Wearable Computing Seminar Topics

Wearable Computing Seminar Topics
Slide Note
Embed
Share

This comprehensive seminar covers various aspects of wearable computing, including implementation, networking, and integration with ubiquitous computing. Explore the potential of wearable technology in enhancing daily tasks and augmenting reality, along with detailed system block diagrams and input device options.

  • Wearable Computing
  • Seminar Topics
  • Implementation
  • Networking
  • Ubiquitous Computing

Uploaded on Apr 04, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Wearable Computing SeminarTopics.inf o

  2. Discussion Outline What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing

  3. What is wearable computing Wearable Portable while operational Hand-free or one- handed operation unobtrusive Augmented reality situation aware

  4. >>Wearable Computer Implementation Overall System Block Diagram : Display Device Input Device Com port VGA out Frame grabber Parallel port Network card Wireles s Networ k Video Camera Main Unit Back plane Low Power Indicator Power Supply

  5. >>Wearable Computer Implementation>>Input Device speech recognizer keyboard alternative including chording keyboards and special purpose keyboards mouse alternatives including trackballs, joysticks tab alternatives including buttons, dial eye trackers head trackers pen gesturing bar code reader video capture devices, microphones, GPS locators other exotic devices such as skin sensors

  6. >>Wearable Computer Implementation>>Input Device Wireless Finger Ring Detection of finger-tip typing Wireless Link Block Diagrams Chording METHOD

  7. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Detection of finger-tip typing

  8. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Wireless Link

  9. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Block Diagrams

  10. Wearable Computer Implementation>>Input Device Wireless finger Ring>>Chording Method

  11. >>Wearable Computer Implementation>>Output Device head mounted displays (HMDs) flat panels, text to speech tactile output non speech auditory output paper and olfactory output (scent)

  12. >>Wearable Computer Implementation>>Output Device Augmented Reality Typical Augmented Reality System Display Technologies in Augmented Reality

  13. >>Wearable Computer Implementation>>Output Device Augmented Reality>> Typical Augmented Reality System

  14. >>Wearable Computer Implementation>>Output Device Augmented Reality>> Display Technologies in Augmented Reality Video See-through Augmented Reality Display Optical See-through Augmented Reality Display

  15. >>Wearable Computer Networking General requirements Security requirements Short-ranged Simple in design Low power consumption Self-configuration Restricted to the user Security Privacy Data Confidentiality Data integrity Access Control Availability Source Authentication

  16. >>Wearable Computer Networking BlueTooth Security>>Security Architecture

  17. >>Wearable Computer Networking BlueTooth Security>>Key Management PIN PIN E2 E2 Authentication Link Key Link Key E3 E3 Encryption Encryption Key Encryption Key Encryption and Key Control

  18. >>Wearable Computer Networking BlueTooth Security>>Authentication Verifier Verifier (User A) (User B) RAND SRES = E(key, IDB, RAND) SRES = E(key, IDB, RAND) SRES Checks:SRES = SRES Challenge-response for symmetric key system

  19. Wearable Computing & Ubiquitous Computing Properties and Problems with Ubiquitous Computing Privacy issues Difficulty with personalized information: Properties and Problem with Wearable Computing Localized information: Localized control Resource management: The Combination-Hive and Locust Swarm A General Scenario

  20. Wearable Computing & Ubiquitous Computing Properties and Problems with Ubiquitous Computing Privacy issues Hi all, I am Mike, your new Boss Difficulty with personalized information: I am Tom ! Tom: Oh, it s Tom Let me check my databse Email: Tt@yahoo.com Oh, it s Tom Let me check my databse OK, I will play this song my database! Tom: My god, a new man! I have to update Me Too! It s really Age: 25 OK, let me check his email troublesome! Age: 25 Favorite Song: My heart will go on

  21. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! OK, I will play this song Tom: Age: 25 OK, let me check his email Favorite Song: My heart will go on Email: Tt@yahoo.com

  22. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing 1. Localized information: 2. Localized control Where is the A New device! printer s driver? should I I am Tom ! It should be added to my DB. install it? Device Table: Device Table: -------------------- -------------------- 1.Computer 1.Computer 2.Recorder 2.Recorder 3.Printer

  23. Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing Resource management: Hi all, I am Mike I am Tom ! Oh my, What should I do? Tom: Mike: Age: 25 Age: 30 Favorite Song: Favorite Song: My heart will go on Salvage Garden Email: Tt@yahoo.com Email: Mm@yahoo.com

  24. Wearable Computing & Ubiquitous Computing The Combination-Hive and Locust Swarm Why Hive? Agents are Autonomous Agents are proactive Agents can interact Agents can be mobile What is Locust Swarm?

  25. Wearable Computing & Ubiquitous Computing Reaping the best of both worlds

Related


More Related Content