abstract pervasive

11

Click here to load reader

Upload: ragavendran-anbalagan

Post on 06-May-2015

3.364 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Abstract pervasive

NANDHA ENGINEERING COLLEGE

VAIKKALMEDU

ERODE - 638058

A PAPER ON:

PERVASIVE COMPUTING – THE NEXT ERA OF

COMPUTER SCIENCE

PRESENTED BY:

1) A.RAGAVENDRAN,

[email protected]

Contact no:-9486850011

2) S.SETHUPATHY,

[email protected]

Contact no:-9578088074

Page 2: Abstract pervasive

Abstract:- This is a paper that describes

the future of pervasive computing as well

as its existing challenges. It starts out by

comparing pervasive computing with

distributed system and mobile computing

and how the three fields are related to

each other. It then mentions unique

characteristics that forms the basis of

pervasive computing and clarifies them

with example scenarios. Proactively, the

ability to foresight users’ intention, and

self-tuning, the ability to adjust behavior

to fit the environment, are described as two

key ideas in pervasive computing.

Thereafter, the paper starts to discuss the

state of art design and implementation

problems that challenges us in building

pervasive computing systems. In addition,

the paper reminds us the challenges in

areas outside computer systems. This

includes but not limited to human

computer interaction (HCI), Artificial

intelligence and software agents.

This paper presents a comprehensive

overview of pervasive computing in terms

of what have been done and what is

needed to be done.

“The most profound technologies are those

that disappear. They weave themselves into

the fabric of everyday life until they are

indistinguishable from it.”- Mark Weiser

Another important contribution of this

paper is that it interconnects a lot of

research areas that looks disjoint, and

proposes to put all of them to work for

pervasive computing.

Topics to be covered but not limited to the

following:

*Hardware used in mobile devices

*Issues in wireless communication

*Data access and file systems adaptation

for mobile computing

*Resource allocation in mobile systems

*Sensing and Actuation

*Context aware systems

*Protection, security and Privacy issues

*Design methodologies of Pervasive

systems

*Applications of pervasive systems and

application oriented issues

PERVASIVE COMPUTING – THE NEXT ERA OF COMPUTER

SCIENCE

A.RAGAVENDRAN, S.SETHUPATHY Department of Computer science and engineering

Nandha Engineering College [email protected]

[email protected]

Page 3: Abstract pervasive

1. INTRODUCTION:

Formally ubiquitous computing is defined

as "machines that fit the human

environment instead of forcing humans to

enter theirs." This paradigm is also

described as pervasive computing,

artificial intelligence., The various

computing technologies have been

evolving continuously penetrating far and

wide and increasingly influencing almost

every aspect of our day-to-day life.

The rapidly advancing technology has

blessed us with a host of versatile devices

to make our life easier. The invention of

equipments like abacus, transistor,

ENIAC, PC, mobile phone etc defined

new and higher levels of sophistication,

use, and comfort for the human life.

The revolution unleashed by the massive

penetration of cellular mobile phones has

made it a community device like the radio.

This was made possible by the tremendous

growth in the new computation paradigm

called PERVASIVE COMPUTING. This

approach envisions a conglomeration of

small smart devices like sensors, signal

conditioners, wearable computers, mobile

phones, notebook computers, hand-held’s,

PDA s etc seamlessly integrated and

scattered in the environment. The ultimate

goal is to enable ANY TIME ANY

WHERE computing. And with the advent

of Internet, the World Wide Web, and

other networking technologies, instant

communication and transmission of data

were made possible, shrinking the world

and bringing the people across the globe

close together transcending geographic

barriers.

2. PERVASIVE COMPUTING:

The goal of pervasive computing, which

combines current network technologies

with wireless technologies, voice

recognition, internet capability and

artificial intelligence, is to create an

environment where the connectivity of

devices is embedded in such a way that the

connectivity is unconstructive and always

available. It is a numerous, causally

accessible, often invisible devices. It

makes a computer so natural that we use it

without even thinking about it. It provides

access to relevant information and

applications through a new class of

ubiquitous, intelligent appliances that have

the ability to easily function when and

where needed. We envision an explosion

of interconnected small devices from

watches to cars that make our lives easier

and more productive. A parallel revolution

lays in the network-enabling these

pervasive computing devices by providing

transparent, ubiquitous access to

e-business services. In general, it is

Page 4: Abstract pervasive

roughly the opposite of virtual reality.

Pervasive means spreading widely

throughout an area or a group of people.

Pervasive health care focuses explicitly on

the use of pervasive computing technology

for developing tools and procedures that

put the patient at the center of the health

care process. From a technological stand

point it includes remote monitoring,

remote consultation, and assistive

technologies.

Fig1.Pictorial overview of the pervasive

health care scenario

This has opened up exciting

possibilities in the health care sector both

in terms of diagnostic equipments and

communication devices. Now tele-

medicine systems have sufficiently

advanced so as to relay the medical data

over large distances within a reasonable

delay. Attempts are being made to develop

intelligent wearable computers that can

perform a primary diagnosis.

Anytime/anywhere--->any device--->any

network--->any data.

Any time: 7 days X 24 hours, global,

ubiquitous access

Any device: pc, PDA, cell phone and so

forth.

Any network: access, notification, data

synchronization, queued transactions,

wireless optimization, security, content

adaptation, development tools, device and

user management

Any data: e-mail, personal information

manager, inter-intranet, public services

Imagine a world filled with all

sorts of electronic devices - traditional

desktop computers, wireless laptops, small

PDAS, smart cell phones, tiny wristwatch

pagers, clever little coffee pots. You have

just imagined the future of Pervasive

Computing (PvC).

3. PRINCIPLES:

The basic principles of pervasive

computing are

Decentralization

Diversification

Connectivity

Simplicity

Page 5: Abstract pervasive

3.1. DECENTRALISATION: The shift

from a centralized view to a strongly

decentralized computing landscape is the

first paradigm of pervasive computing.

Pervasive computing distributes the

responsibilities between the variety of

small devices, each of which take over

specific tasks and functionality. The

ability to use applications and information

on mobile devices and synchronize any

updates with network based systems or

other devices is a new task arising from

that decentralization. Pervasive devices

and applications are often embedded into a

service infrastructure, like a cellular phone

network. Decentralization makes it

necessary for service providers to

administer their deployed software and

deliver updates to the customer’s devices

from remote.

3.2. DIVERSIFICATION: Pervasive

computing introduces an entirely new view

of functionality: there is a clear move from

universal computers challenging

performance, price and functionality to

diversified devices which aim at best

meeting the requirements of a specific

group of users for a specific purpose. The

new gadgets appearing in these days in

association with pervasive computing,

such as WAP phones, screen phones, or

handheld computers, offer only a highly

customized functionality for a particular

application context. Applications are a

seamless integration of software and

hardware. They are intended to be used in

a specific situation and optimized for that

environment. One major challenge arising

from the increasing diversity is how to

manage the different capabilities of those

manifold devices. Each delivery platform

has its own characteristics making it

difficult to provide common applications.

A major requirement is integrating all this

technology to deliver real solutions to

users.

3.3. CONNECTIVITY: The third

paradigm of pervasive computing is the

strong demand towards connectivity.

Manifold devices are seamlessly integrated

in an IT world without boundaries.

Handheld computer collaborates in the

cellular phone via infrared in order to

synchronize data over a wireless network.

Alternatively, the same handheld can

connect via serial port to a LAN. The

vision of pervasive connectivity is

“Everybody’s software, running on

everybody’s hardware over everybody’s

network”. One approach for achieving

connectivity is to base the applications on

common standards. Open standards have

to be established which are prepared to

face the demands of the described

manifold and differentiated devices. New

standards like WAP, Bluetooth have been

Page 6: Abstract pervasive

created by large cross-industry initiatives,

defining the necessary communication

protocols as well as the underlying

physical connections. The Internet has

evolved to be the backbone of worldwide

private and public networks.

3.4. SIMPLICITY: Pervasive devices are

very specialized tools that are not

optimized for general use. They perform

the task for which they have been designed

very well from a usability point of view.

These lines up with the fourth paradigm of

pervasive computing; aiming at simplicity

of usage. The magic words are

availability, convenience, and ease of use.

Information access and management must

be applicable without spending significant

time learning how to use technology.

While proper selection and education of

user groups was required to manage the

complexity of traditional computer

systems, pervasive computers are intuitive

to use and might not even require the

reading of a manual. Pervasive computing

postulates a holistic approach: Hardware

and software should be seamlessly

integrated and target the very specific

needs of and end-user. Providing all these

in a small and cheap device is definitely a

challenging task for developers.

4. PERVASIVE HEALTHCARE

SYSTEMS:

Fig2. Pervasive healthcare system in

hospitals

Beyond pure technology the issue of

convincing real life applications is

increasingly becoming a central topic in

the field of Pervasive Computing. Here the

area of health and healthcare has emerged

as a promising domain. So called

Pervasive Healthcare Systems

encompasses a broad range of topics such

as advanced hospital information and

logistics systems, mobile health

monitoring, assisted living for the elderly

and the handicapped, and lifestyle and

wellness related personal systems. The

demographic trend towards a more elderly

society and the rising healthcare costs lead

to a strong demand for solutions that

provide adequate care at affordable cost.

Furthermore consumers are increasingly

health conscious and looking for lifestyle,

wellness and health related products.

As promising as it is as an application

domain, the field of Pervasive Healthcare

Page 7: Abstract pervasive

is scientifically and technologically highly

challenging. Healthcare applications

involve complex processes often within

strict regulatory constraints. Reliability,

security and privacy are central to many

applications. In addition since the systems

are often closely integrated with the user’s

everyday activities and relate to very

private issues subtle, human computer

interaction issues play an important role in

the system design.

5. PERVASIVE DEVICES

(SENSORS):

A brief glance at some important wearable

cardiac devices is listed below.

Fig3.LC circuit based sensor

Fig4. Force sensing resistors

5.1. Cardiac Holter:

Named after its inventor, Dr. Norman J.

Holter is a portable device for

continuously monitoring the electrical

activity of the heart Holter monitor records

electrical signals from the heart via a series

of electrodes attached to the chest. The

number and position of electrodes varies

by model, but most Holter monitors

employ from three to eight. These

electrodes are connected to a small piece

of equipment that is attached to the

patient's belt, and is responsible for

keeping a log of the heart's electrical

activity throughout the recording period...

This data is later downloaded to a PC and

examined as an ECG pattern and analyzed

using analysis software. The software

gives a visual indication of any

abnormality. A set of templates of ECG

patterns have been derived and they serve

as a reference.

5.2. Vita phone Hertz handy:

This is a complete system for patients to

measure an ECG signal and transmit the

data to a central location called service

center for analysis and further processing.

A panic button is provided which on being

pressed sends an alarm signal to the

service center along with the patient's

current GPS position.

Page 8: Abstract pervasive

5.3 Welch allyn Micropaq:

It supports multi parameter monitoring like

ECG display, heart rate, patient alarms, etc

and also alarm messages from an Acuity

Central Station. It extends patient care by

providing patient alarms when it is out of

range or not connected to the wireless

network. The Micropaq can be integrated

into wireless Ethernet Local Area

Networks.

5.4 E-san:

This is for asthma monitoring. This uses a

combination of electronic peak flow meter

and a PDA handset which transmits the

readings to a central server over a GPRS

connection. It also has an integrated

monitoring device for diabetics.

5.5 Amon:

Amon is a wrist mounted device which

acquires signals such as heart rate, skin

perspiration, body temperature etc and

transmit these data to a remote tele-

medicine center. But the vital parameters

are not continuously transmitted and

inconsistency in the medical data has been

reported.

The recording done by these devices must

always be analyzed only by a qualified

technician or a doctor; this is a huge

overhead for the professionals considering

the number of patients they attend to in a

hugely populous country like India. If you

need an immediate diagnosis this approach

too proves to be inadequate. In high risk

cases you need to make the diagnosis on

the fly instantaneously. Hence the

wearable device should have sufficient

computational intelligence to monitor the

heart rate and analyze it dynamically,

detect the flaws and immediately inform

the care provider. In short, to be of use in a

crisis situation the above mentioned

devices fail for want of decision support

and provision to communicate an alert.

And hence the authors propose a new

framework which would solve these

drawbacks

6 PERVASIVE COMPUTING - A

LIFE SAVING TOOL:

The silent heart attack belongs to the high

risk category. Since this does not trigger

any visible indications unlike an ordinary

heart attack, it could often be fatal and

usually goes unnoticed. The only fool-

proof method of detecting this is by

observing the deviation in the ECG

(Electro cardiogram) pattern.

But this data after reception must again has

to be analyzed by doctors in order to make

the diagnosis. This could prove to be too

Page 9: Abstract pervasive

slow in dealing with crises like silent heart

attacks where an immediate diagnosis and

care delivery is of paramount importance.

Fortunately computation technology has

advanced to provide us with small

wearable devices with integrated sensors

for cardiac monitoring.

Fig5.Cardiac monitoring system

The proposed scheme envisions a wearable

diagnostic unit which will continuously

monitor the heart checking for

abnormality. This is done based on a

template matching procedure. Instead of

storing the entire pattern it stores the data

related to the abnormality alone. The

detection generates a trigger signal which

is picked up by the patient's mobile phone,

and it causes a predefined message to be

sent to a predefined number such as the

doctor's mobile phone automatically

without alerting the patient and causing

panic. This communication process can be

suitably enhanced like alerting the nearest

or any chosen hospital by an automated

call.

Fig6. Diagrammatic representation of

the healthcare system architecture

The first part is the wearable diagnostic

unit and has the following components.

i. A transducer unit in order to pick

up the electrical pulses of the heart.

ii. A conditioner: This will extract

the data relevant to heart attack.

iii. Template: The templates will store

the reference values with which the

output of the conditioner will be

matched. The template will be

customized to suit the patients’

condition based on parameters like

age, sex, history of attacks and

anonymous conditions. This

template will be set based on a

doctor’s consultation and it can be

changed or updated regularly.

iv. Trigger generator: In the case of

any abnormality this trigger

generator will generate a signal

Page 10: Abstract pervasive

which can be picked up by a

mobile phone or PDA so that the

alert can be relayed to a care

provider.

The second part is the alert unit. This is

configured as software installed on the

patient's mobile phone or PDA. It listens

for the trigger from the wearable unit and

upon its receipt executes a routine which

will forward a predefined message to a

predefined number like the doctor's or that

of a trusted medical care provider. This

system will provide an instantaneous

analysis and alert which could be vital in

saving valuable time and human life.

Enhancements like alerting or navigating

to the nearest hospital could be added.

7 IMPLEMENTATION:

Fig7.Pictorial representation for

implementation of pervasive computing

There are several sensors to detect human

blood pressure. A patient suffering from

blood pressure will be fixed with this

sensor in his wrists. When blood pressure

either increases or decreases, these sensors

detect them and inform them to the

patient’s PDA. The PDA is set in such a

manner that it automatically sends

information to the hospital server via

internet. The hospital server analyses the

information, prepares a report regarding

the patient’s condition. Then it sends the

report to the doctor. In accordance to the

report, it alerts the patient’s relative and

also the patient (through PDA). When the

patient is somewhere outside and if he

moves to a critical unconscious state, the

sensor will automatically detect it and it

will be indicated to the hospital server.

Hence, the patient’s relative will be

informed with the problem and the patient

can be rescued immediately.

8 FUTURE:

It is difficult to predict the future

evolution in a rapidly changing

environment. Almost every business

process involving people will integrate

pervasive computing into marketing and

delivery channels. Highly personalized

services and the ability to control

communication and services via easy to

use interfaces are key to gaining

A

patient

with

sensor

in his

wrist

PDA

Patients’

Relative

Internet

Hospital

Server

Doctor’s

Personal

Mobile

Page 11: Abstract pervasive

acceptance. Mobile communication and

the Internet are converging into an overall

mobile computing infrastructure with the

next generation of the Internet. Security

and privacy will be guaranteed by the

extensive use of encryption and public key

infrastructure. Pervasive portals servicing

millions of concurrent users will demand

web application servers and scalable server

infrastructure with high performance and

availability. Managing the rapid change in

the pervasive computing space will be a

major challenge for all participants.

9 CONCLUSION:

Pervasive computing in an

increasingly networked world continues to

affect more and more of the world's

population. More questions than answers

remain, more investment required than

profit currently available, but plenty of

opportunity and revolutionary benefits

(and potential pitfalls) for everyone who

participates. Although this is a global

phenomenon, regional and national social

and cultural factors will directly influence

the technologies and promise of pervasive

computing.

Pervasive computing is quite a bit

different, because it assumes a distributed

environment model. It has the potential to

dramatically alter how people use devices

to connect and communicate in everyday

life. In this paper, we have described the

implementation of pervasive computing in

medicine – as a life saving tool. Thus, we

stand at the beginning of yet another era in

computers – pervasive era.

10 REFERENCES:

a) Pervasive Computing, by Uwe

Hansmann, Lothar Merk, Martin S.

Nicklous, Thomas Stober

b) Pervasive Computing – Technology

and Architecture of Mobile and

Internet applications, Jochen

Burkhardt, Dr. Horst Henn,

Stefan Hepper, Klaus Rintdorff,

Thomas Schack

c) Pervasive Computing in Health

Care Jacob, E. Bardram, Alex

Mihalidis, Dadong Wan Published

2006, CRC Press

d) Mobile Medicine : hand held’s

used to treat disease Dueul. R

Pervasive Computing IEEE,

Volume1, Issue2, Apr-Jun 2002

e) A Low Power Linear Phase Digital

FIR Filter for Wearable ECG

Devices Young Lian, Jianghong Yu,

Engineering in Medicine and

Biology Society, 2005. IEEE-

EMBS 2005. 27th Annual

International Conference of the

Volume , Issue , 2005.