Download
pervasive computing n.
Skip this Video
Loading SlideShow in 5 Seconds..
Pervasive Computing PowerPoint Presentation
Download Presentation
Pervasive Computing

Pervasive Computing

236 Vues Download Presentation
Télécharger la présentation

Pervasive Computing

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Pervasive Computing World tomorrow… -Sachin Singh • Sushil Puradkar • Mayura Bhandarkar -Dikhsa Agarwal UDIC Presentation

  2. Topics of Discussion • Introduction to Pervasive Computing. • Examples of Pervasive Computing. • Issues. • Our work. • Future plans UDIC Presentation

  3. Introduction to Pervasive Computing • What is Pervasive Computing • “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” – Mark Weiser • Example of pervasive technology – “Writing” • Writing vs. current computer usage • What is not Pervasive Computing. • The ability to carry computers at beach, jungle or airport • Virtual reality – ‘A world inside computer’ UDIC Presentation

  4. Example of Pervasive Computing. • Follow Me • Files, Music … • Global Access • At home, In office, at KFC … • Services • What can I do for you? • Know you know me • Who’s the Boss? UDIC Presentation

  5. Whole lots of issues UDIC Presentation

  6. Some Issues • Effective use of smart spaces. • Invisibility. • Localized Scalability. • Privacy and Security. • Implementation Issues. • User Intent. • Cyber Foraging. • Client Thickness. • Context Awareness. UDIC Presentation

  7. Our Work : Problem Space • Pervasive computing systems developed till now are ad-hoc. • Isolated Autonomous systems. • There is lots of information present on web which is not organized and utilized by us. UDIC Presentation

  8. Scenario 1 Mr. X His Boss Office Hospital Club UDIC Presentation

  9. Our Work : Vision • Humans, devices and abstract concepts … all will have unique identity. • Using power of semantic web to share information over the web, protecting privacy of individual at the same time. UDIC Presentation

  10. Our Work : Concept AS Head Unit2 Device1 Unit1 Unit3 Device3 AutonomousSystem Device2 UDIC Presentation

  11. Our Work : Concept AS Head AS Head AS Head UDIC Presentation

  12. Our Work : Identity • Every Autonomous system will have unique URI (ex: uri://umkc.edu/AS1) • One can extend the URI within the AS • EX(uri://umkc.edu/AS1/G1) (uri://umkc.edu/AS1/G2) • Every sensor device will have ID • URI (ex: uri://umkc.edu/AS1/G1/S1) UDIC Presentation

  13. Our Work : Semantic Web • Each type specification will point to a rich semantic description on the semantic web • Has information like • Functionalities • Technical details • Inputs/Outputs UDIC Presentation

  14. Our Work : Pervasive Profile • Profile has all user information has security policies • Personal profile has a unique URI • Personal server can be any device which can give me profile URI UDIC Presentation

  15. Our Work : Pervasive Authentication • Biometric authentication • Pervasive profile gives user authentication inputs • Global identity/ Local authentication UDIC Presentation

  16. Our Work : Pervasive Service • New concept – Pervasive services. • These are the services which are described on the web. If you want to implement them you just need to get the description at your end and you will be ready to use this service. UDIC Presentation

  17. Our Work : Pervasive Service • Semantic Service descriptions on semantic web with the URI • Analogous to DAML-S descriptions • Dynamically configurable services • Example “Pervasive Buddies” UDIC Presentation

  18. Our Work : Conclusion • This approach is on an abstract level • Global pervasive computing woven across semantic web • Make sensors do basic work, while managers interpret the semantics and drive the sensors together to provide service(s) within the AS. UDIC Presentation

  19. Next Steps • Current Pervasive Approaches – Frameworks / Tools • Project Oxygen (Project Oxygen,Computer Science and Artificial Intelligence Laboratory,MIT) • Project Aura ( CMU ) • Project Cobra (eBiquity Research Group UMBC ) UDIC Presentation

  20. Next Steps • Device Ontology • Integrate with upper ontology – SUMO/CYC • User Profiles • Likes / Interests • Service Ontology • Service description / High-level language (scripting) UDIC Presentation

  21. Next Steps • Semantic Web Pervasive Computing Framework • Service discovery • Service Composition/Matching • Device auto configuration • Autonomous system management • Policy enforcement • Security and Authentication • Biometric Authentication / profile access UDIC Presentation

  22. Thank You !! UDIC Presentation