PERVASIVE OR PERVASIVE OR UBIQUITOUS UBIQUITOUS COMPUTINGCOMPUTING
M.HANZALA ALI ABBASSM.HANZALA ALI ABBASS
PERVASIVE OR UBIQUITOUS?PERVASIVE OR UBIQUITOUS?
Ubiquitous OR pervasive computingUbiquitous OR pervasive computing (ubicomp) integrates computation into the (ubicomp) integrates computation into the environment, rather than having computers environment, rather than having computers which are distinct objects. which are distinct objects.
The idea of ubicomp enable people to interact The idea of ubicomp enable people to interact with information-processing devices more with information-processing devices more naturallynaturally and and casuallycasually, and in ways that suit , and in ways that suit whatever locationwhatever location or or contextcontext they find they find themselves in.themselves in.
Other NamesOther Names
Pervasive Computing Pervasive Computing Sentient computing Sentient computing Ubiquitous Computing Ubiquitous Computing Ambient IntelligenceAmbient Intelligence Wearable ComputingWearable Computing
Goals of Pervasive (Ubiquitous) Goals of Pervasive (Ubiquitous) ComputingComputing
Ultimate goal:Ultimate goal: Invisible technologyInvisible technology Integration of virtual and physical worldsIntegration of virtual and physical worlds Throughout desks, rooms, buildings, and lifeThroughout desks, rooms, buildings, and life Take the data out of environment, leaving Take the data out of environment, leaving
behind just an enhanced ability to actbehind just an enhanced ability to act
Pervasive (Ubiquitous)Pervasive (Ubiquitous) Computing Vision Computing Vision
““In the 21st century the technology In the 21st century the technology revolution will move into the everyday, the revolution will move into the everyday, the small and the invisible…”small and the invisible…”
““The most profound technologies are those The most profound technologies are those that disappear. They weave themselves that disappear. They weave themselves into the fabrics of everyday life until they into the fabrics of everyday life until they are indistinguishable from it.”are indistinguishable from it.”
Mark Weiser (1952 –1999), XEROX PARCMark Weiser (1952 –1999), XEROX PARC
The Trends in Computing The Trends in Computing Technology and Pervasive Technology and Pervasive
ComputingComputing1970s1970s
1990s1990s
Late 1990sLate 1990s
Now and Tomorrow ?Now and Tomorrow ?
Pervasive Computing EraPervasive Computing Era
Pervasive Computing EnablersPervasive Computing Enablers
Moore’s Law of IC TechnologiesMoore’s Law of IC Technologies
Communication TechnologiesCommunication Technologies
Material TechnologiesMaterial Technologies
Sensors/ActuatorsSensors/Actuators
Moore’s LawMoore’s Law
Computing power (or number of Computing power (or number of transistors in an integrated circuit) doubles transistors in an integrated circuit) doubles every 18 monthsevery 18 months
0
10000000000
20000000000
30000000000
40000000000
50000000000
60000000000
70000000000
80000000000
2 5 8
11 14 17 20 23 26 29 32 35 38 41 44 47 50 53
Years
Pow
er
2nd2nd Enabler: Communication Enabler: Communication
Bandwidth of single fibers ~10 Gb/sBandwidth of single fibers ~10 Gb/s ~20 Tb/s with wavelength multiplex ~20 Tb/s with wavelength multiplex PowerlinePowerline coffee maker “automatically” connected to the coffee maker “automatically” connected to the
InternetInternet WirelessWireless
mobile phone: GSM, GPRS, 3Gmobile phone: GSM, GPRS, 3G wireless LAN (> 10 Mb/s)wireless LAN (> 10 Mb/s) PAN (Bluetooth), BANPAN (Bluetooth), BAN
4th4th Enabler: Sensors/Actuators Enabler: Sensors/Actuators
Miniaturized cameras, microphones,...Miniaturized cameras, microphones,... Fingerprint sensorFingerprint sensor Radio sensorsRadio sensors RFIDRFID InfraredInfrared Location sensorsLocation sensors
e.g., GPSe.g., GPS
Pervasive Computing
Distributed System
Mobile Computing
Pervasive DevicesPervasive Devices
Embedded Embedded DevicesDevices
HandleHandle DevicesDevices
H21s a.k.a HANDY’s21and H21s a.k.a HANDY’s21and Enviro21s a.k.a E21sEnviro21s a.k.a E21s
HANDHELD DEVICESHANDHELD DEVICES
THE VISION:THE VISION: Person-centered devices provide universal personal Person-centered devices provide universal personal
appliances that are inexpensive and carried and used appliances that are inexpensive and carried and used anywhere (portability).anywhere (portability).
They are equipped with perceptual transducers such as a They are equipped with perceptual transducers such as a microphone, speaker, video camera, and display.microphone, speaker, video camera, and display.
Provide mobile access points for users both within and Provide mobile access points for users both within and
without the intelligent spaces controlled by E21swithout the intelligent spaces controlled by E21s. . Reconfigure themselves to support multiple Reconfigure themselves to support multiple
communication protocols communication protocols Recognize human inputRecognize human input
Embedded devices Embedded devices Create intelligent spaces. Create intelligent spaces.
(computation embedded in ordinary envoirnments defines (computation embedded in ordinary envoirnments defines intelligent spaces and control for physical entities)intelligent spaces and control for physical entities)
People interact in intelligent spaces naturally without being aware People interact in intelligent spaces naturally without being aware that computation is present.that computation is present.
E21s provide large amounts of embedded computationE21s provide large amounts of embedded computation Users communicate naturally in the spaces created by the E21sUsers communicate naturally in the spaces created by the E21s
EvolutionEvolution
Scenario 1Scenario 1 John opens his refrigerator to take out a soda, and he John opens his refrigerator to take out a soda, and he
notices that there is only one can left. John then scans notices that there is only one can left. John then scans the UPC of the soda with the scanner attached to the the UPC of the soda with the scanner attached to the refrigerator. John plans to have guests over this refrigerator. John plans to have guests over this weekend, and makes a note on the refrigerator device weekend, and makes a note on the refrigerator device that he needs to replenish his soda by Friday The next that he needs to replenish his soda by Friday The next day.day.
on his way home from work, John happen to approach a on his way home from work, John happen to approach a local supermarket. His car signals to John that he is near local supermarket. His car signals to John that he is near a grocery store, and if it is convenient, that he should a grocery store, and if it is convenient, that he should stop by. Suppose John does not act on the opportunity, stop by. Suppose John does not act on the opportunity, Friday rolls around and he still have not bought the Friday rolls around and he still have not bought the drinks, a notification will be sent to John’s PDA by the drinks, a notification will be sent to John’s PDA by the refrigerator to alert Johnrefrigerator to alert John
Scenario 1 – What Happened?Scenario 1 – What Happened?
John’s virtual shopping list is maintained by his John’s virtual shopping list is maintained by his refrigeratorrefrigerator.. When John scanned the soda, the refrigerator adds soda to the When John scanned the soda, the refrigerator adds soda to the
shopping list.shopping list. When John notes down Friday, the refrigerator notifies his When John notes down Friday, the refrigerator notifies his carcar about about
the need for soda. the need for soda. When John is on the road, his car constantly monitors the available When John is on the road, his car constantly monitors the available
services; when his car detects the services; when his car detects the supermarketsupermarket service, it notifies service, it notifies John.John.
When it’s Friday, and the refrigerator has not received a “soda When it’s Friday, and the refrigerator has not received a “soda purchased” notification, it sends a notification to John’s purchased” notification, it sends a notification to John’s PDAPDA..
Data ManagementData Management Getting information into the Getting information into the temporal or temporal or
spatial context in which it will be most spatial context in which it will be most usefuluseful, instead of where the information is , instead of where the information is created, and using pervasive devices to created, and using pervasive devices to accept or deliver itaccept or deliver it
In the first scenario, John created his In the first scenario, John created his shopping list in his refrigerator, but he shopping list in his refrigerator, but he needed it the most when he’s near a needed it the most when he’s near a supermarket.supermarket.
Data Management Challenges in PER-COMData Management Challenges in PER-COM Instead of the conventional client-proxy-server Instead of the conventional client-proxy-server
model, pervasive computing requires a model, pervasive computing requires a mobile mobile distributed database systemdistributed database system, where each device , where each device maintains its own databasemaintains its own database No centralized control of each device databaseNo centralized control of each device database Assume data can be communicated in a neutral Assume data can be communicated in a neutral
format between devicesformat between devices Each part of a data object may reside on different Each part of a data object may reside on different
device databasedevice database Devices move in ad-hoc networks, therefore no Devices move in ad-hoc networks, therefore no
guarantee of fixed set of devicesguarantee of fixed set of devices
In particular to pervasive computing In particular to pervasive computing environments where devices are dynamicenvironments where devices are dynamic Data and data source availabilityData and data source availability Lack of global data and schemaLack of global data and schema No guarantee of reconnectionNo guarantee of reconnection No guarantee of collaborationNo guarantee of collaboration
=> query responses are highly based on => query responses are highly based on luckluck
CASE STUDYCASE STUDY PERVASIVE PATIENT MONITORINGPERVASIVE PATIENT MONITORING
A vast majority of long-term patients in the world don’t take A vast majority of long-term patients in the world don’t take their medication in time, intentionally or not.their medication in time, intentionally or not.
In the U.S. alone, this represents an additional $100 billion In the U.S. alone, this represents an additional $100 billion yearly expense due to unexpected emergency hospital yearly expense due to unexpected emergency hospital admissions. admissions.
It is therefore crucial to gather accurately patient medical It is therefore crucial to gather accurately patient medical data in real time. data in real time.
For this purpose, a team at IBM Zurich Research For this purpose, a team at IBM Zurich Research Laboratory has developed a mobile health toolkit to Laboratory has developed a mobile health toolkit to perform this task. perform this task.
With this toolkit consisting of a Java-based middleware and With this toolkit consisting of a Java-based middleware and Bluetooth-enabled sensors, all the medical patient data Bluetooth-enabled sensors, all the medical patient data can be wirelessly exported to a doctor’s office via a PC can be wirelessly exported to a doctor’s office via a PC or a cell phone.or a cell phone.
Facts and figuresFacts and figures About 55% of all long-term patients in the US About 55% of all long-term patients in the US
and in Europe, it is estimated, do not take their and in Europe, it is estimated, do not take their medication (either not taking the prescribed medication (either not taking the prescribed medication at all or more than 14 hours late) medication at all or more than 14 hours late) Around 12% of all hospital admissions in the UK Around 12% of all hospital admissions in the UK are due to this non-compliance, the damage to are due to this non-compliance, the damage to the US taxpayer is an estimated USD 100 billion the US taxpayer is an estimated USD 100 billion a year. Most of the patients that do not comply a year. Most of the patients that do not comply are simply forgetful (about 10% deliberately do are simply forgetful (about 10% deliberately do not want to take the medication).not want to take the medication).
How this can be solved?How this can be solved? Gathering current patient medical data promptly Gathering current patient medical data promptly
and accurately is vital to proper health care.and accurately is vital to proper health care. The usefulness of electronic data capture (EDC) The usefulness of electronic data capture (EDC)
has been demonstrated in applications such as has been demonstrated in applications such as the home monitoring of at-risk heart patients via the home monitoring of at-risk heart patients via devices that transmit blood pressure from the devices that transmit blood pressure from the home to a central database.home to a central database.
Removing transcription effort (and associated Removing transcription effort (and associated inaccuracies) alone is worth the institution of inaccuracies) alone is worth the institution of EDC; but the side benefit of timeliness offers the EDC; but the side benefit of timeliness offers the hope of identifying and responding to trends as hope of identifying and responding to trends as they occur, perhaps preventing a dangerous they occur, perhaps preventing a dangerous event, instead of simply allowing its diagnosis event, instead of simply allowing its diagnosis after the danger has manifest.after the danger has manifest.
So ……So …… This is why IBM has developed its mobile This is why IBM has developed its mobile
health toolkit, “for gathering measurement health toolkit, “for gathering measurement data from a range of devices,such as data from a range of devices,such as
H21’s and E21’s connected through the H21’s and E21’s connected through the N21’s(discussed earlier)N21’s(discussed earlier)
and present it to management software and present it to management software via a well defined, and easily implemented via a well defined, and easily implemented interface.”interface.”
mobile health care: why go mobile?mobile health care: why go mobile?
● ● Monitoring patients in the Monitoring patients in the communitycommunity • • Long-term patients, early Long-term patients, early release patients, elderly release patients, elderly patients, young patientspatients, young patients • • Medication Medication compliance/adherence compliance/adherence monitoringmonitoring • • Symptoms monitoringSymptoms monitoring ● ● Healthcare professionalsHealthcare professionals
• • On-the spot patient record On-the spot patient record updatingupdating • • Direct patient data inputDirect patient data input ● ● Self Monitoring & lifestyleSelf Monitoring & lifestyle • • Help consumers take an Help consumers take an active part in their well-active part in their well- being/diseasebeing/disease • • Caring for relativesCaring for relatives ● ● Objectives:Objectives: • • Improve data quality and availability Improve data quality and availability • • Improve quality of life for patientsImprove quality of life for patients • • Reduce costsReduce costs
Here are some details about this Here are some details about this toolkittoolkit
The IBM mobile health toolkit provides a Java-based The IBM mobile health toolkit provides a Java-based middleware — using J2ME MIDP 2.0 (Java Mobile middleware — using J2ME MIDP 2.0 (Java Mobile Information Device Profile) and JSR 082 (Java APIs for Information Device Profile) and JSR 082 (Java APIs for Bluetooth) — running on a personal (mobile) hub device Bluetooth) — running on a personal (mobile) hub device to which sensors can connect wirelessly. to which sensors can connect wirelessly.
We can perform local processing on the data, and We can perform local processing on the data, and forward the result to one or more fixed network forward the result to one or more fixed network connections. connections.
Data-handling modules can easily be added to the Data-handling modules can easily be added to the MIDlet suite (application suite compliant with Java Mobile MIDlet suite (application suite compliant with Java Mobile Information Device Profile) on the hub, as can drivers for Information Device Profile) on the hub, as can drivers for new sensor devices.new sensor devices.
References References Zurich Research Laboratory website, Zurich Research Laboratory website, [1] [1] http://http://sdforum.org/p/calEvent.asp?CIDsdforum.org/p/calEvent.asp?CID=751&mo=4&yr=2002=751&mo=4&yr=2002 [1] Mark Weiser, Chief Technologist of Xerox PARC, Palo Alto Research Center (PARC), the [1] Mark Weiser, Chief Technologist of Xerox PARC, Palo Alto Research Center (PARC), the
company's renowned high-technology incubator is widely regarded as the 'father' of company's renowned high-technology incubator is widely regarded as the 'father' of ubiquitous computing; his web page contains links to many papers on the topic: ubiquitous computing; his web page contains links to many papers on the topic: http://http://www.ubiq.com/hypertext/weiser/UbiHome.htmlwww.ubiq.com/hypertext/weiser/UbiHome.html..
[1] [1] http://http://www.computer.orgwww.computer.org/pervasive//pervasive/ [1] [1] http://http://web.media.mit.edu/~neilgweb.media.mit.edu/~neilg// [1] 'Beyond the Internet', published by the RAND Organisation [1] 'Beyond the Internet', published by the RAND Organisation
http://www.rand.org/scitech/stpi/ourfuture/Internet/section4.htmlhttp://www.rand.org/scitech/stpi/ourfuture/Internet/section4.html [1] [1] http://http://oxygen.lcs.mit.eduoxygen.lcs.mit.edu// [1] [1] http://cuneus.ai.mit.edu:8000/research/miketalk/miketalk.htmlhttp://cuneus.ai.mit.edu:8000/research/miketalk/miketalk.html if offline, see the technical paper:if offline, see the technical paper: http://citeseer.nj.nec.com/ezzat98miketalk.htmlhttp://citeseer.nj.nec.com/ezzat98miketalk.html [1] [1] http://www-lce.eng.cam.ac.uk/~dl231/http://www-lce.eng.cam.ac.uk/~dl231/ [1] [1] http://www-lce.eng.cam.ac.uk/~dl231/publications.htmlhttp://www-lce.eng.cam.ac.uk/~dl231/publications.html [1] [1] http://www.usa.siemens.com/about/innovations/feature_stories/simpad_22801.htmlhttp://www.usa.siemens.com/about/innovations/feature_stories/simpad_22801.html [1] [1] http://http://www.nist.gov/smartspacewww.nist.gov/smartspace// [1] http://www.itl.nist.gov/[1] http://www.itl.nist.gov/ [1] http://www.nist.gov/[1] http://www.nist.gov/ [1] http://www.computer.org/pervasive/[1] http://www.computer.org/pervasive/ [1] http://www.nature.com/nsu/011122/011122-11.html[1] http://www.nature.com/nsu/011122/011122-11.html [1] http://www.nature.com/nsu/010913/010913-3.html[1] http://www.nature.com/nsu/010913/010913-3.html [1] http://www.nature.com/nsu/020520/020520-4.html[1] http://www.nature.com/nsu/020520/020520-4.html [1] http://www.playresearch.com/[1] http://www.playresearch.com/ [1] http://www.viktoria.informatik.gu.se/groups/play/projects/slowtech/installations.html[1] http://www.viktoria.informatik.gu.se/groups/play/projects/slowtech/installations.html [1] http://www.ambientdevices.com/cat/applications.html[1] http://www.ambientdevices.com/cat/applications.html [1] http://www.nature.com/nsu/020429/020429-7.html[1] http://www.nature.com/nsu/020429/020429-7.html [1] http://www-lce.eng.cam.ac.uk/~dl231/[1] http://www-lce.eng.cam.ac.uk/~dl231/