Steps
  • Current Pervasive Approaches – Frameworks / Tools
    • Project Oxygen (Project Oxygen,Computer Science and Artificial Intelligence Laboratory,MIT)
    • Project Aura ( CMU )
    • Project Cobra (eBiquity Research Group UMBC )

UDIC Presentation

next steps1
Next Steps
  • Device Ontology
    • Integrate with upper ontology – SUMO/CYC
  • User Profiles
    • Likes / Interests
  • Service Ontology
    • Service description / High-level language (scripting)

UDIC Presentation

next steps2
Next Steps
  • Semantic Web Pervasive Computing Framework
    • Service discovery
    • Service Composition/Matching
    • Device auto configuration
    • Autonomous system management
    • Policy enforcement
  • Security and Authentication
    • Biometric Authentication / profile access

UDIC Presentation

thank you
Thank You !!

UDIC Presentation