SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Wearable Computing




       Yuanfang Cai
       Dec. 6, 2000
Discussion Outline


 What is Wearable computing
 Wearable computing implementation
 Wearable computing Networking
 Wearable computing and Ubiquitous computing
What is wearable computing


        Wearable
        Portable while
         operational
        Hand-free or one-
         handed operation
        unobtrusive
        Augmented reality
        situation aware
>>Wearable Computer Implementation

 Overall System Block Diagram :

        Input Device                                              Display Device



                                       Com port   VGA out
                       Frame grabber




                                                            Network card
                                                                                    Wireless
                                                                                   Wireless
                                                                                    Network
                                                                                   Network
 Video Camera                              Main Unit




                       Parallel port              Back plane




     Low Power Indicator                                                   Power Supply
>>Wearable Computer Implementation>>Input Device

    speech recognizer
    keyboard alternative including chording keyboards and special
     purpose keyboards
    mouse alternatives including trackballs, joysticks
    tab alternatives including buttons, dial
    eye trackers
    head trackers
    pen
    gesturing
    bar code reader
    video capture devices, microphones, GPS locators
    other exotic devices such as skin sensors
>>Wearable Computer Implementation>>Input Device


Wireless Finger Ring

   Detection of finger-tip typing
   Wireless Link
   Block Diagrams
   Chording METHOD
Wearable Computer Implementation>>Input Device

 Wireless finger Ring>>Detection of finger-tip typing
Wearable Computer Implementation>>Input Device

 Wireless finger Ring>>Wireless Link
Wearable Computer Implementation>>Input Device

 Wireless finger Ring>>Block Diagrams
Wearable Computer Implementation>>Input Device

 Wireless finger Ring>>Chording Method
>>Wearable Computer Implementation>>Output
Device



 head mounted displays (HMDs)
 flat panels, text to speech
 tactile output
 non speech auditory output
 paper and olfactory output (scent)
>>Wearable Computer Implementation>>Output
Device

 Augmented Reality

 Typical Augmented Reality System
 Display Technologies in Augmented
 Reality
>>Wearable Computer Implementation>>Output
Device

 Augmented Reality>> Typical Augmented Reality System
>>Wearable Computer Implementation>>Output
Device

 Augmented Reality>> Display Technologies in Augmented Reality




       Video See-through Augmented Reality Display
    Optical See-through Augmented Reality Display
>>Wearable Computer Networking


 General requirements         Security requirements

    Short-ranged                Privacy
    Simple in design            Data Confidentiality
    Low power consumption       Data integrity
    Self-configuration          Access Control
    Restricted to the user      Availability
    Security                    Source Authentication
>>Wearable Computer Networking

 BlueTooth Security>>Security Architecture
>>Wearable Computer Networking

 BlueTooth Security>>Key Management
                  PIN                           PIN


             E2                           E2

                        Authenticatio
                        n
           Link Key                     Link Key


             E3                            E3
                           Encryption

      Encryption Key                    Encryption Key



             Encryption and Key Control
>>Wearable Computer Networking

    BlueTooth Security>>Authentication

                      Verifier              Verifier
                      (User A)              (User B)




SRES’ = E(key, IDB, RAND)         RAND                 SRES = E(key, IDB,
                                                       RAND)


                                  SRES




                            Checks:SRES’ = SRES
             Challenge-response for symmetric key system
Wearable Computing & Ubiquitous
Computing

     Properties and Problems with Ubiquitous
      Computing
         Privacy issues
         Difficulty with personalized
          information:
     Properties and Problem with Wearable
      Computing
         Localized information:

         Localized control

         Resource management:

     The Combination-Hive and Locust Swarm
     A General Scenario
Wearable Computing & Ubiquitous
  Computing
      Properties and Problems with Ubiquitous Computing
                                                              Hi all, I am Mike,
          Privacy issues
                                                               your new Boss
          Difficulty with personalized information :



                                   I am Tom !



  Tom:
  Oh, it’s Tom                                      Oh, it’s Tom
      Me Too!                              Tom:
 Let me25
  Age: check                                       Let me check
OK, let me check
     It’s really
  my databse                               Age: 25I mynew man!
                                           MyOK, will databse
                                               god, a play
  Email:
     his email
   troublesome!                              I have to update
                                                 this song
  Tt@yahoo.com                             Favorite Song:
                                               my database!
                                           My heart will go on
Wearable Computing & Ubiquitous
 Computing
  Properties and Problem with Wearable Computing




                          I am Tom !
                                                   OK, I will play
                                                     this song


                           Tom:

OK, let me check           Age: 25
    his email              Favorite Song:
                           My heart will go on
                           Email: Tt@yahoo.com
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
    1. Localized information :
    2. Localized control

                          Where is the
                              A New device!
                               I am Tom !
                         printer’s driver?
                                It should be
                             should I
                             added to my DB.
                             install it?

                                   Device Table:
                                  Device Table:
                                   --------------------
                                  --------------------
                                   1.Computer
                                  1.Computer
                                   2.Recorder
                                  2.Recorder
                                   3.Printer
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing

      Resource management :                                      Hi all, I am Mike


I am Tom !                      Oh my,
                            What should I do?




                     Tom:                        Mike:
                     Age: 25                     Age: 30
                     Favorite Song:              Favorite Song:
                     My heart will go on         Salvage Garden
                     Email:                      Email:
                     Tt@yahoo.com                Mm@yahoo.com
Wearable Computing & Ubiquitous
Computing

  The Combination-Hive and Locust Swarm
  Why Hive?
       Agents are Autonomous
       Agents are proactive
       Agents can interact
       Agents can be mobile
  What is Locust Swarm?
Wearable Computing & Ubiquitous
Computing




    Reaping the best of both worlds

Weitere ähnliche Inhalte

Ähnlich wie Wearable Computing: Input, Output, Networking and Ubiquitous Applications

zigbee technology
zigbee technologyzigbee technology
zigbee technologyDeep Hundal
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systemsManav Gupta
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
ifwt remote (sydney ruxmon edition)
ifwt remote (sydney ruxmon edition)ifwt remote (sydney ruxmon edition)
ifwt remote (sydney ruxmon edition)Tim N
 
Device inspection to remote root
Device inspection to remote rootDevice inspection to remote root
Device inspection to remote rootTim N
 
Module1 computerbasics1
Module1 computerbasics1Module1 computerbasics1
Module1 computerbasics1Usman Shah
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Future Insights
 
Brain to Brain - Journey of Mouse click
Brain to Brain - Journey of Mouse clickBrain to Brain - Journey of Mouse click
Brain to Brain - Journey of Mouse clickToshish Jawale
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
28c3 in 15
28c3 in 1528c3 in 15
28c3 in 15antitree
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 

Ähnlich wie Wearable Computing: Input, Output, Networking and Ubiquitous Applications (20)

zigbee technology
zigbee technologyzigbee technology
zigbee technology
 
Mcitp lec 2
Mcitp lec 2Mcitp lec 2
Mcitp lec 2
 
Lewis unit 3
Lewis unit 3 Lewis unit 3
Lewis unit 3
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
ifwt remote (sydney ruxmon edition)
ifwt remote (sydney ruxmon edition)ifwt remote (sydney ruxmon edition)
ifwt remote (sydney ruxmon edition)
 
Device inspection to remote root
Device inspection to remote rootDevice inspection to remote root
Device inspection to remote root
 
Module1 computerbasics1
Module1 computerbasics1Module1 computerbasics1
Module1 computerbasics1
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)
 
Brain to Brain - Journey of Mouse click
Brain to Brain - Journey of Mouse clickBrain to Brain - Journey of Mouse click
Brain to Brain - Journey of Mouse click
 
Lesson1 Contestada
Lesson1 ContestadaLesson1 Contestada
Lesson1 Contestada
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
28c3 in 15
28c3 in 1528c3 in 15
28c3 in 15
 
Jacks unit 3
Jacks unit 3Jacks unit 3
Jacks unit 3
 
Lesson1
Lesson1Lesson1
Lesson1
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
AGGREY REPAIR
AGGREY REPAIRAGGREY REPAIR
AGGREY REPAIR
 

Mehr von ch samaram

Syllabus r10-ecm-42-network security and cryptography
 Syllabus r10-ecm-42-network security and cryptography Syllabus r10-ecm-42-network security and cryptography
Syllabus r10-ecm-42-network security and cryptographych samaram
 
Restaurant billing application
Restaurant billing applicationRestaurant billing application
Restaurant billing applicationch samaram
 
Spintronics (1)
Spintronics (1)Spintronics (1)
Spintronics (1)ch samaram
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Javascript sivasoft
Javascript sivasoftJavascript sivasoft
Javascript sivasoftch samaram
 
Basics java scripts
Basics java scriptsBasics java scripts
Basics java scriptsch samaram
 

Mehr von ch samaram (18)

Syllabus r10-ecm-42-network security and cryptography
 Syllabus r10-ecm-42-network security and cryptography Syllabus r10-ecm-42-network security and cryptography
Syllabus r10-ecm-42-network security and cryptography
 
Restaurant billing application
Restaurant billing applicationRestaurant billing application
Restaurant billing application
 
Spintronics
SpintronicsSpintronics
Spintronics
 
Spintronics (1)
Spintronics (1)Spintronics (1)
Spintronics (1)
 
Shore
ShoreShore
Shore
 
Presentation
PresentationPresentation
Presentation
 
Open gl
Open glOpen gl
Open gl
 
Opengl (1)
Opengl (1)Opengl (1)
Opengl (1)
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Blue gene
Blue geneBlue gene
Blue gene
 
Blue gene
Blue geneBlue gene
Blue gene
 
Javascript sivasoft
Javascript sivasoftJavascript sivasoft
Javascript sivasoft
 
Html siva
Html sivaHtml siva
Html siva
 
Css siva
Css sivaCss siva
Css siva
 
Basics java scripts
Basics java scriptsBasics java scripts
Basics java scripts
 
Ajax
AjaxAjax
Ajax
 
Html 5
Html 5Html 5
Html 5
 
Css siva
Css sivaCss siva
Css siva
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Wearable Computing: Input, Output, Networking and Ubiquitous Applications

  • 1. Wearable Computing Yuanfang Cai Dec. 6, 2000
  • 2. Discussion Outline What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing
  • 3. What is wearable computing  Wearable  Portable while operational  Hand-free or one- handed operation  unobtrusive  Augmented reality  situation aware
  • 4. >>Wearable Computer Implementation Overall System Block Diagram : Input Device Display Device Com port VGA out Frame grabber Network card Wireless Wireless Network Network Video Camera Main Unit Parallel port Back plane Low Power Indicator Power Supply
  • 5. >>Wearable Computer Implementation>>Input Device  speech recognizer  keyboard alternative including chording keyboards and special purpose keyboards  mouse alternatives including trackballs, joysticks  tab alternatives including buttons, dial  eye trackers  head trackers  pen  gesturing  bar code reader  video capture devices, microphones, GPS locators  other exotic devices such as skin sensors
  • 6. >>Wearable Computer Implementation>>Input Device Wireless Finger Ring  Detection of finger-tip typing  Wireless Link  Block Diagrams  Chording METHOD
  • 7. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Detection of finger-tip typing
  • 8. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Wireless Link
  • 9. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Block Diagrams
  • 10. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Chording Method
  • 11. >>Wearable Computer Implementation>>Output Device head mounted displays (HMDs) flat panels, text to speech tactile output non speech auditory output paper and olfactory output (scent)
  • 12. >>Wearable Computer Implementation>>Output Device Augmented Reality Typical Augmented Reality System Display Technologies in Augmented Reality
  • 13. >>Wearable Computer Implementation>>Output Device Augmented Reality>> Typical Augmented Reality System
  • 14. >>Wearable Computer Implementation>>Output Device Augmented Reality>> Display Technologies in Augmented Reality Video See-through Augmented Reality Display Optical See-through Augmented Reality Display
  • 15. >>Wearable Computer Networking General requirements Security requirements  Short-ranged  Privacy  Simple in design  Data Confidentiality  Low power consumption  Data integrity  Self-configuration  Access Control  Restricted to the user  Availability  Security  Source Authentication
  • 16. >>Wearable Computer Networking BlueTooth Security>>Security Architecture
  • 17. >>Wearable Computer Networking BlueTooth Security>>Key Management PIN PIN E2 E2 Authenticatio n Link Key Link Key E3 E3 Encryption Encryption Key Encryption Key Encryption and Key Control
  • 18. >>Wearable Computer Networking BlueTooth Security>>Authentication Verifier Verifier (User A) (User B) SRES’ = E(key, IDB, RAND) RAND SRES = E(key, IDB, RAND) SRES Checks:SRES’ = SRES Challenge-response for symmetric key system
  • 19. Wearable Computing & Ubiquitous Computing  Properties and Problems with Ubiquitous Computing  Privacy issues  Difficulty with personalized information:  Properties and Problem with Wearable Computing  Localized information:  Localized control  Resource management:  The Combination-Hive and Locust Swarm  A General Scenario
  • 20. Wearable Computing & Ubiquitous Computing  Properties and Problems with Ubiquitous Computing Hi all, I am Mike,  Privacy issues your new Boss  Difficulty with personalized information : I am Tom ! Tom: Oh, it’s Tom Oh, it’s Tom Me Too! Tom: Let me25 Age: check Let me check OK, let me check It’s really my databse Age: 25I mynew man! MyOK, will databse god, a play Email: his email troublesome! I have to update this song Tt@yahoo.com Favorite Song: my database! My heart will go on
  • 21. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! OK, I will play this song Tom: OK, let me check Age: 25 his email Favorite Song: My heart will go on Email: Tt@yahoo.com
  • 22. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing  1. Localized information :  2. Localized control Where is the A New device! I am Tom ! printer’s driver? It should be should I added to my DB. install it? Device Table: Device Table: -------------------- -------------------- 1.Computer 1.Computer 2.Recorder 2.Recorder 3.Printer
  • 23. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing  Resource management : Hi all, I am Mike I am Tom ! Oh my, What should I do? Tom: Mike: Age: 25 Age: 30 Favorite Song: Favorite Song: My heart will go on Salvage Garden Email: Email: Tt@yahoo.com Mm@yahoo.com
  • 24. Wearable Computing & Ubiquitous Computing The Combination-Hive and Locust Swarm Why Hive?  Agents are Autonomous  Agents are proactive  Agents can interact  Agents can be mobile What is Locust Swarm?
  • 25. Wearable Computing & Ubiquitous Computing Reaping the best of both worlds

Hinweis der Redaktion

  1. Today, I will talk about wearable computing. My talk has three parts: First, What is Wearable computing, where we will get a feeling of what is wearable computing and how cool it is. Second, Wearable computing implementation. where I introduce you the basic idea of what makes the wearable computing possible Fianlly, we will talk about Wearable computing and Ubiquitous computing. When wearable computing is combined with ubiquitous computing, it can be become more powerful, more useful and more cooler. Ok, let's first have a feeling of what is wearable computer. (first slide) When I prepare for this presentation, I learned a very cool girl named Kio. She wears her computer as clothes all the time, everywhere. Although she has no social life, she stays constant contact with her friends at any time. first, let's look at her interface, a six-petal ring, which allows her to control volume, channels and functions by pressing the petals in a certain order. The ring also responds to certain hand motions. Depending on her mood, she decides how accessible she wants to be and she let the system know through the ring. It does the rest. Wearables are situation aware, and the more I use them, the more they learn about me. For example, my phone interface has just learned that if I’m with my new boyfriend and my mother calls, the call goes directly to voicemail. Cool or what? (second slide) This is her 'message wand’, which is another input device. It’s kind of translucent and displays messages spinning inside. It can be used like pen. The RF system let her write on any surface, even in the air, and the signal is transmitted back to her system so she can see the writing on a screen. With handwriting recognition capability software, I’ll be able to input information, notes from class, just about anything (3td slide) This is the output device, a really coll bug-eye monocle. It connects to the audio piece and works like a tiny monitor that projects an image into my eye. with a camera, she can have video chats with her friends while she is walking down the street! All the accessories are connected by a short range radio data network, so you just need to choose the one you want to use and put it on. (4th slide) Let's look at the belt. this is the base Unit. it contains the central processor, memory, short/long range wireless communications and power unit, as well as GPS capability. So, as we have seen, wearable computering makes computers disapper into our clothes and accessaries and has the following main features: Wearable Portable while operational Hand-free or one-handed operation Augmented reality situation aware unobtrusive Even if I am just wearing the base module I can interact with the network. Just by sitting in front of one of the computers at the library, the network recognizes me and brings up my files, my desktop, my system. I can get my e-mail or surf the web without lugging around a laptop. The system itself is really amazing. The GPS capability lets me post messages to my roommate so that she’ll get them when they’ll have the most impact. For instance, I can send her a reminder to clean up her stuff and have it post just as she’s opening the door to our room. The last thing I want to tell you about this scenario is that this dead cool girl is from future. However, I believe from not very far future. In fact, these are what we have now.
  2. The rest of the system--its central processing unit (CPU), which includes a microprocessor, RAM, and hard drive--is worn in a belt around the waist. The
  3. Others of the input devices - eye and head trackers, for example, are not yet generally available. One hand or hand free Application-specific Military and industrial applications for wearables especially emphasize their hands-free aspect, and concentrate on speech input and heads-up display or voice output. Other wearables might also use chording keyboards, dials, and joysticks to minimize the tying up of a user's hands.
  4. The most appropriate output device to be used with wearable computers again depends on the task to be performed but a wide variety of possible output devices were mentioned by the attendees at the breakout. These were: head mounted displays (HMDs), flat panels, text to speech, tactile output, non speech auditory output, paper and olfactory output (scent). Of these we discussed in more detail HMDs and flat panels.
  5. Advantages and disadvantages should be discussed