Open Access   Article Go Back

Pervasive Computing: A New Horizons

Kiran Mangesh Pradhan1

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 1137-1140, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.11371140

Online published on Mar 31, 2019

Copyright © Kiran Mangesh Pradhan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kiran Mangesh Pradhan, “Pervasive Computing: A New Horizons,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1137-1140, 2019.

MLA Style Citation: Kiran Mangesh Pradhan "Pervasive Computing: A New Horizons." International Journal of Computer Sciences and Engineering 7.3 (2019): 1137-1140.

APA Style Citation: Kiran Mangesh Pradhan, (2019). Pervasive Computing: A New Horizons. International Journal of Computer Sciences and Engineering, 7(3), 1137-1140.

BibTex Style Citation:
@article{Pradhan_2019,
author = { Kiran Mangesh Pradhan},
title = {Pervasive Computing: A New Horizons},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {1137-1140},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3979},
doi = {https://doi.org/10.26438/ijcse/v7i3.11371140}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.11371140}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3979
TI - Pervasive Computing: A New Horizons
T2 - International Journal of Computer Sciences and Engineering
AU - Kiran Mangesh Pradhan
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 1137-1140
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
388 277 downloads 208 downloads
  
  
           

Abstract

Pervasive Computing environment gracefully integrates networked computing devices from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environment. Service discovery is an essential element for pervasive computing to accomplish “anytime, anywhere” computing without users’ active attention to computing devices and network services. Privacy and security issues, however, have not been properly addressed. Therefore, devices and network services are unprotected; personal privacy is sacrificed; and devices and network services are inconvenient to use. In this paper, we will present what is pervasive computing and its applications. In particular, I will focus on how pervasive computing provides various features like history, principle, applications, characteristics, problems and challenges.

Key-Words / Index Term

ICT, Ubiquitous Computing, Calm Technology

References

[1] H. Pourreza and P. Graham. On the fly service composition for local interaction environments. In IEEE International Conference on Pervasive Computing and Communications Workshops, page 393. IEEE Computer Society, 2006.
[2] S. B. Mokhtar, N. Georgantas, and V. Issarny. Cocoa: Conversation-based service composition in pervasive computing environments. Proceedings of the IEEE International Conference on Pervasive Services, 2006.
[3] Z. Song, Y. Labrou, and R. Masuoka. Dynamic service discovery and management in task computing. Mobiquitous, 00:310-318, 2004.
[4] M. Vallee, F. Ramparany, and L. Vercouter. Flexible composition of smart device services. In International Conference on Pervasive Systems and Computing (PSC05), pages 165-171. CSREA Press, 2005.
[5] A.C. Huang and P. Steenkiste. A Flexible Architecture for Wide-Area Service Discovery, The Third IEEE Conference on Open Architectures and Network Programming (OPENARCH 2000), March 26-27, 2000.
[6] C. Adjih, P. Jacquet, and L. Viennot, “Computing Connected Dominated Sets with Multipoint Relays,” Technical Report 4597, INRIA-Rapport de recherche, Oct. 2002
[7] S Mahajan, "Convergence of IT and Data Mining with other technologies ", International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-04, pp (31-37), Aug 2013
[8] Jaskaranjit Kaur and Gurpreet Kaur , "Clustering Algorithms in Data Mining: A Comprehensive Study", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, Page No (57-61), Jul -2015.