Dear Friends,Here are some interesting reads that we have found!!!
Wearable
Computing: Wearable computing facilitates a new form of
human-computer interaction comprising a small body-worn computer (e.g.
user-programmable device) that is always on and always ready and accessible. In
this regard, the new computational framework differs from that of hand held
devices, laptop computers and personal digital assistants (PDAs). The 'always
ready' capability leads to a new form of synergy between human and computer,
characterized by long-term adaptation through constancy of user-interface.What
is a wearable computer?A wearable computer is a computer that is
subsumed into the personal space of the user, controlled by the user, and has
both operational and interactive constancy, i.e. is always on and always
accessible. Most notably, it is a device that is always with the user, and into
which the user can always enter commands and execute a set of such entered
commands, and in which the user can do so while walking around or doing other
activities. The most salient aspect of computers, in general, (whether wearable
or not) is their reconfiguration and their generality, e.g. that their
function can be made to vary widely, depending on the instructions provided for
program execution. With the wearable computer (Wear-comp), this is no exception,
e.g. the wearable computer is more than just a wristwatch or regular
eyeglasses: it has the full functionality of a computer system but in addition
to being a fully featured computer, it is also inextricably intertwined with
the wearer. This is what sets the wearable computer apart from other wearable
devices such as wristwatches, regular eyeglasses, wearable radios, etc.. Unlike
these other wearable devices that are not programmable (reconfigurable), the
wearable computer is as re configurable as the familiar desktop or mainframe
computer. Wearable computing will now be formally defined in terms of its three
basic modes of operation and its six fundamental attributes.Operational
modes of wearable computingThere are three operational modes in this new
interaction between human and computer: Constancy: The computer runs continuously,
and is 'always ready' to interact with the user. Unlike a hand-held device,
laptop computer, or PDA, it does not need to be opened up and turned on prior to
use.Augmentation: Traditional computing paradigms
are based on the notion that computing is the primary task. Wearable computing,
however, is based on the notion that computing is NOT the primary task. The
assumption of wearable computing is that the user will be doing something else
at the same time as doing the computing. Thus the computer should serve to
augment the intellect, or augment the senses.Mediation: Unlike hand held devices, laptop
computers, and PDAs, the wearable computer can encapsulate It doesn't
necessarily need to completely enclose us, but the concept allows for a greater
degree of encapsulation than traditional portable computers. There are two
aspects to this encapsulation: Solitude: It can function as an information
filter, and allow us to block out material we might not wish to experience,
whether it be offensive advertising, or simply a desire to replace existing
media with different media. In less severe manifestations, it may simply allow
us to alter our perception of reality in a very mild sort of way.Privacy: Mediation allows us to block or modify
information leaving our encapsulated space. In the same way that ordinary
clothing prevents others from seeing our naked bodies, the wearable computer
may, for example, serve as an intermediary for interacting with entrusted systems, such as third party digital anonymous cash 'cyber wallets'. In the same
way that martial artists, especially stick fighters, wear a long black robe
that comes right down to the ground, in order to hide the placement of their
feet from their opponent wearable computing can also be used to clothe our
otherwise transparent movements in cyberspace. Although other technologies,
like desktop computers, can help us protect our privacy with programs like Pretty
Good Privacy (PGP), the Achilles tendon of these systems is the space between
us and them. It is generally far easier for an attacker to compromise the link
between us and the computer (perhaps through a so-called Trojan horse or other
planted virus) than it is to compromise the link between our computer and other
computers. Thus wearable computing can be used to create a new level of
personal privacy because it can be made much more personal, e.g. so that it is
always worn, except perhaps during showering, and therefore less likely to fall
prey to covert attacks upon the hardware itself. Moreover, the close synergy
between the human and computers makes it harder to attack directly, e.g. as one
might peek over a person's shoulder while they are typing, or hide a video
camera in the ceiling above their keyboard. Furthermore, the wearable computer
can take the form of undergarments that are encapsulated in an outer covering
or outerwear of fine conductive fabric to protect from an attacker looking at
radio frequency emissions. The actual communications between the wearer and
other computers (and thus other people) can be done by way of outer garments,
which contain con formal antennas, or the like, and convey an encrypted bit stream. Because of its ability to encapsulate us, e.g. in embodiment of
wearable computing that are actually articles of clothing in direct contact
with our flesh, it may also be able to make measurements of various
physiological quantities.Wearable computing is a framework for enabling various
degrees of each of these three fundamental modes of operation.While individual embodiment of wearable
computing may use some mixture of these concepts, the signal path depicted in
Fig 2 provides a general framework for comparison and study of these systems.
The signal paths typically each, in fact, include multiple signals, hence
multiple parallel signal paths are depicted in this figure to make this
plurality of signals explicit.
Regards
Meen`Ash
No comments:
Post a Comment