You are on page 1of 12

UBIQUITOUS COMPUTING

Presented By:

AKS ANUDEEP B ANIL KUMAR

III/IV CSE III/IV CSE


Krisdeep_sai@yahoo.co.in ani_battula@yahoo.com

ST ANNS college of Engineering &Technology


in operating systems, user interfaces,
networks, wireless, displays, and many
other areas. We call our work

ABSTRACT: “ubiquitous computing”.


This is different from PDA’s,
One is happy when one’s desires are
dynabooks, or information at your
fulfilled.
fingertips. It is invisible; everywhere
The highest ideal of ubicomp is to make
computing that does not live on a
a computer so imbedded, so fitting, so
personal device of any sort, but is in the
natural, that we use it without even
woodwork everywhere.
thinking about it. Pervasive computing is
Single-room networks based on infrared
referred as Ubiquitous computing
or newer electromagnetic technologies
through out the paper.
have enough channel capacity for
One of the goals of ubiquitous
ubiquitous computers, but they can only
computing is to enable devices to sense
work indoors.
changes in their environment and to
Cryptographic techniques already exist
automatically adapt and act based on
to secure messages from one ubiquitous
these changes based on user needs and
computer to another and to safeguard
preferences. The technology required for
private information stored in networked
ubiquitous computing comes in three
systems.
parts: cheap, low- power computers that
We suggest using cell phone device
include equally convenient displays, a
available in the market for ubicomp also
network that ties them all together, and
i.e., the handheld device will be used for
software systems implementing
both ubicomp and also as a cell phone.
ubiquitous applications. Current trends
suggest that the first requirement will
easily be met.
Our preliminary approach: Activate the
world. Provide hundreds of wireless
computing devices per person per office,
of all scales. This has required network
Contents:

 How Ubiquitous (pervasive) networking works.

 In the Zone.

 Ubi-Finger.

 Mouse Field.

 Information Hoppers and Smart Posters.

 Moving towards a future of Ubiquitous Computing using cell phones.

 Conclusion.

 Resources.

 Bibliography.
could locate both people and devices i.e.,
ultrasonic location system. This location
tracking system has three parts:
Bats: - small ultrasonic transmitters worn
How Ubiquitous Networking will
work: by users.
Receivers: - ultrasonic signal detectors
Ubicomp integrates computation into the
embedded in ceiling.
environment, rather than having
Central Controller: - coordinates the bats
computers, Which are distinct objects.
and receiver chains.
Another term for this ubicomp is
PERVASIVE COMPUTING.
This Ubicomp is roughly the opposite of
virtual reality. Where virtual reality puts
people inside a computer-generated world,
i.e., it forces the computer to live out here
in the world with people.
Ubiquitous computing encompasses a The figure of a Bat.
wide range of research topics, including
Users within the system will wear a bat, a
distributed computing, mobile computing,
small device that transmits a 48-bit code to
sensor networks, human-computer
the receivers in the ceiling. Bats also have
interaction, and artificial intelligence.
an embedded transmitter, which allows it
By using a small radio transmitters and a
to communicate with the central controller
building full of special sensors, your
using a bi-directional 433-MHz radio link.
desktop can be anywhere you are. At the
Bats are about the size of a paper. These
press of a button, the computer closest to
small devices are powered by a single 3.6-
you in any room becomes your computer
volt lithium thionyl chloride battery, which
for long as you need it.
has a lifetime of six months. The devices
also contain two buttons, two light-
In the Zone:
emitting diodes and a piezoelectric
In order for a computer program to track speaker, allowing them to be used as
its user a system should be developed that
ubiquitous input and output devices, and a
voltage monitor to check the battery status. The central controller measures the time it
looks for that pulse to reach the receiver.
A bat will transmit an ultrasonic signal, Since the speed of sound at which the
which will be detected by receivers located ultrasonic pulse reached three other
in the ceiling approximately 4 feet apart in sensors.
a square grid. If a bat needs to be located, By finding the position of two or more
the central controller sends the bats ID bats, the system can determine the
over a radio link to the bat. The bat will orientation of a bat. The central control
detect its ID and send out an ultrasonic
pulse.
can also determine which way a person is uses a spatial monitor to detect if a user’s
facing by analyzing the pattern of zone overlaps with the zone of a device.
receivers that detected the ultrasonic signal Computer desktops can be created that
and the strength of the signal. actually follow their owners anywhere
The central controller crates a with in the system just by approaching any
zone around every person and object computer display in the building, the bat
within the location system. The computer can enable the virtual network computing
desktop to appear on that display.
Ubi-Finger:

Here, in contrast, Ubi-Finger is the


gesture-i/p device, which is simple,
compact and optimized for mobile use.

By pointing a light and making a


The light will turn on!
gesture like “push a switch”.
Figure. 1 An example to control Home Appliances
As shown in Fig. 2, Ubi-Finger consists of
follows: (1) a bending degree of the index
three sensors to detect gestures of fingers,
finger, (2) tilt angles of the wrist, (3)
an infrared transmitter to select a target
operations of touch sensors by a thumb.
device in real world and a microcomputer
We use (1) and (2) for recognition of
to control these sensors and communicate
gestures, and use (3) for the trigger
with a host computer. Each sensor
mechanism to start and stop
generates the information of motions as

gesture recognition.

Mouse Field:
simple for performing rich interaction, and
Although various interaction technologies
others require special expensive
for handling information in the ubiquitous
equipments to be installed everywhere,
computing environment have been
proposed, some technologies are too
and cannot soon be available in our A mouse field consists of an ID recognizer
everyday environment. Here there is a new and motion sensors that can detect an
object and its movement after the object is
placed on it. The system can interpret the
user’s action as a command to control the
simple and versatile i/p device called the flow of information.
Mouse Field, which enables users to
control various information applications
easily without huge amount of cost.

"Placing" (detecting an object) @ "Moving" (detecting its movement)

Fig. 1. Basic concept of Mouse Field

Mouse Field is a device which combines USB cable, and they can detect the ID and
an ID reader and motion sensing devices the motion of the object put on the device.
into one package. Fig. 2 shows an When a user puts an object with an RFID
implementation of Mouse Field, which on the Mouse Field, it first detects what
consist of two motion sensors and an was kept on the RFID reader. When the
RFID reader hidden under the surface. use moves or rotates the object, motion
The RFID reader and the two optical sensor detects the direction and rotation of
mouses are connected to a PC through a the object.
Front view Back view
Fig. 2 Implementation of a Mouse Field Device.
Fig: 3 shows how a user can enjoy music using a Mouse Field and CD jackets which
represent the music in the CD. All the music in the CD is saved in a music server, and an
RFID tag is attached to each jacket.

Fig. 3. A Music Player with Mouse


Fig. 4. Controlling the Music Player
Field.

These are used to control various parameters without special parameters.


Information Hoppers and Smart is pressing the poster’s button. Posters can

Posters: be created with several buttons on it.


Ultrasonic location systems will require us
Once these zones are setup, computers on
to think outside of the box. Traditionally,
the network will have some interesting
we have used our files, and we may back
capabilities. The system will help to store
up these files on a network server. This
and retrieve data in an Information hopper.
ubiquitous network will enable all
This is a timeline of information that keeps
computers in a building to transfer
track of when data is created. The hopper
ownership and store all our files in a
knows who created it, where they were
central timeline.
and who they were with.
Another application that will come out of Moving toward a future of
this ultrasonic location system is the smart Ubiquitous Computing:
poster. We suggest a new method to carry all of
A convention computer interface requires your personal media with you in a
us to click on a button on your computer convenient pocket form factor, and have
screen. In this new system, a button can be wireless access to it when standing in front
placed anywhere in your workplace, not of a PC, kiosk, or large display, anywhere
just on the computer display. The idea in the world that might significantly
behind smart posters is that a button can be improve your mobile computing
a piece of paper that is printed out and experience.
struck on a wall. Intel researchers are developing a new
Smart posters will be used to control any class of mobile device that leverages
device that is plugged into the network. advances in processing, storage, and
The poster will know where to send a file communications technologies to provide
and a user’s preferences. Smart posters ubiquitous access to personal information
could also be used in advertising new and applications through the existing fixed
services. To press a button on a smart infrastructure. The device, called a
poster, a user will simply place his or her personal server is a small, lightweight
bat in the smart poster button and click the computer with high-density data storage
bat. The system automatically knows who capability. It requires no display, so it can
be smaller than a typical PDA. A wireless
interface enables the user to access content
stored in the device through whatever
displays are available in the local
environment. For example, in the digital
home, the personal server could wirelessly
stream audio and video stored on the
device to a PC or digital home TV.
The technology to enable these scenarios
and more is now being explored.

Resources : .
 Ubiquitous Bio-Information Computing (UBIC 2)
 Application Coordination Infrastructure for Ubiquitous Computing Rooms
 What is Ubiquitous Computing? – Overview and resources.
 How Ubiquitous Networking will work by Kevin Bensor.
 Panasonic Center: Realizing a Ubiquitous network society.
 Ubiquitous Computing Management Architecture.
 Introduction to UC.
 UC in Education.
 Designing Ubiquitous Computer – Resources.
Research works on UC:
 Ichiro Satoh’s Research work on UC.
 Bill Schilit’s work on UC.
 Matthias Lampe’s work on UC.
 Pekka Ala – Siuru’s work on UC.
 Louise Barkhuus’s work on UC.
 George Roussos’s work on ubiquitous commerce.
 Dr. Albrecht Schmidt’s Research work on Ubiquitous Computing.
UC Research:
 Research in UC and Applications at University of California, Irvine.
 Fuego: Future Mobile and Ubiquitous Computing Research.
 The Ubiquitous Computing Research Group at the University of Victoria.
 Computing Department Research themes – Mobile and Ubiquitous computing.
 Research in Ubiquitous Computing.
 GGF Ubiquitous Computing Research Group.
 Distributed Software Engineering Group Research into Ubiquitous Computing.
 Mobile Ubiquitous Security Environment (MUSE).

Conclusion:

We are moving toward a future in which in order to enable “anytime, anywhere”


computing will be ubiquitous, woven computing.
seamlessly into the fabric of everyday life. To make ubiquitous computing a reality
Researchers are engaged in several will require the collaboration of
projects to explore technologies and usage researchers in a broadband of disciplines,
models for everyday uses of computing. In within computer science and beyond.
their research, they are addressing
fundamental issues that must be resolved

Bibliography:

• www.ubiq.com
• www.ubiqcomputing.org

• www.teco.edu

• www.searchnetworking.techtarget.com

You might also like