Wearable Computing Seminar Topics
This comprehensive seminar covers various aspects of wearable computing, including implementation, networking, and integration with ubiquitous computing. Explore the potential of wearable technology in enhancing daily tasks and augmenting reality, along with detailed system block diagrams and input device options.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Wearable Computing SeminarTopics.inf o
Discussion Outline What is Wearable computing Wearable computing implementation Wearable computing Networking Wearable computing and Ubiquitous computing
What is wearable computing Wearable Portable while operational Hand-free or one- handed operation unobtrusive Augmented reality situation aware
>>Wearable Computer Implementation Overall System Block Diagram : Display Device Input Device Com port VGA out Frame grabber Parallel port Network card Wireles s Networ k Video Camera Main Unit Back plane Low Power Indicator Power Supply
>>Wearable Computer Implementation>>Input Device speech recognizer keyboard alternative including chording keyboards and special purpose keyboards mouse alternatives including trackballs, joysticks tab alternatives including buttons, dial eye trackers head trackers pen gesturing bar code reader video capture devices, microphones, GPS locators other exotic devices such as skin sensors
>>Wearable Computer Implementation>>Input Device Wireless Finger Ring Detection of finger-tip typing Wireless Link Block Diagrams Chording METHOD
Wearable Computer Implementation>>Input Device Wireless finger Ring>>Detection of finger-tip typing
Wearable Computer Implementation>>Input Device Wireless finger Ring>>Wireless Link
Wearable Computer Implementation>>Input Device Wireless finger Ring>>Block Diagrams
Wearable Computer Implementation>>Input Device Wireless finger Ring>>Chording Method
>>Wearable Computer Implementation>>Output Device head mounted displays (HMDs) flat panels, text to speech tactile output non speech auditory output paper and olfactory output (scent)
>>Wearable Computer Implementation>>Output Device Augmented Reality Typical Augmented Reality System Display Technologies in Augmented Reality
>>Wearable Computer Implementation>>Output Device Augmented Reality>> Typical Augmented Reality System
>>Wearable Computer Implementation>>Output Device Augmented Reality>> Display Technologies in Augmented Reality Video See-through Augmented Reality Display Optical See-through Augmented Reality Display
>>Wearable Computer Networking General requirements Security requirements Short-ranged Simple in design Low power consumption Self-configuration Restricted to the user Security Privacy Data Confidentiality Data integrity Access Control Availability Source Authentication
>>Wearable Computer Networking BlueTooth Security>>Security Architecture
>>Wearable Computer Networking BlueTooth Security>>Key Management PIN PIN E2 E2 Authentication Link Key Link Key E3 E3 Encryption Encryption Key Encryption Key Encryption and Key Control
>>Wearable Computer Networking BlueTooth Security>>Authentication Verifier Verifier (User A) (User B) RAND SRES = E(key, IDB, RAND) SRES = E(key, IDB, RAND) SRES Checks:SRES = SRES Challenge-response for symmetric key system
Wearable Computing & Ubiquitous Computing Properties and Problems with Ubiquitous Computing Privacy issues Difficulty with personalized information: Properties and Problem with Wearable Computing Localized information: Localized control Resource management: The Combination-Hive and Locust Swarm A General Scenario
Wearable Computing & Ubiquitous Computing Properties and Problems with Ubiquitous Computing Privacy issues Hi all, I am Mike, your new Boss Difficulty with personalized information: I am Tom ! Tom: Oh, it s Tom Let me check my databse Email: Tt@yahoo.com Oh, it s Tom Let me check my databse OK, I will play this song my database! Tom: My god, a new man! I have to update Me Too! It s really Age: 25 OK, let me check his email troublesome! Age: 25 Favorite Song: My heart will go on
Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing I am Tom ! OK, I will play this song Tom: Age: 25 OK, let me check his email Favorite Song: My heart will go on Email: Tt@yahoo.com
Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing 1. Localized information: 2. Localized control Where is the A New device! printer s driver? should I I am Tom ! It should be added to my DB. install it? Device Table: Device Table: -------------------- -------------------- 1.Computer 1.Computer 2.Recorder 2.Recorder 3.Printer
Wearable Computing & Ubiquitous Computing Properties and Problem with Wearable Computing Resource management: Hi all, I am Mike I am Tom ! Oh my, What should I do? Tom: Mike: Age: 25 Age: 30 Favorite Song: Favorite Song: My heart will go on Salvage Garden Email: Tt@yahoo.com Email: Mm@yahoo.com
Wearable Computing & Ubiquitous Computing The Combination-Hive and Locust Swarm Why Hive? Agents are Autonomous Agents are proactive Agents can interact Agents can be mobile What is Locust Swarm?
Wearable Computing & Ubiquitous Computing Reaping the best of both worlds