Presentation is loading. Please wait.

Presentation is loading. Please wait.

Context in Ubiquitous Computing. Context sensing.

Similar presentations


Presentation on theme: "Context in Ubiquitous Computing. Context sensing."— Presentation transcript:

1 Context in Ubiquitous Computing

2 Context sensing

3

4 Growing up

5 Context aware cup

6 Context aware devices

7

8 Pervasive Computing

9 Evolution of the Digital Computer Mainframe Centralized Computing 1960 Portables Mobile Computing 1990 Sensor Network Pervasive Computing 2000 Interne t PC Distributed Computing 1980 40 years

10 Matilda Smart House

11 Wearable Computing

12 Context aware application

13 Why Simulate?

14 Check locks on doors and windows Other Services Automatically refill prescription Check if laundry is done Call in a nurse Call in for help and Assistance Monitor of kitchen: oven and stove on/off; temp. Turn on/off lights (and visually inspect) other rooms. Sense and see visitors/strangers at front door Order groceries with dietary restrictions Smart Phones

15 Medicine Reminder/Compliance UnLatch Client Server Response Query Reply Request Proxy HTTP Interface Query Response Generated PulseData written to portUnlock request CircuitTINI Board Scanner Medicine Bottle Pharmacy Schedule & deliver medicine reminders to a large population of users Direct access to the system by the pharmacy Provide Medicine information along with reminders Automatic refill & possible home delivery Support for compliance (correct medication intake, and safeguards against overdose)

16 Actuators and Sensors An agent observes the state of the world and can act by controlling actuators. Actuators are (weakly) related to sensors. Observes Controls Influences

17 Relationships Actuators operate in a certain domain. Sensors sense a certain domain. The activation of an actuator aims to change the state of a domain. Disallow conflicting operations! Raises Lowers Don’t turn on ac & heater at same time!

18 Restricting Behavior For every context we define what actions are permissible. We describe which java methods are allowed to be invoked. We can enforce policy by inserting security code into classes when they are loaded (bytecode instrumentation).

19 Advantage RFiD Expiration {Not Expired, Expired} Can cook Cannot cook Cooking a pizza Diet {Healthy, Unhealthy} Forget about your pizza

20

21 Types of Sensors

22

23

24

25 Smart Homes

26 Features

27 Crystallization of the vision

28 Application areas


Download ppt "Context in Ubiquitous Computing. Context sensing."

Similar presentations


Ads by Google