references

advertisement
International Journal of Emerging
Technology & Research
Volume 1, Issue 4, May-June, 2014
(www.ijetr.org)
ISSN (E): 2347-5900 ISSN (P): 2347-6079
Useful Pervasive Computing Techniques for Human Life
Kaviya priya.R1, Venkata Subramanian.D2
1, 2
Department of Information Technology, Saveetha School of Engineering, Saveetha University, Chennai
Abstract-There are various computing methods in
our modern world out of which Pervasive or
Persistent computing enables everyday objects to
become smarter and interactive. Pervasive
computing will revolutionize the way human
network
with
the
world
around
them.
We had included about the challenges faced by
ubiquitous computing technique and ways to solve
the challenges and abundant computing on basis of
cloud computing. We had included about new
innovations based on pervasive computing, its
interactions in human world and its future.We had
also included about Sensor networks which are
circulated across locations which would help
pervasive computing platform to become way better.
We had included a new innovative idea of handling
money using electrical digital system which reduces
paper usage for printing notes.
General Terms:Pervasive Computing, Ubiquitous
Computing Keywords:Pervasive Computing, Abundant
Computing, Upcoming computing environments, cloud,
challenges
1. INTRODUCTION
There are various computing techniques in our modern
world such as Personnel computing, Autonomic
computing, mobile computing, Cloud computing, Green
computing, Grid computing, Supercomputing, Parallel
computing etc., out of which Pervasive or Abundant
computing enables everyday objects to become smarter
and interactive such as refrigerators that can create
grocery lists, buildings that can adjust temperature and
light according to the weather. Pervasive computing
Will therefore transform the way human interact with
the world around them. Pervasive computing is the
integration of the carnal world to the information world.
Pervasive Computing describes the ways in which
current technological models, based upon three base
designs: smart (mobile, wireless, service) devices, smart
environments (of embedded system devices) and smart
interaction (between devices), relate to and support a
© Copyright reserved by IJETR
computing vision for a greater range of computer
devices, used in a greater range of (human, ICT and
physical) environments and activitiesSensors are one of
the key things that would help pervasive computing
technique to interconnect easily and faster. Sensor
networks simplify enterprises to sense and monitor a
spectacle remotely via sensor nodes and send data into
the physical world. Organizations are increasingly
assuming smart environments. These include Smart
grids, Smart power systems, Smart housing, Smart
transportation systems, Smart retail store etc. Smart
environments collect sensor data from the real world,
which comes from multiple sensors, which are
distributed across positions which would help pervasive
computing platform to become way better.Cloud
computing will help taking the ubiquitous computing to
the next level with its ability to offer computing power
anywhere, at any time and on any device. Cloud
computing has advantages such as lower costs, faster
time to market, high degree of elasticity, unlimited
organization growth capability and low incremental
cost. Creating a cloud based system for communication
of all sensors in home appliances would help to reduce
human work; time consumed, electricity intake, and
helps to create a smart environment.
The first part of our objective is to understand about
pervasive computing and to analyse the way it is
implemented through cloud network. The core and
second objective of our research is to find out the tasks
faced by pervasive computing, ways to solve it and
creating a smart environment around us that could help
people to decrease their work and energy consumed.
(Impact Factor: 0.997)
771
International Journal of Emerging Technology & Research
Volume 1, Issue 4, May-June, 2014
(www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079
on sharing of resources to achieve coherence and
economies of scale. Some of the typical requirements
for using cloud computing include applications that
require storage and archiving, social community based
applications as well as non-business critical
applications. Contemplate this scenario- a company is
planning to launch a new online product worldwide in
10 days. The company needs to make funds in time;
effort and money to facilitate hosting and has to look
into performance assurance, hardware, software, round
the clock support and much more. Even the people need
to go to the centres where the product is being displayed
and get the information. Such scenarios are ideal for
assuming cloud computing based solutions, which
would enable the creativity to pay only for the server
resources, applications and bandwidth that they use.
Using cloud procedure the company can presentation
the product officially on web so that it would be easy
for people to get the information about the creation
directly from internet.
2. CLOUD BASED
PERVASIVE
COMPUTING
Optimization of cost is pushing organizations to look at
different models for acquiring IT related services. There
is an ever increasing need for bringing in Innovative
solutions with reduced time to market for sending.
Enterprises can optimize costs by leveraging and
consuming just in time computing and storage via cloud
based computing platforms and services. Cloud
computing will help take abundant computing to the
next level with its ability to offer computing power
anywhere, at any time and on any device.
Cloud computing provides a immense abstracted IT
infrastructure, dynamic allocation, scaling, movement
of applications as well as commoditization of
organization. Cloud based applications are delivered
over the internet and the pricing is based on
consumption.
1.1
Challenges And Solutions
Cloud computing is computing that involves a large
number of computers linked through a communication
network such as the Internet. Cloud computing trusts
© Copyright reserved by IJETR
Most commonly measured threats in cloud computing
Focus on security of information while on the cloud.
The main concerns in this area include the isolation of
information stored on the cloud, the execution of
correct code on the cloud, and accessibility of
information stored on the cloud. Encryption is one
possible solution to this problem, but for cloud
applications to apply the data that is stored, they must
have an unencrypted type available which is very
complicated. Availability of services and data is
another problem that can arise from the inaccessibility
of the cloud. A common solution Of replication is
possible (both by the clients and the clouds), But the
result can lead to more problems of data management
Data manipulation is another problem that can rise
when Transporting data to and from the cloud.
Because of all this errors in cloud computing we are
going for pervasive computing.
Migration to Pervasive Systems
During migration of data to pervasive systems, data is
(Impact Factor: 0.997)
772
International Journal of Emerging Technology & Research
Volume 1, Issue 4, May-June, 2014
(www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079
Vulnerable to attacks such as one might expect when
communicating data: Rejection of service of data
transmitted over the channel, Data manipulation and
eavesdropping. One solution is to use multi-homed
devices. It does not prevent an attacker from preventing
the user from accessing needed data, but it can greatly
increase the cost. The attacker either has to launch the
DoS attack closer in the network to the cloud (which
likely has greater bandwidth and other resources) or the
attacker must launch an attack on the entire
communication channel that the pervasive system can
use to contact the cloud.
4.
SMART ENVIRONMENT – A
REAL LIFE OUTLOOK
3. NETWORK BASED PERVASIVE
COMPUTING
Sensor networks include a network of nodes that can
sense and may control the environment therefore
allowing interaction between people or computers and
the adjacent environment. The building blocks of the
things used to communicate nature of objects and things
are, adjustable sensor networks comprising of radio tags
which are context-aware, can sense, monitor and report
events. Sensor networks are wireless, self-powering,
walkable as well as self-organizing. Improved decision
making through greater information flow from
distributed locations using sensor networks, better
observing and improved decision making through
enhanced information flow from circulated locations
using sensor networks are some of the key enterprise
challenges and opportunities after leveraging intelligent
technologies.
a.
FLIP SIDES
People, in this modern world are more concerned about
the technical improvements that would help them to
decrease their physical work and increase mental work.
Think of a condition when a man is very tired coming
from his job or a man had a leg injury and was made to
sit on his sofa. If there is any other person in the house,
the man wouldn’t have to move for any work. But if no
one is there to support and washing machine is on! Car
door was not locked! TV remote is far! Also, using
separate remotes for different things would take in more
E-waste because of using separate batteries for each
remotes, separate sensors for each remote etc., are some
of the present scenario flip sides. To stunned these
situations, we are going to create a smart environment,
that would help people in reducing man power, e-waste,
money waste and time.
© Copyright reserved by IJETR
As abundant computing is one person to many
computers, the same methodology is used in creating
this smart network. The idea of this origination is to
reduce the human efforts. This concept implements a
remote television that access like a mobile with services
of notification like a normal android mobile.
The person’s mobile phone is the main computer, which
is going to connect with all the sensors inside the house.
We have to connect every sensor in the machines and
relation them with each other. We are keeping two
major source points in this smart network. First is
mobile phone and second is television.
The person sitting from his or her sofa could see the
status of washing machine, television and other things
using his mobile phone. Occasionally we would have
doubt whether the house door is locked or not. By
connecting the house door with a sensor to the mobile
phone, it would help to fetch the rank whether the door
is locked or not as a notification.
(Impact Factor: 0.997)
773
International Journal of Emerging Technology & Research
Volume 1, Issue 4, May-June, 2014
(www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079
By this Smart system we could create a attractive
atmosphere where in the real world objects can be
brought into the scientific world that would help to
connect science and humans with common
understandings. This method would help disabled
persons to know the status of machines running around
them through their mobiles. A deaf person could not
hear the sound of alarm that rings after washing
machine gets over. Thus by keeping in vibration mode,
he could get the notification in his mobile. Also when
the person is watching television without audio also, he
can see the notice in television. The following are some
of the key excellence benefits of using smart networks:

Decrease human work

Reduce time and money ingesting

Accurate and protected

Reduce e-waste

Help restricted
5.
FUTURE OF SMART NETWORKS
Have you noticed any household empty of a Mobile
phone today? Isn’t it an unusual sight?
Recent International telecommunications union (ITU)
Survey bangs state that there are more than a hundred
countries throughout the world where the number of
cell phones surpass the countries’ populations. It seems
as though we can’t go anywhere without seeing a sea of
people using cell phones. We’re worked in at all times.
Would it not be a delight if you can carry out a
thousand transactions at your relief with a few clicks on
your Mobile phone?
You don’t have Internet connections or ATM’s or POS
possibilities wherever you go. But you do have a mobile
connection. The biggest value of mobile finance will be
that you will get to exercise more control of your
money and it can extremely cut down the effective cost
of your transactions in the longer run. Mobile Finance is
to be established as an application that will run on
various mobile platforms , is capable of being opened
with simple text messages and will store the funds of
mobile users in their Mobile Finance explanations to be
used as and when required by the user by simple
transfer of funds to the sellers Mobile Finance account
with proper confirmation supported by multiple levels
of security like using a password and finger print for
verification and using a secured Payment gateway with
an SSL connection for security . Mobile connectivity is
vast and this should make Mobile finance very
successful. The software used will be made with a
singular idea which ensures that the money in mobile is
safe. The money can be taken by a person only from a
unique mobile whose IMEI number will be listed in the
database. The money can only be retrieved by the
person
in
his
own
mobile.
Question: What if the individual lost his mobile or the
mobile is damaged and he is going to change the
mobile?
The person will have his IMEI number listed in his
name in main office like a bank. He could go there and
block his old IMEI number if lost or repeat his IMEI
number if a new mobile is bought. Also, the person who
steals the mobile cannot easily take the money as there
are two security structures with one finger print scanner
and other with passcode. Also, the person who is
receiving the money should enter the key arrived by the
person who is transfer the money.
This is like a normal Bluetooth share. NFC is another
technological development which is known as near field
message, which is known for its high level safety. By
using the NFC we can shake two mobiles and hit each
other to communicate them to a third party network by
which money can be easily transferred. The person
using mobile money contract could select the way he
wants to transfer money in his settings. One is either by
both mobiles incoming the passcode or the other is by
using NFC technique.
With this, Let us now look at the concept of Mobile
Finance. Mobile Finance is a notion that will allow
Mobile users to carry out a series of financial dealings
through a mobile device such as a Mobile phone or
Personal Digital assistant by simple transfer of assets
from the buyer’s mobile account to that of the seller not
necessarily involving financial organizations.
© Copyright reserved by IJETR
(Impact Factor: 0.997)
774
International Journal of Emerging Technology & Research
Volume 1, Issue 4, May-June, 2014
6.
(www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079
CONCLUSION
Pervasive computing will be a dynamic source of
interesting research problems in computer systems for
many years to come. As conversed, pervasive
computing and cloud computing linked together would
help human beings to travel up to next level.
Cloud computing has rewards such as lower costs,
faster time to market, high degree of elasticity and low
incremental cost. Internet facilities improve the work of
every company. By using smart environment, people
could have lots of benefits. It takes simple things to
make this arrangement. As normally every creation is
made, we are adding a sensor to it. Connecting sensors
to mobile and television would help humans to turn out
to be fast and efficient.
Mobile money transactions in every field around us
would help to reduce lots of paper waste. Currencies
have lots of chance of getting damaged. By using
mobile money transactions, we could increase the
amount of trees used and increase a far better green
environment.
center for The Business of Government e- Government
Series, 2009.
[5] K. Jeffery, B. Neidecker-Lutz, ―The Future of
Cloud Computing. Opportunities for European Cloud
Computing Beyond 2010‖, Expert Group Report,
European Commission, January 2010.
[6] T. Dillon, C. Wu, and E. Chang, ―Cloud
Computing: Issues and Challenges‖, in 24th IEEE
International Conference on Advanced Information
Networking and Applications, page no. 27-33, 2010.
[7] “Pervasive Computing: Vision and Challenges”
by Prof. M. Satyanarayanan, Carnegie Mellon
University, IEEE Personal Communications,
2001[Possible mistakes and omissions are all mine. –
LTL]
[8] http://www.media.mit.edu/
[9] http://cooltown.hp.com/
[10] http://portolano.cs.washington.edu/
[11] http://computer.org/pervasive
[12] http://www.comp.lancs.ac.uk/computing/research/
mpg/most/
[13] www.wikipedia.com
[14] Ubiquitous computing “spring 2008” by Ishitha
Trivedi
[15] A. Anand, A. Gember, A. Akella, and V. Sekar,
“Tracking semantic relationships for effective data
management in home networks,” in Proceedings of the
2010 ACM SIGCOMM workshop on Home networks
[16] Y. Luo, K. T. Lam, and C.-L. Wang, “Path-analytic
distributed object prefetching,” Parallel Architectures,
Algorithms, and Networks, International Symposium
on, vol. 0, pp. 98–103, 2009.
[17] N. J. Tuah, M. Kumar, and S. Venkatesh,
“Resource-aware speculative prefetching in wireless
networks,” Wirel. Netw., vol. 9, pp. 61–72, January
2003.
[Online].
Available:
http://dx.doi.org/10.1023/A:1020829124143
[18] H. Shen, M. Kumar, S. K. Das, and Z. Wang,
REFERENCES
[1] San Murugesan, “Harnessing Green IT: Principles
and Practices,” IEEE IT Professional, January–
February 2008, pp 24-33.
[2] D. C. Wyld, Moving to the Cloud: An Introduction
to Cloud Computing in Government,‖ IBM center for
The Business of Government e- Government Series,
2009.
[3] D. Carrera, M. Steinder, I. Whalley, J. Torres and
E. Ayguade, Managing SLAs of heterogeneous
workloads using dynamic application placement,‖
HPDC '08, Proceedings of the 17th international
symposium on High performance distributed
computing, New York, USA, 2008.
[4] D. C. Wyld, ―Moving to the Cloud: An
Introduction to Cloud Computing in Government,‖ IBM
© Copyright reserved by IJETR
“Energy-efficient data caching and prefetching for
mobile devices based on utility,” Mob.Netw. Appl., vol.
10, pp. 475–486, August 2005.
[19] Nahrsted, K., Chu, H., Narayan, S.QoS-aware
Resource Management for Distributed Multimedia
Applications. Journal on High-Speed Networking
7(3/4), 1998.
[20] Weiser, M, Brown, J.S. The Coming Age of Calm
Technology. In Denning, P.J., Metcalfe, R.M. (editors),
Beyond Calculation: The Next Fifty Years of
Computing. Copernicus, 1998.
(Impact Factor: 0.997)
775
Download