Shifting paradigm from mobile computing to ubiquitous/pervasive computing
Keywords:
Mobile Computing, Pervasive Computing, Ubiquitous Computing, Sensors, Computing DevicesAbstract
Pervasive computing aims to make our lives simpler through the use of tools that allow us to manage information easily. These "tools" are a new class of intelligent, portable devices that allow the user to plug into powerful networks and gain direct, simple, and secure access to both relevant information and services. Pervasive computing devices are not personal computers as we tend to think of them, but very tiny - even invisible. The aim of this research paper has been to throw light on how the future of human beings will be governed in the light of Ubiquitous/Pervasive Computing. The difference between mobile computing and pervasive computing are highlighted. The working in a Ubiquitous Environment through the use of sensors in different environments is also explained with the help of a figure. Two more technologies Zigbee for connecting multiple devices together and Near Field Communication (NFC) that leverages RIFD are also highlighted. The classification of ubiquitous/pervasive systems into infrastructural and personal systems has been defined. The applications of Pervasive/Ubiquitous systems in different areas have been highlighted. The challenges which this concept faces in terms of risk and security associated with them are brought into light. In the end how pervasive computing can change the mobile environment by sensing and analysis of human behavior are summarized in the form of a conclusion.
References
Weiser M. The Computer for the 21st Century. Scientific American, 1991:94–104— http://www.ubiq.com/hypertext/weiser/SciAmDraft3
Pervasive Computing Review By Joshua R. Smith and Dr. Sunil Kumar Department of Electrical and Computer Engineering
http://www.computerworld.com/news/2000/story/0,11280,41901,00.htm
http://www.tcs.com/perspectives/Ubiquitous Computing: Beyond Mobility: Everywhere and Every Thing
Pervasive Computing Published by the IEEE Computer Society July–Sept. 2013 (Vol. 12, No. 3) pp. 18-20 1536-1268/13/$31.00 © 2013 IEEE
http:/ /www.pet.ece.iisc.ernet.in
A.A. Salah and B. Lepri , eds., , Proc. Human Behavior Understanding: Second Int'l Workshop (HBU 11), vol. 7065, Springer, 2011.
Diemter Kubler, Wolfgang Eibach; Adapting legacy applications as Web Services [online] http://www.ibm.com/developerwork/webservices/library/ws-legacy
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.