.0 3.5 34 3.3 3.
2 Contents
3.1 Computing and
for Concept
Architectural
Ubiquitous Properties
Modelling UbiquitousConcept UbiCom-Systems: Scope, Syllabus
of 3
Properties.
Ubiquitous
of Properties
of
System the Computing
Ubiquitous
Design Ubiquitous
Key
Ubiquitous Ubiquitous
SmartComputing
Environment
for of
UbiCom-Systems Applications
Computing Ubiquitous
Computing DEI Computing
Ubiquitous
System
Model. and
Computing UnitIII
lnteraction Advantages,
(3-1) and Computing,
Enironment
Scope
Properties
:
Smart
Ubiquitous
Modelling
Interaction.
DEI
Model
Computing
the
Architectural
Key
Applications
Ubiquitous
Design
(3-2) Ubiquitous Corputing
3.1 Concept of Ubiquitous Computing
Ubiquitos computing (ubicomp) is a pOst-desktop model of human-computer interaction in
which information pressing has bcen thoroughly integrated into everyday objects and
human
activities. More fomally Ubiquitous computing is defined as "machines that fit the
environment instead of forcing humans to enter theirs".
Ubiquitous computing is a concept where computing is made to appear everywhere using
Pervasive
any device. in any locabon and in any format. Ubiquitous computing, also called
2 computing
All models of ubiquitous computing share a vision of small, inexpensive, robust networked
to
processing devices. distributed at allscales throughout everyday life and generally turned
distinctiy common-place ends. For example, a domestic ubiquitous computing environment
biometric monitors
might interconnect lighting and environmental controls with personal
in a room might be
woven into clothing so that illumination and heating conditions
modulated. continuously and imnperceptibly.
been mainly driven by the
" The growth in the field of Ubiquitous Computing has advancement in
advancement inTechnology. The revolution of smart phones and tablets,
broadband technologies,
3 communication networks coupled with the wireless and
through SOA (Service
sophistication in the development of sensors, seamless integration
the highlyavailable and
Oriented Architecture) and the emergence of Cloud Computing for
computing goals.
resource pooling capabilities taking it closer to the ubiquitous
environment produces large
The rapid growth in the number of sensors in the ubiquitous
analyze ("Big Data'") at real
volume of data. In order to handle these data to process and
time based on the context is vital.
networked, making its users more
Ubiquitous technology is often wireless, mobile, and
computing is changing
connected to the world around them and the people in it. Ubiquitous
our daily activities in avariety of ways.
ubiquitous computing environments as learning environments in which all
We cn define
access to a variety of digital devices and services, including computers
S. students have
connected to the Internet and mobile computing
devices, whenever and wherever they need
them.
many-to-many than one-to-one or one-to
Ubiquitous computing, then, is more focused on
and includes the idea of technology being always available but not itself the focus of
many,
learning.
up-thrust for knowledge
TECHNICAL PUBLICATIONS- an
Smart Computing (3 - 3) Ubiquitous Computing
An example might be a home environment that adjusts as user enter a room. The lighting
t and temperature might adjust to user comfort level or a coffee maker may start to brew a
cup of coffee just the way user like it in the morning.
. In acity environment in a heat wave the city electric grid may adjust power levels going
into homes and businesses to avoid a power outage or to adjust power costs up to lower
demand.
The context awareness plays major role to collect quality information. This can be done
through sensing the human eyes and ears and skin to retrieve the information. Recognizing
the user behaviour needs and intents are important part of the context aware services. Also
the data needs to be accessed from anywhere.
For example, with the help of VMWare, The desktop virtualization technology makes it
possible to access virtual desktop services from any location and any device.
The goal of pervasive computing is to make devices "'smart," thus creating a sensor network
capable of collecting, processing and sending data and ultimately, communicating as a
means to adapt to the data's context and activity; in essence, a network that can understand
its surroundings and improve the human experience and quality of life
Context-aware/awareness originated as a term from ubiquitous computing or pervasive
a computing which sought to deal with linking changes in the environment with computer
systems.
Context aware systems are concerned with 3A:
* DRAW0IAGRAT
FRom
1. Acquisition of context (e.g. using sensors to perceive a situation),
2. Abstraction and understanding of context(e.g. matching a perceived sensory stimulus to
Gogo
a context), and
3-Application based on the recognized context(e.g. triggering actions based on context)
Active context awareness : "An application automatically adapts to discovered context by
changing the application's behavior"
P'assive context awareness : An application presents the new or updated context to an
interested user or makes the context persistent for the user to retrieve later.
Contextual information is a set of data, gathered from sensors, applications and users, that
contorms to a context model and provides a snapshot that approximates the real-world
context at a given point in time.
TECHNICAL PUBLICATIONS®. an up-thrust for knowledge
(3- 4)
Smart Computing Ubiquitous Computin
Context-aware computing issues:
useful in dynamic, mobile environments. But what is
1. Context is
most
situations? the releva
information in various
2. Mobilitv results in continuous updates of context information. How can we etticien
manage this ?
share context?
3. How can we information 2
handle uncertainty ofcontext
4. How do we
and management of context
5. How do we ensure privacy control information ?
common understanding of implications and semantics of (shared
6. How do we reach a
context information?
How to effectively use context with resource restrictions ?
7.
or context history ?
8. How to exploit the past context
3.1.1 Context-Aware Computing
Location of identifiable entities (usually people) is a very regular piece of context uged in
ubicomp application development. The main general applications have been GPS-based ow
navigation systems and handheld 'tour guide' systems that differ the content disnlavel
(video or audio) by a handheld unit given the user's physical location in an exhibit area.
There is more to context than position (where) and identity (who). Although atül
definition of context remains an exclusive research challenge, it is clear that in addition to
who and where, context awareness involves :
1. When with the exception of withtime as an index intoa captured record or summanzng
how long aperson has been at aparticular location, most context driven applicatioS
unaware of the passage of time.
2. What way of interpreting the what' of context is to see it as the focus of attention ol di
event
or more people during a live event. Knowledge of the focus of attention at a live
can inform a better capture of that event.
3. Why even more challenging than perceiving 'what' a person is doing is understandint
'why' they are doing it. Sensing other ways of contextual data that could give
indication of aperson's affective state.
" There are several of indoor characteristics
positioning schemes as well, with conflicting
particularsolution
terms of cost, range, granularity and
likely to ever meet all requirements.
requirements for tagging, and no
TECHNICAL PUBLICATIONS an up-thrust for knowledge
Ubiquitous Computing
(3 - 5)
Smart Computing
Ubiquitous om puting
1.2 Advantages and Disadvantages f
1. Advantages
effortless.
information quickly, efficiently and
Manage
new technologies.
Remove complexity of as well as outputs,
computing can also keep record of resource usage, inputs
Ubiquitous times of high load or for better
management of resources during
allowing for better
frame.
distribution of resources across a time
take
relevant information stored on networks, allowing them to
Convenient access to
and anytime.
easily action anywhere
2. Disadvantages
Connection is slow
Operating cost is high
implement pervasive computing while maintaining proper
" It is potentially difficult to
privacy standards.
implications
implications of aware technologies : Pervasive computing may have
Social ability to gather sensitive data,
for
and safety as a result of its
for privacy, security attitudes
relating to user's everyday interactions, movements, preferences and
example,
without user intervention and consent.
loT
3.1.3 Difference between Ubiquitous Computing and
IoT
Ubiquitous computing
Ubiquitous computing is all about having The Internet of Things (IoT) is about having
computational capability in many different these objects in our environment all
objects in our environment. Things like connected to an internet.
Fridges, TV, Cars etc all having some
computational power.
Computing is made to appear anytime, Computing is Made to only Devices
everywhere. connected to internet. IoT can be made to
appear as UbiComp
Ubiquitous computing fall into Human to loT fall into Machine to Machine interaction
Machine interaction.
TECHNICAL PUBLICATIONs an up-thrust for knowledge
Smart Computing (3 - 6) Ubiquitous Computing
3.2 Ubiquitous Computing Applications and Scope
" In akitchen with ubiquitous computing, a refrigerator might communicate with cupboards
survey suitably tagged food items and plan menus using food available on hand, The
refrigerator would wam owners about spoiled food. Communicating with the Internet, the
system could infom humans about manufacturer recalls.
" Communications as a cross-application, the communications area affects all foms of
exchange and transmission of data, information, and knowledge. Communications thus
represents aprecondition for all information technology domains.
Logistics: Tracking logistical goods along the entire transport chain of raw materials.
semi-finished articles, and finished products closes the gap in IT control systems between
the physical flow and the information flow. This offers opportunities for optimizing and
automating logistics that are already apparent today.
Military:The military sector requires the provision of information on averting and
fighting external threats that is as close-meshed, multi-dimensional, and interrelated as
possible. This comprises the collection and processing of information. It also includes the
development of new weapons systems.
Production : In the smart factory, the flow and processing of components within
manufacturing are controlled by the components and by the processing and transport
stations themselves. Ubiquitous computing will facilitateadecentralized production system
that will independently configure, control and monitor itself.
Smart homes : In smart homes, a large number of home technology devices such as
heating. lighting, and ventilation and communication equipment become smart objects that
automatically adjust to the needs of the residents.
E-commnerce : The smart objects of ubiquitous computing allow for new business models
with a variety of digital services to be implemented. These include location-based services,
a shift from selling products to renting them, and software agents that will instruct
components in ubiquitous computing to initiate and carry out services and business
transactions independently.
" Inner security : ldentification systems, such as electronic passport and the already
abundant smart cards, are applications of ubiquitous computing in inner security. In the
future, monitoring systems will become increasingly important - for instance, in protecting
the environment or surveillance of key infrastructure such as airports and the power grid.
TECHNICAL PUBLICATIONS- an up-thrust for knowiedge
Smart Computing (3 - 7) Ubiquitous Computing
Medical technology : Increasingly autarkic, multifunctional. miniaturized and networked
Redical applications in ubiquitous computing offer awide range of possibilities for
monitoring the health of the ill and the elderly in their own homes, as well as for intelligent
implants.
0 3.3 Properties of Ubiquitous Computing
Three main properties for UbiCom Systems were proposed by M. Weiser. namely
distributed computation, invisibility and context-awareness.
The distributed computation means the computers/systems need to be networked.
distributed and transparentlyaccessible. They can interact with humans as well as with each
others.
to be more
The invisibility property means that the computer interaction with humans needs
hidden.
implies that in order to
Third property proposed by weiser is context-avareness that
to make
optimize system operation in their physical and human environment it is necessary
the systems aware of environmental context.
by
Computers can handle a multiplicity of dynamic actions and interactions, governed
intelligent decision-making and intelligent organizational interaction. This may entail some
form of artificial intelligence in order to handle
3.4 Modelling the Key Ubiquitous Computing Properties
Ubiquitous computing represents a powerful shift in computation, where people live, work,
and play in a seamless computerae environment, interleaved into the world.
Ubiquitous computing osula a world where people are surrounded by computing
devices and acomputing intrastructure that supports us in everything we do.
Computer systems behave as distributed computer systems that are interlinked using a
communications network. In conventional Infomation Communication Technology (IC)
Systems, the role of the physical environment is restricted. for example. the physical
cnvironment acts as a conduit for electronic communication and power and provides the
physical resources to store data and to execute electronic instructions, supporting a vtua
ICT environment.
COmputer Interaction (HCI) with ICT Systems has conventionally been structured
from kevboard and
using a few relatively expensive access points. This primarily uses input
pointing devices which are fairly obtrusive to interact with.
TECHNICAL PUBLICATIONS- an up-thrust for knowledge
Smart Computing
(3 - 8) Ubiquitous Computing
34.1 Core Properties of UbiCom Systems
IWeiser's vision for ubiquitous computing can be summarised in core requirements :
1. Computers need to be networked. distributed and transparently accessible.
2. Human computer interaction needs to be hidden more.
3. Computers need to be context-aware in order to optimise their operationin their
environment.
" Itis proposed that there are two additional core types of requirements for UbiCom systems ;:
4. Computers can operate autonomously, without human intervention, be self-governed, in
contrast to pure human computer interaction.
5.'Computers can handle a multiplicity of dynamic actions and interactions, governed by
intelligent decision-making and intelligent organizational interaction. This may entail
some form of artificial intelligence in order to handle :
(a) Inconplete and non-deterministic interactions:
(b) Cooperation and competition between members of organisations;
(c) Richer interaction through sharing of context, semantics and goals.
3.4.2 Distributed iCT Systems
" ICT systems are distributed and interlinked. Multiple systems often behave as and appear as
a singie sVStem to the user. i.e., multiple systems are transparent or hidden from the user.
Individual systems may be heterogeneous and may be able to be attached and detached
from the ICT system infrastructure at any time.
" Fig. 3.4.1 shows UbiCom system model. (Refer Fig. 3.4.1 on next page)
Networked ICT devices : Pervasive computers are networked computers. They provide
services that can be locally and remotely accessed.
Ihe properties of ubiquity and transparency are core characteristics of types of distributed
systems.
A final key property of distributed systems is openness. Openness can introduce
heterogeneous functions into a system that are incompatible and make the complete system
unavailable. Openness can reduce availability.
Distributed ICT systems is layered model. Bottom layer is hardware resource layer. Middle
layer is middleware and operating system services. Top layer is human-computer
interaction layer.
TECHNICAL PUBLUCATIONS-an up-thrust for knowledge
Smart Computing (3-9) Ubiquitous Computing
Physical environments Hurnan environments
Physical
Ecological phenomena Parsonal Social
Public
(Living)
(Survive, CPI (Sense. HCI HCI HCI
CPI
Adapt) Adapt) (Cooperate) (Compiete)
implicitHCI
Context Intelligent
Autonomous
Awareness UbiComp
System
Distributed
CCi
Virtual environments
Fig. 3.4.1 : UbiCom system model
34.2.1 Implicit Interaction
Observing communication between humans, we can see that a lot of information is only
exchanged implicitly. The way people interact with each other and also the situation in
which they interact carries information that is often implicitly exploited in the exchange of
messages.
While in a conversation the behaviour of participants as well as what happens in the
Surrounding environment supplies valuable information that is often vital for the
understanding of messages.
n many cases the robustness of human-to-human communication is based on the implhcitly
Introduced contextual information, such as gestures, body language and voice.
Another example is redundancy between body language (e.g. nodding) and spoken
ldisambiguate
anguages information, e.g. in adiscussion
(e.g. the word 'yes'). This implicitly introduced knowledge is also used to
with astudent pointing at acomputer the
term 'sun' has a different meaning than the same tem when on the beach together with
friends: more in depth discussion is given in.
TECHNICAL PUBLICATIONS an up-thrust for knowledge
Smart Computing (3 - 10) Ubiquitous Computing
3.4.2.2 Embodied Reality versus Virtual, Augmented and Mediated Reality
Reality refers to the state of actual existence of things in the physical world.
1. Augmented reality:
Augmented Reality (AR) is an enhanced version of the real physical world achieved b.
means of technology-driven digital visual elements, sound or other sensory stimuli. The
trend among mobile computers and business applications in particular is growing.
" With the increasing collection and analysis of data, one of the primary purposes of
increased reality is to highlight certain characteristics of the physical world, improve its
realisation and gain intelligent and accessible insight that can be applied to real world
applications. Such arge data can inform decision making by enterprises and gain
insights into. inter alia, consumption habits.
2. Virtual reality :
Virtual reality is a high-end user-computer interface that involves real time simulation
and interactions through multiple sensorial channels. These sensorial modalities are
visual, auditory, tactile, smelland taste.
Virtual reality has been made possible by the advent of very fast high-performance
computers. Despite the exponential rise in processor speeds, high-resolution immersive
VRis still not available for mass-market applications and many systems are primarily
research projects.
Desktop virtual reality is a lower-cost alternative. In desktop virtual reality, 3D images
are presented on a normal computer screen and manipulated using mouse and keyboard,
rather than using goggles and data gloves. Many readers may have used such systems
on personal computers or games consoles : flight simulators, or interactive games such
as DOOM.
3.4.3 Three Main Types of Environment Context : Physical, User, Virtual
UbiComn support three main types of external environment context awareness. They are as
follows:
1. Physical environment context : Pertaining to some physical world dimension of
phenomena such as location., time, temperature, rainfall, light level, etc.
2. Hunnan context (or user context or person context) : Interaction is usefully
constrained bv users: in tems of identity: preferences: task requirements: social contes
and otheractivities; user experience and prior knowledge and types of user.
TECHNICAL PUBLICATIONS -an up-thrust for knowtedge
Ubiquitous Computing
SmartComputing (3 - 11)
particular component in a distributed
ICTcontext or virtual environment context : A
internally and externally, locally and
sYstem is aware of the services that are available
remotely, in the distributed system.
Passive Context-Awareness
3.4.4 Active Versus
context-aware systems
4 Passive
user, to inform them of change.
. New context is presented to the
application should change.
User can then explicitly determine if the use of an
the
updated context to an interested user or makes
e An application presents the new or
retrieve later.
context persistent for the user to
Examples include :
(weather meters)
a) Changing information regarding environment
b) Context-based tagging (e.g. by camera)
2. Active context-aware system
Behaviour of the applications change automatically.
changing the application
An application automatically adapts to discovered context by
behaviour.
Examples include :
network speed)
a) Task filtering (e.g. information filtering, based on current wireless
b) Context-base task activation (e.g. routing)
c) Content adaptation (e.g. for people with disability)
d) Location in a call forwarding application
Challenges in context awareness
Ihere are many challenges in modelling contexts :
a) Environmental cues may be inaccurate or erTOneoUs
D) The user contexts may be incorrectly deternined or predicted, or just ambiguous
S) Lack of alignment with cues and the internal representation of contexts
d) The use of
contexts may reduce user privacy
e) Awareness of context shifts or changes in application may overload or distract the u
TECHNICAL PUBLICATIONS an up-thrust for knowledge
(3-12)
Smart Computing
Ubiquitous Computing
3.4.5 Autonomy
Autonomy refers to the property of asystemthat enables a system to control its own action.
independently. An application presents the new or updated context to an interested user or
makes the context persistent for the user to retrieve later.
Autonomous systems are defined as systems that are self-governing and are capable of their
own independent decisions and actions.
Autonomous systems may be goal- or policy-oriented: they operate primarily to adhere to a
policy or to achieve a goal.
1. Reducing human interaction
2. Easing system maintenance versus self-maintaining systems
3.4.6 Intelligence
" It ispossible for UbiCom systems to be context-aware, to be autonomous and for systems
to adapt their behavior in dynamic environments in significant ways, without using any
artificial intelligence in the system.
There are several ways to characterize intelligent systems. Intelligence can enable systems
to act more proactively and dynamically in order to support the following behaviors in
UbiCom systems.
1. Modeling of itsphysical environment
2. Modeling and mimicking its human environment
3. Handling incompleteness Rcad a
4. Handling non-deterministic behavior Undevstand
5. Semantic and knowledge-based behavior wcll
3.5 Ubiquitous System Environment Interaction
" It describes the various types of possible interaction between human, Computer
Fhystcal World. These three communicating parties are considered as environment To
UbiCom systems.
Ubiquitous System Environments are as follows:
(1) The infrastructure of other ICT systems:
(2) The physical world environment;
(3) The human environment.
TECHNICAL PUBLICA TIONSS an up-thrust for knowledge
Smart Computing (3 - 13) Ubiquitous Computing
Dy considering these three environment, various basic types of system environment
interaction occur:
Retween humans and ICT systems, Which is called as Human-Computer Interaction
(HCI).
2 Between ICT systems and the physical world, Which is called as Computer-Physical
world interaction (CPI).
3. Between ICT systems, C2C or CCI.
. In addition, interactions can occur between the non ICT systems such as between different
nhysical world entities and between humans also called social interaction. These types of
interaction allcoexist.
The basic types of system environment interactions are,
1. HCI:Interactions (1) between human (H) and ICT system(C: Computing)
2. CPI : Interaction (|) between ICT systems (C: computing) and physical world (P :
Physical)
3. C2C: Interactions(I) between ICT system (C: conducting to C: computing)
4. H2H or HHI : Interactions between different physical world entitles and Human(H :
Human to H:Human) known as social interaction
3.6 Architectural Design for UbiCom-Systems : Smart DEI Model
" Basic architectural design patterns for ubiquitous 1CT system are smart Devices, smart
Environment and smart Interaction.
Smart devices may also support smart interaction. Smart mobile start devices can be used
for control in addition to the use of static embedded environment devices. Smart devices
may be used to support the virtual viewpoints of smart personal (physical environment)
spaces in a personal space that accompanies the user wherever they are.
*Fig. 3.6.lshows smart DEI model. (Refer Fig. 3.6.1 on next page)
Ubiquitous ICT system architecture consists of:
a) Smart
devices (e.g. personal computer, mobile phones, etc.)
b) Smart environment
Smart interaction(coordinated, rule based, semantics and linguistic based interactions)
TECHNICAL PUBLICATIONs an up-thrust for knowledge
Smart Computing (3- 14) Ubiquitous Computing
Smart DEIModel
Snart Snart Smart
CeviceS Envronments interaction
ASOS Knowledge
N7OS
Intelligent
RTOS
Organisation agent
Se. ce Sensor Contrciler
Virele5S Muiti-Agent
Tag
ata ask Boards Robot |Self"
Pad Tab Dust
Cooperative Corpetitive
Single agent
MEMS Nano iech
Fig. 3.6.1 : Smart DEl model
" The term smart encompasses following characteristics :
About an entity :Active. Digital. Netrworked, Autonomous at some extent, Reconfigurable
and having control of the resources like energy, data storage, etc.
1. Smart devices
Smart device is an electronic gadget that is able to connect, share and interact with its
user and other smart devices. Usually smart devices are small in size and have
computing power of few gigabytes.
Some of the most commonly used smart devices are personal computer, smart phones,
tablets, smart watches. smart glasses etc. They can be accessed as a single portal which
can access multiple application services and performing multiple residing functions
locally on device or remotely on servers. Typically being personal devices, smart
devices have specific owners or users.
2. Weiser's ICT device forms: Tabs, Pads and Boards
When we think of computers what comes in our mind is the stand alone or connected
devices capable of performing multiple applications and typically poses a set o
peripheral devices such as sereen display for data output and keyboard or pointing
devices for input.
TECHNICAL PUBLICATIONS an up-thrust for knowledge
SmartComputing (3 - 15) Ubiquitous Computing
. In our day to day life we come across the devices/machines having single embedded
Romnuters (house hold devices) or complex machine having multiple computers
embedded.
Due to enhancement in technology computing devices can be manufactured to be more
nortable, small in size, lightweight, low in cost, more portable which can be used by
human casily with much disturbance
Service access by smart mobile devices has following characteristics :
L Software and hardware service are not used continuously. as resources are finite and
not continually available.
2, Continually available service discovery : Available services can be discovered
dynamically. Also, availability of local access network can be discovered.
3. Situated and self-aware
Typically the smart devices take into consideration the local physical environment
views, maps and local services like restaurants and hotels, known as contextual
information.
Generally mobiles function with respect to some reference location known as home
location. The services for accessing the mobiles are charged by service providers.
according to this reference point.
" As device location and position is not fixed mobile devices are resources constrained
devices having limited local hardware and resources like power, screen, CPUetc.
Wise and optimal use of these resources is needed to avoid the wastage, for example:If
ile formats of audio file for sender and receiver are different, then it will lead to poor
ime and resource utilization. Also devices should be able to adapt to support difierent
functions, according to available energy.
3.6.1 Smart Interaction
facilitate UbiCom with the use of large amount ofsmart devices and smart environment,
y needtointeract continuously on various levels without interruption.
" To provide
continuous interaction in between applications the physical world and human
" envir
In any
onments Infrastructure smart interaction is required.
designed to perform the defined task. It is not
system the different components are
possible for asingle component to accomplish the complete task.
TECHNICAL PUBLICATIONS an up-thrust for knowiedge
Smart Computing (3 - 16) Ubiquitous Computing
" For this purpose the components need to interact with each other to achieve acomnhos
goal. Typically the components interact with cach other indifferent levels i.e. from basic
start.
Basic interaction uses fixed interaction protocols between the components whereas in Smart
interaction richer interaction protocols are used.
Basic interaction :
Basic interaction between two dependent parties :Sender and Receiver.
The following points need to be taken care of,
1. Address of the receiver must be knowvn beforehand.
2. Both the parties must agree on the structure and meaning of the message in advance.
3. Sequencing of the messages must be known in advance
4. The contents of the messages may vary.
" Two main types of interaction are synchronous and asynchronous.
Review Questions
1. Define ubiquitous computing. discuss context-aware computing issues.
2. Explain all core properties of ubiquitous computing ?
3. Draw and explain architectural designof ubiquitous computing systems
Smart DEI Model.
4. Explain diference benween ubiquitous computing and loT.
5. Explain various application of ubiquitous computing.
6. DiscuSs distributed ICT systems.
7. Explain three main types of environment context.
8. Explain with example active and passive context-awareness
9. Write short note on ubiquitous system environment interactio.
O00
TECHNICAL PUBLUCATIONS. an up-thrust for knowledge