Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Summariza0on
Sessions-I-III
Lecture-16-18,
First
Semester:
2011-2012
October
1,
11,
13,
2011
Pervasive Compu.ng
Tuesday 11 October 11
E-Government
Banking
Mass Transit
Public Telephony
Mobile Telecommunications
W-LAN
Retail
Access control
Enterprise Security
CL K
RS T
Vcc
Vpp
Has two chips: contact and contactless interface. The two chips are not connected.
Combi
Card
Has
a
single
chip
with
a
contact
and
contactless
interface.
Can
access
the
same
chip
via
a
contact
or
contactless
interface,
with
a
very
high
level
of
security.
OS
Based
Classica.on
Smart
cards
are
also
classied
on
the
basis
of
their
Opera0ng
System.
There
are
many
Smart
Card
Opera0ng
Systems
available
in
the
market,
the
main
ones
being:
1.
MultOS
2.
JavaCard
3.
Cyberex
4.
StarCOS
5.
MFC
Smart
Card
Opera0ng
Systems
or
SCOS
as
they
are
commonly
called,
are
placed
on
the
ROM
and
usually
occupy
lesser
than
16
KB.
SCOS
handle:
File
Handling
and
Manipula0on.
Memory
Management
Data
Transmission
Protocols.
Biometric
techniques
Finger
print/hand
geometry
iden0ca0on.
Features
of
nger
prints
can
be
kept
on
the
card
(even
veried
on
the
card)
Data
storage
Data
is
stored
in
smart
cards
in
E2PROM
Card
OS
provides
a
le
structure
mechanism
MF DF DF EF EF DF EF EF EF File types Binary file (unstructured) Fixed size record file Variable size record file
An
Applica0on
Scenario
Terminal with two card readers
Banker s card 1. Authenticate user to banker s card: 1a. Get challenge from banker s card. 1b. Obtain response for the challenge from user card User s card (IAUTH). 1c. Validate response with officer card (EAUTH) 2. Authenticate officer card to user card in a similar manner. 3. Transfer money to the user s card.
Usually the money scenario is much more complex. EMV (electronic Master and Visa) card standard is used, which is much more complex.
The terminal itself does not store any keys, it s the two cards that really authenticate each other. The terminal just facilitates the process.
Processor based RF cards are coming in. Card also have enhanced security (VISA card for example)
Such as RSA Key generated Random number which is displayed on a small display on the card. Finger print sense and match on the card itself
Smartcard
Framework
Shared Service
Appli. Fw
Appli. Fw.
Appli. Fw.
Platform Framework
Platform manager
OS
Hardware platform Communication means
Smart card research: beyond OS and security
14
Jean-Jacques
Vandewalles
view
on
sards
is
between
mart
cards
The
posi0on
of
future
open
smart
c
High-end
electronic
consumer
products
embedding
An
opera0ng
system
kernel
(Symbian,
Embedded
Linux,
.Net
kernel,
etc.)
Generally
proprietary
and
some0mes
real-0me
A
well-dened
and
run0me
edi0on
(J2ME
CLDC/CDC,
.Net
compact)
on
top
of
an
underlying
opera0ng
system
Generally
over-sized
and
dicult
to
op0mize
With
network
connec0vity
capabili0es
network
Secure
powerful
open
plahorm,
generated
applica0on-specic
plahorms
systems Framework
for
operated
devices
Integra0on
architecture
in
services
infrastructures
16 Smart card research: beyond OS and security
Embedded
RFID Summary
Tuesday 11 October 11
17
What
is
RFID?
RFID
is
a
technology
that
uses
radio-frequency
waves
to
transfer
data
between
a
reader
and
a
movable
item
to
iden0fy,
categorize,
track
etc.
RFID
is
fast,
reliable,
and
does
not
require
physical
sight
or
contact
between
reader/ scanner
and
the
tagged
item
APPLICATION
INTERROGATOR
Decoder
RF TAG
Tag Physical Memory
AIR INTERFACE
Tag Driver and Mapping Rules COMMANDS
Encoder DEVICE COMMANDS APPLICATION COMMANDS APPLICATION RESPONSES DEVICE RESPONSES Logical Memory Command / Response Unit
RESPONSES
PHYSICAL INTERROGATOR
Note: The Logical Memory Map in the Tag Physical Memory is given by the Tag architecture and the mapping rules in the Tag Driver. All the information in the Logical Memory is represented in the Logical Memory Map
ISO/IEC 15961
ISO/IEC 15962
ISO/IEC 18000
RFID
Opera.on
Sequence of Communication
Host Manages Reader(s) and Issues Commands Reader and tag communicate via RF signal Carrier signal generated by the reader (upon request from the host application) Carrier signal sent out through the antennas Carrier signal hits tag(s) Tag receives and modifies carrier signal
sends back modulated signal (Passive Backscatter - FCC and ITU refer to as field disturbance device )
Antennas receive the modulated signal and send them to the Reader Reader decodes the data
Results returned to the host application
Memory Size (16 bits - 512 kBytes +) Read-Only, Read/Write or WORM Type: EEProm, An0fuse, FeRam Arbitra0on (An0-collision) Ability to read/write one or many tags at a 0me Frequency 125KHz - 5.8 GHz Physical Dimensions Thumbnail to Brick sizes Price ($0.50 to $250)
13.56
MHz
Advantages
Uses
normal
CMOS
processing--basic
and
ubiquitous
Well
suited
for
applica0ons
requiring
reading
small
amounts
of
data
and
minimal
distances
Penetrates
water/0ssue
well
Simpler
antenna
design
(fewer
turns
of
the
coil);
lower
costs
to
build
Higher
data
rate
(than
125
kHz--but
slower
than
higher
MHz
systems)
Thinner
tag
construc0on
(than
125
kHz)
Popular
Smart
Card
frequency
13.56
MHz
Disadvantages
Government
regulated
frequency
(U.S.
and
Europe
recently
harmonized)
Does
not
penetrate
or
transmit
around
metals
Large
Antennas
(compared
to
higher
frequencies)
Larger
tag
size
than
higher
frequencies
Tag
construc0on:
requires
more
than
one
surface
to
complete
a
circuit
Reading
Range
of
0.7
m
RFID
PrimerFrequencies
Toll Roads
RFID:
Data Terminal
Electromagne.c
Field
Coupling:
Lower
Range
UHF
Cell Phone
>300
MHz
<3
(<1)
GHz
(862-928
MHz
ANSI
MH10.8.4,
ISO
18185,
B-11
&
GTAG)
(433.92
MHz
ISO
18185)
1000 MHz
RFID
PrimerFrequencies
RFID: Item Management EAS
2.45 GHz
2.45
GHz
Advantages
Tag
size
smaller
than
induc0ve
or
lower
range
UHF
(1"x
1/4")
Range:
greater
range
than
induc0ve
w/o
baaery
More
bandwidth
than
lower
range
UHF
(more
frequencies
to
hop)
Smaller
antennas
than
lower
range
UHF
or
induc0ve
High
data
rate
2.45
GHz
Advantages
Good
non-line-of-sight
communica0on
(except
for
conduc0ve,
"lossy"
materials)
Can
transmit
large
amounts
of
data
more
quickly
than
lower
frequencies
Controlled
read
zone
(through
antenna
direc0onality)
Eec0ve
around
metals
with
tuning/design
adapta0ons
2.45
GHz
Disadvantages
More
suscep0ble
to
electronic
noise
than
lower
UHF
bands,
e.g.
433
MHz,
860-930
MHz
Shared
spectrum
with
other
technologies--
microwave
ovens,
RLANS,
TV
devices,
etc.
Requires
non-interfering,
"good
neighbor"
tac0cs
like
FHSS
Compe00ve
requirement:
single
chip--highly
technical;
limited
number
of
vendors
Regulatory
approvals
s0ll
"in
process"
RFID
PrimerFrequency
RFID: European Tolls
300 GHz
Spectrum
Regula.on
The
radio
frequency
(RF)
spectrum
is
a
scarce
and
shared
resource,
used
na0onally
and
interna0onally,
and
subject
to
a
wide
range
of
regulatory
oversight.
In
the
U.S.,
the
Federal
Communica0ons
Commission
is
a
key
regulatory
body
that
allocates
spectrum
use
and
resolves
spectrum
conicts.
The
Interna0onal
Telecommunica0on
Union
(ITU)
is
a
specialized
agency
of
the
United
Na0ons
which
plays
the
same
role
interna0onally.
Regula.ons - ITU
How far, how fast, how much, how many, aOached to what?
Regulation Basically unregulated ISM band, differing power levels and duty cycle Non-specific Short Range Devices (SRD), Location Systems ISM band (Region 2); increasing use in other regions, differing power levels and duty cycle ISM band, differing power levels and duty cycle
Comments Animal identification and factory data collection systems Popular frequency for I.C. Cards (Smart Cards) Asset tracking for U.S. DoD (Pallets) EAN.UCC GTAG, MH10.8.4 (RTI), AIAG B-11 (Tires) IEEE 802.11b, Bluetooth, CT, AIAG B-11
860-930 MHz
25m
Moderate to high
2450 MHz
12m
High
Portal Applica.ons
Portal Applica.ons
Limited number items at forklift speeds 8 X 10 doorways Electronic receipt & dispatch Wrong destination alert Electronic marking Pallet/container item tracking
Up to 450 fpm 60+ items per container Inexpensive tunnels Longer tunnel more items Electronic receipt Sorting Electronic marking
Batch
Wireless
Fixed Station
Shipping Valida.on
SHIP TO:
SHIP FROM:
AWHGEAA$0F00090XX 5310011987585
GTIN:
NSN:
CAGE:
AWHGE
MSDS #: HCC:
00098756100013
ABCDE
AHRIST DATA:
A1
CHEM WT:
10000
Low power > long range 1024 bit memory Read/write/lock on 8 bits Advanced protocol Efficient multi-id 12 ms/8 byte read Group select 40 tags/second
Layer 4
Layer 3
ISO TC 122/WG 4 (15394) ANSI MH10.8.1 AIAG B-10/14 EIA 556-B UCC 6
Layer 2
ISO TC 122/WG 4 (15394) ANSI MH10.8.1 AIAG B-10/14 EIA 556-B UCC 6/EAN Genl Spec!
Transport! Unit!
Transport! Unit!
Transport! Unit!
Transport! Unit!
Layer 1
ISO TC 122/WG 7 (22742) ANSI MH10.8.6 AIAG B-4 (TBD) EIA 621/624 & IEC TC 91 UCC 1 /EAN Genl Spec!
Pkg!
Pkg!
Pkg!
Pkg!
Pkg!
Pkg!
Pkg!
Pkg!
Layer 0
ISO TC 122 (TBD) ANSI MH10.8.7 AIAG B-4 EIA SP-3497 UCC 1 /EAN Genl Spec!
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Transport! Unit!
Transport! Unit!
Transport! Unit!
Transport! Unit!
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Applica.on Requirements
Wal-Mart Suppliers mark inbound cases and pallets with RFID - 1 January 2005 - May, 2003 specication calls for 256 bit read/write tag! U.S. Department of Defense - requires suppliers to put passive RFID tags on selected case/pallet packaging by January of 2005. Draft policy calls for passive tags (est. 256 byte) and active tags
Tuesday 11 October 11
56
Reference
Pages
hap://sec.isi.salford.ac.uk/download/smart.pdf
hap://www.smart.gov
hap://www.gemplus.com
hap://www.smartcardalliance.org/ industry_info/smart_cards_primer.cfm
hap://www.axalto.com/Company/Governance/ pdf/Annual%20Report%202004.pdf
hap://www.smartcard.co.uk/tutorials/sct- itsc.pdf
L-21: Slides Extracted from the Ubiquitous Computing support page by Dr. Stephen Poslad and duly edited for instructional use. Meant for classroom use only. Not to be redistributed.
60
L-21: Slides Extracted from the Ubiquitous Computing support page by Dr. Stephen Poslad and duly edited for instructional use. Meant for classroom use only. Not to be redistributed.
61
Introduction
62
Part A Outline
Basics Types of Autonomous System Autonomous Intelligent Systems Limitation of Autonomous Systems Self-* Properties of Intra-Action
64
Introduction
Term autonomous originates from the Greek terms autos meaning self and nomos meaning rule or law. Autonomy is considered to be a core property of UbiCom systems
enabling systems to operate independently without external intervention.
Autonomous systems operate at the opposite end of the spectrum to completely manual, interactive, HCI systems.
Ubiquitous computing: smart devices, environments and interaction
65
Automatic System
An automatic system is specific type of autonomous system designed to Act without human intervention Execute specific preset processes Work in deterministic & dynamic environments Incorporate simple models of environment behaviour Incorporate algorithms to control the environmenthttp://www.eecs.qmul.ac.uk/people/stefan/ Stefan Poslad, (closed-loop control systems).
Ubiquitous computing: smart devices, environments and interaction 66
Autonomous Systems
More general types of systems than automatic systems are needed. Why?
67
These types of systems tend to have a strong notion of ICT environment autonomy
69 but not of their physical environments and interaction & human environment autonomy. Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
70
Generally, focus of such systems is on supporting a notion of social autonomy or self-interested behaviour rather than on supporting ICT environment autonomy or physical environment autonomy.
Ubiquitous computing: smart devices, environments and interaction
71
An IS may have a physical embodiment or software embodiment which may be free to be executed in any part of a internetworked virtual computer.
72
73
To be self-steering requires a system to sense its environment & act upon it based upon what it has sensed Autonomous are generally first automatic systems but which are extended so that they
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 75
76
77
Self-Star Properties
Need to model complex systems whose components have some autonomy and propensity to maintain and improve their own operation in the face of external environment perturbations, e.g., Autonomic computing Organic Computing IS
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 78
Self-Star Properties
Self-star model focuses on doing things selfcontained or doing things internally
Self-Awareness
Basic design is that an ICT system does not process itself or is not aware of its own actions. Why not?
82
Self-Awareness: Applications
Optimising internal resource use
Self-explaining systems
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 83
Systems can also provide mechanisms and Ubiquitous their external for other metasmart devices, interfaces to outputcomputing: interaction 85 environments and
Design issues?
How rich are descriptions? How structured are they? How full versus short? Internal versus external and on-line versus offline, Ubiquitous external not smart devices, Co-located versus computing: interaction co-located 86 environments and
Reflection
Reflection is the process by which a system can observe its own structure and behaviour, reason about these and possibly modify these
87
To support reflection, reflective computation is done by a system at a meta-level about its own operation at the application or base level of the system Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Reflection
There are three elements to the reflection process: Instrumentation introspection adaptation
89
Reflection Design
Combined system reflection & operation representation
Design issues?
Ubiquitous computing: smart devices, 90 HowPoslad, http://www.eecs.qmul.ac.uk/people/stefan/ to support environments and interaction meta-level & enable this Stefan
Reflection Design
Reflection as an extension to middleware model?
91
Autonomic Computing
Motivation for autonomic systems was to deal with the obstacle of IT system complexity:
The growing complexity of the IT infrastructure threatens to undermine the very benefits information technology aims to provide (Horn, 2001).
Local
Local
Policies Local
Ganek
self-awareness context-aware adaptation planning to control computing: smart devices, constrained by behaviours Ubiquitous 94 environments and interaction Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/ system policies.
95
96
Tuning servers individually (also called locally or on a microscopic scale) may be beneficial
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 97
a user interface (task manager) an autonomic manager with an autonomic control loop a knowledge base about the managed resources including management policies a standardised interface to access managed resources (TouchPoint) service-based communications network, the ESB Poslad, http://www.eecs.qmul.ac.uk/people/stefan/ Stefan
Ubiquitous computing: smart devices, environments and interaction 99
Load-balancing in servers to meet a designated QoS under variable external processor loads Intrusion detection:
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 103
105
108
UbiCom Applications
Network routing Power distribution & energy regulation system Ubiquitous computing: smart devices, 109 environments and interaction Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/ etc
Co-field Coordination
Inspired by physics forces in nature
Also called Gradient-based Coordination and Wave Propagation coordination
Autonomous entities can spread out a computation field or co-field, throughout the local environment UbiCom Applications:
environments and interaction Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
to provide context information to other entities to follow the field. Ubiquitous computing: smart devices,
110
UbiCom Applications:
Resource allocation in networks to enable them to adapt to continuous node failure and to the addition of new nodes and devices, Ubiquitous computing: smart resources and 111
112
But these often lack the flexibility to dynamically reorganise and to selforganise?
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 113
Computer virus is also referred to as a selfreproducing or self-replicating program (SRP). Tends to be software virus rather than a hardware virus. Why? Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 115
Virus contains a trigger that activates the self-replication mechanism Computer viruses versus Worms?
Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 116
Artificial Life
Are systems which mimic natural life and are characterised as follows. Have a finite lifetime from birth to death. Use selective reproduction. Their offspring inherit some of traits of the parents. They use survival of the fittest (evolution). They support the ability to expand in numbers to command a space or habitat. Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/ They can respond to stimuli in a habitat,
Ubiquitous computing: smart devices, environments and interaction 117
Artificial Life
Living organisms are consummate problem solvers
118
FSMs can be used to model devices with a finite set of states such as off, on and standby. Stefan Poslad, http://www.eecs.qmul.ac.uk/people/stefan/
Ubiquitous computing: smart devices, environments and interaction 119
121
This example illustrates the principle that reactive type behaviours combined with a set of simple transformation rules, when repeatedly applied, can model more complex behaviours e.g., the gliding pattern
123
124
Interac0on
Goals
About
the
ubiquitous
compu0ng
elements
and
the
Pervasive
Compu0ng
paradigm
Essen0al
elements
involved
Some
real
life
and
experimental
examples
of
pervasive
compu0ng
technologies
in
ac0on
About
the
Pervasive
Compu0ng
research
at
BITS-Pilani
The
BITS
Life-Guard
Project
The
BITS
Smart-Campus
Project
The
Touch-Lives
Ini0a0ve
The
Tiny6
Project
Opportuni0es
available
for
joint
research
collabora0on
What
the
future
Tuesday 11 October 11
125
11/10/11
126
It does so by:
Making use of multiple independent information devices (fixed or mobile, homogeneous or heterogeneous) Interconnecting these devices seamlessly through wireless or wired computer communication networks Providing a class of computing / sensory / communication services to a class of users, preferably transparently and can provide personalized services while ensuring a fair 12 127 7 (c) Dr. Rahul Banerjee, BITS-Pilani, India degree of privacy / non-intrusiveness.
Tuesday 11 October 11
128
Inter-planetary
Networks
Intelligent
Transporta0on
Systems
Wearable
and
Vehicular
Compu0ng
Systems
Tuesday 11 October 11 (c) Dr. Rahul Banerjee, BITS-Pilani, INDIA 130
Sensory elements for collec0ng data, Communica0on elements to interconnect these compute-sensory elements.
Pervasive Compu0ng Infrastructure has to comprise of compu0ng elements, communica0ng elements, sensors, actuators, and interface devices. Computa0on to be available widely and freely (not free of cost). Intermiaent connec0vity has to be a supported feature due to physical limita0ons pertaining to power, cost, bandwidth and network conges0on.
The infrastructure has to oer seamless connec0vity to the devices / en00es / services. It has to support placement and loca0on of uniquely iden0able informa0on tags / trackable tags to all devices / en00es in the Pervasive Compu0ng environment. User s environment must be able to be aware of the user s context.
135
Near-Future Scenarios
136
IT
emits
appe0zing
aromas
along
with
the
adver0sing
videos
being
displayed
on
a
42-inch
LCD
Display
panel.
This
commercial
tex0ng
was
done
by
Recruit
Co.
Ltd
for
adver0sing
cafes
(c) Dr. Rahul Banerjee, BITS-Pilani, INDIA and
restaurants.
Tuesday 11 October 11
137 137
139
Steerable Displays
142
Discussion
Stop-1
So,
what
would
you
need
to
make
a
Building
smart
so
that;
it
recognizes
people,
iden0es
their
areas
of
their
access
and
Facilitates
authorized
forms
of
collabora0on
/
sharing
needs
..
and
so
on?
Discussion
Stop-2
What
would
you
need
to
make
an
en0re
campus
smart
so
that;
it
recognizes
people
and
other
forms
of
well-known
large
/
common
objects
of
interest,
iden0es
their
areas
of
their
presence
Assists
rst-0me
visitors
Facilitates
authorized
forms
of
collabora0on
/
sharing
needs
Enables
emergency
rescue
/
support
for
dierent
situa0ons
In0mates
about
paaerns
of
interest
to
registered
users
..
and
so
on?
Discussion
Stop-3
What
would
you
need
to
make
an
en0re
Expressway
smart
so
that;
it
recognizes
vehicles,
drivers
and
other
forms
of
well-known
common
objects
/
good
of
interest,
iden0es
their
areas
of
their
presence
and
allows
prepayments
or
just-in-0me
electronic
payments
without
being
asked
to
stop
at
toll
booths
and
pay
up,
Assists
the
Expressway
Patrol
/
any
other
authorized
agency
Facilitates
authorized
forms
of
collabora0on
/
sharing
needs
Enables
emergency
rescue
/
support
for
dierent
situa0ons
In0mates
about
paaerns
of
interest
to
registered
users
..
and
so
on?
Where did these problems originate? Which type of solu0ons / strategies are likely to handle these problems / issues related to them?
Brief
History
The
BITS-LifeGuard
Project
Ini0ated
in
1999
Aims
at
building
transparent
life-saving
system
for
saving
human
lives
from
slow-reexes
based
road
accidents
First
formal
presenta0on
was
made
at
the
European
Commission s
NGNi
Mee0ng
at
Brussels
in
2001
Par0al
funding
derived
from
the
EC
and
MSR
Currently,
co-working
on
complementary
research
issues
with
Stanford
University
in
USA
and
INRIA
in
France
Project
website:
hap://discovery.bits-pilani.ac.in/WearComp/
Currently,
three
PhD
and
two
First
Degree
students
are
working
on
dierent
aspects
of
the
problem
(c) Dr. Rahul Banerjee, BITS-Pilani, INDIA 149
Tuesday 11 October 11
Principal
Objec0ves
Objec0ves:
Saving
human
lives
with
the
help
of
non-intrusive
wearable
compu0ng
devices
Using
the
advances
in
computer
communica0on
and
networking
technologies
to
complement
the
wearable
device
capabili0es
Not
requiring
the
wearer
to
be
aware
of
the
computer
he
/
she
is
to
wear
Making
the
wearable
computer
one
of
the
mul0ple
elements
within
a
pervasive
compu0ng
environment
Iden0fying
Challenges
It
was
required
to
iden0fy:
elements
of
relevance
Factors
inuencing
the
choices
Roles
of
Hardware
technologies
(including
CPU,
Power
system,
Sensor
and
Communica0on)
Roles
of
SoWware
technologies
(including
System
and
Applica0on
soiware)
Selec0on of parameters required to be sensed Iden0fying the inter-rela0onship of these parameters with one-another, if any, Comparison of these parameters usefulness to the target system from the viewpoint of their measurability, ease of measurement, es0ma0on or calibra0on Iden0ca0on of any conic0ng requirements of any two or more of these parameters due their measurement process that may interfere with each-other
Iden0ca0on of best possible method of direct or indirect sensing the chosen parameters Evalua0ng the best candidate methods from the viewpoints of their being appropriate to be embedded into the wearable computer s fabric Iden0fying the best mechanism and loca0on to embed one or more of these sensory elements in the fabric Iden0fy the reliable interfacing mechanism to connect these elements with the appropriate part of the target system
Ascertaining the exact scope of real-0me processing Es0ma0ng average and peak processing power needed Iden0fying the level and mechanism of fault- tolerance required Evalua0ng the available processor families and short lis0ng the candidate choices Deciding about a safe and secure embedding mechanism, deciding the loca0on of placement of processors, integra0on of the chosen processors with the rest of the target system Planning power needs of the processing sub-system
Iden0fying
the
cri0cal
and
op0onal
features
needed
to
be
supported
by
the
Opera0ng
System
Evalua0ng
available
Opera0ng
Systems
on
the
chosen
processors
with
respect
to
real-0me
support
in
the
scheduling
mechanism,
power-management
support,
eciency
of
opera0on,
memory
requirements,
availability
of
ready-to-use
device
drivers,
security
support,
robustness
(crash-resistance
and
recovery
included),
availability
of
source
code
for
modica0on
and
customiza0on,
applica0on
development
support
available
etc.
Deciding about the cri0cal and op0onal modules, Formula0ng security (privacy included) strategies to be implemented at the applica0on level
Choice of mechanism to be used for the User (Driver in this case) registra0on and authen0ca0on prior-to-use User-specic cri0cal data acquisi0on, sensor output calibra0on and verica0on prior-to-rst use as well periodically aierwards (say every two years or aier any major injury / prolonged treatment etc.) Deciding upon the minimal set of training (ideally none) on use of the wearable and precau0ons, if any Carefully evalua0ng the least irrita0ng but adequately eec0ve interface to the user for alerts (say audio only, audio and vibratory alert etc.)
Iden0ca0on of the low-power, short-distance, low / medium-speed wireless communica0on mechanism (technology, protocol included) for the wearable compu0ng element Ensuring that the technology and mechanism work even if accidentally an object of common use or any body part may come between the wearable computer s transceiver and vehicle s transceiver Iden0ca0on of Higher-level Protocol Stack for local as well as global iden0ca0on of the wearable computer as well as that of the vehicle s computer Iden0ca0on of appropriate wireless mobile communica0on technology that could allow vehicle s computer to communicate with the external world in the event of the need
Iden0fying the methods and mechanisms to minimize the power requirements of the wearable computer system since providing power from vehicle s power system is both imprac0cal and unadvisable Ensuring that the chosen mechanism of reduced power requirement does not adversely aect the cri0cal aspects of opera0on of the wearable compu0ng system Iden0fying possible power-system elements that could supply required power to the iden0ed elements of the wearable computer for reasonably long hours before any recharging or replacement becomes necessary Assessing the robustness of the power-sub-system against likely failures / exposures / damages
Iden0ca0on / development of low-overhead based ecient security mechanisms and protocols for providing: Data integrity check Failsafe User (driver) authen0ca0on Implementa0on of veriable privacy policy to protect privacy of the user from the unscrupulous oenders Protec0on against any over-the-network or EMI- based aaacks on the wearable or vehicular subsystems
Evolu0on of a veriable framework that could be used to ensure that the overall system in its en0rety or any individual sub-system / element of which does not pose any threat to the physical security or mental comfort level of the user Ensuring that a built-in self-test be executed on the wearable computer as well as on the vehicle s computer at appropriate intervals to ensure that the system con0nues to conform to the specied safety norms.
A project that aims to benet a rela0vely less addressed cross- sec0ons of our society
11/10/11
169
Some
of
the
Problems
Related
to
Connec=ng
People
with
Dierent
Kinds
of
Disabili0es
Types
of
disabili0es
may
be
Temporary
or
Permanent
Degrees
of
disabili0es
may
vary
par0al
or
total
Causes
of
disabili0es
may
vary
Select
types
of
disabili0es
/
impairments:
Visual
Hearing
Speech
Cerebral
Some
of
the
Issues
Related
to
Connec=ng
People
with
Dierent
Kinds
of
Disabili0es
Social
Issues
Psychological
Barriers:
low
self-esteem/condence/
Economic
Issues
Technology
Issues
11/10/11
170
Inner
Strength
&
Technology:
Together,
they
help
people
with
Disabili0es
11/10/11 (c) Dr. Rahul Banerjee, BITSPilani, INDIA 171
11/10/11
172
How
Can
Connec0vity
Make
Such
a
Dierence
to
the
Lives
of
Millions
of
People
with
Such
Disabili0es?
11/10/11 (c) Dr. Rahul Banerjee, BITS-Pilani, INDIA 173
11/10/11
174
Soiware
OS
Applica0ons
Authen0ca0on-support
So, do you now recognize possible points of security interest in such a device?
Output
Technologies
display
technologies
(for
dierent
surface
types)
Collabora0on
Technologies
Single-user
<->
Device
interac0on-based
collabora0on
Mul0ple-user
to
user
and/or
user
<->
Device
interac0on- based
collabora0on
Tuesday 11 October 11
180
Any ques0ons?
Thank
you!
Tuesday 11 October 11
181
1. 2.
3. Note: IPR of respec=ve material rests with the respec=ve sources whether or not explicitly listed herein. Meant for classroom use and post-lecture self-study purpose only. Not meant for re-distribu=on.
Sources: My own lecture slides of earlier presenta0ons W3C material from their site including the mul0ple standards and drai standards published by them and tutorial material authen0cated by them Mul0ple Industry resources which deal with using respec0ve products of relevance involving XML
What
is
IVR?
IVR
--
Interac0ve
Voice
Response
It
deals
with
Answering/managing
voice
mail
Telephone
banking
Call
handling
at
customer
support
lines
.
And
some0mes,
even,
surng
the
Web
183
Roots
of
IVR
Interface
restric0ons
Input:
Voice
and
15-key
keypad
(DTMF)
Output:
Audio
informa0on
and
audio
prompts
User
restric0ons
All
session
needs
to
be
in
user s
memory
(nothing
to
look
at )
Limited
informa0on
framing
Many
dialogs
means
hard
to
keep/reference/know
context
Same
UI
must
handle
experienced
and
novice
(rst-0me)
users
Need
to
account
for
learning
during
a
session
Applica0on
context
Oien
used
within
telephony
applica0ons,
and
so
must
be
able
to
do
call
control
(re-rou0ng
+
queuing
of
calls)
Integrate
with
call
centres
Auto-forwarding
of
informa0on
(e.g.,
to
a
call
centre)
184
Provisioning
of
IVR
Many
IVR
technology
providers
Same
basic
approaches
and
ideas,
but
Dierent
soiware,
Dierent
APIs,
development
tools,
architectures
No
common
framework
for
scrip0ng
the
dialog
sessions
that
control
the
user
interface
But
always
the
same
basic
ideas
and
approaches
Barging
in
Some0mes
the
user
should
be
able
to
barge
in
on
a
dialog,
and
interrupt
it
and
some0mes
not!
Need
to
manage
session,
store
session
state,
and
pass
data
to
other
applica0ons
So
an
IVR
session
has
some
kind
of
logic/rules,
variables
for
storing
data,
etc.
186
What
is
VoiceXML?
Voice
XML
is
designed
for
crea0ng
audio
dialogs
that
feature
synthesized
speech,
digi0zed
audio,
recogni0on
of
spoken
and
DTMF
key
input,
recording
of
spoken
input,
telephony,
and
mixed-ini0a0ve
conversa0ons. *
Its
major
goal
is
to
bring
the
advantages
of
web-based
development
and
content
delivery
to
interac0ve
voice
response
applica0ons *
DTMF
component
designed
for
integra0on
with
exis0ng
telephone
systems
XML
abstrac6on
layer
on
top
of
exis0ng
IVR
systems
In
principle,
not
restricted
to
phones
* VoiceXML 1.0 Specification -- http://www.w3.org/TR/voicexml
187
Motorola (1998)
History
of
VoiceXML
1999 VoiceXML forum (2000) W3C (2002 in draft)
VoxML
Bell/Lucent + others (1998)
PML
IBM (1998)
VoiceXML 1.0
VoiceXML 2.0
SpeechML
H.P. (1998)
TalkML
? (defunct)
188
Voice Applications
Voice
application works, via audio playback of information and a voice user interface. They are already thousands of commercial VoiceXML applications deployed, These applications perform huge variety of services,
Driving directions.
VoiceXML
The target presentation language for voice enabled applications is VoiceXML. A Widely-adopted public standard which is governed by the W3C Voice XML is the HTML of the voice web, the open standard markup language for voice applications VoiceXML is a derivative of the Extensible Markup Language (XML).
190
VXML
World Wide Web
user
SSML
CCXML
VoiceXML supports interactive dialogues to leverage the technologies that have made the Internet an effective medium for information dissemination. It enables an application interface in the form of dialogues that produce navigation and input via speech recognition. Thus, VoiceXML uses both speech-to-text (STT) and text-to-speech (TTS)>technologiesthe former, for inputs; the latter, for outputs. 191
VoiceXML Architecture
The basic architecture includes a Document server, VoiceXML gateway, and an Implementation platform.
192
VoiceXML, a specific kind of XML designed to describe voice applications. Whereas XML is designed to represent arbitrary data. VoiceXML describes grammars, prompts, event handlers, and other data structures useful in describing voice interaction between a human and a computer.
Application Structure:
A
VoiceXML
applica0on
consists
of
a
set
of
VoiceXML
documents.
and
each
VoiceXML
document
contains
one
or
more
dialogs
describing
a
specic
interac0on
with
the
user.
193
<field> formulates an interactive dialog between the user and the system. <grammer> specifies a permissible vocabulary for user interaction. <prompt> queues recorded audio and synthesized text to speech in an interactive dialog. <filled> specifies an action to perform when the VoiceXML interpreter assigns a value to the named variable of a field. <nomatch> handles user input that is not recognized as part of the active grammer(s). <noinput> executes when the user does not speak within the active field. <reprompt>
Indicates that the Platform should select and queue the appropriate prompt element before entering a listen state in an interactive dialog.
195
196
User
Outgoing hardware Response UI control CGIs servlets application code resource files
197
User
Outgoing Response
Computer (Sun, Intel) running UNIX/linux/NT/XP equipped with phone cards (Dialogic, etc.)
198
Speech synthesis (TTS) Speech recognition (STT) Speech grammars Voice Biometrics
Call centre
199
VoiceXML
Integrators
Many,
many
companies
Some
sell
integrated
solu0ons
kits
Some
are
voice
ASPs
(provide
leased
hos0ng
solu0ons)
hap://studio.tellme.com hap://developer.voicegenie.com
202
HTTP
203
When
VoiceXML
references
a
URI,
the
language
provides
aaributes
that
dene
the
cache
model
to
use:
caching= safe
or
fast
( safe
always
goes
for
new
version)
fetchtimeout= secs
(how
long
to
wait
before
throwing
error)
fetchhint= prefetch
or
safe
(safe
only
gets
stu
when
needed)
204
<?xml version="1.0"?> <vxml version="1.0" application="app-root.vxml"> <form id="say_goodbye"> <field name="answer" type="boolean"> <prompt>Shall we say <value expr="application.bye"/>? </prompt> <filled> <if cond="answer"> <exit/> </if> <clear namelist="answer"/> </filled> app-root.vxml </field> <?xml version="1.0"?> </form> <vxml version="1.0"> </vxml> <var name="bye" expr="'Ciao'"/> <link next="operator_xfer.vxml"> <grammar> operator </grammar> </link> </vxml>
From: VoiceXML 1.0 Specification -- http://www.w3.org/TR/voicexml
205
main.vxml
VoiceXML Example
main.vx ml
main.vx ml
load root
main.vx ml
load new resource
operator_x fer.vxml
<vxml version="1.0" application="app-root.vxml"> <form id="say_goodbye"> Default <field name="answer" type="boolean"> system <prompt>Shall we say <value expr="application.bye"/> prompt ? </prompt> <filled> <if cond="answer"> <exit/> S: Shall we say Ciao? </if> U: Boobie <clear namelist="answer"/> </filled> S: I did not understand that </field> U: Bleeble </form>
main.vxml
VoiceXML Examples
app-root.vxml
<var name="bye" expr="'Ciao'"/> <link next="operator_xfer.vxml"> <grammar> operator </grammar> </link>
207
208
Recording
Audio
Can
be
done,
but
is
stored
locally
in
a
variable.
Can t
permanently
store
data
on
the
VoiceXML
server
--
it
must
be
moved
over
to
the
applica0on/resources
server.
Typically
use
HTTP
methods
to
do
this.
Prompt and error response variable name for storing it dead air 0me to indicate end of recording DTMF indicator for end of message How long the message can be Audio format for the data
Recording
Audio
<?xml version="1.0"?> <vxml version="1.0"> <form> <record name="greeting" beep="true" maxtime="10s" finalsilence="4000ms" dtmfterm="true" type="audio/wav"> <prompt> At the tone, please say your greeting. </prompt> <noinput> I heard nothing ... </noinput> </record> <field name="confirm" type="boolean"> <prompt> Your greeting is <value expr="greeting"/>. </prompt> <prompt> To keep it, say yes. To discard it, say no. </prompt> <filled> <if cond="confirm"> <submit next="save_greeting.pl" method="post" namelist="greeting"/> </if> <clear/> </filled> </field></form> </vxml>
210
VoiceXML
2.0
Is
basically
a
cleanup
of
VoiceXML
1.0
Beaer
consistency
with
XML
architecture,
including
deni0on
of
a
VoiceXML
namespace
URI
(
hap://www.w3.org/2001/vxml
)
Support
for
error
logging,
some
changes
to
syntax,
and
some
deprecated
elements
and
aaributes
mandated
support
for
a
W3C
sponsored
speech
grammar
format
clarica0on
of
meaning,
cleanup
of
caching
control
models
Basically the same language, with a few minor tweaks and improvements
211
Feature
set:
hints
to
word
pronuncia0on
hints
to
phrasing,
emphasis,
pitch
and
speaking
rate
marker
elements
--
no0ca0ons
from
the
speech
synthesizer
to
applica0ons
when
marker
is
reached.
212
213
Sun/SpeechWorks (1999)
VoiceXML 3?
[????] [WD]
VoiceXML 1.0
VoiceXML 2.0
[early] [early]
SALT
Speech Application Language Tags
214
Microsoi s
SALT
Speech
Applica0on
Language
Tags
Microsoi,
Cisco,
Intel,
Comverse,
SpeechWorks,
Philips
A lightweight set of tags designed to be used with HTML and XHTML to enable lightweight telephony applica0ons driven from regular Web documents. Targeted at suppor0ng mul6modal access
216
Short
Glossary
PSTN
SLU
STT
SV
Public
Switched
Telephone
Network
Spoken
Language
Understanding
Speech
to
Text
(simple
recogni0on)
Speaker
Verica0on
(biometric
iden0ca0on)
Text
to
Speech
(synthesis)
managing connec0vity and rou0ng of phone calls Computer Telephony Integra0on Dual Tone Mul0 Frequency Interac0ve Voice Response Java API speech grammar format -- A proposed standard for represen0ng speech grammars Java Speech Markup Language Natural Language Understanding Private Branch Exchange
DTMF IVR
JSGF
TTS
217
RIA
Approaches
Browser
plug-in
Flash/Flex,
Java
Swing,
Silverlight
Poten0ally
greater
interac0vity,
higher
barrier
to
adop0on
Concerns
about
openness/control
In
browser,
no
plug-ins
AJAX
Lower
barrier
to
adop0on
Cross-browser
mayhem?
What is AJAX?
What is AJAX?
Some History
Client-side
Javascript
+ Web-friendly
Bookmarkable Indexable
Both hills!
AJAX-aware
code
Raw
Javascript/HTML/CSS
Or
with
a
library
A Grid of Images
Sequence
+Undo, behaviors, constraints: all possible! - Scalability (server-side state, lots of requests) - Slow feedback: network hop for each user ac0on
Sequence
Wait
a
second
No
AJAX
calls
involved
in
moving
the
map
around!
Mostly
Javascript.
New
image
requests
are
synchronous
Some Toolkits
GWT:
A
Toolkit
Laying
out
widgets
in
a
container
panel
Events
and
handlers
// Create a Horizontal Panel HorizontalPanel hPanel = new HorizontalPanel(); // Leave some room between the widgets hPanel.setSpacing(5); // Add some content to the panel for (int i = 1; i < 5; i++) { hPanel.add(new Button("Button " + i)); }
http://code.google.com/webtoolkit/doc/1.6/ DevGuideUserInterface.html
http://code.google.com/webtoolkit/doc/1.6/ DevGuideUserInterface.html
http://280slides.com
Cappuccino
vs
GWT
Philosophical
ques0on
GWT:
RIAs
that
are
part
of
of
the
web
Cappuccino:
RIAs
deployed
over
the
web
Alterna0ve
to
Flash/Flex
Finally
Recommenda0ons
If
you re
serious
about
RIAs,
climb
the
direct
manipula0on
hill.
Don t
limit
yourself
to
Thin
AJAX.
AJAX
sweet
spot:
Applica0ons
that
are
part
of
the
web.
AJAX
is
an
implementa0on
alterna0ve
for
applica0ons
deployed
over
the
web.
References
1
adaptive path ajax: a new approach to web applications. (n.d.). . Retrieved April 8, 2009, from http://www.adaptivepath.com/ideas/essays/archives/ 000385.php. Adobe wants to be the Microsoft of the Web at Ted Leung on the Air. (n.d.). . Retrieved April 8, 2009, from http://www.sauria.com/blog/2007/03/01/adobe-wants-to-bethe-microsoft-of-the-web/. Cappuccino Web Framework - Build Desktop Class Applications in Objective-J and JavaScript. (n.d.). .
References
2
Dare Obasanjo aka Carnage4Life - What Comes After AJAX? (n.d.). . Retrieved April 8, 2009, from http://www.25hoursaday.com/weblog/PermaLink.aspx? guid=11c471d6-ea65-4ed2-b387-c9ec966d8418. Developer's Guide - Google Web Toolkit - Google Code. (n.d.). . Retrieved April 9, 2009, from http://code.google.com/webtoolkit/doc/1.6/DevGuide.html. Echo2 Technical Overview | Echo Web Framework. (n.d.). . Retrieved April 8, 2009, from http://echo.nextapp.com/site/echo2/doc/tov.
References
3
Echo2 versus GWT The Register. (n.d.). . Retrieved April 9, 2009, from http://www.theregister.co.uk/2006/08/24/echo2_framework/. Feigin, B. (n.d.). Cappuccino and Objective-J. Retrieved from http://www.cs.cmu.edu/~bam/uicourse/830spring09/ Benjamin%20Feigin%20-%20Cappuccino.pptx. Following up on The Microsoft of the Web at Ted Leung on the Air. (n.d.). . Retrieved April 8, 2009, from http://www.sauria.com/blog/2007/03/04/following-up-on-the-
References
4
Mesbah, A., & van Deursen, A. (2006). An Architectural Style for Ajax. cs/0608111. Retrieved April 8, 2009, from http://arxiv.org/abs/cs/0608111.Tony C Shan, & Winnie W Hua. (2006). Taxonomy of Java Web Application Frameworks. In eBusiness Engineering, 2006. ICEBE '06. IEEE International Conference on (pp. 378-385). doi: 10.1109/ICEBE.2006.98.
Any
Ques0ons?
Thank
you!
Tuesday 11 October 11
271