Safeswim: Overhead Vision to Help People See Better

Total Page:16

File Type:pdf, Size:1020Kb

Safeswim: Overhead Vision to Help People See Better SafeSwim: Overhead vision to help people see better Steve Mann, Christina Mann, Faraz Sadrzadeh-Afsharazar, Zhao Lu, Jiten Saini, Jacqueline Lian MannLab Canada, Toronto, Ontario, Canada, M5T 1G5 Abstract—Traditionally video surveillance consists of overhead Efferent Sensors Surveillance Efferent Sensors cameras to help authorities such as lifeguards or security profes- Efferent Mind Body Mind Afferent Body Human Machine A erent sionals monitor individuals. This monitoring, if in service of the ff Senses Cityscape drawing from Wikimedia Commons Mind monitored individuals, serves them only indirectly. More recently, Body Human Machine Humachine Smart City a new kind of sensing called “sousveillance” has emerged, as a Afferent Senses Sousveillance form of sensing by, and in direct service to, individuals. In this Human Humachine Humachines paper, we explore an overhead camera (e.g. aerial drone-based Fig. 1: Self, technology, and society as closed-loop feed- videography) to help create a form of real-time seeing aid, with specific application to help one or more individual swimmers see back systems (Humanistic Intelligence). Note the fractal (self- better and navigate, e.g. to avoid collisions with other swimmers similar) nature of humanistic intelligence, society, and the (or the walls) in pools, as well as navigating in lakes, rivers, smart city, etc.. and other bodies of open water. Additionally the system can be used to teach swimming (e.g. learn by seeing from a birds-eye- view) as well as to gamify swim-based activities. SafeSwim (and sousveillance in general) is a new form of “seeing” in which time, we adapt to seeing the world in this new way, and the those being watched have direct visual access to the live video technology becomes, in some sense, “part of us”, through the stream. It is a direct departure from traditional surveillance long-term HI feedback loop [2]. where authorities such as police or lifeguards watch individuals In a given space or context, we often have more than one without giving them direct access to a live video stream. humachine, e.g. we might have 2 or more swimmers wearing Index Terms—Wearable computing, Wearables, Sensing, Mo- bile computing, Swimming, Drones, Sousveillance, Machine vi- the “Smart Swim” or other augmented reality eyeglass. Thus sion. we need to think of Minsky et al.’s concept of the “Society I. INTRODUCTION of Intelligent Veillance” in which HI (wearable AI) applies across a community [8]. Wearable computing [1] combined with wearable AI [2] As we design and build smart pools, “Smart Beaches”, smart provides a new way of sensing and undertanding the enviro- buildings, smart streets, and smart cities, we need to also ment around us. Wearable sensing technologies can create new consider the idea of “smart people”, i.e. putting “intelligence” and extended human sensing capabilities which work similarly (sensors and computation) on people, not just buildings and to sensory organs. This concept is explored in Fig 1. The lampposts and the skies above them. In this way, humachines human mind may be regarded as one or more feedback loops. are more than just a nexus of human and machine, they form The human may similarly be regarded as a feedback loop a new society and a new concept of technology-and-society. between the mind and body, i.e. efferent nerves carry signals Therefore, HI feedback loops can be understood and classified from the mind to the body, and afferent nerves carry signals according to the following nested taxonomy: from the body to the mind [3], thus completing a closed loop feedback control system [4], [5], shown in leftmost Fig. 1. • Self and technology (e.g. combined human+machine); Humanistic Intelligence (HI) [6], also known as Wearable • Self and society (interaction between humans, huma- AI [2], is a framework for wearable computers and other forms chines, etc.), which includes self and technology; of closed-loop feedback between a human and machine(s). • Self and the environment (interaction between the aug- Technologies like shoes, wearable computers, bicycles, and mented human and the natural or built environment, e.g. automobiles are technologies that “become part of us.” This cyborg-city interaction), which includes self, technology, symbiosis between human and machine is often referred to as a and society. “humachine” [7], “cyborg” [5], bionic, or “augmented human”. This human-centered taxonomy considers the sensory infor- Humanistic technologies typically consist of sensors in the mation available at three key levels as shown in Fig 1). The machine, and our human senses, forming a feedback loop, as third layer, “Self and the environment”, becomes especially shown in the center part of Fig. 1. The example shown here clear when we finally grant individuals a birds-eye-view of is a Vuzix “Smart Swim” eyeglass or other similar augmented large bodies of open water, where an individual swimmer can swimglass. After wearing an eyeglass for a long period of see not only their stroke (i.e. use our system as a way to learn how to swim), but also the water conditions overall, such Authors thank Vuzix (Paul Travers) for equipment donation, and members of SwimOP™ (the online “Swim at Ontario Place” group we created), as algae blooms, floating garbage in some places, etc.. This including Zhao Lu and Trevor McKee, for help with beach cleanup efforts. insight gives an individual swimmer a new way to navigate. For example, he or she can choose to swim along the path-of- Tresspass Robbery prevention prevention least-pollution, or along the path-of-maximum-safety. Violence prevention Pollution or safety or other disiderata/undisiderata can be overlaid in an augmented reality as a field, e.g. a danger- field or safety-field, such as to guide a swimmer using this Security new birds-eye-view, thus contextualizing sousveillance at its Public (crime safety highest level – “Self and the environment”. prevention) Operational This calls for a new way of thinking, in which smart pools, (organizational) smart beaches, and smart cities provide direct, and immediate efficiency feedback to individual citizens, hence promoting the living Surveillance Safety (accident quality of the end-users in the system. prevention) Individual's Physical health A. Safety and security tree Affective To understand our new way of thinking and contrast it Personal Personal Mental with traditional surveillance, we construct a mental model safety Suicurity efficiency (corruption Sousveillance based on a tree. We can think of surveillance (security, etc.) prevention) VMP (memory aid) as forming the trunk of a tree with various branches such as (1) crime prevention, (2) operational efficiency (e.g. so Seeing aid lifeguards can watch swimmers and see how big crowds are Fig. 2: The “Securitree”(Security Tree) model getting, and thus know where to deploy additional staff), and (3) accident prevention (e.g. automatic computer-assisted drowning detection), etc.. This model matches what one typically finds in smart city planning. We propose, also, that there be roots for the tree, and that the roots form various aspects of sousveillance (inverse surveillance), such as to support personal safety, individual health and well-being, etc. The “Securitree” is composed of two main sections, with the Fig. 3: Underwater virtual reality has been a well-established parts of the tree above the ground representing surveillance and practice over the past 20 years or so. It provides a full the parts of tree below the ground representing sousveillance. immersive/submersive experience in which it is very easy to We regard security as the trunk of a tree having surveillance suspend disbelief while floating in a virtual world. branches like public safety, operational efficiency, and crime prevention. There are surveillance sub-branches, e.g. crime prevention has sub-branches such as robbery prevention, vio- interactive virtual reality) [9] and VR float tanks [10], [11] lence prevention, . The tree is rooted in sousveillance, with using the Mersivity™ underwater VR headset (Fig 3). roots like personal safety, “suicurity” (corruption prevention), personal efficiency, and individual’s health. Sousveillance has D. Background sub-branches, e.g. individual health has sub-branches such as The tracking of swimmers is a well-researched field. One physical, affective, mental, (which itself has sub-roots VMP, of the state-of-the art swimmer tracking algorithms uses non- seeing aid, . ), as shown in Fig 2. linear joint transform and colour histogram analysis to ac- B. EyeTap curately detect the locations of the swimmers. Such a hybrid approach is needed for the reliable detection of the swimmers. The EyeTap is a wearable device worn in front of one In such an environment, the rapid movements of swimmers, or both eyes, acting as if the eye itself is a camera. A bodily rotations, as well as water splashes can hinder the display overlaying computer generated imagery can be viewed reproducibility of the detection [12], [13]. from the right eye. The left eye is unobstructed. Similar to the EyeTap, our SafeSwim™ system allows the user to II. METHODOLOGY be fully immersed in their surroundings. The user is able A. Proposed system architecture to see unobstructed through one eye, while their other eye has a display providing real-time safety-oriented situational In a swimmer’s context, in order to close the HI sensory awareness as demonstrated in Fig 7 from video processed from feedback loop, some form of sensory technology is required. an overhead DJI Mavic Mini drone. We are proposing to use a “sousveillance” (inverse surveil- lance) drone to capture a bird’s eye view of the swimmer and C. Immersive/Submersive (“Mersive”) VR make it available to the swimmer in real-time (this immediate Fully immersive/submersive (underwater) VR has been pre- availability to the end-user is what makes it sousveillance viously explored through “immersive multimedia” (underwater rather than surveillance).
Recommended publications
  • 1 COPYRIGHT STATEMENT This Copy of the Thesis Has Been
    University of Plymouth PEARL https://pearl.plymouth.ac.uk 04 University of Plymouth Research Theses 01 Research Theses Main Collection 2012 Life Expansion: Toward an Artistic, Design-Based Theory of the Transhuman / Posthuman Vita-More, Natasha http://hdl.handle.net/10026.1/1182 University of Plymouth All content in PEARL is protected by copyright law. Author manuscripts are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author. COPYRIGHT STATEMENT This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognize that its copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without the author’s prior consent. 1 Life Expansion: Toward an Artistic, Design-Based Theory of the Transhuman / Posthuman by NATASHA VITA-MORE A thesis submitted to the University of Plymouth in partial fulfillment for the degree of DOCTOR OF PHILOSOPHY School of Art & Media Faculty of Arts April 2012 2 Natasha Vita-More Life Expansion: Toward an Artistic, Design-Based Theory of the Transhuman / Posthuman The thesis’ study of life expansion proposes a framework for artistic, design-based approaches concerned with prolonging human life and sustaining personal identity. To delineate the topic: life expansion means increasing the length of time a person is alive and diversifying the matter in which a person exists.
    [Show full text]
  • Between Ape and Artilect Createspace V2
    Between Ape and Artilect Conversations with Pioneers of Artificial General Intelligence and Other Transformative Technologies Interviews Conducted and Edited by Ben Goertzel This work is offered under the following license terms: Creative Commons: Attribution-NonCommercial-NoDerivs 3.0 Unported (CC-BY-NC-ND-3.0) See http://creativecommons.org/licenses/by-nc-nd/3.0/ for details Copyright © 2013 Ben Goertzel All rights reserved. ISBN: ISBN-13: “Man is a rope stretched between the animal and the Superman – a rope over an abyss.” -- Friedrich Nietzsche, Thus Spake Zarathustra Table&of&Contents& Introduction ........................................................................................................ 7! Itamar Arel: AGI via Deep Learning ................................................................. 11! Pei Wang: What Do You Mean by “AI”? .......................................................... 23! Joscha Bach: Understanding the Mind ........................................................... 39! Hugo DeGaris: Will There be Cyborgs? .......................................................... 51! DeGaris Interviews Goertzel: Seeking the Sputnik of AGI .............................. 61! Linas Vepstas: AGI, Open Source and Our Economic Future ........................ 89! Joel Pitt: The Benefits of Open Source for AGI ............................................ 101! Randal Koene: Substrate-Independent Minds .............................................. 107! João Pedro de Magalhães: Ending Aging ....................................................
    [Show full text]
  • The Future of Smart Glasses
    The Future of Smart Glasses Forward-looking areas of research Prepared for Synoptik Foundation May 2014 Brian Due, PhD. Nextwork A/S Contents Smart&Glasses&and&Digitised&Vision&.....................................................................................................&3! 1.0&The&basis&of&the&project&...............................................................................................................................&4! 1.1!Contents!of!the!project!................................................................................................................................................!4! 2.0&The&historic&development&of&smart&glasses&..........................................................................................&5! 3.0&The&technological&conditions&and&functionalities,&and&various&products&..................................&8! 4.0&The&likely&scope&of&smart&glasses&within&the&next&3H5&years&...........................................................&9! 5.0&Likely&applications&of&smart&glasses&.....................................................................................................&12! 5.1!Specific!work6related!applications!......................................................................................................................!12! 5.2!Specific!task6related!applications!........................................................................................................................!12! 5.3!Self6tracking!applications!........................................................................................................................................!13!
    [Show full text]
  • Veillance and Reciprocal Transparency: Surveillance Versus Sousveillance, AR Glass, Lifeglogging, and Wearable Computing
    Veillance and Reciprocal Transparency: Surveillance versus Sousveillance, AR Glass, Lifeglogging, and Wearable Computing Steve Mann SurvVeillanCeNTRETM, 330 Dundas Street West, Toronto, Ontario, Canada, M5T 1G5 Abstract—This paper explores the interplay between surveil- lance cameras (cameras affixed to large-entities such as buildings) and sousveillance cameras (cameras affixed to small entities such as individual people), laying contextual groundwork for the social implications of Augmented/Augmediated Reality, Digital Eye Glass, and the wearable camera as a vision and visual memory aid in everyday life. We now live in a society in which we have both “the few watching the many” (surveillance), AND “the many watching the few” (sousveillance). Widespread sousveillance will cause a transition from our one-sided surveillance society back to a situation akin to olden times when the sheriff could see what everyone was doing AND everyone could see what the sheriff was doing. We name this neutral form of watching “veillance” — from the French word “veiller” which means “to watch”. Veillance is a broad concept that includes both surveillance (oversight) and sousveillance (undersight), as well as dataveillance, uberveillance, etc.. Fig. 1. Many business establishments prohibit cameras, e.g.: “NO It follows that: (1) sousveillance (undersight) is necessary CELL PHONES”; “NO CAMERAS”; “NO CELL PHONE IN STORE to a healthy, fair, and balanced society whenever surveillance PLEASE!”; and “No video or photo taking”, while at the same time (oversight) is already being used; and (2) sousveillance has nu- requiring customers to bring and use cameras in order to read QR codes merous moral, ethical, socioeconomic, humanistic/humanitarian, for pre-purchase product information.
    [Show full text]
  • Wearable Computing Challenges and Opportunities for Privacy Protection Report Prepared by the Research Group of the Office of the Privacy Commissioner of Canada
    Wearable Computing Challenges and opportunities for privacy protection Report prepared by the Research Group of the Office of the Privacy Commissioner of Canada Table of Contents Introduction ............................................................................................................................................................ 1 1. What is wearable computing? ........................................................................................................................... 2 2. Overview of implications for privacy ................................................................................................................. 6 3. Canada’s privacy laws and wearable computing ................................................................................................ 8 4. Some design considerations for wearable computing devices ........................................................................ 10 Conclusion ............................................................................................................................................................. 12 ________________________________________________________________________________________________________ 30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591 www.priv.gc.ca • Follow us on Twitter: @privacyprivee Abstract The purpose of the research report is to provide the OPC with a better understanding of the privacy implications of wearable computing technologies
    [Show full text]
  • EQUIVEILLANCE IS the BALANCE BETWEEN SURVEILLANCE and SOUSVEILLANCE Share First-Hand Recording Activity
    STEVE MANN EQUIVEILLANCE IS THE BALANCE BETWEEN SURVEILLANCE AND SOUSVEILLANCE Share first-hand recording activity... Glogger Community:http://glogger.mobi/about/php Steve Mann, cyborg, inventor, engineer, artist, activist, invites the Cooper Community to join the Glogger Community at http://glogger.mobi/about/php. The project is an online platform for sharing first-person recording activity (a "glog" is a Cyborg Log in the same way that a blog is Web log). Mann encourages members of the Cooper Community to photograph surveillance apparatus together with the environments under surveillance, as well as the perpetrators and purveyors of the surveillance superhighway and upload the images to the Glogger Community Web site. Be sure to include the keywords “sousveillance,” “equiveillance,” “Cooper,” with the image, so that the images can be searched and commented upon by Mann and others. For reference material, see Steve Mann, “Existential Technology: Wearable Computing Is Not the Real Issue . (Identity and Privacy Issues of Wearable Computing and Existential Technologies),” Steve Mann’s Web Page / Research, http://wearcam.org/id/id_leonardo.htm. Steve Mann completed his PhD at the Massachusetts Institute of Technology (MIT), where he founded the wearable computing group as a part of the MIT Media Lab. Mann is considered by many to be the inventor of the WearComp (wearable computer) and WearCam (EyeTap and reality mediator). Mann is a professor in the Department of Electrical and Computer Engineering at the University of Toronto. Organized by the Center for Career Development Career for by the Center Organized.
    [Show full text]
  • Overview on Wearables
    -Planetary Collegium Summit, Montreal 2007 Overview on wearables Laura Beloff 2006 Independent artist, researcher Planetary Collegium - Plymouth University Keywords: wearables, wearable computers, wearable media, mediated reality, augmented reality, art The development of wearable computers is closely linked to the development of augmented reality, both of which have been motivated by two primary goals; the need for people to access information while being on the move and the need for people to better manage information according to Barfield & Caudell. (Barfield and Caudell, 2001) We have invented glasses, microscopes, etc. to augment our vision and wristwatches to better manage our time. Recently we have developed mobile phones to better manage our lives and our social networks. This paper starts with a brief overview of the history of augmented/mediated reality, and continues to survey a few writers and themes in the wearable field and its history with a focus on more historical or theoretical approaches, and less on the practical and technical. My personal1 interest is in artistic approaches, which could be described by ‘wearables as an artistic strategy’. There are an increasing amount of artistic works and experiments which remind or reference (in their look and functions) wearables, but do not necessarily fulfill the desired characteristics of wearable computers, and are neither focusing on design solutions for wearability. There is still very little existing literature on the artistic side of wearables, although wearable computers as a research field is otherwise fairly well covered in literature. This paper is a general overview of the field. One of the common contemporary devices influencing a certain kind of transformation of perception is the fairly recently appearing 3G-videophone.
    [Show full text]
  • All Reality: Values, Taxonomy, and Continuum, for Virtual, Augmented, Extended/Mixed (X), Mediated (X,Y), and Multimediated Reality/Intelligence
    All Reality: Values, taxonomy, and continuum, for Virtual, Augmented, eXtended/MiXed (X), Mediated (X,Y), and Multimediated Reality/Intelligence Steve Mann, John C. Havens, Jay Iorio, Yu Yuan, and Tom Furness Virtual Aug. Phenomenal X- X-Y Mediated MiXed Quantimetric All ABSTRACT reality reality reality reality reality reality reality reality reality VR AR ΦR XR XYR MR QR All R ( R) Humans are creating a world of eXtended/Artificial Reality/Intelligence 1938 1968 1974 1991 1994 1994 1996 2018* (AR, AI, XR, XI or EI), that in many ways is hypocritical, e.g. where cars and buildings are always “allowed” to “wear” cameras, but Figure 1: Realities Timeline: from VR to All R humans sometimes aren’t, and where machines sense our every movement, yet we can’t even understand how they work. We’re MiXed Reality constructing a system of values that gives more rights and less re- sponsibilities to AI (Artificial Intelligence) than to HI (Humanistic Intelligence). Whereas it is becoming common to separate the notions of IRL (In Real Life) and “Augmented” or “Virtual” Reality (AR, VR) into Disk and Earth pictures are from Wikimedia Commons Wikimedia from are pictures Disk and Earth DGM-250-K, Pioneer V-4 Edirol Roland from adapted Mixer MX200-USB and Liston12 completely disparate realms with clearly delineated boundaries, Real Augmented X Augmented Virtual we propose here the notion of “All Reality” to more holistically World Reality (AR) Virtuality (AV) Reality (VR) represent the links between these soon-to-be-outdated culturally accepted norms of various levels of consciousness. Inclusive in the Figure 2: Disk Jockey (DJ) Mixer Metaphor of mixed reality: notion of “All Reality” is also the idea of “ethically aligned reality”, Imagine two record players (turntables), feeding into an au- recognizing values-based biases, cultural norms, and applied ethics dio/video mixer.
    [Show full text]
  • Mobile Computing
    5/4/21 MOBILE COMPUTING CSE 40814/60814 Spring 2021 Steve Mann • Considered to be inventor of wearable computing. • ”Wearable Computing Project” at MIT (1991). • World’s first covert wearable computer with camera and display concealed in ordinary eyeglasses (1995). • PhD from MIT (1997). • Works at University of Toronto. 1 5/4/21 Steve Mann What is Wearable Computing? • “A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities” 2 5/4/21 What is Wearable Computing? Seven attributes of wearable computing [Steve Mann, 1998]: 1. Unmonopolizing of the user’s attention. User can attend to other events. 2. Unrestrictive to the user. Allows interaction while user carries out normal functions. 3. Observable by the user. As the system is being worn, there is no reason why the wearer cannot be aware of it continuously (but this contrasts with #1). • Different phrasing: User can iDentify computational anD non-computational components of their clothing. 4. Controllable by the user; user can take control (on/off/configure) at any time. 5. Attentive to the environment; can enhance the user’s environment anD situational awareness. 6. Communicative to others; can be useD as a communications meDium.
    [Show full text]
  • Smart-Glasses: Exposing and Elucidating the Ethical Issues
    Contact details (must contain all author' names, affiliations and contact details) Smart-glasses: exposing and elucidating the ethical issues Bjørn Hofmann1,2, Dušan Haustein3, and Laurens Landeweerd 4,5 1. Norwegian University of Science and Technology, Gjøvik 2. Centre for Medical Ethics, University of Oslo, Norway 3. New Technologies Research Centre, University of West Bohemia, Czech republic 4. Oslo and Akershus University College of Applied Sciences (HiOA), Norway 5. Radboud University, Nimegen, the Netherlands Corresponding author: Bjørn Hofmann, [email protected] Centre for Medical Ethics, University of Oslo PO Box 1130, Blindern N-0318 Oslo Blinded Manuscript Click here to view linked References 1 Smart-glasses: exposing and elucidating the ethical issues 2 3 4 5 Abstract: 6 7 Objective: To provide an overview over ethical issues relevant to the assessment, implementation, 8 and use of smart-glasses. The purpose of the overview is to facilitate deliberation, decision making, 9 and the formation of knowledge and norms for this emerging technology. 10 11 Method: An axiological question-based method for human cognitive enhancement including an 12 extensive literature search on smart-glasses is used to identify relevant ethical issues. The search is 13 14 supplemented with relevant ethical issues identified in the literature on human cognitive 15 enhancement (in general) and in the study of technical aspects of smart-glasses. Identified papers 16 were subject to traditional content analysis. 17 18 Results: 739 references were identified, 247 were identified to be relevant for full text examinations, 19 and 155 were included in the study. A wide range of the ethical issues are identified.
    [Show full text]
  • Smart Clothing: the Shift to Wearable Computing
    Viewpoint ❖ Steve Mann Smart Clothing: The Shift to Wearable Computing mart clothing—-the combination of tallest in Cambridge in order to get some degree of mobile multimedia, wireless communi- connectivity from nearby cities. This gives me Inter- cation, and wearable computing—-offers net access but because the system is experimental, it the potential to make personal comput- is down some of the time, so I am not always able to Sers even more personal. stay online. In the early 1980s, when I first experimented with Having an Internet-connected computer wired wearable computing and wireless communications, within my clothing has allowed me to read my email people thought some of the apparatus I wore looked via my smart glasses (eyeglasses with miniature sen- quite strange, so I didn’t wear it much; it was both sor array and cathode-ray tube), say, while standing physically and socially awkward. People were in line at the bank. shocked by the visceral combination of human and The miniature cameras and computer screen machine. Even later, with the advent of portable and inside my eyeglasses provide me with a dual-adapta- laptop computers, people were still taken aback by tion space. Unlike the standard multimedia comput- the combination of a human wearing a computer— er, cameras and microphones point where I’m there was something markedly different in the way looking, not at me. This provides the computer with others perceived a system attached to my body my perspective, and permits me to explore some of rather than carried in a briefcase. When I did wear the more fundamental issues in visual memory and it, I basked in a tremendous sense of self-empower- computer-mediated reality.
    [Show full text]
  • Wearable Computers
    Wearable Computers Group 4: Antonio Pajuelo Justin Fleurimond Eric Gershman Shane Fancy Wearable Computers • Wearable computers are computers that are worn on the body. • They have been applied to areas such as behavioral modeling, health monitoring systems, information technologies and media development. • Wearable computers are especially useful for applications that require computational support while the user's hands, voice, eyes or attention are actively engaged with the physical environment. • Areas of study include user interface design, augmented reality, pattern recognition, use of wearables for specific applications or disabilities, electronic textiles and fashion design. Wearable Computers • A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. • It is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities. • The wearable computer is more than just a wristwatch or regular eyeglasses: it has the full functionality of a computer system but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer. Wearable Computers • This is what sets the wearable computer apart from other wearable devices such as wristwatches, regular eyeglasses, wearable radios. • Unlike these other wearable devices that are not programmable, the wearable computer is as reconfigurable as the familiar desktop or mainframe computer. • There are three operational modes in this new interaction between human and computer: Wearable Computers 1.Constancy: The computer runs continuously, and is 'always ready' to interact with the user.
    [Show full text]