IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Pervasive Computing – Technology beyond Imagination 1

2

3

Abhishek Singh, Ruchi Yadav, Jaydeep Patel Student, B.Tech (CSE), Dronacharya College of Engineering, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh, India 2 Student, B.Tech (CSE), Dronacharya College of Engineering,, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh, India 2 Student, B.Tech (CSE), Dronacharya College of Engineering, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh India 1

1

[email protected], [email protected], [email protected]

ABSTRACT Pervasive Computing is the technology where one can access content and software applications without actually controlling it. It involves transparent employing of our daily objects with sensors and network abilities. This paper discusses the essence of emerging field of pervasive computing in our daily activities. It explains the root elements of designing pervasive technology. It identifies the approaches – context awareness, location awareness, artificial intelligence where this technology can be embedded to make a user interact with information processing devices with much ease. The paper ends with a discussion on implementing this third wave of computing in daily life and to confront those challenges.

Keywords: Pervasive or Ubiquitous Computing, Sensor Networks, Cloud Computing, Location aware systems, Context awareness, Artificial intelligence.

1. Introduction Pervasive Computing is the technology where one can access content and software applications without actually using it. Computing and Communication services are embedded in the infrastructure of the devices that appear invisible to the user. Pervasive computing is basically technology embedded into devices. Ubiquitous or Pervasive computing became a popular and a buzz word in Mark Weiser’s innovational 1991 paper ‘The Computer for 21st Century’. Pervasive computing has been phrased as calm computing and is considered to be the third wave of computing. Mark Weiser and John Sealy Brown of XEROX PARC, defined it in 1996 as, 'The third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.’

Abhishek Singh, IJRIT-358

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

Pervasive computing brings about a hi-tech generation of artificial intelligence, location awareness systems & context awareness systems where computer devices can melt into the background of our lives. That is why to implement ubiquity into our lives the solutions to our problems need to be context aware, behavior aware and artificially intelligent. The paper will be explaining the basic strands of pervasive computing on which it is based on. Those facets define the backbone of pervasive technology. It then throws light on how context awareness and artificial intelligence enhances the functionality of pervasive computing and augments the way they interact with users. The purpose of this project is to bring out the aspects through which pervasive computing can be coiled with artificial intelligence and context awareness. It sketches how pervasive computing is fast becoming ubiquitous i.e. technology becoming imperceptible in our life.

2. Elements of Pervasive Computing In this electronic era, we are transforming every computer device into an intelligent device through pervasive computing. The user is using wired as well as wireless services to reach to the context of resolutions. User can access information and other services through any probable technique. These techniques can be digital cookbook embedded on your microwave, video-on-demand services available on you home screen or shopping list stockpiled on your refrigerator even when you are miles away. Information around us can be accessed according to the platform or applications you are using. These devices can communicate with other devices as well through network devices and services. Information can be accessed from devices from anywhere and anytime using cloud computing. The technology has reached so far that even our pens and pencils or even our notepads can be embedded with chips and sensors to help recognize the context around us. . Information can also be stored in them according to your requirements. These devices can also interact with other devices as well through network and other services. Information can be accessed from devices from anywhere and anytime using cloud computing. So, the core essences of pervasive computing are • • •

Cloud-assisted Pervasive Computing Sensors Intelligent System

2.1 Cloud-assisted Pervasive Computing Cloud Computing refers to accessing of resources at remote locations over a network. Some researchers define it as Utility computing i.e. computing through virtual servers. ‘Cloud’ in cloudcomputing involves a set of hardware, services, interfaces, platforms and networks that deliver the aspect of computing as a service. These computing services perform the delivery of software, infrastructures, applications, storage and platforms over network. Enterprises are looking for solutions to spend almost zero upfront investment on technology infrastructure. Cloud computing, thus spur the pervasive computing to a new technological level where a user can access almost anything at any time and from any device.

Abhishek Singh, IJRIT-359

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

Cloud computing boosts up the IT infrastructure by providing on-demand self-services where the user can plump for server time and network usage as needed automatically without any human interaction with the service provider. Cloud-assisted pervasive computing should have the benefit of resource pooling, where the multiple users can access resources from single pooled contributor using a multi-tenant model, with physical and virtual resources being allocated and reallocated dynamically according to the requirements of the consumer. Embedding pervasive computing in the model will help user to have exact control or knowledge over the precise location of resource contributor. The enterprise can store their confidential data on ‘cloud’ rather than on desktop PCs. It provides the consumers to use servers within the cloud to do the processing of data or even data manipulation. It provides the benefit of lower costs; improve reliability, high extent of flexibility and scalability. It involves usage-based costing i.e. the price of usage is based on consumption such pay per use, pay per GB, pay per CPU hour etc. It provides the advantage of proactive-scaling and disaster recoverability.

2.2 Sensors A sensor network is a collection of nodes building a communication infrastructure that senses and records conditions. These sensor nodes are detection stations that are portable and are equipped with transceiver, transducer, and microcomputer and power source. These sensor nodes help in the interaction between the people and the machines with the surrounding environment. The portable sensor networks can be context aware & location aware and report to the control units. Nowadays the smart physical entities are equipped with embedded sensors and controllers, nearly making it possible to monitor and report all smart actions. Pervasive computing has made it efficient to sense data from remote locations and record it for end users. Pervasive computing is making everything smart by embedding sensor networks. Wireless sensor networks can easily monitor physical or environment conditions, which can be passed through a network. Wireless sensor networks enable a multiple applications in pervasive computing: 1) Human activities can be monitored using sensors embedded into machines and devices around them, which will help them to track the best fitness regime. 2) In disaster struck places, wireless sensor networks can help in emergency situations with the help of autonomous robots.

2.3 Intelligent System Intelligent systems are incorporated into artificial intelligence. Smartphones, tablets, and other mobile devices are just few examples of intelligent systems. People are connected across a range of intelligent devices through cloud-enabled networks that are seamless, personalized and secure. Intelligent can be used in combination with cloud based services, location based and context based systems as well as social networks to reach more devices and touch more businesses.

Abhishek Singh, IJRIT-360

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

This transformation to intelligent systems will enable the extension of computing so that every system or device has the potential to capture data from other systems and the network. Intelligent systems have the ability to: 1) Problem and puzzle solving- Algorithms have been developed for solving puzzles and making logical deductions. 2) Knowledge representation- a representation of knowledge exists and what all is being provided by the intelligent systems. 3) Natural Language Processing- It helps the machines and devices to understand and speak the languages that human speak. It provides natural language user interfaces and acquisition of knowledge 4) Learning- Machines are provided the technology for learning the computer algorithms through experience. 5) Perception- It analyzes the input from the sensors and deduce those aspects to end users. Such as speech recognition, face recognition, thumbprint scanning. These technologies are being used in smartphones, laptops and other intelligent devices.

Fig. 1 Core Elements of Pervasive Computing

3. Context Awareness Schilit introduced context awareness in pervasive computing in 1994. The term context can be defined as any information that can be used to delineate the situation of an entity. It refers to the way in which

Abhishek Singh, IJRIT-361

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

a device can sense and react based on its dynamic environment. With context awareness computing minimal demands are put on the user, which is done by adapting to selected aspects of the context of use such as time, location, user-activities etc. The context awareness information can be acquired and interpreted by use of sensors, it can be static like repositories of information that supports queries and notifications, and user supplied information or derived information. Each type of information has different disadvantages associated with it, for example a user supplied information may get out of date after some time whereas sensed information may be more prone to noise and errors. A

good

application’s

context

information

must

include

the

five

W’s:

Table 1     

From WHERE can they do it • Location Constraint WHEN can they do it • Time Constraint WHO has the authority • People/Role Constraint WHAT are they allowed to do • Action Constraint HOW can they do it • Client/API Constraint

3.1 Location Awareness Context awareness is complementary to location awareness. In location awareness, a device is able to determine its own geographical location. Location awareness has become a broad area of research. The most familiar example is GPS (Global Positioning System). The GPS uses signals from satellite to triangulate its position on the surface of the Earth. The position is the precise latitude and longitude. The position is then displayed on a map with some additional physical information describing a location such as local landmarks, street names etc. The location information adds to the data being collected and helps to create a context for other types of data. For example, FLickr.com- it is the most popular online photo sharing service which has ability to geotag photographs using maps. Through this it can determine where a photo was taken by looking at the map. There are certain downsides to its adoption; GPS doesn’t work that well indoors. Alternatively Wi-Fi can be used but it requires specialized software. It can be resource-intensive due to lack of out-of-the box authoring environments. A good context awareness model is the one, which explores and specifies an application’s context requirements, which manages the information stored in repository and provides an abstraction of context information classes for the programmer and end user view. However, Context awareness application has not been able to make a transition from laboratories to our everyday use due to large development overheads associated with it, privacy and usability issues and also an imperfect understanding to its uses.

Abhishek Singh, IJRIT-362

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

3.2 Challenges It will be a complex task of creating a computational environment that is in constant touch with its physical surroundings and is able to respond intelligently to such context information. Tremendous opportunities and challenges exist that can implement and gracefully organize such location/context aware systems depending on various contexts such a location, network, context aware sensors. Even though context awareness is a widely used term in context of Pervasive Computing, there are many challenges that will enable us towards a more smarter and intelligent Pervasive computing Application. The following challenges are: 1. Assembling these systems on the basis of a relative pattern and understanding them for further complex designs. 2. Should be reliable and efficient enough to take action proactively. 3. Should be maintained and updated regularly for making user interaction more easy and vast over network, even in the remote areas. 4. Performance of such systems should be fast and efficient enough for the user to access information anytime. 5. The systems should be able to adapt themselves to their surrounding environment to deliver the best output to the users with ease.

4. Conclusions The vision of pervasive computing in the networked environment is the future scenario for integrated computing, that is being embedded into our everyday lives. Pervasive computing is bringing about a generation of artificial intelligence where we are able to embed location awareness and context awareness systems into our surroundings. This paper is able to explain the core importance of essence of pervasive computing. Cloud assisted pervasive computing should be employed everywhere as to have the access to remote locations. Thus employing cloud computing into ubiquitous network will be beneficial. This paper is an attempt to explain the range of applications where pervasive computing can be applied. The primary objective of this essay is to investigate the possibility of artificial intelligence in ubiquitous computing environment and the role that artificial intelligence plays. Implementing and facing those challenges will prove to be beneficial for the future generation, thus making Pervasive Computing a “Calm Computing”.

References [1] Mark Weiser and John Seely Brown, the Coming Age of Calm Technology, Xerox PARC, October 5, 1996.

[2] Weiser, Ubiquitous Computing, IEEE computer, October 1993 [3] Weiser, The computer for 21st Century, Scientific America, September 1991 Abhishek Singh, IJRIT-363

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

[4] Juan Carlos Augusto, Ambient Intelligence: the Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence.

[5] M. Satyanarayanan. Pervasive Communications, 8:10-17, 2001.

computing:

Visions

and

challenges.

IEEE

Personal

[6] E. Messmer. Garner sees ‘context-based computing’ on the horizon. Network World, http://www.networkworld.com/news/2010/102110-itxpo-content-based-computing.html,October 2010.

21,

[7] Baldauf, M., Dustdar, S. and Rosenberg, F. (2007) ‘A survey on context-aware systems’, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 2, No. 4, pp.263–277.

[8] Omar Khan, Context and Context-Aware Computing, CS260, Fall 2006 [9] Young Jae Kim, Location Aware Computing, Computer Science and Engineering Department University of Texas at Arlington

Abhishek Singh, IJRIT-364

Pervasive Computing – Technology beyond ...

available on you home screen or shopping list stockpiled on your refrigerator even when .... These technologies are being used in smartphones, laptops and other ... For example, FLickr.com- it is the most popular online photo sharing service ...

438KB Sizes 2 Downloads 59 Views

Recommend Documents

Pervasive Computing and Communications for Sustainability - Elsevier
lighting, heating, cooling, displays, etc. by considering context and usage. ➢ Role of social networking and smart interaction for energy conservation, emissions ...

Pervasive Computing - International Journal of Research in ...
These techniques can be digital cookbook embedded on your microwave, video-on-demand services available on you home screen or shopping list stockpiled on your refrigerator even when you are miles away. Information .... Schilit introduced context awar

Pervasive Computing and Communications for Sustainability - Elsevier
lighting, heating, cooling, displays, etc. by considering context and usage. ➢ Role of social networking and smart interaction for energy conservation, emissions ...

pdf-1867\digital-ground-architecture-pervasive-computing-and ...
... apps below to open or edit this item. pdf-1867\digital-ground-architecture-pervasive-compu ... onmental-knowing-mit-press-by-malcolm-mccullough.pdf.

Situation identification techniques in pervasive computing
used in modelling and inferring situations from sensor data. We compare and contrast these ... Overview of situation identification in pervasive computing.

From Pervasive To Social Computing: Algorithms and ...
wonder when social network services will depart from the Internet and become ... (1) the semantic specification of users' social preferences and tasks, in order to ...

Context-Aware Paradigm for a Pervasive Computing Environment ...
The proposed research, Context-Aware Paradigm for Pervasive Computing ...... The standardization provides an abstraction layer that separates the underlying ...

An Overview of Pervasive Computing Systems
range of telemetric data from instruments used in an operating room and ... device controllers. ... relate to those in distributed systems and mobile computing. .... University [24], Cooltown in Hewlett-Packard [25], and EasyLiving in Microsoft.

An Overview of Pervasive Computing Systems
digital assistants (PDAs), “smart” mobile phones, ultra-mobile laptops and office. PCs, and even home .... for pervasive computing [17]. A similar evolution is ... could eventually support pervasive computing with inch-scale computing devices.

Plugin-Orb for Applications in a Pervasive Computing ...
Unfortunately, classic middleware platforms do not appear able to cope with such a ... In recent years, the adoption of middleware systems such as Web Services ...

pdf-14110\ubiquitous-and-pervasive-computing-concepts ...
... the apps below to open or edit this item. pdf-14110\ubiquitous-and-pervasive-computing-concept ... ologies-tools-and-applications-by-judith-symonds.pdf.

Distributed Computing: MapReduce and Beyond!
14 Jan 2008 - 7. Example Distributed System: Google File System. • GFS is a distributed file system written at Google for Google's needs. (lots of data, lots of cheap computers, need for speed). • We use it to store the data from our web crawl, b

Cartographic Computing Technology
The purpose of this paper is to present some views about the organization of data, and some facts about the nature and development of computing. The present state of computing in general, and data management in particular, is somewhat confused. One m

Download Cloud Computing: Concepts, Technology ...
Download Cloud Computing: Concepts, Technology Architecture (The. Prentice Hall Service Technology Series from Thomas Erl) PDF Full book ... comparison to those hosted on traditional IT enterprise premises. Also provided are templates ...