pervasive computing
DESCRIPTION
Pervasive Computing. World tomorrow…. - Sachin Singh Sushil Puradkar Mayura Bhandarkar -Dikhsa Agarwal. Topics of Discussion. Introduction to Pervasive Computing. Examples of Pervasive Computing. Issues. Our work. Future plans. Introduction to Pervasive Computing. - PowerPoint PPT PresentationTRANSCRIPT
UDIC Presentation
Pervasive Computing World tomorrow…
-Sachin Singh
-Sushil Puradkar
-Mayura Bhandarkar
-Dikhsa Agarwal
UDIC Presentation
Topics of Discussion
Introduction to Pervasive Computing.
Examples of Pervasive Computing. Issues. Our work. Future plans
UDIC Presentation
Introduction to Pervasive Computing
What is Pervasive Computing “The most profound technologies are those that
disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” – Mark Weiser
Example of pervasive technology – “Writing” Writing vs. current computer usage
What is not Pervasive Computing. The ability to carry computers at beach, jungle or
airport Virtual reality – ‘A world inside computer’
UDIC Presentation
Example of Pervasive Computing. Follow Me
Files, Music … Global Access
At home, In office, at KFC … Services
What can I do for you? Know you know me
Who’s the Boss?
UDIC Presentation
Whole lots of issues
UDIC Presentation
Some Issues
Effective use of smart spaces. Invisibility. Localized Scalability. Privacy and Security. Implementation Issues.
User Intent. Cyber Foraging. Client Thickness. Context Awareness.
UDIC Presentation
Our Work : Problem Space
Pervasive computing systems developed till now are ad-hoc.
Isolated Autonomous systems. There is lots of information present
on web which is not organized and utilized by us.
UDIC Presentation
Scenario 1
Mr. X
His Boss
Office
Club
Hospital
UDIC Presentation
Our Work : Vision
Humans, devices and abstract concepts … all will have unique identity.
Using power of semantic web to share information over the web, protecting privacy of individual at the same time.
UDIC Presentation
Our Work : Concept
Autonomous System
Unit1
Unit2
Unit3
AS Head
Device1
Device2
Device3
UDIC Presentation
Our Work : Concept
AS Head AS Head
AS Head
UDIC Presentation
Our Work : Identity
Every Autonomous system will have unique URI (ex: uri://umkc.edu/AS1)
One can extend the URI within the AS EX(uri://umkc.edu/AS1/G1)
(uri://umkc.edu/AS1/G2) Every sensor device will have ID
URI (ex: uri://umkc.edu/AS1/G1/S1)
UDIC Presentation
Our Work : Semantic Web Each type specification will point to
a rich semantic description on the semantic web
Has information like Functionalities Technical details Inputs/Outputs
UDIC Presentation
Our Work : Pervasive Profile
Profile has all user information has security policies
Personal profile has a unique URI Personal server can be any device
which can give me profile URI
UDIC Presentation
Our Work : Pervasive
Authentication
Biometric authentication Pervasive profile gives user
authentication inputs Global identity/ Local
authentication
UDIC Presentation
New concept – Pervasive services. These are the services which are
described on the web. If you want to implement them you just need to get the description at your end and you will be ready to use this service.
Our Work : Pervasive Service
UDIC Presentation
Semantic Service descriptions on semantic web with the URI
Analogous to DAML-S descriptions Dynamically configurable services
Example “Pervasive Buddies”
Our Work : Pervasive Service
UDIC Presentation
This approach is on an abstract level
Global pervasive computing woven across semantic web
Make sensors do basic work, while managers interpret the semantics and drive the sensors together to provide service(s) within the AS.
Our Work : Conclusion
UDIC Presentation
Next Steps
Current Pervasive Approaches – Frameworks / Tools Project Oxygen (Project Oxygen,
Computer Science and Artificial Intelligence Laboratory,MIT)
Project Aura ( CMU ) Project Cobra (eBiquity
Research Group UMBC )
UDIC Presentation
Next Steps
Device Ontology Integrate with upper ontology –
SUMO/CYC User Profiles
Likes / Interests Service Ontology
Service description / High-level language (scripting)
UDIC Presentation
Next Steps
Semantic Web Pervasive Computing Framework
Service discovery Service Composition/Matching Device auto configuration Autonomous system management Policy enforcement
Security and Authentication Biometric Authentication / profile access
UDIC Presentation
Thank You !!