Saturday, 23 February 2013

Dear Friends,Here are some interesting reads that we have found!!!

Wearable Computing: Wearable computing facilitates a new form of human-computer interaction comprising a small body-worn computer (e.g. user-programmable device) that is always on and always ready and accessible. In this regard, the new computational framework differs from that of hand held devices, laptop computers and personal digital assistants (PDAs). The 'always ready' capability leads to a new form of synergy between human and computer, characterized by long-term adaptation through constancy of user-interface.What is a wearable computer?A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactive constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities. The most salient aspect of computers, in general, (whether wearable or not) is their reconfiguration and their generality, e.g. that their function can be made to vary widely, depending on the instructions provided for program execution. With the wearable computer (Wear-comp), this is no exception, e.g. the wearable computer is more than just a wristwatch or regular eyeglasses: it has the full functionality of a computer system but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer. This is what sets the wearable computer apart from other wearable devices such as wristwatches, regular eyeglasses, wearable radios, etc.. Unlike these other wearable devices that are not programmable (reconfigurable), the wearable computer is as re configurable as the familiar desktop or mainframe computer. Wearable computing will now be formally defined in terms of its three basic modes of operation and its six fundamental attributes.Operational modes of wearable computingThere are three operational modes in this new interaction between human and computer: Constancy: The computer runs continuously, and is 'always ready' to interact with the user. Unlike a hand-held device, laptop computer, or PDA, it does not need to be opened up and turned on prior to use.Augmentation: Traditional computing paradigms are based on the notion that computing is the primary task. Wearable computing, however, is based on the notion that computing is NOT the primary task. The assumption of wearable computing is that the user will be doing something else at the same time as doing the computing. Thus the computer should serve to augment the intellect, or augment the senses.Mediation: Unlike hand held devices, laptop computers, and PDAs, the wearable computer can encapsulate It doesn't necessarily need to completely enclose us, but the concept allows for a greater degree of encapsulation than traditional portable computers. There are two aspects to this encapsulation: Solitude: It can function as an information filter, and allow us to block out material we might not wish to experience, whether it be offensive advertising, or simply a desire to replace existing media with different media. In less severe manifestations, it may simply allow us to alter our perception of reality in a very mild sort of way.Privacy: Mediation allows us to block or modify information leaving our encapsulated space. In the same way that ordinary clothing prevents others from seeing our naked bodies, the wearable computer may, for example, serve as an intermediary for interacting with entrusted systems, such as third party digital anonymous cash 'cyber wallets'. In the same way that martial artists, especially stick fighters, wear a long black robe that comes right down to the ground, in order to hide the placement of their feet from their opponent  wearable computing can also be used to clothe our otherwise transparent movements in cyberspace. Although other technologies, like desktop computers, can help us protect our privacy with programs like Pretty Good Privacy (PGP), the Achilles tendon of these systems is the space between us and them. It is generally far easier for an attacker to compromise the link between us and the computer (perhaps through a so-called Trojan horse or other planted virus) than it is to compromise the link between our computer and other computers. Thus wearable computing can be used to create a new level of personal privacy because it can be made much more personal, e.g. so that it is always worn, except perhaps during showering, and therefore less likely to fall prey to covert attacks upon the hardware itself. Moreover, the close synergy between the human and computers makes it harder to attack directly, e.g. as one might peek over a person's shoulder while they are typing, or hide a video camera in the ceiling above their keyboard. Furthermore, the wearable computer can take the form of undergarments that are encapsulated in an outer covering or outerwear of fine conductive fabric to protect from an attacker looking at radio frequency emissions. The actual communications between the wearer and other computers (and thus other people) can be done by way of outer garments, which contain con formal antennas, or the like, and convey an encrypted bit stream. Because of its ability to encapsulate us, e.g. in embodiment of wearable computing that are actually articles of clothing in direct contact with our flesh, it may also be able to make measurements of various physiological quantities.Wearable computing is a framework for enabling various degrees of each of these three fundamental modes of operation.While individual embodiment of wearable computing may use some mixture of these concepts, the signal path depicted in Fig 2 provides a general framework for comparison and study of these systems. The signal paths typically each, in fact, include multiple signals, hence multiple parallel signal paths are depicted in this figure to make this plurality of signals explicit.
Regards

Meen`Ash

No comments:

Post a Comment