A SEMINAR PRESENTATION ON GROUP AWARENESS IN BLUETOOTH Presented By: Your Name. Guided by Guide Name Department of Computer Engineering. College Name.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Computer Concepts – Illustrated 8th edition
Requirements Engineering Process
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
For APNOMS Managing Pervasive Computing and Ubiquitous Communications Challenges Ahead Graham Chen.
Online Internal Grant Process: An Effective Means to Infuse and Sustain General Education Goals University of Delaware Martha Carothers Catherine Davies.
Cultural Heritage in REGional NETworks REGNET E-SHOP.
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
2001_03_28 SG A contribution– 1 Dept of State ITAC-T Advisory Committee SG-A Ad Hoc Meeting on ENUM March 28th & 29th, 2001 ENUM CONTRIBUTION TITLE: ENUM.
CURRENT SITUATION OF E-HEALTH IN MYANMAR Nang Kham Oo Leik Central Womens Hospital
0 - 0.
Addition Facts
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Personalised Web Services for Activity-Based Mobile Learning Wichai Eamsinvattana PhD student, started Oct 2006 Supervised by Dr.Vania Dimitrova.
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Communicating over the Network
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented Design 1.
REST and the Exchange Network 5/30/ REST REST stands for Representational State Transfer 2.
Electric Bus Management System
OOAD – Dr. A. Alghamdi Mastering Object-Oriented Analysis and Design with UML Module 3: Requirements Overview Module 3 - Requirements Overview.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Discovering Computers Fundamentals, 2012 Edition
1 Jini Tutorial, Part 3 Jini Programming. 2 Tutorial outline Part 1 Introduction Distributed systems Java basics Remote Method Invocation (RMI) Part 2.
Duagi Bulent UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE.
Ecosystem Scenarios for Cloud-based NFC Payments
Windows® Deployment Services
1 Towards Building Generic Grid Services Platform A component oriented approach Jeyarajan Thiyagalingam Stavros Isaiadis, Vladimir Getov Distributed and.
© Charles van Marrewijk, An Introduction to Geographical Economics Brakman, Garretsen, and Van Marrewijk.
Database System Concepts and Architecture
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Doc.: IEEE /0898r2 Submission July 2012 Marc Emmelmann, FOKUSSlide 1 Fast Initial Service Discovery: An enabler for Self-Growing Date:
IHE Profile Proposal: Dynamic Configuration Management October, 2013.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Addition 1’s to 20.
® Microsoft Office 2010 Browser and Basics.
Test B, 100 Subtraction Facts
Figures in Chapter 1. Learning objectives After studying this chapter, you should be able to; Define logistics and supply chain management. Describe logistics.
Use the substitution method
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
1 Distributed Agents for User-Friendly Access of Digital Libraries DAFFODIL Effective Support for Using Digital Libraries Norbert Fuhr University of Duisburg-Essen,
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
A Context Aware Framework Mark Assad Supervisor: Bob Kummerfeld.
Service Oriented Architectures in Heterogeneous Environments
Reference: [1] TeamSpace paper
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
Enabling Secure Ad-hoc Communication using Context- Aware Security Services Author: Narendar Shankar, Dirk Balfanz Presented by: 魏聲尊.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Introduction - What is Jini Technology?
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Deceit System This overview is meant to provide a coherent understanding of the Deceit System and Engine. The distribution of clients and servers, the.
Intro to Computers Understanding Computers and Computer Literacy.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion José Simões Fraunhofer Institute FOKUS
Architectural Design of a Multi- Agent System for handling Metadata streams Don Cruickshank, Luc Moreau, David De Roure Department of Electronics and Computer.
Jini Architecture Introduction System Overview An Example.
Jini Architectural Overview Li Ping
Mapping Salutation to Bluetooth 4 Overview 4 Bluetooth Summary 4 Salutation Architecture Summary 4 Mapping Bluetooth SDP to Salutation APIs 4 Mapping Bluetooth.
Unit 1—Computer Basics Lesson 1 Understanding Computers and Computer Literacy.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
1 Multimedia services over networks Service provider Service client Service registry Publish Discovery Bind Multimedia system Review/background Framework/
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Unit V Mobile Middleware.
Presentation transcript:

A SEMINAR PRESENTATION ON GROUP AWARENESS IN BLUETOOTH Presented By: Your Name. Guided by Guide Name Department of Computer Engineering. College Name

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.2/16 Outline Introduction. Context awareness. Groping and Towards group awareness Service awareness and its challenges. Conclusion.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.3/16 GROUPING Grouping is a fundamental human cognitive process affecting on group awareness.The cognitive. The aspects of grouping are called Gestalt's law. E.g. similarities between location,distance and connection.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.4/16 Context Awareness. An entity is a person,a place and object is relevant between the user and applications including the applications and applications themselves.Grouping awareness in context of computer supported collabrative work as communication collaboration awareness continum.Awareness gives an end user the abilty to see what another user is doing. It is the systems ability to use context to provide relevant information and services to user.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.5/16 Task,Goal,Usability End user of the service has some goals when using a bluetooth service or device. Usability of the service increases,when the amount of the task needed to goal lowers,and the tasks are more closely connected to the goals in terms of the end user.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.6/16 TOWARDS GROUP AWARENESS Bluetooth specification descries where items and services work as a group,there is no clear way for user or end user to know: 1) Which service are to be shown 2) Which services are to be used As a group.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.7/16 GROUP MANAGEMENT Figure 2 Figure.1 Group level. Bluetooth telephony control ( BTC) describes group management in bluetooth..

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.8/16 Service discovery profile. Bluetooth specification offers some tools to Solve the problem of task /flow: 1. Bluetooth devices have unique identification number. 2. One bluetooth device may offer several services,that may be governed independently. At this stage,the applications group awareness must be built to be application independent.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.9/16 Ambient awareness. we want to enable ambient awareness support, which enables users to focus on goal-directed interactions in certain situational contexts and: 1) Minimize or eliminate required user attention for managing dynamic changes in the user's computing and communication environment and 2) Maximize use attention for and interaction with entities/resources/artifacts that are relevant to the user's goals and situational context.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.10/16 SCENARIO Figure 1 shows an example communication scenario with users A and B who carry several personal devices that interconnected in a Personal Area Network (PAN).

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.11/16 SERVICE AWARENESS Service awareness is concept which includes service discovery,advertisement server selection in mobile ad hoc environments. In the context of our concept the services thatare not pre-installed infrastructure in case of protocols.e.g.discovering a printer is not concept of service awareness.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.12/16 Challenges of service awareness In general service discovery mechanism can be divided into three categories : 1.Central registry and lookup:Server registered their services to the central registry. 2. Service registration: Servers announce their services to other. 3. Server query:Client sends their requests for services and try to get replies from servers. Service awareness in mobile ad hoc network rise to new challenges.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.13/16 Conclusion 1).Group management provided by the BTC does not provide group awareness to the end user. 2). Naming convention informative to end user(s) should be built. 3).Group management in bluetooth telephony does not necessarily provide for group awareness.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.14/16 BIBOLOGRAPHY [1]. Jorno parkinen &Kristina karaoke, group awareness in Blue tooth,Helsinki University of technology, P.O.Box 5400, hut,December 29 th,2000. [2].Theo kanter, Co-operative mobile ambient awareness, Erisson, research, SE-16480, kista,Sweden, March 11 th,2003. [3]. Jading wu & Martina ziterbart, Institute of telemantics, University of kalsruhe, Germany, July 30 th, 2001.

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.15/16

B.E. COMPUTER SEMINAR Sep. 11, 2003 Yogesh V. Chaudhari.16/16