Pervasive Computing - PowerPoint PPT Presentation

About This Presentation
Title:

Pervasive Computing

Description:

... Pervasive Profile Profile has all user information has security policies Personal profile has a unique URI Personal server can be any device which can ... – PowerPoint PPT presentation

Number of Views:197
Avg rating:3.0/5.0
Slides: 23
Provided by: shp6
Learn more at: http://s.web.umkc.edu
Category:

less

Transcript and Presenter's Notes

Title: Pervasive Computing


1
Pervasive Computing
  • World tomorrow
  • -Sachin Singh
  • Sushil Puradkar
  • Mayura Bhandarkar
  • -Dikhsa Agarwal

2
Topics of Discussion
  • Introduction to Pervasive Computing.
  • Examples of Pervasive Computing.
  • Issues.
  • Our work.
  • Future plans

3
Introduction to Pervasive Computing
  • What is Pervasive Computing
  • The most profound technologies are those that
    disappear. They weave themselves into the fabric
    of everyday life until they are indistinguishable
    from it Mark Weiser
  • Example of pervasive technology Writing
  • Writing vs. current computer usage
  • What is not Pervasive Computing.
  • The ability to carry computers at beach, jungle
    or airport
  • Virtual reality A world inside computer

4
Example of Pervasive Computing.
  • Follow Me
  • Files, Music
  • Global Access
  • At home, In office, at KFC
  • Services
  • What can I do for you?
  • Know you know me
  • Whos the Boss?

5
Whole lots of issues
6
Some Issues
  • Effective use of smart spaces.
  • Invisibility.
  • Localized Scalability.
  • Privacy and Security.
  • Implementation Issues.
  • User Intent.
  • Cyber Foraging.
  • Client Thickness.
  • Context Awareness.

7
Our Work Problem Space
  • Pervasive computing systems developed till now
    are ad-hoc.
  • Isolated Autonomous systems.
  • There is lots of information present on web which
    is not organized and utilized by us.

8
Scenario 1
Mr. X
His Boss
Office
Hospital
Club
9
Our Work Vision
  • Humans, devices and abstract concepts all will
    have unique identity.
  • Using power of semantic web to share information
    over the web, protecting privacy of individual at
    the same time.

10
Our Work Concept
AS Head
Unit2
Device1
Unit1
Unit3
Device3
Autonomous System
Device2
11
Our Work Concept
AS Head
AS Head
AS Head
12
Our Work Identity
  • Every Autonomous system will have unique URI (ex
    uri//umkc.edu/AS1)
  • One can extend the URI within the AS
  • EX(uri//umkc.edu/AS1/G1) (uri//umkc.edu/AS1/G2)
  • Every sensor device will have ID
  • URI (ex uri//umkc.edu/AS1/G1/S1)

13
Our Work Semantic Web
  • Each type specification will point to a rich
    semantic description on the semantic web
  • Has information like
  • Functionalities
  • Technical details
  • Inputs/Outputs

14
Our Work Pervasive Profile
  • Profile has all user information has security
    policies
  • Personal profile has a unique URI
  • Personal server can be any device which can give
    me profile URI

15
Our Work Pervasive Authentication
  • Biometric authentication
  • Pervasive profile gives user authentication
    inputs
  • Global identity/ Local authentication

16
Our Work Pervasive
Service
  • New concept Pervasive services.
  • These are the services which are described on the
    web. If you want to implement them you just need
    to get the description at your end and you will
    be ready to use this service.

17
Our Work Pervasive
Service
  • Semantic Service descriptions on semantic web
    with the URI
  • Analogous to DAML-S descriptions
  • Dynamically configurable services
  • Example Pervasive Buddies

18
Our Work Conclusion
  • This approach is on an abstract level
  • Global pervasive computing woven across semantic
    web
  • Make sensors do basic work, while managers
    interpret the semantics and drive the sensors
    together to provide service(s) within the AS.

19
Next Steps
  • Current Pervasive Approaches Frameworks / Tools
  • Project Oxygen (Project Oxygen,Computer Science
    and Artificial Intelligence Laboratory,MIT)
  • Project Aura ( CMU )
  • Project Cobra (eBiquity Research Group UMBC )

20
Next Steps
  • Device Ontology
  • Integrate with upper ontology SUMO/CYC
  • User Profiles
  • Likes / Interests
  • Service Ontology
  • Service description / High-level language
    (scripting)

21
Next Steps
  • Semantic Web Pervasive Computing Framework
  • Service discovery
  • Service Composition/Matching
  • Device auto configuration
  • Autonomous system management
  • Policy enforcement
  • Security and Authentication
  • Biometric Authentication / profile access

22
Thank You !!
Write a Comment
User Comments (0)
About PowerShow.com