Note: This page contains sample records for the topic ieee pervasive computing from Science.gov.
While these samples are representative of the content of Science.gov,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of Science.gov
to obtain the most current and comprehensive results.
Last update: August 15, 2014.
1

Pervasive Computing on Active Networks  

Microsoft Academic Search

Pervasive computing is the next generation computing environment with information and communication technology everywhere, for everyone, at any time. There are many methods proposed to reach the ultimate design goals of pervasive computing. Most of them are still at the hypothesis and early stages. In this paper, an initial investigation has been carried out to use active networks as the

Ka Lun Eddie Law; Sunny So

2004-01-01

2

Representations in Pervasive Computing1  

Microsoft Academic Search

The idea behind pervasive computing is that embedded and invisible technology calms our lives by removing the annoyances. Everyday life, however, is shaped by what people do, how they do it, and how they perceive what they are doing. As a consequence everyday life is difficult to grasp in computational terms. A look at the pervasive computing literature indicates that

Christopher Lueg

2002-01-01

3

Security in Pervasive Computing  

Microsoft Academic Search

\\u000a The audience of SPC 2003 needs no introduction to the Mark Weiser vision of ubiquitous computing: the etymological meaning\\u000a of ”computing present or found everywhere” is not to be taken in the narrow sense of ”a computer on every desk” but rather\\u000a in that of embedding computing and communication capabilities into all the everyday objects that surround us.\\u000a \\u000a \\u000a Various embodiments

Frank Stajano

2003-01-01

4

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

2005-10-31

5

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

1997-01-01

6

Challenges: an application model for pervasive computing  

Microsoft Academic Search

The way mobile computing devices and applications are developed, deployed and used today does not meet the expectations of the user community and falls far short of the potential for pervasive computing. This paper challenges the mobile computing community by questioning the roles of devices, applications, and a user's environment. A vision of pervasive computing is described, along with attributes

Guruduth Banavar; James Beck; Eugene Gluzberg; Jonathan Munson; Jeremy B. Sussman; Deborra J. Zukowski

2000-01-01

7

Pervasive computing: Past, present and future  

Microsoft Academic Search

The paradigm of pervasive computing describes ubiquitous computing environments that provide anytime and anywhere access to information services while making the presence of the system invisible to the user. Pervasive computing envisioned by Mark Weiser emerged at the conjunction of research and development in a number of areas which include embedded and devices and systems, wireless communications, and distributed, mobile

Stan Kurkovsky

2007-01-01

8

Challenges: environmental design for pervasive computing systems  

Microsoft Academic Search

We argue that pervasive computing offers not only tremendous opportunities and exciting research challenges but also possible negative environmental impacts, particularly in terms of physical waste and energy consumption. These environmental impacts will come under increasing government and consumer scrutiny, and like other disciplines (e.g. architecture, transportation), pervasive computing will have to adapt accordingly. Further, we argue that software-related issues

Ravi Jain; John Wullert II

2002-01-01

9

Improving Mobile Infrastructure for Pervasive Personal Computing.  

National Technical Information Service (NTIS)

The emergence of pervasive computing systems such as Internet Suspend/Resume has facilitated ubiquitous access to a user's personalized computing environment by layering virtual machine technology on top of distributed storage. This usage model poses seve...

A. Surie

2007-01-01

10

Project Aura: Toward Distraction-Free Pervasive Computing  

NSDL National Science Digital Library

In the April-June 2002 special issue of the IEEE Pervasive Computing journal, a team from Carnegie Mellon University contributed with a discussion of their Project Aura. The project's goal is to increase computing efficiency, particularly in wireless environments, so that "distractions such as poor performance and failures" are minimized. With greater system reliability and fewer distractions, users can make better use of their time and focus on the task at hand. This article describes the specifics of Project Aura, bringing together many areas that are being studied to accomplish the team's goals. The Aura home page gives further insights into research and additional papers.

Garlan, David.; Siewiorek, Daniel P.; Steenkiste, Peter A.

2002-01-01

11

Addressing Security Challenges in Pervasive Computing Applications.  

National Technical Information Service (NTIS)

Pervasive computing provides services that use knowledge about the operating environment. The very knowledge that enables an application to provide better services may, however, be misused, causing security and privacy breaches. Uncontrolled disclosure of...

I. Ray I. Ray

2010-01-01

12

A system architecture for pervasive computing  

Microsoft Academic Search

Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing. But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure. We believe that this lack of applications can be attributed to three

Robert Grimm; Thomas E. Anderson; Brian N. Bershad; David Wetherall

2000-01-01

13

Modeling Context Information in Pervasive Computing Systems  

Microsoft Academic Search

As computing becomes more pervasive, the nature of appli- cations must change accordingly. In particular, applications must become more flexible in order to respond to highly dynamic computing environ- ments, and more autonomous, to reflect the growing ratio of applications to users and the corresponding decline in the attention a user can devote to each. That is, applications must become

Karen Henricksen; Jadwiga Indulska; Andry Rakotonirainy

2002-01-01

14

Self-healing for Autonomic Pervasive Computing  

NASA Astrophysics Data System (ADS)

To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self-healing mechanism cannot be overlooked. This is one of the main challenges to growing autonomic pervasive computing. Incorporation of efficient fault detection and recovery in the device itself is the ultimate quest but there is no existing selfhealing scheme for devices running in autonomic pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy should also be maintained. In this book chapter, an approach to develop a self-healing service for autonomic pervasive computing is presented. The self-healing service has been developed and integrated into the middleware named MARKS+ (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing). The self-healing approach has been evaluated on a test bed of PDAs. An application has been developed by using the service. The evaluation results are also presented in this book chapter.

Ahmed, Shameem; Ahamed, Sheikh I.; Sharmin, Moushumi; Hasan, Chowdhury S.

15

Pervasive Computing Goes to School  

ERIC Educational Resources Information Center

In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

Plymale, William O.

2005-01-01

16

Pervasive Computing with Frugal Objects  

Microsoft Academic Search

Abstract—This,paper,presents,a,computing,model,for resource-limited mobile,devices that might,be ubiquitously,de- ployed,in private,and,business,environments.,The model,in- tegrates a strongly-typed event-based communication,paradigm with abstractions for frugal control, assuming a small footprint runtime. With our model, an application consists of a set of distributed reactive objects, called Frugal Objects (FROBs), that communicate,through,typed events and dynamically,adapt,their behavior,according,to notifications about,changes,in resource availability. FROBs have a logical time-slicing execution,pattern that helps monitor,resource,consuming,tasks

Benoît Garbinato; Rachid Guerraoui; Jarle Hulaas; Maxime Monod; Jesper Honig Spring

2007-01-01

17

B-Trust: Bayesian Trust Framework for Pervasive Computing  

Microsoft Academic Search

Without trust, pervasive devices cannot collaborate effectively, and without collaboration, the pervasive computing vision cannot be made a reality. Distributed trust frameworks may support trust and thus foster collaboration in an hostile pervasive computing environment. Existing frameworks deal with foun- dational properties of computational trust. We here propose a distributed trust framework that satisfies a broader range of properties. Our

Daniele Quercia; Stephen Hailes; Licia Capra

2006-01-01

18

A Security Conscious Service Discovery Framework in Pervasive Computing Environments  

Microsoft Academic Search

In today's Web environments, digital world is witnessing the birth of a revolutionary computing paradigm called pervasive or ubiquitous computing that promises to have a profound effect on the way users interact with computers, devices, physical spaces, and other users. Pervasive computing is aimed to eliminate time and place barriers by making services available to users anytime and anywhere. Due

Mahdi Sharifi; Sayed Gholam Hassan Tabatabaei; Homa Movahednejad; Azizah Abdul Manaf; Suhaimi Ibrahim

2009-01-01

19

Is cloud computing essential to the future of pervasive services?  

Microsoft Academic Search

Cloud computing is a new paradigm for deploying computing\\/information services, which is based pervasive and on demand access to computing utilities, an abstraction of unlimited computing resources, and a usage-based payment model made users essentially \\

Julie A. McCann; Manish Parashar; Omer Rana; Luca Foschini; Tim Kindberg

2009-01-01

20

Field-based Motion Coordination in Pervasive Computing Scenarios  

Microsoft Academic Search

As computing is becoming pervasive, autonomous computer-based systems are going to be embedded in all everyday objects and in the physical environment. In such a scenario, mobility too, in different forms, will be pervasive. Mobile users, mobile devices, computer-enabled vehicles, as well as mobile software compo- nents, define an open and dynamic networked world that will be the stage of

Marco Mamei; Franco Zambonelli

21

Intelligent Solar Energy Monitoring System under Pervasive Computing Environment  

Microsoft Academic Search

Pervasive computing mainly emphasize on the seamless integration of informational space and physical space, that is, the seamless integration of human, computer and environment. With the development of pervasive computing, there are some challenges about traditional software technology, and need new software architecture to meet it. In this paper, to adapt to the practical requirements, we use the hierarchical structure

Huan Guo; Guohua Chen; Yong Tang; Lin Li

2008-01-01

22

Autoconfiguration, registration, and mobility management for pervasive computing  

Microsoft Academic Search

In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline\\/wireless networks and computing devices. We believe that current protocols, such as DHCP, PPP, and Mobile IP, must be enhanced to support pervasive network access. In particular, this article identifies three fundamental functions: autoconfiguration, registration, and mobility management, that need such enhancements.

Archan MISRA; Subir Das; Anthony McAuley; Sajal K. Das

2001-01-01

23

ENHANCING A PERVASIVE COMPUTING ENVIRONMENT WITH LEXICAL KNOWLEDGE  

Microsoft Academic Search

A pervasive computing environment consists typically of a large heterogeneous collection of networked devices. This paper describes the use of lexical knowledge to improve a pervasive computing environment. In an ongoing research project, we are exploring ways to enable non-technical users to manage and control their home environment that is particularly hostile. We assume that each device belonging to the

P. Filipe; M. Barata; N. Mamede; P. Araújo

24

Flying Control System Architecture of Informationization for Pervasive Computing  

Microsoft Academic Search

The paper involves one kind of mobile autonomous running system for pervasive computing. The developing requirements about aircraft flying control system of informationization were firstly analyzed, then the architecture on aircraft flying control system of informationization based on pervasive computing was presented. Lastly the design conception and its accuracy were verified by principle prototypes.

Lin Jinyong; Zhang Jun; Dong Wenjie; Gao Xiaoying; Qi Chuntang

2010-01-01

25

Programming Pervasive and Mobile Computing Applications with the TOTA Middleware  

Microsoft Academic Search

Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the programming model of TOTA (\\

Marco Mamei; Franco Zambonelli

2004-01-01

26

Building Efficient Wireless Infrastructures for Pervasive Computing Environments  

ERIC Educational Resources Information Center

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

Sheng, Bo

2010-01-01

27

Pervasive computing goes the last hundred feet with RFID systems  

Microsoft Academic Search

I examine a class of pervasive computers: radio frequency identification tags. RFID tags turn everyday objects into network nodes that uplink IDs and status data to enterprise databases, storing new information as needed. They literally vanish into commonplace objects, offering efficiencies in handling, location, and condition tracking. However, some people caution that we must implement privacy and security features from

V. Stanford

2003-01-01

28

Hierarchical situation modeling and reasoning for pervasive computing  

Microsoft Academic Search

Situation awareness is one of the most fundamental features of entities in pervasive computing environments to dynamically adapt their behavior to situation changes to satisfy user requirements, including security and privacy. In order to support situation-aware adaptation, it is necessary to model and specify context and situation in a way such that multiple entities can easily exchange, share and reuse

Stephen S. Yau; Junwei Liu

2006-01-01

29

Field-Based Coordination for Pervasive Computing Applications  

Microsoft Academic Search

Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of information. By having appli- cation agents access in a dynamic and wireless way such distributed in- formation, it is possible to enforce a notable degree of context-awareness in applications, and increase the capabilities of

Marco Mamei; Franco Zambonelli

2007-01-01

30

User Access of Public Shared Devices in Pervasive Computing Environments  

Microsoft Academic Search

To allow for an efficient usage of a device in pervasive computing environments when a user intends to selectively utilize multiple devices within his\\/her vicinity, reliable and yet convenient authentication is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the issues of establishing

David Jea; Ian Yap; Mani Srivastava

2007-01-01

31

Ontology-Enabled Pervasive Computing Applications  

Microsoft Academic Search

Information technology's rapid evolution has made tremendous amounts of information and services available at our fingertips. However, we still face the frustration of trying to do simple things in the device- and application-rich environments where we live and work. Task computing is defined as computation to fill the gap between the tasks that users want to perform and the services

Ryusuke Masuoka; Yannis Labrou; Bijan Parsia; Evren Sirin

2003-01-01

32

Survey on Location Privacy in Pervasive Computing  

Microsoft Academic Search

The goal of ubiquitous computing research is refine devices to the point where their use is transparent. For many applications with mo- bile devices, transparent operation requires that the device be location- aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices must be carefully de- signed, lest they become a ubiquitous

Andreas Gorlach; Andreas Heinemann; Wesley W. Terpstra

2005-01-01

33

Data-centric middleware for context-aware pervasive computing  

Microsoft Academic Search

The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. In this paper, we motivate a data-centric design for such an infrastructure to support context-aware applications. Our middleware system, Solar, treats contextual data sources as stream publishers and the core of Solar is a scalable and

Guanling Chen; Ming Li; David Kotz

2008-01-01

34

Volcano Monitoring: A Case Study in Pervasive Computing  

NASA Astrophysics Data System (ADS)

Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

35

A hybrid approach to context modelling in large-scale pervasive computing environments  

Microsoft Academic Search

Pervasive computing aims to unobtrusively embed computer systems into everyday life environments to enrich the user experience without demanding the user's explicit attention. For pervasive computing to be minimally invasive, computer systems must be conscious of and ultimately, be able to act according to the context of the user and her intelligent environment. However, such context is often heterogeneous as

Deirdre Lee; René Meier

2009-01-01

36

A trust-based security system for ubiquitous and pervasive computing environments  

Microsoft Academic Search

Traditionally, authentication and access control based users are the main methods used to provide security for individual computers and small networks. However, now that pervasive computing is encompassing new technologies and attracting more interest, these strategies are inadequate for meeting the special characteristics of ubiquitous and pervasive computing environments because such distributed systems lack central control and have flexible topologies.

Azzedine Boukerche; Yonglin Ren

2008-01-01

37

Collaborative editing within the pervasive collaborative computing environment  

SciTech Connect

Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

Perry, Marcia; Agarwal, Deb

2003-09-11

38

Task Computing - The Semantic Web Meets Pervasive Computing  

Microsoft Academic Search

Non-expert users have to accomplish non-trivial tasks in application and device-rich computing environments. The increasing complexity of such environments is detrimental to user productivity (and occasionally, sanity). We propose to reduce these difficulties by shifting focus to what users want to do (i.e., on the tasks at hand) rather than on the specific means for doing those tasks. We call

Ryusuke Masuoka; Bijan Parsia; Yannis Labrou

2003-01-01

39

Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach  

Microsoft Academic Search

Abstract—Pervasive computing,is fast becoming,a reality with rapid advance,in computing,and networking,technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new,computing,environment.,In many pervasive applications, devices collaborate with others within a particular area (such as a room,or a building) and thus such applications need authentication for security. In this

Su Jin Kim; Sandeep K. S. Gupta

2009-01-01

40

Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions  

Microsoft Academic Search

Abstract Weexplore,the challenges and research directions in building models, protocols and architectures to support security in pervasive ,computing ,environments. We argue that to be successful, efforts to build these would have to recognize,from ,the onset ,that pervasive ,computing settings are complex ,socio-technical system and would thus,have ,to go ,beyond ,traditional system-centric approaches,to analyzing and designing security.

Roshan K. Thomas; Ravi S. Sandhu

2004-01-01

41

An ontology for context-aware pervasive computing environments  

Microsoft Academic Search

This document describes COBRA-ONT an ontology for supporting pervasive context-aware systems. COBRA-ONT, expressed in the Web Ontology Language OWL, is a collection of ontologies for describing places, agents, events and their associated properties in an intelligent meeting room domain. This ontology is developed as a part of the Context Broker Architecture (CoBrA), a broker-centric agent architecture that provides knowledge sharing,

HARRY CHEN; TIM FININ; ANUPAM JOSHI

2003-01-01

42

A Secure Infrastructure for Service Discovery and Access in Pervasive Computing  

Microsoft Academic Search

Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere-anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management.

Jeffrey Undercoffer; Filip Perich; Andrej Cedilnik; Lalana Kagal; Anupam Joshi

2003-01-01

43

Combining amorphous computing and reactive agent-based systems: a paradigm for pervasive intelligence?  

Microsoft Academic Search

This paper is intended to provide insight on the upheaval that the advent of computing systems based on pervasive computing will represent. We show, after an introduction to this concept, why the traditional rules of design, validation, control and deployment nowadays used in the industry are not adapted anymore to these new systems. We then show that the multi-agent systems

David Servat; Alexis Drogoul

2002-01-01

44

Pervasive Forensic Analysis Based on Mobile Cloud Computing  

Microsoft Academic Search

Cloud computing has become one of mobile's hottest topics. Moving computing processing and data storage away from mobile devices and into large data centers, mobile applications enable the users to improve productivity, to share data and to collaborate with others. Considering the benefits of mobile cloud computing, the forensic service based on mobile cloud computing could be good solution to

Jooyoung Lee; Dowon Hong

2011-01-01

45

Effective GUI-oriented automated testing platform for pervasive computing software environment  

Microsoft Academic Search

Graphical user interfaces (GUIs) are critical components of software environment for pervasive computing and applications. A systemic solution called GUI testing architecture (GUITA) for automated testing oriented GUIs is proposed in this paper, which is built on the platform that integrating ATS and WinRunner¿ by a socket interface. By parsing configure file and loading GUI map successfully, it can invoke

Songwen Pei; Chunxue Wu; Yuewei Ding; Baifeng Wu

2009-01-01

46

The Master Key: A Private Authentication Approach for Pervasive Computing Environments  

Microsoft Academic Search

We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of access tokens for entity authentication. The Master Key discovers and selects proper tokens for its owner. With an emphasis on usability, the Master Key secures authentication, protects privacy information from outsiders and insiders,

Feng Zhu; Matt W. Mutka; Lionel M. Ni

2006-01-01

47

Self-Organizing Overlay Knowledge Networks for Future Pervasive Computing Applications  

Microsoft Academic Search

The mass deployment of sensors and pervasive computing systems expected in the next few years, will require novel approaches to program and gather information from such systems. Suitable approaches will be general purpose, independent of a specific scenario and sensor deployment, and able to adapt autonomically to different scales and to a number of unforeseen circumstances. This chapter focuses on

Nicola Bicocchi; Marco Mamei; Franco Zambonelli

48

Pervasive computing vs. cyber-physical systems: A perspective from smart environments  

Microsoft Academic Search

Rapid advancements in smartphones, wireless sensors and mobile communications have led to the development of cyber-physical systems, pervasive computing and smart environments with important applications in environmental, civilian, military, industry, and government sectors. Sensor networks and smartphones play significant roles in this context as they not only act as effective interface between physical and cyber worlds, but also bring in

Sajal K. Das

2012-01-01

49

DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing environments consist of thousands of heterogeneous devices and network services. Service discovery protocols provide essential functionalities for users and client devices to discover and access services. Most existing protocols, however, only support discovery via static service attributes. Dynamic information such as service conditions, quality, and reliability is not available to users and clients. To disseminate dynamic service information,

Feng Zhu; Ajinkya Kulkarni

2011-01-01

50

Pervasive Personal Computing in an Internet Suspend\\/Resume System  

Microsoft Academic Search

The Internet suspend\\/resume model of mobile computing cuts the tight binding between PC state and PC hardware. By layering a virtual machine on distributed storage, ISR lets the VM encapsulate execution and user customization state; distributed storage then transports that state across space and time. This article explores the implications of ISR for an infrastructure-based approach to mobile computing. It

Mahadev Satyanarayanan; Benjamin Gilbert; Matt Toups; Niraj Tolia; Ajay Surie; David R. O'hallaron; Adam Wolbach; Jan Harkes; Adrian Perrig; David J. Farber; Michael A. Kozuch; Casey J. Helfrich; Partho Nath; H. Andrés Lagar-cavilla

2007-01-01

51

Security Architecture Based on Trust Management for Pervasive Computing Systems.  

National Technical Information Service (NTIS)

Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting ...

L. Kagal J. Undercoffer F. Perich A. Joshi T. Finin

2005-01-01

52

Improving Dependability of Service Oriented Architectures for Pervasive Computing  

Microsoft Academic Search

Service Oriented Programming - which combines Dis- tributed Object Compunting, Component Based and web- based concepts - has recently emerged as a promising ap- proach to develop dynamic and heterogeneous service pro- vision environments. Such systems are referenced in liter- ature as Service Oriented Architectures. Classic strategi es to address dependability in Distributed Object Computing middlewares may not be straightforwardly

Domenico Cotroneo; Cristiano Di Flora; Stefano Russo

2003-01-01

53

IEEE Xplore  

NSDL National Science Digital Library

IEEE Xplore is an online delivery system providing full text access to technical literature in electrical engineering, computer science, and electronics. IEEE Xplore contains full text documents from IEEE journals, transactions, magazines, letters, conference proceedings, standards, and IEE (Institution of Electrical Engineers) publications.

2011-03-21

54

Service Invocation and Roaming in Pervasive Computing Environments  

Microsoft Academic Search

Abstract Emerging mobile-communication protocols aim to disassociate computing platforms from the location and the medium the user is accessing services. Moreover, a user should be able to access his\\/her personalized services any time, anywhere, on any type of device and with any type of wireless technology in a non-obtrusive environment. The complexities and problems associated with a mobile-wireless environment should

Alvin Chin; Kostas Kontogiannis

2003-01-01

55

Workshop on Pervasive Computing and Cooperative Environments in a Global Context  

NASA Astrophysics Data System (ADS)

The increasing number of devices that are invisibly embedded into our surrounding environment as well as the proliferation of wireless communication and sensing technologies are the basis for visions like ambient intelligence, ubiquitous and pervasive computing. In this context, the objective of PECES EU project is the creation of a comprehensive software layer to enable the seamless cooperation of embedded devices across various smart spaces on a global scale in a context-dependent, secure and trustworthy manner.

Selvarajah, Kirusnapillai; Speirs, Neil

56

A Framework for QoS-aware Web Service Composition in Pervasive Computing Environments  

Microsoft Academic Search

By adopting standard-based protocols, service components from different providers can be conveniently integrated into a composite service regardless of their locations, platforms and\\/or hardware speeds. This paper presents a framework to facilitate dynamic service composition, selection and adaptation of QoS-aware Web services towards pervasive computing. Considering both functional and QoS characteristics of Web services, this framework intends to generate the

Zhi-yong ChenI; Qing Yao

2008-01-01

57

IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009.  

National Technical Information Service (NTIS)

Infosys Technologies Limited received the IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009 for establishing a cost-effective, sustained, and culturally integrated quality and productivity improvement progr...

S. Kumar

2011-01-01

58

A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments  

Microsoft Academic Search

We present a realistic, yet computationally inexpen- sive simulation model for IEEE 802.11p radio shadowing in urban environments. Based on real world measurements using IEEE 802.11p\\/DSRC devices, we estimated the effect that buildings and other obstacles have on the radio communication between vehicles. Especially for evaluating safety applications in the field of Vehicular Ad Hoc Networks (VANETs), stochastic models are

Christoph Sommer; David Eckhoff; Reinhard German; Falko Dressler

2011-01-01

59

Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments  

NASA Astrophysics Data System (ADS)

An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.

Huo, Shi-Wei; Luo, Chang-Yuan; Xin, Hong-Zhi

60

MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments  

Microsoft Academic Search

,ABSTRACT With the tremendous ,increase in the use of mobile ,handheld ,and wearable devices, the pervasive computing arena is becoming stronger and more ,powerful ,day by day. Despite having various physical constraints, many of the functionalities enjoyed by resource-rich mobile devices have been incorporated in these tiny devices. That is why ,different fields of research ,have ,been developed, this,area. There

Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

2006-01-01

61

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability  

Microsoft Academic Search

In pervasive computing environments (PCEs), privacy and security are two important but contradictory objectives. Users enjoy services provided in PCEs only after their privacy issues being sufficiently addressed. That is, users could not be tracked down for wherever they are and whatever they are doing. However, service providers always want to authenticate the users and make sure they are accessing

Kui Ren; Wenjing Lou

2007-01-01

62

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Flöer

2003-01-01

63

Emergence and control of macro-spatial structures in perturbed cellular automata, and implications for pervasive computing systems  

Microsoft Academic Search

Predicting the behavior of complex decentralized pervasive computing systems before their deployment in a dynamic environment, as well as being able to influence and control their behavior in a decentralized way, will be of fundamental importance in the near future. In this context, this paper describes the general behavior observed in a large set of asynchronous cellular automata (CA) when

Marco Mamei; Andrea Roli; Franco Zambonelli

2005-01-01

64

Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services  

NASA Astrophysics Data System (ADS)

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

Soppera, A.; Burbridge, T.

65

Small laboratory computer automation system based on Hewlett-Packard HP1000 mini computer and IEEE488 standard  

Microsoft Academic Search

A system for automatic acquisition and handling of experimental data based on the Hewlett-Packard HP-1000 minicomputer and IEEE-488 standard is described. Digital measuring equipment is coupled with the computer through the Hewlett-Packard Interface Bus (HP-IB). The special IPP interface is developed to connect to the computer the devices which are noncompatible with HP-IB. Two types of IPP interface are described

V. I. Kirillov; E. L. Kosarev; L. B. Luganskii; A. M. Schastlivtzev

1982-01-01

66

CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing  

Microsoft Academic Search

A growing interest for pervasive applications and the concern that users should not be disturbed by such services while they are on their regular duty have introduced several new challenges. The behavior of these applications should depend not only on their internal state and user interactions but also on contexts sensed during their execution. In this work, we propose a

Dejene Ejigu; Vasile-marian Scuturici; Lionel Brunie

2007-01-01

67

nk-Nearest Neighbor Algorithm for Estimation of Symbolic User Location in Pervasive Computing Environments  

Microsoft Academic Search

The paper introduces a novel algorithm for the location-awareness problem of estimating symbolic user location for indoor spaces using IEEE 802.11 (Wi-Fi) wireless signals. The characteristic of the problem is that the signals fluctuate greatly, not only across perturbations in space, but also in time (diurnally), which leads to poor location estimation. The ?k-nearest neighbour (?k-NN) algorithm is an instance-based

Teddy Mantoro; C. W. Johnson

2005-01-01

68

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

ScienceCinema

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2011-10-06

69

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

SciTech Connect

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2010-05-11

70

The Gator Tech Smart House: A Programmable Pervasive Space  

Microsoft Academic Search

Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive

Sumi Helal; William C. Mann; Hicham El-zabadani; Jeffrey King; Youssef Kaddoura; Erwin Jansen

2005-01-01

71

Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology  

PubMed Central

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.

Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodriguez Mendez, Sergio Jose; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

2014-01-01

72

Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.  

PubMed

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

2014-01-01

73

Institute of Electrical and Electronics Engineers (IEEE) Careers for Electrical Engineers and Computer Scientists  

NSDL National Science Digital Library

The Institute of Electrical and Electronic Engineers (IEEE) Careers Website is an excellent jobs resource. Sections provided include Engineering Careers, Finding a Job, Career Planning, Salaries and Compensation, and Employer Database, among a host of others.

74

SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing  

Microsoft Academic Search

Two most important goals of server assisted signature schemes are to aid small and mobile devices in computing digital signatures and to provide im- mediate revocation of signing capabilities. In this paper, we introduce an efficient scheme named server assisted one-time signature (SAOTS) alternative to server assisted signature scheme introduced by Asokan et al. Extended the Lamport's one-time signatures by

Kemal Bicakci; Nazife Baykal

2003-01-01

75

rfid in pervasive computing: State-of-the-art and outlook  

Microsoft Academic Search

RFID has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, RFID is an efiective automatic identiflcation technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile

George Roussos; Vassilis Kostakos

2009-01-01

76

CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing  

Microsoft Academic Search

\\u000a This paper presents a novel trust model in which we model trust based on an exotic uncertainty theory, namely cloud model.\\u000a We regard trust between entities as a cloud that is called as trust cloud. Based on such a quantification model of trust,\\u000a we further propose the algorithms to compute propagated trust relationships and aggregated trust relationships, which are\\u000a needed

Rui He; Jianwei Niu; Guangwei Zhang

2005-01-01

77

A semantic approach for building pervasive spaces  

Microsoft Academic Search

Large and pervasive sensing, communications, and computing infrastructures are enabling the realization of pervasive spaces. Enabling such spaces, however, encompasses a set of challenges. First, programming each application such that it connects to each sensor and it interprets the data being sensed requires a concentration of expertise that is rarely available. Second, achieving a wise and fair usage of the

Daniel Massaguer; Sharad Mehrotra; Nalini Venkatasubramanian

2009-01-01

78

Pervasive Adaptation in Car Crowds  

NASA Astrophysics Data System (ADS)

Advances in the miniaturization and embedding of electronics for microcomputing, communication and sensor/actuator systems, have fertilized the pervasion of technology into literally everything. Pervasive computing technology is particularly flourishing in the automotive domain, exceling the “smart car”, embodying intelligent control mechanics, intelligent driver assistance, safety and comfort systems, navigation, tolling, fleet management and car-to-car interaction systems, as one of the outstanding success stories of pervasive computing. This paper raises the issue of the socio-technical phenomena emerging from the reciprocal interrelationship between drivers and smart cars, particularly in car crowds. A driver-vehicle co-model (DVC-model) is proposed, expressing the complex interactions between the human driver and the in-car and on-car technologies. Both explicit (steering, shifting, overtaking), as well as implicit (body posture, respiration) interactions are considered, and related to the drivers vital state (attentive, fatigue, distracted, aggressive). DVC-models are considered as building blocks in large scale simulation experiments, aiming to analyze and understand adaptation phenomena rooted in the feed-back loops among individual driver behavior and car crowds.

Ferscha, Alois; Riener, Andreas

79

IEEE Global History Network  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) is an industry organization, and its Global History Network (GHN) is a wiki that "fosters the creation of narratives that not only document the history engineering practice but also explain when, how and why these myriad of technologies developed as they did." The homepage of the website for GHN has an "innovation map" and an "interactive timeline", as well as eight rotating featured concepts prominently displayed near the top of the homepage. Visitors should definitely check out the "Innovation Map", which shows what events happened, where, and when, such as the industrialization and commercialization of photovoltaic cells in Japan in 1959. The eight rotating featured concepts have included "Ancient Computers", "Cryptography", and "Memristors" which are resistors with memory. The menu across the top of any page contains the guts of the site, including "Oral Histories" of the most prominent people in the profession, "IEEE Stars", peer-reviewed articles, and "Topic Articles" which has "broad articles on a specific topic" which IEEE members and invited guests can create or modify.

80

A simple (yet powerful) algebra for pervasive environments  

Microsoft Academic Search

Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to query data, streams and services in a declarative way. Our overall objective is to make the development of pervasive applications easier through database principles. In this paper, through the notion of virtual

Yann Gripay; Frédérique Laforest; Jean-Marc Petit

2010-01-01

81

Personal Pervasive Environments: Practice and Experience  

PubMed Central

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them.

Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

2012-01-01

82

Personal pervasive environments: practice and experience.  

PubMed

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

Ballesteros, Francisco J; Guardiola, Gorka; Soriano, Enrique

2012-01-01

83

IEEE History Center  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) History Center functions "to preserve, research and promote the history of information and electrical technologies." There are many resources on the center's Web site that provide an excellent perspective into some of the original breakthroughs in electrical design and the more recent advancements in computer technology. Historical articles and list of frequently asked questions are given on the site, as well as many transcripts of interviews with influential people of the industry. A Milestones section highlights 45 of the most groundbreaking achievements around the world. Every day, a new electrical engineering-related anniversary is presented on the homepage.

84

[Pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD-ICD10), covering roughly the same entity as the autism spectrum disorders (ASD DSM-IVTR and DSM-V) include a heterogeneous clinical reality. PDD develop in childhood and are characterized by alterations in socialization, communication and behavior disorders with stereotypies and repetitive movements. Autism is included in PDD and has led to many debates in France and to the publication of recommendations and government plans, in recent years. We propose in this article to review the current knowledge of this topic. PMID:24855782

Ferreri, Mélanie

2014-04-01

85

Pervasive Developmental Disorders in Girls  

Microsoft Academic Search

Pervasive developmental disorders are a group of conditions sharing as their common features impairment in social reciprocity,\\u000a developmental disturbances affecting communication, and manifestation of restricted and repetitive behaviors. Autism is the\\u000a prototypical pervasive developmental disorder, and others include Asperger's Disorder, Rett's Disorder, Childhood Disintegrative\\u000a Disorder, and Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS). Critical to understanding these conditions\\u000a is appreciation of

Kathleen Koenig; Katherine D. Tsatsanis

86

A Conceptual Framework and Principles for Trusted Pervasive Health  

PubMed Central

Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.

Blobel, Bernd Gerhard; Seppala, Antto Veikko; Sorvari, Hannu Olavi; Nykanen, Pirkko Anneli

2012-01-01

87

What is the role GIS could play in the future pervasive semantic grid service environment?  

NASA Astrophysics Data System (ADS)

Adopting the Web Service, Grid Computing and Semantic Web technologies, Geographic Information System (GIS) have got newly development in recent years. We first present the state of art of such technologies and their applying in GIS. Then we introduced the Pervasive Computing vision and analyses the possible way merging Semantic Grid Service and Pervasive computing, forming we called Pervasive Semantic Grid Service(PSGS). To help archive the Pervasive vision, we introduced the Geographic Overlaying Grid to mediate the pervasive devices and the beneath infrastructure. After that, we put the vision forward to see how GIS would influence our daily life in the future pervasive environment. We compared the concept of Digital Earth raised 8 years age and the Pervasive environment with Geographic Overlaying Grid and showed the difference between them. Finally, we point out that GIS can be "tick point" between the cyber space and the real physical space, helping people find their way "return" to real world from virtual cyber world.

Yin, Dafei; Fang, Yu

2006-10-01

88

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2013 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2013-10-01

89

Controlling access to pervasive information in the \\  

Microsoft Academic Search

Pervasive-computing infrastructures necessarily collect a lot of con- text information to disseminate to their context-aware applications. Due to the personal or proprietary nature of much of this context information, however, the infrastructure must limit access to context information to authorized persons. In this paper we propose a new access-control mechanism for event-based context- distribution infrastructures. The core of our approach

Kazuhiro Minami; David Kotz

90

Vigil : Providing Trust for Enhanced Security in Pervasive Systems  

Microsoft Academic Search

Computing today is moving away from the desktop, becoming diffused into our surroundings and onto our personal digital devices. Moreover, ad-hoc networks such as Bluetooth provide for spontaneous connec- tivity between computationally enabled devices within proximity to each other. In such pervasive computing environments, users expect to access resources and services at any time from anywhere. This expectation results in

Lalana Kagal; Jeffrey Undercoffer; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

2002-01-01

91

Challenges in Securing the Interface Between the Cloud and Pervasive Systems.  

National Technical Information Service (NTIS)

Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to bu...

B. Lagesse

2013-01-01

92

A SPATIO-LUDIC RHETORIC: SERIOUS PERVASIVE GAME DESIGN FOR SENTIENT ARCHITECTURES  

Microsoft Academic Search

Serious pervasive games (SPGs) focus on non-entertainment purposes such as learning, whilst applying interface, wireless, sensor, and positioning technologies to allow for hybrid - simultaneously physical and virtual - experiences across varying contexts. Thus, with the omnipresence of always-on pervasive computing based services as well as computer integrated buildings that appeal to us and make us \\

Steffen P. Walz

93

Pervasive Home Environments  

NASA Astrophysics Data System (ADS)

An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

Bull, P.; Limb, R.; Payne, R.

94

GPIB88: A Function Library for the IBM Personal Computer to Support DeSmet C Application Programs for the National Instruments PC2 IEEE-488 Controller.  

National Technical Information Service (NTIS)

The GPIB88 function library for the IBM PC family is a high-level language interface to the National Instruments IEEE-488 PC2 interface board that uses National Instruments handler Rev. B.2. This library supports application programs written in DeSmet C. ...

N. Lundgaard F. McGirt

1986-01-01

95

Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. Recommendations of the National Institute of Standards and Technology. Computer Security.  

National Technical Information Service (NTIS)

This guide presents extensive guidance on IEEE 802.11 RSN planning and implementation. It describes a life cycle model for WLANs and presents best practice recommendations related to WLAN security for each phase in the life cycle. WLAN security considerat...

B. Eydt K. Scarfone L. Owens S. Frankel

2007-01-01

96

IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint  

SciTech Connect

The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

Basso, T.; DeBlasio, R.

2012-04-01

97

Embedded real-time QRS detection algorithm for pervasive cardiac care system  

Microsoft Academic Search

The emergence and development of pervasive computing technology leads to the revolution of remote cardiac care and also brings forth challenges to the automatic ECG diagnosis (AED) techniques. Due to the high resource requirements, traditional AED methods are unsuitable for pervasive cardiac care (PCC) applications. This paper proposes an embedded real-time QRS detection algorithm dedicated to PCC systems. By analyzing

H.-Y. Zhou; K.-M. Hou

2008-01-01

98

Pervasive developmental disorders and psychosis  

Microsoft Academic Search

Pervasive developmental disorders (PDDs) and infantile schizophrenia were initially thought to be the same condition, but\\u000a distinct differences were described in later research. However, attempts to identify psychosis in individuals with PDDs continue\\u000a to be challenging and controversial. The two disorders share many similar features, including perceptual abnormalities, thought\\u000a disorder, catatonia, and deficiencies in reality testing. Progress has been made

Jean Starling; David Dossetor

2009-01-01

99

IEEE Working Group Areas  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) is one of the most active organizations in developing standards for emerging technologies. At this site, visitors can learn about many different working groups and the process of implementing new standards. Each working group's homepage has an overview of the purpose and scope of the particular standards project, and some offer reports and documentation for public download. The IEEE is involved in many different technical areas, as is immediately apparent when looking at the list of projects. Power and Energy and Information Technology are the two most prominent areas of standards development, but others range from broadcast technology to the voting system. [CL

100

The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  

NSDL National Science Digital Library

"The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150countries. The full name is the "Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referredto by the letters I-E-E-E.Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others."Description courtesy of http://www.ieee.org/

2005-10-31

101

Performance evaluation of IEEE 802.11e  

Microsoft Academic Search

This paper presents an evaluation of the QoS enhancements to the IEEE 802.11 standard, named IEEE 802.11e, currently under specification. Both the enhanced distributed coordination function (EDCF) and hybrid coordination function (HCF) modes of medium access control (MAC) operation are analysed and compared with legacy distributed coordination function (DCF) and point coordination function (PCF). Performance evaluation is attained through computer

António Grilo; Mário Nunes

2002-01-01

102

Electronic textiles: a platform for pervasive computing  

Microsoft Academic Search

Abstract: this paper, welook at the synergistic relationship between textiles and computingand identify the need for their "integration" using tools providedby an emerging new field of research that combines the strengthsand capabilities of electronics and textiles into one: electronictextiles, or e-textiles. E-textiles, also called smart fabrics, havenot only "wearable" capabilities like any other garment, butManuscript received March 1, 2003; revised

DIANA MARCULESCU; RADU MARCULESCU; NICHOLAS H. ZAMORA; PRADEEP K. KHOSLA; Jayaraman Jung; L. Weber; K. Cottet; Grzyb; Troster; Nakad

2003-01-01

103

IEEE 802.11-saturation throughput analysis  

Microsoft Academic Search

Abstract— To satisfy the emerging need of wireless data commu- nications, IEEE is currently standardizing the 802.11 protocol for wireless local area networks. This standard adopts a CSMA\\/CA medium,access control protocol with exponential backoff. In this letter, we present a simple analytical model to compute the saturation throughput performance in the presence of a finite number,of terminals and in the

G. Bianchi

1998-01-01

104

An Analytical Model for IEEE 802.11 Point-To-Point Link  

Microsoft Academic Search

Wireless mesh networks have attracted extensive research interests in recent years. With the maturity and pervasive deployment of IEEE 802.11a\\/b\\/g technology, 802.11 DCF protocol is considered as a promising candidate for constructing the backbone of wireless mesh networks. In a multi-channel multi-interface wireless mesh network, point-to-point 802.11 wireless link can provide the highest throughput; hence it is critical to understand

Yong Yan; Xiaowen Chu

2008-01-01

105

Toward a mobile platform for pervasive games  

Microsoft Academic Search

Emerging pervasive games will be immersed into real-life situations and leverage new types of contextual interactions therein. For instance, a player's punching gesture, running activity, and fast heart rate conditions can be used as the game inputs. Although the contextual interaction is the core building blocks of pervasive games, individual game developers hardly utilize a rich set of interactions within

Inseok Hwang; Youngki Lee; Junehwa Song

2012-01-01

106

Ferret: RFID Localization for Pervasive Multimedia  

Microsoft Academic Search

The pervasive nature of multimedia recording devices en- ables novel pervasive multimedia applications with automatic, inexpen- sive, and ubiquitous identification and locationing abilities. We present the design and implementation of Ferret, a scalable system for locating nomadic objects augmented with RFID tags and displaying them to a user in real-time. We present two alternative algorithms for refining a postulation of

Xiaotao Liu; Mark D. Corner; Prashant J. Shenoy

2006-01-01

107

Challenges in securing the interface between the cloud and pervasive systems  

Microsoft Academic Search

Cloud computing presents an opportunity for per- vasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some

Brent Lagesse; Brent J

2011-01-01

108

Context Modelling and Management in Ambient-Aware Pervasive Environments  

Microsoft Academic Search

\\u000a Services in pervasive computing systems must evolve so that they become minimally intrusive and exhibit inherent proactiveness\\u000a and dynamic adaptability to the current conditions, user preferences and environment. Con-text awareness has the potential\\u000a to greatly reduce the human attention and interaction bottlenecks, to give the user the impression that services fade into\\u000a the background, and to support intelligent personalization and

Maria Strimpakou; Ioanna Roussaki; Carsten Pils; Michael Angermann; Patrick Robertson; Miltiades E. Anagnostou

2005-01-01

109

Preamble Structure for IEEE 802.11n Wireless LAN System  

NASA Astrophysics Data System (ADS)

This paper proposes a preamble structure that raises the throughput of the physical layer of a MIMO-OFDM system that complies with IEEE 802.11n. The proposed preamble is based on two important criteria that have not been considered in conventional preamble structures but have an important bearing on realization of IEEE 802.11n. One is backward compatibility with legacy devices, such as IEEE 802.11a or IEEE 802.11g. The other is accurate AGC for MIMO data payload of the packet. Computer simulations and a laboratory test demonstrate that the proposed preamble is superior to the other preambles with respect to those two important criteria. The results were submitted to the task group N under the IEEE 802.11 working group and contributed to development of the current draft of IEEE 802.11n.

Aoki, Tsuguhide; Egashira, Yoshimasa; Takeda, Daisuke

110

Challenges in Securing the Interface Between the Cloud and Pervasive Systems  

SciTech Connect

Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

Lagesse, Brent J [ORNL

2011-01-01

111

Mobile phone-based pervasive fall detection  

Microsoft Academic Search

Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection\\u000a increases as the elderly population surges, especially with aging “baby boomers”. However, existing commercial products and\\u000a academic solutions all fall short of pervasive fall detection. In this paper, we propose utilizing mobile phones as a platform for developing pervasive

Jiangpeng Dai; Xiaole Bai; Zhimin Yang; Zhaohui Shen; Dong Xuan

2010-01-01

112

The changing role of pervasive middleware: From discovery and orchestration to recommendation and planning  

Microsoft Academic Search

Future pervasive computing scenarios will be characterized by an increasing diversity and dynamics of services and of contextual data sources, and by an increasing exploitation of crowdsourcing for social sensing and human computation. Accordingly, the role of middleware should no longer be limited to facilitating interactions and compositions via discovery and orchestration, but should approach that of a recommendation engine

Gabriella Castelli; Marco Mamei; Franco Zambonelli

2011-01-01

113

ALPH: a domain-specific language for crosscutting pervasive healthcare concerns  

Microsoft Academic Search

Pervasive healthcare is an advancing discipline that applies ubiquitous computing features to applications deployed in the healthcare domain. In these applications, ubiquitous computing concerns and health informatics concerns are entwined with base functionality resulting in significant, complex crosscutting code. Domainspecific languages (DSLs) can reduce development effort by providing higher level programming abstractions for domain-specific functionality. We introduce ALPH (Aspect Language

Jennifer Munnelly; Siobhán Clarke

2007-01-01

114

New tricks with old sensors: Pervasive Technologies for Novel Applications  

NASA Astrophysics Data System (ADS)

Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

Merrett, Geoff

2013-06-01

115

Pervasive Sensing: Addressing the Heterogeneity Problem  

NASA Astrophysics Data System (ADS)

Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.

2013-06-01

116

Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks  

Microsoft Academic Search

In this paper we propose an adaptive scheduling algorithm for IEEE 802.16j based wireless broadband networks. Computation of an optimal schedule for prioritized traffic in OFDMA based IEEE 802.16 wireless network is an NP-Hard problem. Hence, we propose a scheduling heuristic for an OFDMA based WiMAX relay network. The ORS (OFDMA Relay Sched- uler) heuristic computes the zone boundaries (relay

Debalina Ghosh; Ashima Gupta; Prasant Mohapatra

2009-01-01

117

Pervasive Restart In MOOSE-based Applications  

SciTech Connect

Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setback for a project. Therefore, the ability to “continue” a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of “continuation” is commonly termed “restart” in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of “state”: current time, solution history, material properties, status of mechanical contact, etc. This “state” data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a “pervasive” restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as “state” data, and handles the storage and retrieval of said data.

Derek Gaston; Cody Permann; David Andrs; John Peterson; Andrew Slaughter; Jason Miller

2014-01-01

118

Requesting Pervasive Services by Touching RFID Tags  

Microsoft Academic Search

We suggest a general framework for requesting pervasive services by touching RFID tags. The tags conne ct the physical and digital environments. Visual symbols c ommunicate to users the objects that can be touched and the services that can be activated. When a user touches such a symbol with a mobile phone, the data stored in the tag and other

Jukka Riekki; Timo Salminen; Ismo Alakärppä

2006-01-01

119

Spray Computers: Frontiers of Self-organization for Pervasive Computing  

Microsoft Academic Search

We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic applications. However, beside the vision, spraying may also act as a powerful metaphor for a range of other scenarios that are already under formation, from ad-hoc networks of embedded and mobile devices

Marco Mamei; Franco Zambonelli

2003-01-01

120

IEEE Conference Publications in Libraries.  

ERIC Educational Resources Information Center

Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

Johnson, Karl E.

1984-01-01

121

A Multi-Protocol Approach to Service Discovery and Access in Pervasive Environments  

Microsoft Academic Search

Pervasive computing environments bring new challenges for client\\/service interactions due to the heterogeneity of both the interconnected networks and the middleware platforms used. In order for clients to truly benefit from all the networked services embedded into the environment, an innovative solution is required that overcomes both the lack of interoperability of the existing discovery and access protocols, and the

Pierre-Guillaume Raverdy; Valerie Issarny; Rafik Chibout; Agnes de La Chapelle

2006-01-01

122

Pervasive technology in Neonatal Intensive Care Unit: A prototype for newborns unobtrusive monitoring  

Microsoft Academic Search

Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for

Oriana Ciani; Luca Piccini; Sergio Parini; Alessia Rullo; Franco Bagnoli; Patrizia Marti; Giuseppe Andreoni

2008-01-01

123

The Pervasiveness and Impact of Electronic Communication Technologies in Organizations: A Survey of Major American Corporations.  

ERIC Educational Resources Information Center

A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the…

Hellweg, Susan A.; And Others

124

Research on process-oriented component dynamic migration and deployment in pervasive environment  

Microsoft Academic Search

Process-oriented pervasive applications should insure not only a seamless interaction between user and components with limited computing resources, but also components' dynamic migration and deployment along with action space's change to provide user accurate service. This paper introduces a process-oriented strategy to dynamically migrate and deploy components. A life cycle model is built with Markov Chain based on migratable process

Liu Shiqun; Cui Lizhen

2009-01-01

125

Entering an age of playfulness where persistent, pervasive ambient games create moods and modify behaviour  

Microsoft Academic Search

A novel way of playing games called ambient gaming is defined and described. Growing out of ideas in ambient music, ambient gaming is defined as 'ignorable as it is interesting'. (Eno, 1978) Ambient gaming is set in the context of existing gaming systems, including computer games, Live Action Role Playing, augmented reality and pervasive gaming. Further, ambient games are set

Mark Eyles; Roger Eglin

2007-01-01

126

IEEE-USA: Today's Engineer  

NSDL National Science Digital Library

IEEE-USA, a unit of the Institute of Electrical and Electronics Engineers, maintains this monthly Webzine to inform industry workers and professionals about issues relevant to their careers. Business trends, ethics, public policy, engineering performance, and management are just a few of the focus areas addressed in Today's Engineer. Reader polls provide insight into thoughts and values of engineers around the country. The Web site also keeps archives of both career and policy feature stories that date back to January 2001.

2002-01-01

127

Sensor Network based on IEEE 1451.0 and IEEE p1451.2RS232  

Microsoft Academic Search

The Institute of Electrical and Electronics Engineers (IEEE) 1451 family of standards defines a set of common communication interfaces for connecting smart transducers (sensors or actuators) to microprocessor-based systems, instruments, and networks in a network-independent environment. The IEEE 1451.2 working group is in the process of revising IEEE p1451.2 to work with the IEEE 1451.0-2007 standard. This paper proposes an

E. Y. Song; K. B. Lee

2008-01-01

128

Proceedings of the 1994 ASME/IEEE joint railroad conference  

SciTech Connect

The proceedings contains 22 papers from the IEEE/ASME Joint Railroad Conference. Topics discussed include flange bearing crossing frogs; rapid transit; vehicle on-board computer systems; total transport system control functions; automated train dispatching system; wheel thermal damage limits; AC propulsion; AC traction drives; electric power supplies; failure detection and identification; cargo transportation; and critical speed for railroad vehicles. Papers within the scope of the data base have been processed separately.

Hawthorne, K.L. [ed.; Hill, J.R. [ed.

1994-12-31

129

Adaptive User Profiles in Pervasive Advertising Environments  

NASA Astrophysics Data System (ADS)

Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users' interests can be gathered. Users can deliberately and explicitly provide this information or user's shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an advertising environment and present adaptive profiles, which let users setup profiles based on a self-assessment, and enhance those profiles with information about their real shopping behavior as well as about their activity intensity. Additionally, we explain how pervasive technologies such as Bluetooth can be used to create a profile anonymously and unobtrusively.

Alt, Florian; Balz, Moritz; Kristes, Stefanie; Shirazi, Alireza Sahami; Mennenöh, Julian; Schmidt, Albrecht; Schröder, Hendrik; Goedicke, Michael

130

An IEEE 1451.1 Architecture for ISHM Applications  

NASA Technical Reports Server (NTRS)

The IEEE 1451.1 Standard for a Smart Transducer Interface defines a common network information model for connecting and managing smart elements in control and data acquisition networks using network-capable application processors (NCAPs). The Standard is a network-neutral design model that is easily ported across operating systems and physical networks for implementing complex acquisition and control applications by simply plugging in the appropriate network level drivers. To simplify configuration and tracking of transducer and actuator details, the family of 1451 standards defines a Transducer Electronic Data Sheet (TEDS) that is associated with each physical element. The TEDS contains all of the pertinent information about the physical operations of a transducer (such as operating regions, calibration tables, and manufacturer information), which the NCAP uses to configure the system to support a specific transducer. The Integrated Systems Health Management (ISHM) group at NASA's John C. Stennis Space Center (SSC) has been developing an ISHM architecture that utilizes IEEE 1451.1 as the primary configuration and data acquisition mechanism for managing and collecting information from a network of distributed intelligent sensing elements. This work has involved collaboration with other NASA centers, universities and aerospace industries to develop IEEE 1451.1 compliant sensors and interfaces tailored to support health assessment of complex systems. This paper and presentation describe the development and implementation of an interface for the configuration, management and communication of data, information and knowledge generated by a distributed system of IEEE 1451.1 intelligent elements monitoring a rocket engine test system. In this context, an intelligent element is defined as one incorporating support for the IEEE 1451.x standards and additional ISHM functions. Our implementation supports real-time collection of both measurement data (raw ADC counts and converted engineering units) and health statistics produced by each intelligent element. The handling of configuration, calibration and health information is automated by using the TEDS in combination with other electronic data sheets extensions to convey health parameters. By integrating the IEEE 1451.1 Standard for a Smart Transducer Interface with ISHM technologies, each element within a complex system becomes a highly flexible computation engine capable of self-validation and performing other measures of the quality of information it is producing.

Morris, Jon A.; Turowski, Mark; Schmalzel, John L.; Figueroa, Jorge F.

2007-01-01

131

A Collaborative Access Control Based on XACML in Pervasive Environments  

Microsoft Academic Search

Pervasive environments consist of the heterogeneous network system. And these mean environment that can be the various Web service to sharing of mutual information. However, this requires not only advance security but also districted access control. Because the indiscreet resource access bring on the problem by the mobile devices and wireless network without the time and space, pervasive access control

Kyu Il Kim; Hyuk Jin Ko; Won Gil Choi; Eun Ju Lee; Ung Mo Kim

2008-01-01

132

Pervasive Healthcare Overview… A Personal Perspective (May 2007)  

Microsoft Academic Search

The latest outstanding advances in mobile network technologies, wireless communications and medical sensors are propelling a new and exciting research for 21 st century pervasive healthcare systems. Such systems have the capacity to provide health services for patients regardless of time and place. The aim of this paper is to overview the state of the art pervasive healthcare technologies by

Sabrina Nefti

133

The Rural Growth Revival In Nonmetropolitan America: Evidence of Pervasiveness.  

ERIC Educational Resources Information Center

The 1970's ushered in widespread population deconcentration, seen in the pervasive shift of the United States population down the size-of-place scale. To document population changes in various sized places in the country from 1950 to 1980 and to show the pervasiveness of urban-rural deconcentration in nonmetropolitan areas, researchers examined…

Lichter, Daniel T.; And Others

134

Supporting rapid design and evaluation of pervasive applications: challenges and solutions  

Microsoft Academic Search

Along with the improvement of the key technologies for pervasive computing, the design of applications itself has emerged\\u000a as a notable research area. A design should decide which features go into the application of supporting its context-awareness\\u000a and ascertaining how well those features add value for users with an acceptable user experience. This paper initially identifies\\u000a the challenges in designing

Lei Tang; Zhiwen Yu; Xingshe Zhou; Hanbo Wang; Christian Becker

2011-01-01

135

Performance of the Sleep-Mode Mechanism of the New IEEE 802.16m Proposal for Correlated Downlink Traffic  

NASA Astrophysics Data System (ADS)

There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.

de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig

136

Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards  

NASA Astrophysics Data System (ADS)

Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

Sharma, V.; Singh, H.; Malhotra, J.

2012-12-01

137

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

138

Wellness assistant: a virtual wellness assistant using pervasive computing  

Microsoft Academic Search

The number of people over age 65 will almost double by 2030 and as they age, they generally prefer to remain in their home or go to a nursing home. There are a variety of reasons for their decision, such as convenience or a need for security or privacy. So, it is time to break through the physical boundaries of

Sheikh Iqbal Ahamed; Munirul M. Haque; Karl Stamm; Ahmed J. Khan

2007-01-01

139

HERMES: Pervasive Computing and Cognitive Training for Ageing Well  

Microsoft Academic Search

HERMES aims at alleviating the elderly decline in both declarative and prospective memory, based on a set of ambient daily support and cognitive training applications. Its applications comprise memory aids and cognitive training games, both of which are presented in the paper. The paper introduces also the motivation of the HERMES project and applications. In addition it provides an overview

Cristina Buiza; John Soldatos; Theodore Petsatodis; Arjan Geven; Aitziber Etxaniz; Manfred Tscheligi

2009-01-01

140

New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.  

PubMed

After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare. PMID:15718638

Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

2004-01-01

141

Performance evaluation of IEEE 1609 WAVE and IEEE 802.11p for vehicular communications  

Microsoft Academic Search

In this paper we study the performance of the IEEE 1609 WAVE and IEEE 802.11p trial standards for vehicular communications. We have implemented key components of these standards in a simulation environment also supporting realistic vehicular mobility simulation. We study both the overall capacity of vehicular networks utilizing the said standards, as well as delay performance, which is an extremely

Sebastian Grafling; Petri Mahonen; Janne Riihijarvi

2010-01-01

142

unexceptional.net A Story about a Unique Pervasive Game  

Microsoft Academic Search

This paper describes the pervasive game unexceptional.net. Unexceptional.net is a unique pervasive game that is story-driven where the story evolves through multiple media channels interacting with the player. The game interacts with the user on a cellphone and a PC, and the game provides unique gaming experience by introducing gameplay elements through comics, web hacks, Blogs, a 3D-client, a database

Robert F. Nideffer; Alf Inge Wang

143

Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs  

PubMed Central

ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi’s sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely “noise” generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription.

Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

2014-01-01

144

IEEE 802.15.4 based service configuration mechanism for smartphone  

Microsoft Academic Search

Recent advances in wireless communication technologies have made it possible for even tiny consumer devices to communicate to host systems in a reliable way. Since it is now equipped with strong computational power and sufficient amount of memory, the smartphone could play a role as the host system. In this paper, a service configuration mechanism based on IEEE 802.15.4 will

Choong-Bum Park; Byung-Sung Park; Huy-Jung Uhm; Hoon Choi; Hyong-Shik Kim

2010-01-01

145

MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling  

NASA Astrophysics Data System (ADS)

Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One of those open issues is how to build a synchronized multi-hop mesh network for power efficient, scalable, and robust networking. In fact, while the current specification supports multi-hop networking using peer-to-peer topology, it restricts its use to the beaconless mode. This paper presents an extension to the current IEEE 802.15.4 standard in which mesh networking in the low power beacon mode is enabled through the use of distributed beacon scheduling. The work presented in this paper has been implemented on top of the Open-ZB IEEE 802.15.4 implementation within the TinyOS operating system. The feasibility of our proposal is demonstrated and evaluated through both physical test-bed and computer based emulation.

Muthukumaran, Panneer; de Paz, Rodolfo; Spinar, Rostislav; Pesch, Dirk

146

Patents - Today's Patents Rely on IEEE-Published Science  

Microsoft Academic Search

A recent report showed that the most cited publisher in new technology patents is the IEEE. The report revealed that IEEE journals and conference proceedings received seven times the number of citations of any other publisher. Furthermore, several patent studies commissioned by IEEE studies since 2003 reveal that the trend in citing scientific and technical literature is growing, as is

John Platt

2006-01-01

147

"What Are You Viewing?" Exploring the Pervasive Social TV Experience  

NASA Astrophysics Data System (ADS)

The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas

148

Defining the IEEE-854 floating-point standard in PVS  

NASA Technical Reports Server (NTRS)

A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, the definition of IEEE-854 in PVS also formally defines much of IEEE-754. This collection of PVS theories provides a basis for machine checked verification of floating-point systems. This formal definition illustrates that formal specification techniques are sufficiently advanced that is is reasonable to consider their use in the development of future standards.

Miner, Paul S.

1995-01-01

149

Ethical Responsibility Key to Computer Security.  

ERIC Educational Resources Information Center

The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

Lynn, M. Stuart

1989-01-01

150

Ubiquitous computing in sports: A review and analysis  

Microsoft Academic Search

Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life.The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis

Arnold Baca; Peter Dabnichki; Mario Heller; Philipp Kornfeind

2009-01-01

151

The IEEE Software Engineering Standards Process  

PubMed Central

Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.

Buckley, Fletcher J.

1984-01-01

152

Security vulnerabilities in IEEE 802.22  

Microsoft Academic Search

Cognitive Radio (CR) is seen as one of the enabling tech- nologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world's first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incum- bent) TV broadcast bands.

Kaigui Bian; Jung Min Park

2008-01-01

153

The Use of Psychostimulants in Pervasive Developmental Disorders  

Microsoft Academic Search

Many children with Pervasive Developmental Disorders (PDD) display problematic behaviors similar to those seen in children with Attention Deficit Hyperactivity Disorder (ADHD). This paper will look at the controversy concerning diagnosing comorbid ADHD in children who meet criteria for PDD and review the existing literature examining the efficacy of stimulants in these particular set of behaviors or symptom clusters (hyperactivity,

Patricia Karen Abanilla; Greg A. Hannahs; Robyn Wechsler; Raul R. Silva

2005-01-01

154

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

McDermott, Suzanne; Zhou, Li; Mann, Joshua

2008-01-01

155

Pervasive Technology in Distributed Healthcare: Simultaneous Assessment of Multiple Individuals  

Microsoft Academic Search

The current paradigm of clinic-focused healthcare is challenged by growing numbers of aging baby boomers and the concomitant cost of managing chronic health conditions. We have begun investigating an alternative to clinic-based health assessments, in which pervasive technologies are used to enable continuous monitoring and assessment of patients in a variety of settings outside of hospitals. There are many outstanding

Tamara L. Hayes; Misha Pavel; Andre Adami; Nicole Larimer; Ann Tsay

2006-01-01

156

Towards Action-Oriented Continuous Queries in Pervasive Systems  

Microsoft Academic Search

Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used along- side with non-conventional data sources like data streams, services and events to deal with new properties of such information systems including dynamicity, autonomy and decentralization. In this context, the definition of

Yann Gripay; Frédérique Laforest; Jean-marc Petit

2007-01-01

157

Towards service-oriented continuous queries in pervasive systems  

Microsoft Academic Search

Pervasive information systems give an overview of what digi tal environments should look like in the future. From a data-centric point of view, tr aditional databases have to be used alongside with non-conventional data sources like dat a streams, services and events. In this paper, we tackle the definition of continuous queries co mbining standard relations, data streams and services

Yann Gripay; Frédérique Laforest; Jean-marc Petit

2008-01-01

158

Sleep Patterns of Children with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

Data on sleep behavior were gathered on 100 children (ages 2-11) with pervasive developmental disorders. Slightly more than half of parents reported a sleep problem in their child. All of the children exhibited longer sleep onset times and greater fragmentation of sleep than that reported for age-matched community norms. (Contains references.)…

Honomichl, Ryan D.; Goodlin-Jones, Beth L.; Burnham, Melissa; Gaylor, Erika; Anders, Thomas F.

2002-01-01

159

Vertical handovers as adaptation methods in pervasive systems  

Microsoft Academic Search

Pervasive systems need to be context aware and need to adapt to context changes, including network disconnections and changes in network Quality of Service (QoS). Vertical handover (handover between heterogeneous networks) is one of possible adaptation methods. It allows us ers to roam freely between heterogeneous networks while maintaining continuity of their applications. This paper propos es a vertical handover

S. Balasubramaniam; J. Indulska

2003-01-01

160

Pervasive Developmental Disorders in Individuals with Cerebral Palsy  

ERIC Educational Resources Information Center

The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…

Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

2009-01-01

161

Prevalence of Pervasive Developmental Disorders in Two Canadian Provinces  

ERIC Educational Resources Information Center

Although it is generally accepted that the proportion of children diagnosed with pervasive developmental disorders (PDDs) has increased in the past two decades, there is no consensus on the prevalence of these conditions. The accompanying large rise in demand for services, together with uncertainty regarding the extent to which the observed…

Ouellette-Kuntz, Helene; Coo, Helen; Yu, C. T.; Chudley, Albert E.; Noonan, Andrea; Breitenbach, Marlene; Ramji, Nasreen; Prosick, Talia; Bedard, Angela; Holden, Jeanette J. A.

2006-01-01

162

Extending the IEEE-LTSA.  

ERIC Educational Resources Information Center

An Internet-based course management system has been under development at the Fraunhofer-Institute for Computer Graphics Rostock (Germany) for the past 5 years. It is used by experts for distributing their courses via the Internet and by students for learning with the material distributed. The "Course Management System for WWW--CMS-W3" supports…

Voskamp, Jorg; Hambach, Sybille

163

Review of the IEEE Standard for Computerized Operating Procedure Systems  

SciTech Connect

Increasingly nuclear power plant procedures, such as emergency operating procedures, are being presented in computer form with functionality to support operator use and management of the procedures. The U.S. Nuclear Regulatory Commission (NRC) currently has guidance for the review of computer-based procedures (CBPs); however, there remain CBP functions and human performance issues for which up-to-date guidance is lacking. The Institute of Electrical and Electronics Engineers (IEEE) has initiated a standard development effort to address the human factors engineering (HFE) aspects of CBP systems. When completed, it may provide guidance to supplement the NRC staff's review criteria. The purpose of our study was to evaluate the suitability of the IEEE Standard for use in the NRC's HFE safety reviews of CBP systems and to ensure that the guidance meets the NRC's standard for scientific and engineering rigor used in its own guidance development efforts. We established the following criteria with which to evaluate the Standard: (1) it should meet an existing need of NRC reviewers, (2) it should be based in sound HFE principles, (3) it should be thoroughly peer-reviewed, and (4) it should address CBP-related human performance issues identified in the literature. This report describes the methodology we used to evaluate each criterion. Our evaluation concluded that the Standard generally does meet these criteria, however several areas were identified for which additional clarifications are needed. Thus consideration of the Standard's use by the NRC is supported. The standard evaluation methodology developed in this study can be generally applied to the review of other HFE standards being considered for possible use or endorsement by the NRC.

O'Hara, J.; Higgins, J.

2010-02-26

164

Performance analysis of the IEEE 802.11 distributed coordination function  

Microsoft Academic Search

The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA\\/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the

Giuseppe Bianchi

2000-01-01

165

An Efficient IEEE-Compliant 8×8 Inv-DCT Architecture with 24 Adders  

NASA Astrophysics Data System (ADS)

A cost-effective architecture to compute the Inverse Discrete Cosine Transform (IDCT) is presented. It uses a new 2-D algebraic integer encoding that maps the transform basis coefficients with integers that results in considerable savings in hardware cost. Only 24 adders are required to perform the 8-point 1-D IDCT operation. Simulation results show that the proposed scheme is compliant to IEEE-1180 standard in terms of accuracy requirements.

Wahid, Khan A.

166

Reformulating Power Components Definitions Contained in the IEEE Standard 1459–2000 Using Discrete Wavelet Transform  

Microsoft Academic Search

In nonsinusoidal situations, power components definitions contained in the IEEE standard 1459-2000 are based on a frequency-domain approach using Fourier transform (FT). The frequency-domain approach can provide amplitude-frequency spectrum while loosing time-related information. Moreover, the FT carries a heavier computational burden. To overcome these limitations, definitions of power components are reformulated in the wavelet domain using the discrete wavelet transform

Walid G. Morsi; M. E. El-Hawary

2007-01-01

167

Multihop MAC: IEEE 802.11s Wireless Mesh Networks  

Microsoft Academic Search

This chapter presents IEEE 802.11s, an emerging standard for wireless mesh net- works (WMNs). IEEE 802.11s proposes multihop forwarding at the MAC level, which is a new approach for building WMNs. Traditional solutions for WMNs use network-level routing protocols to allow multihop forwarding among wireless mesh nodes. IEEE 802.11s species multihop MAC functions for mesh nodes using a mandatory path

Ricardo C. Carrano; Muchaluat Saade; Miguel Elias; M. Campista; Igor M. Moraes; Vinicius N. de Albuquerque; Luiz Claudio; Marcelo G. Rubinstein; Henrique M. K. Costa; Otto Carlos; M. B. Duarte

2008-01-01

168

IEEE 802.11 Wireless Local Area Networks  

Microsoft Academic Search

The draft IEEE 802.11 wireless local area network (WLAN) specification is approaching completion. In this article, the IEEE 802.11 protocol is explained, with particular emphasis on the medium access control sublayer. Performance results are provided for packetized data and a combination of packetized data and voice over the WLAN. Our performance investigation reveals that an IEEE 802.11 network may be

Brian P. Crow; I. Widjaja; L. G. Kim; P. T. Sakai

1997-01-01

169

Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components  

PubMed Central

Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.

Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

2009-01-01

170

A study of performances on an automatic IEEE 802.11g wireless-standard robot using infrared sensors  

Microsoft Academic Search

This paper presents a study of performances on an automatic wireless robot using IEEE 802.11 g standard and infrared sensors. The robot acts a personal computer (PC) controlling equipments (e.g. motors) through a printer port. Window XP is setup on the PC robot which is received a command from notebook (only start \\/ stop commands) linked through the use of

Adisorn Leelasantitham; Prawat Chaiprapa

2009-01-01

171

SYMBIOS: A Semantic Pervasive Services Platform for Biomedical Information Integration  

Microsoft Academic Search

Applying semantic pervasive services to Biomedical research is providing a new breed of intelligent applications which can\\u000a tackle with the heterogeneity and intrinsic complexity of biomedical information integration. Using semantics leverages the\\u000a potential of enabling cross-interoperability among a variety of storage and data formats widely distributed both across the\\u000a Internet and within individual organizations. In this paper, we present SYMBIOS,

Myriam Mencke; Ismael Rivera; Juan Miguel Gómez; Giner Alor-hernández; Rubén Posada-gómez; Ying Liu

2008-01-01

172

Familial pervasive development disorder, Tourette disorder and hyperlexia.  

PubMed

Four children and one adult have been found to have Pervasive Developmental Disorder, Tourette disorder and hyperlexia in North Dakota, a state with a population of 204,161 children ages 0-18. Assuming that these are independent disorders the probability of these three disorders occurring by chance in one child is 3.39 x 10(-12). Two of these individuals are from the same family. This suggests evidence for genetic linkage among these three disorders. PMID:3226648

Burd, L; Kerbeshian, J

1988-01-01

173

Pervasive refusal syndrome among asylum-seeking children.  

PubMed

A number of asylum-seeking children in Sweden have developed a pervasive loss of function associated with profound social withdrawal. The syndrome is called Depressive Devitalization. The aim of this study was to identify possible aetiological factors, outline the similarities between Depressive Devitalization and Pervasive Refusal Syndrome and to explore possible differential diagnoses. The research was based on a literature study. Databases searched included PsychINFO, Medline, Pub med, COCHRANE and PILOTS. Possible aetiological factors identified included: Children having a perfectionist, ambitious and conscientious premorbid personality, psychiatric problems of children and parents, and traumatic events. Symptoms between the two syndromes differed only in pattern of refusal and neurological symptoms. None of the differential diagnoses explored could account for all features. The individual impact of aetiological factors requires further investigation. Children might previously have been diagnosed with a number of differential diagnoses, though none of these accounts for all symptoms seen in the syndromes. Depressive Devitalization and Pervasive Refusal Syndrome are suggested to be subgroups of the same refusal syndrome. PMID:17080781

Von Folsach, Liv Lyngå; Montgomery, Edith

2006-07-01

174

Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors  

ERIC Educational Resources Information Center

Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

2007-01-01

175

Frame Capture in IEEE 802.11p Vehicular Networks  

Microsoft Academic Search

IEEE 802.11p is the new standard proposed by the IEEE for wireless connectivity in a vehicular context. It can be used by Advanced Driver Assistance Systems (ADAS) and Intelligent Transport Systems (ITS) to make vehicles aware of the traffic around them and increase vehicle safety with applications like cooperative cruise control, assisted merging and assisted lane switching. It is an

Wijngaarden van Pieter; Eenennaam van Martijn; D. C. Dimitrova; K. C. H. Blom

2010-01-01

176

IEEE 802.15.4a channel model - final report  

Microsoft Academic Search

This is a discussion document for the IEEE document of the IEEE 802.15.4a channel modeling subgroup. It provides models for the following frequency ranges and environments: for UWB channels dovering the frequency range from 2 to 10 GHz, it covers indoor residential, indoor office, industrial, outdoor, and open outdoor environments (usually with a distinction between LOS and NLOS properties). For

Andreas F. Molisch; Kannan Balakrishnan; Dajana Cassioli; Chia-Chin Chong; Shahriar Emami; Andrew Fort; Johan Karedal; Juergen Kunisch; Hans Schantz; Ulrich Schuster; Kai Siwiak

177

IEEE 1394 brings bandwidth, simplicity, and lower costs to machine vision and scientific imaging  

NASA Astrophysics Data System (ADS)

Its official name is IEEE 1394. It is also called FireWireTM (by Apple) and i.LINKTM (by Sony who has licensed this name to several other companies). It was created in the late 1980s as a digital technology designed to satisfy the ever-increasing demand for communications bandwidth for video. It was also designed to simplify and reduce the number of cables and connectors between devices. Simple one-cable connectivity has become a necessity brought about by miniaturization and increasing device functionality as ports have reduced in size and number. The IEEE 1394 high performance serial bus has already found its way into consumer products and one day probably will link every digital appliance in the house: TV, DVR, camcorder, hi-fi stereo, computers and peripherals. Now it's poised to make the same impact in the industrial/scientific imaging world.

Fife, Jerry

2000-05-01

178

A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.  

PubMed

The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems. PMID:24479543

Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

2014-01-01

179

Pervasive technology in Neonatal Intensive Care Unit: a prototype for newborns unobtrusive monitoring.  

PubMed

Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for Electrocardiogram (ECG) and chest dilatation monitoring, augmented with extrinsic transducers for temperature and respiratory activity measure, a device for signals pre-processing, sampling and transmission through Bluetooth(R) (BT) technology to a remote PC station and a software for data capture and post-processing. Preliminary results obtained by monitoring babies just discharged from the ward demonstrated the feasibility of the unobtrusive monitoring on this kind of subjects and open a new scenario for premature newborns monitoring and developmental cares practice in NICU. PMID:19162903

Ciani, Oriana; Piccini, Luca; Parini, Sergio; Rullo, Alessia; Bagnoli, Franco; Marti, Patrizia; Andreoni, Giuseppe

2008-01-01

180

Proceedings: IEEE Workshop on Real-Time Operating Systems and Software (11th) Held in Seattle, Washington on 18-19 May 1994.  

National Technical Information Service (NTIS)

The IEEE Workshop on Real-Time Operating Systems and Software is a forum that covers recent advances in real-time computing -- a field that is becoming an essential part of computer science and engineering. It brings together practitioners and researchers...

1994-01-01

181

Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11  

NASA Astrophysics Data System (ADS)

In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

182

PerSON: A Framework for Service Overlay Network in Pervasive Environments  

Microsoft Academic Search

With the increase in the number of mobile devices and their network capabilities, users expect transparent access to available\\u000a services in their pervasive environment. However, heterogeneity and interoperability issues persist in existing mechanisms.\\u000a In this paper, we present a lightweight framework, PerSON (Service Overlay Network for Pervasive Environments), to abstract\\u000a the details of service provision and utilization in a pervasive

Kumaravel Senthivel; Swaroop Kalasapur; Mohan Kumar

2007-01-01

183

IEEE 802.11n MAC Enhancement and Performance Evaluation  

Microsoft Academic Search

The IEEE 802.11-based WiFi wireless technology is one of the most promising technologies to provide ubiquitous networking\\u000a access. The IEEE 802.11 working group has always strived to improve this wireless technology through creating new amendments\\u000a to the base 802.11 standard. Recently, IEEE 802.11n amendment was created to enhance 802.11 for higher throughput operation.\\u000a Not only new Physical Layer enhancements are

Chih-yu Wang; Hung-yu Wei

2009-01-01

184

An implementation of the new IEEE standard routines for FASTBUS  

SciTech Connect

We have implemented a subset of the new 1987 IEEE standard routines for FASTBUS for the General Purpose Master (GPM), a FASTBUS master developed at CERN. Experiences in implementing and using the new standard routines for FASTBUS are reported.

Kolowski, T.; Foreman, W.M.

1987-01-01

185

IEEE 802.11 Wireless LAN Security White Paper.  

National Technical Information Service (NTIS)

Given the increased productivity and growing popularity of wireless communications in general, and wireless data communications in particular, this paper outlines the protocols, security implications, and architectures of IEEE Std. 802.11-1999 wireless LA...

J. S. King

2001-01-01

186

Pervasive and Non?pervasive Conduct Problems in a Clinic Sample Aged 4–8 years: Child, family and day?care\\/school factors  

Microsoft Academic Search

Differences between pervasive (home and day?care\\/school) versus non?pervasive (home only) conduct problems were examined in regard to various child, parent\\/family, and day?care\\/school characteristics in an outpatient clinic sample of 120 children aged 4–8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory for home problems and met the criteria for a possible or a confirmed

May Britt Drugli; Bo Larsson; Graham Clifford; Sturla Fossum

2007-01-01

187

Fragmented visuospatial processing in children with pervasive developmental disorder.  

PubMed

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a graphic reproduction task [the Rey Complex Figure Task (Rey CFT)]. Control groups were children with Tourette Syndrome (TS) and typically developing children. The TS sample performed similarly to the normal control group in both tasks. The CEFT results did not show the expected preference for local processing in children with PDD-NOS. However, the Rey CFT data revealed that the children with this lesser variant of PDD processed visuospatial information in a fragmented way and were deficient in global processing. PMID:16897391

Schlooz, Wim A J M; Hulstijn, Wouter; van den Broek, Pieter J A; van der Pijll, Angela C A M; Gabreëls, Fons; van der Gaag, Rutger J; Rotteveel, Jan J

2006-11-01

188

Emergence of Intraverbal Antonyms in Children with Pervasive Developmental Disorder  

PubMed Central

In the type of intraverbal that consists of saying the opposite of a word, two intraverbals are related to one another because the response form of each intraverbal functions as part of a discriminative stimulus for the other (e.g., “cold” in response to “name the opposite of hot,” and vice versa). Moreover, the contextual cue “Name the opposite of —” is the same in the two intraverbals. The purpose of the present research was to explore a procedure designed to promote emergence of intraverbals of this type. Two children with pervasive developmental disorder learned pairs of intraverbals. Thereafter, they were tested for emergence of intraverbals with reversed stimulus-response functions. Results indicate that, although the participants did not initially show emergence of intraverbals with reversed stimulus-response functions, repeated cycles of probing and teaching facilitated emergence of these relations.

Antonio Perez-Gonzalez, Luis; Garcia-Asenjo, Lorena; Williams, Gladys; Julio Carnerero, Jose

2007-01-01

189

Markers for improvement in children with pervasive developmental disorders.  

PubMed

In a series of prevalence and follow-up studies on North Dakota's 59 children with pervasive developmental disorders, the patient characteristics of hyperlexia, Tourette disorder (TD), and the absence of seizures were found to be associated with improved outcome or higher IQ. We entered these and 17 other characteristics into a regression model using forward, step-wise inclusion to identify the smallest set of predictor variables which were significantly associated with the dependent variables of IQ, and receptive and expressive language. Of the 20 predictor variables used in the regression analysis, the same four variables met inclusion criteria for each of the dependent variables. These predictor variables were: hyperlexia, a known aetiology, TD and age. The relevance of these findings is discussed. PMID:3199430

Fisher, W; Burd, L; Kerbeshian, J

1988-10-01

190

Learning from failure in health care: frequent opportunities, pervasive barriers  

PubMed Central

The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety.

Edmondson, A

2004-01-01

191

IEEE 802.11p performance evaluation and protocol enhancement  

Microsoft Academic Search

The IEEE 802.11p wireless access in vehicular environment (WAVE) protocol providing for vehicle-to-infrastructure and vehicle-to-vehicle radio communication is currently under standardization. We provide an NS-2 simulation study of the proposed IEEE 802.11p MAC protocol focusing on vehicle-to-infrastructure communication. We show that the specified MAC parameters for this protocol can lead to undesired throughput performance because the backoff window sizes are

Yi Wang; Akram Ahmed; Bhaskar Krishnamachari; Konstantinos Psounis

2008-01-01

192

A Comprehensive Performance Study of IEEE 802.15.4  

Microsoft Academic Search

IEEE 802.15.4 is a new standard uniquely designed for low rate wireless personal area networks (LR- WPANs). It targets low data rate, low power consumption and low cost wireless networking, and offers device level wireless connectivity. We develop an NS2 simulator for IEEE 802.15.4 and conduct several sets of experiments to study its various features, including: (1) beacon enabled mode

Jianliang Zheng; Myung J. Lee

193

Throughput and delay limits of IEEE 802.11  

Microsoft Academic Search

The IEEE 802.11 protocol family provides up to 54-Mbps data rate, whereas the industry is seeking higher data rates. This paper shows that a theoretical throughput upper limit and a theoretical delay lower limit exist for the IEEE 802.11 protocols. The existence of such limits indicates that by simply increasing the data rate without reducing overhead, the enhanced performance, in

Yang Xiao; J. Rosdahl

2002-01-01

194

IEEE9 Buses System Simulation and Modeling in PSCAD  

Microsoft Academic Search

Based on the IEEE9 buses system provided by the simulation software BPA, the electromagnetic transient model of the 9-bus system in PSCAD\\/EMTDC is modeled in this paper. The steady-state characteristics and dynamic characteristics of IEEE9 buses system in BPA and PSCAD\\/EMTDC are compared in this paper. Then, the differences of simulation results between the electromechanical transient model and the electromagnetic

Hongyan Teng; Chongru Liu; Minxiao Han; Shiying Ma; Xiaojiang Guo

2010-01-01

195

Determinist contention window algorithm for IEEE 802.11  

Microsoft Academic Search

With the widespread IEEE 802.11 networks use, strong needs to enhance quality of service (QoS) has appeared. The IEEE 802.11 medium access control (MAC) protocol provides a contention-based distributed channel access mechanism that allow for wireless medium sharing. This protocol involves a significant collision rate as the network gets fairly loaded. Although the contention window (CW) is doubled after each

A. Ksentini; A. Nafaa; A. Gueroui; M. Naimi

2005-01-01

196

Drive-thru Internet: IEEE 802.11b for \\  

Microsoft Academic Search

This paper reports on measurement results for the use of IEEE 802.11 networks in drive-thru scenarios :w e have measured transmission characteristics for sending and receiving high data volumes using UDP and TCP in vehicles moving at different speeds that pass one or more IEEE 802.11 access points at the roadside. We discuss possibilities and limitations for the use of

Jörg Ott; Dirk Kutscher

2004-01-01

197

Spray Computers: Frontiers of Self-Organization: Frontiers of Self-Organization for Pervasive Computing  

Microsoft Academic Search

We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic applications. However, beside the vision, spraying may also act as a powerful metaphor for a range of other scenarios that are already under formation, from ad-hoc networks of embedded and mobile devices

Marco Mamei; Franco Zambonelli; Marie-Pierre Gleizes; Robert Tolksdorf

198

IEEE 1451-based Intelligent Computer Numerical Control Tool Holder  

Microsoft Academic Search

The performance of a machine cutting tool has a significant effect on the processing quality. Thus, it is essential to design a robust system for monitoring and predicting failures of a machine tool by using its working parameters. In this study, a wireless sensor system has been developed for monitoring the processing state of the machine cutting tool. The proposed

Chao-Ching Ho; Tsung-Ting Tsai; Tzu-Hsin Kuo

2012-01-01

199

PerFallD: A pervasive fall detection system using mobile phones  

Microsoft Academic Search

Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging ¿baby boomers¿, fall detection becomes increasingly important. However, existing commercial products and academic solutions struggle to achieve pervasive fall detection. In this paper, we propose utilizing mobile phones as a platform for pervasive fall detection system development.

Jiangpeng Dai; Xiaole Bai; Zhimin Yang; Zhaohui Shen; Dong Xuan

2010-01-01

200

TeMPS: A Conceptual Framework for Pervasive and Social Games  

Microsoft Academic Search

Pervasive and social game is an emerging game genre which brings more physical movement and social interactions into game. This article proposes the conceptual framework TeMPS that systematically characterizes the important aspects of pervasive and social games. Further, around thirty games in different sub-genres are reviewed by analyzing and fitting them into the framework. The framework is helpful for game

Hong Guo; H. Trtteberg; Alf Inge Wang; Meng Zhu

2010-01-01

201

Factor Analytic Study of Repetitive Behaviours in Young Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The aim of the current study was to investigate the manifestation of repetitive behaviour profiles in young children with a Pervasive Developmental Disorder. The sample consisted of 137 developmentally delayed children with a DSM-IV-TR Pervasive Developmental Disorder (PDD) and 61 developmentally delayed children without a PDD. An exploratory…

Mooney, Erin L.; Gray, Kylie M.; Tonge, Bruce J.; Sweeney, Deborah J.; Taffe, John R.

2009-01-01

202

Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.  

PubMed

We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

Misi?, Jelena; Sherman Shen, Xuemin

2009-01-01

203

Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications  

PubMed Central

We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

Misic, Jelena; (Sherman) Shen, Xuemin

2009-01-01

204

Reformulating Three-Phase Power Components Definitions Contained in the IEEE Standard 1459–2000 Using Discrete Wavelet Transform  

Microsoft Academic Search

Power components definitions contained in the IEEE Standard 1459-2000 for unbalanced three-phase systems with nonsinusoidal situations are represented in the frequency domain based on Fourier transform (FT). However, FT suffers from the high computational effort especially when the number of phases increases and it is unable to provide information concerning time content because it provides only an amplitude-frequency spectrum. On

Walid G. Morsi; M. E. El-Hawary

2007-01-01

205

A Proposal of the Co-existence MAC of IEEE 802.11b\\/g and 802.15.4 used for The Wireless Sensor Network  

Microsoft Academic Search

Our proposing wireless sensor system, which consists of a hierarchical sensor network and an application network, will enable an application of ubiquitous computing. The hierarchical sensor network consists of 1) a sensor network, where clusters of sensor nodes communicate via IEEE 802.15.4 to a sink node 2) a relay network, consisting of Wideband Relay Nodes (WRNs). The WRNs act as

Keisuke Nakatsuka; K. Nakamura; Y. Hirata; T. Hattori

2006-01-01

206

IEEE Conference on Software Engineering Education and Training (CSEE&T 2012) Proceedings (25th, Nanjing, Jiangsu, China, April 17-19, 2012)  

ERIC Educational Resources Information Center

The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as in…

IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012

2012-01-01

207

Safety Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder or Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS)  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2014-06-05

208

Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2013-10-31

209

An Open-Label Safety Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS)  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2013-09-20

210

A Kennedy Space Center implementation of IEEE 1451  

NASA Astrophysics Data System (ADS)

To meet the demand for more reliable sensory data, longer sensor calibration cycles, and more useful information for operators at NASA's Kennedy Space Center (KSC), NASA's Instrumentation Branch and ASRC's Advanced Electronics and Technology Development Laboratory at the KSC are developing custom intelligent sensors based on the IEEE 1451 family of smart-sensor standards. The KSC intelligent sensors are known as Smart Networked Elements (SNEs), and each SNE includes transducers and their associated Transducer Electronic Data Sheets (TEDS), signal conditioning, analog-to-digital conversion, software algorithms for performing health checks on the data, and a network connection for sending data to other SNEs and higher-level systems. The development of the SNE has led to the definition of custom architectures, protocols, IEEE 1451 implementations, and TEDS, which are presented in this paper. The IEEE 1451 standards describe the architecture, message formats, software objects, and communication protocols within the smart sensor. Because of the standard's complexity, KSC has simplified the IEEE 1451 architecture and narrowed the scope of software objects to be included in the SNE to create a "light" IEEE 1451 implementation, and has used the manufacturer-defined TEDS to customize the SNE with health indicators. Furthermore, KSC has developed a protocol that allows the SNEs to communicate over an Ethernet network while reducing bandwidth requirements.

Oostdyk, Rebecca; Mata, Carlos T.; Perotti, José M.; Lucena, Angel R.; Mullenix, Pamela

2006-06-01

211

A reliable architectural style for designing pervasive healthcare systems.  

PubMed

The evolution of wireless communication technologies opened the way to the definition of innovative e-Health systems aimed at providing a continuous and remote support to patients and new instruments to improve the workflow of the medical personnel. Nowadays, pervasive healthcare systems are a major step in this regard. The safety-critical systems on one hand and their failure in communication (i.e. sending and receiving messages) in other hand may lead to disaster results in the systems. Moreover, the need for high quality services in such systems, and the access to various types of Quality of Services such as reliability in software development has been increasing in the past years. In this paper, firstly we extend the core meta-model of the previously designed style for designing the structures of such systems in order to reach a high level of reliability in messaging. Secondly, their configuration mechanisms in controlling the communicative errors will be modeled using graph transformation rules. Finally, the correctness of the model is analyzed by model checking techniques. The results of the analysis show its high reliability. PMID:24994511

Rafe, Vahid; Hajvali, Masoumeh

2014-09-01

212

Global Prevalence of Autism and Other Pervasive Developmental Disorders  

PubMed Central

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160–179. © 2012 International Society for Autism Research, Wiley Periodicals, Inc.

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcin, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-01-01

213

A pervasive visual-haptic framework for virtual delivery training.  

PubMed

Thanks to the advances of voltage regulator (VR) technologies and haptic systems, virtual simulators are increasingly becoming a viable alternative to physical simulators in medicine and surgery, though many challenges still remain. In this study, a pervasive visual-haptic framework aimed to the training of obstetricians and midwives to vaginal delivery is described. The haptic feedback is provided by means of two hand-based haptic devices able to reproduce force-feedbacks on fingers and arms, thus enabling a much more realistic manipulation respect to stylus-based solutions. The interactive simulation is not solely driven by an approximated model of complex forces and physical constraints but, instead, is approached by a formal modeling of the whole labor and of the assistance/intervention procedures performed by means of a timed automata network and applied to a parametrical 3-D model of the anatomy, able to mimic a wide range of configurations. This novel methodology is able to represent not only the sequence of the main events associated to either a spontaneous or to an operative childbirth process, but also to help in validating the manual intervention as the actions performed by the user during the simulation are evaluated according to established medical guidelines. A discussion on the first results as well as on the challenges still unaddressed is included. PMID:20659831

Abate, Andrea F; Acampora, Giovanni; Loia, Vincenzo; Ricciardi, Stefano; Vasilakos, Athanasios V

2010-03-01

214

Global prevalence of autism and other pervasive developmental disorders.  

PubMed

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. PMID:22495912

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcín, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-06-01

215

A Solicitation-based IEEE 802.11p MAC Protocol for Roadside to Vehicular Networks  

Microsoft Academic Search

Recently, vehicular networks have begun to attract much attention in industry as well as academia. In particular, IEEE 802.11-based solutions for vehicular networks are also investigated by IEEE 802.11p. As the original IEEE 802.11 standard is designed only for little mobility, the IEEE 802.11p working group should address important issues such as frequent disconnection and handoff. We first introduce new

Nakjung Choi; Sungjoon Choi; Yongho Seok; Taekyoung Kwon; Yanghee Choi

2007-01-01

216

Evaluation of Quality of Service Schemes for IEEE 802.11 Wireless LANs  

Microsoft Academic Search

This paper evaluates four mechanisms for providing ser- vice differentiation in IEEE 802.11 wireless LANs, the Poin t Coordinator Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordinator Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, Distributed Fair Scheduling (DFS), and Blackburst using the ns-2 simulator. The metrics used in the evaluation are throughput, medium utilization, collision

Andreas Almquist; Andreas Lindgren; Olov Schelén

2001-01-01

217

Understanding the IEEE 1451 standard in 6loWPAN sensor networks  

Microsoft Academic Search

The adoption of the IPv6 networking in IEEE 802.15.4 sensor networks, using IEEE 1451 standardization, increases the interoperability of low-power smart sensor devices in IP networks. This paper explains the design and implementation of IPv6 over Low power Wireless Personal Area Networks (6loWPAN) and it uses the IEEE 1451 standard over IEEE 802.15.4 sensor networks. We propose an application of

Jorge Higuera; Jose Polo

2010-01-01

218

Introduction to IEEE P1900.4 Activities  

NASA Astrophysics Data System (ADS)

The Project Authorization Request (PAR) for the IEEE P1900.4 Working Group (WG), under the IEEE Standards Coordinating Committee 41 (SCC41) was approved in December 2006, leading to this WG being officially launched in February 2007 [1]. The scope of this standard is to devise a functional architecture comprising building blocks to enable coordinated network-device distributed decision making, with the goal of aiding the optimization of radio resource usage, including spectrum access control, in heterogeneous wireless access networks. This paper introduces the activities and work under progress in IEEE P1900.4, including its scope and purpose in Sects. 1 and 2, the reference usage scenarios where the standard would be applicable in Sect. 4, and its current system architecture in Sect. 5.

Buljore, Soodesh; Muck, Markus; Martigne, Patricia; Houzé, Paul; Harada, Hiroshi; Ishizu, Kentaro; Holland, Oliver; Mihailovic, Andrej; Tsagkaris, Kostas A.; Sallent, Oriol; Clemo, Gary; Sooriyabandara, Mahesh; Ivanov, Vladimir; Nolte, Klaus; Stametalos, Makis

219

IEEE - A Bold Leader in Changing the Essence of Technical Publications  

Microsoft Academic Search

Through the efforts of volunteers and staff, IEEE has, over the past 125 years, served the technology information needs of its stakeholders, while becoming a leader in the technical publishing industry. During these 125 years, IEEE relevant technologies, the needs of the global work force in IEEE technical communities, and the pace of technological development have undergone several paradigm shifts.

Kenneth R. Laker

2009-01-01

220

Prevalence of Pervasive Developmental Disorders in the British Nationwide Survey of Child Mental Health  

Microsoft Academic Search

ObjectiveThe prevalence of pervasive developmental disorders (PDD) is not well established and needs monitoring. The prevalence of PDD in the 1999 nationwide British survey of child and adolescent mental health was investigated.

ERIC FOMBONNE; HELEN SIMMONS; TAMSIN FORD; HOWARD MELTZER; ROBERT GOODMAN

2001-01-01

221

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...the nominated urban area other than those of pervasive poverty and unemployment. A high incidence of crime, narcotics use, homelessness, abandoned housing, and deteriorated infrastructure or substantial population decline, are examples of appropriate...

2013-04-01

222

Context-aware access control for pervasive access to process-based healthcare systems.  

PubMed

Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced. PMID:18487810

Koufi, Vassiliki; Vassilacopoulos, George

2008-01-01

223

Usage Management in Cloud Computing  

Microsoft Academic Search

User concerns regarding data handling within the cloud will gain increasing importance as cloud computing becomes more pervasive. Existing service level agreement (SLA) frameworks are not designed for flexibly handling even relatively straightforward usage policies. This paper introduces the notion and importance of usage management in cloud computing. It provides an analysis of features and challenges involved in deploying a

Pramod A. Jamkhedkar; Christopher C. Lamb; Gregory L. Heileman

2011-01-01

224

Vigil: Providing Trust for Enhanced Security in Pervasive Systems.  

National Technical Information Service (NTIS)

Computing today is moving away from the desktop, becoming diffused into our surroundings and onto our personal digital devices. Moreover, ad-hoc networks such as Bluetooth provide for spontaneous connectivity between computationally enabled devices within...

L. Kagal J. Undercoffer F. Perich A. Joshi T. Finin

2005-01-01

225

Assessing Evidence for a Pervasive Alteration in Tropical Tree Communities  

PubMed Central

In Amazonian tropical forests, recent studies have reported increases in aboveground biomass and in primary productivity, as well as shifts in plant species composition favouring fast-growing species over slow-growing ones. This pervasive alteration of mature tropical forests was attributed to global environmental change, such as an increase in atmospheric CO2 concentration, nutrient deposition, temperature, drought frequency, and/or irradiance. We used standardized, repeated measurements of over 2 million trees in ten large (16–52 ha each) forest plots on three continents to evaluate the generality of these findings across tropical forests. Aboveground biomass increased at seven of our ten plots, significantly so at four plots, and showed a large decrease at a single plot. Carbon accumulation pooled across sites was significant (+0.24 MgC ha?1 y?1, 95% confidence intervals [0.07, 0.39] MgC ha?1 y?1), but lower than reported previously for Amazonia. At three sites for which we had data for multiple census intervals, we found no concerted increase in biomass gain, in conflict with the increased productivity hypothesis. Over all ten plots, the fastest-growing quartile of species gained biomass (+0.33 [0.09, 0.55] % y?1) compared with the tree community as a whole (+0.15 % y?1); however, this significant trend was due to a single plot. Biomass of slow-growing species increased significantly when calculated over all plots (+0.21 [0.02, 0.37] % y?1), and in half of our plots when calculated individually. Our results do not support the hypothesis that fast-growing species are consistently increasing in dominance in tropical tree communities. Instead, they suggest that our plots may be simultaneously recovering from past disturbances and affected by changes in resource availability. More long-term studies are necessary to clarify the contribution of global change to the functioning of tropical forests.

Chave, Jerome; Condit, Richard; Muller-Landau, Helene C; Thomas, Sean C; Ashton, Peter S; Bunyavejchewin, Sarayudh; Co, Leonardo L; Dattaraja, Handanakere S; Davies, Stuart J; Esufali, Shameema; Ewango, Corneille E. N; Feeley, Kenneth J; Foster, Robin B; Gunatilleke, Nimal; Gunatilleke, Savitri; Hall, Pamela; Hart, Terese B; Hernandez, Consuelo; Hubbell, Stephen P; Itoh, Akira; Kiratiprayoon, Somboon; LaFrankie, James V; Loo de Lao, Suzanne; Makana, Jean-Remy; Noor, Md. Nur Supardi; Kassim, Abdul Rahman; Samper, Cristian; Sukumar, Raman; Suresh, Hebbalalu S; Tan, Sylvester; Thompson, Jill; Tongco, Ma. Dolores C; Valencia, Renato; Vallejo, Martha; Villa, Gorky; Yamakura, Takuo; Zimmerman, Jess K; Losos, Elizabeth C

2008-01-01

226

Pervasive Growth Reduction in Norway Spruce Forests following Wind Disturbance  

PubMed Central

Background In recent decades the frequency and severity of natural disturbances by e.g., strong winds and insect outbreaks has increased considerably in many forest ecosystems around the world. Future climate change is expected to further intensify disturbance regimes, which makes addressing disturbances in ecosystem management a top priority. As a prerequisite a broader understanding of disturbance impacts and ecosystem responses is needed. With regard to the effects of strong winds – the most detrimental disturbance agent in Europe – monitoring and management has focused on structural damage, i.e., tree mortality from uprooting and stem breakage. Effects on the functioning of trees surviving the storm (e.g., their productivity and allocation) have been rarely accounted for to date. Methodology/Principal Findings Here we show that growth reduction was significant and pervasive in a 6.79·million hectare forest landscape in southern Sweden following the storm Gudrun (January 2005). Wind-related growth reduction in Norway spruce (Picea abies (L.) Karst.) forests surviving the storm exceeded 10% in the worst hit regions, and was closely related to maximum gust wind speed (R2?=?0.849) and structural wind damage (R2?=?0.782). At the landscape scale, wind-related growth reduction amounted to 3.0 million m3 in the three years following Gudrun. It thus exceeds secondary damage from bark beetles after Gudrun as well as the long-term average storm damage from uprooting and stem breakage in Sweden. Conclusions/Significance We conclude that the impact of strong winds on forest ecosystems is not limited to the immediately visible area of structural damage, and call for a broader consideration of disturbance effects on ecosystem structure and functioning in the context of forest management and climate change mitigation.

Seidl, Rupert; Blennow, Kristina

2012-01-01

227

Pervasive Developmental Disorders in Montreal, Quebec, Canada: Prevalence and Links With Immunizations  

Microsoft Academic Search

BACKGROUND.The prevalence of pervasive developmental disorders has increased in recent years. Links with the measles component of the measles-mumps-rubella vaccine and the cumulative exposure to thimerosal through other vaccines have been postulated. OBJECTIVES.The purpose of this work was to estimate the pervasive developmental disorder prevalence in Montreal, Canada, in cohorts born from 1987 to 1998 and evaluate the relationship of

Eric Fombonne; Rita Zakarian; Andrew Bennett; Linyan Meng; B. Pearson

2006-01-01

228

IEEE 802.11p modeling in NS2  

Microsoft Academic Search

In an effort to develop a simulation framework for evaluating the performance of wireless access technologies for vehicular networks, the authors have studied the internal structure of the simulator, NS-2, as well as the draft wireless technology IEEE 802.11p. This intended framework aims at replicating, as far as possible, the access technology characteristics in the simulator and with the help

Balkrishna Sharma Gukhool; Soumaya Cherkaoui

2008-01-01

229

Performance Analysis of IEEE 802.11p Control Channel  

Microsoft Academic Search

The IEEE Task Group has approved recently the 802.11p amendment to enable efficient short range communications for vehicular networks by introducing multiple enhancements at the physical and MAC layer. It defines a control frequency channel for control and most critical data packets and one or several service frequency channels for less critical packets. In this paper, we propose an analytical

Faouzi Kaabi; Pasquale Cataldi; Fethi Filali; Christian Bonnet

2010-01-01

230

Quantitative Error Analysis of Color in IEEE Publications  

Microsoft Academic Search

To demonstrate the performance of color image processing algorithms, it is desirable to be able to accurately display color images in archival publications. Our previous work (see IEEE Trans. Image Proc., vol.8, no.12, Dec. 1999), described requirements for accurately rendering images using your own equipment. This paper discusses the problems of dealing with intermediaries and offers suggestions for improved communication

Michael J. Vrhel; H. Joel Trussell

2000-01-01

231

Evaluation of AC Motor Insualtion Systems by IEEE 275  

Microsoft Academic Search

Two decades of experience at Westinghouse Large Rotating Apparatus Division evaluating motor insulation systems according to IEEE 275 and its precursor standards show good correlation between service experience on the systems tested and the conclusions drawn from the procedure. Despite its drawbacks and abuses, the test procedure has proved itself a practical and very important technique for thermal classification of

J. C. Botts; S. J. Stabile

1978-01-01

232

Runtime Optimization of IEEE 802.11 Wireless LANs Performance  

Microsoft Academic Search

case, a station cannot have exact knowledge of the network contention level (i.e., number of active stations and length of the message transmitted on the channel), but it, at most, can estimate it. This paper presents and evaluates a distributed mechanism for contention control in IEEE 802.11 Wireless LANs. Our mechanism, named Asymptotically Optimal Backoff (AOB), dynamically adapts the backoff

Luciano Bononi; Marco Conti; Enrico Gregori

2004-01-01

233

Throughput analysis of the IEEE 802.4 token bus standard under heavy load  

NASA Technical Reports Server (NTRS)

It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

Pang, Joseph; Tobagi, Fouad

1987-01-01

234

Novel pervasive scenarios for home management: the Butlers architecture.  

PubMed

Many efforts today aim to energy saving, promoting the user's awareness and virtuous behavior in a sustainability perspective. Our houses, appliances, energy meters and devices are becoming smarter and connected, domotics is increasing possibilities in house automation and control, and ambient intelligence and assisted living are bringing attention onto people's needs from different viewpoints. Our assumption is that considering these aspects together allows for novel intriguing possibilities. To this end, in this paper we combine home energy management with domotics, coordination technologies, intelligent agents, ambient intelligence, ubiquitous technologies and gamification to devise novel scenarios, where energy monitoring and management is just the basic brick of a much wider and comprehensive home management system. The aim is to control home appliances well beyond energy consumption, combining home comfort, appliance scheduling, safety constraints, etc. with dynamically-changeable users' preferences, goals and priorities. At the same time, usability and attractiveness are seen as key success factors: so, the intriguing technologies available in most houses and smart devices are exploited to make the system configuration and use simpler, entertaining and attractive for users. These aspects are also integrated with ubiquitous and pervasive technologies, geo-localization, social networks and communities to provide enhanced functionalities and support smarter application scenarios, hereby further strengthening technology acceptation and diffusion. Accordingly, we first analyse the system requirements and define a reference multi-layer architectural model - the Butlers architecture - that specifies seven layers of functionalities, correlating the requirements, the corresponding technologies and the consequent value-added for users in each layer. Then, we outline a set of notable scenarios of increasing functionalities and complexity, discuss the structure of the corresponding system patterns in terms of the proposed architecture, and make this concrete by presenting some comprehensive interaction examples as comic strip stories. Next, we discuss the implementation requirements and how they can be met with the available technologies, discuss a possible architecture, refine it in the concrete case of the TuCSoN coordination technology, present a subsystem prototype and discuss its properties in the Butlers perspective. PMID:24555169

Denti, Enrico

2014-01-01

235

Security, Safety and Privacy - Pervasive Themes for Engineering Education  

Microsoft Academic Search

Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and so- cial problem. The last decade has seen a rapid increase in computer security attacks at all levels, as more in- dividuals connect to common networks and as motivations and means to conduct sophisticated attacks in- crease. A parallel and accelerating trend has been the rapidly growing

S. Meldal; K. Gates; R. Smith; X. Su

236

Using goal-oriented paradigm for community computing  

Microsoft Academic Search

This paper proposes to adopt the goal-oriented computing as a paradigm of computing and software development for industrial ubiquitous computing. We analyze several planning techniques and conclude that partial conditional HTN is most appropriate for goal-oriented computing within the pervasive industrial environment, in view of software engineering. We propose the language and algorithm required for such goal-oriented computing.

Sehyeong Cho; Chulan Ren

2008-01-01

237

Slovak High School Students' Attitudes toward Computers  

ERIC Educational Resources Information Center

The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

2011-01-01

238

Network Analyses Reveal Pervasive Functional Regulation Between Proteases in the Human Protease Web  

PubMed Central

Proteolytic processing is an irreversible posttranslational modification affecting a large portion of the proteome. Protease-cleaved mediators frequently exhibit altered activity, and biological pathways are often regulated by proteolytic processing. Many of these mechanisms have not been appreciated as being protease-dependent, and the potential in unraveling a complex new dimension of biological control is increasingly recognized. Proteases are currently believed to act individually or in isolated cascades. However, conclusive but scattered biochemical evidence indicates broader regulation of proteases by protease and inhibitor interactions. Therefore, to systematically study such interactions, we assembled curated protease cleavage and inhibition data into a global, computational representation, termed the protease web. This revealed that proteases pervasively influence the activity of other proteases directly or by cleaving intermediate proteases or protease inhibitors. The protease web spans four classes of proteases and inhibitors and so links both recently and classically described protease groups and cascades, which can no longer be viewed as operating in isolation in vivo. We demonstrated that this observation, termed reachability, is robust to alterations in the data and will only increase in the future as additional data are added. We further show how subnetworks of the web are operational in 23 different tissues reflecting different phenotypes. We applied our network to develop novel insights into biologically relevant protease interactions using cell-specific proteases of the polymorphonuclear leukocyte as a system. Predictions from the protease web on the activity of matrix metalloproteinase 8 (MMP8) and neutrophil elastase being linked by an inactivating cleavage of serpinA1 by MMP8 were validated and explain perplexing Mmp8?/? versus wild-type polymorphonuclear chemokine cleavages in vivo. Our findings supply systematically derived and validated evidence for the existence of the protease web, a network that affects the activity of most proteases and thereby influences the functional state of the proteome and cell activity.

Fortelny, Nikolaus; Cox, Jennifer H.; Kappelhoff, Reinhild; Starr, Amanda E.; Lange, Philipp F.; Pavlidis, Paul; Overall, Christopher M.

2014-01-01

239

Network analyses reveal pervasive functional regulation between proteases in the human protease web.  

PubMed

Proteolytic processing is an irreversible posttranslational modification affecting a large portion of the proteome. Protease-cleaved mediators frequently exhibit altered activity, and biological pathways are often regulated by proteolytic processing. Many of these mechanisms have not been appreciated as being protease-dependent, and the potential in unraveling a complex new dimension of biological control is increasingly recognized. Proteases are currently believed to act individually or in isolated cascades. However, conclusive but scattered biochemical evidence indicates broader regulation of proteases by protease and inhibitor interactions. Therefore, to systematically study such interactions, we assembled curated protease cleavage and inhibition data into a global, computational representation, termed the protease web. This revealed that proteases pervasively influence the activity of other proteases directly or by cleaving intermediate proteases or protease inhibitors. The protease web spans four classes of proteases and inhibitors and so links both recently and classically described protease groups and cascades, which can no longer be viewed as operating in isolation in vivo. We demonstrated that this observation, termed reachability, is robust to alterations in the data and will only increase in the future as additional data are added. We further show how subnetworks of the web are operational in 23 different tissues reflecting different phenotypes. We applied our network to develop novel insights into biologically relevant protease interactions using cell-specific proteases of the polymorphonuclear leukocyte as a system. Predictions from the protease web on the activity of matrix metalloproteinase 8 (MMP8) and neutrophil elastase being linked by an inactivating cleavage of serpinA1 by MMP8 were validated and explain perplexing Mmp8-/- versus wild-type polymorphonuclear chemokine cleavages in vivo. Our findings supply systematically derived and validated evidence for the existence of the protease web, a network that affects the activity of most proteases and thereby influences the functional state of the proteome and cell activity. PMID:24865846

Fortelny, Nikolaus; Cox, Jennifer H; Kappelhoff, Reinhild; Starr, Amanda E; Lange, Philipp F; Pavlidis, Paul; Overall, Christopher M

2014-05-01

240

1994 ASME/IEEE Joint Railroad Conference  

SciTech Connect

This conference proceedings contains 21 papers. Topics discussed include railroad transportation, signal systems, computer systems, control systems, power supply system, vehicle suspensions, vehicle wheels, traction, failure (mechanical) and sensors. Some papers have been processed separately for inclusion on the data base.

Hawthorne, K.L. [ed.; Hill, J.R. [ed.

1994-12-31

241

Leiter-R versus developmental quotient for estimating cognitive function in preschoolers with pervasive developmental disorders  

PubMed Central

The utility of the developmental quotient (DQ) obtained with the Psychoeducational Profile Revised (PEP-R) was assessed as a means of estimating cognitive ability in young children with pervasive developmental disorders. Data from the PEP-R were analysed in a sample of 44 children aged from 2.0 to 5.9 years (mean 3.46 ± 1), 13 with an autistic disorder and 31 with a pervasive developmental disorder not otherwise specified. DQ scores were compared with scores from the Leiter International Performance Scale Revised-Visualization and Reasoning Battery (Leiter-R) in the same 44 children. Overall and domain DQs on the PEP-R were significantly correlated with Leiter-R scores. This study suggests that DQ scores obtained from the PEP-R in preschool children with pervasive developmental disorders may be a viable alternative to the Leiter-R as an assessment tool.

Portoghese, Claudia; Buttiglione, Maura; De Giacomo, Andrea; Lafortezza, Mariaelena; Lecce, Paola A; Martinelli, Domenico; Lozito, Vito; Margari, Lucia

2010-01-01

242

Fair Scheduling and Throughput Maximization for IEEE 802.16 Mesh Mode Broadband Wireless Access Networks  

NASA Astrophysics Data System (ADS)

Broadband wireless access networks are promising technology for providing better end user services. For such networks, designing a scheduling algorithm that fairly allocates the available bandwidth to the end users and maximizes the overall network throughput is a challenging task. In this paper, we develop a centralized fair scheduling algorithm for IEEE 802.16 mesh networks that exploits the spatio-temporal bandwidth reuse to further enhance the network throughput. The proposed mechanism reduces the length of a transmission round by increasing the number of non-contending links that can be scheduled simultaneously. We also propose a greedy algorithm that runs in polynomial time. Performance of the proposed algorithms is evaluated by extensive simulations. Results show that our algorithms achieve higher throughput than that of the existing ones and reduce the computational complexity.

Alam, Muhammad Mahbub; Hamid, Md. Abdul; Razzaque, Md. Abdur; Hong, Choong Seon

243

IEEE 1394/firewire a low cost, high speed, digital serial bus  

SciTech Connect

Does the world need yet another 1/0 bus standard? If you need fast and cheap serial video communication, then the answer is yes. As technology advances, so too must data transport mechanisms advance. You can`t expect RS-232 to support real-time digital video, and if you can`t afford expensive professional serial video interfaces, (such as Sony`s Serial Digital Interface), Firewire may be a good solution. IEEE 1394, or commonly known as Firewire, is a general purpose serial bus that meets many of the 1/0 needs of today`s video and multimedia developers. For those of you who only read the first paragraph, here`s Firewire in a nutshell: It provides a guaranteed transfer rate of 10OMbps or 20OMbps of digital data (such as video direct from camera to computer), over an inexpensive, non-proprietary serial bus. Here is a list of its features.

Gaunt, R.

1997-05-01

244

Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range  

NASA Astrophysics Data System (ADS)

In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

Choi, Woo-Yong

2011-11-01

245

IEEE 802.11g Baseband Physical Layer Simulation  

Microsoft Academic Search

This paper deals with a Matlab simulation of IEEE 802.11g physical layer specification. The Matlab program simulates data transmission over awgn communication channel for mandatory data rates defined in spec- ification. Program includes Barker coding, CCK and OFDM implementation for data rates from 1 Mbit\\/s to 54 Mbit\\/s. Basic description of the program and results in graphical and numerical form

JAN MIKULKA; STANISLAV HANUS

246

On the Performance of IEEE 802.11 under Jamming  

Microsoft Academic Search

In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose signals arrive according to a Poisson process. We also develop new models for channel-aware jamming,

Emrah Bayraktaroglu; Christopher King; Xin Liu; Guevara Noubir; Rajmohan Rajaraman; Bishal Thapa

2008-01-01

247

Performance of IEEE 802.11 under Jamming  

Microsoft Academic Search

We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware\\u000a jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming,\\u000a including a

Emrah Bayraktaroglu; Christopher King; Xin Liu; Guevara Noubir; Rajmohan Rajaraman; Bishal Thapa

248

IEEE 802.11 rate adaptation: a practical approach  

Microsoft Academic Search

Today, three dieren t physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a\\/b\\/g); they all provide multi-rate capabilities. To achieve a high performance un- der varying conditions, these devices need to adapt their transmission rate dynamically. While this rate adaptation algorithm is a critical component of their performance, only very few algorithms such as Auto Rate Fallback (ARF)

Mathieu Lacage; Mohammad Hossein Manshaei; Thierry Turletti

2004-01-01

249

IEEE Education Society: Global leader in Engineering Education  

Microsoft Academic Search

The IEEE Education Society (EdSoc) is pleased to be a sponsor of EDUCON and technical co-sponsor of TAEE. EdSoc leaders view this conference as vital for carrying out the mission of our society and believe that EDUCON will be at the forefront of global Engineering Education in the future. In this talk, I will describe some of the history of

Susan Lord

2010-01-01

250

IEEE Std 929-2000 - Background, implications and requirements  

SciTech Connect

The newly revised standard, IEEE Std 929-2000, has significant positive implications for those designing inverters for utility-interconnected PV systems and for designers and installers of such systems. A working group of roughly 20 people, including PV systems designers/installers, PV inverter manufacturers and utility engineers spent close to 3 years developing a standard that would be useful and beneficial to all.

STEVENS III,JOHN W.

2000-04-11

251

Performance of IEEE 802.11a in Vehicular Contexts  

Microsoft Academic Search

A key component of intelligent transportation is the provision of adequate network infrastructure to support vehicle- to-vehicle and vehicle-to-roadside communication. In this paper we report on performance evaluations carried out using the IEEE 802.11a protocol at 5.2 GHz between a moving vehicle and a fixed base station. We concentrate our evaluation on realistic urban speeds and environments, observing that performance

David N. Cottingham; Ian J. Wassell; Robert K. Harle

2007-01-01

252

Perci: Pervasive Service Interaction with the Internet of Things  

Microsoft Academic Search

The advancement of ubiquitous computing technologies has greatly improved the availability of digital resources in the real world. Here, the authors investigate mobile interaction with tagged, everyday objects and associated information that's based on the Internet of things and its technologies. Their framework for integrating Web services and mobile interaction with physical objects relies on information typing to increase interoperability.

Gregor Broll; Enrico Rukzio; Massimo Paolucci; Matthias Wagner; Albrecht Schmidt; Heinrich Hussmann

2009-01-01

253

Service Oriented Pervasive Applications Based On Interoperable Middleware  

Microsoft Academic Search

The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting problem for end users: how to locate and interact with a particular network service or device. The increasing presence of mobile and ubiquitous applications has created a need for distributed systems and applications that are dynamic and can efficiently adapt

Aitor Uribarren; Jorge Parra; J. P. Uribe; Kepa Makibar; Ione Olalde; Nati Herrasti

254

Extending Service Area of IEEE 802.11 Ad Hoc Networks  

NASA Astrophysics Data System (ADS)

According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

Choi, Woo-Yong

2012-06-01

255

78 FR 47011 - Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants  

Federal Register 2010, 2011, 2012, 2013

The U.S. Nuclear Regulatory Commission (NRC) is issuing a revised regulatory guide (RG), revision 1 of RG 1.171, ``Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants.'' This RG endorses American National Standards Institute/ Institute of Electrical and Electronics Engineers (ANSI/IEEE) Standard (Std.) 1008-1987, ``IEEE Standard for Software Unit......

2013-08-02

256

Ninth Workshop on Heterogeneous Computing: HCW 2000.  

National Technical Information Service (NTIS)

This grant funded the proceedings of the 9th Heterogeneous Computing Workshop (HCW 2000), which was held in May 2000. HCW 2000 was part of the 14th International Parallel and Distributed Processing Symposium, which was sponsored by the IEEE Computer Socie...

C. S. Raghavendra H. J. Siegel

2000-01-01

257

Understanding IEEE 802.11n multi-hop communication in wireless networks  

Microsoft Academic Search

In this paper, we present a measurement study of the multi-hop behavior of the new IEEE 802.11n standard in an indoor mesh testbed. As main contribution, we quantitatively describe characteristics of IEEE 802.11n on multi-hop paths like throughput, aggregate size and utilized MIMO features. Furthermore, we show how to build an IEEE 802.11n indoor testbed capable of multi-hop communication. In

Jan Friedrich; Simon Frohn; Sascha Gubner; Christoph Lindemann

2011-01-01

258

A study of the key technology of IEEE802.11p-2010  

NASA Astrophysics Data System (ADS)

This article presents an overview of the vehicle wireless communication protocol IEEE802.11p-2010, which was issued in July 2010. The concepts, features, architecture and applications of protocol IEEE802.11p, as well as the required key technologies to implement IEEE802.11p are analyzed in detail, including the OFDM technology, 10MHz bandwidth, requirements of improved receiver, improved transmission standard, improved ACR and WBSS and so on.

Hu, Lin; Kaiser, Thomas; Kupferschmidt, Claus; Nguyen, Hieu; Jing, Huang

2011-10-01

259

Energy-Efficient Traffic Scheduling in IEEE 802.15.4 for Home Automation Networks  

Microsoft Academic Search

The IEEE 802.15.4 low rate wireless personal area network is a protocol suitable for wireless sensor networks. There has been growing interest in the IEEE 802.15.4 protocol in the home automation networks. This paper proposes a scheduling scheme obtaining optimal parameters regarding the IEEE 802.15.4 frame and subframes in the home automation networks. Guaranteed time slots (GTS) are exploited for

Hyung Seok Kim; Joo-Han Song; Seok Lee

2007-01-01

260

A scheduling algorithm for QoS support in IEEE802.11 networks  

Microsoft Academic Search

This article presents a scheduling algorithm for the IEEE 802.11e hybrid coordination function under definition by the IEEE 802.11e task group. HCF can be used to provide IP quality of service guarantees in IEEE802.11e infrastructure WLANs. The enhanced distributed coordination function is mainly used for data transmission without QoS guarantees, but can also be used to decrease the transmission delay

A. Grilo; M. Macedo; M. Nunes

2003-01-01

261

An efficient scheduling scheme for high speed IEEE 802.11 WLANs  

Microsoft Academic Search

The emergence of high speed WLANs, such as the IEEE 802.11a and IEEE 802.11g, has provided an alternative solution for mobile users to access a network in addition to the popular IEEE 802.11b solution. Although the channel data rate of those emerging high speed WLANs is five times higher than that of 802.11b, some recent studies have shown that the

Juki Wirawan Tantra; C. H. Fob; Bu Sung Lee

2003-01-01

262

MicroBlaze based image processing system using IEEE1394a  

Microsoft Academic Search

Previous processor-based Image Processing Systems have many problems such as low processing speed and cumbersome real time image processing. To solve these problems, this research suggests an Image Processing System based on the FPGA(Field-programmable Gate Array)-based Soft Core Processor and IEEE 13 94a protocol. IEEE 1394a protocol is materialized through IC(LLC, PHY) that supports IEEE1394 Ver.A(400 Mhz). The Image Processing

Sang Jun Lee; Dae Ro Lee; Seung Hun Jin; Jae Wook Jeon; Key Ho Kwon

2007-01-01

263

Analysis and Enhancements for IEEE 802.11 Networks Using Directional Antenna With Opportunistic Mechanisms  

Microsoft Academic Search

Directional antennas are introduced to improve the performance of IEEE 802.11-based wireless networks by allowing stations equipped with directional antennas to beam the data in a specific direction. Since IEEE 802.11 has been developed with omni antennas in mind, deploying IEEE 802.11 in a directional antenna environment leads stations to be conservative in blocking their own transmissions in favor of

Tamer Nadeem

2010-01-01

264

Performance Analysis of IEEE 802.11 DCF in Imperfect Channels  

Microsoft Academic Search

Abstract— IEEE 802.11 is the most important standard for wireless local area networks (WLANs). In IEEE 802.11, the fundamental medium,access control (MAC) scheme is distributed coordination function (DCF). To understand the performance of WLANs, it is important to analyze IEEE 802.11 DCF. Recently, several analytical models have been proposed to evaluate the performance of DCF under different incoming traffic conditions.

Kejie Lu; Dapeng Wu; Yuguang Fang

2006-01-01

265

Cloud@Home: A New Enhanced Computing Paradigm  

Microsoft Academic Search

\\u000a Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, (“… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end\\u000a computational capabilities” (Foster, 2002)) Internet Computing (“…a computing platform geographically distributed across the Internet” (Milenkovic et al., 2003)), Utility computing (“a collection of technologies and business practices that enables computing to be

Salvatore Distefano; Vincenzo D. Cunsolo; Antonio Puliafito; Marco Scarpa

2010-01-01

266

Tackling HCI Challenges of Creating Personalised, Pervasive Learning Ecosystems  

Microsoft Academic Search

\\u000a This paper explores two classes of emerging technology that offer the promise to provide radically improved ways to support\\u000a lifelong learning. We particularly focus on the human computer interaction (HCI) challenges that must be addressed if that\\u000a promise is to be realised. One technology is personalisation, based on a long term learner model which captures the learner’s knowledge, preferences and

Judy Kay; Bob Kummerfeld

2010-01-01

267

The role of complex systems in the management of pervasive computing  

Microsoft Academic Search

Network complexity will increase dramatically over the next 5 years as will the amount of devices inhabiting these networks. Ad-hoc and active paradigms will make the already onerous task of network management increasingly problematic. An approach to managing such networks based on bacterial colony behaviour is discussed, offering innate abilities for essential tasks such as software proliferation, load balancing and

Ian W. Marshall; Chris Roadknight; Lionel Sacks

268

Some socio-technical aspects of intelligent buildings and pervasive computing research  

Microsoft Academic Search

You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and…every movement scrutinized. (George Orwell, 1984)Recent reports from the European Parliament Technology Assessment unit and the UK Information Commissioner's Office have highlighted the need for debate on how society should balance the convenience that new technology affords with the need to

Vic Callaghan; Graham Clarke; Jeannette Chin

2009-01-01

269

Retrospective Study of Quetiapine in Children and Adolescents with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

A retrospective study was conducted in a clinic specialized in treating individuals with developmental disabilities to examine the effectiveness and tolerability of quetiapine in children and adolescents with pervasive developmental disorders. Ten consecutive outpatients (age = 12.0 [plus or minus] 5.1 years) treated with quetiapine (dose = 477…

Hardan, Antonio Y.; Jou, Roger J.; Handen, Benjamin L.

2005-01-01

270

Epidemiological Surveys of Autism and Other Pervasive Developmental Disorders: An Update  

Microsoft Academic Search

This paper was commissioned by the committee on the Effectiveness of Early Education in Autism of the National Research Council (NRC). It provides a review of epidemiological stud- ies of pervasive developmental disorders (PDD) which updates a previously published article (The epidemiology of autism: a review. Psychological Medicine 1999; 29: 769-786). The de- sign, sample characteristics of 32 surveys published

Eric Fombonne

2003-01-01

271

Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and/or the white matter and is it global or more prominent in specific brain regions. Methods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely…

Palmen, Saskia J. M. C.; Pol, Hilleke E. Hulshoff; Kemner, Chantal; Schnack, Hugo G.; Janssen, Joost; Kahn, Rene S.; van Engeland, Herman

2004-01-01

272

An RFID-Based Software Agent Framework on Pervasive Health Service  

Microsoft Academic Search

Due to the aging population society coming, more and more families need the in-time service of medical care for the elderly. For creating a healthy and safety living environment, this study is applied to the radio frequency identification (RFID) and the software agent technology to develop the pervasive health service grid. This framework is based on the grid architecture to

Kun-Chieh Yeh; Y.-C. Chen; Chia-Chen Chen; Ruey-Shun Chen

2009-01-01

273

Believable environments: generating interactive storytelling in vast location-based pervasive games  

Microsoft Academic Search

Generating content into vast areas is a relevant challenge in the field of location-based pervasive games. In this paper, we present a game proto- type that enables children travelling in the back seat of a car to enjoy a narrated experience where gameplay combines with the experience of trav- eling through the road network. The prototype is designed to provide

Anton Gustafsson; John Bichard; Liselott Brunnberg; Oskar Juhlin; Marco Combetto

2006-01-01

274

Sex Differences in WISC-III Profiles of Children with High-Functioning Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Using the Japanese version of the Wechsler Intelligence Scale for Children-Third Edition (WISC-III), 26 girls with high-functioning (IQ greater than or equal to 70) pervasive developmental disorders (HFPDD) (mean age, 8.2 years) were compared with 116 boys with HFPDD (mean age, 9.0 years). Compared with the boys, the girls scored significantly…

Koyama, Tomonori; Kamio, Yoko; Inada, Naoko; Kurita, Hiroshi

2009-01-01

275

Early Parent–Child Relations and Family Functioning of Preschool Boys with Pervasive Hyperactivity  

Microsoft Academic Search

This study examined the quality of parent–child relationships and family functioning of preschool children with early onset hyperactivity by comparing a community sample of 33 pervasively hyperactive preschool boys with a comparison sample of 34 boys. Mothers and children were assessed at home on a range of interview, parent questionnaire, and observational measures of parenting and family functioning. Results of

Louise J. Keown; Lianne J. Woodward

2002-01-01

276

Audiovisual speech integration in Pervasive Developmental Disorder: Evidence from Event-Related Potentials  

Microsoft Academic Search

Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously presented visual and auditory cues. Method: We investigated audiovisual integration of speech stimuli among a group of

M. J. C. M. Magnee; Beatrice de Gelder; Herman van Engeland; Chantal Kemner

2008-01-01

277

Demo: ExerLink - enabling pervasive social exergames with heterogeneous exercise devices  

Microsoft Academic Search

We demonstrate a pervasive social exergame platform called ExerLink that converts exercise intensity to game inputs and intelligently balances intensity\\/delay variations for fair game play experiences. Also, we show the potential of using multiple exercise devices as game controllers and incorporating multiple heterogeneous controllers into a game. Specifically, we consider a class of exercise equipment used for repetitive, individual, and

Inseok Hwang; Uichin Lee; Sunghoon Ivan Lee; Chungkuk Yoo; Youngki Lee; Hyukjae Jang; Sungwon Peter Choe; Junehwa Song

2012-01-01

278

ExerLink: enabling pervasive social exergames with heterogeneous exercise devices  

Microsoft Academic Search

We envision that diverse social exercising games, or exergames, will emerge, featuring much richer interactivity with immersive game play experiences. Further, the recent advances of mobile devices and wireless networking will make such social engagement more pervasive - people carry portable exergame devices (e.g., jump ropes) and interact with remote users anytime, anywhere. Towards this goal, we explore the potential

Inseok Hwang; Uichin Lee; Sunghoon Ivan Lee; Chungkuk Yoo; Youngki Lee; Hyukjae Jang; Sungwon Peter Choe; Junehwa Song

2012-01-01

279

DEVELOPING FRIENDSHIP SKILLS WITH CHILDREN WITH PERVASIVE DEVELOPMENTAL DISORDERS: a case study  

Microsoft Academic Search

This is a case study of a group run over ten sessions with a class of children, aged between ten and twelve, in a special school. All of the children had a diagnosis of pervasive developmental disorder, which included Rett's disorder, Autism, and Asperger's Syndrome. In addition two children had a diagnosis of Attention Deficit Hyperactivity Disorder (ADHD), one had

Caroline Miller

2005-01-01

280

Effects of Object Complexity and Type on the Gaze Behavior of Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

The looking behavior of children with pervasive developmental disorder (PDD) and age- and IQ-matched normal control children was studied using infrared oculography. Stimuli varying in complexity and topic were presented to test whether children with PDD have specific abnormalities in looking behavior to complex stimuli and/or to faces. All…

Kemner, C.; van der Geest, J. N.; Verbaten, M. N.; van Engeland, H.

2007-01-01

281

Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social…

Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.

2009-01-01

282

The Co-Occurrence of Nonaffective Psychosis and the Pervasive Developmental Disorders: A Systematic Review  

ERIC Educational Resources Information Center

Background: Pervasive developmental disorders (PDDs) were originally conceptualised as a form of ("infantile") psychosis. Recently, the disorders have been viewed as separate constructs. However, there is evidence of overlapping psychopathology, pathophysiology, and occurrence of the two syndromes. Methods: A historical overview is provided. A…

Padgett, Fiona E.; Miltsiou, Eleni; Tiffin, Paul A.

2010-01-01

283

Questionnaire screening for comorbid pervasive developmental disorders in congenitally blind children: A pilot study  

Microsoft Academic Search

Teachers and parents completed the Autism Behavior Checklist (ABC) on a clinical sample of 17 congenitally blind children. Of the 17 children, 4 had a definite or likely pervasive developmental disorder (PDD) as judged by independent case note review. The ABC was administered both in its original format and in a slightly modified format. Only teacher-completed ABCs detected group differences

Robert Goodman; Carine Minne

1995-01-01

284

Is Pervasive Developmental Disorder Not Otherwise Specified Less Stable than Autistic Disorder? A Meta-Analysis  

ERIC Educational Resources Information Center

We reviewed the stability of the diagnosis of pervasive developmental disorder not otherwise specified (PDD-NOS). A Medline search found eight studies reiterating a diagnostic assessment for PDD-NOS. The pooled group included 322 autistic disorder (AD) and 122 PDD-NOS cases. We used percentage of individuals with same diagnose at Times 1 and 2 as…

Rondeau, Emelie; Klein, Leslie S.; Masse, Andre; Bodeau, Nicolas; Cohen, David; Guile, Jean-Marc

2011-01-01

285

'All That Glitters Is Not Gold': Misdiagnosis of Psychosis in Pervasive Developmental Disorders - A Case Series  

Microsoft Academic Search

The early literature established the validity of the distinction between early onset schizophrenia and autism. In the modern context of increasing recognition of pervasive developmental disorders (PDD) and a growing interest in very early onset schizophrenia and other childhood onset psychoses, this clinical distinction is often difficult to make. This article looks at problems arising from overdiagnos- ing psychosis in

DAVID R. D OSSETOR

286

Using smart phones and body sensors to deliver pervasive mobile personal healthcare  

Microsoft Academic Search

Pervasive health care is regarded as a key driver in reducing expenditure and enabling improvements in disease management. Advances in wireless communication and sensor technologies permit the real time acquisition, transmission and processing of critical medical information. In this paper, we examine different approaches of streaming physiological data from body sensors over a wireless network. Modern mobile phones provide sufficient

Patrick Crilly; Vallipuram Muthukkumarasamy

2010-01-01

287

Genetic and neurological evaluation in a sample of individuals with pervasive developmental disorders  

Microsoft Academic Search

With the aim of analyzing which complementary tests are relevant in the diagnostic evaluation of individuals with pervasive developmental disorders, a protocol of clinical and laboratory evaluation was applied in 103 outpatients. The protocol included chromosomal analysis, screening for inborn errors of metabolism, cytogenetic and molecular study of the FRAXA, FRAXE, and FRAXF mutations, EEG, SPECT, and magnetic resonance imaging

Carlos Eduardo Steiner; Marilisa Mantovani Guerreiro; Antonia Paula Marques-de-Faria

2003-01-01

288

Regression of Language and Non-Language Skills in Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…

Meilleur, A. -A. S.; Fombonne, E.

2009-01-01

289

Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with…

Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

2006-01-01

290

Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold standard"…

Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

2012-01-01

291

Efficient and context-aware access control for pervasive medical sensor networks  

Microsoft Academic Search

Medical sensor networks allow for pervasive health monitoring in hospitals, at home, or on the way. Each user carries a set of wireless medical sensors that allows caregivers to monitor his health state. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that third parties cannot access confidential information. Additionally, the system

Oscar Garcia-Morchon; Klaus Wehrle

2010-01-01

292

WISC-III Index Score Profiles of 520 Swedish Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

WISC-III (Wechsler, 1991) index score profiles and their characteristics were examined with traditional statistics in a large Swedish sample consisting of children with autistic disorder (n = 85), Asperger's disorder (n = 341), or pervasive developmental disorders not otherwise specified (PDD-NOS; n = 94). There was a clear and significant…

Zander, Eric; Dahlgren, Sven Olof

2010-01-01

293

Developmental Specificity in Targeting and Teaching Play Activities to Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Developmentally specific play programs were designed for three children with pervasive developmental disorders being served in a home-based program. Using the Developmental Play Assessment, six activities for each of three adjacent developmentally sequenced play categories were targeted for direct instruction using different toy sets. A modified…

Lifter, Karin; Ellis, James; Cannon, Barbara; Anderson, Stephen R.

2005-01-01

294

The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition  

ERIC Educational Resources Information Center

Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of…

Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.

2008-01-01

295

"Crack Kids" in School: What To Do, How To Do It. Pervasively Developmentally Delayed (PDD).  

ERIC Educational Resources Information Center

This book addresses the educational needs of children who are pervasively developmentally delayed (PDD), especially those exposed to drugs prenatally and those with Fetal Alcohol Syndrome, autism, hyperactivity, Aspberger Syndrome, other heath impairments, attention deficit disorder, and childhood aphasia. The first chapter recommends the use of…

Odom-Winn, Danni; Dunagan, Dianne E.

296

Children's Yale-Brown Obsessive Compulsive Scale Modified for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Objective: To examine the psychometric properties of the Children's Yale-Brown Obsessive Compulsive Scales (CYBOCS) modified for pervasive developmental disorders (PDDs). Method: Raters from five Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were trained to reliability. The modified scale (CYBOCS-PDD), which contains only…

Scahill, Lawrence; McDougle, Christopher J.; Williams, Susan K.; Dimitropoulos, Anastasia; Aman, Michael G.; McCracken, James T.; Tierney, Elaine; Arnold, L. Eugene; Cronin, Pegeen; Grados, Marco; Ghuman, Jaswinder; Koenig, Kathleen; Lam, Kristen S. L.; McGough, James; Posey, David J.; Ritz, Louise; Swiezy, Naomi B.; Vitiello, Benedetto

2006-01-01

297

Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of…

Uono, Shota; Sato, Wataru; Toichi, Motomi

2010-01-01

298

Pervasive Developmental Disorders: PDD-NOS, Asperger's Disorder and Autism. Parent Information Booklet.  

ERIC Educational Resources Information Center

This information booklet is designed for parents who have a child who has been diagnosed with Pervasive Developmental Disorder (PDD) or Asperger's Disorder. It provides information on: (1) the definition of PDD; (2) the five subtypes of PDD, including PDD "not otherwise specified," Asperger's disorder, autistic disorder, childhood disintegrative…

Levine, Karen

299

MMR vaccination and pervasive developmental disorders: a case-control study  

Microsoft Academic Search

Methods We did a matched case-control study using the UK General Practice Research Database. Cases were people born in 1973 or later who had first recorded diagnosis of pervasive developmental disorder while registered with a contributing general practice between 1987 and 2001. Controls were matched on age, sex, and general practice. Findings 1294 cases and 4469 controls were included. 1010

Liam Smeeth MRCGP; Liam Smeeth; Claire Cook; Eric Fombonne; Lisa Heavey; Laura C Rodrigues; Peter G Smith; Andrew J Hall

2004-01-01

300

Epidemiological Surveys of Autism and Other Pervasive Developmental Disorders: An Update.  

ERIC Educational Resources Information Center

This article reviews 32 epidemiological studies of pervasive developmental disorders (PDDs) published between 1966-2001. The design and sample characteristics of the surveys are described. Surveys have suggested that the rate for all forms of PDDs are around 30/10,000, but more recent surveys suggest it might be as high as 60/10,000. (Contains…

Fombonne, Eric

2003-01-01

301

Teleo-Reactive policies for managing human-centric pervasive services  

Microsoft Academic Search

Event-Condition-Action (ECA) policies are often used to manage various aspects of adaptation and execution of pervasive systems. Such policies are well suited for services where: 1) given actions are reliably executed when they are requested, 2) there is no priority ordering amongst multiple available actions, and 3) execution is instantaneous with respect to the validity of conditions under which they

Srdjan Marinovic; Kevin P. Twidle; Naranker Dulay; Morris Sloman

2010-01-01

302

Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study  

ERIC Educational Resources Information Center

This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was…

Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.

2011-01-01

303

Is it possible to assess the impact of abuse on children with pervasive developmental disorders?  

Microsoft Academic Search

Although it is now recognized that children may exhibit widespread symptoms of stress following exposure to abuse or neglect, the impact of traumatic experiences on children with pervasive developmental disorders has received little attention. The present paper describes a strategy devised to assess the long-term effects of abuse on a group of children who had attended a specialist autistic school

P. Howlin; J. Clements

1995-01-01

304

Molecular and Cytogenic Analyses on Brazilian Youths with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

This study evaluated cytogenetic and molecular parameters in 30 Brazilian youths with autism or other pervasive developmental disorders (PDD). The high frequency of chromosomopathies found support the hypothesis that PDDs may develop as a consequence to chromosomal abnormalities and justify the cytogenetic and molecular assessment during diagnosis…

Estecio, Marcos Roberto Higino; Fett-Conte, Agnes Cristina; Varella-Garcia, Marileila; Fridman, Cintia; Silva, Ana Elizabete

2002-01-01

305

Catatonic features in adolescents with schizophrenia with and without a comorbid pervasive developmental disorder  

PubMed Central

Background Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. Methods The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children – Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. Results All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: “lacks facial expression”, “odd intonation”, “poor eye contact” and “lack of cooperation”. Conclusions Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia.

2014-01-01

306

The achievement of the bidirectional signal transformation between IEEE488 and RS232 with single chip processor  

Microsoft Academic Search

The achievement of the bi-directional signal transformation between IEEE488 and RS-232 with single chip processor is presented. Meanwhile, the structure of IEEE488 and RS-232, the corresponding hardware circuits and program modules are provided.

Ying Xiang; Xiuzhong Zhang; Congxin Zhu

2001-01-01

307

IEEE 1451 Standard in 6LoWPAN Sensor Networks Using a Compact Physical-Layer Transducer Electronic Datasheet  

Microsoft Academic Search

The adoption of the Internet Protocol version 6 (IPv6) networking in IEEE 802.15.4 sensor networks, using IEEE 1451 standardization, increases the interoperability of low-power smart-sensor devices over IP networks. This paper explains the design and implementation of the IPv6 sensor network over low-power wireless personal-area networks (6LoWPANs), and it uses the IEEE 1451 standard in IEEE 802.15.4 sensor networks. We

Jorge E. Higuera; Jose Polo

2011-01-01

308

Performance analysis of IEEE 802.11 CSMA\\/CA medium access control protocol  

Microsoft Academic Search

IEEE 802.11 is the new wireless network standard. By use of two-dimensional Markovian analysis, we derive the throughput and average delay of the MAC part of IEEE 802.11 to demonstrate the efficiency of the CA (collision avoidance) mechanism. Furthermore, we also focus on its performance with the existence of hidden terminals

Tien-Shin Ho; Kwang-Cheng Chen

1996-01-01

309

Influence of Bit Error Rate on the Performance of IEEE 802.11 MAC Protocol  

Microsoft Academic Search

IEEE 802.11 is the most important standard for wireless local area networks (WLANs). In the IEEE 802.11 WLANs, distributed coordination function (DCF) is a fundamental medium access control (MAC) protocol, whose performance has been studied analytically in the literature. However, there is no research work that takes into account different incoming traffic load, network size, hidden terminal problem, and the

Xiaolong Li; Qing-An Zeng

2007-01-01

310

Status of the IEEE P896 Future Backplane Bus  

SciTech Connect

The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized.

Gustavson, D.B.

1983-10-01

311

RATES OF FITNESS DECLINE AND REBOUND SUGGEST PERVASIVE EPISTASIS  

PubMed Central

Unraveling the factors that determine the rate of adaptation is a major question in evolutionary biology. One key parameter is the effect of a new mutation on fitness, which invariably depends on the environment and genetic background. The fate of a mutation also depends on population size, which determines the amount of drift it will experience. Here, we manipulate both population size and genotype composition and follow adaptation of 23 distinct Escherichia coli genotypes. These have previously accumulated mutations under intense genetic drift and encompass a substantial fitness variation. A simple rule is uncovered: the net fitness change is negatively correlated with the fitness of the genotype in which new mutations appear—a signature of epistasis. We find that Fisher's geometrical model can account for the observed patterns of fitness change and infer the parameters of this model that best fit the data, using Approximate Bayesian Computation. We estimate a genomic mutation rate of 0.01 per generation for fitness altering mutations, albeit with a large confidence interval, a mean fitness effect of mutations of ?0.01, and an effective number of traits nine in mutS? E. coli. This framework can be extended to confront a broader range of models with data and test different classes of fitness landscape models.

Perfeito, L; Sousa, A; Bataillon, T; Gordo, I

2014-01-01

312

Fabrication of wireless LAN low-pass-filters for IEEE 802.11 b\\/g and IEEE 802.11 a in printed-circuit-board  

Microsoft Academic Search

Normally, embedded low pass filters (LPFs) by using low temperature co-fired Ceramic (LTCC) technology are widely employed and developed. In this paper, two embedded filters for both IEEE 802.11 b\\/g (Low-band) and IEEE 802.11 a (High-band) are designed and fabricated in printed-circuit-board (PCB) as organic substrate. In order to discuss the performance of LPFs in PCB, two LPFs for low-band

Jong-In Ryu; Hyun-Wook Noh; Dong-Su Kim; Se-Hun Park; Jun-Chul Kim; Jong-Chul Park

2009-01-01

313

On conformance tests for IEEE PC 37.238 compliant devices  

NASA Astrophysics Data System (ADS)

There is an increasing demand on accurate time synchronization for protection and control equipment for electrical power supply systems. The IEEE 1588 Precision Time Protocol (PTP) seems to be a promising way to handle the synchronization requirements of future substation automation. In this regard, the goal of the IEEE PC37.238 is to specify a common profile for use of IEEE 1588-2008 PTP in power system applications. This paper provides an overview of the current specifications of the IEEE PC37.238 draft standard. Using conformance tests for default PTP attribute values and peer delay mechanism as examples, we discuss in details the test methods, test procedures, and the expected results for the IEEE PC37.238 compliant devices.

Wei, Jiang; Fan, Yang; Gao, Jason; Zhao, Haisheng

2011-10-01

314

Expanding security awareness in introductory computer science courses  

Microsoft Academic Search

Information Security is typically reserved for upper division courses in Computer Science (CS) and Computer Information System (IS) programs. It is often an elective or graduate level course. Information Security is an important topic that can be introduced early and often throughout the undergraduate curriculum. Security is pervasive in all disciplines of computer-related fields and early introduction not only would

Stefanie A. Markham

2009-01-01

315

Response to 'pervasive sequence patents cover the entire human genome' - authors' reply  

PubMed Central

An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14

2014-01-01

316

A Semantic Approach for Description and Ranked Matching of Services in Pervasive Environments  

Microsoft Academic Search

With the recent developments in technology, new and diverse devices are being introduced into the pervasive world. This has raised new challenges for the discovery of devices and their services in dynamic environments. The existing ap- proaches such as Jini (AOSJ99), UPnP (UPnP06), etc., describe services at a syntactic level and the matching mechanisms in these approaches are limited to

Ayomi Bandara; Terry R. Payne; David De Roure; Tim Lewis

2007-01-01

317

Regression of language and non-language skills in pervasive developmental disorders  

Microsoft Academic Search

Background As part of the pervasive developmen- tal disorders (PDD), there is a subgroup of indi- viduals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and\\/or non-verbal skills prior to 2 years of age.This study aims at comparing the symptoma- tology of children who displayed a

A.-A. S. Meilleur; E. Fombonne

2008-01-01

318

Differentiating pervasive developmental disorder not otherwise specified from autism and language disorders  

Microsoft Academic Search

Features useful in distinguishing choldren with pervasive developmental disorder (PDD) from those with autism or language disorder were developed from a retrospective chart review using groups of children with PDD-NOS and MA-and sex-matched autistic and language-disordered groups. Charts were reviewed using a list of 80 items compiled from various sources. Items that had adequate interrater reliability and significantly discriminated the

Linda Mayes; Fred Volkmar; Marla Hooks; Domenic Cicchetti

1993-01-01

319

Cognitive Biases in Childhood Anxiety, Depression, and Aggression: Are They Pervasive or Specific?  

Microsoft Academic Search

This study investigated the extent to which children’s negative information processing biases are pervasive across the cognitive modalities of attention, judgment, and memory and, further, whether such biases are specifically associated with anxiety, depression, and\\/or aggression. 133 children between the ages of 8 and 14 years were assessed on an attention allocation task, a vignette interpretation measure, and a memory recall

Sophie C. Reid; Karen Salmon; Peter F. Lovibond

2006-01-01

320

Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder  

Microsoft Academic Search

Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and\\/or the white matter and is it global or more prominent in specific brain regions.\\u000aMethods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely matched controls. \\u000aResults: All

Saskia J. M. C. Palmen; Hilleke E. Hulshoff Pol; Chantal Kemner; Hugo G. Schnack; Joost Janssen; René S. Kahn; Herman van Engeland

2004-01-01

321

Seismic evidence for pervasive deformation of oceanic sediments in the Eastern Equatorial Atlantic  

Microsoft Academic Search

Seismic reflection profiles from the equatorial Atlantic off Africa between 12°N and 1°N reveal remarkably widespread deformation of oceanic sediments in an area lacking teleseismic activity. Uplift of abyssal plain sequences has occurred along the eastern extensions of large-offset fracture zones on the Mid-Atlantic Ridge. Between the major transforms pervasive deformation is imaged in the sedimentary column. Diapirism and faulting

E. J. W. Jones

2003-01-01

322

Magnetic Processing - A Pervasive Energy Efficient Technology for Next Generation Materials for Aerospace and Specialty Steel Markets. Final CRADA Report.  

National Technical Information Service (NTIS)

Thermomagnetic Magnetic Processing is an exceptionally fertile, pervasive and cross-cutting technology that is just now being recognized by several major industry leaders for its significant potential to increase energy efficiency and materials performanc...

G. M. Ludtka

2010-01-01

323

IEEE 802.11 Wireless LAN Security White Paper  

SciTech Connect

Given the increased productivity and growing popularity of wireless communications in general, and wireless data communications in particular, this paper outlines the protocols, security implications, and architectures of IEEE Std. 802.11-1999 wireless LANs (WLANs) and makes recommendations regarding a phased implementation of WLANs at LLNL. This project is driven by the need for convenient and secure access to the Internet for Laboratory visitors and to the internal network for Laboratory employees. A solid architecture designed with a priority on security will allow LLNL to offer network access in areas where it is traditionally hard to deploy wired networks. It will also enable such services as wireless access for inventory control and convenient network access for conference rooms around LLNL. Wireless network access has the potential to increase productivity by enabling instant access to information.

King, J

2001-10-22

324

An Introduction to Soft Computing - A Tool for Building Intelligent Systems  

Microsoft Academic Search

“The essence of soft computing is that unlike the traditional, hard computing, soft computing is aimed at an accommodation with the pervasive imprecision of the real world. Thus, the guiding principle of soft computing is: ‘...exploit the tolerance for imprecision, uncertainty and partial truth to achieve tractability, robustness, low solution cost and better rapport with reality’. In the final analysis,

Behnam Azvine; Nader Azarmi; Kwok Ching Tsui

1997-01-01

325

Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition  

NASA Astrophysics Data System (ADS)

We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

326

Low-power secure body area network for vital sensors toward IEEE802.15.6.  

PubMed

Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs. PMID:19964784

Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

2009-01-01

327

Comparison of Lund'07 vehicular channel measurements with the IEEE 802.11p channel model  

Microsoft Academic Search

This paper presents a very preliminary comparison between the IEEE 802.11p channel model parameters with parameters evaluated from new high speed measurements in Lund, Sweden. Following inter- esting differences as well as similarities are observed: The measured maximum excess delay is about one fifth of the one proposed in the IEEE 802.11p model. The amplitude distribution for each tap can

Alexander Paier; Johan Karedal; Nicolai Czink; Charlotte Dumard; Thomas Zemen; Fredrik Tufvesson; Andreas F. Molisch; Christoph F. Mecklenbrauker

328

Average Downstream Performance of Measured IEEE 802.11p Infrastructure-to-Vehicle Links  

Microsoft Academic Search

For the launch of intelligent transport systems (ITS), it is necessary to have detailed understanding of their performance. The draft standard IEEE 802.11p is the physical and medium access control layer (PHY\\/MAC) standard extension for wireless access in vehicular communications to IEEE 802.11. In order to evaluate its performance, we carried out an infrastructure-to-vehicle trial on a highway using an

A. Paier; R. Tresch; A. Alonso; D. Smely; P. Meckel; Y. Zhou; N. Czink

2010-01-01

329

Supporting handover in an IEEE 802.11p-based wireless access system  

Microsoft Academic Search

The IEEE 802.11p-based wireless access networks are about to be deployed by major highways around the world as one of the main information hauling infrastructure for ITS safety applications. As the most applications of the IEEE 802.11p standard require the delivery of short text-based messages, the standard does not support handover between adjacent Road-side Units (RSUs). However, demand for seamless

Jungwook Choi; Hyukjoon Lee

2010-01-01

330

Simulation of IEEE 802.11p Vehicular Networking with Real-Life Traffic Scenario  

Microsoft Academic Search

Vehicular networking is nowadays very hot topic within the research field of telecommunications. Lot of different approaches exist, although the standard approach called IEEE 802.11p is gaining the majority of interest. Even if IEEE 802.11p seems to be the main approach, the operability in real conditions has not yet been under careful consideration. This paper presents the vehicular networking simulations,

Darya Stepanova; Timo Sukuvaara

2011-01-01

331

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard  

Microsoft Academic Search

In order to provide Dedicated Short Range Communication (DSRC) for future vehicle-to-vehicle (V2V) com- munication the IEEE is currently working on the IEEE 802.11p Wireless Access in Vehicular Environments (WAVE) standard. The standard shall provide a multi-channel DSRC solution with high performance for multiple application types to be used in future Vehicular Ad Hoc Networks (VANETs). We provide a performance

Stephan Eichler

2007-01-01

332

Performance study of IEEE 802.15.4 for industrial maintenance applications  

Microsoft Academic Search

Nowadays, a growing number of enterprises are adopting wireless technologies. However, field communications induce real-time constraints and those networks should at least fulfill those requirements. In this paper, we study IEEE 802.15.4 performances in order to support industrial real-time traffic. This analysis brings out a comparative analysis of IEEE 802.15.4 medium access methods. It provides also some limitations of that

Nicolas Salles; Nicolas Krommenacker; Vincent Lecuire

2008-01-01

333

Properties of the IEEE-STD-1057 four-parameter sine wave fit algorithm  

Microsoft Academic Search

The IEEE Standard 1057 (IEEE-STD-1057) provides algorithms for fitting the parameters of a sine wave to noisy discrete time observations. The fit is obtained as an approximate minimizer of the sum of squared errors, i.e., the difference between observations and model output. The contributions of this paper include a comparison of the performance of the four-parameter algorithm in the standard

Peter Händel

2000-01-01

334

Multiple Channel Scheduling in UWB based IEEE 802.15.3 Networks  

Microsoft Academic Search

Recent approval by the Federal Communications Commission (FCC) has led to considerable interest in exploiting ultra wideband (UWB) access on an unlicensed basis in the 3.1-10.6 GHz band. Currently, the IEEE TG802.15.3a standards group is in the process of developing an alternative high-speed link layer design conformable with the IEEE 802.15.3 wireless personal area network (WPAN) multiple access (MAC) protocol.

Aniruddha Rangnekar; Krishna M. Sivalingam

2004-01-01

335

Dynamic Bandwidth Allocation for QoS in IEEE 802.16 Broadband Wireless Networks  

NASA Astrophysics Data System (ADS)

IEEE 802.16 broadband wireless access (BWA) technology is suitable for providing multimedia applications without accessing the wired networks directly. Although IEEE 802.16 standard well defines the quality of service (QoS) framework, it makes no specific recommendation with regard to the bandwidth allocation. In this paper, we propose an algorithm for allocating bandwidth in response to dynamic changes in the arrival rate such that the total bandwidth is efficiently utilized.

Jeon, Jae-Han; Lim, Jong-Tae

336

Performance study of IEEE 802.15.4 using measurements and simulations  

Microsoft Academic Search

IEEE 802.15.4 was developed to meet the needs for simple, low-power and low-cost wireless communication. In the past couple of years it has become a popular technology for wireless sensor networks. It operates primarily in the 2.4 GHz ISM band, which makes the technology easily applicable and worldwide available. However, IEEE 802.15.4 is potentially vulnerable to interference by other wireless

Marina Petrova; J. Riihijarvi; P. Mahonen; S. Labella

2006-01-01

337

Adaptive EDCF: enhanced service differentiation for IEEE 802.11 wireless ad-hoc networks  

Microsoft Academic Search

This paper describes an adaptive service differentiation scheme for QoS enhancement in IEEE 802.11 wireless ad-hoc networks. Our approach, called adaptive enhanced distributed coordination function (AEDCF), is derived from the new EDCF introduced in the upcoming IEEE 802.11e standard. Our scheme aims to share the transmission channel efficiently. Relative priorities are provisioned by adjusting the size of the contention window

Lamia Romdhani; Qiang Ni; Thierry Turletti

2003-01-01

338

IEEE 802.11 e contention-based channel access (EDCF) performance evaluation  

Microsoft Academic Search

IEEE 802.11 e medium access control (MAC) is an emerging supplement to the IEEE 802.11 wireless local area network (WLAN) standard to support quality-of-service (QoS). The 802.11e MAC is based on both centrally-controlled and contention-based channel accesses. In this paper, we evaluate the contention-based channel access mechanism, called enhanced distributed coordination function (EDCF), in comparison with the 802.11 legacy MAC.

Sunghyun Choi; Javier del Prado; Sai Shankar N; Stefan Mangold

2003-01-01

339

Distributed downlink radio resource management in multi-cell IEEE 802.16e systems  

Microsoft Academic Search

In this paper we consider dynamic radio resource management (RRM) in multi-cell OFDMA based IEEE 802.16e network. Special techniques are required to coordinate the mutual interference between cells. In this paper we propose a new distributed radio resource management algorithm for downlink traffic in multi-cell IEEE 802.16e network. In the proposed scheme the complex problem of dynamic radio resource management

Suzan M. Shoukry; Khaled Elsayed; Ali Elmoghazy; Ameen Nassar

2009-01-01

340

Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits  

Microsoft Academic Search

In this paper, an analytical model for the beacon-enabled slotted CSMA-CA mechanism of IEEE 802.15.4 wireless sensor network is designed. The current mechanism of IEEE 802.15.4 CSMA-CA is extended to include the retransmission limit of the nodes with packet collision probability. A three-dimensional discrete time Markov chain model for the uplink traffic of wireless sensor network is designed to analyze

Prasan Kumar Sahoo; Jang-ping Sheu

2008-01-01

341

Overhaul of ieee 802.11 modeling and simulation in ns-2  

Microsoft Academic Search

NS-2, with its IEEE 802.11 support, is a widely utilized simulation tool for wireless communications researchers. However, the current NS-2 distribution code has some significant shortcomings both in the overall architecture and the modeling details of the IEEE 802.11 MAC and PHY modules. This paper presents a completely revised architecture and design for these two modules. The resulting PHY is

Qi Chen; Felix Schmidt-eisenlohr; Daniel Jiang; Marc Torrent-moreno; Luca Delgrossi; Hannes Hartenstein

2007-01-01

342

IEEE 802.11e: QoS provisioning at the MAC layer  

Microsoft Academic Search

This article introduces the emerging IEEE 802.11e standard to support quality of service at the medium access control layer. Both the contention-based and contention-free centrally controlled channel access mechanisms are introduced by describing not only the MAC protocol operations and parameters, but also the call admission techniques and scheduling algorithm that have been designed for IEEE 802.11e. Finally, we provide

Yang Xiao

2004-01-01

343

A microscopic study of power management in IEEE 802.11 wireless networks  

Microsoft Academic Search

IEEE 802.11 power saving mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power management decisions to wake up wireless devices or put them to sleep states are made periodically in every beacon interval. In this paper, we demonstrate via a rigorous, analytical model (the result

Chunyu Hu; Rong Zheng; Jennifer C. Hou; Lui Sha

2006-01-01

344

Fast MAC-Layer Scanning in IEEE 802.11 Fixed Relay Radio Access Networks  

Microsoft Academic Search

Mobile real-time services require wireless networks with low handoff latencies. This paper focuses on the handoffrelated MAC-Layer scanning latencies in IEEE 802.11- based Fixed Relay Radio Access Networks (FRRAN). The IEEE 802.11 scanning procedure is known to have latencies of 300 to 550 ms, which exceeds the requirements of real-time applications like Voice over IP (VoIP) by far. Previous solutions

Sebastian Speicher; Christian Bunnig

2006-01-01

345

New Distributed Initialization Protocols for IEEE 802.11 Based Single Hop Ad Hoc Networks  

Microsoft Academic Search

\\u000a Leader election and initialization are important fundamental tasks to set up an ad hoc network, which involves assigning each\\u000a station, a distinct ID (e.g. IP address). IEEE 802.11 is extensively used in simulation studies or developing testbeds for\\u000a ad hoc networks. Existing solutions to leader election and initialization diverge considerably from IEEE 802.11 standard and\\u000a thus require major modifications in

Rasmeet S. Bali; C. Rama Krishna

346

Performance Limits and Analysis of Contention-based IEEE 802.11 MAC  

Microsoft Academic Search

Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backward compatibility. However, it has been shown that the inefficient protocol overhead casts a theoretical throughput upper limit and delay lower limit for the IEEE 802.11 based protocols, even the wireless data rate

Shao-cheng Wang; Ahmed Helmy

2006-01-01

347

Measured performance of real time traffic over IEEE 802.11 b\\/g infrastructured networks  

Microsoft Academic Search

Real time services over wireless local area networks (WLANs) are not always satisfactory; this is mainly due to the unreliability of the wireless medium which could cause both high packet loss rates and delivery jitters. Under these conditions high rate WLANs, such as IEEE 802.11g, could provide worse performance than the slower, but more reliable, IEEE 802.11b. In this paper

Alessandro Bazzi; Marco Diolaiti; Gianni Pasolini

2005-01-01

348

Opportunistic mechanisms for IEEE 802.11 networks using directional antennas  

Microsoft Academic Search

Directional antennas have been introduced to improve the performance of 802.11 based wireless networks. Station equipped with directional antennas can beamform data in a specific direction. However, IEEE 802.11 is developed with omni-directional antennas in mind. Thus, deploying IEEE 802.11 in a directional antenna environment leads stations to be conservative in blocking their own transmissions in favor of the ongoing

Tamer Nadeem

2009-01-01

349

Run-Time Optimization of IEEE 802.11 Wireless LANs performance  

Microsoft Academic Search

IEEE 802.11 is the standard for Wireless Local Area Networks (WLANs) promoted by the Institute of Electrical and Electronics Engineers. Wireless technologies in the LAN environment are becoming increasingly important, and the IEEE 802.11 is the most mature technology to date (Sta01). Previous works have pointed out that the standard protocol can be very inefficient, and that an appropriate tuning

L. Bononi; M. Conti; E. Gregori

350

Novel ISO\\/IEEE 11073 Standards for Personal Telehealth Systems Interoperability  

Microsoft Academic Search

The formation of an ISO\\/IEEE 11073 personal health device data work group has been announced. The group aims at enabling plug-and-play interoperability for personal health devices by developing new standards within the family of existing ISO\\/IEEE 11073 standards for medical device communications. These new standards address transport-independent application and information profiles between personal telehealth devices and monitors. In this work

L. Schmitt; T. Falck; F. Wartena; D. Simons

2007-01-01

351

Adaptive transmission opportunity with admission control for IEEE 802.11e networks  

Microsoft Academic Search

The increase of IEEE 802.11's bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints in QoS. In this context, a lot of works have been proposed in order to enhance the QoS-capable IEEE 802.11e MAC protocol. However, they settle for maintaining only an inter-QoS differentiation between the traffic classes, and neglect

Adlen Ksentini; Abdelhak Guéroui; Mohamed Naimi

2005-01-01

352

Optimum Fair Bandwidth Allocation Scheme for IEEE 802.16 Mesh Mode with Directional Antenna  

Microsoft Academic Search

The IEEE 802.16 standard is providing support for Mesh networks of which two scheduling mechanisms (i.e., centralized scheduling and distributed scheduling) are proposed. Centralized scheduling which builds on a routing tree behaves in a centralized manner and therefore presents more QoS guarantee than distributed scheduling. However, IEEE 802.16 standard doesn't specify how to schedule traffic in the mesh mode. In

Yanbin Lu; Guoqing Zhang

2006-01-01

353

Area Throughput of an IEEE 802.15.4 Based Wireless Sensor Network  

Microsoft Academic Search

In this paper we present a mathematical model to evaluate the performance of an IEEE 802.15.4 based multi-sink Wireless Sensor\\u000a Network (WSN). Both sensors and sinks are assumed to be Poisson distributed in a given finite domain. Sinks send periodic\\u000a and synchronous queries, and each sensor transmits its sample to a sink, selected among those that are audible. The IEEE

Chiara Buratti; Flavio Fabbri; Roberto Verdone

2009-01-01

354

A Service Discipline for Support of IP QoS in IEEE 802.11 Networks  

Microsoft Academic Search

This paper presents a QoS aware service discipline based on estimated transmission times for use in IEEE 802.11 networks.\\u000a This algorithm works based on the flow specifications defined by the IETF for the IP QoS reference models, coupling layer\\u000a 2 and layer 3 QoS. Simulation results show that the proposed service discipline performs better than Weighted Round Robin\\u000a in IEEE

António Grilo; Mário Macedo; Mario S. Nunes

2001-01-01

355

Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People  

PubMed Central

In sensor research we take advantage of additional contextual sensor information to disambiguate potentially erroneous sensor readings or to make better informed decisions on a single sensor’s output. This use of additional information reinforces, validates, semantically enriches, and augments sensed data. Lifelog data is challenging to augment, as it tracks one’s life with many images including the places they go, making it non-trivial to find associated sources of information. We investigate realising the goal of pervasive user-generated content based on sensors, by augmenting passive visual lifelogs with “Web 2.0” content collected by millions of other individuals.

Doherty, Aiden R.; Smeaton, Alan F.

2010-01-01

356

Pervasive liquid metal based direct writing electronics with roller-ball pen  

SciTech Connect

A roller-ball pen enabled direct writing electronics via room temperature liquid metal ink was proposed. With the rolling to print mechanism, the metallic inks were smoothly written on flexible polymer substrate to form conductive tracks and electronic devices. The contact angle analyzer and scanning electron microscope were implemented to disclose several unique inner properties of the obtained electronics. An ever high writing resolution with line width and thickness as 200 ?m and 80 ?m, respectively was realized. Further, with the administration of external writing pressure, GaIn{sub 24.5} droplets embody increasing wettability on polymer which demonstrates the pervasive adaptability of the roller-ball pen electronics.

Zheng, Yi; Zhang, Qin [Beijing Key Lab of CryoBiomedical Eng. and Key Lab of Cryogenics, Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Beijing 100190 (China)] [Beijing Key Lab of CryoBiomedical Eng. and Key Lab of Cryogenics, Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Beijing 100190 (China); Liu, Jing, E-mail: jliu@mail.ipc.ac.cn [Beijing Key Lab of CryoBiomedical Eng. and Key Lab of Cryogenics, Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Beijing 100190 (China) [Beijing Key Lab of CryoBiomedical Eng. and Key Lab of Cryogenics, Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Beijing 100190 (China); Department of Biomedical Engineering, School of Medicine, Tsinghua University, Beijing 100084 (China)

2013-11-15

357

The design of smart home platform based on Cloud Computing  

Microsoft Academic Search

The smart home is a concept of the pervasive computing, and it gradually becomes significant for the people living in the high technology area. For numerous data and complex control bring about a much heavy burden on the local computers, and it is difficult for the users to obtain the information of the smart home. In this paper, we propose

Haijun Gua; Yufeng Diao; Wei Liu; Xueqian Zhang

2011-01-01

358

Engaging students with community organizations by using computer technology  

Microsoft Academic Search

The engagement of information technology or computer science students in community affairs is a challenge in all institutions of higher learning. This paper proposes a paradigm for civic engagement through community-based learning. With the pervasiveness of computers throughout society, there is a growing demand for diligent IT\\/CS education to satisfy the growing needs of a multiplicity of enterprises. This paper

John D. Fernandez

2004-01-01

359

GTS Allocation Scheme for Bidirectional Voice Traffic in IEEE 802.15.4 Multihop Networks  

NASA Astrophysics Data System (ADS)

The IEEE 802.15.4 protocol is considered a promising technology for low-cost low-power wireless personal area networks. Researchers have discussed the feasibility of voice communications over IEEE 802.15.4 networks. To this end, the personal area network (PAN) coordinator allocates guaranteed time slots (GTSs) for voice communications in the beacon-enabled mode of IEEE 802.15.4. Although IEEE 802.15.4 is capable of supporting voice communications by GTS allocation, it is impossible to accommodate voice transmission beyond two hops due to the excessive transmission delay. In this paper, we propose a GTS allocation scheme for bidirectional voice traffic in IEEE 802.15.4 multihop networks. The goal of our proposed scheme is to achieve low end-to-end delay and packet drop ratio without a complex allocation algorithm. Thus, the proposed scheme allocates GTSs to devices for successful completion of voice transmission in a superframe duration. The proposed scheme also considers transceiver switching delay. This is relatively large compared to a time slot due to the low-cost and low-gain antenna designs. We analyze and validate the proposed scheme in terms of average end-to-end delay and packet drop ratio. Our scheme has lower end-to-end delay and packet drop ratio than the basic IEEE 802.15.4 GTS allocation scheme.

Jung, Junwoo; Baek, Hoki; Lim, Jaesung

360

Pervasive negative effects of rewards on intrinsic motivation: The myth continues  

PubMed Central

A major concern in psychology and education is that rewards decrease intrinsic motivation to perform activities. Over the past 30 years, more than 100 experimental studies have been conducted on this topic. In 1994, Cameron and Pierce conducted a meta-analysis of this literature and concluded that negative effects of reward were limited and could be easily prevented in applied settings. A more recent meta-analysis of the literature by Deci, Koestner, and Ryan (1999) shows pervasive negative effects of reward. The purpose of the present article is to resolve differences in previous meta-analytic findings and to provide a meta-analysis of rewards and intrinsic motivation that permits tests of competing theoretical explanations. Our results suggest that in general, rewards are not harmful to motivation to perform a task. Rewards given for low-interest tasks enhance free-choice intrinsic motivation. On high-interest tasks, verbal rewards produce positive effects on free-choice motivation and self-reported task interest. Negative effects are found on high-interest tasks when the rewards are tangible, expected (offered beforehand), and loosely tied to level of performance. When rewards are linked to level of performance, measures of intrinsic motivation increase or do not differ from a nonrewarded control group. Overall, the pattern of results indicates that reward contingencies do not have pervasive negative effects on intrinsic motivation. Theoretical and practical implications of the findings are addressed.

Cameron, Judy; Banko, Katherine M.; Pierce, W. David

2001-01-01

361

Improving scalable video transmission over IEEE 802.11e networks  

NASA Astrophysics Data System (ADS)

Providing a certain quality of service (QoS) for multimedia transmissions over a noisy wireless channel has always been a challenge. The IEEE 802.11 standardization dedicates a working group, group e, to investigate and propose a solution for enabling IEEE 802.11 networks to provide multimedia transmissions with certain QoS supports. As drafted in the latest draft release, the IEEE 802.11e working group proposes the use of contention based mechanism to achieve the transmissions of prioritized traffic, which in turn provides a framework to support multimedia transmissions over IEEE 802.11 networks. However, such a contention based priority scheme does not deliver a strong QoS capability. In this paper, we first study the characteristics of the IEEE 802.11e network. For all the four defined priorities of IEEE 802.11e, we first investigate their capacity characteristics. We then design a resource allocation technique to better utilize the bandwidth and improve the performance of video transmissions. Our design uses a QoS mapping scheme according to the IEEE 802.11e protocol characteristics to deliver scalable video. In addition, we design an appropriate cross-layer video adaptation mechanism for the scalable video that further improves the video quality combining with our proposed resource allocation technique. We have evaluated our proposed technique via simulations (NS2). We use PSNR as our video quality measures. Our results show improvement in video quality and resource usage when our proposed technique is implemented.

Zhang, Yu; Ni, Zefeng; Foh, Chuan Heng; Cai, Jianfei

2005-10-01

362

Brain-Computer Symbiosis  

PubMed Central

The theoretical groundwork of the 1930’s and 1940’s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our body’s input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades.

Schalk, Gerwin

2009-01-01

363

Research on software reuse of user interface for mobile computing devices based on XML  

Microsoft Academic Search

Application development for mobile computing devices has been greatly developed. The design of user interface is a complex and time-consuming job. In a pervasive computing environment, the program might be shown in different kinds of mobile computing devices. So an efficient method of interface development has become necessary. In this paper, we analyze shortcomings of traditional user interface design methods

Zhiqiang Wei; Xin Ni; Dongning Jia

2010-01-01

364

The specific impairment of fearful expression recognition and its atypical development in pervasive developmental disorder.  

PubMed

Several studies have examined facial expression recognition in pervasive developmental disorder (PDD), including autism and Asperger's disorder, but the results have been inconsistent. We investigated the relationship between facial expression recognition and age, face recognition, and symptom severity. Subjects were 28 individuals with mild PDD subtypes and 28 age- and gender-matched controls. Among six emotions, fearful expression recognition was specifically impaired in PDD subjects. Age had positive effects on fearful expression recognition directly and indirectly via the development of face recognition in controls, but not in PDD subjects. Furthermore, fearful expression recognition was related to the severity of PDD symptoms. We conclude that individuals with PDD show an atypical development of facial expression recognition. Moreover, impaired fearful expression recognition is closely related to social dysfunction. PMID:21919566

Uono, Shota; Sato, Wataru; Toichi, Motomi

2011-01-01

365

Genetic Evidence for a Distinct Subtype of Schizophrenia Characterized by Pervasive Cognitive Deficit  

PubMed Central

A novel phenotyping strategy in schizophrenia, targeting different neurocognitive domains, neurobehavioral features, and selected personality traits, has allowed us to identify a homogeneous familial subtype of the disease, characterized by pervasive neurocognitive deficit. Our genome scan data indicate that this subtype, which accounts for up to 50% of our sample, has a distinct genetic basis and explains linkage to chromosome 6p24 reported previously. If representative of other populations, the ratio of schizophrenia subtypes observed in our families could have a profound impact on sample heterogeneity and on the power of genetic studies to detect linkage and association. Our proposed abbreviated battery of tests should facilitate phenotype characterization for future genetic analyses and allow a focus on a crisply defined schizophrenia subtype, thus promoting a more informed search for susceptibility genes.

Hallmayer, Joachim F.; Kalaydjieva, Luba; Badcock, Johanna; Dragovic, Milan; Howell, Sarah; Michie, Patricia T.; Rock, Daniel; Vile, David; Williams, Rachael; Corder, Elizabeth H.; Hollingsworth, Kate; Jablensky, Assen

2005-01-01

366

Pervasive positive selection on duplicated and nonduplicated vertebrate protein coding genes  

PubMed Central

A stringent branch-site codon model was used to detect positive selection in vertebrate evolution. We show that the test is robust to the large evolutionary distances involved. Positive selection was detected in 77% of 884 genes studied. Most positive selection concerns a few sites on a single branch of the phylogenetic tree: Between 0.9% and 4.7% of sites are affected by positive selection depending on the branches. No functional category was overrepresented among genes under positive selection. Surprisingly, whole genome duplication had no effect on the prevalence of positive selection, whether the fish-specific genome duplication or the two rounds at the origin of vertebrates. Thus positive selection has not been limited to a few gene classes, or to specific evolutionary events such as duplication, but has been pervasive during vertebrate evolution.

Studer, Romain A.; Penel, Simon; Duret, Laurent; Robinson-Rechavi, Marc

2008-01-01

367

Pervasive Layering in the Lunar Highland Crust: Evidence from Apollos 15, 16,and 17  

NASA Technical Reports Server (NTRS)

This paper presents results of a photogeologic reconnaissance of 70 mm photographs taken on the lunar surface during the Apollo 15, 16, and 17 missions, whose primary objective was to investigate the lunar highland crust. Photographs at all three sites, notably the Apennine Front, show pervasive layered structure. These layers are easily distinguished from lighting artifacts, and are considered genuine crustal structures. Their number, thickness, and extent implies that they are lava flows, not ejecta blankets or intrusive features. They appear to be the upper part of the earliest lunar crust, possibly forming a layer tens of kilometers thick. Remote sensing studies (X-ray fluorescence and reflectance spectroscopy), indicate that the highland crust is dominantly a feldspathic basalt. It is concluded that the highland layers represent a global crust formed by eruptions of high-alumina basalt in the first few hundred million years of the Moon's history.

Lowman, Paul D., Jr.; Yang, Tiffany

2005-01-01

368

Imitation and communication skills development in children with pervasive developmental disorders  

PubMed Central

This study evaluates the correlation between failure to develop spontaneous imitation and language skills in pervasive developmental disorders. Sixty-four children between the age of 3 and 8 years were assessed using the Autism Diagnostic Interview-Revised (ADI-R), the Childhood Autism Rating Scale (CARS), and the Autism Diagnostic Observation Schedule (ADOS), as well as direct observation of imitation. The sample was subdivided into a verbal and a nonverbal group. Analysis of mean scores on the CARS “imitation” items and of ADI-R “spontaneous imitation” and “pointing to express interest” revealed a statistically significant difference between verbal and nonverbal groups, with more severe impairment/higher scores in the nonverbal than the verbal group. These results suggest that nonverbal children have specifically impaired imitation and pointing skills.

De Giacomo, Andrea; Portoghese, Claudia; Martinelli, Domenico; Fanizza, Isabella; L'Abate, Luciano; Margari, Lucia

2009-01-01

369

Pervasive developmental disorder in the children of immigrant parents: comparison of different assessment instruments.  

PubMed

The objective of this study was to describe how the Childhood Autism Rating Scale (CARS) behaves in relation to the Autism Diagnostic Observation Schedule (ADOS) and to clinical diagnosis based on the criteria defined in the Diagnostic and Statistical Manual of Mental Disorders, 4 th Edition (DSM-IV) for children of immigrant parents. Forty-nine children of parents who had immigrated to Canada were evaluated. In this sample, the ADOS and the DSM-IV showed complete agreement. Using the standard cut-off point of 30, the CARS showed high specificity and poor sensitivity. The study proposes a cut-off point for the CARS that would include pervasive developmental disorder - not otherwise specified (PDD-NOS). Reducing the cut-off point to 20/21 increased the specificity of the instrument for this group of children without significantly reducing its sensitivity. PMID:24394875

Pondé, Milena Pereira; Rousseau, Cécile; Carlos, Marco Antônio Costa

2013-11-01

370

ReSCo: A Middleware Component for Reliable Service Composition in Pervasive Systems  

SciTech Connect

Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as those found in pervasive environments, must be cognizant of the possibility of failures and attacks. In open systems, it is seldom feasible to guarantee the reliability of each node prior to access; however, there may be several possible ways to compose the same high-level service, each having a different (though possibly overlapping) set of nodes that can satisfy the composition. We approach this problem with a Reliable Service Composition middleware component, ReSCo, to determine trustworthy compositions and nodes for service composition in dynamic, open systems. ReSCo is a modular, adaptive middleware component that selects from possible composition paths and nodes to enhance reliability of service compositions. ReSCo can work with a broad range of both service composition algorithms and trust establishment mechanisms.

Lagesse, Brent J [ORNL; Kumar, Mohan [University of Texas, Arlington; Wright, Matthew [University of Texas, Arlington

2010-01-01

371

The critical satellite technical issues of future pervasive broadband low-cost communication networks  

NASA Technical Reports Server (NTRS)

The critical technical issues of signal waveform design, projected spacecraft technology, satellite launch options, and satellite cost are discussed for future pervasive broadband communication networks. With DPCM video signal encoding, 32 Mb/s user-to-user data rate per channel, 10% overhead, two orthogonal polarizations, and crosstalk loss limited to 1 dB, TFM permits about 75 channels/GHz of frequency allocation. The BOM (beginning of mission) weight and power of a baseline 400-channel multibeam satellite is about 1800 kg and 5000 W. Each 35 Mb/s channel can support 1 to 10 video channels. The weight and power estimates assume hardened digital logic, composite materials for a multibeam antenna structure, high-efficiency solar cells, batteries, and amplifiers. Based on a cost model for large communication satellites, the total space segment cost of two active satellites and one spare would be about $485 M.

Harvey, R. L.

1979-01-01

372

Pervasively Altered Hematite-Rich Deposits Southeast of Home Plate, Gusev Crater, Mars  

NASA Technical Reports Server (NTRS)

The investigation of Home Plate and its surroundings in the Inner Basin of the Columbia Hills in Gusev Crater has added substantially to the water story on Mars. Textural, morphological, and geochemical evidence from Home Plate point towards an explosive origin, probably a hydrovolcanic explosion [1]. High silica deposits in the immediate vicinity of Home Plate suggest hydrothermal alteration [e.g. 2,3]. Pervasively altered deposits rich in hematite were investigated to the southeast of Home Plate. Of these, the target Halley, the target KingGeorgeIsland on the GrahamLand outcrop, and the targets Montalva and Riquelme on the Troll outcrop were investigated in situ with the Alpha Particle X-ray spectrometer (APXS), the Microscopic Imager (MI), and the Moessbauer (MB) spectrometer (Fig. 1).

Schroder, C.; Arvidson, R. E.; Schmidt, M. E.; Gellert, R.; Klingelhoefer, G.; Ming, D. W.; Morris, R. V.; Rice, J. W.; Yen, A. S.; deSouza, P. A., Jr.

2008-01-01

373

The Family Support Program: Description of a Preventive, Community-Based Behavioral Intervention for Children with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

Describes a model of service delivery for children with autism and pervasive developmental disorders that seeks to prevent at-risk students from being placed residentially and to return those who live in residential school to less restrictive environments. Describes the organization and critical components for the Family Support Program. Discusses…

Luiselli, James K.; Wolongevicz, John; Egan, Patricia; Amirault, Deborah; Sciaraffa, Nancy; Treml, Tania

1999-01-01

374

Brief Report: Interpretation of Facial Expressions, Postures, and Gestures in Children with a Pervasive Developmental Disorder not Otherwise Specified.  

ERIC Educational Resources Information Center

A Dutch study failed to find differences in the ability of 31 normally intelligent children (ages 6-12) with pervasive developmental disorder not otherwise specified and matched controls to recognize and label emotional states in various nonverbal expressive modalities, such as facial expressions, bodily postures, and gestures. (CR)

Serra, M.; Jackson, A. E.; van Geert, P. L. C.; Minderaa, R. B.

1998-01-01

375

Positive Effects of Methylphenidate on Social Communication and Self-Regulation in Children with Pervasive Developmental Disorders and Hyperactivity  

ERIC Educational Resources Information Center

This report examined the effect of methylphenidate on social communication and self-regulation in children with pervasive developmental disorders and hyperactivity in a secondary analysis of RUPP Autism Network data. Participants were 33 children (29 boys) between the ages of 5 and 13 years who participated in a four-week crossover trial of…

Jahromi, Laudan B.; Kasari, Connie L.; McCracken, James T.; Lee, Lisa S-Y.; Aman, Michael G.; McDougle, Christopher J.; Scahill, Lawrence; Tierney, Elaine; Arnold, L. Eugene; Vitiello, Benedetto; Ritz, Louise; Witwer, Andrea; Kustan, Erin; Ghuman, Jaswinder; Posey, David J.

2009-01-01

376

Common and Unique Impairments in Facial-Expression Recognition in Pervasive Developmental Disorder-Not Otherwise Specified and Asperger's Disorder  

ERIC Educational Resources Information Center

This study was designed to identify specific difficulties and associated features related to the problems with social interaction experienced by individuals with pervasive developmental disorder-not otherwise specified (PDD-NOS) using an emotion-recognition task. We compared individuals with PDD-NOS or Asperger's disorder (ASP) and typically…

Uono, Shota; Sato, Wataru; Toichi, Motomi

2013-01-01

377

Microswitch- and VOCA-Assisted Programs for Two Post-Coma Persons with Minimally Conscious State and Pervasive Motor Disabilities  

ERIC Educational Resources Information Center

Intervention programs, based on learning principles and assistive technology, were assessed in two studies with two post-coma men with minimally conscious state and pervasive motor disabilities. Study I assessed a program that included (a) an optic microswitch, activated via double blinking, which allowed a man direct access to brief music…

Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Oliva, Doretta; Signorino, Mario; Megna, Gianfranco

2009-01-01

378

The Treatment of High-Functioning Pervasive Developmental Disorder and Asperger's DisorderDefining the Social Work Role  

Microsoft Academic Search

With the introduction of The Diagnostic and Statistical Manual of the American Psychiatric Association, Fourth Edition (1994), the diagnostic category “pervasive developmental disorder'' (PDD) was expanded to include Asperger's disorder. In addition, “high-functioning'' PDD is now more commonly recognized. It is therefore important that social workers be familiar with these disorders and the possible roles that they may have in

Kevin P. Stoddart

1998-01-01

379

Can i have a second child? dilemmas of mothers of children with pervasive developmental disorder: a qualitative study  

Microsoft Academic Search

BACKGROUND: Pervasive developmental disorder (PDD) has an uncertain etiology, no method of treatment, and results in communication deficiencies and other behavioral problems. As the reported recurrence risk is 5%-10% and there are no methods of either prevention or prenatal testing, mothers of PDD children may face unique challenges when contemplating second pregnancies. The purpose of this study was to explore

Miyako Kimura; Yoshihiko Yamazaki; Mieko Mochizuki; Tomoko Omiya

2010-01-01

380

Differential Language Markers of Pathology in Autism, Pervasive Developmental Disorder Not Otherwise Specified and Specific Language Impairment  

ERIC Educational Resources Information Center

Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether…

Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence

2011-01-01

381

The TOM Test: A New Instrument for Assessing Theory of Mind in Normal Children and Children with Pervasive Development Disorders.  

ERIC Educational Resources Information Center

Four studies investigated reliability and validity of the Theory of Mind (TOM) test, an instrument for assessing theory-of-mind ability in typical children and children with pervasive developmental disorders. The TOM test was found to be a reliable and valid instrument for measuring various aspects of theory of mind. (Author/CR)

Muris, Peter; Steerneman, Pim; Meesters, Cor; Merckelbach, Harald; Horselenberg, Robert; van den Hogen, Tanja; van Dongen, Lieke

1999-01-01

382

Motor skill abilities in toddlers with autistic disorder, pervasive developmental disorder-not otherwise specified, and atypical development  

Microsoft Academic Search

Motor skills were assessed in 397 toddlers, and it was demonstrated that atypically developing toddlers exhibited significantly greater motor skill abilities than toddlers with autistic disorder. No significant difference on gross or fine motor skill abilities were found between atypically developing toddlers and toddlers with pervasive developmental disorder-not otherwise specified (PDD-NOS), or between toddlers with autistic disorder and toddlers with

Johnny L. Matson; Sara Mahan; Jill C. Fodstad; Julie A. Hess; Daniene Neal

2010-01-01

383

Motor Skill Abilities in Toddlers with Autistic Disorder, Pervasive Developmental Disorder-Not Otherwise Specified, and Atypical Development  

ERIC Educational Resources Information Center

Motor skills were assessed in 397 toddlers, and it was demonstrated that atypically developing toddlers exhibited significantly greater motor skill abilities than toddlers with autistic disorder. No significant difference on gross or fine motor skill abilities were found between atypically developing toddlers and toddlers with pervasive

Matson, Johnny L.; Mahan, Sara; Fodstad, Jill C.; Hess, Julie A.; Neal, Daniene

2010-01-01

384

Follow-Up of Children Diagnosed with Pervasive Developmental Disorders: Stability and Change during the Preschool Years  

ERIC Educational Resources Information Center

Forty-one children with pervasive developmental disorders (PDDs) receiving eclectic services were assessed twice during their preschool years. Measures were compared over time for the whole group and for diagnostic subgroups: Childhood autism (CA group) and Other PDDs group. The mean intelligence quotient/developmental quotient (IQ/DQ) of the…

Jonsdottir, Sigridur Loa; Saemundsen, Evald; Asmundsdottir, Gudlaug; Hjartardottir, Sigrun; Asgeirsdottir, Bryndis B.; Smaradottir, Hrafnhildur H.; Sigurdardottir, Solveig; Smari, Jakob

2007-01-01

385

Design and Subject Characteristics in the Federally-Funded Citalopram Trial in Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The Studies to Advance Autism Research and Treatment Network conducted a randomized trial with citalopram in children with Pervasive developmental disorders (PDDs). We present the rationale, design and sample characteristics of the citalopram trial. Subjects (128 boys, 21 girls) had a mean age of 9.3 (plus or minus 3.12) years; 132 (88.6%) were…

Scahill, Lawrence; McCracken, James T.; Bearss, Karen; Robinson, Fay; Hollander, Eric; King, Bryan; Bregman, Joel; Sikich, Lin; Dukes, Kimberly; Sullivan, Lisa; Anagnostou, Evdokia; Donnelly, Craig; Kim, Young-Shin; Ritz, Louise; Hirtz, Deborah; Wagner, Ann

2012-01-01

386

Parental Perception of Sleep Problems in Children of Normal Intelligence with Pervasive Developmental Disorders: Prevalence, Severity, and Pattern  

ERIC Educational Resources Information Center

Objective: This study compares parents' perceptions of the prevalence, severity, and pattern of sleep problems in children of normal intelligence with pervasive developmental disorders (PDDs) with a normative comparison group of children. Method: A survey including the Children's Sleep Habits Questionnaire was mailed to a sample of parents of…

Couturier, Jennifer L.; Speechley, Kathy N.; Steele, Margaret; Norman, Ross; Stringer, Bernadette; Nicolson, Rob

2005-01-01

387

The Comorbidity of Pervasive Developmental Disorder and Attention Deficit Hyperactivity Disorder: Results of a Retrospective Chart Review  

Microsoft Academic Search

Objective: To determine if a sample of children meeting diagnostic criteria for a Pervasive Developmental Disorder (PDD) display symptoms and impairment related to Attention Deficit Hyperactivity Disorder (ADHD) sufficient to warrant a comorbid diagnosis of ADHD. Further, do children with PDD displaying such symptoms demonstrate more impairment in daily life activities than those children only having PDD? Method: A retrospective

Sam Goldstein; Adam J. Schwebach

2004-01-01

388

Magnetic Processing A Pervasive Energy Efficient Technology for Next; Generation Materials for Aerospace and Specialty Steel Markets  

Microsoft Academic Search

Thermomagnetic Magnetic Processing is an exceptionally fertile, pervasive and cross-cutting technology that is just now being recognized by several major industry leaders for its significant potential to increase energy efficiency and materials performance for a myriad of energy intensive industries in a variety of areas and applications. ORNL has pioneered the use and development of large magnetic fields in thermomagnetically

G. Mackiewicz-Ludtka; G. M. Ludtka; P. Ray; J. Magee

2010-01-01

389

Gross Motor Performance and Self-Perceived Motor Competence in Children with Emotional, Behavioural, and Pervasive Developmental Disorders: A Review  

ERIC Educational Resources Information Center

Aims: Motor performance and self-perceived motor competence have a great impact on the psychosocial development of children in general. In this review, empirical studies of gross motor performance and self-perception of motor competence in children with emotional (depression and anxiety), behavioural, and pervasive developmental disorders are…

Emck, Claudia; Bosscher, Ruud; Beek, Peter; Doreleijers, Theo

2009-01-01

390

Comparison of IEEE Portable Operating System Interface (POSIX). Part 1 and X/Open Single Unix Specifications (SUS).  

National Technical Information Service (NTIS)

This document is a textual comparison study of the IEEE 1003.1 Portable Operating System Interface (POSIX) - Part 1: System Application Program Interface (C Language) (IEEE 1003.1:1990) and X/OPEN Single UNIX Specification (SUS). The purpose of this docum...

D. K. Fisher K. M. Tran

1995-01-01

391

Improving IEEE 802.15.4 for Low-Latency Energy-Efficient Industrial Applications  

NASA Astrophysics Data System (ADS)

The IEEE 802.15.4 standard for LR-WPAXs is becoming a de-facto standard for Wireless Sensor Xetworks (WSXs) applications in industrial fields. In this paper, we evaluate the latency performance of the IEEE 802.15.4 protocol based on a typical industrial scenario: a star network with 20 devices that send short messages (1 Byte) to the PAX coordinator. We analyzed the behavior of the GTS mechanism in the standard analytically. The results reveal essential limitations of the standard for low-latency applications in automation environments. According to our findings, we propose an enhanced protocol version that fully supports industry demands on low-latency communication. Our protocol version uses the original physical layer and, thus, can be implemented conveniently using cheap IEEE 802.15.4 hardware. The analytical results prove that we are able to meet the guaranteed low latency of 10 ms as specified by typical automation environments.

Chen, Feng

392

Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.  

PubMed

The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+?+ simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications. PMID:22777183

Ullah, Sana; Chen, Min; Kwak, Kyung Sup

2012-12-01

393

An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4  

PubMed Central

Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

2014-01-01

394

Applying IEEE storage system management standards at the National Storage Laboratory  

SciTech Connect

Since its inception in 1990, the IEEE Storage System Standards Working Group has identified storage-system management as an area in need of further development The pressing need for standards in storage-system management arises from the requirement to exchange management information and to provide control in a consistent predictable manner between the components of a storage system. An appropriate set of management standards will allow multiple vendors to supply storage management subsystems or applications that are integral to or compatible with new storage systems conforming to future IEEE standards. An early, practical application of IEEE storage-system-management work is being pursued at the National Storage Laboratory (NSL), a recently-formed industrial collaboration at Lawrence Livermore National Laboratory. The NSL`s purpose is to develop advanced hardware and software technologies for high-performance, distributed storage systems. Since storage system management is of critical concern, it is being explored in depth at the NSL. Work was initiated to define basic management requirements and develop generalized graphical-user-interface tools using remote-procedure-call mechanisms to implement the NSL`s conceptual management framework. Several constraints were imposed on the development of early versions of this work to maintain compatibility with the NSL`s underlying UniTree-based software architecture and to provide timely prototypes and proof of concept. The project leverages the on-going standards work of the IEEE Storage System Standards Working Group (SSSWG) and also explores some of the relationships and interactions between IEEE storage-system management and more well known management methods for distributed systems and networks. It will have long term benefits by providing ``real-life`` storage-system-management requirements to the IEEE SSSWG for validation of evolving standards.

Louis, S.; Hyer, S.W.

1992-12-04

395

Applications of evolutionary computation in electric power systems  

Microsoft Academic Search

This survey covers the broad area of evolutionary computation applications to optimization, model identification, and control in power systems. Due to space limitation, all reviewed papers have been selected since 1996, from IEEE Transactions only. A total of 85 articles are listed in this survey. It shows the development of the area and identifies current trends. The following techniques are

Alexandre P. Alves da Silva; P. J. Abrao

2002-01-01

396

A Placement Test for Computer Science: Design, Implementation, and Analysis  

ERIC Educational Resources Information Center

An introductory CS1 course presents problems for educators and students due to students' diverse background in programming knowledge and exposure. Students who enroll in CS1 also have different expectations and motivations. Prompted by the curricular guidelines for undergraduate programmes in computer science released in 2001 by the ACM/IEEE, and…

Nugent, Gwen; Soh, Leen-Kiat; Samal, Ashok; Lang, Jeff

2006-01-01

397

Computational Aspects of Protein Functionality  

PubMed Central

The purpose of this short article is to examine certain aspects of protein functionality with relation to some key organizing ideas. This is important from a computational viewpoint in order to take account of modelling both biological systems and knowledge of these systems. We look at some of the lexical dimensions of the function and how certain constructs can be related to underlying ideas. The pervasive computational metaphor is then discussed in relation to protein multifunctionality, and the specific case of von Willebrand factor as a ‘smart’ multifunctional protein is briefly considered. Some diagrammatic techniques are then introduced to better articulate protein function.

Toh, C.-H.

2004-01-01

398

Supporting collaborative computing and interaction  

SciTech Connect

To enable collaboration on the daily tasks involved in scientific research, collaborative frameworks should provide lightweight and ubiquitous components that support a wide variety of interaction modes. We envision a collaborative environment as one that provides a persistent space within which participants can locate each other, exchange synchronous and asynchronous messages, share documents and applications, share workflow, and hold videoconferences. We are developing the Pervasive Collaborative Computing Environment (PCCE) as such an environment. The PCCE will provide integrated tools to support shared computing and task control and monitoring. This paper describes the PCCE and the rationale for its design.

Agarwal, Deborah; McParland, Charles; Perry, Marcia

2002-05-22

399

Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network  

Microsoft Academic Search

IEEE 802.15.4 is the Low-Rate Wireless Personal Area Network (LR-WPAN) standard that is suitable for wireless sensor networks\\u000a and wireless home networks among others. The IEEE 802.15.4 is specifically designed for energy efficiency since many 802.15.4-compliant\\u000a devices are expected to operate on battery. Because of inadequate design of the downlink frame transmission mechanism in the\\u000a standard, however, 802.15.4 devices can

Sangki Yun; Hyogon Kim

2007-01-01

400

Elastic Cloud Caches for Accelerating Service-Oriented Computations  

Microsoft Academic Search

Computing as a utility, that is, on-demand access to computing and storage infrastructure, has emerged in the form of the Cloud. In this model of computing, elastic resource allocation, i.e., the ability to scale resource allocation for specific applications, should be optimized to manage cost versus performance. Meanwhile, the wake of the information sharing\\/mining age is invoking a pervasive sharing

David Chiu; Apeksha Shetty; Gagan Agrawal

2010-01-01

401

Controlling Networked Devices in Ubiquitous Computing Environments using Biofeedback  

Microsoft Academic Search

With the advent of service oriented computing, device miniaturisation and wireless communications, it is evident that common household appliances are becoming more ubiquitous and pervasive. We are experiencing a transition from dedicated electrical appliances to devices designed to publish the functions they have as independent network-enabled services. Devices and the services they offer will be seamlessly integrated within the environment

P. Fergus; M. Merabti; M. B. Hanneghan; A. Taleb-Bendiab

2004-01-01

402

A VLSI implementation of PDF computations in HMM based speech recognition  

Microsoft Academic Search

We present an architecture and VLSI implementation of the computations of Gaussian observation probabilities in HMM based speech recognition. As opposed to the previous work of Sagayama and Takahashi (see IEEE International Conf. on Acoustics, Speech and Signal Proc., vol.1, p.213-16, 1995), reducing the number of arithmetic operations is not the major concern when these computations are implemented in a

J. Pihl; T. Svendsen; M. H. Johnsen

1996-01-01

403

Computing the damping of subsynchronous oscillations due to a thyristor controlled series capacitor  

SciTech Connect

The authors extend eigenvalue analysis of subsynchronous resonance (SSR) to include thyristor switchings. The eigenvalue computation takes account of the time variations and nonlinearities of both the thyristor switchings and the generator. An example is presented using the IEEE first benchmark SSR model. The paper contributes an accurate method to compute the damping of the SSR modes with a TCSC.

Rajaraman, R.; Dobson, I.; Lasseter, R.H.; Shern, Y. [Univ. of Wisconsin, Madison, WI (United States). Electrical and Computer Engineering Dept.] [Univ. of Wisconsin, Madison, WI (United States). Electrical and Computer Engineering Dept.

1996-04-01

404

Proceedings of the IEEE workshop on intelligent control 1985  

Microsoft Academic Search

This book presents the papers given at a conference on artificial intelligence. Topics considered at the conference included robot vision, feedback controllers, probabilistic reasoning, real time intelligent control of robots, knowledge-based control systems, hierarchical intelligent control and computers, computer-aided manufacturing, and intelligent weapon control.

A. Saridis; A. Meystel

1985-01-01

405

Multi-Network Access to IEEE P1451 Smart Sensor Information Using World Wide Web Technology.  

National Technical Information Service (NTIS)

the features of IEEE P1451, a 'Draft Standard for a Smart Transducer Interface for Sensors and Actuators'. This paper presents the design of the demonstration system which uses a server architecture based on the demonstration system which uses a server ar...

R. Schneeman K. Lee

1999-01-01

406

Queueing Analysis and Delay Mitigation in IEEE 802.11 Random Access MAC based Wireless Networks  

Microsoft Academic Search

In this paper, we present an analytic model for evaluating the queueing delays at nodes in an IEEE 802.11 MAC based wireless network. The model can account for arbitrary arrival patterns, packet size distributions and number of nodes. Our model gives closed form expressions for obtaining the delay and queue length characteristics. We model each node as a discrete time

Omesh Tickoo; Biplab Sikdar

2004-01-01

407

Novel collision detection scheme and its applications for IEEE 802.11 wireless LANs  

Microsoft Academic Search

Many control schemes proposed for IEEE 802.11 wireless LANs (WLANs) behave adaptively to transmission failures, which occur mostly by two causes: collision and channel noise. However, in generic 802.11 WLANs, a station cannot know the cause of a transmis- sion failure, and thus the current adaptive schemes assume that all transmission failures occur by one of the causes, which may

Ji-hoon Yun; Seung-woo Seo

2007-01-01

408

Outdoor IEEE 802.11 Cellular Networks: Radio and MAC Design and Their Performance  

Microsoft Academic Search

This paper explores the feasibility of designing an outdoor cellular network based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard, which was originally developed for wireless local area networks. Specifically, the performance of the 802.11 radio and medium access control (MAC) protocol in outdoor environments is investigated. For channels typical in cellular networks, we study the radio

Kin K. Leung; Martin V. Clark; Bruce McNair; Zoran Kostic; Leonard J. Cimini; Jack H. Winters

2007-01-01

409

Sensor network and information interoperability integrating IEEE 1451 with MIMOSA and OSA-CBM  

Microsoft Academic Search

The IEEE 1451 smart transducer interface for sensors and actuators standard was developed to facilitate sensor to network interoperability. It has defined a set of common communication interfaces for connecting transducers (sensors or actuators) to control networks and instruments in a network-independent environment. Concurrently, the Machinery Information Management Open Systems Alliance (MIMOSA) has established an open architecture and a set

Kang Lee; Robert X. Gao; Rick Schneeman

2002-01-01

410

Joint timing and frequency synchronization for IEEE 802.16 OFDM systems  

Microsoft Academic Search

In this paper we present joint timing and frequency synchronization algorithms for IEEE 802.16 orthogonal frequency division multiplexing (OFDM) systems. It is found that the proposed integer frequency offset (IFO) estimation can tolerate large IFO experienced by the 802.16 OFDM systems and is insensitive to timing error. For multipath channel, the fine timing synchronization provides not only the accurate position

Yanxin Yan; Masayuki Tomisawa; Yi Gong; Yong Liang Guan; Gang Wu; Choi Look Law

2007-01-01

411

Simulation, Modeling and Analysis of Wireless Local Area Networks Supporting the IEEE 802.11 Standard.  

National Technical Information Service (NTIS)

Research to improve the performance of the IEEE 802.11 has been ongoing since 1990. The focus of this research has investigated the use of the MAC and Physical layers for improving throughput. An adaptive MAC protocol, CATER (Code Adapts To Enhance Reliab...

J. Joo

1998-01-01

412

Downlink and Uplink Resource Allocation in IEEE 802.11 Wireless LANs  

Microsoft Academic Search

Wireless local area networks (WLANs) based on the IEEE 802.11 standard are becoming increasingly popular and widely deployed. It is likely that WLAN will become an important complementary technology for future cellular systems and will typically be used to provide hotspot coverage. In this paper, the complementary use of WLANs in conjunction with mobile cellular networks is studied. We identify

Sung Won Kim; Byung-Seo Kim; Yuguang Fang

2005-01-01

413

Performance analysis of sleep mode operation in IEEE 802.16e  

Microsoft Academic Search

The paper investigates the queueing behavior of the sleep mode operation in IEEE 802.16e for conserving the power of an mobile station (MS) in terms of the dropping probability and the mean waiting times of packets in the base station (BS) queue. In the sleep mode, when an MS wakes up at the end of each sleep interval and there

Jun-bae Seo; Seung-que Lee; Nam-hoon Park; Hyong-woo Lee; Choong-ho Cho

2004-01-01

414

DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots  

Microsoft Academic Search

IEEE 802.11 works properly only if the stations respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter. We explain how easily this can be performed, in particular, with the new generation of adapters.

Maxim Raya; Imad Aad; Jean-pierre Hubaux; Alaeddine El Fawal

2006-01-01

415

DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots  

Microsoft Academic Search

IEEE 802.11 works properly only if the stations respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter. We explain how easily this can be performed, in particular with the new generation of adapters.

Maxim Rayay

416

Smart High Voltage Substation Based on IEC 61850 Process Bus and IEEE 1588 Time Synchronization  

Microsoft Academic Search

This paper describes the experience from the world first installation of Smart High Voltage substation with IEC 61850 Process Bus where IEEE 1588 Time Synchronization and dynamic multicast filtering have been used. IEC 61850 is one the 30 standards identified by NIST as key elements for achieving interoperability in the Smart Grid. This paper describes the experience from a high

Jim McGhee; Maciej Goraj

2010-01-01

417

Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking  

Microsoft Academic Search

For the first time, this paper presents an analysis of the performance of the IEEE 802.15.4 low power, low data rate wireless standard in relation to medical sensor body area networks. This is an emerging application of wireless sensor networking with particular performance constraints, including power consumption, physical size, robustness and security. In the analysis presented, the star network configuration

Nicholas F. Timmons; William G. Scanlon

2004-01-01

418

Differences and similarities between the audio video bridges and power system profiles for IEEE 1588  

Microsoft Academic Search

The IEEE 1588-2008 Precision Time Protocol (PTP) defined in 2008 opens the possibilities to define profiles for specific application areas. The profiles for power system application and audio\\/video streaming have an importance beyond their initial application domain and may have to cohabit in the near future. As an example, the smart grid initiative taking place in the power system community

J.-C. Tournier; Karl Weber

2010-01-01

419

Evaluation of H.264/AVC over IEEE 802.11p vehicular networks  

NASA Astrophysics Data System (ADS)

The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

2013-12-01

420

A smart RTD temperature sensor with a prototype IEEE 1451.2 internet interface  

Microsoft Academic Search

A resistance temperature detector (RTD) with a digital, networked smart sensor signal conditioner was designed and tested. The data format and internal transducer electronic transducer data sheet (TEDS) is compatible with a revised (RS232) version of the IEEE 1451.2 smart sensor interface standard. A network capable application processor (NCAP) which interfaces directly to the Internet via Ethernet (without a PC)

Darold Wobschall; Wai Sing Poh

2004-01-01

421

An implementation of IEEE 1451 NCAP for Internet access of serial port-based sensors  

Microsoft Academic Search

A major inhibiting factor to the development of networked digital (smart) sensors is the lack of a single sensor network\\/bus standard. Over fifty networks are in common use and no single standard is likely to emerge in the near future. In response, a NIST-sponsored initiative has developed the IEEE 1451 sensor interface standard which can be considered a universal interface

Darold Wobschall

2002-01-01

422

An empirical analysis of the IEEE 802.11 MAC layer handoff process  

Microsoft Academic Search

IEEE 802.11 based wireless networks have seen rapid growth and deployment in the recent years. Critical to the 802.11 MAC operation, is the handoff function which occurs when a mobile node moves its association from one access point to another. In this paper, we present an empirical study of this handoff process at the link layer, with a detailed breakup

Arunesh Mishra; Minho Shin; William A. Arbaugh

2003-01-01

423

Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network  

Microsoft Academic Search

Throughput performance of the IEEE 802.11 Dis- tributed Coordination Function (DCF) is very sensitive to the number n of competing stations. The contribute of this paper is threefold. First, we show that n can be expressed as function of the collision probability encountered on the channel; hence, it can be estimated based on run-time measurements. Second, we show that the

Giuseppe Bianchi; Ilenia Tinnirello

2003-01-01

424

Analyzing and Tuning the Distributed Coordination Function in the IEEE 802.11 DFWMAC Draft Standard  

Microsoft Academic Search

The upcoming standard for wireless LANs - DFWMAC 1 developed by the IEEE2 802.11 working group consists of two parts - the distributed coordination function DCF that is based on a contention scheme and the point coordination function PCF based on a conten- tion free scheme. The DCF is CSMA\\/CA like access protocol with several extensions. In this paper, following

Jost Weinmiller; Hagen Woesner; Jean-Pierre Ebert; Adam Wolisz

1996-01-01

425

Investigation of the IEEE 802.11 medium access control (MAC) sublayer functions  

Microsoft Academic Search

Analysis of the draft IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard's ad hoc and infrastructure networks. The performance of the medium access control (MAC) sublayer, which consists of distributed coordination function (DCF) and point coordination function (PCF), is determined by simulating asynchronous data traffic in a 1 Mbps ad

B. P. Crow; I. Widjaja; J. G. Kim; P. Sakai

1997-01-01

426

Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement  

Microsoft Academic Search

IEEE 802.11 wireless local area network (WLAN) physical layers (PHYs) support multiple transmission rates. The PHY rate to be used for a particular frame transmission is solely determined by the transmitting station. The transmitting rate should be chosen in an adaptive manner since the wireless channel condition varies over time due to such factors as station mobility, time-varying interference, and

Javier del Prado Pavon; Sunghyun Choi

2003-01-01

427

IEEE 802.11 Wireless LAN: Capacity Analysis and Protocol Enahncement  

Microsoft Academic Search

In WLAN the medium access control (MAC) protocol is the main element for determining the efficiency in sharing the limited communication bandwidth of the wireless channel. This paper focuses on the efficiency of the IEEE 802.11 standard for wireless LANs. Specifically, we derive an analytical formula for the protocol capacity (Kur 84). From this analysis we found i) the theoretical

Federico Calì; Marco Conti; Enrico Gregori

1998-01-01

428

IEEE 1472: an open-source communications protocol for railway vehicles  

Microsoft Academic Search

Railway vehicles are complex systems that are an essential component of any national transportation infrastructure. But railway vehicles are also mission-critical systems that must support the comfort and safety of passengers. It is therefore essential that these systems be the epitome of fault-tolerant control technology. The Rail Transit Vehicle Interface (RTVI) standards committee of the IEEE's Vehicular Technology Society developed

P. A. Laplante; F. C. Woolsey

2003-01-01

429

Image Transfer Frequency Division Multiplex Multi-Hop Network Using IEEE 802.15.4  

NASA Astrophysics Data System (ADS)

Recently, the wireless sensor network where advanced sensing, and image recognition and a network were connected attracts attention. In this research, the multi-hop wireless sensor network which carries out sensing of the image which used IEEE 802.15.4 ZigBee is built. In the multi-hop network, two or more sets of terminals may be communicating within 1 hop using the same frequency band. In that case, communicative delay occurs by access control (CSMA/CA) of IEEE 802.15.4. In order to solve this problem, in this research, proposal of the image transfer network which applied the Frequency Division Multiplex system to IEEE 802.15.4, and construction were performed. In order to show the usefulness of this proposal system, image transmission by the conventional system and a proposal system was performed, and transmission time was measured. When a proposal system was applied, improvement in a throughput has been confirmed as compared with the conventional system. Furthermore, improvement in a throughput was confirmed by performing a channel setup which avoided the channel currently used by wireless LAN. Moreover, it confirmed that a proposal system improved about 25 [msec] faster than the conventional system by the experiment of the picture transmission by communication of IEEE 802.15.4.

Inui, Kazuhiro; Sugiura, Akihiko; Kobayashi, Hideyuki

430

Performance Investigation into an IEEE 802.14 MAC Protocol for HFC Networks  

Microsoft Academic Search

The paper provides insight into the performance of a candidate IEEE 802.14 MAC protocol for hybrid fibre\\/coax (HFC) networks, by simulation. The simulations make use of two types of input traffic: measured traffic traces, and randomly generated memoryless traffic. It is confirmed that the protocol does not reach congestion collapse under any traffic load, and this is found to hold

Milosh V. Ivanovich; Moshe Zukerman; Ron Addie

1997-01-01

431

Interference Evaluation of Bluetooth and IEEE 802.11b Systems  

Microsoft Academic Search

The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result in significant performance degradation when devices are colocated in the same environment. The main goal of this paper is to evaluate the effect of mutual interference on the performance of Bluetooth and

Nada Golmie; Robert E. Van Dyck; A. Soltanian; A. Tonnerre; Olivier Rébala

2003-01-01

432

Home network file system for home network based on IEEE1394 technology  

Microsoft Academic Search

This paper proposes a network file system for home network based on IEEE-1394 technology. The home network file system enables real-time playback, recording of audio\\/video file and file sharing for HAVi (home audio video interoperability) compliant consumer devices

T. Igarashi; K. Hayakawa; T. Nishimura; T. Ozawa; H. Takizuka

1999-01-01

433

Investigation of H.264 Video Streaming over an IEEE 802.11e EDCA Wireless Testbed  

Microsoft Academic Search

Although a number of investigations have been conducted using IEEE 802.11e enabled networks to stream class differentiated video, very few reports are available based on a real testbed. In our work, we set up a wireless testbed for H.264 video streaming through assigning the partitioned video packets onto the DCF MAC layer and different access classes of the EDCA MAC

Richard Haywood; Saty Mukherjee; Xiao-Hong Peng

2009-01-01

434

Throughput Upper Limit for IEEE 802.11 Networks with Block Acknowledge and Frame Aggregation  

NASA Astrophysics Data System (ADS)

The paper presents new transmission procedures present in IEEE 802.11 standard and compares them to the "traditional" frame exchange method. On the basis of their operating rules, analytical equations are derived that allow calculate network efficiency or effective throughput. The throughput upper limit is also calculated and compared for all considered frame exchange procedures.

Zieli?ski, Bart?omiej

435

Applying IEEE storage system management standards at the National Storage Laboratory.  

National Technical Information Service (NTIS)

Since its inception in 1990, the IEEE Storage System Standards Working Group has identified storage-system management as an area in need of further development The pressing need for standards in storage-system management arises from the requirement to exc...

S. Louis S. W. Hyer

1992-01-01

436

Analysis and Simulation Model of Physical Carrier Sensing in IEEE 802.11 Mesh Networks  

Microsoft Academic Search

In IEEE 802.11 Wireless Mesh networks, tuning of the Physical Carrier Sensing (PCS) threshold based has been shown to be an ecient way to balance the hidden vs. exposed terminal trade-o and hence improve aggregate network throughput. Clear Channel Assessment (CCA) indicates channel status by comparing the net RF energy with a suitable chosen PCS threshold to control which nodes

Hui Ma; Eiman Alotaibi; Sumit Roy

437

Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit  

Microsoft Academic Search

In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically derive the average size of the contention window that maximizes the throughput, hereafter theoretical

Frederico Calì; Marco Conti; Enrico Gregori

2000-01-01

438

WINDOWS STREAMING MEDIA PERFORMANCE ANALYSIS ON A IEEE 802.11g RESIDENTIAL NETWORK  

Microsoft Academic Search

This paper presents a performance evaluation of Microsoft Windows Media Streaming (WMS) on an IEEE 802.11g home network. Empirical measurements are used to determine the viability of streaming High Definition (HD) and high quality video over a wireless residential network using currently available multimedia streaming software. User experience is evaluated using visual testbed observations and performance criteria that include playback

Travis Grant; Saurabh Gupta; Harshal Pandya; Robert Kinicki

439

IEEE 802.16 based last mile broadband wireless military networks with quality of service support  

Microsoft Academic Search

Future Department of defense warfighting concepts leverage information superiority and will require vast improvements in information transfer in terms of higher bandwidth, Quality of Service (QoS) support and connection to a high speed backbone. The new IEEE 802.16 broadband wireless access system is a viable alternative that can meet such requirements. In addition, this network can be swiftly deployed to

Kitti Wongthavarawat; Aura Ganz

2003-01-01

440

Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks.  

National Technical Information Service (NTIS)

The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality and availability In addition to wi...

B. H. Tan

2003-01-01

441

IEEE 802.11 b performance evaluation: convergence of theoretical, simulation and experimental results  

Microsoft Academic Search

The work presents the analysis of the evaluation of the maximum goodput achievable in a IEEE 802.11 b basic set service (BSS) performed by means of theoretical, simulative and experimental approaches. With respect to previous works on this topic, the presented study focuses on the comparison of the results obtained using the different approaches, highlighting their convergence in the simple

R. G. Oarroppo; Stefano Giordano; S. Lucetti

2004-01-01

442

Performance Analysis of IEEE 802.11 DCF with Heterogeneous Traffic  

Microsoft Academic Search

An analytical model is proposed for the perfor- mance study of IEEE 802.11 distributed coordination function (DCF) with finite traffic load. Based on the model, average medium access control (MAC) sublayer service time of a frame and channel throughput are obtained. The model is further extended for the performance analysis of DCF with mixed voice and data traffic. The maximum

Xinhua Ling; Lin X. Cai; Jon W. Mark; Xuemin Shen

2007-01-01

443

Merging FPGA and FPAA Reconfiguration Capabilities for IEEE 1451.4 Compliant Smart Sensor Applications  

Microsoft Academic Search

This work focuses on the application of both field programmable analog arrays (FPAAs) and field programmable gate arrays (FPGAs) as an unique system for implementing IEEE 1451.4 sensor interfaces. The inherent reconfigurability of these two hardware platforms allows increasing the versatility of the overall system, leading to a variety of sensor connectivity and remote measurement and control options.

D. P. Morales; A. Garcia; A. J. Palma; A. Martinez-Olmos

2007-01-01

444

Link Level Anaylsis of Channel Dynamics on IEEE 802.11g Networks in Multiple Environments  

Microsoft Academic Search

The performance of IEEE 802.11 wireless networks is highly sus- ceptible to changes in the condition of the radio channel on which they operate. These changes in channel condition are known as the channel dynamics. Research is still needed to completely under- stand the effects of these channel dynamics and to improve exisit- ing channel models. However, most studies of

Joe Davis; Shaoen Wu

445

Tools and Techniques for Measurement of IEEE 802.11 Wireless Networks  

Microsoft Academic Search

With the growing popularity of wireless local area networks (WLANs) has come an increased need for effective measurements of real-world WLANs and their applications. This paper presents tools and techniques for measuring IEEE 802.11 WLANs. The techniques include details on setting up a PC as a wireless access point and building a wireless sniffer while the tools include programs for

Feng Li; Mingzhe Li; Rui Lu; Huahui Wu; Mark Claypool; Robert Kinicki

2006-01-01

446

Measurement in IEEE 1641 and its application in a CASS TSF Library  

Microsoft Academic Search

A new revision of IEEE Std 1641 has been completed and should be available before the end of the year. This standard, which provides a method of accurately defining signals and tests, has been further developed with many new improvements. The standard provides for libraries of pre-defined signals which may be re-used within a technology or project. There have been

Ashley M B Hulme

2010-01-01

447

Novel architecture for reliable H.26L video transmission over IEEE 802.11e  

Microsoft Academic Search

Abstract - Today the great challenge proposed to the IEEE 802.11 [1] Wireless Lan is to ,support ,real time ,and multimedia applications. However, the characteristics of the wireless channel (low and fluctuating bandwidth ,link and the large error rate) post different problems in supporting the requirements on QoS (bandwidth, delays, jitters) of these sensitive applications. In this paper, we focus

Adlen Ksentini; Abdelhak Guéroui; Mohamed Naimi

2004-01-01

448

The IEEE Reliability Test System - Extensions to and Evaluation of the Generating System  

Microsoft Academic Search

This paper outlines some of the restrictions which currently exist in the generation data of the IEEE Reliability Test System (RTS). The paper extends the RTS by including more factors and system conditions which may be included in the reliability evaluation of generating systems. These extensions create a wider set of consistent data. The paper also includes generation reliability indices

R. N. Allan; R. Billinton; N. M. K. Abdel-Gawad

1986-01-01

449

Smart home energy management system using IEEE 802.15.4 and zigbee  

Microsoft Academic Search

Wireless personal area network and wireless sensor networks are rapidly gaining popularity, and the IEEE 802.15 Wireless Personal Area Working Group has defined no less than different standards so as to cater to the requirements of different applications. The ubiquitous home network has gained widespread attentions due to its seamless integration into everyday life. This innovative system transparently unifies various

Dae-Man Han; Jae-Hyun Lim

2010-01-01

450

Maintaining Routing Tree in IEEE 802.16 Centralized Scheduling Mesh Networks  

Microsoft Academic Search

The IEEE 802.16 mesh mode supports two schedul- ing mechanisms, namely centralized scheduling and distributed scheduling. Centralized scheduling is based on a routing tree to offer centralized control. As we will show, the structure of the routing tree has a significant impact on the system performance. In this paper, we propose a routing tree construction scheme for centralized scheduling to

Yanbin Lu; Guoqing Zhang

2007-01-01

451

Investigating the Performance of Power-Aware IEEE 802.11 in Multihop Wireless Networks  

Microsoft Academic Search

We address two issues of contemporary interest in the area of enhancing the performance of ad hoc networks, where the IEEE 802.11 distributed coordination function (DCF) is the adopted medium-access control (MAC). We investigate the effects that transmission power control and tuning carrier sensing (CS) threshold have on network throughput, and we study the interplay between them. To accomplish this,

Basel Alawieh; Chadi M. Assi; Hussein Mouftah

2009-01-01

452

Analysis of IEEE 802.11b wireless security for university wireless LAN design  

Microsoft Academic Search

Wireless local area network has been very popular nowadays especially in public places like shopping malls, airports, coffee cafes, hotels and in universities. However, many people that implemented the WLAN have not been concerned with the wireless security issues that expose their network to dangerous intruders. This paper aims to explain the analysis of wireless security issues based on IEEE802.11b

F. K. L. Chan; Ang Hee Hoon; B. Issac

2005-01-01

453

Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network  

Microsoft Academic Search

Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with dieren t QoS requirements. MANET (Mobile Adhoc NETwork) does not require a xed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a

Salima Hamma; Eddy Cizeron; Haz Issaka

2008-01-01

454

On the Range Performance of Decode-And-Forward Relays in IEEE 802.11 WLANs  

Microsoft Academic Search

We consider a wireless local area network (WLAN) in the 5 GHz band. The coverage is one of the main challenges in high-frequency wireless systems and we focus on enhancing the coverage range of such a system by relaying. So far no relaying functions are defined in IEEE 802.11 medium access control (MAC). We introduce three simple MAC schemes for

Azadeh Ettefagh; Marc Kuhn; Ingmar Hammerström; Armin Wittneben

2006-01-01

455

Analysis and Optimisation of IEEE 802.11 Wireless Local Area Networks  

Microsoft Academic Search

In the recent years, IEEE 802.11 wireless local area networks (WLANS) have increasingly been deployed in a variety of situations, such as homes, business enterprises, academic campuses, and public places such as airports, hotels, and shopping centers. It has therefore become very important to understand the performance of such networks as well the effective network design, deployment and management. In

Anurag Kumar

2005-01-01

456

IEEE 802.11 Optimisation Techniques for Inter-Satellite Links in LEO Networks  

Microsoft Academic Search

This paper describes key optimization techniques, which are aimed at extending the terrestrial wireless network to space to satisfy the communication needs of autonomous distributed multi-spacecraft constellations. The IEEE 802.11 inter-frame re-definitions for increased range are addressed. Antenna null steering and direction of arrival algorithms for interference minimization and throughput maximization are discussed

K. Sidibeh; T. Vladimirova

2006-01-01

457

An Energy-Efficient Error Correction Scheme for IEEE 802.15.4 Wireless Sensor Networks  

Microsoft Academic Search

In this paper, we validate a novel augmentation to the physical layer (PHY) of the IEEE 802.15.4 standard for wireless sensor networks. This augmentation implements interleaving and forward error correction (FEC) encoding within sensor node transmitters, facilitating a significant reduction in their transmission energy. We detail the design, parameterization, and implementation of this FEC encoder and show that it has

Liang Li; Robert G. Maunder; Bashir M. Al-Hashimi; Lajos Hanzo

2010-01-01

458

Pervasive genetic hitchhiking and clonal interference in forty evolving yeast populations.  

PubMed

The dynamics of adaptation determine which mutations fix in a population, and hence how reproducible evolution will be. This is central to understanding the spectra of mutations recovered in the evolution of antibiotic resistance, the response of pathogens to immune selection, and the dynamics of cancer progression. In laboratory evolution experiments, demonstrably beneficial mutations are found repeatedly, but are often accompanied by other mutations with no obvious benefit. Here we use whole-genome whole-population sequencing to examine the dynamics of genome sequence evolution at high temporal resolution in 40?replicate Saccharomyces cerevisiae populations growing in rich medium for 1,000?generations. We find pervasive genetic hitchhiking: multiple mutations arise and move synchronously through the population as mutational 'cohorts'. Multiple clonal cohorts are often present simultaneously, competing with each other in the same population. Our results show that patterns of sequence evolution are driven by a balance between these chance effects of hitchhiking and interference, which increase stochastic variation in evolutionary outcomes, and the deterministic action of selection on individual mutations, which favours parallel evolutionary solutions in replicate populations. PMID:23873039

Lang, Gregory I; Rice, Daniel P; Hickman, Mark J; Sodergren, Erica; Weinstock, George M; Botstein, David; Desai, Michael M

2013-08-29

459

Union and separation in the therapy of pervasive developmental disorders and ADHD.  

PubMed

This paper discusses the characteristics of psychotherapy for pervasive developmental disorders (PDD) in the context of the curative effects of the movement of images. The 'autistic spectrum' is widened here and includes not only PDD, but also ADHD. The main common characteristic in these two sets of disorders seems to be the lack of a subject, which manifests itself as the absence of awareness of otherness and difficulties with boundaries and language. In these cases a normal psychotherapy is ineffective as it presupposes an established subject. However a psychotherapeutic approach with these patients can contribute to the emergence of a subject. In severe cases the process of union and separation which is enacted either in the therapeutic relationship or in symbolic play leads to the birth of a subject, and of language. In milder cases, such as ADHD, the moments of separation and confrontation with the therapist suffice. I will discuss a case of my own with Asperger's syndrome in which union and separation in the play therapy occurred simultaneously. This indicates that union and separation are not a consecutive process, but are simultaneous and lead to dialectical movement. However, in neurotic cases with an established subjectivity the symbolic meaning of image plays a central role. This corresponds to Jung's understanding of image in alchemy. PMID:19840158

Kawai, Toshio

2009-11-01

460

Visual completion and complexity of visual shape in children with pervasive developmental disorder.  

PubMed

Much evidence has been gathered for differences in visual perceptual processing in individuals with Autistic Spectrum Disorder. The presence of the fundamental process of visual completion was tested in a group of children with Pervasive Developmental Disorder (PDD), as this requires perceptually integrating visual structure into wholes. In Experiment 1, it was investigated whether visual completion is present for simple partly occluded shapes in a group of children with PDD and a typically developing group. In Experiment 2, the presence of contextual influences in visual completion was investigated for the two groups. A total of 19 children with PDD and 28 controls who were matched for chronological age and IQ took part in two primed-matching tasks. For both groups, visual completion was present and for both groups, contextual influences were found to be dominant in this process. However, only for the group with PDD no priming effects (PEs) were found from less regular primes on congruent test pairs. The group with PDD did integrate visual information into wholes and did this in a contextually dependent way. However, for more complex shapes, visual completion is weaker for this group. PMID:17136302

de Wit, Tessa C J; Schlooz, Wim A J M; Hulstijn, Wouter; van Lier, Rob

2007-04-01

461

Pervasive nanoscale deformation twinning as a catalyst for efficient energy dissipation in a bioceramic armour.  

PubMed

Hierarchical composite materials design in biological exoskeletons achieves penetration resistance through a variety of energy-dissipating mechanisms while simultaneously balancing the need for damage localization to avoid compromising the mechanical integrity of the entire structure and to maintain multi-hit capability. Here, we show that the shell of the bivalve Placuna placenta (~99 wt% calcite), which possesses the unique optical property of ~80% total transmission of visible light, simultaneously achieves penetration resistance and deformation localization via increasing energy dissipation density (0.290 ± 0.072 nJ ?m(-3)) by approximately an order of magnitude relative to single-crystal geological calcite (0.034 ± 0.013 nJ ?m(-3)). P. placenta, which is composed of a layered assembly of elongated diamond-shaped calcite crystals, undergoes pervasive nanoscale deformation twinning (width ~50 nm) surrounding the penetration zone, which catalyses a series of additional inelastic energy dissipating mechanisms such as interfacial and intracrystalline nanocracking, viscoplastic stretching of interfacial organic material, and nanograin formation and reorientation. PMID:24681646

Li, Ling; Ortiz, Christine

2014-05-01

462

Pervasive burial dissolution of early and late dolomites in Devonian pools, Alberta, western Canada  

SciTech Connect

Middle Devonian Keg River and Muskeg pools along the northern margin of Rainbow basin in northern Alberta produce mainly from secondary porosity created by dissolution of replacement dolomites and cements, including saddle dolomites. Resultant pores are predominantly vug and moldic and often microporous. Coarse vuggy porosity is also associated with Zebra dolomites. Several relationships confirm the burial dissolution of dolomites in these sequences. First, dolomites which replaced stylolitic sediment, including saddle dolomites, are leached, as shown by fluorescence microscopy. Second, high amounts of secondary porosity are preserved in highly stylolitic dolomites, often directly adjacent to pressure solution seams. Third, pressure solution seams terminate directly into secondary porosity. And fourth, fractures which cut stylolites also commonly feed directly into secondary pores. These petrographic relationships are consistent only if dolomite dissolution and secondary porosity development were contemporaneous with or postdated pressure solution. The spatial juxtaposition of fractures and stylolites with secondary porosity implies these diagenetic fabrics served as pathways for burial fluids promoting dolomite dissolution. Given the regional extent of pervasive dolomite dissolution, dolomite stability in these sequences is not a function of the type or relative age of dolomite crystals precipitated. Rather, pore-fluid chemistry appears to be the major control. Calcium-rich burial fluids, responsible for emplacement of burial anhydrites and fluorite cements, are thought to promote the deep-burial dolomite dissolution and secondary porosity development in these pools.

Dravis, J.J. (Rice Univ., Houston, TX (United States)); Muir, I.D. (Esso Resources Canada Ltd., Calgary, Alberta (Canada))

1991-03-01

463

A pervasive health system integrating patient monitoring, status logging and social sharing.  

PubMed

In this paper, we present the design and development of a pervasive health system enabling self-management of chronic patients during their everyday activities. The proposed system integrates patient health monitoring, status logging for capturing various problems or symptoms met, and social sharing of the recorded information within the patients community, aiming to facilitate disease management. A prototype is implemented on a mobile device illustrating the feasibility and applicability of the presented work by adopting unobtrusive vital signs monitoring through a wearable multi-sensing device, a service oriented architecture for handling communication issues, and popular micro-blogging services. Furthermore, a study has been conducted with 16 hypertensive patients, in order to investigate the user acceptance, the usefulness, and the virtue of the proposed system. The results show that the system is welcome by the chronic patients who are especially willing to share healthcare information, and easy to learn and use, while its features have been overall regarded by the patients as helpful for their disease management and treatment. PMID:23193318

Triantafyllidis, A K; Koutkias, V G; Chouvarda, I; Maglaveras, N

2013-01-01

464

Pervasive and dynamic protein binding sites of the mRNA transcriptome in Saccharomyces cerevisiae  

PubMed Central

Background Protein-RNA interactions are integral components of nearly every aspect of biology, including regulation of gene expression, assembly of cellular architectures, and pathogenesis of human diseases. However, studies in the past few decades have only uncovered a small fraction of the vast landscape of the protein-RNA interactome in any organism, and even less is known about the dynamics of protein-RNA interactions under changing developmental and environmental conditions. Results Here, we describe the gPAR-CLIP (global photoactivatable-ribonucleoside-enhanced crosslinking and immunopurification) approach for capturing regions of the untranslated, polyadenylated transcriptome bound by RNA-binding proteins (RBPs) in budding yeast. We report over 13,000 RBP crosslinking sites in untranslated regions (UTRs) covering 72% of protein-coding transcripts encoded in the genome, confirming 3' UTRs as major sites for RBP interaction. Comparative genomic analyses reveal that RBP crosslinking sites are highly conserved, and RNA folding predictions indicate that secondary structural elements are constrained by protein binding and may serve as generalizable modes of RNA recognition. Finally, 38% of 3' UTR crosslinking sites show changes in RBP occupancy upon glucose or nitrogen deprivation, with major impacts on metabolic pathways as well as mitochondrial and ribosomal gene expression. Conclusions Our study offers an unprecedented view of the pervasiveness and dynamics of protein-RNA interactions in vivo.

2013-01-01

465

Pervasive surveillance-agent system based on wireless sensor networks: design and deployment  

NASA Astrophysics Data System (ADS)

Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.

Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

2010-12-01

466

Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA  

NASA Astrophysics Data System (ADS)

Healthcare organizations often face the challenge of integrating diverse and geographically disparate information technology systems to respond to changing requirements and to exploit the capabilities of modern technologies. Hence, systems evolution, through modification and extension of the existing information technology infrastructure, becomes a necessity. Moreover, the availability of these systems at the point of care when needed is a vital issue for the quality of healthcare provided to patients. This chapter takes a process perspective of healthcare delivery within and across organizational boundaries and presents a disciplined approach for evolving healthcare systems towards a pervasive, grid-enabled service-oriented architecture using the enterprise system bus middleware technology for resolving integration issues, the business process execution language for supporting collaboration requirements and grid middleware technology for both addressing common SOA scalability requirements and complementing existing system functionality. In such an environment, appropriate security mechanisms must ensure authorized access to integrated healthcare services and data. To this end, a security framework addressing security aspects such as authorization and access control is also presented.

Koufi, V.; Malamateniou, F.; Papakonstantinou, D.; Vassilacopoulos, G.

467

Beyond wishful thinking; medical community presence on the web and challenges of pervasive healthcare.  

PubMed

Romanian healthcare is facing a number of challenges, from the growing general costs, through requests for better services, inadequate territorial coverage, medical errors and a growing incidence of chronic diseases, to the burden of debt toward the pharmaceutical industry. For the last 14 years decision factors have been searching for the magic formula in restructuring the healthcare sector. Eventually, the government has come to appreciate the benefits of IT solutions. Our paper presents recent advances in wireless technologies and their impact on healthcare, in parallel with the results of a study aimed to acknowledge the presence of the medical community on Romanian WWW and to evaluate the degree of accessibility for the general population. We have documented Web sites promoting health services, discussion forums for patients, online medical advice, medical image teleprocessing, health education, health research and documentation, pharmaceutical products, e-procurement, health portals, medical links, hospitals and other health units present on the Web. Initial results have shown that if the current trend in price decreases for mobile communications continues and if the government is able to provide funding for the communication infrastructure needed for pervasive healthcare systems together with the appropriate regulations and standards, this can be a long-term viable solution of the healthcare crisis. PMID:15718620

Moisil, Ioana; Barbat, Boldur E

2004-01-01

468

Social needs in daily life in adults with Pervasive Developmental Disorders.  

PubMed

Although social deficits remain a persistent component of the behavioural phenotype of Pervasive Developmental Disorders (PDD) in adulthood, it remains unclear whether these represent diminished social needs, as is seen in social anhedonia, or rather thwarted social needs, as is seen in social anxiety. This study used the Experience Sampling Method (ESM)--a structured diary technique--to examine social interaction in daily life of 8 adults with PDD, compared to 14 healthy controls. Multilevel linear regression analyses showed that PDD subjects a) did not spend more time alone, b) had no increased preference to be alone when in company, and c) spent more time with familiar people, compared to control subjects. Patients experienced more negative affect and anxiety when in the company of less familiar people compared to when they are alone, whereas no difference in affect could be found between being alone or being with familiar people. All these lines of evidence suggest that PDD subjects do have a desire to interact. However, this may be thwarted as is seen in social anxiety. Therapeutic interventions should aim at decreasing negative affect and anxiety in social interactions possibly by improving social skills to fulfil the existing social needs in adults with PDD. PMID:20638732

Hintzen, Anouk; Delespaul, Philippe; van Os, Jim; Myin-Germeys, Inez

2010-08-30

469

Psycho-educational Horseback Riding to Facilitate Communication Ability of Children with Pervasive Developmental Disorders  

PubMed Central

In this study, we applied a novel psycho-educational horseback riding (PEHR) program to the treatment of four Japanese children with pervasive developmental disorders (PDD) in order to facilitate the acquisition of verbal and nonverbal communication skills. The behavioral changes in each child were evaluated using a psychological and behavioral scale. The scale for evaluating the effect of Human-Equips-Interaction on Mental activity (HEIM scale) was designed to assess the behavioral improvement of children based on the following 10 items: Human relationships, Imitation, Emotional expression, Sudden physical movement, Fixative behavior, Adaptation to change, Visual response, Fear or nervousness, and Verbal and nonverbal communication. After taking part in the PEHR program for several months, all subjects showed remarkably improved HEIM scores and marked improvements were observed in eye contact with others (instructors, side walkers, and leaders) in the riding area. A statistical difference was found in items 1, 2, 3, 6, 7, 8, and 9. However, no statistical difference was found in items 4, 5, and 10. As the program progressed, the children showed enhanced verbal and nonverbal communication skills, and became more expressive in their emotional and empathetic interaction with their parents. These observations suggest that the normal functioning of pleasurable emotions and empathy may facilitate further improvements in joint attention, imitation and empathy, and may result in successful verbal expression by PDD children. Therefore, horseback riding can play a very important role in the psycho-educational support required for the communication ability of PDD children.

KEINO, Hiromi; FUNAHASHI, Atsushi; KEINO, Hiroomi; MIWA, Chihiro; HOSOKAWA, Masanori; HAYASHI, Yoshihiro; KAWAKITA, Kenji

2010-01-01

470

Pervasive nanoscale deformation twinning as a catalyst for efficient energy dissipation in a bioceramic armour  

NASA Astrophysics Data System (ADS)

Hierarchical composite materials design in biological exoskeletons achieves penetration resistance through a variety of energy-dissipating mechanisms while simultaneously balancing the need for damage localization to avoid compromising the mechanical integrity of the entire structure and to maintain multi-hit capability. Here, we show that the shell of the bivalve Placuna placenta (~99 wt% calcite), which possesses the unique optical property of ~80% total transmission of visible light, simultaneously achieves penetration resistance and deformation localization via increasing energy dissipation density (0.290 ± 0.072 nJ ?m?3) by approximately an order of magnitude relative to single-crystal geological calcite (0.034 ± 0.013 nJ ?m?3). P. placenta, which is composed of a layered assembly of elongated diamond-shaped calcite crystals, undergoes pervasive nanoscale deformation twinning (width ~50 nm) surrounding the penetration zone, which catalyses a series of additional inelastic energy dissipating mechanisms such as interfacial and intracrystalline nanocracking, viscoplastic stretching of interfacial organic material, and nanograin formation and reorientation.

Li, Ling; Ortiz, Christine

2014-05-01

471

Behavioral Characteristics of Children with High Functioning Pervasive Developmental Disorders during a Game  

PubMed Central

Background To evaluate children’s sociability through their behavior, we compared the motion features of children with high functioning pervasive developmental disorders (HFPDD) and typical development (TD) during a game. We selected ‘Jenga’ as the game because this is an interactive game played by two people. Methods We observed the behavior of 7 children with HFPDD and 10 children with TD. An optical motion capture system was used to follow the movement of 3-dimensional position markers attached to caps worn by the players. Results The range of head motion of the children with HFPDD was narrower than that of the control group, especially in the X-axis direction (perpendicular to the line connecting the two players). In each game, we calculated the range of motion in the X-axis of each child and divided that figure by the matched adult player’s range. The average ratios of children with HFPDD and TD were 0.64 and 0.89 (number of games are 61 and 18), and the difference of these two ratios is significant (P < 0.001). Conclusions This ratio has sensitivity to identify HFPDD children and could be useful in their child care.

Kawaguchi, Hideo; Murakami, Bonko; Kawai, Masatoshi

2010-01-01

472

Intra-grain composition nonuniform barium strontium calcium titanate ceramics by sol-gel pervasion techniques  

NASA Astrophysics Data System (ADS)

The use of ferroelectric ceramics in microwave devices requires that they possess low-loss, frequency-stable and highly tunable properties. The problems of traditional barium strontium calcium titanate ceramics are higher loss and inappropriate work temperature dependence. In this work, a conventional mixed oxide route was used to prepare BaTiO3, SrTiO3 and CaTiO3 precursor powders. The BaTiO3, SrTiO3 and CaTiO3 powders were thoroughly ball mill mixed. They were then added to 5 wt% polyvinyl alcohol and pressed under a uni-axial pressure of 220 MPa into discs of 12 mm diameter. We introduced nano-grains of barium strontium titanate (BST) into the BSCT ceramic by nano-grain pervasion techniques to fabricate compositionally nonuniform BSCT ceramic samples. The nano-particles of BST are prepared with the sol-gel method. The sol-gel was subjected to ultrasonic irradiation and then vacuum methods in order to easily introduce nanoparticles into bulky BSCT. The ceramics do not show a sharp change in the dielectric constant and have a wide range of Curie temperature distribution. This is attributed to the presence of a compositionally nonuniform micro-area in the samples. Compared with uniform-composition BSCT, compositionally nonuniform BSCT has favourable dielectric properties. These results suggest that the compositionally nonuniform BSCT ceramics are promising candidates as tunable microwave elements.

Xu, Honghai; Jin, Dengren; Wu, Wenbiao; Cheng, Jinrong

2009-03-01

473

Context-based security (and safety) meta-policies for pervasive computing environments: the case of smart momes  

Microsoft Academic Search

Context-based security is an approach for modeling adaptive security solutions based on the situation of use of the system. Security policies in this approach are not static as it used to be in traditional systems. The security actions to be taken are based on the knowledge of the combination of various factors such as the location of the user, the

Pravin Shetty; Seng Wai Loke

2005-01-01

474

Cloud@Home: A New Enhanced Computing Paradigm  

NASA Astrophysics Data System (ADS)

Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

475

Interference Management in IEEE 802.11 Frequency Assignment  

Microsoft Academic Search

In this article we address the frequency management during WLAN planning. Frequency management refers to channels interference and SINR computation. We propose a new approach where location selection and frequency assignment are tackled together during WLAN planning process. Two steps characterize this approach. Firstly we use all the available channels for frequency assignment. Secondly multiple signals are taken into account

Alexandre Gondran; Oumaya Baala; Alexandre Caminada; Hakim Mabed

2008-01-01

476

ANSI\\/IEEE 1073: Medical Information Bus (MIB)  

Microsoft Academic Search

The Medical Information Bus (MIB) represents an application of networking and information technology for healthcare. The purpose of MIB is to define a standard means of connectivity between critical care bedside medical devices and hospital host computers. The devices include patient monitors, infusion pumps, ventilators, pulse oximeters and other devices used in operating rooms, intensive care units and emergency rooms.MIB

M. Glass

1998-01-01

477

Performance evaluation of the IEEE 802.15.4 MAC for low-rate low-power wireless networks  

Microsoft Academic Search

IEEE 802.15.4 is a new standard to address the need for low-rate low-power low-cost wireless networking. We provide in this paper one of the first simulation-based performance evaluations of the new medium access protocol in IEEE 802.15.4, focusing on its beacon-enabled mode for a star-topology network. We describe its key features such as the superframe structure, which allows devices to

Gang Lu; Bhaskar Krishnamachari; Cauligi S. Raghavendra

2004-01-01

478

SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks  

Microsoft Academic Search

Capacity improvement is one of the principal challenges in wireless networking. We present a link-layer protocol called Slotted Seeded Channel Hopping, or SSCH, that increases the capacity of an IEEE 802.11 network by utilizing frequency diversity. SSCH can be implemented in software over an IEEE 802.11-compliant wireless card. Each node using SSCH switches across channels in such a manner that

Paramvir Bahl; Ranveer Chandra; John Dunagan

2004-01-01

479

An Energy-Efficient Sleep Mode in IEEE 802.15.4 by Considering Sensor Device Mobility  

NASA Astrophysics Data System (ADS)

The current version of IEEE 802.15.4 MAC protocol does not support energy-efficient mobility for the low-power device. In this paper, we propose an energy-efficient sleep mode as part of the IEEE 802.15.4 that can conserve energy by considering mobility of mobile sensor devices. The proposed energy-efficient sleep mode dynamically extends the sleep interval if there is no data to transmit from the device or receive from corresponding nodes.

Kim, Jinho; Lee, Jun; Hong, Choong Seon; Lee, Sungwon

480

Queue-Aware Uplink Bandwidth Allocation and Rate Control for Polling Service in IEEE 802.16 Broadband Wireless Networks  

Microsoft Academic Search

IEEE 802.16 standard defines the air interface specifications for broadband access in wireless metropolitan area networks. Although the medium access control signaling has been well-defined in the IEEE 802.16 specifications, resource management and scheduling, which are crucial components to guarantee quality of service performances, still remain as open issues. In this paper, we propose adaptive queue-aware uplink bandwidth allocation and

Dusit Niyato; Ekram Hossain

2006-01-01

481

Performance Analysis of Multicast Video Streaming in IEEE 802.11 b\\/g\\/n Testbed Environment  

Microsoft Academic Search

The aim of the work is to analyse capabilities and limitations of different IEEE 802.11 technologies (IEEE 802.11 b\\/g\\/n),\\u000a utilized for both multicast and unicast video streaming transmissions directed to mobile devices. Our preliminary research\\u000a showed that results obtained with currently popular simulation tools can be drastically different than these possible in real-world\\u000a environment, so, in order to correctly evaluate

Aleksander Kostuch; Krzysztof Gierlowski; Jozef Wozniak

2009-01-01

482

The development of an empirical delay model for IEEE 802.11 b\\/g based on SNR measurements  

Microsoft Academic Search

Wireless local area networks (WLAN) based on IEEE 802.11b\\/g standards' are widely deployed to provide wireless interconnectivity around university campuses, business offices, and homes. A WLAN is inexpensive, easy to install, and provides data rates of up to 54 Mbps. This study experimentally analyzed the network delay performance parameter and the wireless physical channel signal-to-noise ratio (SNR) of an IEEE

Tianlin Wang; H. H. Refai

2005-01-01

483

IEEE 802.11 networks with dormant mode support: an IP paging approach and its performance analysis  

Microsoft Academic Search

IEEE802.11 networks are changing its primary role of extension of private LANs to become an access technology in competition or collaboration with current cellular networks. In addition, large-scale IEEE802.11 deployments are a reality that mesh networks can contribute to expand. But not only, networks are changing; their users are doing the same. More portable devices as WiFi enabled PDAs or

Rafael Vidal Ferré; Josep Paradells Aspas

2006-01-01

484

A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN  

NASA Astrophysics Data System (ADS)

We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

485

Integration of IEEE 1451 and HL7 Exchanging Information for Patients' Sensor Data  

PubMed Central

HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

2009-01-01

486

A Handover Mechanism Using IEEE 802.21 in Heterogeneous Wireless Networks  

NASA Astrophysics Data System (ADS)

The IEEE 802.21 framework is a novel standard and the scope of this standard is to optimize and facilitate handover in heterogeneous networks. In this paper, we propose a handover mobility management by using the IEEE 802.21 to solve some handover issues, such as handover delay and packet loss, in homogeneous and heterogeneous networks. By setting certain signal thresholds and probability confidence to trigger the Link Going Down event, the proposed handover mechanism is capable of providing better handover efficiency and reducing the handover delay and possible packet loss during handover. The NS-2 simulation is conducted to verify the performance of our handover mobility management across WLAN and WiMAX heterogeneous networks.

Chang, Lin-Huang; Wang, Chau-Chi; Lee, Tsung-Han

487

A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol  

NASA Technical Reports Server (NTRS)

Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

2005-01-01

488

Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices  

NASA Astrophysics Data System (ADS)

The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

Mehta, S.; Kwak, K. S.

489

Wide-Band Slot Antenna for IEEE 802.11b\\/g  

Microsoft Academic Search

This paper presents coplanar waveguide (CPW) fed step slot antenna. It achieves wide band from 2.0 GHz to 4.2 GHz which is the frequency band covered the standard IEEE 802.11 b\\/g (2.4-2.485 GHz) for use in WLAN (wireless local area network) and covered two frequencies of WiMAX (worldwide interoperability for microwave access) 2.5 GHz and 3.5 GHz. The characteristics of

W. Kueathawikun; P. Thumwarin; N. Anantrasirichai; T. Wakabayashi

2006-01-01

490

Adaptive transmit power control in IEEE 802.11a wireless LANs  

Microsoft Academic Search

Transmit power control (TPC) has been recognized as one of the effective ways to save energy in wireless devices. In this paper, we demonstrate the energy-efficient distributed coordination functions (DCF) operation of IEEE 802.11a wireless LANs (WLANs) via TPC and physical layer (PHY) rate adaptation. The key idea is to enforce an RTS\\/CTS frame exchange before each data transmission, and

Daji Qiao; Sunghyun Choi; Amit Jain; K. G. Shin

2003-01-01

491

MAC Channel Congestion Control Mechanism in IEEE 802.11p\\/WAVE Vehicle Networks  

Microsoft Academic Search

IEEE 802.11p\\/WAVE (Wireless Access in Vehicular Environments) is an emerging family of standards intended to support wireless access in Vehicular Ad Hoc Networks (VANETs). Broadcasting of data and control packets is expected to be crucial in this environment. Both safety-related and non-safety applications rely on broadcasting for the exchange of data or status and advertisement messages. Most of the broadcasting

Chih-Wei Hsu; Chung-Hsien Hsu; Huei-Ru Tseng

2011-01-01

492

Performance evaluations of channel estimations in IEEE 802.11p environments  

Microsoft Academic Search

A time-domain (TD) channel estimation (CE) technique is proposed in this paper to enhance the CE performance of IEEE 802.11p\\u000a standards in cases when the pilot density is insufficient to accurately estimate channel states in rich-scattering environments.\\u000a This technique is based on a least squares (LS) algorithm and assisted from Zadoff-Chu (ZC) sequences arranged into the symbol\\u000a prefix and training

Chi-Sheng Lin; Che-Kang Sun; Jia-Chin Lin; Bo-Chiuan Chen

493

Improving the channel utilization of IEEE 802.11p\\/1609 networks  

Microsoft Academic Search

The IEEE 802.11p\\/1609 standards specify a suite of communication protocols for vehicular communication networks. A new operational mode, called the WAVE (Wireless Access in Vehicular Environments) mode, is defined to enable communication among high-speed vehicles or between a vehicle and a roadside infrastructure network. In the WAVE mode, a mobile\\/stationary station uses a combined FDMA\\/TDMA channel access scheme to switch

S. Y. Wang; C. L. Chou; K. C. Liu; T. W. Ho; W. J. Hung; C. F. Huang; M. S. Hsu; H. Y. Chen; C. C. Lin

2009-01-01

494

Evaluation of the IEEE 802.11p MAC Method for Vehicle-to-Vehicle Communication  

Microsoft Academic Search

In this paper the medium access control (MAC) me- thod of the upcoming vehicular communication standard IEEE 802.11p has been simulated in a highway scenario with periodic broadcast of time-critical packets (so-called heartbeat messages) in a vehicle-to-vehicle situation. The 802.11p MAC method is based on carrier sense multiple access (CSMA) where nodes lis- ten to the wireless channel before sending.

Katrin Bilstrup; Elisabeth Uhlemann; Erik G. Ström; Urban Bilstrup

2008-01-01

495

Performance analysis and enhancement of IEEE 802.11p\\/1609 protocol family in vehicular environments  

Microsoft Academic Search

Vehicles in Intelligent Transportation System employ IEEE 802.11p\\/1609 protocols to communicate with other vehicles or roadside infrastructure within a specific area. Messages related with traffic safety can be delivered timely for collision avoidance and etc. Meanwhile, non-safety related infotainment messages can also be transmitted besides safety-critical information. Many of the safety critical messages are periodic heartbeat beacon frames broadcasting the

Yingtian Du; Lin Zhang; Yufei Feng; Zhanyang Ren; Zi Wang

2010-01-01

496

IEEE 802.11p vehicle to infrastructure communications in urban environments  

Microsoft Academic Search

The future exploitation of cooperative vehicular services in urban environments, generally characterized by challenging propagation conditions, will require an efficient deployment of roadside units. This article presents the results of an extensive field testing campaign aimed at analyzing the impact of urban characteristics, RSU deployment conditions, and communication settings on the quality of IEEE 802.11p vehicle-to-infrastructure communications. The reported results

J. Gozalvez; M. Sepulcre; R. Bauza

2012-01-01

497

Agent-Based Scheduling Scheme for IEEE 802.11p Wireless Vehicular Networks  

Microsoft Academic Search

The wireless access in vehicular environment (WAVE) architecture of intelligent transportation system (ITS) has been standardized in the IEEE 802.11p specification and it is going to be widely deployed in many roadway environments in order to provide prompt emergency information and internet services. A typical WAVE network consists of a number of WAVE devices, in which one is the road-side-unit

Shiann-Tsong Sheu; Yen-Chieh Cheng; Ping-Jung Hsieh; Jung-Shyr Wu

2011-01-01

498

Performance evaluations of channel estimations in IEEE 802.11p environments  

Microsoft Academic Search

To solve the defect in IEEE 802.11p standard that coherence bandwidth is insufficient to estimate the channel state in rich scattering environment, hence a time domain channel estimation technique is proposed in this paper. This technique is based on least-square (LS) algorithm, and assisted by Zadoff-Chu sequence in symbol prefix and preamble. The channel models in the simulation are referencing

Chi-Sheng Lin; Che-Kang Sun; Jia-Chin Lin; Bo-Chuan Chen

2009-01-01

499

Cooperative service channel reservation to improve performances of IEEE 802.11p\\/WAVE networks  

Microsoft Academic Search

The upcoming IEEE802.11p\\/WAVE (wireless access for vehicular environment) standard is intended to deliver both safety and non-safety applications to vehicles on the roads. Despite huge research on safety traffic, only a few works have investigated non-safety comfort and entertainment applications (e.g., multimedia, web browsing, e-maps) when considering the WAVE standard features and capabilities. In this paper, we focus on the

Claudia Campolo; Alessandro Cortese; Antonella Molinaro

2009-01-01

500

Real-world evaluation of IEEE 802.11p for vehicular networks  

Microsoft Academic Search

This paper presents a set of experiments, performed using an IEEE 802.11p physical layer implementation based on the open-source ath5k driver, in both line of sight (LOS) and non-line of sight (NLOS) conditions. The results are compared against theoretical models and simulation of the same scenarios with proper propagation and channel models. The communication range in LOS can reach values

Filipe Neves; Andre Cardote; Ricardo Moreira; Susana Sargento

2011-01-01