A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

References Overview User attention is by far the most precious resource in a world where computational and networking infrastructure is becoming cheaper.
Intermediate 2 Computing
2006/12/05ICS Home Automation Examples of WSN: (iPower: An Energy Conservation System for Intelligent Buildings) Yu-Chee Tseng (appeared in ICS 2006)
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Team 4 Pervasive Computing __________________________________ Abe El-Dewak Sheb Findik Kenneth Brancik Tom Lombardi.
Slide 1 Written by Dr Caspar Ryan, Project Leader ATcrc project 1.2 What is MobJeX? Next Generation Java Application Framework providing transparent component.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
2006/12/05ICS iPower: An Energy Conservation System for Intelligent Buildings by Wireless Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun-Wu.
Geocaching (Treasure Hunting) game using Wireless and Mobile Network Equipment/Technology: One or more of the followings :GPS, Wi-Fi, GSM, Bluetooth, Qcode.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
G4 Control and Management Solution for Data- Centers and Computer Rooms.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Office Sync. What Does Office Sync Do?  Exchange data between field & office without a USB flash drive.  Planned and completed jobs  A/B guidance lines.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
CINEMA’s UbiComp Subsystem Stefan Berger and Henning Schulzrinne Department of Computer Science Columbia University
Introduction - What is Jini Technology?
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
1 Vrijendra Gokhale, Bernard Menezes K. R. School of Information Technology IIT Bombay User Interfaces for Jini Services The Jini Pattern Language Workshop.
From Smart Home to Smart Care : Pervasive Assistance for Cognitively Impaired People Sylvain Giroux.
From Smart Home to Smart Care : Pervasive Assistance for Cognitively Impaired People Sylvain Giroux.
Home automation The true value of home networking is when the people are away from their home, we are making some new ways for simple human computer infrastructure.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
Livespace Architecture. Overview Livespace requirements Discussion of issues Livespace Architecture.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
1 Chapter Overview Exploring New Features and Improvements Troubleshooting Using Help and Support Center Understanding Workgroups and Domains Logging On.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Computer Emergency Notification System (CENS)
Cognitive Assistance in Smart Homes Sylvain Giroux and Hélène Pigot.
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Jini Architecture Alessandro Brawerman. Contents Jini definition Advantages Architecture How it works Websites to check.
Mobile Phone Based Environment Control/Security System Christopher Carroll B.E. Electronic and Computer Engineering.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Service Discovery Protocols Mobile Computing - CNT Dr. Sumi Helal Professor Computer & Information Science & Engineering Department University.
Lecture 24 Wireless Network Security
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
What are Smart Sensors/Actuators ? Sensor/Actuator either senses environment or activates motors, solenoids. –Motion detectors and light level sensors.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
From smart home to smart care : pervasive assistance for cognitively impaired people Sylvain Giroux Laboratoire DOMUS Université de Sherbrooke.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Project Target Develop a Web Based Management software suit that will enable users to control Hardware using standard HTTP & Java Applet compatible web.
Wireless Networks of Devices
Getting Started.
Getting Started.
Bina Ramamurthy Chapter 9
Unit V Mobile Middleware.
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
Jini B.Ramamurthy 5/15/2019 B.Ramamurthy.
Data Management Components for a Research Data Archive
Presentation transcript:

A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université, Sherbrooke, Canada J1K 2R1 {Sylvain.Giroux,

Plan  Context  Issues and Goals  Architecture  Scenario 1: –Localization and identification of the user –Towards personalization of the home according to the user  Scenario 2: –Pervasiveness –Moving applications seamlessly across devices  Scenario 3: –Sending information specific to the user that is in the room –Preserving the integrity of the distributed system  Conclusion  Future works

Context The DOMUS laboratory investigates pervasive and mobile computing  In a smart home environment, –Technology must be:  Seamlessly incorporated, distributed and available in the environment  Inter operate with other technological system (hardware, networks, software)  Personalized according to the user

Goals of the prototype  Identification of a user  Localization of a user  Transitory coalition of devices  Pervasiveness: –Integration in a real living environment –Fluid usage –Transparent user friendly migration of sessions –Zero-configuration  Spontaneous networking and service discovery  To cope with heterogeneity of devices and hardware, networks  Keeping the system in a clean state

Hardware Architecture

Software Architecture  Operating systems –Windows –Linux  Software –Java { J2ME, RMI, JINI}  Networks –Bluetooth –X10 –WiFi –LAN

Architecture  Jini Federation are used to structure services and communication –Rooms  for instance, to support location-awareness  living room, kitchen, etc. –Logically related services and devices  Identification services ( user log, sécurity, etc.)  Lighting control system  Heating, Ventilation and Air Conditioning systems (HVAC) –Example  A lamp using X10 could be part of the federations “Kitchen”, “X10 Devices” and “Electrical Devices”  Federations are used to: –locate and use other services –search for and select relevant services –discard or use a service

General Description  Pervasive messaging system  First steps towards a more sophisticated pervasive cognitive assistance system

Initial configuration  Basic Jini setup –HTTP Server for file distribution –Reggie  lookup service to allow registration to service discovery  Domus Server –Provide basic Domus architecture info and services –Provides a shared HTTP server to distribute source files  Security Server –Provide a database of user names and passwords

Scenario 1  Goals –Enable user detection and localization –Integration of heterogeneous networks  X10 and LAN  When someone enters the room, –Motion detectors gets triggered –The login screen is displayed (pervasive)

Scenario 1: Motion detector User goes through the door in a normal motion Motion detectors gets triggered X10 messages are received by the X10 Server X10 Server X10

Domus Room A Agenda Server Domus Server Security Server X10 Server Agenda Client Motion Detector Sensor A Sensor B Someone is in the room The agenda client prepares the login screen The user enters his password Authentication of the user X10 Server transform codes from electrical to computer format X10 server feeds new X10 codes to motion detector application Motion Detector establish that someone has entered the room And notify the interested applications The session begins

Scenario 2: Pervasiveness  Goals –Seamlessly changing device –Use a device with more appropriate capabilities  display  wireless  Location –Continue working in the application  The session is restored where it was left off  Case A - User switches directly to another device  Case B – User transfers his session to the server for later use

Scenario 2 A Domus Kitchen Room A Agenda Server Domus Server Security Server Agenda Client Agenda Client Session The user choose the appropriate device The user logs on The session is transferred The server authenticates The session is restored

Scenario 2B Domus Federation Room A Federation Agenda Server Domus Server Security Server Agenda Client Agenda Client Session Same as scenario 2A But session moves through the server

Scenario 3  Goals –Spontaneous networking and service discovery –Keeping the distributed system in a “clean” state –No messages are delivered twice –Towards transitory coalition of devices  The agenda tries to notify a user of an upcoming appointment

Scenario 3: Feedback Domus Kitchen Agenda Server Domus Server Security Server Feedback Server Room A Agenda Client Message Client Agenda Client Message Client Appointment An appointment is soon Server needs to notify the user A And Send message to feedback server Locate and send message to clients A The user is authenticated Confirmation sent back to the feedback server Remaining messages are removed Confirmation is sent back to agenda server The appointment has been acknowledged by the user

Properties of the distributed architecture  Decentralized  No main computer  No need for a super fast or powerful computer  Robust  Some services still remain available in case of partial crash or failure  Spontaneous networking  Integration of heterogeneous networks  Service discovery  Flexible

Conclusion  This system has been used to: –Integrate sensing and information devices –Deliver information to the user  Dynamic cooperation of –heterogeneous devices –heterogeneous networks (WiFi Bluetooth LAN X10)  Pervasiveness –Localization of the user –Session migration –Keeping the distributed system in a clean state  Low cost of hardware and software development

Future Works  Physical Identification of a user –Automatic login –Smart tags  Networks –Integrating Bluetooth –Choosing the right network protocol to deliver a message (Luc Bergevin)  Enhancing security (software and Java)  Improving and adding features to the messaging system

Scenario 2B Domus Federation Room A Federation Agenda Server Domus Server Security Server Agenda Client Agenda Client Session No clients are available to switch to The session is sent to the server A client becomes available The user logs in The server authenticates The session is restored