The document discusses wearable computing, including what it is, how it can be implemented through input and output devices, how wearable devices can be networked, and how wearable computing relates to ubiquitous computing. Wearable computing involves portable computers that can be worn and allow for hands-free interaction through inputs like gestures, speech recognition and outputs like head-mounted displays. The combination of wearable and ubiquitous computing aims to harness the localized information, control and resource management of wearables with the connectivity of ubiquitous computing environments.
2. Discussion Outline
What is Wearable computing
Wearable computing implementation
Wearable computing Networking
Wearable computing and Ubiquitous computing
3. What is wearable computing
Wearable
Portable while
operational
Hand-free or one-
handed operation
unobtrusive
Augmented reality
situation aware
4. >>Wearable Computer Implementation
Overall System Block Diagram :
Input Device Display Device
Com port VGA out
Frame grabber
Network card
Wireless
Wireless
Network
Network
Video Camera Main Unit
Parallel port Back plane
Low Power Indicator Power Supply
5. >>Wearable Computer Implementation>>Input Device
speech recognizer
keyboard alternative including chording keyboards and special
purpose keyboards
mouse alternatives including trackballs, joysticks
tab alternatives including buttons, dial
eye trackers
head trackers
pen
gesturing
bar code reader
video capture devices, microphones, GPS locators
other exotic devices such as skin sensors
15. >>Wearable Computer Networking
General requirements Security requirements
Short-ranged Privacy
Simple in design Data Confidentiality
Low power consumption Data integrity
Self-configuration Access Control
Restricted to the user Availability
Security Source Authentication
17. >>Wearable Computer Networking
BlueTooth Security>>Key Management
PIN PIN
E2 E2
Authenticatio
n
Link Key Link Key
E3 E3
Encryption
Encryption Key Encryption Key
Encryption and Key Control
18. >>Wearable Computer Networking
BlueTooth Security>>Authentication
Verifier Verifier
(User A) (User B)
SRES’ = E(key, IDB, RAND) RAND SRES = E(key, IDB,
RAND)
SRES
Checks:SRES’ = SRES
Challenge-response for symmetric key system
19. Wearable Computing & Ubiquitous
Computing
Properties and Problems with Ubiquitous
Computing
Privacy issues
Difficulty with personalized
information:
Properties and Problem with Wearable
Computing
Localized information:
Localized control
Resource management:
The Combination-Hive and Locust Swarm
A General Scenario
20. Wearable Computing & Ubiquitous
Computing
Properties and Problems with Ubiquitous Computing
Hi all, I am Mike,
Privacy issues
your new Boss
Difficulty with personalized information :
I am Tom !
Tom:
Oh, it’s Tom Oh, it’s Tom
Me Too! Tom:
Let me25
Age: check Let me check
OK, let me check
It’s really
my databse Age: 25I mynew man!
MyOK, will databse
god, a play
Email:
his email
troublesome! I have to update
this song
Tt@yahoo.com Favorite Song:
my database!
My heart will go on
21. Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
I am Tom !
OK, I will play
this song
Tom:
OK, let me check Age: 25
his email Favorite Song:
My heart will go on
Email: Tt@yahoo.com
22. Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
1. Localized information :
2. Localized control
Where is the
A New device!
I am Tom !
printer’s driver?
It should be
should I
added to my DB.
install it?
Device Table:
Device Table:
--------------------
--------------------
1.Computer
1.Computer
2.Recorder
2.Recorder
3.Printer
23. Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
Resource management : Hi all, I am Mike
I am Tom ! Oh my,
What should I do?
Tom: Mike:
Age: 25 Age: 30
Favorite Song: Favorite Song:
My heart will go on Salvage Garden
Email: Email:
Tt@yahoo.com Mm@yahoo.com
24. Wearable Computing & Ubiquitous
Computing
The Combination-Hive and Locust Swarm
Why Hive?
Agents are Autonomous
Agents are proactive
Agents can interact
Agents can be mobile
What is Locust Swarm?
Today, I will talk about wearable computing. My talk has three parts: First, What is Wearable computing, where we will get a feeling of what is wearable computing and how cool it is. Second, Wearable computing implementation. where I introduce you the basic idea of what makes the wearable computing possible Fianlly, we will talk about Wearable computing and Ubiquitous computing. When wearable computing is combined with ubiquitous computing, it can be become more powerful, more useful and more cooler. Ok, let's first have a feeling of what is wearable computer. (first slide) When I prepare for this presentation, I learned a very cool girl named Kio. She wears her computer as clothes all the time, everywhere. Although she has no social life, she stays constant contact with her friends at any time. first, let's look at her interface, a six-petal ring, which allows her to control volume, channels and functions by pressing the petals in a certain order. The ring also responds to certain hand motions. Depending on her mood, she decides how accessible she wants to be and she let the system know through the ring. It does the rest. Wearables are situation aware, and the more I use them, the more they learn about me. For example, my phone interface has just learned that if I’m with my new boyfriend and my mother calls, the call goes directly to voicemail. Cool or what? (second slide) This is her 'message wand’, which is another input device. It’s kind of translucent and displays messages spinning inside. It can be used like pen. The RF system let her write on any surface, even in the air, and the signal is transmitted back to her system so she can see the writing on a screen. With handwriting recognition capability software, I’ll be able to input information, notes from class, just about anything (3td slide) This is the output device, a really coll bug-eye monocle. It connects to the audio piece and works like a tiny monitor that projects an image into my eye. with a camera, she can have video chats with her friends while she is walking down the street! All the accessories are connected by a short range radio data network, so you just need to choose the one you want to use and put it on. (4th slide) Let's look at the belt. this is the base Unit. it contains the central processor, memory, short/long range wireless communications and power unit, as well as GPS capability. So, as we have seen, wearable computering makes computers disapper into our clothes and accessaries and has the following main features: Wearable Portable while operational Hand-free or one-handed operation Augmented reality situation aware unobtrusive Even if I am just wearing the base module I can interact with the network. Just by sitting in front of one of the computers at the library, the network recognizes me and brings up my files, my desktop, my system. I can get my e-mail or surf the web without lugging around a laptop. The system itself is really amazing. The GPS capability lets me post messages to my roommate so that she’ll get them when they’ll have the most impact. For instance, I can send her a reminder to clean up her stuff and have it post just as she’s opening the door to our room. The last thing I want to tell you about this scenario is that this dead cool girl is from future. However, I believe from not very far future. In fact, these are what we have now.
The rest of the system--its central processing unit (CPU), which includes a microprocessor, RAM, and hard drive--is worn in a belt around the waist. The
Others of the input devices - eye and head trackers, for example, are not yet generally available. One hand or hand free Application-specific Military and industrial applications for wearables especially emphasize their hands-free aspect, and concentrate on speech input and heads-up display or voice output. Other wearables might also use chording keyboards, dials, and joysticks to minimize the tying up of a user's hands.
The most appropriate output device to be used with wearable computers again depends on the task to be performed but a wide variety of possible output devices were mentioned by the attendees at the breakout. These were: head mounted displays (HMDs), flat panels, text to speech, tactile output, non speech auditory output, paper and olfactory output (scent). Of these we discussed in more detail HMDs and flat panels.