PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

36
PERVASIVE OR PERVASIVE OR UBIQUITOUS COMPUTING UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS M.HANZALA ALI ABBASS

Transcript of PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Page 1: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

PERVASIVE OR PERVASIVE OR UBIQUITOUS UBIQUITOUS COMPUTINGCOMPUTING

M.HANZALA ALI ABBASSM.HANZALA ALI ABBASS

Page 2: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

PERVASIVE OR UBIQUITOUS?PERVASIVE OR UBIQUITOUS?

Ubiquitous OR pervasive computingUbiquitous OR pervasive computing (ubicomp) integrates computation into the (ubicomp) integrates computation into the environment, rather than having computers environment, rather than having computers which are distinct objects. which are distinct objects.

The idea of ubicomp enable people to interact The idea of ubicomp enable people to interact with information-processing devices more with information-processing devices more naturallynaturally and and casuallycasually, and in ways that suit , and in ways that suit whatever locationwhatever location or or contextcontext they find they find themselves in.themselves in.

Page 3: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Other NamesOther Names

Pervasive Computing Pervasive Computing Sentient computing Sentient computing Ubiquitous Computing Ubiquitous Computing Ambient IntelligenceAmbient Intelligence Wearable ComputingWearable Computing

Page 4: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Goals of Pervasive (Ubiquitous) Goals of Pervasive (Ubiquitous) ComputingComputing

Ultimate goal:Ultimate goal: Invisible technologyInvisible technology Integration of virtual and physical worldsIntegration of virtual and physical worlds Throughout desks, rooms, buildings, and lifeThroughout desks, rooms, buildings, and life Take the data out of environment, leaving Take the data out of environment, leaving

behind just an enhanced ability to actbehind just an enhanced ability to act

Page 5: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Pervasive (Ubiquitous)Pervasive (Ubiquitous) Computing Vision Computing Vision

““In the 21st century the technology In the 21st century the technology revolution will move into the everyday, the revolution will move into the everyday, the small and the invisible…”small and the invisible…”

““The most profound technologies are those The most profound technologies are those that disappear. They weave themselves that disappear. They weave themselves into the fabrics of everyday life until they into the fabrics of everyday life until they are indistinguishable from it.”are indistinguishable from it.”

Mark Weiser (1952 –1999), XEROX PARCMark Weiser (1952 –1999), XEROX PARC

Page 6: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

The Trends in Computing The Trends in Computing Technology and Pervasive Technology and Pervasive

ComputingComputing1970s1970s

1990s1990s

Late 1990sLate 1990s

Now and Tomorrow ?Now and Tomorrow ?

Page 7: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Pervasive Computing EraPervasive Computing Era

Page 8: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Pervasive Computing EnablersPervasive Computing Enablers

Moore’s Law of IC TechnologiesMoore’s Law of IC Technologies

Communication TechnologiesCommunication Technologies

Material TechnologiesMaterial Technologies

Sensors/ActuatorsSensors/Actuators

Page 9: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Moore’s LawMoore’s Law

Computing power (or number of Computing power (or number of transistors in an integrated circuit) doubles transistors in an integrated circuit) doubles every 18 monthsevery 18 months

0

10000000000

20000000000

30000000000

40000000000

50000000000

60000000000

70000000000

80000000000

2 5 8

11 14 17 20 23 26 29 32 35 38 41 44 47 50 53

Years

Pow

er

Page 10: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

2nd2nd Enabler: Communication Enabler: Communication

Bandwidth of single fibers ~10 Gb/sBandwidth of single fibers ~10 Gb/s ~20 Tb/s with wavelength multiplex ~20 Tb/s with wavelength multiplex PowerlinePowerline coffee maker “automatically” connected to the coffee maker “automatically” connected to the

InternetInternet WirelessWireless

mobile phone: GSM, GPRS, 3Gmobile phone: GSM, GPRS, 3G wireless LAN (> 10 Mb/s)wireless LAN (> 10 Mb/s) PAN (Bluetooth), BANPAN (Bluetooth), BAN

Page 11: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

4th4th Enabler: Sensors/Actuators Enabler: Sensors/Actuators

Page 12: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Miniaturized cameras, microphones,...Miniaturized cameras, microphones,... Fingerprint sensorFingerprint sensor Radio sensorsRadio sensors RFIDRFID InfraredInfrared Location sensorsLocation sensors

e.g., GPSe.g., GPS

Page 13: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Pervasive Computing

Distributed System

Mobile Computing

Page 14: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Pervasive DevicesPervasive Devices

Embedded Embedded DevicesDevices

HandleHandle DevicesDevices

Page 15: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

H21s a.k.a HANDY’s21and H21s a.k.a HANDY’s21and Enviro21s a.k.a E21sEnviro21s a.k.a E21s

HANDHELD DEVICESHANDHELD DEVICES

THE VISION:THE VISION: Person-centered devices provide universal personal Person-centered devices provide universal personal

appliances that are inexpensive and carried and used appliances that are inexpensive and carried and used anywhere (portability).anywhere (portability).

They are equipped with perceptual transducers such as a They are equipped with perceptual transducers such as a microphone, speaker, video camera, and display.microphone, speaker, video camera, and display.

Provide mobile access points for users both within and Provide mobile access points for users both within and

without the intelligent spaces controlled by E21swithout the intelligent spaces controlled by E21s. . Reconfigure themselves to support multiple Reconfigure themselves to support multiple

communication protocols communication protocols Recognize human inputRecognize human input

Page 16: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 17: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Embedded devices Embedded devices Create intelligent spaces. Create intelligent spaces.

(computation embedded in ordinary envoirnments defines (computation embedded in ordinary envoirnments defines intelligent spaces and control for physical entities)intelligent spaces and control for physical entities)

People interact in intelligent spaces naturally without being aware People interact in intelligent spaces naturally without being aware that computation is present.that computation is present.

E21s provide large amounts of embedded computationE21s provide large amounts of embedded computation Users communicate naturally in the spaces created by the E21sUsers communicate naturally in the spaces created by the E21s

Page 18: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 19: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

EvolutionEvolution

Page 20: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Scenario 1Scenario 1 John opens his refrigerator to take out a soda, and he John opens his refrigerator to take out a soda, and he

notices that there is only one can left. John then scans notices that there is only one can left. John then scans the UPC of the soda with the scanner attached to the the UPC of the soda with the scanner attached to the refrigerator. John plans to have guests over this refrigerator. John plans to have guests over this weekend, and makes a note on the refrigerator device weekend, and makes a note on the refrigerator device that he needs to replenish his soda by Friday The next that he needs to replenish his soda by Friday The next day.day.

on his way home from work, John happen to approach a on his way home from work, John happen to approach a local supermarket. His car signals to John that he is near local supermarket. His car signals to John that he is near a grocery store, and if it is convenient, that he should a grocery store, and if it is convenient, that he should stop by. Suppose John does not act on the opportunity, stop by. Suppose John does not act on the opportunity, Friday rolls around and he still have not bought the Friday rolls around and he still have not bought the drinks, a notification will be sent to John’s PDA by the drinks, a notification will be sent to John’s PDA by the refrigerator to alert Johnrefrigerator to alert John

Page 21: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Scenario 1 – What Happened?Scenario 1 – What Happened?

John’s virtual shopping list is maintained by his John’s virtual shopping list is maintained by his refrigeratorrefrigerator.. When John scanned the soda, the refrigerator adds soda to the When John scanned the soda, the refrigerator adds soda to the

shopping list.shopping list. When John notes down Friday, the refrigerator notifies his When John notes down Friday, the refrigerator notifies his carcar about about

the need for soda. the need for soda. When John is on the road, his car constantly monitors the available When John is on the road, his car constantly monitors the available

services; when his car detects the services; when his car detects the supermarketsupermarket service, it notifies service, it notifies John.John.

When it’s Friday, and the refrigerator has not received a “soda When it’s Friday, and the refrigerator has not received a “soda purchased” notification, it sends a notification to John’s purchased” notification, it sends a notification to John’s PDAPDA..

Page 22: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Data ManagementData Management Getting information into the Getting information into the temporal or temporal or

spatial context in which it will be most spatial context in which it will be most usefuluseful, instead of where the information is , instead of where the information is created, and using pervasive devices to created, and using pervasive devices to accept or deliver itaccept or deliver it

In the first scenario, John created his In the first scenario, John created his shopping list in his refrigerator, but he shopping list in his refrigerator, but he needed it the most when he’s near a needed it the most when he’s near a supermarket.supermarket.

Page 23: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Data Management Challenges in PER-COMData Management Challenges in PER-COM Instead of the conventional client-proxy-server Instead of the conventional client-proxy-server

model, pervasive computing requires a model, pervasive computing requires a mobile mobile distributed database systemdistributed database system, where each device , where each device maintains its own databasemaintains its own database No centralized control of each device databaseNo centralized control of each device database Assume data can be communicated in a neutral Assume data can be communicated in a neutral

format between devicesformat between devices Each part of a data object may reside on different Each part of a data object may reside on different

device databasedevice database Devices move in ad-hoc networks, therefore no Devices move in ad-hoc networks, therefore no

guarantee of fixed set of devicesguarantee of fixed set of devices

Page 24: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

In particular to pervasive computing In particular to pervasive computing environments where devices are dynamicenvironments where devices are dynamic Data and data source availabilityData and data source availability Lack of global data and schemaLack of global data and schema No guarantee of reconnectionNo guarantee of reconnection No guarantee of collaborationNo guarantee of collaboration

=> query responses are highly based on => query responses are highly based on luckluck

Page 25: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

CASE STUDYCASE STUDY PERVASIVE PATIENT MONITORINGPERVASIVE PATIENT MONITORING

A vast majority of long-term patients in the world don’t take A vast majority of long-term patients in the world don’t take their medication in time, intentionally or not.their medication in time, intentionally or not.

In the U.S. alone, this represents an additional $100 billion In the U.S. alone, this represents an additional $100 billion yearly expense due to unexpected emergency hospital yearly expense due to unexpected emergency hospital admissions. admissions.

It is therefore crucial to gather accurately patient medical It is therefore crucial to gather accurately patient medical data in real time. data in real time.

For this purpose, a team at IBM Zurich Research For this purpose, a team at IBM Zurich Research Laboratory has developed a mobile health toolkit to Laboratory has developed a mobile health toolkit to perform this task. perform this task.

With this toolkit consisting of a Java-based middleware and With this toolkit consisting of a Java-based middleware and Bluetooth-enabled sensors, all the medical patient data Bluetooth-enabled sensors, all the medical patient data can be wirelessly exported to a doctor’s office via a PC can be wirelessly exported to a doctor’s office via a PC or a cell phone.or a cell phone.

Page 26: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Facts and figuresFacts and figures About 55% of all long-term patients in the US About 55% of all long-term patients in the US

and in Europe, it is estimated, do not take their and in Europe, it is estimated, do not take their medication (either not taking the prescribed medication (either not taking the prescribed medication at all or more than 14 hours late) medication at all or more than 14 hours late) Around 12% of all hospital admissions in the UK Around 12% of all hospital admissions in the UK are due to this non-compliance, the damage to are due to this non-compliance, the damage to the US taxpayer is an estimated USD 100 billion the US taxpayer is an estimated USD 100 billion a year. Most of the patients that do not comply a year. Most of the patients that do not comply are simply forgetful (about 10% deliberately do are simply forgetful (about 10% deliberately do not want to take the medication).not want to take the medication).

Page 27: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

How this can be solved?How this can be solved? Gathering current patient medical data promptly Gathering current patient medical data promptly

and accurately is vital to proper health care.and accurately is vital to proper health care. The usefulness of electronic data capture (EDC) The usefulness of electronic data capture (EDC)

has been demonstrated in applications such as has been demonstrated in applications such as the home monitoring of at-risk heart patients via the home monitoring of at-risk heart patients via devices that transmit blood pressure from the devices that transmit blood pressure from the home to a central database.home to a central database.

Removing transcription effort (and associated Removing transcription effort (and associated inaccuracies) alone is worth the institution of inaccuracies) alone is worth the institution of EDC; but the side benefit of timeliness offers the EDC; but the side benefit of timeliness offers the hope of identifying and responding to trends as hope of identifying and responding to trends as they occur, perhaps preventing a dangerous they occur, perhaps preventing a dangerous event, instead of simply allowing its diagnosis event, instead of simply allowing its diagnosis after the danger has manifest.after the danger has manifest.

Page 28: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

So ……So …… This is why IBM has developed its mobile This is why IBM has developed its mobile

health toolkit, “for gathering measurement health toolkit, “for gathering measurement data from a range of devices,such as data from a range of devices,such as

H21’s and E21’s connected through the H21’s and E21’s connected through the N21’s(discussed earlier)N21’s(discussed earlier)

and present it to management software and present it to management software via a well defined, and easily implemented via a well defined, and easily implemented interface.”interface.”

Page 29: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

mobile health care: why go mobile?mobile health care: why go mobile?

● ● Monitoring patients in the Monitoring patients in the communitycommunity • • Long-term patients, early Long-term patients, early release patients, elderly release patients, elderly patients, young patientspatients, young patients • • Medication Medication compliance/adherence compliance/adherence monitoringmonitoring • • Symptoms monitoringSymptoms monitoring ● ● Healthcare professionalsHealthcare professionals

Page 30: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

• • On-the spot patient record On-the spot patient record updatingupdating • • Direct patient data inputDirect patient data input ● ● Self Monitoring & lifestyleSelf Monitoring & lifestyle • • Help consumers take an Help consumers take an active part in their well-active part in their well- being/diseasebeing/disease • • Caring for relativesCaring for relatives ● ● Objectives:Objectives: • • Improve data quality and availability Improve data quality and availability • • Improve quality of life for patientsImprove quality of life for patients • • Reduce costsReduce costs

Page 31: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

Here are some details about this Here are some details about this toolkittoolkit

The IBM mobile health toolkit provides a Java-based The IBM mobile health toolkit provides a Java-based middleware — using J2ME MIDP 2.0 (Java Mobile middleware — using J2ME MIDP 2.0 (Java Mobile Information Device Profile) and JSR 082 (Java APIs for Information Device Profile) and JSR 082 (Java APIs for Bluetooth) — running on a personal (mobile) hub device Bluetooth) — running on a personal (mobile) hub device to which sensors can connect wirelessly. to which sensors can connect wirelessly.

We can perform local processing on the data, and We can perform local processing on the data, and forward the result to one or more fixed network forward the result to one or more fixed network connections. connections.

Data-handling modules can easily be added to the Data-handling modules can easily be added to the MIDlet suite (application suite compliant with Java Mobile MIDlet suite (application suite compliant with Java Mobile Information Device Profile) on the hub, as can drivers for Information Device Profile) on the hub, as can drivers for new sensor devices.new sensor devices.

Page 32: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 33: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 34: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 35: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.
Page 36: PERVASIVE OR UBIQUITOUS COMPUTING M.HANZALA ALI ABBASS.

References References Zurich Research Laboratory website, Zurich Research Laboratory website, [1] [1] http://http://sdforum.org/p/calEvent.asp?CIDsdforum.org/p/calEvent.asp?CID=751&mo=4&yr=2002=751&mo=4&yr=2002 [1] Mark Weiser, Chief Technologist of Xerox PARC, Palo Alto Research Center (PARC), the [1] Mark Weiser, Chief Technologist of Xerox PARC, Palo Alto Research Center (PARC), the

company's renowned high-technology incubator is widely regarded as the 'father' of company's renowned high-technology incubator is widely regarded as the 'father' of ubiquitous computing; his web page contains links to many papers on the topic: ubiquitous computing; his web page contains links to many papers on the topic: http://http://www.ubiq.com/hypertext/weiser/UbiHome.htmlwww.ubiq.com/hypertext/weiser/UbiHome.html..

[1] [1] http://http://www.computer.orgwww.computer.org/pervasive//pervasive/ [1] [1] http://http://web.media.mit.edu/~neilgweb.media.mit.edu/~neilg// [1] 'Beyond the Internet', published by the RAND Organisation [1] 'Beyond the Internet', published by the RAND Organisation

http://www.rand.org/scitech/stpi/ourfuture/Internet/section4.htmlhttp://www.rand.org/scitech/stpi/ourfuture/Internet/section4.html [1] [1] http://http://oxygen.lcs.mit.eduoxygen.lcs.mit.edu// [1] [1] http://cuneus.ai.mit.edu:8000/research/miketalk/miketalk.htmlhttp://cuneus.ai.mit.edu:8000/research/miketalk/miketalk.html if offline, see the technical paper:if offline, see the technical paper: http://citeseer.nj.nec.com/ezzat98miketalk.htmlhttp://citeseer.nj.nec.com/ezzat98miketalk.html [1] [1] http://www-lce.eng.cam.ac.uk/~dl231/http://www-lce.eng.cam.ac.uk/~dl231/ [1] [1] http://www-lce.eng.cam.ac.uk/~dl231/publications.htmlhttp://www-lce.eng.cam.ac.uk/~dl231/publications.html [1] [1] http://www.usa.siemens.com/about/innovations/feature_stories/simpad_22801.htmlhttp://www.usa.siemens.com/about/innovations/feature_stories/simpad_22801.html [1] [1] http://http://www.nist.gov/smartspacewww.nist.gov/smartspace// [1] http://www.itl.nist.gov/[1] http://www.itl.nist.gov/ [1] http://www.nist.gov/[1] http://www.nist.gov/ [1] http://www.computer.org/pervasive/[1] http://www.computer.org/pervasive/ [1] http://www.nature.com/nsu/011122/011122-11.html[1] http://www.nature.com/nsu/011122/011122-11.html [1] http://www.nature.com/nsu/010913/010913-3.html[1] http://www.nature.com/nsu/010913/010913-3.html [1] http://www.nature.com/nsu/020520/020520-4.html[1] http://www.nature.com/nsu/020520/020520-4.html [1] http://www.playresearch.com/[1] http://www.playresearch.com/ [1] http://www.viktoria.informatik.gu.se/groups/play/projects/slowtech/installations.html[1] http://www.viktoria.informatik.gu.se/groups/play/projects/slowtech/installations.html [1] http://www.ambientdevices.com/cat/applications.html[1] http://www.ambientdevices.com/cat/applications.html [1] http://www.nature.com/nsu/020429/020429-7.html[1] http://www.nature.com/nsu/020429/020429-7.html [1] http://www-lce.eng.cam.ac.uk/~dl231/[1] http://www-lce.eng.cam.ac.uk/~dl231/