Professional Documents
Culture Documents
Presented By:
In the Zone.
Ubi-Finger.
Mouse Field.
Conclusion.
Resources.
Bibliography.
could locate both people and devices i.e.,
ultrasonic location system. This location
tracking system has three parts:
Bats: - small ultrasonic transmitters worn
How Ubiquitous Networking will
work: by users.
Receivers: - ultrasonic signal detectors
Ubicomp integrates computation into the
embedded in ceiling.
environment, rather than having
Central Controller: - coordinates the bats
computers, Which are distinct objects.
and receiver chains.
Another term for this ubicomp is
PERVASIVE COMPUTING.
This Ubicomp is roughly the opposite of
virtual reality. Where virtual reality puts
people inside a computer-generated world,
i.e., it forces the computer to live out here
in the world with people.
Ubiquitous computing encompasses a The figure of a Bat.
wide range of research topics, including
Users within the system will wear a bat, a
distributed computing, mobile computing,
small device that transmits a 48-bit code to
sensor networks, human-computer
the receivers in the ceiling. Bats also have
interaction, and artificial intelligence.
an embedded transmitter, which allows it
By using a small radio transmitters and a
to communicate with the central controller
building full of special sensors, your
using a bi-directional 433-MHz radio link.
desktop can be anywhere you are. At the
Bats are about the size of a paper. These
press of a button, the computer closest to
small devices are powered by a single 3.6-
you in any room becomes your computer
volt lithium thionyl chloride battery, which
for long as you need it.
has a lifetime of six months. The devices
also contain two buttons, two light-
In the Zone:
emitting diodes and a piezoelectric
In order for a computer program to track speaker, allowing them to be used as
its user a system should be developed that
ubiquitous input and output devices, and a
voltage monitor to check the battery status. The central controller measures the time it
looks for that pulse to reach the receiver.
A bat will transmit an ultrasonic signal, Since the speed of sound at which the
which will be detected by receivers located ultrasonic pulse reached three other
in the ceiling approximately 4 feet apart in sensors.
a square grid. If a bat needs to be located, By finding the position of two or more
the central controller sends the bats ID bats, the system can determine the
over a radio link to the bat. The bat will orientation of a bat. The central control
detect its ID and send out an ultrasonic
pulse.
can also determine which way a person is uses a spatial monitor to detect if a user’s
facing by analyzing the pattern of zone overlaps with the zone of a device.
receivers that detected the ultrasonic signal Computer desktops can be created that
and the strength of the signal. actually follow their owners anywhere
The central controller crates a with in the system just by approaching any
zone around every person and object computer display in the building, the bat
within the location system. The computer can enable the virtual network computing
desktop to appear on that display.
Ubi-Finger:
gesture recognition.
Mouse Field:
simple for performing rich interaction, and
Although various interaction technologies
others require special expensive
for handling information in the ubiquitous
equipments to be installed everywhere,
computing environment have been
proposed, some technologies are too
and cannot soon be available in our A mouse field consists of an ID recognizer
everyday environment. Here there is a new and motion sensors that can detect an
object and its movement after the object is
placed on it. The system can interpret the
user’s action as a command to control the
simple and versatile i/p device called the flow of information.
Mouse Field, which enables users to
control various information applications
easily without huge amount of cost.
Mouse Field is a device which combines USB cable, and they can detect the ID and
an ID reader and motion sensing devices the motion of the object put on the device.
into one package. Fig. 2 shows an When a user puts an object with an RFID
implementation of Mouse Field, which on the Mouse Field, it first detects what
consist of two motion sensors and an was kept on the RFID reader. When the
RFID reader hidden under the surface. use moves or rotates the object, motion
The RFID reader and the two optical sensor detects the direction and rotation of
mouses are connected to a PC through a the object.
Front view Back view
Fig. 2 Implementation of a Mouse Field Device.
Fig: 3 shows how a user can enjoy music using a Mouse Field and CD jackets which
represent the music in the CD. All the music in the CD is saved in a music server, and an
RFID tag is attached to each jacket.
Resources : .
Ubiquitous Bio-Information Computing (UBIC 2)
Application Coordination Infrastructure for Ubiquitous Computing Rooms
What is Ubiquitous Computing? – Overview and resources.
How Ubiquitous Networking will work by Kevin Bensor.
Panasonic Center: Realizing a Ubiquitous network society.
Ubiquitous Computing Management Architecture.
Introduction to UC.
UC in Education.
Designing Ubiquitous Computer – Resources.
Research works on UC:
Ichiro Satoh’s Research work on UC.
Bill Schilit’s work on UC.
Matthias Lampe’s work on UC.
Pekka Ala – Siuru’s work on UC.
Louise Barkhuus’s work on UC.
George Roussos’s work on ubiquitous commerce.
Dr. Albrecht Schmidt’s Research work on Ubiquitous Computing.
UC Research:
Research in UC and Applications at University of California, Irvine.
Fuego: Future Mobile and Ubiquitous Computing Research.
The Ubiquitous Computing Research Group at the University of Victoria.
Computing Department Research themes – Mobile and Ubiquitous computing.
Research in Ubiquitous Computing.
GGF Ubiquitous Computing Research Group.
Distributed Software Engineering Group Research into Ubiquitous Computing.
Mobile Ubiquitous Security Environment (MUSE).
Conclusion:
Bibliography:
• www.ubiq.com
• www.ubiqcomputing.org
• www.teco.edu
• www.searchnetworking.techtarget.com