StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Pervasive Computiong - Research Paper Example

Cite this document
Summary
The trend of pervasive computing is rising day by day. AT the present, the use of these devices has become very common. This paper presents an overview of the pervasive computing. This paper discusses some of the advantages and disadvantages of this modern technology. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Pervasive Computiong
Read Text Preview

Extract of sample "Pervasive Computiong"

?PERVASIVE COMPUTING A B. Co 2, and C. Co 2 1Department Country The trend of pervasive computing is rising day by day. As its name indicates, pervasive computing refers to the devices that use wireless connections to communicate with each other and all the functionalities and features are integrated into the devices. AT the present, the use of these devices has become very common. In this scenario, latest mobile phones and PDAs are some of the well known examples of pervasive computing. The basic objective of pervasive computing is to combine all the features and services in a single application. So it can help the people to use it conveniently. This paper presents an overview of the pervasive computing. This paper discusses some of the advantages and disadvantages of this modern technology. Keywords: Pervasive computing, Communicate, Intelligence, ICT, ubiquitous computing, Networking Introduction Pervasive computing (that is also known as ubiquitous computing) is the rising trend, which is aimed at offering visibility for the users. The basic theory says that microprocessors can be embedded in everyday objects with the intention that they could be able to communicate information. Basically, these objects communicate with each other to carry out operations in support of the user. In fact, one of the basic goals of pervasive computing is to fade away from human observation; however the applications embedded in electronic devices must be down to business. In other words, they must be able to guess the requirements of the users in an attempt to provide them with anytime, anywhere desired information. In addition, both the terms pervasive and ubiquitous stand for "existing everywhere." Additionally, the pervasive computing devices are fully linked and all the time accessible. However, they heavily rely on the convergence of advanced electronics, wireless technologies, and the Internet. Moreover, the target of scholars and researchers researching on pervasive computing is to build stylish products that can be used to communicate inconspicuously. Furthermore, these products are connected to the Internet and the data they produce is without problems accessible (Tang; Loureiro, Oliveira and Almeida). There are many advantages of such technology based systems. This research will assess such advantages and will also outline some of the major issues in pervasive computing. This paper will also discuss some of the possible application areas of pervasive computing along with some ethical issues of pervasive computing. Applications for pervasive computing The pervasive computing can be implemented in a wide variety of departments, yet some of them still have not been identified. Some of the major applications of pervasive computing can be for healthcare, healthcare, environmental, transport monitoring and a lot of others. I have outlined below some of the main areas for the application of pervasive computing: (Tang; POST) Healthcare: Pervasive computing present’s opportunities for the future healthcare management all through the world, for managing and treating diseases, as well as for patient management. For example, new technology based remote sensors and monitoring technology can allow the healthcare professionals to continuously capture and analyze patients’ physiological data. In this scenario hospital and medical staff could be instantly alerted to some noticed irregularities (Tang; POST). Domiciliary care: Pervasive computing based sensors can be embedded all through the home to examine the association and fluctuations inside the ambient situation (for instance variation in temperature) to aware care-workers to some abnormality. In this scenario, the voice messages or visual displays could as well have the power to replace people to acquire medications, as video telephones could offer personal contact with family, friends and careers (Tang; POST). Intelligent transport systems: Pervasive computing has also bright future in this area. Traffic congestion and accidents cost the billion a year all through the world as well as lost energy and wasted productivity. In this scenario, pervasive computing can be used in the development of intelligent transport technologies and systems to make an effort to minimize these costs. Similar technologies and systems inquire about to assemble telecommunication and information technologies in a shared system to develop the efficiency, safety and efficiency of transport networks. In addition, the electronic devices could be openly incorporated into the transport infrastructure, and into cars and buses themselves, in order to improve monitoring and managing the association of vehicles in rail, road, sea and air transport systems (Tang; POST). Mobile networking: Pervasive computing is also extensively used in mobile networking such as ad hoc protocols, Mobile IP and methods for improving TCP working and performance in wireless networks (Tang; POST). Fault tolerance: Pervasive computing is also applied in distributed and nested transactions, atomic transactions and two-phase agreements (Tang; POST). High availability: Pervasive computing offers high availability regarding pessimistic and optimistic replica control, optimistic recovery and mirrored execution (Tang; POST). Remote information access: Pervasive computing allows its users to remotely access the information through function shipping, caching, distributed databases and distributed file systems (Tang; POST). Advantages/Disadvantages This section outlines some of the advantages and disadvantages of pervasive computing. Advantages First we will discuss the advantages of this modern technology: Invisible: This stylish environment can be embedded with the computing technologies that will be typically out-of-sight. In this scenario, structures and designs achieve a lot of advanced capabilities with less visual clutter (Answers Corporation; Duquenoy and Burmeister). Socialization: Communication with this architecture is considered to be more social in nature. In this scenario, these stylish structures will prohibit a more social reaction from occupants as computer user interfaces embedded themselves in the new technology based architecture (Answers Corporation; Duquenoy and Burmeister). Support for Decision-Making: The use of this modern technology allows the users to formulate improved decisions as they harmonize with their daily lives. In many cases within architectural knowledge, a high-quality architectural design makes "smart" environments more useful (Answers Corporation; Duquenoy and Burmeister). Emergent Actions and Performance: Developments are at the present turning out to more and more kinetic in appearance and utility. In this scenario, their actions as well as constructed designs appear energetically to produce behaviors that create them more adaptive (Answers Corporation; Duquenoy and Burmeister). Information Processing: As new technology based architecture is turning into a kind of "nervous system", as a result data and information handling and processing has attained a completely new meaning. In this scenario, this new technology based architecture will go from crunching data in formulating sense of the data; consequently, getting rid of our need to continually input adjustments (Answers Corporation; Duquenoy and Burmeister). Disadvantages This section discusses some of the disadvantages of pervasive computing. In pervasive computing based environments privacy and trust can be major risks and issues. In addition, privacy has always been a critical issue in distributed systems and mobile computing. In this scenario there are number issues and aspects that are still hindering in the successful implementations and applications of pervasive computing technology. These issues can comprise identity theft, hacking, data theft, virus attacks, etc. (Answers Corporation; Duquenoy and Burmeister). Ethical Aspects The ethical issues and challenges of pervasive computing merge due to the blend of different technologies and exchange methods, the invisibility of the system and its capability for data-handling, imprudent technologies (context aware and reacting to user likings) data and information regarding the handling and processes taken on in real-time, (client) awareness of what is occurring and value of various kinds of data (for example, medical data can be recognized as more sensitive and in need of more cautious guardianship), as well as client authentication/validation (Duquenoy and Burmeister). In addition, to increase the level of public trust, users have to be aware of the processes of pervasive technology (yet if in the setting) as well as have a number of alternatives to undo (Duquenoy and Burmeister). Conclusion The trend of pervasive computing is rising day by day. As its name indicates, pervasive computing refers to the devices that use wireless connections to communicate with each other and all the functionalities and features are integrated into the devices. AT the present, the use of these devices has become very common. In this scenario, latest mobile phones and PDAs are some of the well known examples of pervasive computing. This paper has presented an overview of pervasive computing technology. This paper has discussed its applications, advantages and challenges. References Answers Corporation. Advantage and disadvantages of pervasive computing? 2012. 22 March 2012 . Duquenoy, Penny and Oliver K. Burmeister. Chapter XIV: Ethical Issues and Pervasive Computing. 2009. 18 March 2012 . Loureiro, Emerson, Loreno Oliveira and Hyggo Almeida. "Improving flexibility on host discovery for pervasive computing middlewares." MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing. New York: ACM, 2005. 1-8. POST. "Pervasive Computing." POSTnote May 2006 Number 263 (2006): 1-4. Tang, Beth Archibald. pervasive computing (ubiquitous computing). August 2001. 22 March 2012 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Pervasive Computiong Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Pervasive Computiong Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1445315-pervasive-computiong
(Pervasive Computiong Research Paper Example | Topics and Well Written Essays - 1250 Words)
Pervasive Computiong Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1445315-pervasive-computiong.
“Pervasive Computiong Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1445315-pervasive-computiong.
  • Cited: 0 times

CHECK THESE SAMPLES OF Pervasive Computiong

Pervasive Computing: The Future of Technology

The paper “pervasive Computing: The Future of Technology” seeks to evaluate the ultimate goal of all technology, which is to pervade the environment completely and get integrated into the everyday life in a ubiquitous manner.... hellip; The author states that the whole idea of the personal computer, the laptop, or even virtual reality with the user wearing special goggles and sitting in front of a complex machine is against the principles of pervasive technology....
6 Pages (1500 words) Assignment

Wireless Networks and Pervasive Computing SLP

Reporting on three tutorials in the TCP and UDP web pages.... What is it a business can expect to be addressed by each of the protocols and do the tutorials work to train for that need. 1.... Reliable Multicast… This is a transport protocol that is aimed at complete reliability but at the expense of delays whereas other protocols give better quality of service (QoS) at the cost of reliability....
2 Pages (500 words) Research Paper

Wireless Networks and Pervasive Computing

In the paper “Wireless Networks and pervasive Computing” the author analyzes internet protocols (Transmission Control Protocols) that have different uses.... Wireless Networks and pervasive ComputingTransmission Control Protocol (TCP) and User Datagram Protocol (UDP) are internet protocols that have different uses....
2 Pages (500 words) Essay

Green Computing- Annotated Bibliography

The paper argues that pervasive computing do not only provide exciting research challenges and tremendous opportunities, but also negative environmental impacts, especially in terms of energy consumption and physical waste.... architecture, transportation), pervasive computing adapt accordingly....
4 Pages (1000 words) Annotated Bibliography

Interface Design for Pervasive Computing

This paper "Interface Design for pervasive Computing" is aimed to present a detailed analysis and investigation of the implementation of the usability parameters for development of web-based applications.... hellip; This paper has introduced all aspects of usability implementation in the area of multimedia website development in the area of pervasive computing technologies.... This paper has outlined the main areas of the pervasive computing technologies those need more attention regarding the implementation of the usability of guidelines....
13 Pages (3250 words) Assignment

Fundamental Properties of Pervasive Systems

This paper presents a pervasive system which is also called Ubiquitous computing.... It is very important to understand pervasive systems.... om, that states, “pervasive computing is the trend towards increasingly ubiquitous, connected computing devices in the environment”.... pervasive or ubiquitous technology is used in such a way where the user is completely unaware of it.... The pervasive systems simultaneous use more than one computational and communication devices with networked enabled services, and the user may not be aware of it....
15 Pages (3750 words) Assignment

Pervasive Context-Aware Systems

The present discourse “pervasive Context-Aware Systems” elaborates key requirements for building pervasive environments.... hellip; pervasive environment is the emerging computing paradigm that aims to provide users access to services all the time, everywhere, in a transparent way, by means of devices installed in the surrounding physical environment or worn by the user.... Smart environment represents the evolutionary development of pervasive environment....
17 Pages (4250 words) Term Paper

Pervasive Computing for Assisting Individuals With Autism

This assignment "pervasive Computing for Assisting Individuals With Autism" investigates a pervasive computing technology that focuses on providing nonverbal autistic children with a voice.... Some of the pervasive computing technologies are designed to assist in collecting records, analyzing records, making decisions, and communicating (Kientz et al, 2008).... The spotlight of this assignment is to investigate a pervasive computing technology that focuses on providing nonverbal autistic children with a voice....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us