Pervasive Computing

Pervasive computing is the trend of ubiquitous (another name for the movement is ubiquitous computing), connected computing devices in the environment, the trend is brought about by the convergence of advanced electronic - and particularly, wireless - technologies iInterneta. Pervasive computing devices are not personal computers as we tend to think about them, but very tiny - even invisible - devices, or mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various items consumer goods - all communicating through multiple interconnected networks.

Modern devices that may serve the ubiquitous computing model include mobile phones, digital audio player, radio-frequency identification tags and interactive whiteboards. Other terms for ubiquitous computing include pervasive computing, calm technology, things that think, everyware, and more recently, the ubiquitous Internet.

Ubiquitous computing encompasses a wide range of research topics, including distributed computing, mobile computing, sensor networks, human-computer interaction and artificial intelligence.

History

Pervasive computing is the third wave of computing technologies to emerge since the computers first appeared:

The First Wave - Mainframe computing time: one computer shared by many people, via

jobs.

A second wave - Personal computing era: one computer used by one person, requiring a

conscious interaction. Users generally tied to your desktop.


A third wave - Pervasive (initially called ubiquitous) computing era: one person, many

BACKGROUND

eight billion embedded microprocessors are produced each year. This number is expected to grow dramatically over the next decade, making electronic devices ever more pervasive. These devices will range from a few millimeters in size (small sensors) to several meters (displays and surfaces). They can be connected via wired and wireless technologies into broader, more capable, networks. Pervasive computing systems and services can lead to a greater degree of knowledge, or control over, the environment, either at home or in the office or car.There are calls for even wider debate on the implications of pervasive computing, while it is still in its early stages.

pervasive computing technologies

Pervasive computing technologies classified in four areas of convergence

- Mobile Computing

- Embedded and Applied Computing

- RFID and sensors

- Mobile and sensor networking

Mobile computing

The widespread use of mobile computing devices has changed the way people evaluate and considerably expanded field of research in distributed computing and networking. In fact, traditional distributed computing is actually a subset of the broad area of ​​mobile computing. Many topics in "mature" areas like distributed databases, distributed fault tolerance, resource management and now require much additional study, because many traditional assumptions challenged. Mobile computers operate in hostile environments, are resource-constrained (limited power, frequent disconnection), and peripheral-poor.

mobile computing is changing the way we live and work as deep as the introduction of the automobile did almost a century ago. Key advances in mobile networking, wireless connectivity, mobile information access, content adaptation, data synchronization, technology for laptops and portable, and innovative mobile e-business solutions have come from the world of research labs ..

Some of the recent research in mobile computing includes:

bearing show athletes STATISTICS

SKYSCOUT

If you ever looked into the night sky and wondered what you were watching the stars, the Celestron SkyScout might be for you. Especially useful for beginners astronomers, this handheld device combines GPS technology to map the sky to identify, locate, and provide information about celestial bodies. To identify the object of interest, simply look through the SkyScout and press the Identify button. SkyScout technology identifies the object and tells you what it is. To locate a celestial body, you can choose from the menu is pretty easy tous facilities and press Find. SkyScout uses red arrows around the eyepiece to guide you to the object in the sky. nice feature is that the menu shows only objects that should be visible. (Unfortunately, Sky-Scout has no way to know which of these objects are blocked by trees). Finally, the device can educate you on many of the more popular celestial objects. information is available via audio and text and includes facts about the building and its history and mythology. SkyScout release was delayed in 2006 due to problems in the production of one of the components.

Nokia Nseries phones,

Nokia has announced three new mobile phones in its multimedia Nseries, each targeting different market segments. N71, N80, N92, and offers a long list of features. N71, the Nokia XpressMusic family, offers a stereo FM tuner, five-band equalizer, and support for audio and video formats, including MP3, AAC, eAAC +, WMA, JPEG and MPEG-4. It offers a 240 _ 320-pixel resolution and two cameras, a 2-megapixel (1600 _ 1200 pixel), a second VGA (640 _ ​​480 pixels). It operates on dual-mode wideband code division multiple access (WCDMA) / GSM and triband GSM. N80 offers a 352 _ 416-pixel resolution and 3-megapixel camera with features including four flash modes, 10 scene modes, manual exposure, and four color tones.

Embedded and Applied Computing

Embedded and ubiquitous computing is an exciting new paradigm that provides computing and communication services all the time and everywhere. Its systems are now affecting every aspect of our lives to the point that they are hidden inside various appliances. This phenomenon is a natural result of research and technological advances in embedded systems. Embedded Pervasive computing environment is equipped with hardware and software components that autonomously respond to the needs of its users. Built-in system is an essential part of pervasive computing and is engaged in various applications like wearable computer architecture and applications, sensor networks in real-time embedded operating systems, embedded servers, embedded system networking, address without routing, smart spaces, dynamic service discovery, mobility and case studies. Some of the on-going research in embedded systems are:

Rollable DISPLAY

Who has not dreamed of a screen that rolls up when not in use? Phillips is one step toward that dream on a commercial scale when it formed venture company Polymer Vision in January 2004. Polymer Vision recently reported that it can make a flexible display with a 2 cm bending radius. view of organic based, QVGA (320   240 pixels) active matrix display, 5 in. on the diagonal and 85 dpi. display the 200-micron layers, reflective Electronic-Ink display from E Ink Corporation (www.eink.com) on top of 25-micron, active-matrix plane.

using the fixed to mobile COMPETITIONS

Xcelis (www.xcelis.com) has developed innovative products for connecting mobile and landline handset. Pantheon (see Figure 3) plugs into a landline phone line and using a Bluetooth connection, routes incoming and outgoing voice calls and data from users cell phones to their landline handsets. Pantheon indicates incoming mobile calls with distinctive ring. While the mobile call is in progress, does not tie up a landline, which means that you can still receive calls via landline to other phones.
You have one device for each landline telephone that you want to multiplex. When calling from a fixed, you can choose to use your cell phone or landline account. Pantheon provides additional features, including a conference call landline and mobile calls, access to user's mobile phone directory from a fixed phone, and switching mid-call from a landline phone to a mobile phone. Pantheon is also compatible with IP handsets.

BIONIC ARM

Todd Kuiken at the Rehabilitation Institute of Chicago in the north-Feinberg School of Medicine has developed a thought-powered bionic arm. hand based on the pioneering muscle reinnervation procedure that takes amputee's nerves and are associated with healthy muscle. Doctors are the nerves that used to go to the hands and bind them to the chest muscles. nerves grow into the chest muscles and can contract the muscle when the patient thinks, for example, "Close hand." Electrical signals from the chest muscles drive the hands. Surface electrodes sense these impulses from the pectoral muscle and to implement them on the arm, causing it to move. Jesse Sullivan, a high-power lineman who had both hands amputated after hard power, the first patient to be fitted with bionic arms. His hands were allowed to daily activities, such as put on socks, shave, eat dinner, take out the garbage, carry groceries, and vacuum. Future generations arm will incorporate the sense of touch and feeling.

Mobile and sensor networking

Sensor mobility allows better coverage in areas where events occur frequently in many sensor networks, considerably more units are available than necessary for simple coverage area. The increase in sensor networks with motion can use that surplus to improve research, and also improves the network lifetime and reliability. When major incidents such as fire or chemical spill occurs, several sensors can cluster around that incident. It provides good coverage of the event and provides immediate redundancy in case of failure another use of mobility occurs when a particular area of interest (within the larger area) is unknown during deployment. For example, if the network is deployed to monitor the migration herds of animals, herd the exact route through the area will be unknown in advance. But as the herd moves, the sensors could not connect to it to get the maximum amount of data. In addition, the sensors could move such that they also maintain complete coverage of their environment and react to events in that environment. In this way, at least one sensor still detects any events that occur in isolation, while several sensors more carefully observe dense clusters of events. On going researches in sensor networking includes:

WORLD Broadband Wireless Access

option offers PC data card that can access wireless broadband worldwide. You can use the Globetrotter GT Max 850, 1900 or 2100 MHz HSDPA / UMTS (High-speed downlink Packet Access / Universal Mobile Telecommunications System) networks, and 850, 900, 1800 or 1900 MHz EDGE / GPRS (General Packet Radio Service) bands. The card supports data rates up to 1.8 megabits per second on HSDPA networks, 384 kilobits per second on UMTS networks, 247 kb / s on EDGE networks, and 85 Kbps on GPRS networks. It is a type II PCMCIA (Personal Computer Memory Card International Association)-compliant 3.3-V PC card and includes the novel "Butterfly" retractable antenna that does not require users to remove the card when not in use. Numerous wireless carriers offer the card, including Cingular, which recently announced it will offer it under two plans. One plan will cost users $ 110 per month and includes unlimited use of data in the U.S. and 100 Mbytes of downloads in Canada and Mexico. second plan would cost $ 140 and will include unlimited use in the U.S. and 100 Mbytes of downloads in 24 countries, including Australia, China, France, Italy and Germany.

self-cleaning house of the future

house of the future will not need cleaning. No of people in extreme circumstances. Each surface will be dirt-repellent and antibacterial, and on the floor vacuum cleaner is buzzing about - all on your own. The exterior walls are all glass which can be displayed fully outside and inside surface is used as a TV screen. scenario self-cleaning house belongs to the distant future, perhaps 20 years from now. With the rapidly increasing development of nanotechnology we have seen in recent years, it is not easy to predict a specific time period and it will be not only self-cleaning and self-sufficient, energy wise. Today, Australians are already experimenting with nanoglass-houses in which glass can be treated with a pigmented coating rendering the entire house non-transparent - the roof included

.

WALL SENSORS

House of the future will be capable of alerting its owner if it is need of repair. The building materials will, of course, be susceptible to wear and tear due to wind and weather, and they will therefore have a built-in sensors. When these sensors appear, the computer houses will get a message that this particular piece needs repair. various conditions follow similarly. In this way, owners can cheaply repair worn materials and avoid major, costly repairs after the damage has been done.

INTELLIGENT HOUSE

RFID and Sensors

Radio Frequency Identification (RFID) technology uses radiofrequency waves to transfer data between readers and movable tagged objects without line of sight. RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects, and can be used for a wide range of pervasive computing applications. To achieve these goals, RFID data must be collected, transformed and expressively modeled as their virtual counterparts in the virtual world. RFID data, however, have their own unique features - including aggregation, location, time and history-oriented - which must be taken fully into account and integrated into the data model. The diversity of RFID applications are further challenges the general framework for RFID data modeling. Today, Radio Frequency Identification enjoys great interest as the first widely deployed pervasive technology not only from the standpoint of research
but also from the practice of corporate future. Some of the newer research in RFID technology are:

tags EVERYWHERE

Ubiquitous ID Center provides the infrastructure for managing electronic tags embedded in or attached to objects in the ubiquitous environment. Center has developed the ucode, multicode tag that automatically identifies information stored in bar codes, RFID chips, smart cards and electronic tags embedded in virtual entities such as software and electronic money. Comparable with the ISBN (International Standard Book Numbers) code used in the publishing industry, UID Center assigns a unique number for each tag and stores data pertaining to an object in the database server. ucode tags use 128-bit code which can be extended to 128-bit units, creating virtually limitless range of issues. To navigate this tagged environment, the Center has developed UID Ubiquitous Communicator, PDA-like device that reads ucode tags and retrieves relevant data from the UID Center database server. standard UC has a range of options, including wireless LAN, Voice over Internet Protocol, infrared data, and biometric reader. In addition to PDA-like version, the UID Center has developed a model cell phones and watch style. At home, she will serve as a remote control for home entertainment systems and devices. In the office, this printer will read the tag and order a replacement cartridge if necessary

of UPC TO RFID

Smart packaging became a possibility with the introduction of small battery-free microprocessors called RFID (Radio Frequency Identification Device) tags. Although they are commercially available for several years, they are too clunky and too expensive for use in packaging. This situation is changing rapidly: industry experts predict that the price per tag will fall below 10 cents each in the course of five years or so. A new generation of RFID tags can be in the form of a sticker like the classic bar codes, or can be directly integrated into the packaging material itself. They consist of a silicon microprocessor and some form of radio antennas - conductive carbon ink replaces the more expensive metal coil earlier types of tags. This works as a radio antenna and input / output channels and a power source. Electricity is generated in the antenna of any magnetic field or radio signal, the label corresponds to sending out radio signals in a row. This reply signal contains metadata stored on the chip, usually a personal identification number with the help of RFID readers -. in our cell phones, in supermarket freezers and check-out, in our private fridges - we'll be able to retrieve information about a particular item based on the ID number. In fact, the first mobile phones with built-in readers, based on NFC (Near Field Communication) technology, are already on the market.

the next generation of TAGS

Smart tags which will soon begin replacing bar codes in our supermarkets are actually pretty dumb: their only ability is reciting their ID code on command. With the next generation of MEMS tags, the epithet of 'smart'would be more fitting. MEMS (Micro Electro Mechanical Systems) tags are able to perform measurements and calculations. MEMS tags are especially interesting in conjunction with highly perishable commodities like milk and meat. Studies have shown that the 'sell by' date on such products is dubious at best: milk only stays fresh until a certain date as long as it is stored in the right temperature. Storage is a key concept here, for example, that the temperature in around one fifth of the meat and dairy cases in American supermarkets is three or four degrees too high. And what happens when we leave the milk on the kitchen counter all morning? MEMS tags in smart packages will be able to take milk temperature every fifteen minutes. The measurements are then sent to a small microprocessor that calculates the estimated freshness of milk.

FOOD SAFETY

cooler in the future will be a door with a built-in scanner for reading digital tags on food packages. In this way refrigerator will always keep abreast of what is put into it, a screen door can provide an overview of what's behind the door. By scanning all foodstuffs, you'll always have an updated list of current supplies - canned and frozen food included. In other words: refrigerator comes to play the part of digital administrator of the kitchen. If you eg keep food approaching expiration date, fridge will alert you. product can then be used at once, and you avoid having to throw away food. screen is connected to the Internet, and every chip tagged to the packaging will represent a Web page that can be visited as a refrigerator and food products are kept away. Thus, one can check for any warnings issued for this product. We all remember instances of contaminated food which, undetected by producers, ended up in supermarkets, and thus the domestic refrigerator or freezer. In such cases, a warning from the refrigerator could reduce the risk considerably. Since the refrigerator is often done automatically checks on the net, users are no longer dependent on radio and TV warnings.

0 komentar:

Posting Komentar