Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
pervasive computing full report
Post: #1


Seminar Reportâ„¢04 Pervasive Computing


Pervasive computing refers to embedding computers and communication in our environment. Pervasive computing provides an attractive vision for the future of computing. The idea behind the pervasive computing is to make the computing power disappear in the environment, but will always be there whenever needed or in other words it means availability and invisibility. These invisible computers won™t have keyboards or screens, but will watch us, listen to us and interact with us. Pervasive computing makes the computer operate in the messy and unstructured world of real people and real objects. Distributed devices in this environment must have the ability to dynamically discover and integrate other devices. The prime goal of this technology is to make human life more simple, safe and efficient by using the ambient intelligence of computers. Seminar Report™04 Pervasive Computing 2 Dept. of Electronics & Communication Engg. GEC Thrissur INTRODUCTION Pervasive computing environments involve the interaction, coordination, and cooperation of numerous, casually accessible, and often invisible computing devices. These devices will connect via wired and wireless links to one another as well as to the global networking infrastructure to provide more relevant information and integrated services. Existing approaches to building distributed applications, including client/server computing, are ill suited to meet this challenge. They are targeted at smaller and less dynamic computing environments and lack sufficient facilities to manage changes in the network configurations. Networked computing devices will proliferate in the user™s landscape, being embedded in objects ranging from home appliances to clothing. Applications will have greater awareness of context, and thus will be able to provide more intelligent services that reduce the burden on users to direct and interact with applications. Many applications will resemble agents that carry out tasks on behalf of users by exploiting the rich sets of services available within computing environments. Mobile computing and communication is one of the major parts of the pervasive computing system. Here data and computing resources are shared among the various devices. The coordination between these devices is maintained through communication, which may be wired or wireless. With the advent of Bluetooth and Ad hoc networking technologies the wireless communication has overtaken the wired counter part. The reduction in size and cost of processor chips made it possible to implement it in every field of life. Nowadays about 99% of processors made are for embedded devices compared to the PC applications. Voice and Gesture recognition along with steerable interface will make the interactions and use of these devices more user friendly. Efficient security and privacy policies along with power management can enhance the performance of such systems. Seminar Report™04 Pervasive Computing 3 Dept. of Electronics & Communication Engg. GEC Thrissur CURRENT EMBEDDED TECHNOLOGY Embedded technology is the process of introducing computing power to various appliances. These devices are intended to perform certain specific jobs and processors giving the computing power are designed in an application oriented way. Computers are hidden in numerous information appliances which we use in our dayto- day life. These devices find there application in every segment of life such as consumer electronics, avionics, biomedical engineering, manufacturing, process control, industrial, communication, defence etc¦ Embedded systems, based on there functionality and performance requirement are basically categorized as: i. Stand alone systems ii. Real time systems iii. Networked systems iv. Mobile devices Stand alone systems work in stand alone mode, taking inputs and producing desired outputs. They do not have any dependence on other systems. Embedded systems in which some specific work has to be done in a specific time period are called Real time systems. Meeting the dead line is the most important requirement of a real time system. In Hard real time systems, missing a deadline may lead to a catastrophe and in Soft real time systems such problem is not present. Systems which are provided with network interfaces and accessed by networks such as LAN or the Internet are called Networked Systems. Networking may be wired or wireless. Mobile devices are devices which move from one location to another, like mobile phones, PDA™S etc. Today, many people carry numerous portable devices, such as laptops, mobile phones, PDAs and mp3 players, for use in their professional and private lives. For the Seminar Report™04 Pervasive Computing 4 Dept. of Electronics & Communication Engg. GEC Thrissur most part, these devices are used separately i.e, their applications do not interact. However, if they could interact directly, participants at a meeting could share documents or presentations, business cards would automatically find their way into the address register on a laptop and the number register on a mobile phone, as commuters exit a train, their laptops could remain online; likewise, incoming email could now be diverted to their PDAs. In such a distributed environment where several embedded devices has to communicate and co-ordinate with each other. For this a communication link is required which may be wired or wireless. In initial stages of Networked embedded system environments wired connection was preferred as it provided a safer and faster channel for communication. But the cost, immovability and the cables running around the floorboards became less attractive. On top of this, dishing out the cash for network cards, cables and a hub/switch reserved this practice to the more elite computer users, until wireless networking hit the scene. Infrared communication was initially used for wireless communication because of the low cost offered by it. But it suffered from the limitation that it can be used only within Line Of Sight. IEEE introduced 802.11 as the international standard for wireless LANs. This used a 2.4GHz transmission band while maintaining a steady 1-2 Mbps bandwidth rate. Being that this was extremely slow compared to 100Mbit wired LANs, it took a while for the 802.11 standard to develop into a viable solution, achieved shortly after with the 802.11a, b and g standards, offering bandwidth ranging from 11Mbps to 54Mbps. Although this is still considerably short of the 100Mbit found in cabled networks, 802.1 x wireless technologies is now literally regarded as the future of networking. Bluetooth, Wi-Fi, Wi-Max are the latest solutions, under the 802.1x standard, for wireless communication over short, medium and long range communication respectively. Seminar Report™04 Pervasive Computing 5 Dept. of Electronics & Communication Engg. GEC Thrissur UBIQUITOUS \ PERVASIVE COMPUTING Pervasive computing can be explained in two different perspectives: i. User view ii. Technology view User view For an end user Pervasive approach act as a method of augmenting human abilities in context of tasks. It provides Interaction transparency which means that the human user is not aware that there is a computer embedded in the tool or device that he or she is using. Technological view It means access to information and software applications are available everywhere and any where. Technically pervasive computing involves in embedding intelligence and computing power to devices which are part of our daily life. As the word ˜Pervasive™ means, we create an environment with intelligence and which can communicate with each other. This technology is intended for mobile as well as localized devices. It must also posses the ability to locate an object or a user using provisions such as Global Positioning System (GPS). After positioning, a dynamic link must be setup for communication which may use the recent concept of ADHOC networking. User can interact with and control these devices using steerable interfaces, using voice and gesture recognition facilities. Seminar Report™04 Pervasive Computing 6 Dept. of Electronics & Communication Engg. GEC Thrissur DISTRIBUTED COMPUTING ENVIRONMENT The essence of that vision was the creation of environment saturated with computing and communication capability, yet gracefully integrated with human users. The field of distributed systems arose by the intersection of personal computer and Local Area Network. With the appearance of wireless LANs embedded systems for mobile clients was introduced. These two laid the foundation for the concept of Pervasive computing. Ambient Intelligence Objects in pervasive environment are considered to have Ambient Intelligence. Ambient Intelligence refers to a vision of the future, in which people are empowered by an electronic environment that is aware of their presence, and is sensitive and responsive to their needs. It aims at improving the quality of life by creating the desired atmosphere and functionality via intelligent, personalized interconnected systems and services. The transition to such a world requires a paradigm shift in user-system interaction. Speech and gesture recognition modalities address user benefits such as freedom of movement, and are natural candidates for such interactions. However, implementing these modalities in e.g. a home environment is radically different from implementing known methods such as buttons, dials and remote controls. Smart objects may play an important role in bridging this gap. People have a life-time experience in manipulating tangible objects, and can perform these manipulation tasks with a minimal amount of attention. Ambient Intelligence refers to electronic environment that are sensitive and responsive to the presence of people. It builds on advanced networking technologies, which allow robust, ad-hoc networks to be formed by a broad range of mobile devices and other objects. By adding adaptive user-system interaction methods, based on new Seminar Report™04 Pervasive Computing 7 Dept. of Electronics & Communication Engg. GEC Thrissur insights in the way people like to interact with computing devices, digital environments can be created which improve the quality of life of people by acting on their behalf. Key characteristics of such environments are: ubiquity, awareness, intelligence, and natural interaction. Ubiquity refers to a situation in which we are surrounded by a multitude of interconnected embedded systems, which are invisible and moved into the background of our environment. Awareness refers to the ability of the system to locate and recognize objects and people. Intelligence refers to the fact that the digital surrounding is able to analyze the context, to adapt itself to the people that live in it, to learn from their behavior, and eventually to recognize as well as show emotion. Natural Interaction finally refers to advanced modalities like speech-, gesture- and object recognition, which will allow a more natural communication with the digital environment than is possible today. Evolutionary development of Pervasive computing environment and Relation between Pervasive computing with Distributed systems and mobile computing Seminar Report™04 Pervasive Computing 8 Dept. of Electronics & Communication Engg. GEC Thrissur We envisage that in the near future, mobile and embedded devices will be capable of providing customized information, services and computation platforms. People will need the cooperation of services available in their resource rich vicinity to satisfy their information needs. Service composition systems for the pervasive computing environment need a different design approach than those developed for wired services. Service composition architectures in wired infrastructure assume the existence of a centralized composition entity that carries out the discovery, integration and execution of services distributed over the web or network. This Client/Server based computing, are ill suited to meet this challenge. They are targeted at smaller and less dynamic computing environments and lack sufficient facilities to manage changes in the network configurations. Mobile Ad hoc Networking So we introduce a system architecture which provides an integrated and comprehensive framework for building pervasive applications. It includes a set of services that help to structure applications and simplify the task of coping with constant change. So a pervasive computing environment is expected to be based on the recent progresses and advances in computing and communication technologies. Next generation of mobile communications is likely to be based on an infrastructure less Mobile Ad hoc Networks (MANETs). A MANET is a collection of wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. Ad-hoc mode essentially eliminates the need for an access point. An Ad-Hoc network only requires wireless adapters to communicate hence significantly reducing the cost and maintenance compared to a network structured around an access point. Most or all nodes in the network participate in the network tasks. While traditional networks are static, i.e., nodes do not move and new nodes are not attached to or detached from the network on a frequent basis, the ad-hoc network is extremely dynamic. The nodes are autonomous and may have varying mobility, and they may Seminar Report™04 Pervasive Computing 9 Dept. of Electronics & Communication Engg. GEC Thrissur enter and leave the network for some reason or another, for example, a mobile node may move out of reach of other nodes, thus being unable to send or receive information, or a node may suffer from power failure or destruction and often act as routers at the same time. Another important difference between traditional and ad hoc networks is that traditional networks tend to be wired, where as an ad hoc network most likely is wireless, which increases their complexity even further. Access point based network Ad hoc wireless network MANET has the following features: 1) Autonomous terminal: In MANET, each mobile terminal is an autonomous node, which may function as both a host and a router. In other words, besides the basic processing ability as a host, the mobile nodes can also perform switching functions as a router. So usually endpoints and switches are indistinguishable in MANET. Seminar Report™04 Pervasive Computing 1 0 Dept. of Electronics & Communication Engg. GEC Thrissur 2) Distributed operation: Since there is no background network for the central control of the network operations, the control and management of the network is distributed among the terminals. The nodes involved in a MANET should collaborate amongst themselves and each node acts as a relay as needed, to implement functions e.g. security and routing. 3) Multihop routing: Basic types of ad hoc routing algorithms can be single-hop and multihop, based on different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop in terms of structure and implementation, with the cost of lesser functionality and applicability. When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate nodes. 4) Dynamic network topology. Since the nodes are mobile, the network topology may change rapidly and unpredictably and the connectivity among the terminals may vary with time. MANET should adapt to the traffic and propagation conditions as well as the mobility patterns of the mobile network nodes. The mobile nodes in the network dynamically establish routing among themselves as they move about, forming their own network on the fly. Moreover, a user in the MANET may not only operate within the ad hoc network, but may require access to a public fixed network (e.g. Internet). 5) Fluctuating link capacity. The nature of high bit-error rates of wireless connection might be more profound in a MANET. One end-to-end path can be shared by several sessions. The channel over which the terminals communicate is subject to noise, fading, and interference, and has less bandwidth than a wired network. In some scenarios, the path between any pair of users can traverse multiple wireless links and the link themselves can be heterogeneous. 6) Light-weight terminals. In most cases, the MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage. Such devices need optimized algorithms and mechanisms that implement the computing and communicating functions. Seminar Report™04 Pervasive Computing 1 1 Dept. of Electronics & Communication Engg. GEC Thrissur ARCHITECTURE Pervasive computing is characterized by a high degree of heterogeneity: devices and distributed components are from different vendors and sources. Support of mobility and distribution in such a context requires open distributed computing architectures and open protocols. Openness means that specifications of architectures and protocols are public documents developed by neutral organizations. System architecture is designed for performing the services such as: ¢ Automatic discovery or devices added or removed from the network ¢ Addressing scheme and message-transfer service ¢ Lookup service for discovering resources ¢ Posting and receiving local or remote events ¢ Streaming and controlling data streams ¢ Reserving devices and performing scheduled actions ¢ User interaction Various architectures with particular domain oriented features are present. Here a reactive service composition architecture is being discussed, as it is some what general and simple. Service Composition can be defined as the process of creating customized services from existing services by a process of dynamic discovery, integration and execution of those services in a planned order to satisfy a request from client. We have designed a distributed architecture to perform service composition in pervasive computing environment. Central to our system is the concept of a distributed broker that can execute at any node in the environment. An individual broker handles each composite service request, thus making the design of the system immune to central point of failure. A broker may be selected based on various parameters such as resource capability, geometric topology of the nodes and proximity of the node to the services that are required to compose a particular request. Current prototype of our system can be implemented over Bluetooth. We shall refer to a client as a device from where the service composition request originates. A broker is a device that coordinates the different components to calculate the result. Seminar Report™04 Pervasive Computing 1 2 Dept. of Electronics & Communication Engg. GEC Thrissur Layered architecture Network Layer: The Network Layer forms the lowest layer in the architecture and encapsulates networking protocols that provide wireless/ad-hoc connectivity to peer devices in the vicinity. We assume the existence of a suitable network layer that provides us with connectivity to the neighboring devices. Service Discovery Layer: The service discovery layer is required for the proper functioning of the composition platform. There is a direct dependence of the success of the composition techniques on the underlying service discovery mechanisms. This layer encompasses the protocol used to discover the different services that are available in the vicinity of a mobile device. Our design of the service discovery mechanism is primarily based on the principles of Peer-to-peer service discovery, Dynamic caching of neighboring service descriptions, Semantic description based service matching, service request routing and propagation control. We do not employ central lookup- server based service discovery and maintenance. Each device has a Service Manager where the local services register their information. Service Managers advertise their services to neighboring nodes and these advertisements are cached. Services are described using a semantically rich language which is used in service matching also. On cache miss, the service request is forwarded to other neighboring nodes. Service Composition Layer: This layer is responsible for carrying out the process of managing the discovery and integration of services to yield a composite service. The process model of the composite service is supplied as input to this layer. Seminar Report™04 Pervasive Computing 1 3 Dept. of Electronics & Communication Engg. GEC Thrissur Service Execution Layer: The Service Execution Layer is responsible for carrying out the execution of the different services. Prior to this, the service composition layer provides a feasible order in which the services can be composed and also provides location and invocation information of the service. This layer has a module called the Fault Recovery Module, which is responsible to guard against node failures and service unavailability. The Service Execution Layer and the Service Composition Layer are tightly coupled with each other due to their dependence on each other. Application Layer: The application layer embodies any software layer that utilizes our service composition platform. The application layer encompasses different GUI facilities to display the result of a composed service and provides the functionality to initiate a request for a composite service Dynamic Broker Selection Technique This approach centers on a procedure of dynamically selecting a device to be a broker for a single request in the environment. In the following section, we describe three distinct features of the Dynamic Broker Selection Technique. Broker Arbitration and Delegation: When a request for service composition arrives at the service composition module in a mobile device it finalizes a platform that is going to carry out the composition and monitor the execution. Once the platform has been chosen, the device is informed of its responsibility. The mobile device acting as the broker is responsible for the whole composition process for a certain request. The selection of the broker platform may be dependent on several parameters: power of the platform (battery power left), number of services in the immediate vicinity, stability of the platform, etc. The brokerage arbitration might make the originator of the request to be Seminar Report™04 Pervasive Computing 1 4 Dept. of Electronics & Communication Engg. GEC Thrissur the broker for that particular composition. Each request thus may be assigned a separate broker. This makes the architecture immune to central point of failure and the judicious choice of brokerage platform has the potential of distributing the load appropriately within the different devices. This avoids the problem of swamping the central composition entity by numerous requests. Service Integration and Execution: The assigned broker™s first job is to discover the services from its vicinity. The broker progressively increases its search radius, a number of devices that it can reach by asking other devices in its radio range to forward service request, to discover all of the different services necessary for the composition. The broker returns failure when it fails to discover all of the required services. Service discovery and integration is followed by service execution. The information obtained during the service discovery (service address, port, invocation protocol) is utilized to execute the services. Fault Recovery: Faults in ad-hoc environment may occur due to a service failure, due to a sudden unavailability of the selected broker platform, or due to network partition. The standard solution to this problem is to make the requester to initiate a new request for every composite service. This is very inefficient and not applicable in our environment due the relatively high occurrence probability of the above failures. The fault-tolerance module in the architecture employs check pointing to guard against such faults. The broker for a particular request sends back checkpoints and the state of the request to the client of the request after a subtask is complete. The client keeps a cache of this partial result obtained so far. If the broker platform fails, the source node detects the unavailability of updates. Seminar Report™04 Pervasive Computing 1 5 Dept. of Electronics & Communication Engg. GEC Thrissur Distributed Brokering Technique The key idea in this approach is to distribute the brokering of an articular request to different entities in the system by determining their ˜suitability™ to execute a part of the composite request. Broker Arbitration: This module performs almost the same set of actions described in the previous section. However, the key difference is that it only tries to determine the broker for the first few services (say S1 to Si) in the whole composition. This layer tries to utilize the resources available in the immediate vicinity instead of looking for the resources required to execute the whole composition. Thus, a single broker only executes a part of the whole composite process (based on the resources that it currently has available to it). Service Integration and Execution: The broker is responsible for composing the services S1 to Sn. The broker decides on a service search radius. The composition is carried out among services discovered within this radius. Suppose a broker determines that it has services S1 to Si available in its vicinity (within radius r). It goes ahead and carries out the partial integration and execution. It then informs the requester (source node) about the ˜current state™ of the execution. Secondly, it uses the ˜Broker Arbitration™ Module to select another broker which has the ability to carry out a subset or whole of the remaining composition. In this manner, the composition hops from one node to another till the final result is obtained. Then the current broker returns the final answer of the composition to the client. Seminar Report™04 Pervasive Computing 1 6 Dept. of Electronics & Communication Engg. GEC Thrissur IMPLEMENTATION There are many middleware technologies that provide a set of application programming interfaces (APIs) as well as network protocols that can meet the network requirements. It establishes a software platform enabling all devices that form the network to talk to each other, irrespective of their operating systems or interface constraints. In these environments, each device provides a service to other devices in the network. Each device publishes its own interfaces, which other devices can use to communicate with it and thereby access its particular service. This approach ensures compatibility and standardized access among all devices. There are many implementation technologies and protocols developed by various companies like: Sun™s Jini, Microsoft™s UPnP, IBM™s Tspace. The possibilities of Bluetooth is utilized by technologies like Jini for pervasive environment. Bluetooth environment can be used to implement standard TCP/IP protocol. DEVICE REQUIREMENTS Two device-related challenges must be addressed by the pervasive computing infrastructure; these are the wide differences between heterogeneous device types and the problems caused by device mobility. Device heterogeneity: Heterogeneity in computing systems will not disappear in the future, but instead will increase as the range of computing devices widens. Devices in a pervasive computing environment will include sensors and actuators that mediate between physical and virtual environments; embedded devices in objects such as watches and shoes; home and office appliances such as videos, toasters and telephones; mobile devices, such as handheld organizers and notebooks; and traditional desktop machines. Heterogeneous devices will be required to interact seamlessly, despite wide differences in hardware and software Seminar Report™04 Pervasive Computing 1 7 Dept. of Electronics & Communication Engg. GEC Thrissur capabilities. This will require an infrastructure that maintains knowledge of device characteristics and manages the integration of devices into a coherent system that enables arbitrary device interactions (for example, between a mobile phone and a desktop workstation). Device mobility: Mobility introduces problems such as the maintenance of connections as devices move between areas of differing network connectivity, and the handling of network disconnections. While protocols for wireless networking handle some of the problems of mobility, such as routing and handovers, some problems cannot be solved at the network level, as they require knowledge of application semantics. It should be the role of the computing infrastructure to cooperate with applications in order to perform tasks related to device mobility, such as management of replicated data in cases of disconnection. COMMUNICATION BLUETOOTH: Blue tooth is an economical communication technology that allows communicating with one another wirelessly within a 30 feet or 10 meter radius. Blue tooth is specially designed for short range communication. An important outcome of this design is the low power consumption which in turn makes these devices portable. Bluetooth wireless technology makes use of radio frequency technology to communicate through the air. RF incorporates high power transmitters and receivers tuned to a particular frequency range for long ranges as in TV. Short range requires less power and thereby batteries can suffice the power requirements. RF can penetrate the obstacles and there is no requirement of line sight communication. Bluetooth technology operates in 2.4 GHz spectrum. It has a data transmission rate of 700 Kbps. Bluetooth link between two devices consists of of a master and a slave. A piconet consists of a single master and all slaves in close proximity. Only one master is allowed in a single piconet. The ability to form piconets is a significant advantage for Seminar Report™04 Pervasive Computing 1 8 Dept. of Electronics & Communication Engg. GEC Thrissur pervasive computing environment design. We can use TCP/IP protocol on top of Bluetooth technology. Bluetooth has protocols for inquiry and connection between devices. First Bluetooth piconets are formed and then using TCP/IP protocol is used for establishing communication between the devices in an environment. Various other wireless standards which can be used in mobile, distributed systems are, ¢ Wireless LAN IEEE 802.11b (Wi-Fi), having a range of about 200 m. It uses a radio frequency of 2.4 GHz band with data transmission rate of 11 Mbps. ¢ GSM phone with transmission rate of 9.6 Kbps. ¢ UMTS “ 3G mobile 114 kbps (vehicle), 384 Kbps (pedestrian) 2 Mbps (stationary) ¢ HIPERLAN & IEEE 802.11a using RF of 5 GHz band with data rate currently 20 Mbps eventually 54 Mbps ¢ Home RF derived from DECT 10Mbps ¢ Infrared transmission gives a rate of 4Mbps, but can be used only for line of sight communication (so not preferred). CONTEXT AWARENESS Context awareness translates to adaptation of the behavior of an application as a function of its current environment. This environment can be characterized as a physical location, an orientation or a user profile. A context-aware application can sense the environment and interpret the events that occur within it. In a mobile and wireless computing environment, changes of location and orientation are frequent. Invisibility of applications will be accomplished in part by reducing input from users and replacing it with knowledge of context. Seminar Report™04 Pervasive Computing 1 9 Dept. of Electronics & Communication Engg. GEC Thrissur Context aware software components will exploit information such as the activities in which the user is engaged, proximity to other devices and services, location, time of day and weather conditions. Knowledge of context will also be required to enable adaptation to changing environmental conditions, such as changing bandwidth and input and output devices, which can be brought about by mobility. The infrastructure for pervasive computing should support context awareness by facilitating the gathering of information from sources such as sensors and resource monitors; performing interpretation of data, carrying out dissemination of contextual information to interested parties in a scalable and timely fashion. Location identification of user is needed for a better understanding of context. For this Global Positioning Systems (GPS) are employed. A very challenging aspect is interpretation, which involves steps such as integration of data from different sources, inference, prediction based on context history, resolution of inconsistencies between context data from different sources, and provision of estimates of the accuracy of contextual information. Capture and storage of past experiences can be used to solve new problems in the future. Experiences are made of events and computers have the ability to record them automatically. Human users only have to recall that information from the computer when it is needed. ADAPTATION Adaptation is required in order to overcome the intrinsically dynamic nature of pervasive computing. Mobility of users, devices and software components can occur, leading to changes in the physical and virtual environments of these entities. Moreover, applications can be highly dynamic, with users requiring support for novel tasks and demanding the ability to change requirements on the fly. It should be the role of the infrastructure for pervasive computing to facilitate adaptation, which may involve adapting individual software components and/or reconfiguring bindings of components by adding, removing or substituting components. Adaptation may be done in an application-aware or application-transparent manner. Dynamic adaptation Seminar Report™04 Pervasive Computing 2 0 Dept. of Electronics & Communication Engg. GEC Thrissur can involve complex issues such as managing the adaptation of software components that are used simultaneously by applications with different requirements, and maintaining a consistent external view of a component that has behavior that evolves over time. STEERABLE INTERFACES They are a new class of interactive interfaces that can be moved around to appear on ordinary objects and surfaces anywhere in a space. By dynamically adapting the form, function, and location of an interface to suit the context of the user, such steerable interfaces have the potential to offer radically new and powerful styles of interaction in intelligent pervasive computing spaces. We propose defining characteristics of steerable interfaces and present the first steerable interface system that combines projection, gesture recognition, user tracking, environment modeling and geometric reasoning components within a system architecture. An essential element to realize this notion of computing woven into space is a ubiquitous interface to computing access to pervasive computing resources should be available everywhere. For instance, access to computing services has been through computer monitors, touch screen panels, keyboards, mice, PDAs, cellular phones etc, all special surfaces and devices available in the environment or carried by people. In this paper, we pursue an alternate vision for the pervasive computing interface, especially in the context of intelligent environments. We propose that as computing disappears into the physical environment, what matters most to the user is the interface to computing. The interface should appear whenever the user needs it, wherever the user needs it, and in a form most suitable for natural interaction. In particular, both input and output interfaces should be available to the user anywhere in space, without the need for special devices. To realize this, we introduce the concept of a steerable interface to computing that can be moved around a physical environment on to ordinary objects or surfaces. Seminar Report™04 Pervasive Computing 2 1 Dept. of Electronics & Communication Engg. GEC Thrissur Steerable interfaces are important as they provide interaction wherever it is needed in a space. In many cases, the interface just appears when needed and where needed, as a natural extension to the physical environment, without the user having to perform any deliberate actions. And as the user neither carries nor approaches any special devices, the interaction is casual. The user can also request for the interface anywhere through natural actions such as simply asking or making a specific gesture. Steerable interfaces have the potential to change how we access information in a number of different domains and applications. For example, during shopping, information about a product can be made available right at the product location when a shopper is in the vicinity of the product. At home, a television or a computer can appear on demand on any wall or table or countertop. Steerable interfaces can also result in new forms of entertainment such as games in the real world with virtual characters and hybrid theater combining the real and the virtual. SECURITY POLICY A security policy is a set of rules for authorization, access control, and trust in a certain domain, it can also contain information about some users™ roles and the abilities associated with those roles. Theft of service is the actual number one security problem in cellular networks. A similar problem exists with computer network services. Solutions devised for cellular telephony can be applied. Control of access to services relies on a form of identification. Either a user or a device may be identified. The most desirable form, in the context of service access control, is user identification because it is independent of the device utilized by the user to access the network. Identification of a user may be done with an identification number entered by the user before a service is accessed. Further automation can be achieved by using instead a fingerprint captured by a biometrics sensor integrated to the device. However Device identification may be considered equivalent to user identification in Seminar Report™04 Pervasive Computing 2 2 Dept. of Electronics & Communication Engg. GEC Thrissur cases where the device is a personal belonging of the user. Indeed, in contrast to a desktop which can be shared by several members of a family, a PDA is a personal assistant. Identification of the palmtop means as well identification of its user. Each Bluetooth device has a 48-bit identifier that can be used for that purpose. Secret key authentication can also be used to identify users or devices. Authentication is supported by most of the service discovery protocols. RF fingerprinting can be used as well to identify a device (more exactly its air interface). These strategies are inadequate for the increased flexibility that distributed networks such as pervasive computing environments require because such systems lack central control and their users are not all predetermined. Mobile users expect to access locally hosted resources and services anytime and anywhere, leading to serious security risks and access control problems. We propose a solution based on trust management that involves developing a security policy, assigning credentials to entities, verifying that the credentials fulfill the policy, delegating trust to third parties, and reasoning about users™ access rights. Distributed trust management approach involves, ¢ articulating policies for user authentication, access control, and delegation. ¢ assigning security credentials to individuals. ¢ allowing entities to modify access rights of other entities by delegating or deferring their access rights to third parties and revoking rights as well. ¢ providing access control by checking if the initiators™ credentials fulfill the policies. Access rights are not static but change based on delegations and revocations. Users are assigned generic rights, based on their credentials, the security policy, and other users™ delegations”that can be used to request access to other services. Appropriate users with these access rights can in turn delegate the requested right. Users can access a service only if they have the right to do so or if an authorized user has delegated that right to them; they can delegate all rights that they have the permission to delegate. Rights can likewise be revoked. Seminar Report™04 Pervasive Computing 2 3 Dept. of Electronics & Communication Engg. GEC Thrissur Each domain has security agents that enforce the policy. The domain™s services and users can additionally impose a local policy. Services register with a security agent in their space and rely on it to provide security. Only users with the right to delegate a certain action can actually delegate that action, and the ability to delegate itself can be delegated. Users can constrain delegations by specifying whether delegated users can re-delegate the right and to whom they can delegate. Once users are given certain rights, they are responsible for the actions of the users to whom they subsequently delegate those rights and privileges. This forms a delegation chain in which users only delegate to other users that they trust. If any user along this delegation chain fails to meet the requirements associated with a delegated right, the chain is broken. When users make requests to the security agent controlling the service, they attach their credentials”an ID certificate or a delegation certificate”to the request. The security agent is responsible for honoring the delegation, based on the delegator™s and delegate™s credentials and the policies. Security agents may generate authorization certificates that users can employ as tickets to access a certain resource. The system allows a foreign user, to access certain services without creating a new identity for him or insecurely opening up the system in any way. Seminar Report™04 Pervasive Computing 2 4 Dept. of Electronics & Communication Engg. GEC Thrissur HAVi- An Implementation in Consumer Appliance Environment HAVi is a standard for home appliances consisting of a set of APIs, services, and a standard for communication. HAVi™s primary goal is providing a dynamic service environment in which software components can discover and interact with other. It provides mechanisms for devices to discover, query and control other appliances on the home network, and provides system services such as message and event. Eight major consumer electronics manufacturers have come up with an open standard enabling home entertainment devices to communicate intelligently with each other. The HAVi(Home Audio Video Interoperability) standard promises to bring true platform independent interoperability to consumer devices using high bandwidth IEEE 1394 (FireWire) as the connecting medium. Major consumer electronics, software, semiconductor and computer manufacturers, namely Grundig, Hitachi, Panasonic, Philips, Sharp, Sony, Thomson and Toshiba along with now over 30 other participants, have formed a non-profit organization called HAVi (Home Audio Video Interoperability) for promoting the development of interoperable consumer products. The goal of HAVi organization is to provide a standard open architecture for intelligent audio and video devices to interoperate with each other regardless of manufacturer, operating system, CPU or programming language used for implementation. The simplest example can be time synchronization between different devices. TV set might get the correct time from the broadcast stream and the other devices can query the TV and set their own clocks according to it. Setting the VCR to record a program is a familiar situation users usually have problems with. With HAVi enabled devices this task can be made very easy. User can select the program he wishes to record with the Electronic Program Guide (EPG) residing on a digital TV set (or settop- box). The TV then locates an available recorder (e.g., a VCR or a recording DVD device) and commands it to record the program supplying it with the time, length and channel parameters taken from the EPG. Thus, the user doesn™t need to program or touch the recording device in any way Seminar Report™04 Pervasive Computing 2 5 Dept. of Electronics & Communication Engg. GEC Thrissur CONCLUSION The trends in pervasive computing are increasing the diversity and heterogeneity of networks and their constituent devices Pervasive computing is expected to bring an explosion in the number of devices in our local environments. This paper presents a vision of a future computing landscape characterized by the ubiquity of computing devices, the autonomy, dynamicity and the heterogeneity of system components. This paper also provides a discussion of the challenges associated with such a vision, framed around our conceptual model of pervasive computing which encompasses devices, users, architecture, networking and communication, user interfaces and security policy. With more progress in the fields like MANET, Artificial Intelligence, Natural language processing capabilities and energy management, the infrastructure limitation present currently is supposed to be broken, which will result in revolutionary changes through the implementation of Pervasive computing technology. Seminar Report™04 Pervasive Computing 2 6 Dept. of Electronics & Communication Engg. GEC Thrissur REFERENCE Embedded/Real Time Systems: Concepts, Design and Programming “ The Ultimate Reference by Dr. K.V.K.K Prasad Electronics Maker May 2004 Vol.5
Post: #2
One is happy when oneâ„¢s desires are fulfilled.
The highest ideal of Ubicomp is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Pervasive computing is referred as Ubiquitous computing through out the paper.
One of the goals of ubiquitous computing is to enable devices to sense changes in their environment and to automatically adapt and act based on these changes based on user needs and preferences. The technology required for ubiquitous computing comes in three parts: cheap, low- power computers that include equally convenient displays, a network that ties them all together, and software systems implementing ubiquitous applications. Current trends suggest that the first requirement will easily be met.
Post: #3
Pervasive computing is the third wave of computing technologies to emerge since computers first appeared:
• First Wave - Mainframe computing era: one computer shared by many people, via workstations
• Second Wave - Personal computing era: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.
• Third Wave – Pervasive (initially called ubiquitous) computing era: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
 Peer-to-Peer (P2P) networking
 Nano technology
 Chips and the Net
 Wireless technology
 The tapestry of distributed computing
 Voice computing
Peer-to-Peer (P2P) networking
• Napster popularized the application of P2P (peer-to-peer networking) products and now the same technology has begun to sing a business melody.
• The basic idea behind it being the sharing of files and programs and communicating directly with people over the Internet, without having to rely on a centralized server.
• To create private workspaces for sharing files, exchanging information, creating databases and communication instantly. Companies can now participate in B2B marketplaces, cut out intermediaries and instead collaborate directly with suppliers. Peers on desktop PCs can share files directly over a network.
• Renting computing power can solve resource problems in smaller companies, thus improving the power of web applications.
Nano technology
 In the science fiction flicks where miniature machines get into the human body and track cell patterns and behavior like those of cancer cells and exterminate them.
 Molecule sized computers can be manufactured to create new materials that can replace steel in all its properties and even withstand temperatures of 6,500 degree Fahrenheit.
 It is predicte that these materials will soon be used to build automobiles and office buildings.
Chips and the Net
 Net-ready chips are a low cost method of getting on to the Internet. They follow all the necessary Internet Protocols and can be embedded in home appliances that can then be easily connected to the Internet.
 They function as tags that possess comprehensive information about the object that it is tagged on to and include details like the date and place it was manufactured.
Wireless technology
 Wireless Internet connection helps access the Net through cellular phones, Personal Digital Assistants (PDAs) and Wireless laptops and this technology proposes enormous business opportunities. The sales force can avail real-time access to inventory records; price lists, order and customer account status and can book a sale almost instantaneously.
 Constant communication with wireless gadgets (that cost many degrees lesser than a laptop) can ensure that there is a constant feedback loop thus ensuring a new way of reaching customers.
The tapestry of distributed computing
 Distributed computing is the processing power of thousands of PCs aggregated to create a super computer. A centralized server subsidizes a large computing task in to smaller bits. It then assigns
those bits to thousands of desktop computers, each of which does a small task and returns the results to the server.
 Specialists in content delivery, pharmaceuticals, biotechnology and financial services will see the use of distributed computing capabilities soon.
 A classic example of how it is being used today is in the [email protected] project. This project is about searching for extraterrestrial using radar arrays that look for intelligent patterns of radio waves among the background radiation.
Voice computing: Tell your computer to switch on
• Voice recognition software will soon allow users to switch on their computers by just talking to them. Even documents can be edited through voice commands. We'll finally be reaching out to the frontier where man will be able to talk to all his machines and command them to do as he wishes.
• In effect, we are talking about an e-web or the embedded web where the Internet's role as content provider and shopping assistant morphs into that of companion and advisor.
• The embedded web with its swarm of sensors and appliances (an insect colony with worker bees) places machines at our beck and call and will take us to the ultimate end in convenience or render all our lives tobecome a real-life version of The Truman Show.
Post: #4
presented by:
T.Bhagya lakshmi
K.J.L Sowjanya

Pervasive computing is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. As opposed to the desktop paradigm, in which a single user consciously engages a single device for a specialized purpose, someone "using" pervasive computing engages many computational devices and systems simultaneously, in the course of ordinary activities, and may not necessarily even be aware that they are doing so, (or in other words it means availability and invisibility).
Pervasive computing environments involve the interaction, coordination, and cooperation of numerous, casually accessible, and often invisible computing devices. These devices will connect via wired and wireless links to one another as well as to the global networking infrastructure to provide more relevant information and integrated services. At their core, all models of pervasive computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life and generally turned to distinctly quotidian ends.
For example, a domestic pervasive computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly. Another common scenario posits refrigerators "aware" of their suitably-tagged contents, able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food.
Keywords: mobile computing, middleware, distributed mobile applications, adaptive behavior, taxonomy for mobile applications, platform for pervasive computing.
What is Pervasive Computing?

Imagine a world filled with all sorts of gabby electronic devices - traditional desktop computers, wireless laptops, small PDA ipaqs, smart cell phones, tiny wristwatch pagers, clever little coffee pots. Imagine all these devices talking easily to one another to bring you the news you need when you need it, regardless of where you are. You have just imagined the future of Pervasive Computing (PvC).
Pervasive computing environments involve the interaction, coordination, and cooperation of
numerous, casually accessible, and often invisible computing devices. These devices will connect via wired and wireless links to one another as well as to the global networking infrastructure to
provide more relevant information and integrated services. Existing approaches to building distributed applications, including client/server computing, are ill suited to meet this challenge. They are targeted at smaller and less dynamic computing environments and lack sufficient facilities to manage changes in the network configurations. Networked computing devices will proliferate in the
user’s landscape, being embedded in objects ranging from home appliances to clothing.
Applications will have greater awareness of context, and thus will be able to provide more intelligent services that reduce the burden on users to direct and interact with applications. Many applications will resemble agents that carry out tasks on behalf of users by exploiting the rich sets of services available within computing environments.
Mobile computing and communication is one of the major parts of the pervasive computing system. Here
Post: #5
The technological developments of the last decade, particularly in the field of mobile mi-
croprocessor design, have enabled the integration of information processing capabilities in
small everyday devices and appliances. This trend is leading the computing world to a
paradigm shift; the computer is no longer a personal dedicated device used for specific
operations, but it is woven into the surrounding environment providing its services in a
transparent manner. The pervasive computing paradigm approaches computing from a
human-centric, non-intrusive viewpoint. However, its extremely dynamic and open nature
raises security and privacy concerns that need to be addressed in a coherent manner along
with the development of the required infrastructure. Although the traditional security
requirements remain the same, this new approach to computing has introduced additional
The main problem in addressing the security requirements of pervasive environments is
the large number of ad hoc interactions among previously unknown entities, hindering the
reliance on predefined trust relationships. As users roam among administrative domains
the devices they carry must be able to interact in a disconnected and decentralized man-
ner. Secure connections must be established spontaneously, without the need to access
online central entities. The problem is aggravated since data transmissions use wireless
media, such as Bluetooth and IEEE 802.11, whose integrity and confidentiality can easily
be undermined by malicious entities. The proposed security solutions must also take into
account the ubiquitous computing vision that demands interaction interfaces that inte-
grate naturally with the goals users are trying to achieve in order to be as unobtrusive
as possible. Perceived contextual information from the environment should be utilized
in order to facilitate simplified management and to minimize human intervention for the required administrative tasks. Existing security management approaches fail to capture
the complete set of these requirements.
In this dissertation we propose ÆTHER, a novel authorization management framework
designed specifically to address trust establishment and access control in pervasive com-
puting environments. ÆTHER directly extends the traditional RBAC model to support
decentralized administration, disconnected operation and context-awareness. Furthermore,
we use the well-defined concept of location-limited channels to specify an unobtrusive us-
age model for the required administrative tasks. Based on this general framework we have
instantiated two different systems. The first one, ÆTHER0, has been designed to address
the authorization requirements of small pervasive environments which consist of particu-
larly constrained devices. The second, ÆTHER1, addresses the authorization requirements
of large pervasive computing domains that have multiple owners with complicated security
relationships. Our implementation and evaluation of the two instantiations demonstrates
the feasibility of deploying and using them in real-world pervasive computing environments.
The pervasive computing paradigm predicts that in the near future we are going to be
surrounded by countless wireless devices capable of providing services transparently. Com-
puting devices are being embedded into everyday appliances and become part of our envi-
ronment. Interactions with such devices must be integrated with the purpose a user aims
to achieve in a natural, graceful way in order to feel ubiquitous. However, the open na-
ture of such environments raises security concerns that need to be addressed in a coherent
manner along with the development of the required underlying infrastructure. Although
the traditional security requirements remain the same, this new approach to computing
has introduced additional challenges.
The main problem in addressing the security requirements of pervasive computing en-
vironments is the large number of ad hoc interactions among previously unknown entities1,
hindering the reliance on predefined associations. Authentication mechanisms can be em-
ployed to establish the identity of a pervasive computing entity but they suffer from scala-
bility problems and have limited value in defining authorization decisions among strangers.
Another equally important problem is that the employed security solution should follow
the ubiquitous computing vision and be naturally integrated with the actions the users
perform in order to complete their objectives. A user that carries a multitude of devices
must be able to establish spontaneous secure communication channels with the devices
embedded into the environment or carried by other users without extensive manual recon-
Post: #6
Presented by:

The basic of Pervasive Computing
Pervasive Computing:: A Definition

Pervasive Computing is a computing technology that pervades the users’ environment by making use of seamless connectivity of multiple independent information devices embedded in the environment of the users.
Our IDEAS::::
Pervasive Computing in short can be termed as “Anything”, “Anytime", "Anywhere”….
Anything can be stated as use of technology by an individual from the help of Science.
: It does so by :
Making use of multiple independent information devices (fixed or mobile, homogeneous or heterogeneous)
Interconnecting these devices seamlessly through wireless or wired
computer communication networks
Providing a class of computing / sensory / communication services to a class of users.
It is known by many names including Ubiquitous Computing and Invisible computing.
Some Possible Applications
Pervasive Computing involving Hybrid (Regular and Sensor Network-based) Internet works for:
Natural disaster-specific warning purposes like:
Tsunami Warning,
Forest Fire Warning,
Volcanic Eruption Warning,
Flood-warning etc
Large-scale monitoring and tracking purposes like:
Wildlife monitoring,
Baggage / cargo monitoring,
Intelligent Transportation Systems
Inter-planetary Networks
Intelligent Transportation Systems
Wearable and Vehicular Computing
Pre-design Need Analysis
Step-1: Identifying connectivity needs of different types of normal people for different types of jobs / life-styles
Step-2: Identifying connectivity needs of different types of disabled people for the same / similar jobs / life-styles
Step-3: Identifying individual-specific constraints
Step-4: Identifying social constraints
Step-5: Identifying priorities
Step-6: Identifying timeline
Step-7: Identifying budgetary constraints
Step-8: Identifying interfacing / interoperability requirements
Pervasive Computing Design Principles
• Four Principles of Pervasive Computing are:
–Specialized services
– Connectivity (regular or intermittent)
– Simplicity
Components of Mobile Infrastructure for
Pervasive Computing
Mobile computing devices

Fixed computing devices
Fixed-to-Mobile and Mobile-to-Fixed communication system interfaces
Trust system (security and privacy)
Hardware Device Technologies
Low-power technologies (Battery technology etc.)
Display technologies
Memory technologies
I/O technologies
Processor technologies
Interfacing technologies
Low-power technologies
NiCd batteries offer 12-27 hours of standby time, 85-160minutes of interaction-time and are size-wise the largest in class.
NiMH batteries offer 16-37 hours of standby time, 110-210minutes of interaction-time and are size-wise the moderate in class.
Li-ion batteries offer 21-50 hours of standby time, 170-225minutes of interaction-time and are size-wise the smallest in class.
Trends in Connectivity and Devices
Networking technologies for home networking
– Phone line networking technology
– Wireless radio frequency-based
– Power line networking technology
The continuing emergence of smart consumer devices.
– Networked automobiles / airliners / trains / sea liners
– Smart Homes
Storage / Memory technologies
Micro drives (340 MB – 1 GB)
Non-volatile Flash Memory
Battery-backed RAM
Combination of Flash and low-power SRAM
Ut-RAM (Uni-transistor RAM) involving SRAM as well as DRAM on a single chip)
M-RAM (Magneto-resistive RAM)
F-RAM (Ferroelectric RAM)
Processor technologies
Intel’s Speed Step processor technology
Transmeta’s Crusoe processor technology
Motorola’s Dragon Ball processor technology
Intel’s X-Scale processor technology
Inmos’ Transputer technology
PowerPC processor technology
Mobile Pentium processor technology
MIPS processor technology
Alpha processor technology
Interfacing technologies
Navigation technologies
On-screen / Touch-panel technologies
Voice interfacing technologies
Video-interfacing technologies
Handwriting-based interfacing technologies
Post: #7
Pervasive Computing
Ubiquitous computing resources
Computing is embedded everywhere in the environment
Ubicomp Notions
Computing capabilities, any time, any place
“Invisible” resources
Machines sense users’ presence and act accordingly
Video Examples
Ambient Room - H. Ishii, CHI ‘98
Beyond the Desktop - J. Rekimoto, CHI ‘00
Four Themes
Automated capture of experiences with easy access
Context-aware/sensitive interactions and applications
Ubiquitous services independent of devices/platforms
Natural/Implicit interfaces
Record-taking is hard
Multiple streams of information need to be captured
Machines are better at some of these things than we are
Meeting capture (scribe at Xerox PARC), Mark Weiser
Classroom 2000
Classroom 2000
Stream integration -- At what level?
Very finest level of actions or more coarse?
Modifying a record after the fact
Can student notes be added later?
Networked interaction
Why can’t your notes be put up on the Liveboard?
2. Context-Aware Computing
Computing services sense aspects of environment (location, user emotion,…) and tailor provided services
Walk into conference room, my email is projected on a big screen there
Active Badge & PARCTab
Shopping assistant
Perception system for recognizing user moods from their facial expressions
House where position is sensed and temperature adjusted automatically
Augmented Reality
How to integrate all the different aspects of context?
What about the loss of privacy?
3. Ubiquitous Services
Care about service, not application
Want to receive a message using whatever device is handy nearby
Message is tailored to work according to device
What is software infrastructure for integration?
Do we get it by just adopting some standard?
4. Natural/Implicit Interfaces
Computer interfaces and devices are more natural interaction tools
Pen input
Tangible interfaces
Pen applications
Speech applications
H. Ishii’s tangible UI work
Errors are more likely (handwriting recognition, speech, …) How to discover and correct them?
Is there truly value added?
Wearable Computing
Computation devices accompany you, rather than you seeking them out
T. Starner
How do we evaluate these technologies?
Challenge in Classroom 2000
Interested in More…
CS 7470 Spring term
Gregory Abowd
Readings, discussion, research-oriented
Project work day
Information Visualization
Post: #8
Pervasive computing offers the vision of a world in which computing is distributed and embedded into everyday devices and places, creating “smart” rooms, homes, offices and public spaces, fundamentally more responsive to each person’s needs. Users will be able to seamlessly interact with a wide variety of internet worked wireless and wired devices, e.g. printers, monitors, speakers, wearable computers, appliances, kiosks, toys, wireless PDA peers, GPS-enabled mobile phones as well as networks of sensors.Pervasive computing aims to make our lives simpler through the use of tools that allow us to manage information easily. These “tools” are a new class of intelligent, portable devices that allow the user to plug into powerful networks and gain direct, simple and secure access to both relevant information and services. Pervasive computing devices are not personal computers as we tend to think of them, but very tiny-even invisible – devices, either mobile or embedded in almost any type of object imaginable; all communicating through increasingly inter connected networks.
Post: #9
to get information about the topic pervasive computing full report ,ppt and related topic refer the link bellow
Post: #10
pls send me full report for pervasive computing
Post: #11
to get information about the topic pervasive computing full report ,ppt and related topic refer the link bellow
Post: #12
to get information about the topic pervasive computing full report ,ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: major disadvantages of pervasive computing, mn dept of, tapestry boeing, pervasive computing advantages disadvantages ppt, example of pervasive computing, pervasive computing seminar report, pervasive computing division,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  imouse full report computer science technology 3 3,629 17-06-2016 12:16 PM
Last Post: ashwiniashok
  computer networks full report seminar topics 7 4,895 25-05-2016 02:07 PM
Last Post: dhanyavp
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 4,989 10-05-2016 12:21 PM
Last Post: dhanyavp
  Optical Computer Full Seminar Report Download computer science crazy 43 34,269 29-04-2016 09:16 AM
Last Post: dhanyavp
  ethical hacking full report computer science technology 41 46,770 18-03-2016 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 2,098 27-02-2016 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 19,482 11-02-2016 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 14,025 16-09-2015 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 12,228 01-05-2015 03:36 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 6,454 27-04-2015 01:48 PM
Last Post: seminar report asees