Anda di halaman 1dari 10

Things That Think: Ubiquitous Computing

D. Aditya A.Teja Swaroop Reddy


Computer Science and Engineering, Computer Science and
Engineering,
Malla Reddy institute of Technology & Science Malla Reddy Institute of Technology & Science
adityad89@gmail.com tejaalla369@gmail.com

entities like clothing, coffee mug, consumer


Abstract goods, car, human body etc can be embedded

What is ubiquitous computing? An exciting new with chips/devices executing intelligent


approach to serving us with technology? A software. These devices range from a few
difficult yet rewarding technical challenge? A millimeters in size like sensors to several meters
concern for privacy advocates? A good tool in like displays and are connected via wireless or
the right hands, and an oppressive one in other wired links to one another.
hands? “Ubiquitous” literally means existing or In the course of ordinary activities, someone
being everywhere specially at the same time”. "using" ubiquitous computing engages many
Hence ubiquitous computing, is the new era of computational devices and systems
technology embedded in the environment yet simultaneously, and may not necessarily even be
invisible, performing a wide range of tasks . aware that they are doing so. This model is
This paper primarily introduces the concept usually considered advancement from the
ubiquitous computing and tries to answer desktop paradigm. This paradigm is also
various inquisitions on the topic. As it is a described as pervasive computing, ambient
featured prospective many requirements and intelligence. When primarily concerning the
challenges are to be met before we can really objects involved, it is also physical computing,
make use the state of the art technology. the Internet of Things, haptic computing, and
Therefore it is necessary to analyze numerous ad things that think. Rather than propose a single
hoc implementation mechanisms and also the definition for ubiquitous computing and for these
sophisticated requirements for implementation related terms, taxonomy of properties for
of such sublime technology. It also discusses the ubiquitous computing has been proposed, from
research work going on in this field which are which different kinds or flavors of ubiquitous
foundations for this technology. systems and applications can be described.

2. Evolution
1. Introduction Ubiquitous computing names the third wave in
computing, just now beginning. First were
“The most profound technologies are those that mainframes, each shared by lots of people. Now
disappear. They weave themselves into the fabric we are in the personal computing era, person and
of everyday life until they are indistinguishable machine staring uneasily at each other across the
from it.” desktop. Next comes ubiquitous computing, or
As quoted by Mark Weiser summarizes the age of calm technology, when technology
the importance of Pervasive or Ubiquitous recedes into the background of our lives. Alan
Computing, which helps the user access to the Kay of Apple calls this "Third Paradigm"
computational environment, everywhere at all computing.
times and by means of any device. This is a In the past fifty years of computation
rapidly developing area focusing on the there have been two great trends in this
integration of Information and Communication relationship: the mainframe relationship, and the
Technologies into human environment and is PC relationship. Today the Internet is carrying us
made possible with the growing connectivity & through an era of widespread distributed
computing devices which is gradually becoming computing towards the relationship of ubiquitous
smaller and powerful. In Ubiquitous Computing, computing, characterized by deeply imbedding
computation in the world. Ubiquitous computing The Internet brings together elements of the
will require a new approach to fitting technology mainframe era and the PC era. It is client-
to our lives, an approach we call "calm server computing on a massive scale, with
technology". web clients the PCs and web servers the
mainframes. Although transitional, the
The Major Trends in Computing
Internet is a massive phenomenon that
calls to our best inventors, our most
many people share a
Mainframe innovative financiers, and our largest
computer multinational corporations. Over the next
decade the results of the massive
one computer, one interconnection of personal, business, and
Personal Computer
person government information will create a new
field, a new medium, against which the
next great relationship will emerge.
Internet - Widespread
. . . transition to . . .
Distributed Computing
2.4. Phase –III the UbiComp

many computers The third wave of computing is that of


Ubiquitous Computing
share each of us ubiquitous computing, whose cross-over
point with personal computing will be
Table 1. The three eras around 2005-2020. The "UbiComp" era
will have lots of computers sharing each
of us. Some of these computers will be
2.1. Phase-I the Mainframe Era the hundreds we may access in the course
of a few minutes of Internet browsing.
The first era we call "mainframe", to recall the Others will be imbedded in walls, chairs,
relationship people had with computers that were clothing, light switches, cars - in
mostly run by experts behind closed doors. everything. UC is fundamentally
Anytime a computer is a scarce resource, and characterized by the connection of things
must be negotiated and shared with others, our in the world with computation. This will
relationship is that of the mainframe era. There is take place at a many scales, including the
mainframe computing today: a shared office PC, microscopic.
and the great physical simulations of everything
from weather to virtual reality, have in common
sharing a scarce resource. If lots of people share
a computer, it is mainframe computing.

2.2. Phase-II the PC Era

The second great trend is that of the personal


computer. In 1984 the number of people using
personal computers surpassed the number of
people using shared computers. The personal
computing relationship is personal, even
intimate. You have your computer, it contains
your stuff, and you interact directly and deeply
with it. When doing personal computing you are
occupied, you are not doing something else.
Some people name their PC - many people curse
or complain to their PC.
Figure 1. Major trends in computing
2.3. TRANSITION - THE INTERNET
AND DISTRIBUTED 3. Conceptual analysis
COMPUTING
At their core, all models of ubiquitous computing through micrometers to millimeters. See also
(also called pervasive computing) share a vision Smart dust.
of small, inexpensive, robust networked Skin: fabrics based upon light emitting and
processing devices, distributed at all scales conductive polymers, organic computer devices,
throughout everyday life and generally turned to can be formed into more flexible non-planar
distinctly common-place ends. For example, a display surfaces and products such as clothes and
domestic ubiquitous computing environment curtains, see OLED display. MEMS device can
might interconnect lighting and environmental also be painted onto various surfaces so that a
controls with personal biometric monitors woven variety of physical world structures can act as
into clothing so that illumination and heating networked surfaces of MEMS.
conditions in a room might be modulated,
continuously and imperceptibly. Another Clay: ensembles of MEMS can be formed into
common scenario posits refrigerators "aware" of arbitrary three dimensional shapes as artifacts
their suitably-tagged contents, able to both plan a resembling many different kinds of physical
variety of menus from the food actually on hand, object.
and warn users of stale or spoiled food.
Ubiquitous computing presents challenges across
computer science: in systems design and 5. The computer Science of UbiComp
engineering, in systems modeling, and in user
interface design. Contemporary human-computer In order to construct and deploy the components
interaction models, whether command-line, of a UbiComp certain well worked areas of
menu-driven, or GUI-based, are inappropriate existing computer science are to be address.
and inadequate to the ubiquitous case. This
suggests that the "natural" interaction paradigm
appropriate to a fully robust ubiquitous 5.1. Issues of hardware components
computing has yet to emerge - although there is
also recognition in the field that in many ways In addition to the new systems of tabs, pads, and
we are already living in an UbiComp world. boards, ubiquitous computing needs some
Contemporary devices that lend some support to new kinds of devices. Examples of three
this latter idea include mobile phones, digital new kinds of hardware devices are: very
audio players, radio-frequency identification low power computing, low-power high-
tags, GPS, and interactive whiteboards. bits/cubic-meter communication, and pen
devices.
4. Basic Forms
5.1.1Low Power
Mark Weiser proposed three basic forms for
ubiquitous system devices, see also Smart
device: tabs, pads and boards.
Tabs: wearable centimeter sized devices
Pads: hand-held decimeter-sized devices
Boards: meter sized interactive display devices.
These three forms proposed by Weiser are
characterized by being macro-sized, having a
planar form and on incorporating visual output
displays. If we relax each of these three
characteristics we can expand this range into a
much more diverse and potentially more useful
range of Ubiquitous Computing devices. Hence,
three additional forms for ubiquitous systems
have been proposed:
Dust: miniaturized devices can be without visual
output displays, e.g., Micro Electro-Mechanical
Systems (MEMS), ranging from nanometers
In general the need for high performance has touch the screen, but can operate from
dominated the need for low power consumption several feet away. Considerable DSP and
in processor design. However, recognizing the analog design work underlies making
new requirements of ubiquitous computing, a these pens effective components of the
number of people have begun work in using ubiquitous computing system.
additional chip area to reduce power rather than
to increase performance. One key approach is to 5.2 Network Protocols
reduce the clocking frequency of their chips by
increasing pipelining or parallelism. Then, by
UbiComp changes the emphasis in networking in
running the chips at reduced voltage, the effect is
at least four areas: wireless media access,
a net reduction in power, because power falls off
wide-bandwidth range, real-time
as the square of the voltage while only about
capabilities for multimedia over standard
twice the area is needed to run at half the clock
networks, and packet routing.
speed. This method of reducing power leads to
A "media access" protocol provides
two new areas of chip design: circuits that will
access to a physical medium. Common
run at low power, and architectures that sacrifice
media access methods in wired domains
area for power over performance. The second
are collision detection and token-passing.
requires some additional comment, because one
These do not work unchanged in a
might suppose that one would simply design the
wireless domain because not every device
fastest possible chip, and then run it at reduced
is assured of being able to hear every
clock and voltage.
other device (this is called the "hidden
terminal" problem). Furthermore, earlier
5.1.2 Wireless wireless work used assumptions of
complete autonomy, or a statically
A wireless network capable of accommodating configured network, while ubiquitous
hundreds of high speed devices for every computing requires a cellular topology,
person is well beyond the commercial with mobile devices frequently coming on
wireless systems planned even ten years and off line. For this purpose a media
out, which are aimed at one low speed access protocol called MACA can be
(64kbps or voice) device per person. Most used. The key idea of
wireless work uses a figure of merit of MACA is for the two stations desiring to
bits/sec x range, and seeks to increase this communicate to first do a short
product. We believe that a better figure of handshake of Request-To-Send-N-bytes
merit is bits/sec/meter3. This figure of followed by Clear-To-Send-N-bytes. This
merit causes the optimization of total exchange allows all other stations to hear
bandwidth throughout a three- that there is going to be traffic, and for
dimensional space, leading to design how long they should remain quiet.
points of very tiny cellular systems. Collisions, which are detected by
timeouts, occur only during the short RTS
5.1.3 Pens packet. Adapting MACA for ubiquitous
computing use required considerable
A third new hardware component is the pen for attention to fairness and real-time
very large displays. These requirements requirements. MACA (like the original
are generated from the particular needs of ethernet) requires stations whose packets
large displays in ubiquitous computing -- collide to backoff a random time and try
casual use, no training, naturalness, again. If all stations but one backoff, that
multiple people at once. No existing pens one can dominate the bandwidth. By
or touchpads could come close to these requiring all stations to adapt the backoff
requirements. Therefore members of the parameter of their neighbors we create a
Electronics and Imaging lab at PARC much fairer allocation of bandwidth.
devised a new infrared pen. A camera- Two other areas of networking research
like device behind the screen senses the with ubiquitous computing implications
pen position, and information about the are gigabit networks and real-time
pen state (e.g. buttons) is modulated protocols. Gigabit-per-second speeds are
along the IR beam. The pens need not important because of the increasing
number of medium speed devices 6. Challenges Of Ubiquitous
anticipated by ubiquitous computing, and Computing
the growing importance of real-time
(multimedia) data. Real-
time protocols are a new area of focus in “As with most new technological advances,
packet-switched networks. Although real- obstacles are encountered and must be overcome
time delivery has always been important for them to succeed.” The Tabs, Pads, and
in telephony, a few hundred milliseconds Boards developed at XEROX PARC are no
never mattered in typical packet-switched different. Ubiquitous computing, as Marc Weiser
applications like telnet and file transfer. said above, has a very difficult task. The name
With the ubiquitous use of packet- alone implies computers everywhere, but in
switching, even for telephony using order for success to be achieved, they must
ATM, the need for real-time capable dissolve into the background. To do this,
protocols has become urgent if the packet ubiquitous computing devices must overcome
networks are going to support multi- six challenges:
media applications. The internet
routing protocol, IP, has been in use for • The “Accidentally” Smart Environment
over ten years. However, neither it nor its • Impromptu Interoperability
OSI equivalent, CLNP, provides • No Systems Administrator
sufficient infrastructure for highly mobile • Social Implications of Aware Technologies
devices. Both interpret fields in the • Reliability
network names of devices in order to • Inference in the Presence of Ambiguity
route packets to the device. For instance,
the "13" in IP name 13.2.0.45 is
interpreted to mean net 13, and network
6.1 The “Accidentally” Smart
routers anywhere in the world are Environment
expected to know how to get a packet to
net 13, and all devices whose name starts If you walk into an environment anywhere in the
with 13 are expected to be on that world, you would probably not find an
network. This assumption fails as soon as infrastructure suitable for ubiquitous computing
a user of a net 13 mobile device takes her devices. Instead, you would find an
device on a visit to net 36 (Stanford). infrastructure suited towards established and
Changing the device name dynamically well-grounded technologies, such as electricity
depending on location is no solution: running through the walls, phone lines running
higher level protocols like TCP assume into and out of buildings, and conveniences such
that underlying names won't change as indoor plumbing. You are not likely to see
during the life of a connection, and a newly constructed buildings equipped with
name change must be accompanied by devices to support pervasive computing. Instead,
informing the entire network of the for these computing devices to succeed, the
change so that existing services can find environments of users must be “upgraded,” in a
the device. A number of word, to support this new technology. Users
solutions have been proposed to this must realize the potential these new devices have
problem, among them Virtual IP from and gradually, and somewhat “accidentally,”
Sony, and Mobile IP from Columbia integrate them into their environments.
University. These solutions permit
existing IP networks to interoperate 6.2 Impromptu Interoperability
transparently with roaming hosts. The key
idea of all approaches is to add a second Ubiquitous computing, as its name implies, must
layer of IP address, the "real" address have devices everywhere. But who will make all
indicating location, to the existing fixed these devices. It surely won’t be left to a single
device address. Special routing nodes that company or manufacturer? It would be an ever
forward packets to the right real address, whelming and daunting task, if not impossible,
and keep track of where this address is, to produce all the “desired” computing devices.
are required for all approaches. The Thus, it must be a joint venture. However, this
internet community has a working group presents one small problem. It is common
looking at standards for this area. knowledge many technology-producing
companies desire to produce their own number to access the network. In this model, the
proprietary products speaking their own telephone company services the network while
proprietary language. This leads to the customer services the receiver. This model
“noninteroperability” between devices from allows any receiver to access the network. If an
different companies, stunting the growth of event occurs where one particular receiver is not
ubiquitous computing. Even if companies agreed capable of accessing the network, the user must
on a communication standard to further the new simply replace the receiver. However, the
computing age, we still may see stunted growth. troubleshooting for the telephone company is
Even if two devices are able to communicate, much more complex. The simplest solution, as
there is still the question of “How well they outlined by Edwards and Grinter, is to provide
communicate?” Take, for example, Linux and solutions for remote administration, diagnostics,
Windows. They are both able to communicate and upgrades. Yet, this opens another can of
using the Server Message Block (SMB) protocol. worms. How is the telephone company going to
However, there are some administrative things provide these remote administration services to
one must take care of before the two platforms itself, but deny it to an unruly cracker
are able to communicate. Imagine, if you will,
these two operating systems able to “sense” the 6.4 Social Implications of aware
presence of the other. The software technologies
automatically configures itself for your particular
environment. In just a few seconds, you are able
to share files seamlessly between two very Ubiquitous computing will have a social impact
different operating systems. on our society just as the previous two eras of
Ubiquitous computing must not just computing did – there is no question about that.
have interoperable devices, they must have However, as these devices are constantly
impromptu interoperability – the ability to bombarded with input from their surroundings,
interconnect and communicate with little or no the question then becomes what do the devices
advance planning. This presents a problem do with this input? How will it affect privacy?
because every device must be written to Will society turn to a social solution, legal
understand the software of every other device. solution, ethical solution, or technological
Again, a daunting task. Researchers at XEROX solution to protect privacy?
PARC have begun a project called SpeakEasy Georgia Institute of Technology has
aimed as designing a set of interfaces that turned to a legal solution to protect its
leverage mobile code to extend the behavior of inhabitants of the context aware house.
entities in the environment. Guidelines have been drawn up that describe
who has access to the information gleamed from
the house, how it may be accessed, and if and
6.3 No Systems Administrator
when it may be modified. The “house” also has
guidelines for making a visitor “invisible” to the
Challenge Two above ties in nicely with the next house through an opt-out option, as well as when
test for ubiquitous computing to take root – lack to make the house “take a nap” and shut off all
of a systems administrator. Most individuals who sensors and recordings. The guidelines also
operate a personal computer have no intimate cover how the captured data is to be stored
knowledge of how to administer a single securely.
workstation. It would be unrealistic for the These guidelines are fine for a
manufacturers of ubiquitous computing devices controlled environment in a trusted party such as
to expect their users to administer a complex the Georgia Institute of Technology. However,
network consisting of multiple devices. How what happens when ubiquitous computing is
does ubiquitous computing respond to this available to the masses. How will an individual
challenge? know if they are within a “smart” environment
The response may be in an already existing where embedded devices are gathering data? Is it
infrastructure – the telephone system. The ethical to gather information from individuals
telephone system is unique in that it possesses a without their knowledge? What information may
“thin-client” alongside a robust and intelligent be gathered? What information may not be
network. When a user would like to use the gathered? How may the information gathered be
telephone system, they simply must pick up the used, by whom, and under what circumstances?
receiver (thin-client), and dial the appropriate
Is national security a priority for accessing data? the front-end and a robust and intelligent
How about through a court order? network on the backend. One such example,
All of these questions relate to our privacy. And again, is the telephone system. The telephone
all of these questions and many more, need to be network model is, however, contrary to the
answered before ubiquitous computing takes personal computing network model. In the
hold. telephone network, the intelligence may be
found in the center of the network, away from
6.5 Reliability the edges and away from the thin-clients. In the
personal computing network, where workstations
connect to powerful servers through, essentially
Since ubiquitous computing devices will be “dumb” wires, the intelligence is found at the
everywhere, it makes sense for them to be edges. What this means is clients must be able to
reliable. Owners and developers will not want to support the workstations on their end. The
be constantly bombarded by failing devices or difficult design challenge will be to balance this
insecure software. If you take a look at the intelligence “between the edges and the center of
current age of computing and compare the the network.” Another issue for designers to deal
reliability issue of today to what the reliability with is how will tightly-integrated, fully-
issue of tomorrow must be, the difference is connected devices work when dealing with a
staggering. Today’s personal computers are, in a failed device? Will one failed device bring the
sense, becoming more and more reliable. whole ubiquitous computing network to its
However, they still have a long road ahead for knees? Or will the devices have integrated
them to catch up with the reliability exhibited by reliable, redundant, and fail over systems ?
other well-founded technologies, such as The third reason why embedded
televisions, telephones and even washing systems are more reliable then computing
machines. These well-founded technologies have systems of today is due to one simple fact – they
been successful, in part, due to their reliability. are expected to be reliable. If a consumer were
Edwards and Grinter believe the differences in required to constantly upgrade and patch their
terms of reliability between personal computing telephone or television, these devices would
and these well-founded technologies lie in some become a nuisance, and thus, be less successful.
key differences : On the other hand, however, personal computers
1. Differences in development culture have developed into a reliably-unreliable device.
2. Difference in technological approaches The expectation for PCs to crash and fail every
3. Differences in expectations of the market once in a while has been built into our perception
Perhaps the most recognizable issue related to of how they operate. For ubiquitous computing
the reliability of well-founded embedded to evolve from personal computers, this
technologies commences before the devices are perception of unreliability must change.
even assembled and shipped out to be put on the Consumers will not like it one bit if every
market. The designers of these embedded ubiquitous computing device they own requires
devices, (telephone, television, and washing them to upgrade, tweak, or tune for the device to
machine) are more focused on writing correct stay operate correctly .
code than most computer programmers. This Ubiquitous computing devices must be
design trait could be attributed to the difficulty reliable. This means designers of today’s
associated with patching and upgrading theses personal computers must analyze the design
embedded devices once they are in the field and issues, interoperability issues, and perception
in use. Yet, how often must systems issues that separate today’s reliable, embedded
administrators patch and upgrade the software in technologies from today’s unreliable personal
your personal computer? For ubiquitous computing devices.
computing to become successful, the designers
must take a page from the design techniques of
existing technologies. 6.6 Inference in the presence of
The technological approaches of ambiguity
personal computing must also be studied before
moving into the third generation of computing. The role of ubiquitous computing must
Remember, if you will, challenge three above: completely change the role of computing as
no systems administrator. One solution for this offered by the personal computer. The personal
challenge was to have a so-called thin-client on computing era saw the development and
proliferation of desktop computers. The In order for inference in the presence of
computer only did what it was told to do. If you ambiguity to succeed, the inference made by
punched a key on the keyboard, the computer computing machinery must be predictable. In
processed that request. If you told the machine to other words, the systems behavior in the
send an email, it would do it. With ubiquitous presence of a certain condition is known, the
computing, however, if a user needed to tell system’s facilities for detecting and inferring this
every single device what to do, all the devices condition is known, and a provision for
would soon become a nuisance, and thus, and overriding or canceling the systems behavior is
hassle. Instead, ubiquitous computing devices known. Take for example the thermostat in every
must be able to recognize changes in their modern home in America. The thermostat senses
environment, infer the action needing, and either a rise in the temperature of its surroundings and
complete the action or ask the user if they would responds by turning on the central air
like the action completed. conditioning unit. The systems behavior is
This begs one question though? How smart must predictable. The system’s facilities for detecting
these devices be to accomplish this task? If these and inferring this condition is predictable. And
devices are to be able to make decisions on their finally, the system provides a mechanism for
own based on an event, they must have a overriding or resetting the system back to a
substantial model of our world with which to previous state. All three of these conditions must
make decisions. These decisions will be based on be present to succeed in a context aware
sensors able to view differences in our, and its, environment.
environment over time. But our “analog” All six of these challenges that face
environment, according to Edwards and Grinter, ubiquitous computing span the realms of
“provide a great deal of ambiguity and technology, society, ethics, legality, and market-
uncertainty of input.” place. And as all six of these challenges are met
Edward and Grinter continue on to say over time, the course of ubiquitous computing
intelligence and decision making can show up in will unfold. But the question remains – how will
a variety of forms. These forms are all different it unfold and where is it headed?
and require a range of assumptions. Some
intelligence assumes very little, instead making 7. THE FUTURE OF UBIQUITOUS
the decisions based on hard facts. Other COMPUTING
intelligence assumes very much. Take for
example a ubiquitous computing device that is
able to communicate with a base station, The future of ubiquitous computing is largely in
providing its exact location in a building doubt. It is in doubt because we have yet to reach
instantaneously. This single device could be used the point where technological advances tip the
then, to locate an individual wherever they are in scales over societal skepticism, and we have
the building. Thus, if the device is located in a failed to meet the six challenges outlined above.
certain room, the base station may infer the However, this does not mean the future of
individual is also in that same room. However, ubiquitous computing has no future.
this inference may be incorrect. One may not be Indeed, pervasive computing is a hot topic for
able to infer everywhere the device is, the research at major universities throughout North
associated individual is as well. Another America. The University of Calgary, University
example lies with a computing device able to of Washington, Georgia Institute of Technology,
infer a meeting is taking place. It assumes if a University of California-San Diego, MIT
certain number of people are located in a single Stanford, and University of Illinois at Urbana
environment, a meeting may be taking place. Champaign all have major projects under way to
This device, then, may be programmed to infer further the advance of ubiquitous computing.
because a meeting is taking place, the minutes of The goals of research being done at these
the meeting should be transcribed. Additionally, research institutions focus on human factors,
the device may infer the minutes of the meeting technology, and systems work.
should be shared with others. These are what are
known as “phenomenological” problems. As 8. Projects under development
Edwards and Grinter so eloquently asked, “do
sensors reflect reality or merely the state of the 8.1 Project Oxygen
sensors?” In other words, how accurate are the
sensors at sensing reality?
At MIT, researchers are working on “Project monitor and record activity within every room of
Oxygen” in hopes of designing a system that will the house, microphones are capable of recording
bring computing to be human-centric, instead of each and every sound emitted in the house, and
computer-centric. The project believes items are “tagged” and tracked through the use
computation should be freely-available, much of an infrared Communication system. In
like batteries, electrical outlets, and even the response to this “invasion” in to a persons
oxygen we breathe. “Project Oxygen” utilizes a privacy, Georgia Tech developed some
device much like what XEROX PARC created guidelines for privacy protection within a context
when they designed the Tab. Figure 3 below is a aware home.
diagram of these Tab-like devices, called H21’s. As you can well see, ubiquitous
H21’s function as a mobile access point and computing, although still in its infancy has a lot
accept speech and visual input, are capable of to offer to users. However, before it becomes a
using any one of the numerous communication reality, the six challenges faced by ubiquitous
protocols, and can act as cellular phones, GPS, computing devices must be addressed.
pagers, cameras, and even personal digital
assistants. H21’s communicate with E21’s. 9. Conclusion
E21’s are a collection of embedded devices and
create areas of “intelligence” within an
environment. Users are able to communicate As the era of personal computes comes to a close
within an intelligent environment through natural and the era of ubiquitous computing emerges,
means, such as speech and vision, “without technologically advanced countries will enter a
being aware of any particular point of brave new world. A world where computers are
interaction” everywhere, but rarely seen. Computing
machinery will be embedded to devices hidden
from view, while other computing devices will
seem so natural we will use them without
believing they are computers.
The advances that will be made will
create a new life style for human beings. It will
be a lifestyle where computers aid and assist us
in our daily lives. Even doing the most mundane
activity, such as looking up a telephone number,
may be accessed as easily as speaking a person’s
name. Sensors embedded in the environment
around us will make like simpler.
However, this is not at a price. While
the sensors are accumulating information from
the environment around us, it may also be
Figure 2. Diagram of Project Oxygen’s H21 storing that information. Sensors will be able to
track our daily activities. This data may then be
Aware Home Intitive used for a situation in which the individual does
not desire. In essence, the information being
At Georgia Tech, researchers are studying the gathered may be an invasion of their personal
effects on humans of a context aware home. privacy. Today, even with the limited automated
How will humans interact with embedded information gathering techniques, privacy is a
computing in a home-like environment? A sub- major concern for groups and individuals. It will
project based on activity recognition allows the only become a larger issue as more and more
“house” to observe the general activities of the devices are developed aimed at automatic
occupants. The awareness includes such basic information retrieval.
tasks as reading a newspaper or watching TV, to But before ubiquitous computing
more complex activities such as preparing a “invades” our lives and brings privacy to the
meal. Appliances with in the house are able to forefront, it must face five other issues. These
recognize gestures and then translate them into five issues span the legal, technical, moral,
commands to execute. The Aware Home project marketplace- realms that affect all of society.
also considers the legal and social effects of Ubiquitous computing may be a ways into the
ubiquitous computing. Sensors are able to future, but we all know it is coming.
10. References

[1] www.mencl.us

[2] http://oxygen.lcs.mit.edu/

[3] http://www.ubiq.com/hypertext/weiser

[4] http://www.cc.gatech.edu

[5]en.wikipedia.org/wiki/Ubiquitous_computing

[6] http://www.ubicomp.in/

[7]
http://www.ubiq.com/hypertext/weiser/majortrends

[8]www.ubiqcomputing.org/

[9]www.google.com/

[10]www.ubicc.org/

Anda mungkin juga menyukai