Computing
Computing
BY
FEBRUARY 2023
1
DEDICATION
Home is our family. The lessons to live, love and matter and the support they give
unconditionally.
2
ACKNOWLEDGMENTS
Our profound thanks go to Jehovah the Almighty God, for His unending love and continuous
support which; He grants us every day. We appreciate everyone who has been a part of this
work; for providing the motivation, information and editorial support needed to make it a
success.
We particularly grateful to all Professors and staffs for their insightful guidance and
3
TABLE OF CONTENTS
Page Title…………………………………………………………. 1
Dedication………………………………………………………… 2
Acknowledgement………………………………………………… 3
Table of Contents…………………………………………………... 4
Abstract ………………………………………………………….. 8
1.2.1. Context-awareness……………………………………………….. 12
1.3.1 Healthcare…………………………………………………………. 15
1.3.2 Transportation………………………………………………………. 16
1.3.4 Retail………………………………………………………………… 16
4
1.5 Goals of Ubiquitous Computing……………………………………. 18
3.1.1 Mainframe…………………………………………………………… 28
5
3.2.1 Characteristics of ideal calm Technology …………………………… 32
4.3.2 Invisible………………………………………………………………… 43
4.3.3 Adaptation……………………………………………………………… 43
5.3 Challenges……………………………………………………………………… 52
6
5.3.1 Privacy and security……………………………………………………………. 52
5.3.3 Networking…………………………………………………………………….. 53
5.4 Requirement…………………………………………………………………… 54
7.2 Conclusion……………………………………………………………………. 61
REFERENCES 65
7
ABSTRACT
Ubiquitous computing provides an attractive vision for the future of computing. The idea behind
the ubiquitous computing is to make the computing power disappear in the environment, but will
always be there whenever needed or in other words it means availability and invisibility. These
invisible computers will not have keyboards or screens, but will watch us, listen to us and
interact with us. Ubiquitous computing environments involve the interaction, coordination, and
cooperation of numerous, casually accessible, and often invisible computing devices. One is
happy when ones desires are fulfilled. The highest ideal of ubicomp is to make a computer so
imbedded, so fitting, so natural, that we use it without even thinking about it. Ubiquitous
computing is referred as pervasive computing throughout the paper. One of the goals of
automatically adapt and act based on these changes based on user needs and preferences.
The prime goal of this technology is to make human life more simple, safe and efficient by using
the ambient intelligence of computers. Ubiquitous computing therefore induces a paradigm shift
in the way we use computers: Instead of bringing the world into the computer (the Virtual
Reality paradigm), computational power is now brought to the objects of the physical world.
Eventually, the vision of Ubiquitous Computing induces a new way of thinking about computers
in the world, one that takes into account the natural human environment and allows the
computers themselves to vanish into the background. This paper presents a number of
compelling applications using ubiquitous computing and addresses the associated security and
usability concerns.
8
Keywords: Ubiquitous Computing, Pervasive Computing Ambient Intelligence, Distributed
Systems,
9
CHAPTER 1
INTRODUCTION
The word “ubiquitous” can be defined as” existing or being everywhere at the same time,”
”constantly encountered,” and” widespread.” When applying this concept to technology, the term
ubiquitous implies that technology is everywhere and we use it all the time. Because of the
pervasiveness of these technologies, we tend to use them without thinking about the tool.
Instead, we focus on the task at hand, making the technology effectively invisible to the user.
Ubiquitous technology is often wireless, mobile, and networked, making its users more
Ubiquitous computing is the method of enhancing computing use by making many devices
(services) available throughout the physical environment, but making them effectively invisible
10
to the user. Computers become a useful but invisible force, assisting the user in meeting his
needs without getting lost in the way tries to construct a universal computing environment (UCE)
• computing instruments
• devices
• resources
• technology
different services to the users based on requirement. These devices mostly have low power and
Ubiquitous computing, also known as pervasive computing, is a concept that envisions a world
where computing is seamlessly integrated into everyday life. It is a paradigm shift from the
traditional model of computing, where users interact with discrete devices such as desktop
computers and smartphones, to a model where computing is embedded into the environment and
computing experience that is integrated into our daily lives, allowing us to interact with
technology effortlessly.
The concept of ubiquitous computing can be traced back to the early 20th century, with the
invention of the first electronic computers. However, it was not until the late 1980s that the term
"ubiquitous computing" was coined by Mark Weiser, a computer scientist at Xerox PARC.
11
Weiser envisioned a future where computing would be embedded into everyday objects and
environments, creating a "calm technology" that would enhance our lives without being
intrusive.
In essence, ubiquitous computing aims to make technology a natural part of our environment,
seamlessly integrated into our daily lives without the need for explicit interaction. This shift from
1.2.1 Context-awareness:
computing devices to understand and respond to their context. This context can include factors
such as location, time, and user preferences. Context-awareness enables computing devices to
adapt their behavior based on the current situation, providing users with more relevant and
personalized experiences.
One of the key challenges in context-aware computing is the need to accurately sense and
interpret the context. This requires the use of various sensors, such as GPS, accelerometers, and
cameras, to collect data about the environment. Machine learning algorithms are then used to
12
Context-aware computing has a wide range of applications in various fields, including
healthcare, smart homes, transportation, and retail. For example, in healthcare, context-aware
computing can be used to monitor patients' health in real-time and provide personalized
treatment. In smart homes, context-aware computing can be used to create homes that are
smart transportation systems that optimize traffic flow and reduce congestion. In retail, context-
aware computing can be used to create personalized shopping experiences and improve customer
service.
Pervasive computing is another key concept in ubiquitous computing, referring to the idea that
computing is integrated into all aspects of our lives, making it ubiquitous. This means that
computing is no longer confined to specific devices or locations but is instead embedded into the
environment.
the Internet of Things (IoT) and wearable technology. The IoT refers to the network of
interconnected devices that can communicate and share data with each other. This has enabled
the creation of smart homes, smart cities, and other applications of pervasive computing.
Wearable technology, such as smart watches and fitness trackers, has also become increasingly
popular in recent years. These devices are an example of pervasive computing, as they are
Pervasive computing has the potential to revolutionize the way we interact with technology and
enhance our lives in countless ways. However, there are also challenges that need to be
13
addressed, such as privacy and security concerns, interoperability issues, and ethical
revolutionize the way we interact with technology and enhance our lives in countless ways.
Invisible computing is another key concept in ubiquitous computing, referring to the idea that
computing devices are seamlessly integrated into our environment, making them "invisible" to
users. This means that users do not need to interact directly with computing devices but can
sensors and actuators that can be embedded into everyday objects. These sensors and actuators
can collect data about the environment and respond to user input, creating a seamless computing
experience.
Invisible computing has the potential to revolutionize the way we interact with technology and
enhance our lives in countless ways. However, there are also challenges that need to be
addressed, such as privacy and security concerns, interoperability issues, and ethical
revolutionize the way we interact with technology and enhance our lives in countless ways.
Calm technology is another key concept in ubiquitous computing, referring to the idea that
ubiquitous computing should be unobtrusive and enhance our lives without being disruptive.
14
This means that computing devices should not be intrusive or distracting but should instead
sensors and actuators that can be embedded into everyday objects. These sensors and actuators
can collect data about the environment and respond to user input, creating a seamless computing
experience.
Calm technology has the potential to revolutionize the way we interact with technology and
enhance our lives in countless ways. However, there are also challenges that need to be
addressed, such as privacy and security concerns, interoperability issues, and ethical
revolutionize the way we interact with technology and enhance our lives in countless ways.
Ubiquitous computing has a wide range of applications in various fields, including healthcare,
smart homes, transportation, and retail. In each of these fields, ubiquitous computing has the
potential to revolutionize the way we interact with technology and enhance our lives in countless
ways.
1.3.1 Healthcare
Ubiquitous computing has the potential to transform healthcare by enabling remote patient
monitoring, personalized medicine, and telemedicine. Remote patient monitoring refers to the
use of ubiquitous computing devices to monitor patients' health in real-time and provide
15
personalized treatment. For example, wearable devices that can track a patient's vital signs and
medical history. For example, a smart healthcare system that uses data from wearable devices to
Telemedicine refers to the use of ubiquitous computing to provide remote healthcare services,
such as telemedicine. This allows patients to consult with healthcare providers from the comfort
Ubiquitous computing has the potential to transform homes into smart homes that are energy-
efficient and secure. For example, smart thermostats that can adjust the temperature based on the
time of day and the number of people in the room are an example of ubiquitous computing in
smart homes. Smart locks that can provide secure access to the home are another example of
1.3.3 Transportation
transportation systems that optimize traffic flow and reduce congestion. For example, smart
traffic lights that can adjust their timing based on traffic conditions are an example of ubiquitous
computing in transportation. Smart parking meters that can help drivers find parking spaces more
1.3.4 Retail
16
Ubiquitous computing has the potential to transform retail by enabling personalized shopping
experiences and improving customer service. For example, retailers can use data from customers'
smartphones to provide personalized recommendations and offers. Smart mirrors that can
The characteristics of ubiquitous computing makes it to stand differently than the existing
1. Permanency :
The information remains unless the user purposely remove it. User can never lose their work.
17
2. Accessibility
The information is always available whenever the user need to use it. System access via
3. Immediacy :
Information can be retrieved immediately by the user. Thus it saves users time and
4. Interactivity
The devices can interact with other devices efficiently and effectively through different media
interfaces.
The system can adapt to the user real situation to provide adequate information for the user.
The system can understand the user’s environment via database and sensing the user location,
personal and environmental situations. It can adapt to Device Type, Time, Location,
RFID, Sensors, Smart Card, Information Artifacts, and Tiny Smart Device
18
The promise of ubiquitous computing is of a life in which our endeavors are powerfully, though
subtly, without any extra overhead, assisted by computers. The idealistic visions painted by the
ubiquitous computing movement stand in stark contrast to what we see when we boot up our
computers each day. Ubiquitous computing can be achieved with the help of
1. User :
Users are part of the ubiquitous environment. Based on their need and requirement the
system have to retrieve the information from environmental situation and predefined
database.
2. Theory
We have theory for design and analysis of complex buildings, bridges, electronic
ubiquitous systems
3. Engineering
To develop ubiquitous computing methods and techniques that are sensitive both to the needs
of individuals and society, and the impact upon them. These will support the realization of
19
human experiences and will include new forms of interaction and new interaction paradigms
Design goal pertain to all aspects of ubiquitous computing, are agreed among both academic
and professional engineers; design Goals are instantiated in the design and rigorous
To develop a coherent informatics science whose concepts, calculi, models, theories and tools
allow descriptive, explanatory and predictive analysis of ubiquitous computing at many levels of
abstraction. To employ these theories to derive all its systems and software, including languages;
To analyses and justify all its constructions by these theories and tools.
20
CHAPTER 2
LITERATURE REVIEW
The term Ubiquitous Computing was coined and introduced by the late Mark Weiser (1952 -
1999). He worked at the Xerox Palo Alto Research Center (PARC, now an independent
organization). PARC was more or less the birthplace of many developments that marked the PC
era, such as the mouse, windows-based user interfaces and the desktop metaphor (note that
Xerox STAR preceded the Apple Lisa, which again preceded Microsoft Windows), laser
printers, many concepts of computer supported cooperative work (CSCW) and media spaces, and
much more. This success is contributed (among other reasons) to the fact that PARC man- aged
to integrate technology research and humanities research (computer science and human factors in
Weiser concentrated so much on user aspects that quite a number of his first prototypes were
mere mockups: during corresponding user studies, users had to imagine the technology side of
21
the devices investigated and focus on use cases, ideal form factors and desired features,
Mark Weisers ideas were first exposed to a large worldwide audience by way of his famous
article” The Computer of the 21st Century”, published in Scientific American in1991. A preprint
quotation from this article reads as follows: ”The most profound technologies are those that
disappear. They weave themselves into the fabric of everyday life until they are indistinguishable
from it.” This was Marks vision for the final step in a development away from standard PCs,
A deeper understanding of Mark Weisers visions can be drawn from his position towards three
• virtual reality
• artificial intelligence
• user agents
With a good sense for how to raise public attention, Mark criticized these three trends as leading
22
2.3 UC versus Artificial Intelligence (AI):
In essence, Mark Weiser criticized the overly high expectations associated with AI in the 80s. In
the late 80s and early 90s, i.e. at the time when he developed his UC vision, AI research had to
undergo a serious confidence crisis. The term AI had not been associated with a commonly
accepted, reasonably realistic definition, so that the association with human intelligence (or the
human brain) was destined to lead to disappointments. The AI hype had provided researchers
with considerable funds but only for a while. Mark Weiser proposed to take a different approach
towards a higher level of sophistication of computer based solutions (which had been the goal of
intelligent behavior and to dedicate each computer to such a subset. Higher sophistication would
This reasoning lead to the term smart, considered more modest than the term intelligent. Sensor
the world around us (a key element of intelligent behavior). By widely deploying and
interconnecting sensor-based tiny computers, one would be able to integrate environmental data
(location, temperature, lighting, movement) and use this information to produce smart behavior
In computing, a user agent is software (a software agent) that is acting on behalf of a user. For
example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the
23
In contrast to virtual reality and artificial intelligence, the term user agent is not very prominent
in the general public. At the time referred to, UAs were thought as intelligent intermediaries
between the user and the computer world, i.e. as an approach towards increased ease-of-use or
better human-computer interaction. User Agents were often compared to the common perception
of British butlers who are very discreet and unobtrusive, but always at disposal and extremely
knowledgeable about the wishes and habits of their employers. Following this analogy, UAs
were installed as autonomous software components between applications and users, inspecting
Mark Weiser challenged five requirements usually derived from this analogy for user agents
• UAs were supposed to give advice to their users based on what they had learned. Mark
Weiser asked, in essence, why they would not do the job themselves a promise that UC
should fulfill;
• UAs were supposed to obey the user, e.g., by applying planning algorithms to basic
operations with the aim to fulfill the goals set by a user. In contrast to this approach, UC
was intended to behave rather proactively, i.e. to propose and even act in advance as
• A third widespread requirement suggested that UAs should intercept the user-application
interface. UC in contrast should be more radical and take over the interaction or carry out
functions on its own an approach presumed by Mark Weiser to be the only viable one if
24
• A basic assumption about UAs was that they would listen to the (interactions of) the user.
Mark Weiser considered natural language processing technology and speech recognition
technology at his time to be far too immature to promise satisfying results in this respect;
• UAs should learn the user’s preferences, wishes etc. by observation. Again, the necessary
(machine learning) technology was judged to be too immature to live up to this promise.
These complementary UC devices were prototyped at his lab; investigated in the context of
PARCs typical creative, team-oriented setting, all three were thought as electronic replacements
1. Xerox Pad:
The Xerox Pad can be considered to be the prototype and father of present PDAs, introduced
even before the Apple Newton appeared in 1993. The initial concept was that of an electronic
equivalent to inch-size information bearers, namely PostIt Notes: easy to create and to stick
almost everywhere, available in large quantities. As the PDA analogy suggests, the prototypes
had a lot more functionality than PostIt Notes but were also a lot more expensive and
cumbersome to handle by design (not only due to short and mid-term technology limitations).
25
Figure 2.2: xerox ’pad’
2. Xerox ’Tab’:
The Xerox Tab can be considered to be the prototype and father of present Tablet PCs. The
analogy from the traditional world was that of a foot-size information bearer, namely a
notebook or notepad. One may infer from the rather stalling market penetration of Tablet
PCs that technology is still not ready for mass market Tabs today, but one may also expect
to find a pen centric, foot size handheld computer to become very successful any time soon.
An interesting facet of the original Tab concept was the idea that Tabs would in the future
lay around for free use pretty much as one finds paper notebooks today, e.g. as part of the
26
4. Xerox Liveboard’:
The Xerox Liveboard was the prototype of present electronic whiteboards. A PARC spinoff
company designed and marketed such boards, and today many companies like Calgary
based SmartTechnologies Inc. still sell such devices. Liveboards represented the yard-size
information bearers in the family of cooperating devices for cooperating people. In contrast
to many devices sold today, liveboards supported multi-user input pretty early on.
The developments and studies conducted at Mark Weisers lab emphasized the combination of
27
CHAPTER 3
THE COMING AGE OF UBIQUITOUS COMPUTING
3.1 The Major Trends in Computing
The important waves of technological change are those that fundamentally alter the place of
technology in our lives. What matters is not technology itself, but its relationship to us. In the
past fifty years of computation there have been two great trends in this relationship: the
mainframe relationship, and the PC relationship. Today the Internet is carrying us through an era
characterized by deeply imbedding computation in the world. Ubiquitous computing will require
a new approach to fitting technology to our lives, an approach we call “calm technology”.
28
3.1.1 The mainframe
The first era we call “mainframe”, to recall the relationship people had with computers that were
mostly run by experts behind closed doors. Anytime a computer is a scarce resource, and must be
negotiated and shared with others, our relationship is that of the mainframe era. There is
mainframe computing today: a shared office PC, and the great physical simulations of everything
from weather to virtual reality, have in common sharing a scarce resource. If lots of people share
The second great trend is that of the personal computer. In 1984 the number of people using
personal computers surpassed the number of people using shared computers. The personal
computing relationship is personal, even intimate. You have your computer, it contains your
stuff, and you interact directly and deeply with it. When doing personal computing you are
occupied, you are not doing something else. Some people name their PC - many people curse or
The Internet is deeply influencing the business and practice of technology. Millions of new
people and their information have become interconnected. Late at night, around 6am while
falling asleep after twenty hours at the keyboard, the sensitive technologist can sometimes hear
those 35 million web pages, 300 thousand hosts, and 90 million users shouting “pay attention to
me!”
29
Interestingly, the Internet brings together elements of the mainframe era and the PC era. It is
client server computing on a massive scale, with web clients the PCs and web servers the
mainframes. Although transitional, the Internet is a massive phenomenon that calls to our best
inventors, our most innovative financiers, and our largest multinational corporations. Over the
next decade the results of the massive interconnection of personal, business, and government
information will create a new field, a new medium, against which the next great relationship will
emerge.
The third wave of computing is that of ubiquitous computing, whose cross-over point with
personal computing will be around 2005-2020. The “UC” era will have lots of computers sharing
each of us. Some of these computers will be the hundreds we may access in the course of a few
minutes of Internet browsing. Others will be imbedded in walls, chairs, clothing, light switches,
with computation.
30
Ubiquitous computing refers to embedding computers and communication in our environment.
Ubiquitous computing provides an attractive vision for the future of computing. The idea behind
the ubiquitous computing is to make the computing power disappear in the environment, but will
always be there whenever needed or in other words it means availability and invisibility.
3.2 Calm-technology
Today Internet is carrying us through an era of widespread distributed computing towards the
world. Ubiquitous computing will require a new approach to fitting technology to our life, an
approach called “calm technology”. The most potentially interesting, challenging, and profound
change implied by the ubiquitous computing/ubicom era is a focus on calm. If computers are
everywhere they better stay out of the way, and that means designing them so that the people
being shared by the computers remain serene and in control. Calmness is a new challenge that
UC brings to computing. When computers are used behind closed doors by experts, calmness is
relevant to only a few. Computers for personal use have focused on the excitement of interaction.
But when computers are all around, so that we want to compute while doing something else and
31
have more time to be more fully human, we must radically rethink the goals, context and
technology of the computer and all the other technology crowding into our lives. Calmness is a
fundamental challenge for all technological design and implementation of the next ten to fifty
years. In designing calm technology, Weiser and john saily brown describe calm technology as””
that which informs but doesn’t demand our focus our attention”.
We do not know who invented the concept of glass windows from offices out to hallways. But
these inner windows are a beautifully simple design that enhances peripheral reach.
32
Figure 3.3: Inner office windows
The hallway window extends our periphery by creating a two-way channel for clues about the
environment. Whether it is motion of other people down the hall (it’s time for a lunch; the big
meeting is starting), or noticing the same person peeking in for the third time while you are on
the phone (they really want to see me; I forgot an appointment), the window connects the person
inside to the nearby world. Inner windows also connect with those who are outside the office. A
light shining out into the hall means someone is working late; someone picking up their office
means this might be a good time for a casual chat. These small clues become part of the
periphery of a calm and comfortable workplace. The inner office window is a metaphor for what
is most exciting about the Internet, namely the ability to locate and be located by people passing
by on the information highway, while retaining partial control of the context, timing, and use of
3. Internet multicast
A technology called Internet Multicast may become the next World Wide Web (WWW)
phenomenon. Sometimes called the MBone (for Multicast backBONE), multicasting was
invented by a graduate student at Stanford University. Whereas the World Wide Web
(WWW) connects only two computers at a time, and then only for the few moments that
33
information is being downloaded, the MBone continuously connects many computers at the
same time.
4. Dangling string
Bits flowing through the wires of a computer network are ordinarily invisible. But a radically
new tool shows those bits through motion, sound, and even touch. It communicates both light
and heavy network traffic. Its output is so beautifully integrated with human information
processing that one does not even need to be looking at it or be very near to it to take advantage
of its peripheral clues. It takes no space on your existing computer screen, and in fact does not
use or contain a computer at all. It uses no software, only a few dollars in hardware, and can be
Created by artist Natalie Jeremijenko, the ”Dangling String” is an 8 foot piece of plastic
spaghetti that hangs from a small electric motor mounted in the ceiling. The motor is electrically
connected to a nearby Ethernet cable, so that each bit of information that goes past causes a tiny
twitch of the motor. A very busy network causes a madly whirling string with a characteristic
34
noise; a quiet network causes only a small twitch every few seconds. Placed in an unused corner
of a hallway, the long string is visible and audible from many offices without being obtrusive. It
is fun and useful. At first it creates a new center of attention just by being unique. But this center
soon becomes peripheral as the gentle waving of the string moves easily to the background
35
CHAPTER 4
CONTEXT AWARENESS
context awareness, systems can integrate gracefully with their environments with minimal
intrusion and unnecessary interaction with the user. There are many definitions of context
awareness that have been discussed in recent years. Each of these definitions, although slightly
different from each other, exhibits certain commonalities between them. These commonalities
mapped directly to the four types of context that a ubiquitous system can be aware of:
• location
• activity
• identity
• time
Collecting and analyzing this context information can greatly enhance ubiquitous computing
systems for the standard user. This point was illustrated by exploring different ubiquitous
computing systems that are currently available in today’s market place, or that are at the
prototype stage and will perhaps be available in the future. These examples showed that without
the use of context aware information in a ubiquitous computing system, none of these
technologies would be possible. Not only was it shown that context aware technologies enhanced
the overall experience for standards user, but also it was shown that context awareness benefits
users with disabilities through the use of assistive technology. Over one third of the assistive
36
technology devices distributed each year are abandoned by users . This is due to the fact that the
assistive technologies are not context aware technologies. These systems will break down
barriers, allowing people with disabilities to integrate seamlessly into social environments, much
The first definition of context awareness appeared in an article written by Schilit and Theimer in
1994. They defined context aware computing to be the “ability of a mobile user’s applications to
discover and react to changes in the environment they are situated in”. This definition considers
the location of a user, and perhaps the time of day, when defining what functions a context aware
In 1999, they redefined context aware computing as “Context is any information that can be
used to characterize the situation of an entity. An entity is a person, place, or object that is
considered relevant to the interaction between a user and an application, including the user and
applications themselves”. The definition focuses strongly on the idea of identity and location.
They believe that a computer system not only needs to be aware of the location of the user, as
similarly suggested by Schilit, but that the identity of the user is also an important factor when a
37
More recently, in 2004, Beale defined context as a “set of changing relationships that may be
shaped by the history of those relationships”. The example he uses describes a student visiting a
library and searching through the shelves for a few books of interest. On subsequent visits, the
student could be presented with recommendations of other books to read that are similar to the
books the student read on previous visits. This definition takes into account that the activity is a
The four types of context that a ubiquitous system must be aware of:
1 .Location
Location awareness plays a very important role for ubiquitous computing systems. It allows
these systems to adapt in terms of the resources that are available to the user and to the system.
38
With a user’s location, a system may be able to determine what other objects or people are in the
surrounding area and what activity is occurring near the entity. Furthermore, using this
information the ubiquitous system itself can adapt to ensure the users demands are met
With the increased popularity in mobile computing and communication, users now have an
expectation that information services should be available to them at all times, irrespective of
their current location. Mobile devices need to be aware of your current location in order to
ensure a user is provided with the most efficient network service. Some locations may have
access to Wi-Fi, some to 3G and some to EDGE networks. Mobile computers need to, using the
information collected from the users location, determine which network service is the strongest
and then configure itself to that frequency, all without the need for user interaction.
2. Activity
An activity describes what is occurring in a given situation. A ubiquitous computing system that
is activity aware will collect data regarding the activity that is currently being performed as well
as from previously performed user tasks. With this data, the system can conduct a number of
different data analytic functions, and using the results, can determine what additional tasks need
to be performed as well as predicting what tasks will be performed in the future whether a given
39
Figure 4.2: location context
For example, many IT companies run a virus scanning tools over the company’s network to
detect is the network is free from malicious viruses. This process can be very resource
intensive and can lead to workers computers slowing down considerably. To prevent this
slow down, and thus ensure the workers’ productivity is not affected, the network system is
programmed to be aware of normal working hours and only begin this virus scanning
outside of these hours. Some systems can also determine when the last successful virus scan
completed and therefore flag to the ICT department if another scan is required
3. Identity
When a ubiquitous computing system is identity aware, it has access to information about
the user. This information can either be explicitly or implicitly provided by the user. For the
identity information to be explicitly indicated the user does not need to interact with the
system in order for the system to collect data. For example, facial recognition software can
be used to correctly identify the person that is interacting with the system. For identity
information to be implicitly collected, the user must directly interact with the software in
40
order for the system to be made aware of the user. A common implicit identity gathering
feature is a login dialog where the user must type in their username and password. Once
this primary identity information is acquired the system can access secondary information
about the user also, for example, a user’s contact information, date of birth, relationship
Knowing the identity of a user is a powerful and useful tool. It allows a system to present
customized information to the user as well as using this information to determine what
other system events should be processed in order to meet the users demands.
4. Time
Time aware computing systems are aware of the time of day and/or can record time lapses
between certain events. These systems can use this time information to determine capturing and
processing this type of information it must still be designed correctly to ensure the proactive
solution does not irritate the user, as this would remove the systems invisibility and transparency.
Knowing the identity of a user is a powerful and useful tool. It allows a system to present
customized information to the user as well as using this information to determine what other
The vision for ubiquitous computing is to create environments that are saturated with computing
and communication capabilities, which integrate with human users gracefully. With a successful
creation of this type of environment, the technology that surrounds the user becomes transparent
41
and disappears. A pervasive computing system must be context aware to ensure that the system
is minimally intrusive. It must be aware of the user’s identity, location, time and activity. With
the use of context aware systems ubiquitous computing systems can become adaptable, flexible
There are a few key areas within ubiquitous computing that can be enhanced with the use of
context awareness
4.3.1 Proactive
For a ubiquitous computing system to be very effective, it must track and record the user’s intent.
Without this ability, the system will be unable to predict which system actions and events will
help the user rather than hinder them. Even when the system is capable of might need to perform.
If the assistant was context aware and had access to this identity and activity information the tool
could, for example, determine that the user was an expert user and that they worked as a
secretary. Analyzing the activities previously performed by this user, the system would be made
aware that the user only used Microsoft Word to write letters. Therefore the system could
proactively decide to present the user with a letter template as soon as they opened Word. This
template would contain the company’s address, the days date, and signed with the users name to
ensure the user did not have to repeatedly input this data every time they wrote a letter.
42
Figure 4.3: Context Awareness and Ubiquitous Computing
4.3.2 Invisible
Ubiquitous systems need to remain invisible to the user to ensure the minimal intrusion on the
user’s life. Without context awareness, a system would require a user to manually input
important data relating to each task that needed to be performed. This in itself would remove the
systems transparency. However when a system is context aware, it can gather this information by
observing the user context and behavior without the need for user intervention, thus allowing the
4.3.3 Adaptation
For a ubiquitous computing system to be effective it needs to have an adaption strategy in place.
An adaption strategy is necessary when there is a significant mismatch between the demand and
the supply of particular resources. The resources may be energy, memory, network signal, etc.
With this mismatch the ubiquitous system needs to quickly determine what alternative strategy to
43
take. The only way the system can do this is to collect information relating to the users context
and then decide on the most efficient and effective path to take.
The International ISO-9999 Standard defines assistive technology as the following: “Any
product, instrument, equipment or technical system used by a disabled or elderly person, made
specially or existing on the market, aimed to prevent, compensate, relieve or neutralize the
This essentially means that any technology, whether low tech or high tech, that helps a
disabled user is deemed as an assistive technology. Assistive technology enables people with
also allow people to achieve optimal functionality and independence assuming that the assistive
The Human Activity Assistive Technology (HAAT) Model is often used when designing an
assistive technology for a user with disabilities. This model describes how the user’s
performance can be influenced, negatively or positively, by the person, the activity and the
person’s environment.
The model suggests that each of these factors influence each other, and for optimal
performance these factors need to adapt to change effectively. Each of the factors considered in
the HAAT Model can be directly mapped to the types of context information that a ubiquitous
44
computing system can be made aware of. Using this context information acquired by the
ubiquitous system/assistive technology, the system could continuously adapt to the users
requirements.
Clippy the paperclip Take the Microsoft Office Assistant Clippy the paperclip as an example.
This tool was designed to anticipate what the user intent was when using any of the Microsoft
Office Suite. This tool was programmed to ask the user certain questions and offer advice once a
predetermined event had occurred. This, although useful in some situations, became a rather
annoying feature that many users turned off. Eventually with the release of Office XP, the
45
Figure 4.5: the Microsoft Office Assistant Clippy the paperclip
For its failure is that office assistant was not context aware. It had no awareness of the identity of
the user using the office suite and no real understanding of the activity being performed by that
user. Without this information it was impossible for the assistant tool to adapt to the user’s needs
The SVC is designed to vacuum dirty floor areas, avoid furniture in the room, avoid areas of
the floor that have already been cleaned as well as ensuring it does not run out of battery
power. The Smart Vacuum Cleaner does this by being location aware. It uses location
sensors to determine if the area it is approaching has already been cleaned or if there is
furniture blocking its path. If either of these conditions are true the device quickly adapts and
determines on an alternative route. If low battery power is indicated to the device it will
adapt once again, and make its way back to its docking station where it can recharge its
46
Figure 4.6: the Microsoft Office Assistant Clippy the paperclip
47
CHAPTER 5
The smart environment is made up of numerous ubiquitous computing devices. They each
function to sense and actuate according to a given occupants need. But what happens when one
device contradicts the other? How can the devices cooperate so that a ubiquitous computing
The paper Smart Environments and Self-Organizing Appliance Ensembles raises the very
interesting question, “How do you control devices you do not perceive?” An answer to this
question revolves around goal oriented device cooperation. You see, the smart system cannot
rely on the user to provide a step-by-step process of how each device should behave. Similarly,
the designer cannot predict all combinations of how an ensemble ubiquitous computing
environment needs to respond. Instead, a system may be driven by a users goal where the system
Within a smart environment, goal based interactions are likely to be at its heart. How a
computing device carries out a function is not what matters most to a user. It is rather the effect
of ubiquitous computing devices that is key. The following is a diagram as described in the paper
48
Figure 5.1: Goal Based Interaction.
As you can see, intention analysis and strategy planning are critical to how the ubiquitous
computing system will work. Both are necessary for goal based interactions.
A users needs may be quite varied and the smart environments devices must cooperate with
each other in unison. In addition, as users add or remove devices to their smart environment,
ubiquitous computing technologies must easily allow for such user changes. In the end, a goal
oriented approach calls for a dynamic system, so the user’s needs are met even as they change in
real-time. The smart environment will be able to simultaneously feed the senses so occupants can
carry out a multitude of functions. With few interface techniques a user may communicate based
on their intention; and therefore, their goals. Smart environments will work seamlessly to
orchestrate a smart space through context aware techniques. Appliances will form an ensemble,
49
5.2 How ubiquitous computing works
The success of ubiquitous computing rests with the proper integration of various components
that talk to each other and behave as one. It shows such a ubiquitous computing stack. At the
bottom of the stack is a physical layer. Tiny sensors are attached (carried, worn, or embedded) to
people, animals, machines, homes, cars, buildings, campuses, and fields. Today, some
smartphones come with a host of sensors that capture various bits of information from the
immediate surroundings. Beyond the microphone and camera, they integrate multiple sensors
Above the sensors lies the wireless communication infrastructure, which can be provided by
the 802.11 family of networks. Newer standards such as 802.11n have lower latency. Together
with mesh networks, such standards ensure the connectivity of sensors and devices. Another
technology called ZigBee is a low-cost alternative for keeping multiple devices connected,
50
allowing parent devices to wirelessly control child sensors. Near field communication (NFC) is
yet another technology standard that leverages RFID and can be used for ubiquitous computing,
especially in scenarios where non-battery operated passive points are concerned. NFC-powered
The next level includes a range of application services. The data from the sensors and
handheld devices is gathered, mined, and analyzed for patterns. The patterns help provide options
tablets, netbooks, notebooks, handhelds, or other smart devices. The smartphone, for instance,
can transform itself into a barcode or quick response (QR) code reader to identify and get details
of a product from a retail store, or display the barcode of your airline ticket so that the barcode
code reader at the check-in kiosk can read it and issue a boarding pass. Another example could
be that of a cardiac patient wearing a tiny monitor connected to a mobile device. An irregular
ECG will trigger the mobile to alert the patients doctor and emergency services. An example of
51
Figure 5.3: smart device interaction.
5.3 Challenges
The power ubiquitous computing promises carries with it significant risks. One such risk is
associated with the amount of privacy that must be sacrificed to see the benefits of truly helpful
computers. Another is that early, bleeding edge applications of ubiquitous computing will turn
out to be more ambitious than effective, leading some to prematurely conclude that the idea is a
When such a vast number of entities are connected, their interactions and communications are
examined more carefully. First, data from one person’s device must be distinguished from data to
another. Second, it is necessary to ensure that false data is not intentionally injected by some
other device, masquerading as a bonafide source for that information. And finally, it must be
rendered difficult or impossible to steal someone else’s data. Researchers are currently working
• Do you want employer, colleagues or insurance company to know you carry a medical
monitor?
52
• Tension between authentication and anonymity business want to authenticate you for
• Ability to control who/what has access to my data (stored, communicated, inferred), ability
• Need filtering, aggregation, collaborative sensing, new query techniques which cater for
errors in source.
5.3.3 Networking
• Another key driver for the final transition will be the use of short-range wireless as well as
53
5.4 Requirement
”Ubiquitous Computing” will usher in a new era. Instead of do-it-all computers, we will see the
advent of simple, task-specific, miniaturized and intuitively operable processors that will be
invisibly integrated in everyday objects. Similarly, traditional input devices such as keyboards
and mice will not be required. Instead, the processors will be controlled by electronic, optical,
acoustic or chemical sensors, and they will output via actuators such motors or other control
units.
In order to reach that point, however, researchers need to develop new software that is capable of
the following:
• Self-optimization, including continual monitoring and analysis of its own performance and
• Self-protection, meaning identification and control of unauthorized access and virus activity
• Self-teaching, that is, recognition of behavioral patterns and their incorporation in internal
In other words, the system must not only be capable of recognizing objects and persons, but
54
CHAPTER 6
system entity. This entity can be the user or another service. Services are usually well-defined in
their functionality as well as their inputs and outputs. We identify the five goals of ubiquity, with
Trustworthiness (ATSAT) as depicted in the figure. These goals may be satisfied to varying
1. Availability
Ideally, a ubiquitous service should be available independent context. The service should be
2. Transparency
where a tool is “literally visible, effectively invisible” means that the tool does not intrude
on the user consciousness; the user focuses on the task, not the tool. Ubiquitous computing
provides smarter unconscious, so that users do more easily and intuitively without requiring
user attention and awareness of the underlying technology. Transparency implies more than
just a user-friendly interface; the technology should facilitate the task in a non-intrusive
way and in this way “hide “the underlying technology from the user
55
3. Seamlessness
under any connection with any device. The ultimate goal is that the system will recognize
the user wherever she logs on, on any system, with any equipment, at any time, with the
applications in a given state and have them adapting the best possible way given these
surrounding conditions. Seams occur when the service fails to satisfy the minimum QoS
4. Awareness
Ubiquitous devices extend the human senses by providing greater awareness of the
surrounding environment. By blending into the physical world, a ubiquitous service bridges
the gap between the end-user and his surroundings. We advocate the need for mutual
awareness between the user (context) and the service (feedback). Abowd and Mynatt put
forth the “five W’s” of context, providing a good starting point of the different components
that should be put together to provide user context. The five Ws are:-Who (the ability of a
device to identify not only its owner, but other people and devices in its vicinity within the
and behavior, and using that information to infer what the user wants to do), Where (the
ability to interpret the location of the user and use that to tailor functionality), When (the
ability to understand the passage of time, use it to understand the activities around and to
make inferences), and Why (the ability to understand the reasons behind certain user
actions). In addition to the system awareness of its user, a ubiquitous environment provides
user awareness of the task (i.e. feedback) in a way that may enhance the user’s decisions.
56
5. Trustworthiness
We define trust of an entity in a ubiquitous service environment as the confidence that the
entity will behave as expected in a given context. Mutual trust must be established between
different entities in a ubiquitous environment in a sense that each entity is assigned a trust
value based on its behavior. An entity can be advice, a service or a user. In the latter case,
the trustworthiness of a service or a device has psycho sociological aspects that affect its
usability. The model of trust in a ubiquitous context should capture both the needs of the
traditional world of computing where trust is based on identity, and of the world of
ubiquitous and pervasive computing where trust is based on identity, physical context or a
RTLS is a local positioning system where small, inexpensive electronic tags are attached to
people and objects, such as equipment, patients and caregivers in a hospital, to help track
interactions and improve services.
57
Figure 6.1: Real-Time Locating System for hospital.
This means hospitals can better track when doctors and nurses entered the room, interacted
with the equipment and patient etc. This non-intrusive logging means that the system could alert
nurses when a patient hasn’t been checked on for a while. It could also be used for better asset-
tracking; Hospital staff no longer need to manually log every time a piece of equipment moves
rooms, but can locate equipment instantly even in large hospitals. Tags on the patient’s wrist can
pull up their electronic medical records immediately and accurately, reducing the risk of
dangerous errors.
All this is done through small, wireless tags that are low-power and need no recharging for the
The system is non-intrusive in that it doesn’t require users to change their behavior, but instead
integrates into their environment and provides benefit through improving patient care and
reducing risks and errors. The tags are small, need no maintenance and easily integrated into
wristbands, asset management tags etc. The base stations for talking to them are simple devices
58
Figure 6.2: Awarepoint Tag.
The Ubi is an always-on voice-activated computer ready to help. Just plug it in, talk to it and it’ll
help you connect with your world. You talk to the Ubi and it talks back. It directly connects to
We believe people want to do things when they’re at home - they clean, they fold laundry, they
cook, they eat, they spend time with loved ones. These are all things that (for the most part) take
up use of our arms and hands. When we’re at home, we’d rather use our limbs for other activities
than typing, scrolling, or swiping. Ubi is short for ubiquitous computer because it’s always on,
always listening, always ready to help. It can scribe, listen, analyze. Ubi will either talk back to
you the information you seek or indicate information through multi-color lights. Ubi listens to its
environment and senses it through sound, temperature, light, pressure, and humidity. It can
record this information or use it to trigger events and communication. Ubi can be used for
potentially hundreds of applications. The Applications we plan to ship with the Ubi are:
59
2. Speakerphone
3. Indicator light (light changing based on events, e.g. weather, stock, email)
6. Voice memos
7. Alarm clock
60
CHAPTER 7
Computing, over the past 50+ years, has gone through two distinct phases: the mainframe era
and the personal computing era. The third phase has begun and you may have not even noticed
that is the way it is supposed to be. Ubiquitous means existing or being everywhere at the same
time, i.e. constantly encountered. Ubiquitous computing, or ubicomp, as it has been tagged will
The distinguishing feature of ubicomp will be the lack of interface. Everything will be controlled
by natural actions as opposed to the point-and-click interfaces we have all grown used to.
Right now we receive information in two distinct ways: pull or push. Pull can be characterized
by a user sitting down at a computer, firing up Google, and searching for specific information in
much like the personalized text messages on your cell phone informing you of weather or traffic
conditions.
When computing becomes ubiquitous you will not need to manually set preferences. The object
you interact with will learn from you and provide information based on your environment.
Temperature, time of day, movement, sound, color and light will all influence the information
you receive. Ubiquitous computing will provide a continuous stream of information without
being distracting and will only provide the information you need at the time.
61
Everything will become interactive and more importantly, reactive. Imagine the following
scenarios:
1. You make a call to your friend whose native language is French. He understands English
quite well but prefers to speak in French. No problem. In real-time what you say comes
2. You need to setup a meeting with a group of business partners who all have busy schedules.
No problem, their automated calendars work together to find a good time for all of you to
meet.
3. You are rushed to the hospital after a car accident. By performing a retinal scan the ER
doctors are provided with time-sensitive and important information: allergies, past
surgeries, existing
4. Conditions, emergency contact information, name and age. (Ubiquitous computing will
5. You have lost your keys. No more searching, just ask your house. It will know EXACTLY
where they are, even if they are hiding in the couch cushions. (Keys will probably be a thing
62
Figure 7.1: ultra-tiny computer imbedded in environment.
It is difficult to comprehend all that ubiquitous computing will entail. I look at it this way:
Everything, and I mean everything, will be connected. A communication device of some type
will be embedded in every single product created. This prospect is scary for some, exciting for
others.
7.2 Conclusion
The UC will bring information technology beyond the big problems like corporate finance and
school homework, to the little annoyances like where are the car-keys, Can I get a parking place,
and Is that shirt I saw last week at Macy’s still on the rack? Many researchers are working
towards this new era - among them our work at Xerox PARC, MIT’s AI-oriented ”Things That
Think” program, the many mobile and wearable computing programs (many funded by ARPA),
and the many companies integrating computation into everyday objects, including Mattel and
Disney but
63
• Currently pervasive systems are more hype than reality
64
REFERENCES
The Computer for the 21st Century; Weiser, Mark , July 1999
International Conference on , vol., no., pp.70-74, 11-12 June 2010 doi: 10.1109 /ICNIT.
2010.5508555
[Link]
[Link]
Virtual Reality,Rheingold 91. Rheingold, Howard. Virtual Reality. Summit Books. New
65