Wearable Computing Manuel Probst Barbara Schwarz.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Impact of Nanotechnology on Wireless Communication Naveen P Rudra Summer 2005, CS898T, Wichita State University.
GESTURE BASED GLOVE FOR MULTIPLE APPLICATIONS
Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
ECG Signal Processing Ojasvi Verma
Electrical & Computer Engineering Department Ryerson University EDP Topics of Xavier Fernando
Multi-agents based wireless sensor telemedicine network for E-Health monitoring of HIV Aids Patients. By: Muturi Moses Kuria, SCI, University of Nairobi,
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
IPod Touch. Need For iPod Touch Created for people who wanted the capabilities of the iPhone without the monthly contract of a cellular service. Fields.
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
Interactive Systems Technical Design
The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.
Mobile Commerce and Ubiquitous Computing
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
CURRENT TRENDS IN DIGITAL ELECTRONICS– AN OVERVIEW
Sensor Networks Lecture 7. Sensor Networks Special case of the general ad hoc networking problem Much more resource constrained than a network of PDAs.
Home Health Care and Assisted Living John Stankovic, Sang Son, Kamin Whitehouse A.Wood, Z. He, Y. Wu, T. Hnat, S. Lin, V. Srinivasan AlarmNet is a wireless.
Smart Products and Connected Health The Personal Metrics Movement Fredric Raab Sr. Systems Engineer UCSD Center for Wireless and Population Health Systems.
Lecture 4: Mobile Computing
Mobile cloud computing: survey 1. Introduction  In recent years, applications targeted at mobile devices havs started becoming abundant with applications.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Which kind of computer?
Module Common Network Environments, Connectivity and Security Issues.
The Physical Web Robert T. Coneybeer Managing Director.
CDMA WIRELESS DATA TRANSMITTER By Vijay kumar kintali B.tech 7 th semester Regd no:
Mobile Payments Antti Pihlajamäki Slide 2 Helsinki University of Technology Seminar on Networking Business Outline Introduction  Terminology.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
VIT UNIVERSITY :: VELLORE
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Raising Personal Inclination and Usability of ICT supported Health Roman Trobec 1, Viktor Avbelj 1 and Uroš Stanič 2 1 Jožef Stefan Institute, Jamova 39,
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
788.11J Presentation “Smart Jacket” Presented by Mahmoud Moneeb Azab.
The Challenges of Wearable Computing Thad Starner Georgia Institute of Technology IEEE MICRO JULY-AUGUST 2001 Presenter : Chanmin Park ( 박 찬 민 ) SNU CARES.
MOBILE COMPUTING MOBILE COMPUTING V.Pandeeswari, V.Pandeeswari, II nd CSE II nd CSE.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
6 H UMAN F ACTORS T O A CCEPTABILITY O F W EARABLE C OMPUTER C HERRYLYN B UENAFLOR AND H EE -C HEOL K IM Archana Prakash Shyam Sajan.
AirPatrol’s ZoneDefense for Corrections Complete 24/7 precision monitoring and detection of all mobile devices.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
Ubiquitous learning. What is ubiquitous learning? Computing and communication technologies Characteristics of ubiquitous learning Context and ubiquitous.
Contents Introduction Problem Definition Proposed Solution
Uichin Lee KAIST KSE KSE801: Mobile and Pervasive Computing for Knowledge Services.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wearables and Mobility Asia SmartPhone Apps Summit 2014 Robert Chew Singapore.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
JTC 1 SWG-A N 110 replaces SWG-A N 086 November 29, 2005 Title: Report of the Task Group 1 Breakout on Domains (replaces SWG-A N 086) Jennifer… Can you.
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Mobile Computing and Commerce Mata kuliah: M Konsep E-Business Tahun: 2010.
Intelligent Environments1 Conclusions and Future Directions.
Types of computers Hardware. 8/3/12 Hardware - the tangible, physical parts of the computer which work together to input, process, store and output data.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
TE PICT. Programmer Gamer THE PROBLEM Today's Mobiles, More than mere a communication media.
Augmented Reality Authorized By: Miss.Trupti Pardeshi. NDMVP, Comp Dept. Augmented Reality 1/ 23.
IPHONE Neeraj Dhiman. CONTENT  INTRODUCTION  HISTORY  HARDWARE  SOFTWARE  FEATURES  SPECIFICATIONS  RESTRICTIONS.
SATIRE: A Software Architecture for Smart AtTIRE R. Ganti, P. Jayachandran, T. F. Abdelzaher, J. A. Stankovic (Presented by Linda Deng)
Keyboard Computer Mouse Input devices is the information you put into the computer.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
SEMINAR ON “ REMOTE CONTROLLING OF TECHNICAL SYSTEMS USING MOBILE DEVICES”
Presentation on BRAIN GATE Sree Vidyanikethan Engineering College A.Rangampeta, Tirupati. By P.Bhaskar (II MCA) M.Jayaprakash (II MCA)
Malik M. McDaniel 9/15/2011 Nursing Informatics. Purpose To discuss the benefits of PDA usage in nursing To determine challenges related to PDA use To.
ZigBee
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Seminar On Blue Eyes Submitted By: Ghaytadak Satish Laxman.
Prepared by: Celeste Ng Updated: May, 2017.
Mobile Commerce and the Internet of Things
Internet of Things (IoT)
Mobile Computing.
Internet of Things (IoT) for Industrial Development and Automation
 Google Glass is a headset, or optical head-mounted display, that is worn like a pair of eyeglasses.  Developed by R&D Dept. of Google  FEATURES  Touchpad.
Presentation transcript:

Wearable Computing Manuel Probst Barbara Schwarz

12. Juli 2006Seminar: Context-Aware Computing2 Content -Definition & scope -Placement & ergonomics -Implementation barriers -Applications -Further aspects -Outlook

12. Juli 2006Seminar: Context-Aware Computing3 Definition & Scope -Definition -External stimulus  useful reaction -Sensor- and Communication Technology -„First-Person“ sense -Scope -Wearable ≠ portable -Mobile Phones -PDA‘s

12. Juli 2006Seminar: Context-Aware Computing4 Placement & Ergonomics -On the user‘s body -In the user‘s clothes (smart clothing) -Implanted under the user‘s skin

12. Juli 2006Seminar: Context-Aware Computing5 Placement & Ergonomics -On the user‘s body -Placement -Form language -Human movement -Sizing -Weight Source:

12. Juli 2006Seminar: Context-Aware Computing6 Placement & Ergonomics -In the user‘s clothes (smart clothing) -Already ergonomically designed  Suitability and comfort - Enormous potential in smart clothing

12. Juli 2006Seminar: Context-Aware Computing7 Implementation Barriers -Power supply -Batteries -Trade-off: storage vs. dimension/weight -Need for charge -Regenerative energy -Not (yet) able to generate enough energy -User himself ?

12. Juli 2006Seminar: Context-Aware Computing8 Implementation Barriers -Miniaturisation -Cross-linking -On-body communication -Wireless mostly  radiation -Off-body communication -Wireless (GSM, UMTS)  reachability

12. Juli 2006Seminar: Context-Aware Computing9 Applications -Fun-/Entertainment sector -Healthcare -Military sector -Logistic-/transportation sector -Construction sector

12. Juli 2006Seminar: Context-Aware Computing10 Applications AccessoryClothingImplants Healthcare Critical Data ViewerKnow Where Jacket VeriChipVeriChip (Patient History) University Southern Cal. Military/ Government Viewing SystemsFollowing Presentation VeriChipVeriChip (Immigrants, Prisoners, Security) Industrial/ Commercial Following Presentation VeriChipVeriChip (Tracing) Consumer Personal Media Viewer Know Where Jacket Nike Plus VeriChipVeriChip (Cash)

12. Juli 2006Seminar: Context-Aware Computing11 Critical Data Viewer -Attached to glasses -Additional control device -Mobile data access -Surgery -Monitoring Source:

12. Juli 2006Seminar: Context-Aware Computing12 Know Where Jacket -Multimedia Features -GPS Receiver Source:

12. Juli 2006Seminar: Context-Aware Computing13 VeriChip -Human-implantable passive RFID chip -Containing an unencrypted ID Source:

12. Juli 2006Seminar: Context-Aware Computing14 Center for Neural Engineering -Silicon chip -Replace defective portions of the human brain or nervous system -Research project Source:

12. Juli 2006Seminar: Context-Aware Computing15 Viewing Systems -View mission critical information -Nighttime viewing -Detection avoiding Source:

12. Juli 2006Seminar: Context-Aware Computing16 Personal Media Viewer -Connected to some device -Play video files -Built-in stereo audio Source:

12. Juli 2006Seminar: Context-Aware Computing17 Nike Plus -Sensor -iPod Receiver -Synchronization Source:

12. Juli 2006Seminar: Context-Aware Computing18 Further Aspects - Privacy -Reliable IT infrastructure -Business environment -Legal restrictions -Security issues -Encryption -Forgeries (identity theft) -Abuses (information acquisition)

12. Juli 2006Seminar: Context-Aware Computing19 Further Aspects - Acceptance -Dependent on privacy regulations -Ethical Issues -Religions

12. Juli 2006Seminar: Context-Aware Computing20 Outlook -Industry seminal -Mature Technologies -10th International Symposium on Wearable Computers in Montreux