IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Pervasive Computing – Technology beyond Imagination 1

2

3

Abhishek Singh, Ruchi Yadav, Jaydeep Patel Student, B.Tech (CSE), Dronacharya College of Engineering, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh, India 2 Student, B.Tech (CSE), Dronacharya College of Engineering,, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh, India 2 Student, B.Tech (CSE), Dronacharya College of Engineering, Uttar Pradesh Technical University Greater Noida, Uttar Pradesh India 1

1

[email protected], [email protected], [email protected]

ABSTRACT Pervasive Computing is the technology where one can access content and software applications without actually controlling it. It involves transparent employing of our daily objects with sensors and network abilities. This paper discusses the essence of emerging field of pervasive computing in our daily activities. It explains the root elements of designing pervasive technology. It identifies the approaches – context awareness, location awareness, artificial intelligence where this technology can be embedded to make a user interact with information processing devices with much ease. The paper ends with a discussion on implementing this third wave of computing in daily life and to confront those challenges.

Keywords: Pervasive or Ubiquitous Computing, Sensor Networks, Cloud Computing, Location aware systems, Context awareness, Artificial intelligence.

1. Introduction Pervasive Computing is the technology where one can access content and software applications without actually using it. Computing and Communication services are embedded in the infrastructure of the devices that appear invisible to the user. Pervasive computing is basically technology embedded into devices. Ubiquitous or Pervasive computing became a popular and a buzz word in Mark Weiser’s innovational 1991 paper ‘The Computer for 21st Century’. Pervasive computing has been phrased as calm computing and is considered to be the third wave of computing. Mark Weiser and John Sealy Brown of XEROX PARC, defined it in 1996 as, 'The third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.’

Abhishek Singh, IJRIT-358

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

Pervasive computing brings about a hi-tech generation of artificial intelligence, location awareness systems & context awareness systems where computer devices can melt into the background of our lives. That is why to implement ubiquity into our lives the solutions to our problems need to be context aware, behavior aware and artificially intelligent. The paper will be explaining the basic strands of pervasive computing on which it is based on. Those facets define the backbone of pervasive technology. It then throws light on how context awareness and artificial intelligence enhances the functionality of pervasive computing and augments the way they interact with users. The purpose of this project is to bring out the aspects through which pervasive computing can be coiled with artificial intelligence and context awareness. It sketches how pervasive computing is fast becoming ubiquitous i.e. technology becoming imperceptible in our life.

2. Elements of Pervasive Computing In this electronic era, we are transforming every computer device into an intelligent device through pervasive computing. The user is using wired as well as wireless services to reach to the context of resolutions. User can access information and other services through any probable technique. These techniques can be digital cookbook embedded on your microwave, video-on-demand services available on you home screen or shopping list stockpiled on your refrigerator even when you are miles away. Information around us can be accessed according to the platform or applications you are using. These devices can communicate with other devices as well through network devices and services. Information can be accessed from devices from anywhere and anytime using cloud computing. The technology has reached so far that even our pens and pencils or even our notepads can be embedded with chips and sensors to help recognize the context around us. . Information can also be stored in them according to your requirements. These devices can also interact with other devices as well through network and other services. Information can be accessed from devices from anywhere and anytime using cloud computing. So, the core essences of pervasive computing are • • •

Cloud-assisted Pervasive Computing Sensors Intelligent System

2.1 Cloud-assisted Pervasive Computing Cloud Computing refers to accessing of resources at remote locations over a network. Some researchers define it as Utility computing i.e. computing through virtual servers. ‘Cloud’ in cloudcomputing involves a set of hardware, services, interfaces, platforms and networks that deliver the aspect of computing as a service. These computing services perform the delivery of software, infrastructures, applications, storage and platforms over network. Enterprises are looking for solutions to spend almost zero upfront investment on technology infrastructure. Cloud computing, thus spur the pervasive computing to a new technological level where a user can access almost anything at any time and from any device.

Abhishek Singh, IJRIT-359

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

Cloud computing boosts up the IT infrastructure by providing on-demand self-services where the user can plump for server time and network usage as needed automatically without any human interaction with the service provider. Cloud-assisted pervasive computing should have the benefit of resource pooling, where the multiple users can access resources from single pooled contributor using a multi-tenant model, with physical and virtual resources being allocated and reallocated dynamically according to the requirements of the consumer. Embedding pervasive computing in the model will help user to have exact control or knowledge over the precise location of resource contributor. The enterprise can store their confidential data on ‘cloud’ rather than on desktop PCs. It provides the consumers to use servers within the cloud to do the processing of data or even data manipulation. It provides the benefit of lower costs; improve reliability, high extent of flexibility and scalability. It involves usage-based costing i.e. the price of usage is based on consumption such pay per use, pay per GB, pay per CPU hour etc. It provides the advantage of proactive-scaling and disaster recoverability.

2.2 Sensors A sensor network is a collection of nodes building a communication infrastructure that senses and records conditions. These sensor nodes are detection stations that are portable and are equipped with transceiver, transducer, and microcomputer and power source. These sensor nodes help in the interaction between the people and the machines with the surrounding environment. The portable sensor networks can be context aware & location aware and report to the control units. Nowadays the smart physical entities are equipped with embedded sensors and controllers, nearly making it possible to monitor and report all smart actions. Pervasive computing has made it efficient to sense data from remote locations and record it for end users. Pervasive computing is making everything smart by embedding sensor networks. Wireless sensor networks can easily monitor physical or environment conditions, which can be passed through a network. Wireless sensor networks enable a multiple applications in pervasive computing: 1) Human activities can be monitored using sensors embedded into machines and devices around them, which will help them to track the best fitness regime. 2) In disaster struck places, wireless sensor networks can help in emergency situations with the help of autonomous robots.

2.3 Intelligent System Intelligent systems are incorporated into artificial intelligence. Smartphones, tablets, and other mobile devices are just few examples of intelligent systems. People are connected across a range of intelligent devices through cloud-enabled networks that are seamless, personalized and secure. Intelligent can be used in combination with cloud based services, location based and context based systems as well as social networks to reach more devices and touch more businesses.

Abhishek Singh, IJRIT-360

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

This transformation to intelligent systems will enable the extension of computing so that every system or device has the potential to capture data from other systems and the network. Intelligent systems have the ability to: 1) Problem and puzzle solving- Algorithms have been developed for solving puzzles and making logical deductions. 2) Knowledge representation- a representation of knowledge exists and what all is being provided by the intelligent systems. 3) Natural Language Processing- It helps the machines and devices to understand and speak the languages that human speak. It provides natural language user interfaces and acquisition of knowledge 4) Learning- Machines are provided the technology for learning the computer algorithms through experience. 5) Perception- It analyzes the input from the sensors and deduce those aspects to end users. Such as speech recognition, face recognition, thumbprint scanning. These technologies are being used in smartphones, laptops and other intelligent devices.

Fig. 1 Core Elements of Pervasive Computing

3. Context Awareness Schilit introduced context awareness in pervasive computing in 1994. The term context can be defined as any information that can be used to delineate the situation of an entity. It refers to the way in which

Abhishek Singh, IJRIT-361

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

a device can sense and react based on its dynamic environment. With context awareness computing minimal demands are put on the user, which is done by adapting to selected aspects of the context of use such as time, location, user-activities etc. The context awareness information can be acquired and interpreted by use of sensors, it can be static like repositories of information that supports queries and notifications, and user supplied information or derived information. Each type of information has different disadvantages associated with it, for example a user supplied information may get out of date after some time whereas sensed information may be more prone to noise and errors. A

good

application’s

context

information

must

include

the

five

W’s:

Table 1     

From WHERE can they do it • Location Constraint WHEN can they do it • Time Constraint WHO has the authority • People/Role Constraint WHAT are they allowed to do • Action Constraint HOW can they do it • Client/API Constraint

3.1 Location Awareness Context awareness is complementary to location awareness. In location awareness, a device is able to determine its own geographical location. Location awareness has become a broad area of research. The most familiar example is GPS (Global Positioning System). The GPS uses signals from satellite to triangulate its position on the surface of the Earth. The position is the precise latitude and longitude. The position is then displayed on a map with some additional physical information describing a location such as local landmarks, street names etc. The location information adds to the data being collected and helps to create a context for other types of data. For example, FLickr.com- it is the most popular online photo sharing service which has ability to geotag photographs using maps. Through this it can determine where a photo was taken by looking at the map. There are certain downsides to its adoption; GPS doesn’t work that well indoors. Alternatively Wi-Fi can be used but it requires specialized software. It can be resource-intensive due to lack of out-of-the box authoring environments. A good context awareness model is the one, which explores and specifies an application’s context requirements, which manages the information stored in repository and provides an abstraction of context information classes for the programmer and end user view. However, Context awareness application has not been able to make a transition from laboratories to our everyday use due to large development overheads associated with it, privacy and usability issues and also an imperfect understanding to its uses.

Abhishek Singh, IJRIT-362

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

3.2 Challenges It will be a complex task of creating a computational environment that is in constant touch with its physical surroundings and is able to respond intelligently to such context information. Tremendous opportunities and challenges exist that can implement and gracefully organize such location/context aware systems depending on various contexts such a location, network, context aware sensors. Even though context awareness is a widely used term in context of Pervasive Computing, there are many challenges that will enable us towards a more smarter and intelligent Pervasive computing Application. The following challenges are: 1. Assembling these systems on the basis of a relative pattern and understanding them for further complex designs. 2. Should be reliable and efficient enough to take action proactively. 3. Should be maintained and updated regularly for making user interaction more easy and vast over network, even in the remote areas. 4. Performance of such systems should be fast and efficient enough for the user to access information anytime. 5. The systems should be able to adapt themselves to their surrounding environment to deliver the best output to the users with ease.

4. Conclusions The vision of pervasive computing in the networked environment is the future scenario for integrated computing, that is being embedded into our everyday lives. Pervasive computing is bringing about a generation of artificial intelligence where we are able to embed location awareness and context awareness systems into our surroundings. This paper is able to explain the core importance of essence of pervasive computing. Cloud assisted pervasive computing should be employed everywhere as to have the access to remote locations. Thus employing cloud computing into ubiquitous network will be beneficial. This paper is an attempt to explain the range of applications where pervasive computing can be applied. The primary objective of this essay is to investigate the possibility of artificial intelligence in ubiquitous computing environment and the role that artificial intelligence plays. Implementing and facing those challenges will prove to be beneficial for the future generation, thus making Pervasive Computing a “Calm Computing”.

References [1] Mark Weiser and John Seely Brown, the Coming Age of Calm Technology, Xerox PARC, October 5, 1996.

[2] Weiser, Ubiquitous Computing, IEEE computer, October 1993 [3] Weiser, The computer for 21st Century, Scientific America, September 1991 Abhishek Singh, IJRIT-363

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 358-364

[4] Juan Carlos Augusto, Ambient Intelligence: the Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence.

[5] M. Satyanarayanan. Pervasive Communications, 8:10-17, 2001.

computing:

Visions

and

challenges.

IEEE

Personal

[6] E. Messmer. Garner sees ‘context-based computing’ on the horizon. Network World, http://www.networkworld.com/news/2010/102110-itxpo-content-based-computing.html,October 2010.

21,

[7] Baldauf, M., Dustdar, S. and Rosenberg, F. (2007) ‘A survey on context-aware systems’, Int. J. Ad Hoc and Ubiquitous Computing, Vol. 2, No. 4, pp.263–277.

[8] Omar Khan, Context and Context-Aware Computing, CS260, Fall 2006 [9] Young Jae Kim, Location Aware Computing, Computer Science and Engineering Department University of Texas at Arlington

Abhishek Singh, IJRIT-364

Pervasive Computing - International Journal of Research in ...

These techniques can be digital cookbook embedded on your microwave, video-on-demand services available on you home screen or shopping list stockpiled on your refrigerator even when you are miles away. Information .... Schilit introduced context awareness in pervasive computing in 1994. The term context can be ...

438KB Sizes 0 Downloads 294 Views

Recommend Documents

Cloud Computing Security - International Journal of Research in ...
sharing of resources which include software and infrastructure with the help of virtualization.In order to provide quality services ... Platform-as-a-service is higher level service than infrastructure service. Platform based services includes .... F

Cloud Computing Security - International Journal of Research in ...
The Security Access Control Service (SACS) will helpful toward CSP in Pakistan to implement cloud services with secure data trust. SACS includes Access Authorization, Security API, cloud connection Security modules and are described as under: Access

8085 Microprocessors - International Journal of Research in ...
including CRRES, Polar, FAST, Cluster, HESSI, the Sojourner Mars Rover, and THEMIS. The Swiss company. SAIA used the 8085 and the 8085-2 as the CPUs of their PCA1 line of programmable logic controllers during the 1980s. Pro-Log Corp. put the 8085 and

nanofiltration - International Journal of Research in Information ...
Abstract- The term “membrane filtration” describes a family of separation methods.The basic principle is to use semi-permeable membranes to separate fluids, Gases, particles and solutes. Membranes are usually shaped as a thin film, which allows t

Software - International Journal of Research in Information ...
approach incorporates the elements of specification-driven, prototype-driven process methods, ... A prototype is produced at the end of the risk analysis phase.

vampire attacks research paper - International Journal of Research in ...
A wireless sensor network are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Denial of

vampire attacks research paper - International Journal of Research in ...
initial connection state onto the client, or cryptographic puzzles. These solutions place minimal load on legitimate clients who only initiate a small number of connections, but deter malicious entities who will attempt a large number. Note that this

Heat Recycling Of Data Centers - International Journal of Research in ...
When outside temperatures are high, the exchangers are sprinkled with water to ... (V) is proportional to the temperature difference (∆T) via the Seebeck ...

Download PDF - International Journal of Advanced Research
It is described and illustrated here based on recent collection from Wayanad (E.S. Santhosh Kumar 56416, TBGT) to facilitate its easy identification. Thottea dalzellii (Hook.f.) Karthik. & Moorthy, Fl. Pl. India 156. 2009. Bragantia dalzellii Hook.f.

Download PDF - International Journal of Advanced Research
Distribution and Ecology:— Lasianthus idukkianus grows in a shola forest at ... Deb, D.B. and Gangopadhyay, M. (1991): Taxonomic study of the genus ...

Download PDF - International Journal of Advanced Research
695562, Kerala, India. Manuscript ... In India, it is represented by 14 species which include 10 endemics confined to .... Forest Department for the logistic support.

cyborgs - International Journal of Research in Information Technology ...
Bioelectronics is already a real and recognized ... biological systems at a more basic level; nanotechnology and nano-machines may be able to effect biological changes at the intracellular level ... recombinant DNA research, much of the public showed

Uzma Ijrit Paper - International Journal of Research in Information ...
Auto Trip computer, engine control, air bag, ABS, instrumentation, security system, transmission control ... GSM also pioneered low-cost implementation of the short message service (SMS), also called ... Frequency: 900 MHz or 1800 MHz (Some countries

Web Based IDE - International Journal of Research in Information ...
B.E computer engineering, Institute of Knowledge College of engineering, pune .... Cloud computing is usage of computer resources (both hardware and ...

Compiler Design - International Journal of Research in Information ...
The final result of this paper is to provide a general knowledge about compiler design and implementation and to serve as a springboard to more advanced courses. Although this paper concentrates on the implementation of a compiler, an outline for an

Compiler Design - International Journal of Research in Information ...
... be regarded as an 'add-on' feature of acompiler. Its inuence upon the overall design is pervasive, and it is a necessary debugging tool during construction of.

(OLSR) Protocol - International Journal of Research in Information ...
2Assistant Professer, 2Punjabi University Regional Centre for IT & Mgmt., Mohali, India. Mohali, Punjab, India [email protected]. Abstract. OLSR is a leading proactive protocol used in MANET. Due to its low latency for route determination it has be

Bluetooth and Its Configuration - International Journal of Research in ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... Bluetooth is a packet-based protocol with a master-slave structure [1] ... Frequency hopping has two significant benefits: .... technology introduced a new netw

review paper - International Journal of Research in Information ...
[email protected] , [email protected] , [email protected]. Abstract. Iris recognition has been finished by numerous scientists in a decade ago. Iris recognition assumes a important part to enhance effectiveness in biometric identific

data hiding using watermarking - International Journal of Research in ...
Asst.Professor, Dr. Babasaheb Ambedkar College of Engg. and research, ECE department,. R.T.M. Nagpur University, Nagpur,. Maharashtra, India. Samruddhi Pande1, Aishwarya Iyer2, Parvati Atalkar3 ,Chetna Sorte4 ,Bhagyashree Gardalwar 5,. Student, Dr. B

(STBC) OFDM Systems - International Journal of Research in ...
2 Department of Electronics Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib, Punjab,. India. 4 Department of Electronics and communication Engineering, CTIEMT, Jalandhar city. Abstract. In this paper, performance analysis of inte

Energy Harvesting - International Journal of Research in Information ...
[email protected], [email protected]. Abstract. Purpose: To review and discuss various Energy harvesting techniques and to implement one amongst them to reduce the usage of implantable medical device's (IMD's) battery so that the life span

Bluetooth and Its Configuration - International Journal of Research in ...
IJRIT International Journal of Research in Information Technology, Volume 2, ..... http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html. [11].

Restaurant Management system - International Journal of Research in ...
A recipe for a menu item has a chef, preparation instruction sand associated ingredients. The ingredients are identified by their ingredient id and the quantity of ...