Sample records for ieee pervasive computing

  1. The Implications of Pervasive Computing on Network Design

    NASA Astrophysics Data System (ADS)

    Briscoe, R.

    Mark Weiser's late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.

  2. A Secure Framework for Location Verification in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  3. Building Efficient Wireless Infrastructures for Pervasive Computing Environments

    ERIC Educational Resources Information Center

    Sheng, Bo

    2010-01-01

    Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

  4. Towards pervasive computing in health care - a literature review.

    PubMed

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-06-19

    The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further

  5. Pervasive mobile healthcare systems for chronic disease monitoring.

    PubMed

    Huzooree, Geshwaree; Kumar Khedo, Kavi; Joonas, Noorjehan

    2017-05-01

    Pervasive mobile healthcare system has the potential to improve healthcare and the quality of life of chronic disease patients through continuous monitoring. Recently, many articles related to pervasive mobile healthcare system focusing on health monitoring using wireless technologies have been published. The main aim of this review is to evaluate the state-of-the-art pervasive mobile healthcare systems to identify major technical requirements and design challenges associated with the realization of a pervasive mobile healthcare system. A systematic literature review was conducted over IEEE Xplore Digital Library to evaluate 20 pervasive mobile healthcare systems out of 683 articles from 2011 to 2016. The classification of the pervasive mobile healthcare systems and other important factors are discussed. Potential opportunities and challenges are pointed out for the further deployment of effective pervasive mobile healthcare systems. This article helps researchers in health informatics to have a holistic view toward understanding pervasive mobile healthcare systems and points out new technological trends and design challenges that researchers have to consider when designing such systems for better adoption, usability, and seamless integration.

  6. Towards pervasive computing in health care – A literature review

    PubMed Central

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-01-01

    Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular

  7. Students Develop Real-World Web and Pervasive Computing Systems.

    ERIC Educational Resources Information Center

    Tappert, Charles C.

    In the academic year 2001-2002, Pace University (New York) Computer Science and Information Systems (CSIS) students developed real-world Web and pervasive computing systems for actual customers. This paper describes the general use of team projects in CSIS at Pace University, the real-world projects from this academic year, the benefits of…

  8. Pervasive Computing and Communication Technologies for U-Learning

    ERIC Educational Resources Information Center

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  9. Mobility in hospital work: towards a pervasive computing hospital environment.

    PubMed

    Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I

    2007-01-01

    Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.

  10. Volcano Monitoring: A Case Study in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

    Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

  11. An Adaptive Sensor Mining Framework for Pervasive Computing Applications

    NASA Astrophysics Data System (ADS)

    Rashidi, Parisa; Cook, Diane J.

    Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

  12. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  13. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  14. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  15. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  16. Pervasive healthcare as a scientific discipline.

    PubMed

    Bardram, J E

    2008-01-01

    The OECD countries are facing a set of core challenges; an increasing elderly population; increasing number of chronic and lifestyle-related diseases; expanding scope of what medicine can do; and increasing lack of medical professionals. Pervasive healthcare asks how pervasive computing technology can be designed to meet these challenges. The objective of this paper is to discuss 'pervasive healthcare' as a research field and tries to establish how novel and distinct it is, compared to related work within biomedical engineering, medical informatics, and ubiquitous computing. The paper presents the research questions, approach, technologies, and methods of pervasive healthcare and discusses these in comparison to those of other related scientific disciplines. A set of central research themes are presented; monitoring and body sensor networks; pervasive assistive technologies; pervasive computing for hospitals; and preventive and persuasive technologies. Two projects illustrate the kind of research being done in pervasive healthcare. The first project is targeted at home-based monitoring of hypertension; the second project is designing context-aware technologies for hospitals. Both projects approach the healthcare challenges in a new way, apply a new type of research method, and come up with new kinds of technological solutions. 'Clinical proof-of-concept' is recommended as a new method for pervasive healthcare research; the method helps design and test pervasive healthcare technologies, and in ascertaining their clinical potential before large-scale clinical tests are needed. The paper concludes that pervasive healthcare as a research field and agenda is novel; it is addressing new emerging research questions, represents a novel approach, designs new types of technologies, and applies a new kind of research method.

  17. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    PubMed

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  18. IEEE International Symposium on Biomedical Imaging.

    PubMed

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  19. Wearable Notification via Dissemination Service in a Pervasive Computing Environment

    DTIC Science & Technology

    2015-09-01

    context, state, and environment in a manner that would be transparent to a Soldier’s common operations. 15. SUBJECT TERMS pervasive computing, Android ...of user context shifts, i.e., changes in the user’s position, history , workflow, or resource interests. If the PCE is described as a 2-component...convenient viewing on the Glass’s screen just above the line of sight. All of the software developed uses Google’s Android open-source software stack

  20. Distributed Pervasive Worlds: The Case of Exergames

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Sedano, Carolina Islas

    2015-01-01

    Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…

  1. Studying the Elusive Experience in Pervasive Games

    ERIC Educational Resources Information Center

    Stenros, Jaakko; Waern, Annika; Montola, Markus

    2012-01-01

    Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

  2. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Basso, T.; DeBlasio, R.

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  3. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less

  4. Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics

    ScienceCinema

    Arnold, Jeffrey

    2018-05-14

    Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided. About the speaker: Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

  5. Developing Online Learning Resources: Big Data, Social Networks, and Cloud Computing to Support Pervasive Knowledge

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2016-01-01

    Utilizing online learning resources (OLR) from multi channels in learning activities promise extended benefits from traditional based learning-centred to a collaborative based learning-centred that emphasises pervasive learning anywhere and anytime. While compiling big data, cloud computing, and semantic web into OLR offer a broader spectrum of…

  6. The impact of the pervasive information age on healthcare organizations.

    PubMed

    Landry, Brett J L; Mahesh, Sathi; Hartman, Sandra J

    2005-01-01

    New information technologies place data on integrated information systems, and provide access via pervasive computing technologies. Pervasive computing puts computing power in the hands of all employees, available wherever it is needed. Integrated systems offer seamless data and process integration over diverse information systems. In this paper we look at the impact of these technologies on healthcare organizations in the future.

  7. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services

    NASA Astrophysics Data System (ADS)

    Soppera, A.; Burbridge, T.

    During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

  8. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  9. New IEEE standard enables data collection for medical applications.

    PubMed

    Kennelly, R J; Wittenber, J

    1994-01-01

    The IEEE has gone to ballot on a "Standard for Medical Device Communications", IEEE P1073. The lower layer, hardware portions of the standard are expected to be approved by the IEEE Standards Board at their December 11-13, 1994 meeting. Other portions of the standard are in the initial stages of the IEEE ballot process. The intent of the standard is to allow hospitals and other users to interface medical electronic devices to host computer systems in a standard, interchangeable manner. The standard is optimized for acute care environments such as ICU's, operating rooms, and emergency rooms. [1] IEEE General Committee and Subcommittee work has been on-going since 1984. Significant amounts of work have been done to discover and meet the needs of the patient care setting. Surveys performed in 1989 identified the following four key user requirements for medical device communications: 1) Frequent reconfiguration of the network. 2) Allow "plug and play" operation by users. 3) Associate devices with a specific bed and patient. 4) Support a wide range of hospital computer system topologies. Additionally, the most critical difference in the acute care setting is patient safety, which has an overall effect on the standard. The standard that went to ballot meets these requirements. The standard is based on existing ISO standards. P1073 is compliant with the OSI seven layer model. P1073 specifies the entire communication stack, from object-oriented software to hospital unique connectors. The standard will be able to be put forward as a true international standard, much in the way that the IEEE 802.x family of standards (like Ethernet) were presented as draft ISO standards.(ABSTRACT TRUNCATED AT 250 WORDS)

  10. Smart Classroom: Bringing Pervasive Computing into Distance Learning

    NASA Astrophysics Data System (ADS)

    Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

    In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

  11. Personal pervasive environments: practice and experience.

    PubMed

    Ballesteros, Francisco J; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them.

  12. Personal Pervasive Environments: Practice and Experience

    PubMed Central

    Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

    2012-01-01

    In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

  13. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    NASA Astrophysics Data System (ADS)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and

  14. A conceptual framework and principles for trusted pervasive health.

    PubMed

    Ruotsalainen, Pekka Sakari; Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-04-06

    Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept-pervasive health-which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and policies which can make pervasive health trustworthy. In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or

  15. A Conceptual Framework and Principles for Trusted Pervasive Health

    PubMed Central

    Blobel, Bernd Gerhard; Seppälä, Antto Veikko; Sorvari, Hannu Olavi; Nykänen, Pirkko Anneli

    2012-01-01

    Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that

  16. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  17. Pervasive healthcare: paving the way for a pervasive, user-centered and preventive healthcare model.

    PubMed

    Arnrich, B; Mayora, O; Bardram, J; Tröster, G

    2010-01-01

    The aging of the population creates pressure on the healthcare systems in various ways. A massive increase of chronic disease conditions and age-related illness are predicted as the dominant forces driving the future health care. The objective of this paper is to present future research demands in pervasive healthcare with the goal to meet the healthcare challenges by paving the way for a pervasive, user-centered and preventive healthcare model. This paper presents recent methodological approaches and proposes future research topics in three areas: i) pervasive, continuous and reliable long-term monitoring systems; ii) prevention through pervasive technology as a key element to maintain lifelong wellness; and iii) design and evaluation methods for ubiquitous, patient-centric technologies. Pervasive technology has been identified as a strong asset for achieving the vision of user-centered preventive healthcare. In order to make this vision a reality, new strategies for design, development and evaluation of technology have to find a common denominator and consequently interoperate. Moreover, the potential of pervasive healthcare technologies offers new opportunities beyond traditional disease treatment and may play a major role in prevention, e.g. motivate healthy behavior and disease prevention throughout all stages of life. In this sense, open challenges in future research have to be addressed such as the variability of health indicators between individuals and the manner in which relevant health indicators are provided to the users in order to maximize their motivation to mitigate or prevent unhealthy behaviors. Additionally, collecting evidence that pervasive technology improves health is seen as one of the toughest challenges. Promising approaches are recently introduced, such as "clinical proof-of-concept" and balanced observational studies. The paper concludes that pervasive healthcare will enable a paradigm shift from the established centralized healthcare

  18. Pervasive sensing

    NASA Astrophysics Data System (ADS)

    Nagel, David J.

    2000-11-01

    The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

  19. An IEEE 1451.1 Architecture for ISHM Applications

    NASA Technical Reports Server (NTRS)

    Morris, Jon A.; Turowski, Mark; Schmalzel, John L.; Figueroa, Jorge F.

    2007-01-01

    converted engineering units) and health statistics produced by each intelligent element. The handling of configuration, calibration and health information is automated by using the TEDS in combination with other electronic data sheets extensions to convey health parameters. By integrating the IEEE 1451.1 Standard for a Smart Transducer Interface with ISHM technologies, each element within a complex system becomes a highly flexible computation engine capable of self-validation and performing other measures of the quality of information it is producing.

  20. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    PubMed Central

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  1. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    PubMed

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  2. Pervasive Computing Goes to School

    ERIC Educational Resources Information Center

    Plymale, William O.

    2005-01-01

    In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

  3. Pervasive Knowledge, Social Networks, and Cloud Computing: E-Learning 2.0

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2015-01-01

    Embedding Web 2.0 in learning processes has extended learning from traditional based learning-centred to a collaborative based learning-centred institution that emphasises learning anywhere and anytime. While deploying Semantic Web into e-learning offers a broader spectrum of pervasive knowledge acquisition to enrich users' experience in learning.…

  4. Parametric Study of Beta-Endpoint Energy in Direct Energy Converters

    DTIC Science & Technology

    2007-01-01

    Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A

  5. Towards a flexible middleware for context-aware pervasive and wearable systems.

    PubMed

    Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni

    2012-11-01

    Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing.

  6. Pervasive transcription: detecting functional RNAs in bacteria.

    PubMed

    Lybecker, Meghan; Bilusic, Ivana; Raghavan, Rahul

    2014-01-01

    Pervasive, or genome-wide, transcription has been reported in all domains of life. In bacteria, most pervasive transcription occurs antisense to protein-coding transcripts, although recently a new class of pervasive RNAs was identified that originates from within annotated genes. Initially considered to be non-functional transcriptional noise, pervasive transcription is increasingly being recognized as important in regulating gene expression. The function of pervasive transcription is an extensively debated question in the field of transcriptomics and regulatory RNA biology. Here, we highlight the most recent contributions addressing the purpose of pervasive transcription in bacteria and discuss their implications.

  7. Behavioral Reference Model for Pervasive Healthcare Systems.

    PubMed

    Tahmasbi, Arezoo; Adabi, Sahar; Rezaee, Ali

    2016-12-01

    The emergence of mobile healthcare systems is an important outcome of application of pervasive computing concepts for medical care purposes. These systems provide the facilities and infrastructure required for automatic and ubiquitous sharing of medical information. Healthcare systems have a dynamic structure and configuration, therefore having an architecture is essential for future development of these systems. The need for increased response rate, problem limited storage, accelerated processing and etc. the tendency toward creating a new generation of healthcare system architecture highlight the need for further focus on cloud-based solutions for transfer data and data processing challenges. Integrity and reliability of healthcare systems are of critical importance, as even the slightest error may put the patients' lives in danger; therefore acquiring a behavioral model for these systems and developing the tools required to model their behaviors are of significant importance. The high-level designs may contain some flaws, therefor the system must be fully examined for different scenarios and conditions. This paper presents a software architecture for development of healthcare systems based on pervasive computing concepts, and then models the behavior of described system. A set of solutions are then proposed to improve the design's qualitative characteristics including, availability, interoperability and performance.

  8. Defining the IEEE-854 floating-point standard in PVS

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.

    1995-01-01

    A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, the definition of IEEE-854 in PVS also formally defines much of IEEE-754. This collection of PVS theories provides a basis for machine checked verification of floating-point systems. This formal definition illustrates that formal specification techniques are sufficiently advanced that is is reasonable to consider their use in the development of future standards.

  9. Performance of the Sleep-Mode Mechanism of the New IEEE 802.16m Proposal for Correlated Downlink Traffic

    NASA Astrophysics Data System (ADS)

    de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig

    There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.

  10. Pervasive Computing Technologies to Continuously Assess Alzheimer's Disease Progression and Intervention Efficacy.

    PubMed

    Lyons, Bayard E; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals' health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients' and caregivers' ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies.

  11. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology

    PubMed Central

    Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

  12. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.

    PubMed

    Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system.

  13. Applying mobile and pervasive computer technology to enhance coordination of work in a surgical ward.

    PubMed

    Hansen, Thomas Riisgaard; Bardram, Jakob E

    2007-01-01

    Collaboration, coordination, and communication are crucial in maintaining an efficient and smooth flow of work in an operating ward. This coordination, however, often comes at a high price in terms of unsuccessfully trying to get hold of people, disturbing telephone calls, looking for people, and unnecessary stress. To accommodate this situation and to increase the quality of work in operating wards, we have designed a set of pervasive computer systems which supports what we call context-mediated communication and awareness. These systems use large interactive displays, video streaming from key locations, tracking systems, and mobile devices to support social awareness and different types of communication modalities relevant to the current context. In this paper we report qualitative data from a one-year deployment of the system in a local hospital. Overall, this study shows that 75% of the participants strongly agreed that these systems had made their work easier.

  14. Pervasive Computing Technologies to Continuously Assess Alzheimer’s Disease Progression and Intervention Efficacy

    PubMed Central

    Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8 years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  15. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    NASA Astrophysics Data System (ADS)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  16. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  18. IEEE Standards activities: A year in review. Annual activities report 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-09-01

    For IEEE Standards and the constituency it serves, 1996 was a milestone year. It was a period that signaled the beginning of the Standards Program of the future. This program responds to worldwide standards issues and to the technical, market and competitive strategies of industrial sectors. It represents technological innovation, global participation in electrotechnology standards development and dedication to the on-going advancement and promotion of new concepts and technology. Instrumental in ensuring IEEE`s growth opportunities and leadership position in electrotechnology standards development and dissemination is IEEE membership. The value of members and their involvement in IEEE Standards is vital tomore » IEEE`s ability to continuously be the best professional association in the world. To fulfill this vision, IEEE set forth five goals -- increased globalization, career enhancement, electronic dissemination of existing products and services, organizational improvements and public responsibility. Key in the process for the achievement of these goals is to make certain that IEEE members are well informed about opportunities and benefits the present system of standardization offers, and what the future system will offer. With the member in mind, the Standards Board reviewed its strategic direction and operational structures, and its ability to deliver products and services that are needed now and, more importantly, that will be needed in the future. This Annual Activities Report provides a comprehensive picture of 1996 accomplishments and performance. It gives readers a broad picture of the Standards Board`s activities, the evolving role of IEEE Standards and the technological opportunities that the Board encourages.« less

  19. Dynamic Pervasive Storytelling in Long Lasting Learning Games

    ERIC Educational Resources Information Center

    Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond

    2015-01-01

    Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…

  20. A Formalisation of Adaptable Pervasive Flows

    NASA Astrophysics Data System (ADS)

    Bucchiarone, Antonio; Lafuente, Alberto Lluch; Marconi, Annapaola; Pistore, Marco

    Adaptable Pervasive Flows is a novel workflow-based paradigm for the design and execution of pervasive applications, where dynamic workflows situated in the real world are able to modify their execution in order to adapt to changes in their environment. In this paper, we study a formalisation of such flows by means of a formal flow language. More precisely, we define APFoL (Adaptable Pervasive Flow Language) and formalise its textual notation by encoding it in Blite, a formalisation of WS-BPEL. The encoding in Blite equips the language with a formal semantics and enables the use of automated verification techniques. We illustrate the approach with an example of a Warehouse Case Study.

  1. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    PubMed

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  2. IEEE 802.11ah: A Technology to Face the IoT Challenge

    PubMed Central

    Baños-Gonzalez, Victor; Afaqui, M. Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-01-01

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm. PMID:27879688

  3. GPUs: An Emerging Platform for General-Purpose Computation

    DTIC Science & Technology

    2007-08-01

    programming; real-time cinematic quality graphics Peak stream (26) License required (limited time no- cost evaluation program) Commercially...folding.stanford.edu (accessed 30 March 2007). 2. Fan, Z.; Qiu, F.; Kaufman, A.; Yoakum-Stover, S. GPU Cluster for High Performance Computing. ACM/IEEE...accessed 30 March 2007). 8. Goodnight, N.; Wang, R.; Humphreys, G. Computation on Programmable Graphics Hardware. IEEE Computer Graphics and

  4. Specialty Engineering Supplement to IEEE-15288.1

    DTIC Science & Technology

    2015-05-15

    receiver required to work in a dense EMI environment. (15) Any RF receiver with a burnout level of less than 30 dBm (1 mW). b. A summary of all...Context 2.1 ISO-IEC-IEEE-15288: 2015, Systems and Software Engineering — System life cycle processes ISO-IEC-IEEE 15288 is the DOD-adopted standard for...to ISO-15288 for application of systems engineering on defense programs that was developed by a joint services working group under the auspices of the

  5. Reliability Evaluation of Computer Systems.

    DTIC Science & Technology

    1981-01-01

    algorithms in hardware is not restricted by the designs of particular circuits. Applications could be made in new computer architectures; one candidate...pp. 137-148, IEEE, Chicago, Illinois, September 1963. (With J.F. Wakerly ) "Design of Low-Cost General-Purpose Self- Diagnosing Computers," Proc...34 Proc., IEEE Int’l Solid-State Circuits Conference, Philadelphia, Pennsylvania, February 16-18, 1977. (With J.F. Wakerly ) "Microcomputers in the

  6. Implementing ISO/IEEE 11073: proposal of two different strategic approaches.

    PubMed

    Martínez-Espronceda, M; Serrano, L; Martínez, I; Escayola, J; Led, S; Trigo, J; García, J

    2008-01-01

    This paper explains the challenges encountered during the ISO/IEEE 11073 standard implementation process. The complexity of the standard and the consequent heavy requirements, which have not encouraged software engineers to adopt the standard. The developing complexity evaluation drives us to propose two possible implementation strategies that cover almost all possible use cases and eases handling the standard by non-expert users. The first one is focused on medical devices (MD) and proposes a low-memory and low-processor usage technique. It is based on message patterns that allow simple functions to generate ISO/IEEE 11073 messages and to process them easily. In this way a framework for MDs can be obtained. Second one is focused on more powerful machines such as data loggers or gateways (aka. computer engines (CE)), which do not have the MDs' memory and processor usage constraints. For CEs a more intelligent and adaptative Plug&Play (P&P) solution is provided. It consists on a general platform that can access to any device supported by the standard. Combining both strategies will cut developing time for applications based on ISO/EEE 11073.

  7. From Operating-System Correctness to Pervasively Verified Applications

    NASA Astrophysics Data System (ADS)

    Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike

    Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.

  8. On Designing a Pervasive Mobile Learning Platform

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

    2010-01-01

    This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a…

  9. IEEE 342 Node Low Voltage Networked Test System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schneider, Kevin P.; Phanivong, Phillippe K.; Lacroix, Jean-Sebastian

    The IEEE Distribution Test Feeders provide a benchmark for new algorithms to the distribution analyses community. The low voltage network test feeder represents a moderate size urban system that is unbalanced and highly networked. This is the first distribution test feeder developed by the IEEE that contains unbalanced networked components. The 342 node Low Voltage Networked Test System includes many elements that may be found in a networked system: multiple 13.2kV primary feeders, network protectors, a 120/208V grid network, and multiple 277/480V spot networks. This paper presents a brief review of the history of low voltage networks and how theymore » evolved into the modern systems. This paper will then present a description of the 342 Node IEEE Low Voltage Network Test System and power flow results.« less

  10. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated area...

  11. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    PubMed

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  12. Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    McMorris, Carly A.; Perry, Adrienne

    2015-01-01

    The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…

  13. IEEE Conference Publications in Libraries.

    ERIC Educational Resources Information Center

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  14. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that: (1...

  15. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the...

  16. Pervasive Sensing: Addressing the Heterogeneity Problem

    NASA Astrophysics Data System (ADS)

    O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.

    2013-06-01

    Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

  17. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    PubMed Central

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  18. Designing Robust and Resilient Tactical MANETs

    DTIC Science & Technology

    2014-09-25

    Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012

  19. The Pervasiveness and Impact of Electronic Communication Technologies in Organizations: A Survey of Major American Corporations.

    ERIC Educational Resources Information Center

    Hellweg, Susan A.; And Others

    A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the…

  20. Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors

    ERIC Educational Resources Information Center

    Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

    2007-01-01

    Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

  1. The MADE Reference Information Model for Interoperable Pervasive Telemedicine Systems.

    PubMed

    Fung, Nick L S; Jones, Valerie M; Hermens, Hermie J

    2017-03-23

    The main objective is to develop and validate a reference information model (RIM) to support semantic interoperability of pervasive telemedicine systems. The RIM is one component within a larger, computer-interpretable "MADE language" developed by the authors in the context of the MobiGuide project. To validate our RIM, we applied it to a clinical guideline for patients with gestational diabetes mellitus (GDM). The RIM is derived from a generic data flow model of disease management which comprises a network of four types of concurrent processes: Monitoring (M), Analysis (A), Decision (D) and Effectuation (E). This resulting MADE RIM, which was specified using the formal Vienna Development Method (VDM), includes six main, high-level data types representing measurements, observations, abstractions, action plans, action instructions and control instructions. The authors applied the MADE RIM to the complete GDM guideline and derived from it a domain information model (DIM) comprising 61 archetypes, specifically 1 measurement, 8 observation, 10 abstraction, 18 action plan, 3 action instruction and 21 control instruction archetypes. It was observed that there are six generic patterns for transforming different guideline elements into MADE archetypes, although a direct mapping does not exist in some cases. Most notable examples are notifications to the patient and/or clinician as well as decision conditions which pertain to specific stages in the therapy. The results provide evidence that the MADE RIM is suitable for modelling clinical data in the design of pervasive telemedicine systems. Together with the other components of the MADE language, the MADE RIM supports development of pervasive telemedicine systems that are interoperable and independent of particular clinical applications.

  2. DoS detection in IEEE 802.11 with the presence of hidden nodes

    PubMed Central

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2013-01-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510

  3. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    PubMed

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  4. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    PubMed

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  5. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality.

    PubMed

    Grubert, Jens; Langlotz, Tobias; Zollmann, Stefanie; Regenbrecht, Holger

    2017-06-01

    Augmented Reality is a technique that enables users to interact with their physical environment through the overlay of digital information. While being researched for decades, more recently, Augmented Reality moved out of the research labs and into the field. While most of the applications are used sporadically and for one particular task only, current and future scenarios will provide a continuous and multi-purpose user experience. Therefore, in this paper, we present the concept of Pervasive Augmented Reality, aiming to provide such an experience by sensing the user's current context and adapting the AR system based on the changing requirements and constraints. We present a taxonomy for Pervasive Augmented Reality and context-aware Augmented Reality, which classifies context sources and context targets relevant for implementing such a context-aware, continuous Augmented Reality experience. We further summarize existing approaches that contribute towards Pervasive Augmented Reality. Based our taxonomy and survey, we identify challenges for future research directions in Pervasive Augmented Reality.

  6. Deployment of Directory Service for IEEE N Bus Test System Information

    NASA Astrophysics Data System (ADS)

    Barman, Amal; Sil, Jaya

    2008-10-01

    Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.

  7. 77 FR 50726 - Software Requirement Specifications for Digital Computer Software and Complex Electronics Used in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... Computer Software and Complex Electronics Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear...-1209, ``Software Requirement Specifications for Digital Computer Software and Complex Electronics used... Electronics Engineers (ANSI/IEEE) Standard 830-1998, ``IEEE Recommended Practice for Software Requirements...

  8. Using Instructional Pervasive Game for School Children's Cultural Learning

    ERIC Educational Resources Information Center

    Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun

    2014-01-01

    In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and…

  9. Validating the Test Procedures Described in UL 1741 SA and IEEE P1547.1: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mahmud, Rasel; Hoke, Anderson F; Narang, David J

    This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of key the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1. This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of keymore » the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1.« less

  10. IEEE 1451.2 based Smart sensor system using ADuc847

    NASA Astrophysics Data System (ADS)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  11. IEEE Conference on Software Engineering Education and Training (CSEE&T 2012) Proceedings (25th, Nanjing, Jiangsu, China, April 17-19, 2012)

    ERIC Educational Resources Information Center

    IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012

    2012-01-01

    The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as…

  12. The IEEE Software Engineering Standards Process

    PubMed Central

    Buckley, Fletcher J.

    1984-01-01

    Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.

  13. An NTP Stratum-One Server Farm Fed By IEEE-1588

    DTIC Science & Technology

    2010-01-01

    Serial Time Code Formats,” U.S. Army White Sands Missile Range, N.M. [11] J. Eidson , 2005, “IEEE-1588 Standard for a Precision Clock Synchronization ... synchronized to its Master Clocks via IRIG-B time code on a low- frequency RF distribution system. The availability of Precise Time Protocol (PTP, IEEE...forwarding back to the requestor. The farm NTP servers are synchronized to the USNO Master Clocks using IRIG-B time code. The current standard NTP

  14. Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs

    PubMed Central

    Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

    2014-01-01

    ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi’s sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely “noise” generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256

  15. IEEE 802.16J-Relay Fortified Aeromacs Networks; Benefits and Challenges

    NASA Technical Reports Server (NTRS)

    Kamali, Behnam; Apaza, Rafael D.

    2014-01-01

    Aeronautical Mobile Airport Communications System (AeroMACS) is an IEEE 802.16 standard-based (WiMAX) broadband aviation transmission technology, developed to provide safety critical communications coverage for airport surface in support of fixed and mobile ground to ground applications and services. We have previously demonstrated that IEEE 802.16j-amendment-based WiMAX is most feasible for AeroMACS applications. The principal argument in favor of application of IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified WiMAX networks, with virtually no increase in the power requirements. In this article, following introductory remarks on airport surface communications, WiMAX and AeroMACS; the IEEE 802.16j-based WiMAX technology and multihop relay systems are briefly described. The two modes of relay operation supported by IEEE 802.16j amendment; i.e., transparent (TRS) and non-transparent (NTRS) modes, are discussed in some detail. Advantages and disadvantages of using TRS and NTRS in AeroMACS networks are summarized in a table. Practical issues vis--vis the inclusion of relays in AeroMACS networks are addressed. It is argued that the selection of relay type may affect a number of network parameters. A discussion on specific benefits and challenges of inclusion of relays in AeroMACS networks is provided. The article concludes that in case it is desired or necessary to exclusively employ one type of relay mode for all applications throughout an AeroMACS network, the proper selection would be the non-transparent mode.

  16. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  17. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  18. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  19. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a..., levels of public assistance, numbers of persons or families in poverty or similar data. (b) Unemployment...

  20. Framework model and principles for trusted information sharing in pervasive health.

    PubMed

    Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu

    2011-01-01

    Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.

  1. Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination

    ERIC Educational Resources Information Center

    Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon

    2004-01-01

    Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned…

  2. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.

    PubMed

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.

  3. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  4. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  5. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    NASA Technical Reports Server (NTRS)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  6. Intestinal cytokines in children with pervasive developmental disorders.

    PubMed

    DeFelice, Magee L; Ruchelli, Eduardo D; Markowitz, Jonathan E; Strogatz, Melissa; Reddy, Krishna P; Kadivar, Khadijeh; Mulberg, Andrew E; Brown, Kurt A

    2003-08-01

    A relationship between autism and gastrointestinal (GI) immune dysregulation has been postulated based on incidence of GI complaints as well as macroscopically observed lymphonodular hyperplasia and microscopically determined enterocolitis in pediatric patients with autism. To evaluate GI immunity, we quantitatively assessed levels of proinflammatory cytokines, interleukin (IL)-6, IL-8, and IL-1beta, produced by intestinal biopsies of children with pervasive developmental disorders. Fifteen patients, six with pervasive developmental disorders and nine age-matched controls, presenting for diagnostic colonoscopy were enrolled. Endoscopic biopsies were organ cultured, supernatants were harvested, and IL-6, IL-8, and IL-1beta levels were quantified by ELISA. Tissue histology was evaluated by blinded pathologists. Concentrations of IL-6 from intestinal organ culture supernatants of patients with pervasive developmental disorders (median 318.5 pg/ml, interquartile range 282.0-393.0 pg/ml) when compared with controls (median 436.9 pg/ml, interquartile range 312.6-602.5 pg/ml) were not significantly different (p = 0.0987). Concentrations of IL-8 (median 84,000 pg/ml, interquartile range 16,000-143,000 pg/ml) when compared with controls (median 177,000 pg/ml, interquartile range 114,000-244,000 pg/ml) were not significantly different (p = 0.0707). Concentrations of IL-1beta (median 0.0 pg/ml, interquartile range 0.0-94.7 pg/ml) when compared with controls (median 0.0 pg/ml, interquartile range 0.0-60.2 pg/ml) were not significantly different (p = 0.8826). Tissue histology was nonpathological for all patients. We have demonstrated no significant difference in production of IL-6, IL-8, and IL-1beta between patients with pervasive developmental disorders and age-matched controls. In general, intestinal levels of IL-6 and IL-8 were lower in patients with pervasive developmental disorders than in age-matched controls. These data fail to support an association between autism and

  7. Pervasive Muslim-Hindu fertility differences in India.

    PubMed

    Dharmalingam, A; Morgan, S Philip

    2004-08-01

    Using the 1993 Indian Family and Health Survey, we examined Muslim-Hindu differences in (1) the parity-specific intent to have another child and (2) given a stated intent for no more children, reports of the current use of contraceptives. We found that Muslims are much more likely than Hindus to intend to have additional children and, among those who do not want more children, Muslims are much less likely than Hindus to use contraceptives. These findings are robust to model specification and pervasive across the states of India. This national study provides the context within which local studies should be enmeshed and begs for general (as opposed to place-specific) explanations for these pervasive differences.

  8. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    DTIC Science & Technology

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  9. Ethical Responsibility Key to Computer Security.

    ERIC Educational Resources Information Center

    Lynn, M. Stuart

    1989-01-01

    The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

  10. Pervasive Developmental Disorders: Distinguishing among Subtypes.

    ERIC Educational Resources Information Center

    Harris, Sandra L.; Glasberg, Beth; Ricca, Donna

    1996-01-01

    Describes pervasive developmental disorders (PPDs), which are severe conditions that begin in early life and influence multiple areas of development. Conditions include autistic disorders, Asperger's disorder, Rett's disorder, childhood disintegrative disorder, and PPDs "not otherwise specified." Intensive behavioral intervention at an early age…

  11. Pervasive Learning--Using Games to Tear down the Classroom Walls

    ERIC Educational Resources Information Center

    Pløhn, Trygve

    2014-01-01

    Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where the…

  12. Verification of IEEE Compliant Subtractive Division Algorithms

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.; Leathrum, James F., Jr.

    1996-01-01

    A parameterized definition of subtractive floating point division algorithms is presented and verified using PVS. The general algorithm is proven to satisfy a formal definition of an IEEE standard for floating point arithmetic. The utility of the general specification is illustrated using a number of different instances of the general algorithm.

  13. Autism Spectrum Disorders (Pervasive Developmental Disorders)

    ERIC Educational Resources Information Center

    Strock, Margaret

    2007-01-01

    This booklet focuses on classic autism, pervasive developmental disorder not otherwise specified (PDD-NOS), and Asperger syndrome, with brief descriptions of Rett syndrome and childhood disintegrative disorder. The booklet describes possible indicators of autism spectrum disorders (ASD), their diagnosis, available aids, treatment options, adults…

  14. From black box to toolbox: Outlining device functionality, engagement activities, and the pervasive information architecture of mHealth interventions.

    PubMed

    Danaher, Brian G; Brendryen, Håvar; Seeley, John R; Tyler, Milagra S; Woolley, Tim

    2015-03-01

    mHealth interventions that deliver content via mobile phones represent a burgeoning area of health behavior change. The current paper examines two themes that can inform the underlying design of mHealth interventions: (1) mobile device functionality, which represents the technological toolbox available to intervention developers; and (2) the pervasive information architecture of mHealth interventions, which determines how intervention content can be delivered concurrently using mobile phones, personal computers, and other devices. We posit that developers of mHealth interventions will be better able to achieve the promise of this burgeoning arena by leveraging the toolbox and functionality of mobile devices in order to engage participants and encourage meaningful behavior change within the context of a carefully designed pervasive information architecture.

  15. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solarmore » data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.« less

  16. Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network

    NASA Technical Reports Server (NTRS)

    Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.; hide

    2008-01-01

    Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).

  17. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    PubMed

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  18. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    NASA Astrophysics Data System (ADS)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  19. A Survey of Parallel Computing

    DTIC Science & Technology

    1988-07-01

    Evaluating Two Massively Parallel Machines. Communications of the ACM .9, , , 176 BIBLIOGRAPHY 29, 8 (August), pp. 752-758. Gajski , D.D., Padua, D.A., Kuck...Computer Architecture, edited by Gajski , D. D., Milutinovic, V. M. Siegel, H. J. and Furht, B. P. IEEE Computer Society Press, Washington, D.C., pp. 387-407

  20. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Kwan-Liu

    Most of today’s visualization libraries and applications are based off of what is known today as the visualization pipeline. In the visualization pipeline model, algorithms are encapsulated as “filtering” components with inputs and outputs. These components can be combined by connecting the outputs of one filter to the inputs of another filter. The visualization pipeline model is popular because it provides a convenient abstraction that allows users to combine algorithms in powerful ways. Unfortunately, the visualization pipeline cannot run effectively on exascale computers. Experts agree that the exascale machine will comprise processors that contain many cores. Furthermore, physical limitations willmore » prevent data movement in and out of the chip (that is, between main memory and the processing cores) from keeping pace with improvements in overall compute performance. To use these processors to their fullest capability, it is essential to carefully consider memory access. This is where the visualization pipeline fails. Each filtering component in the visualization library is expected to take a data set in its entirety, perform some computation across all of the elements, and output the complete results. The process of iterating over all elements must be repeated in each filter, which is one of the worst possible ways to traverse memory when trying to maximize the number of executions per memory access. This project investigates a new type of visualization framework that exhibits a pervasive parallelism necessary to run on exascale machines. Our framework achieves this by defining algorithms in terms of functors, which are localized, stateless operations. Functors can be composited in much the same way as filters in the visualization pipeline. But, functors’ design allows them to be concurrently running on massive amounts of lightweight threads. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be

  1. "What Are You Viewing?" Exploring the Pervasive Social TV Experience

    NASA Astrophysics Data System (ADS)

    Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas

    The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

  2. From computers to ubiquitous computing by 2010: health care.

    PubMed

    Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

    2008-10-28

    Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.

  3. Health-enabling technologies for pervasive health care: on services and ICT architecture paradigms.

    PubMed

    Haux, Reinhold; Howe, Jurgen; Marschollek, Michael; Plischke, Maik; Wolf, Klaus-Hendrik

    2008-06-01

    Progress in information and communication technologies (ICT) is providing new opportunities for pervasive health care services in aging societies. To identify starting points of health-enabling technologies for pervasive health care. To describe typical services of and contemporary ICT architecture paradigms for pervasive health care. Summarizing outcomes of literature analyses and results from own research projects in this field. Basic functions for pervasive health care with respect to home care comprise emergency detection and alarm, disease management, as well as health status feedback and advice. These functions are complemented by optional (non-health care) functions. Four major paradigms for contemporary ICT architectures are person-centered ICT architectures, home-centered ICT architectures, telehealth service-centered ICT architectures and health care institution-centered ICT architectures. Health-enabling technologies may lead to both new ways of living and new ways of health care. Both ways are interwoven. This has to be considered for appropriate ICT architectures of sensor-enhanced health information systems. IMIA, the International Medical Informatics Association, may be an appropriate forum for interdisciplinary research exchange on health-enabling technologies for pervasive health care.

  4. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  5. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  6. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  7. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., unemployment and general distress. 597.102 Section 597.102 Housing and Urban Development Regulations Relating..., unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by the... component areas of an affluent character. (b) Unemployment. Unemployment shall be demonstrated by: (1) Data...

  8. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    PubMed

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  9. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks

    PubMed Central

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-01-01

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method. PMID:27271626

  10. Consideration of IP Telephony Quality on the IEEE802.11a Wireless LAN

    NASA Astrophysics Data System (ADS)

    Miyashita, Michifumi; Takamatsu, Hideyuki; Kurono, Masahiro

    Recently, IP telephony services in wired network are started, and paid attention for its charge-free nature due to IP technology. On the other hand, the Hot-Spot service, which provides one to access the Internet at the public space such as cafe, using the IEEE wireless LAN has been evolved, and it is expected that the IP telephony service on the Hot-Spot network will be developed. However, the IP telephony quality on the IEEE802.11a wireless LAN has not been fully studied yet. In this paper, we discuss about the quality of IP telephony service on the IEEE802.11a wireless LAN from the aspect of R-value, and show ability to improve the IP telephony quality on the Hot-Spot network employing PLC function defined in the ITU-T Recommendation G.711 Appendix I.

  11. A Longitudinal Investigation of the Effects of Computer Anxiety on Performance in a Computing-Intensive Environment

    ERIC Educational Resources Information Center

    Buche, Mari W.; Davis, Larry R.; Vician, Chelley

    2007-01-01

    Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer…

  12. Pervasive access to MRI bias artifact suppression service on a grid.

    PubMed

    Ardizzone, Edoardo; Gambino, Orazio; Genco, Alessandro; Pirrone, Roberto; Sorce, Salvatore

    2009-01-01

    Bias artifact corrupts MRIs in such a way that the image is afflicted by illumination variations. Some of the authors proposed the exponential entropy-driven homomorphic unsharp masking ( E(2)D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the MRI modality. Moreover, E(2)D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In this paper, we propose to make such algorithm available as a service on a grid infrastructure, so that people can use it almost from everywhere, in a pervasive fashion, by means of a suitable user interface running on smartphones. The proposed solution allows physicians to use the E(2)D-HUM algorithm (or any other kind of algorithm, given that it is available as a service on the grid), being it remotely executed somewhere in the grid, and the results are sent back to the user's device. This way, physicians do not need to be aware of how to use Matlab to process their images. The pervasive service provision for medical image enhancement is presented, along with some experimental results obtained using smartphones connected to an existing Globus-based grid infrastructure.

  13. Algorithm XXX : functions to support the IEEE standard for binary floating-point arithmetic.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cody, W. J.; Mathematics and Computer Science

    1993-12-01

    This paper describes C programs for the support functions copysign(x,y), logb(x), scalb(x,n), nextafter(x,y), finite(x), and isnan(x) recommended in the Appendix to the IEEE Standard for Binary Floating-Point Arithmetic. In the case of logb, the modified definition given in the later IEEE Standard for Radix-Independent Floating-Point Arithmetic is followed. These programs should run without modification on most systems conforming to the binary standard.

  14. The RISC (Reduced Instruction Set Computer) Architecture and Computer Performance Evaluation.

    DTIC Science & Technology

    1986-03-01

    time where the main emphasis of the evaluation process is put on the software . The model is intended to provide a tool for computer architects to use...program, or 3) Was to be implemented in random logic more effec- tively than the equivalent sequence of software instructions. Both data and address...definition is the IEEE standard 729-1983 stating Computer Architecture as: " The process of defining a collection of hardware and software components and

  15. 78 FR 47014 - Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION... Computer Software Used in Safety Systems of Nuclear Power Plants.'' This RG endorses, with clarifications... Electrical and Electronic Engineers (IEEE) Standard 828-2005, ``IEEE Standard for Software Configuration...

  16. ICT and the future of healthcare: Aspects of pervasive health monitoring.

    PubMed

    Haluza, Daniela; Jungwirth, David

    2018-01-01

    Along with the digital revolution, information and communication technology applications are currently transforming the delivery of health and social care services. This paper investigates prevailing opinions toward future technology-based healthcare solutions among Austrian healthcare professionals. During a biphasic online Delphi survey, panelists rated expected outcomes of two future scenarios describing pervasive health monitoring applications. Experts perceived that the scenarios were highly innovative, but only moderately desirable, and that their implementation could especially improve patients' knowledge, quality of healthcare, and living standard. Contrarily, monetary aspects, technical prerequisites, and data security were identified as key obstacles. We further compared the impact of professional affiliation. Clearly, opinions toward pervasive healthcare differed between the interest groups, medical professionals, patient advocates, and administrative personnel. These data suggest closer collaborations between stakeholder groups to harmonize differences in expectations regarding pervasive health monitoring.

  17. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    NASA Astrophysics Data System (ADS)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  18. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Basso, T.

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series ofmore » standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.« less

  19. Creating a New Model Curriculum: A Rationale for "Computing Curricula 1990".

    ERIC Educational Resources Information Center

    Bruce, Kim B.

    1991-01-01

    Describes a model for the design of undergraduate curricula in the discipline of computing that was developed by the ACM/IEEE (Association for Computing Machinery/Institute of Electrical and Electronics Engineers) Computer Society Joint Curriculum Task Force. Institutional settings and structures in which computing degrees are awarded are…

  20. Mobile Autonomous Sensing Unit (MASU): A Framework That Supports Distributed Pervasive Data Sensing

    PubMed Central

    Medina, Esunly; Lopez, David; Meseguer, Roc; Ochoa, Sergio F.; Royo, Dolors; Santos, Rodrigo

    2016-01-01

    Pervasive data sensing is a major issue that transverses various research areas and application domains. It allows identifying people’s behaviour and patterns without overwhelming the monitored persons. Although there are many pervasive data sensing applications, they are typically focused on addressing specific problems in a single application domain, making them difficult to generalize or reuse. On the other hand, the platforms for supporting pervasive data sensing impose restrictions to the devices and operational environments that make them unsuitable for monitoring loosely-coupled or fully distributed work. In order to help address this challenge this paper present a framework that supports distributed pervasive data sensing in a generic way. Developers can use this framework to facilitate the implementations of their applications, thus reducing complexity and effort in such an activity. The framework was evaluated using simulations and also through an empirical test, and the obtained results indicate that it is useful to support such a sensing activity in loosely-coupled or fully distributed work scenarios. PMID:27409617

  1. Computing technology in the 1980's. [computers

    NASA Technical Reports Server (NTRS)

    Stone, H. S.

    1978-01-01

    Advances in computing technology have been led by consistently improving semiconductor technology. The semiconductor industry has turned out ever faster, smaller, and less expensive devices since transistorized computers were first introduced 20 years ago. For the next decade, there appear to be new advances possible, with the rate of introduction of improved devices at least equal to the historic trends. The implication of these projections is that computers will enter new markets and will truly be pervasive in business, home, and factory as their cost diminishes and their computational power expands to new levels. The computer industry as we know it today will be greatly altered in the next decade, primarily because the raw computer system will give way to computer-based turn-key information and control systems.

  2. Eleanor McElwee and the Formation of IEEE PCS

    ERIC Educational Resources Information Center

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  3. The Computer-Job Salary Picture.

    ERIC Educational Resources Information Center

    Basta, Nicholas

    1987-01-01

    Discusses starting salaries for graduates with various degrees in computer science and electrical engineering. Summarizes the results of a recent study by the Institute of Electrical and Electronics Engineers (IEEE) which provides salary estimates for graduates in different specialties and in different geographical locations. (TW)

  4. Slovak High School Students' Attitudes toward Computers

    ERIC Educational Resources Information Center

    Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

    2011-01-01

    The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

  5. Introduction to This Special Issue on Context-Aware Computing.

    ERIC Educational Resources Information Center

    Moran, Thomas P.; Dourish, Paul

    2001-01-01

    Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

  6. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    PubMed

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  7. Organizing the History of Computing

    NASA Astrophysics Data System (ADS)

    Misa, Thomas J.

    This paper tries to distill some of the ‘lessons learned’ from the Charles Babbage Institute’s quarter-century experience (1980-present) in organizing the history of computing. It draws on the author’s (recent) experience as CBI director; conversations with Arthur Norberg, CBI’s long-time founding director; and papers delivered at a special symposium appraising CBI’s role in computing history, which appeared in the IEEE Annals of the History of Computing 29 no. 4 (October-December 2007).

  8. IEEE International Symposium Information Theory, held at Santa Monica California, February 9-12, 1981.

    DTIC Science & Technology

    1981-01-01

    Channel and study permutation codes as a special case. ,uch a code is generated by an initial vector x, a group G of orthogonal n by n matrices, and a...random-access components, is introduced and studied . Under this scheme, the network stations are divided into groups , each of which is assigned a...IEEE INFORMATION THEORY GROUP CO-SPONSORED BY: UNION RADIO SCIENTIFIQUE INTERNATIONALE IEEE Catalog Number 81 CH 1609-7 IT 𔃻. 81 ~20 04Q SECURITY

  9. Augmented notebooks for pervasive learning in medical practice.

    PubMed

    Bricon-Souf, Nathalie; Leroy, Nicolas; Renard, Jean-Marie

    2010-01-01

    Medical e-learning can benefit from the new technologies, and pervasive learning resources and tools worth to be introduced in the medical context. Micro-learning seems to be an interesting way for pervasive learning. But it is still difficult to propose pedagogical resources that are built by learners, from meaningful experiments. We conducted an analysis of the exchanges performed by Health care professionals in the hospital in order to understand where and when educational exchanges appear. We analyzed the type of documents exchanged. The residents' paper notebooks caught our attention first because it answers some clinician-needs and second because the computerization of such a notebook could add a collaborative dimension to the pedagogical resources. We propose a model of an augmented resident's notebook and we briefly describe an implementation using Content Management System and WIKI, before setting the discussion and the conclusion sections.

  10. An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4

    PubMed Central

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-01-01

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions. PMID:24658624

  11. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    PubMed

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  12. Endlessly Circulating Messages in IEEE 1588-2008 Systems

    DTIC Science & Technology

    2014-05-13

    section 13.5 of the standard. Once the timing topology is established by the BMC algo- rithm, each clock synchronizes to its master by exchanging timing ...Endlessly Circulating Messages in IEEE 1588-2008 Systems David Broman Patricia Derler Ankush Desai John Eidson Sanjit A. Seshia Electrical...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the

  13. Effects of Computer Architecture on FFT (Fast Fourier Transform) Algorithm Performance.

    DTIC Science & Technology

    1983-12-01

    Criteria for Efficient Implementation of FFT Algorithms," IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 107-109, Feb...1982. Burrus, C. S. and P. W. Eschenbacher. "An In-Place, In-Order Prime Factor FFT Algorithm," IEEE Transactions on Acoustics, Speech, and Signal... Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 217-226, Apr. 1982. Control Data Corporation. CDC Cyber 170 Computer Systems

  14. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    PubMed

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  15. A Computational Model and Multi-Agent Simulation for Information Assurance

    DTIC Science & Technology

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  16. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices

    PubMed Central

    Do, Hyoungho

    2018-01-01

    Objectives Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. Methods We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. Results ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. Conclusions ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01. PMID:29503752

  17. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices.

    PubMed

    Lee, Sungkee; Do, Hyoungho

    2018-01-01

    Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01.

  18. Pervasive Developmental Disorders. NICHCY Briefing Paper FS20.

    ERIC Educational Resources Information Center

    Tsai, Luke Y.

    This briefing paper is intended to provide basic information about the diagnosis, educational programming, and special needs of children and youth with Pervasive Developmental Disorders (PDD), a group of neurological disorders usually evident by age 3 and characterized by impairments in social interaction, imaginative activity, and verbal and…

  19. IEEE Nuclear and Space Radiation Effects Conference: Notes on the Early Conferences

    NASA Technical Reports Server (NTRS)

    Pellish, Jonathan A.; Galloway, Kenneth F.

    2013-01-01

    This paper gathers the remembrances of several key contributors who participated in the earliest Institute of Electrical and Electronics Engineers (IEEE) Nuclear and Space Radiation Effects Conferences (NSREC).

  20. A Divided Attention Experiment with Pervasively Hyperactive Children.

    ERIC Educational Resources Information Center

    van der Meere, Jaap; Sergeant, Joseph

    1987-01-01

    Task performance of 12 pervasive hyperactives and controls (ages 8-13) was studied in a divided attention reaction time experiment. Hyperactives were slower than controls, had more variable reaction times, and made more frequent errors. Task inefficiency in hyperactives could not be explained by a divided attention deficiency or impulsive…

  1. An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.

    PubMed

    Lasierra, Nelia; Alesanco, Alvaro; García, José

    2012-07-01

    This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73.

  2. An Energy-Efficient Sleep Mode in IEEE 802.15.4 by Considering Sensor Device Mobility

    NASA Astrophysics Data System (ADS)

    Kim, Jinho; Lee, Jun; Hong, Choong Seon; Lee, Sungwon

    The current version of IEEE 802.15.4 MAC protocol does not support energy-efficient mobility for the low-power device. In this paper, we propose an energy-efficient sleep mode as part of the IEEE 802.15.4 that can conserve energy by considering mobility of mobile sensor devices. The proposed energy-efficient sleep mode dynamically extends the sleep interval if there is no data to transmit from the device or receive from corresponding nodes.

  3. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    NASA Astrophysics Data System (ADS)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  4. Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes

    ERIC Educational Resources Information Center

    Thomas, Siobhan

    2006-01-01

    Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.…

  5. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  6. IEEE 1547 Standards Advancing Grid Modernization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Basso, Thomas; Chakraborty, Sudipta; Hoke, Andy

    Technology advances including development of advanced distributed energy resources (DER) and grid-integrated operations and controls functionalities have surpassed the requirements in current standards and codes for DER interconnection with the distribution grid. The full revision of IEEE Standards 1547 (requirements for DER-grid interconnection and interoperability) and 1547.1 (test procedures for conformance to 1547) are establishing requirements and best practices for state-of-the-art DER including variable renewable energy sources. The revised standards will also address challenges associated with interoperability and transmission-level effects, in addition to strictly addressing the distribution grid needs. This paper provides the status and future direction of the ongoingmore » development focus for the 1547 standards.« less

  7. Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices

    NASA Astrophysics Data System (ADS)

    Mehta, S.; Kwak, K. S.

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

  8. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance

    PubMed Central

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-01-01

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results. PMID:26861352

  9. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    PubMed

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  10. The fission yeast CENP-B protein Abp1 prevents pervasive transcription of repetitive DNA elements.

    PubMed

    Daulny, Anne; Mejía-Ramírez, Eva; Reina, Oscar; Rosado-Lugo, Jesus; Aguilar-Arnal, Lorena; Auer, Herbert; Zaratiegui, Mikel; Azorin, Fernando

    2016-10-01

    It is well established that eukaryotic genomes are pervasively transcribed producing cryptic unstable transcripts (CUTs). However, the mechanisms regulating pervasive transcription are not well understood. Here, we report that the fission yeast CENP-B homolog Abp1 plays an important role in preventing pervasive transcription. We show that loss of abp1 results in the accumulation of CUTs, which are targeted for degradation by the exosome pathway. These CUTs originate from different types of genomic features, but the highest increase corresponds to Tf2 retrotransposons and rDNA repeats, where they map along the entire elements. In the absence of abp1, increased RNAPII-Ser5P occupancy is observed throughout the Tf2 coding region and, unexpectedly, RNAPII-Ser5P is enriched at rDNA repeats. Loss of abp1 also results in Tf2 derepression and increased nucleolus size. Altogether these results suggest that Abp1 prevents pervasive RNAPII transcription of repetitive DNA elements (i.e., Tf2 and rDNA repeats) from internal cryptic sites. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. Gender Differences: An Examination of Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Gregory, Mona Y.

    Computer-mediated communication (CMC) is a pervasive means of communicating in work place, education, and home settings. Males currently occupy approximately 69% of all jobs in the computer industry and only 10% of upper-level positions are occupied by females. Stereotypical perceptions and gendered occupations contribute to the lack of females in…

  12. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    NASA Astrophysics Data System (ADS)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  13. Pervasive Developmental Disorders in Individuals with Cerebral Palsy

    ERIC Educational Resources Information Center

    Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

    2009-01-01

    The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…

  14. A 1998 Workshop on Heterogeneous Computing

    DTIC Science & Technology

    1998-09-18

    of Sussex, England, in 1994. From 1988 to 1990 he was a Lecturer with the UNAM. In 1994, he joined the Laboratorio Nacional de Informatica Avanzada...1984) and at the UNAM (1988-1991). Since 1992, he is titular Researcher and consultant at the Laboratorio Nacional de Informatica Avanzada (LANIA). He...Box 1331 Piscataway, NJ 08855-1331 Tel: + 1-908-981-1393 Fax: + 1-908-981-9667 mis.custserv@computer.org IEEE Computer Society 13, Avenue de

  15. An IEEE802.15.4-Based System for Locating Children on Their School Commutes

    NASA Astrophysics Data System (ADS)

    Sugiura, Akihiko; Baba, Ryoichi; Kobayashi, Hideyuki

    With the increasing number of crimes and accidents in which children are becoming involved, there is a growing demand for devices to safeguard children's security by detecting their locations on their way to and from school. This paper proposes a system that uses an IEEE802.15.4-standard network to detect children's locations. To overcome the susceptibility of radio interference from nearby wireless LANs, frequency division multiplexing is applied to this IEEE802.15.4-based network, toward improving data acquisition from terminal units. The effectiveness of the system was field-tested with elementary school students who used about 400 IEEE 802.15.4-compliant terminal units. An experiment verified that the use of frequency division multiplexing in an environment where radio interference by wireless LANs is strong allowed the network to double the success rate of information communication from terminal units relative to that without frequency division multiplexing. In the experiment for detecting elementary schoolers' arrival at and departure from school, the terminal detection rate was 99% and the terminal detection rate on the designated school routes was 90%. These results prove the effectiveness of the system in detecting locations.

  16. Blind quantum computing with weak coherent pulses.

    PubMed

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-18

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.

  17. Blind Quantum Computing with Weak Coherent Pulses

    NASA Astrophysics Data System (ADS)

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-01

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.

  18. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.

    DTIC Science & Technology

    1987-07-01

    for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the

  19. Human computer confluence applied in healthcare and rehabilitation.

    PubMed

    Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen

    2012-01-01

    Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation.

  20. Catatonic features in adolescents with schizophrenia with and without a comorbid pervasive developmental disorder.

    PubMed

    Waris, Petra; Lindberg, Nina; Kettunen, Kirsi; Lipsanen, Jari; Tani, Pekka

    2014-01-01

    Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children - Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: "lacks facial expression", "odd intonation", "poor eye contact" and "lack of cooperation". Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia.

  1. Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.

    PubMed

    Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.

  2. Service Differentiated and Adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems

    PubMed Central

    Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay. PMID:24260021

  3. Prevalence of Pervasive Developmental Disorders in Two Canadian Provinces

    ERIC Educational Resources Information Center

    Ouellette-Kuntz, Helene; Coo, Helen; Yu, C. T.; Chudley, Albert E.; Noonan, Andrea; Breitenbach, Marlene; Ramji, Nasreen; Prosick, Talia; Bedard, Angela; Holden, Jeanette J. A.

    2006-01-01

    Although it is generally accepted that the proportion of children diagnosed with pervasive developmental disorders (PDDs) has increased in the past two decades, there is no consensus on the prevalence of these conditions. The accompanying large rise in demand for services, together with uncertainty regarding the extent to which the observed…

  4. Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

    2006-01-01

    Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a…

  5. Pervasive technology in Neonatal Intensive Care Unit: a prototype for newborns unobtrusive monitoring.

    PubMed

    Ciani, Oriana; Piccini, Luca; Parini, Sergio; Rullo, Alessia; Bagnoli, Franco; Marti, Patrizia; Andreoni, Giuseppe

    2008-01-01

    Pervasive computing research is introducing new perspectives in a wide range of applications, including healthcare domain. In this study we explore the possibility to realize a prototype of a system for unobtrusive recording and monitoring of multiple biological parameters on premature newborns hospitalized in the Neonatal Intensive Care Unit (NICU). It consists of three different units: a sensitized belt for Electrocardiogram (ECG) and chest dilatation monitoring, augmented with extrinsic transducers for temperature and respiratory activity measure, a device for signals pre-processing, sampling and transmission through Bluetooth(R) (BT) technology to a remote PC station and a software for data capture and post-processing. Preliminary results obtained by monitoring babies just discharged from the ward demonstrated the feasibility of the unobtrusive monitoring on this kind of subjects and open a new scenario for premature newborns monitoring and developmental cares practice in NICU.

  6. Catatonic features in adolescents with schizophrenia with and without a comorbid pervasive developmental disorder

    PubMed Central

    2014-01-01

    Background Catatonia has been associated with both schizophrenia and pervasive developmental disorders. The aim of this study was to evaluate catatonic features among adolescents suffering from schizophrenia. Further, we compared these features between adolescents with a comorbid pervasive developmental disorder and those without one. Finally, we wanted to compare the profile of catatonia-like features of our schizophrenia patients to that described earlier among persons with autism spectrum disorders. Methods The study comprised a consecutive sample of 18 adolescents with schizophrenia (mean age 15.6 years, SD 1.4) and their families. Diagnosis of schizophrenia was assessed with the Schedule for Affective Disorders and Schizophrenia for School-Aged Children – Present and Life-Time (K-SADS-PL) for the DSM-IV. The Diagnostic Interview for Social and Communication Disorders version 11 was used to assess catatonic features. Results All adolescents with schizophrenia had showed some lifetime catatonic features. Approximately 78% of them had already expressed these features before the age of 10. The number of catatonic features before the age of 10 was significantly higher among the adolescents with a comorbid pervasive developmental disorder compared to those without one. The numbers of catatonic features after the age of 10 did not significantly differ between the two groups. Over three-quarters of schizophrenia patients shared four lifetime catatonic features: “lacks facial expression”, “odd intonation”, “poor eye contact” and “lack of cooperation”. Conclusions Adolescent schizophrenia patients with a comorbid pervasive developmental disorder show many catatonic features in childhood whereas those without one seem to develop these features first in adolescence. Catatonic features exhibited by adolescents with schizophrenia resemble those described among persons with pervasive developmental disorders without schizophrenia. PMID:24914405

  7. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    PubMed

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  8. Pervasive Agility and Agile Fires in Support of Decisive Action

    DTIC Science & Technology

    2012-03-29

    Pervasive Agility and Agile Fires in Support of Decisive Action FORMAT: Civilian Research Project DATE: 29 March 2012 WORD COUNT : 12,599 PAGES: 54...will face, this pollenization may require creative measures, perhaps virtual or constructive scenarios. The National Training Center at Fort Irwin

  9. NREL's Jerry Olson Wins Prestigious Cherry Award from IEEE | News | NREL

    Science.gov Websites

    at the IEEE's annual Photovoltaic Specialists Conference in Seattle. See the feature article on Olson based on his invention to power most space satellites, as well as the Mars rovers, Spirit and of the photovoltaic community. In the 1950s, he was instrumental in establishing solar cells as the

  10. Diagnostic Utility of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    Reel, Kristy H.; Lecavalier, Luc; Butter, Eric; Mulick, James A.

    2012-01-01

    This study assessed the diagnostic utility of the Pervasive Developmental Disorder Behavior Inventory (PDDBI) in a sample of 84 children aged 3-12 years of age. Forty-two children with ASD were individually matched on age and non-verbal IQ to 42 children with other disabilities and groups were compared on PDDBI subscales and total score. Results…

  11. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  12. Distributed GPU Computing in GIScience

    NASA Astrophysics Data System (ADS)

    Jiang, Y.; Yang, C.; Huang, Q.; Li, J.; Sun, M.

    2013-12-01

    Geoscientists strived to discover potential principles and patterns hidden inside ever-growing Big Data for scientific discoveries. To better achieve this objective, more capable computing resources are required to process, analyze and visualize Big Data (Ferreira et al., 2003; Li et al., 2013). Current CPU-based computing techniques cannot promptly meet the computing challenges caused by increasing amount of datasets from different domains, such as social media, earth observation, environmental sensing (Li et al., 2013). Meanwhile CPU-based computing resources structured as cluster or supercomputer is costly. In the past several years with GPU-based technology matured in both the capability and performance, GPU-based computing has emerged as a new computing paradigm. Compare to traditional computing microprocessor, the modern GPU, as a compelling alternative microprocessor, has outstanding high parallel processing capability with cost-effectiveness and efficiency(Owens et al., 2008), although it is initially designed for graphical rendering in visualization pipe. This presentation reports a distributed GPU computing framework for integrating GPU-based computing within distributed environment. Within this framework, 1) for each single computer, computing resources of both GPU-based and CPU-based can be fully utilized to improve the performance of visualizing and processing Big Data; 2) within a network environment, a variety of computers can be used to build up a virtual super computer to support CPU-based and GPU-based computing in distributed computing environment; 3) GPUs, as a specific graphic targeted device, are used to greatly improve the rendering efficiency in distributed geo-visualization, especially for 3D/4D visualization. Key words: Geovisualization, GIScience, Spatiotemporal Studies Reference : 1. Ferreira de Oliveira, M. C., & Levkowitz, H. (2003). From visual data exploration to visual data mining: A survey. Visualization and Computer Graphics, IEEE

  13. Test Review: Siegel, B. (2004). "Pervasive Developmental Disorder Screening Test--II (PDDST-II)." San Antonio, TX: Harcourt

    ERIC Educational Resources Information Center

    Montgomery, Janine M.; Duncan, C. Randy; Francis, Garnett C.

    2007-01-01

    The "Pervasive Developmental Disorder Screening Test-II (PDDST-II)--Early Childhood Screener for Autistic Spectrum Disorders" is a clinical screening tool for pervasive developmental disorders (PDD) or autism spectrum disorders (ASD) designed for use by nonspecialist clinicians. It was designed to differentiate children as young as 18 months who…

  14. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    PubMed

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  15. Converging, pervasive technologies: chronic and emerging issues and policy adequacy.

    PubMed

    Seelman, Katherine D

    2008-01-01

    This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research.

  16. New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

    2004-01-01

    After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare.

  17. Invisible watermarking optical camera communication and compatibility issues of IEEE 802.15.7r1 specification

    NASA Astrophysics Data System (ADS)

    Le, Nam-Tuan

    2017-05-01

    Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.

  18. A SCORM Compliant Courseware Authoring Tool for Supporting Pervasive Learning

    ERIC Educational Resources Information Center

    Wang, Te-Hua; Chang, Flora Chia-I

    2007-01-01

    The sharable content object reference model (SCORM) includes a representation of distance learning contents and a behavior definition of how users should interact with the contents. Generally, SCORMcompliant systems were based on multimedia and Web technologies on PCs. We further build a pervasive learning environment, which allows users to read…

  19. Ubiquitous computing in sports: A review and analysis.

    PubMed

    Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp

    2009-10-01

    Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.

  20. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  1. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    PubMed

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  2. [Review of assessment methods used to evaluate feeding for children with pervasive developmental disorder].

    PubMed

    Nadon, G; Ehrmann Feldman, D; Gisel, E

    2008-08-01

    Current evaluations used by occupational therapists to assess and treat feeding problems derive mainly from the domain of dysphagia. The purpose of this article is to familiarize the reader with tools used, in research, for children with pervasive developmental disorders (PDD) and to determine if any of these meet the needs of occupational therapists. The following data bases were searched: Medline, CINAHL, HAPI and PsyINFO, using the terms pervasive developmental disorder, autism, Asperger syndrome, pervasive developmental disorder not otherwise specified, eating behavior, eating disorder, food preference, food selectivity, feeding disorders, picky eater and child. All articles published between 1980 and 2006 (n=27) were reviewed. A total of 20 studies met our selection criteria. Assessment methods are compared using the Disability Creation Model (DCP). The DCP is the Quebec alternative to the International Classification of Functioning, Disability and Health (ICF). None of the evaluation tools reviewed met all factors that may influence eating in children with PDD. Implications for research and practice in occupational therapy are discussed.

  3. Processing Capacity in Children and Adolescents with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Hoeksma, Marco R.; Kemner, Chantal; Verbaten, Marinus N.; van Engeland, Herman

    2004-01-01

    This study sought to investigate whether the abnormally small P3 amplitudes observed in pervasive developmental disorder (PDD) are related to differences in processing capacity. PDD children and adolescents and their control groups participated in the study. Visual probe stimuli were presented during an auditory task with two levels of difficulty.…

  4. Injury Treatment among Children with Autism or Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    McDermott, Suzanne; Zhou, Li; Mann, Joshua

    2008-01-01

    This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

  5. Women in biomedical engineering and health informatics and its impact on gender representation for accepted publications at IEEE EMBC 2007.

    PubMed

    McGregor, Carolyn; Smith, Kathleen P; Percival, Jennifer

    2008-01-01

    The study of women within the professions of Engineering and Computer Science has consistently been found to demonstrate women as a minority within these professions. However none of that previous work has assessed publication behaviours based on gender. This paper presents research findings on gender distribution of authors of accepted papers for the IEEE Engineering and Medicine Society annual conference for 2007 (EMBC '07) held in Lyon, France. This information is used to present a position statement of the current state of gender representation for conference publication within the domain of biomedical engineering and health informatics. Issues in data preparation resulting from the lack of inclusion of gender in information gathered from accepted authors are presented and discussed.

  6. The Impact of IEEE-1076 on VHDL (Hardware Description Language)

    DTIC Science & Technology

    1988-12-01

    Portability simply refers to how machine-independent the language is defined. The Efficiency criterion looks at how fast a program compiles and how ...if a programming language is good. The evaluation was done to determine if IEEE Standard 1076-1987 was indeed a better version of VHDL than its...must be UNIX-based and be able to * use the tools that are common to that operating system such as lex [Lesk78I, yacc [John78] and the programming

  7. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    PubMed

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  8. Making Classical Ground State Spin Computing Fault-Tolerant

    DTIC Science & Technology

    2010-06-24

    approaches to perebor (brute-force searches) algorithms,” IEEE Annals of the History of Computing, 6, 384–400 (1984). [24] D. Bacon and S . T. Flammia ...Adiabatic gate teleportation,” Phys. Rev. Lett., 103, 120504 (2009). [25] D. Bacon and S . T. Flammia , “Adiabatic cluster state quantum computing...v1 [ co nd -m at . s ta t- m ec h] 2 2 Ju n 20 10 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the

  9. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    PubMed

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  10. A Learning Outcome-Oriented Approach towards Classifying Pervasive Games for Learning Using Game Design Patterns and Contextual Information

    ERIC Educational Resources Information Center

    Schmitz, Birgit; Klemke, Roland; Specht, Marcus

    2013-01-01

    Mobile and in particular pervasive games are a strong component of future scenarios for teaching and learning. Based on results from a previous review of practical papers, this work explores the educational potential of pervasive games for learning by analysing underlying game mechanisms. In order to determine and classify cognitive and affective…

  11. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-01

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly. PMID:28275216

  12. An Open-Label Trial of Escitalopram in Pervasive Developmental Disorders.

    ERIC Educational Resources Information Center

    Owley, Thomas; Walton, Laura; Salt, Jeff; Guter, Stephen J., Jr.; Winnega, Marrea; Leventhal, Bennett L.; Cook, Edwin H., Jr.

    2005-01-01

    Objective: To assess the effect of escitalopram in the treatment of pervasive developmental disorders (PDDs). Method: This 10-week study had a forced titration, open-label design. Twenty-eight subjects (mean age 125.1 [+ or -] 33.5 months) with a PDD received escitalopram at a dose that increased weekly to a maximum dose of 20 mg as tolerated. The…

  13. Securing Emergency State Data in a Tactical Computing Environment

    DTIC Science & Technology

    2010-12-01

    in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS󈧊), 847–854. [38] K. Kifayat, D. Llewellyn - Jones , A. Arabo, O...Drew, M. Merabti, Q. Shi, A. Waller, R. Craddock, G. Jones , State-of-the-Art in System-of-Systems Security for Crisis Management, Fourth Annual

  14. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  15. Brief Report: Pervasive Developmental Disorder Can Evolve into ADHD--Case Illustrations

    ERIC Educational Resources Information Center

    Fein, Deborah; Dixon, Pamela; Paul, Jennifer; Levin, Harriet

    2005-01-01

    Despite prominent attentional symptoms in Pervasive Developmental Disorders (PDD) the relationship between PDD and Attention Deficit Hyperactivity Disorder (ADHD) has received little direct examination. In addition, outcome studies of children with PDD often focus on language, educational placement, or adaptive skills, but seldom on loss of the…

  16. Symbolization Levels in Communicative Behaviors of Children Showing Pervasive Developmental Disorders.

    ERIC Educational Resources Information Center

    Atlas, Jeffrey A.; Lapidus, Leah Blumberg

    1988-01-01

    A total of 48 children (aged 4-14) with severe pervasive developmental disturbance, exhibiting mutism, echolalia, or nonecholalic speech, were observed in their communicative behaviors across modalities. Levels of symbolization in gesture, play, and drawing were significantly intercorrelated and were most strongly correlated with the criterion…

  17. Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence

    2009-01-01

    Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to…

  18. Emerging Needs for Pervasive Passive Wireless Sensor Networks on Aerospace Vehicles

    NASA Technical Reports Server (NTRS)

    Wilson, William C.; Juarez, Peter D.

    2014-01-01

    NASA is investigating passive wireless sensor technology to reduce instrumentation mass and volume in ground testing, air flight, and space exploration applications. Vehicle health monitoring systems (VHMS) are desired on all aerospace programs to ensure the safety of the crew and the vehicles. Pervasive passive wireless sensor networks facilitate VHMS on aerospace vehicles. Future wireless sensor networks on board aerospace vehicles will be heterogeneous and will require active and passive network systems. Since much has been published on active wireless sensor networks, this work will focus on the need for passive wireless sensor networks on aerospace vehicles. Several passive wireless technologies such as microelectromechanical systems MEMS, SAW, backscatter, and chipless RFID techniques, have all shown potential to meet the pervasive sensing needs for aerospace VHMS applications. A SAW VHMS application will be presented. In addition, application areas including ground testing, hypersonic aircraft and spacecraft will be explored along with some of the harsh environments found in aerospace applications.

  19. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    NASA Astrophysics Data System (ADS)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  20. Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece

    NASA Astrophysics Data System (ADS)

    Breeding, C. M.; Ague, J. J.; Broecker, M.

    2001-12-01

    Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments

  1. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Cancer.gov

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  2. A Pervasive Parallel Processing Framework for Data Visualization and Analysis at Extreme Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moreland, Kenneth; Geveci, Berk

    2014-11-01

    The evolution of the computing world from teraflop to petaflop has been relatively effortless, with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipelinemore » model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.« less

  3. Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

    2006-01-01

    Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with…

  4. Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.

    2009-01-01

    Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social…

  5. Theoretical Investigation of Optical Computing Based on Neural Network Models.

    DTIC Science & Technology

    1987-09-29

    34 Cognitive and Psychological Computation with Neu- ral Models," IEEE Trans. Sys., Man, and cyber., SMC-13, p. 799, 1983. 20’ K. Nakano, "Association-A...7),482(1986). 211 F. Rosenblatt, Principles of Neurodynamics : Perceptron and the The- ory of Brain Mechanisms, Spartan Books, Washington,(1961). 22

  6. Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine

    ClinicalTrials.gov

    2013-10-31

    Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

  7. Adaptive User Profiles in Pervasive Advertising Environments

    NASA Astrophysics Data System (ADS)

    Alt, Florian; Balz, Moritz; Kristes, Stefanie; Shirazi, Alireza Sahami; Mennenöh, Julian; Schmidt, Albrecht; Schröder, Hendrik; Goedicke, Michael

    Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users' interests can be gathered. Users can deliberately and explicitly provide this information or user's shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an advertising environment and present adaptive profiles, which let users setup profiles based on a self-assessment, and enhance those profiles with information about their real shopping behavior as well as about their activity intensity. Additionally, we explain how pervasive technologies such as Bluetooth can be used to create a profile anonymously and unobtrusively.

  8. An open and reconfigurable wireless sensor network for pervasive health monitoring.

    PubMed

    Triantafyllidis, A; Koutkias, V; Chouvarda, I; Maglaveras, N

    2008-01-01

    Sensor networks constitute the backbone for the construction of personalized monitoring systems. Up to now, several sensor networks have been proposed for diverse pervasive healthcare applications, which are however characterized by a significant lack of open architectures, resulting in closed, non-interoperable and difficult to extend solutions. In this context, we propose an open and reconfigurable wireless sensor network (WSN) for pervasive health monitoring, with particular emphasis in its easy extension with additional sensors and functionality by incorporating embedded intelligence mechanisms. We consider a generic WSN architecture comprised of diverse sensor nodes (with communication and processing capabilities) and a mobile base unit (MBU) operating as the gateway between the sensors and the medical personnel, formulating this way a body area network (BAN). The primary focus of this work is on the intra-BAN data communication issues, adopting SensorML as the data representation mean, including the encoding of the monitoring patterns and the functionality of the sensor network. In our prototype implementation two sensor nodes are emulated; one for heart rate monitoring and the other for blood glucose observations, while the MBU corresponds to a personal digital assistant (PDA) device. Java 2 Micro Edition (J2ME) is used to implement both the sensor nodes and the MBU components. Intra-BAN wireless communication relies on the Blue-tooth protocol. Via an adaptive user interface in the MBU, health professionals may specify the monitoring parameters of the WSN and define the monitoring patterns of interest in terms of rules. This work constitutes an essential step towards the construction of open, extensible, inter-operable and intelligent WSNs for pervasive health monitoring.

  9. Architectures and economics for pervasive broadband satellite networks

    NASA Technical Reports Server (NTRS)

    Staelin, D. H.; Harvey, R. L.

    1979-01-01

    The size of a satellite network necessary to provide pervasive high-data-rate business communications is estimated, and one possible configuration is described which could interconnect most organizations in the United States. Within an order of magnitude, such a network might reasonably have a capacity equivalent to 10,000 simultaneous 3-Mbps channels, and rely primarily upon a cluster of approximately 3-5 satellites in a single orbital slot. Nominal prices for 3-6 Mbps video conference services might then be approximately $2000 monthly lease charge plus perhaps 70 cents per minute one way.

  10. Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2010-01-01

    Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of…

  11. Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature

    ERIC Educational Resources Information Center

    Hollway, Jill A.; Aman, Michael G.

    2011-01-01

    Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.…

  12. Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards.

    PubMed

    Vitak, Jessica; Proferes, Nicholas; Shilton, Katie; Ashktorab, Zahra

    2017-12-01

    The parallel rise of pervasive data collection platforms and computational methods for collecting, analyzing, and drawing inferences from large quantities of user data has advanced social computing research, investigating digital traces to understand mediated behaviors of individuals, groups, and societies. At the same time, methods employed to access these data have raised questions about ethical research practices. This article provides insights into U.S. institutional review boards' (IRBs) attitudes and practices regulating social computing research. Through descriptive and inferential analysis of survey data from staff at 59 IRBs at research universities, we examine how IRBs evaluate the growing variety of studies using pervasive digital data. Findings unpack the difficulties IRB staff face evaluating increasingly technical research proposals while highlighting the belief in their ability to surmount these difficulties. They also indicate a lack of consensus among IRB staff about what should be reviewed and a willingness to work closely with researchers.

  13. Human exposure standards in the frequency range 1 Hz To 100 kHz: the case for adoption of the IEEE standard.

    PubMed

    Patrick Reilly, J

    2014-10-01

    Differences between IEEE C95 Standards (C95.6-2002 and C95.1-2005) in the low-frequency (1 Hz-100 kHz) and the ICNIRP-2010 guidelines appear across the frequency spectrum. Factors accounting for lack of convergence include: differences between the IEEE standards and the ICNIRP guidelines with respect to biological induction models, stated objectives, data trail from experimentally derived thresholds through physical and biological principles, selection and justification of safety/reduction factors, use of probability models, compliance standards for the limbs as distinct from the whole body, defined population categories, strategies for central nervous system protection below 20 Hz, and correspondence of environmental electric field limits with contact currents. This paper discusses these factors and makes the case for adoption of the limits in the IEEE standards.

  14. Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363.

    PubMed

    Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao

    2010-11-01

    Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.

  15. A Placement Test for Computer Science: Design, Implementation, and Analysis

    ERIC Educational Resources Information Center

    Nugent, Gwen; Soh, Leen-Kiat; Samal, Ashok; Lang, Jeff

    2006-01-01

    An introductory CS1 course presents problems for educators and students due to students' diverse background in programming knowledge and exposure. Students who enroll in CS1 also have different expectations and motivations. Prompted by the curricular guidelines for undergraduate programmes in computer science released in 2001 by the ACM/IEEE, and…

  16. IEEE 802.11e EDCF performance evaluation

    NASA Astrophysics Data System (ADS)

    Huang, Benxiong; Zhang, Fan; Wang, Yan; Wang, Xiaoling

    2004-04-01

    This paper evaluates the performances of the contention-based channel access mechanism of IEEE 802.11e, called enhanced distributed coordination function (EDCF), compared with the 802.11 legacy MAC in supporting voice, video and data applications through network simulation of a scenario of 802.11e. Then we discuss the effects of Contention Window (CW) and Arbitration Inter-Frame Space (AIFS) on service differentiation and total throughput. We also consider an optional feature of the EDCF, called contention-free burst (CFB). Through our simulation study, we can draw a conclusion that the EDCF with TXOP can provide better-differentiated channel access for different traffic types than EDCF without TXOP especially at high traffic load conditions. But the movements caused by the parameters in CFB seem a lot bouncing and instability when in different application and configuration.

  17. Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Suzuki, Mayo

    2011-01-01

    The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A…

  18. TomoBank: a tomographic data repository for computational x-ray science

    NASA Astrophysics Data System (ADS)

    De Carlo, Francesco; Gürsoy, Doğa; Ching, Daniel J.; Joost Batenburg, K.; Ludwig, Wolfgang; Mancini, Lucia; Marone, Federica; Mokso, Rajmund; Pelt, Daniël M.; Sijbers, Jan; Rivers, Mark

    2018-03-01

    There is a widening gap between the fast advancement of computational methods for tomographic reconstruction and their successful implementation in production software at various synchrotron facilities. This is due in part to the lack of readily available instrument datasets and phantoms representative of real materials for validation and comparison of new numerical methods. Recent advancements in detector technology have made sub-second and multi-energy tomographic data collection possible (Gibbs et al 2015 Sci. Rep. 5 11824), but have also increased the demand to develop new reconstruction methods able to handle in situ (Pelt and Batenburg 2013 IEEE Trans. Image Process. 22 5238-51) and dynamic systems (Mohan et al 2015 IEEE Trans. Comput. Imaging 1 96-111) that can be quickly incorporated in beamline production software (Gürsoy et al 2014 J. Synchrotron Radiat. 21 1188-93). The x-ray tomography data bank, tomoBank, provides a repository of experimental and simulated datasets with the aim to foster collaboration among computational scientists, beamline scientists, and experimentalists and to accelerate the development and implementation of tomographic reconstruction methods for synchrotron facility production software by providing easy access to challenging datasets and their descriptors.

  19. Ethical and regulatory challenges of research using pervasive sensing and other emerging technologies: IRB perspectives.

    PubMed

    Nebeker, Camille; Harlow, John; Espinoza Giacinto, Rebeca; Orozco-Linares, Rubi; Bloss, Cinnamon S; Weibel, Nadir

    2017-01-01

    Vast quantities of personal health information and private identifiable information are being created through mobile apps, wearable sensors, and social networks. While new strategies and tools for obtaining health data have expanded researchers' abilities to design and test personalized and adaptive health interventions, the deployment of pervasive sensing and computational techniques to gather research data is raising ethical challenges for Institutional Review Boards (IRBs) charged with protecting research participants. To explore experiences with, and perceptions about, technology-enabled research, and identify solutions for promoting responsible conduct of this research we conducted focus groups with human research protection program and IRB affiliates. Our findings outline the need for increased collaboration across stakeholders in terms of: (1) shared and dynamic resources that improve awareness of technologies and decrease potential threats to participant privacy and data confidentiality, and (2) development of appropriate and dynamic standards through collaboration with stakeholders in the research ethics community.

  20. Hybrid Architectures for Evolutionary Computing Algorithms

    DTIC Science & Technology

    2008-01-01

    other EC algorithms to FPGA Core Burns P1026/MAPLD 200532 Genetic Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based...on Parallel and Distributed Processing (IPPS/SPDP 󈨦), pp. 316-320, Proceedings. IEEE Computer Society 1998. [12] Scott, S. D. , Samal , A., and...Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based Genetic Algorithm”, Proceedings of the 1995 ACM Third

  1. Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education

    ERIC Educational Resources Information Center

    Wheeler, Brad; Waggener, Shelton

    2009-01-01

    The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…

  2. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    PubMed

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  3. Deriving Requirements for Pervasive Well-Being Technology From Work Stress and Intervention Theory: Framework and Case Study

    PubMed Central

    Koldijk, Saskia; Kraaij, Wessel

    2016-01-01

    Background Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. Objective The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Methods Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. Results The resulting general framework relates several relevant theories: we relate “engagement and burn-out” to “stress”, and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. Conclusions The presented framework can be used to systematically develop theory

  4. Deriving Requirements for Pervasive Well-Being Technology From Work Stress and Intervention Theory: Framework and Case Study.

    PubMed

    Koldijk, Saskia; Kraaij, Wessel; Neerincx, Mark A

    2016-07-05

    Stress in office environments is a big concern, often leading to burn-out. New technologies are emerging, such as easily available sensors, contextual reasoning, and electronic coaching (e-coaching) apps. In the Smart Reasoning for Well-being at Home and at Work (SWELL) project, we explore the potential of using such new pervasive technologies to provide support for the self-management of well-being, with a focus on individuals' stress-coping. Ideally, these new pervasive systems should be grounded in existing work stress and intervention theory. However, there is a large diversity of theories and they hardly provide explicit directions for technology design. The aim of this paper is to present a comprehensive and concise framework that can be used to design pervasive technologies that support knowledge workers to decrease stress. Based on a literature study we identify concepts relevant to well-being at work and select different work stress models to find causes of work stress that can be addressed. From a technical perspective, we then describe how sensors can be used to infer stress and the context in which it appears, and use intervention theory to further specify interventions that can be provided by means of pervasive technology. The resulting general framework relates several relevant theories: we relate "engagement and burn-out" to "stress", and describe how relevant aspects can be quantified by means of sensors. We also outline underlying causes of work stress and how these can be addressed with interventions, in particular utilizing new technologies integrating behavioral change theory. Based upon this framework we were able to derive requirements for our case study, the pervasive SWELL system, and we implemented two prototypes. Small-scale user studies proved the value of the derived technology-supported interventions. The presented framework can be used to systematically develop theory-based technology-supported interventions to address work stress. In

  5. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  6. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  7. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  8. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., unemployment and general distress. 598.110 Section 598.110 Housing and Urban Development Regulations Relating... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment...) Unemployment. Unemployment is demonstrated by: (1) The most recent data available indicating that the annual...

  9. Audiovisual Speech Integration in Pervasive Developmental Disorder: Evidence from Event-Related Potentials

    ERIC Educational Resources Information Center

    Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

    2008-01-01

    Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously…

  10. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    PubMed

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  11. WIH-based IEEE 802.11 ECG monitoring implementation.

    PubMed

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  12. Sensor Networking Testbed with IEEE 1451 Compatibility and Network Performance Monitoring

    NASA Technical Reports Server (NTRS)

    Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Figueroa, F.; Morris, Jonathan

    2007-01-01

    Design and implementation of a testbed for testing and verifying IEEE 1451-compatible sensor systems with network performance monitoring is of significant importance. The performance parameters measurement as well as decision support systems implementation will enhance the understanding of sensor systems with plug-and-play capabilities. The paper will present the design aspects for such a testbed environment under development at University of Houston in collaboration with NASA Stennis Space Center - SSST (Smart Sensor System Testbed).

  13. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    PubMed

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  14. Networking DEC and IBM computers

    NASA Technical Reports Server (NTRS)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  15. Regression of Language and Non-Language Skills in Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Meilleur, A. -A. S.; Fombonne, E.

    2009-01-01

    Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…

  16. ERPs and Eye Movements Reflect Atypical Visual Perception in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, Chantal; van Engeland, Herman

    2006-01-01

    Many studies of eye tracking or event-related brain potentials (ERPs) in subjects with Pervasive Developmental Disorder (PDD) have yielded inconsistent results on attentional processing. However, recent studies have indicated that there are specific abnormalities in early processing that are probably related to perception. ERP amplitudes in…

  17. Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing

    DTIC Science & Technology

    1988-12-01

    phase can be formally described as follows: Graph Partitioning Problem NP-complete: (Garey & Johnson) Given graph G = (V, E), weights w (v) for each v e V...Technical Report, MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984...34Parallel Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale

  18. Performance Analysis of IEEE 802.15.6 CSMA/CA Protocol for WBAN Medical Scenario through DTMC Model.

    PubMed

    Kumar, Vivek; Gupta, Bharat

    2016-12-01

    The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.

  19. 2012 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    NASA Astrophysics Data System (ADS)

    Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh

    2012-12-01

    The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior

  20. Quality of Life of Adults with Pervasive Developmental Disorders and Intellectual Disabilities

    ERIC Educational Resources Information Center

    Gerber, F.; Baud, M. A.; Giroud, M.; Carminati, G. Galli

    2008-01-01

    The purpose of this study was to observe quality of life (QoL) and global evolution of persons with Pervasive Developmental Disorders (PDD) in three different groups. Individualized programs for PDD were compared to traditional programs for intellectual disabilities. Behavioural disorders were repeatedly evaluated using the Aberrant Behaviour…

  1. Pervasive Developmental Disorders: PDD-NOS, Asperger's Disorder and Autism. Parent Information Booklet.

    ERIC Educational Resources Information Center

    Levine, Karen

    This information booklet is designed for parents who have a child who has been diagnosed with Pervasive Developmental Disorder (PDD) or Asperger's Disorder. It provides information on: (1) the definition of PDD; (2) the five subtypes of PDD, including PDD "not otherwise specified," Asperger's disorder, autistic disorder, childhood…

  2. Brain-Computer Symbiosis

    PubMed Central

    Schalk, Gerwin

    2009-01-01

    The theoretical groundwork of the 1930’s and 1940’s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our body’s input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades. PMID:18310804

  3. Pervasive assistive technology for people with dementia: a UCD case

    PubMed Central

    Rønn-Andersen, Kristoffer V.H.; Bień, Paulina; Özkil, Ali Gürcan; Forchhammer, Birgitte Hysse; Maier, Anja M.

    2016-01-01

    Smart mobile and wearable technology offers exciting opportunities to support people with dementia (PwD). Its ubiquity and popularity could even benefit user adoption – a great challenge for assistive technology (AT) for PwD that calls for user-centred design (UCD) methods. This study describes a user-centred approach to developing and testing AT based on off-the-shelf pervasive technologies. A prototype is created by combining a smartphone, smartwatch and various applications to offer six support features. This is tested among five end-users (PwD) and their caregivers. Controlled usability testing was followed by field testing in a real-world context. Data is gathered from video recordings, interaction logs, system usability scale questionnaires, logbooks, application usage logs and interviews structured on the unified theory of acceptance and use of technology model. The data is analysed to evaluate usability, usefulness and user acceptance. Results show some promise for user adoption, but highlight challenges to be overcome, emphasising personalisation and familiarity as key considerations. The complete findings regarding usability issues, usefulness of support features and four identified adoption profiles are used to provide a set of recommendations for practitioners and further research. These contribute toward UCD practices for improved smart, pervasive AT for dementia. PMID:28008366

  4. Campus-Wide Computing: Early Results Using Legion at the University of Virginia

    DTIC Science & Technology

    2006-01-01

    Bernard et al., “Primitives for Distributed Computing in a Heterogeneous Local Area Network Environ- ment”, IEEE Trans on Soft. Eng. vol. 15, no. 12...1994. [16] F. Ferstl, “CODINE Technical Overview,” Genias, April, 1993. [17] R. F. Freund and D. S. Cornwell , “Superconcurrency: A form of distributed

  5. Achievable Rate Estimation of IEEE 802.11ad Visual Big-Data Uplink Access in Cloud-Enabled Surveillance Applications.

    PubMed

    Kim, Joongheon; Kim, Jong-Kook

    2016-01-01

    This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.

  6. On the seamless, harmonized use of ISO/IEEE11073 and openEHR.

    PubMed

    Trigo, Jesús D; Kohl, Christian D; Eguzkiza, Aitor; Martínez-Espronceda, Miguel; Alesanco, Álvaro; Serrano, Luis; García, José; Knaup, Petra

    2014-05-01

    Standardized exchange of clinical information is a key factor in the provision of high quality health care systems. In this context, the openEHR specification facilitates the management of health data in electronic health records (EHRs), while the ISO/IEEE11073 (also referred to as X73PHD) family of standards provides a reference framework for medical device interoperability. Hospitals and health care providers using openEHR require flawless integration of data coming from external sources, such as X73PHD. Hence, a harmonization process is crucial for achieving a seamless, coherent use of those specifications in real scenarios. Such harmonization is the aim of this paper. Thus, the classes and attributes of a representative number of X73PHD specializations for medical devices--weight, temperature, blood pressure, pulse and heart rate, oximetry, and electrocardiograph--along with the X73PHD core document--ISO/IEEE11073-20601--have been analyzed and mapped to openEHR archetypes. The proposed methodology reuses the existing archetypes when possible and suggests new ones--or appropriate modifications--otherwise. As a result, this paper analyzes the inconsistencies found and the implications thereof in the coordinated use of these two standards. The procedure has also shown how existing standards are able to influence the archetype development process, enhancing the existing archetype corpus.

  7. Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.

    ERIC Educational Resources Information Center

    Stewart, Bonnie C.

    This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section…

  8. Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study

    ERIC Educational Resources Information Center

    Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.

    2011-01-01

    This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was…

  9. The game mechanics of pervasive applications: visiting the uncanny

    NASA Astrophysics Data System (ADS)

    Gentès, Annie; Jutant, Camille

    2012-03-01

    "When I use a word", Humpty Dumpty said, in a rather scornful tone, "it means just what I choose it to mean - neither more nor less." "The question is", said Alice, "whether you can make words mean so many different things". "The question is", said Humpty Dumpty, "which is to be master - that's all". [Carroll 2007 (1865)] In pervasive games, a virtual layer with its own logic is added to the everyday, common meaning of objects, places, and people. The departure of the signifier ("things") from the signified (what they mean on the virtual level) is the semiotic process that allows for a double reading of the environment. Such a divorce has been explored in other cultural products (books, movies). It has been qualified as the "uncanny mode". This article analyzes how pervasive games use their own brand of uncanny. In particular, it shows how mobility becomes the way to uncover the hidden layers of the environment and serves as a tool to experience and eventually reduce or augment the uncanny. Finally, we can point to a typology of four main types of storytelling related to different types of mobility: games that use mimetic narrative strategies veering towards "realism"; games based on the "absurd"; "aloof" games that remain independent from places; games that present a specific play on this double reading of the world and develop the "Uncanny" as a genre.

  10. Cloud@Home: A New Enhanced Computing Paradigm

    NASA Astrophysics Data System (ADS)

    Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

    Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

  11. Principled design for an integrated computational environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Disessa, A.A.

    Boxer is a computer language designed to be the base of an integrated computational environment providing a broad array of functionality -- from text editing to programming -- for naive and novice users. It stands in the line of Lisp inspired languages (Lisp, Logo, Scheme), but differs from these in achieving much of its understandability from pervasive use of a spatial metaphor reinforced through suitable graphics. This paper describes a set of learnability and understandability issues first and then uses them to motivate design decisions made concerning Boxer and the environment in which it is embedded.

  12. Using Collaborative Learning Exercises to Transfer Pervasive Skills: Some South African Evidence

    ERIC Educational Resources Information Center

    Strauss-Keevy, Monique

    2015-01-01

    The Competency Framework, introduced by the South African Institute of Chartered Accountants (SAICA) details technical competencies, but also places emphasis on the pervasive skills that need to be attained by candidates for them to qualify as chartered accountants (CAs). Thus, an additional onus has been placed on academics to ensure that they…

  13. Multiple Power-Saving MSSs Scheduling Methods for IEEE802.16e Broadband Wireless Networks

    PubMed Central

    2014-01-01

    This work proposes two enhanced multiple mobile subscriber stations (MSSs) power-saving scheduling methods for IEEE802.16e broadband wireless networks. The proposed methods are designed for the Unsolicited Grant Service (UGS) of IEEE802.16e. To reduce the active periods of all power-saving MSSs, the base station (BS) allocates each MSS fewest possible transmission frames to retrieve its data from the BS. The BS interlaces the active periods of each MSS to increase the amount of scheduled MSSs and splits the overflowing transmission frames to maximize the bandwidth utilization. Simulation results reveal that interlacing the active periods of MSSs can increase the number of scheduled MSSs to more than four times of that in the Direct scheduling method. The bandwidth utilization can thus be improved by 60%–70%. Splitting the overflowing transmission frames can improve bandwidth utilization by more than 10% over that achieved using the method of interlacing active periods, with a sacrifice of only 1% of the sleep periods in the interlacing active period method. PMID:24523656

  14. Interpretation of IEEE-854 floating-point standard and definition in the HOL system

    NASA Technical Reports Server (NTRS)

    Carreno, Victor A.

    1995-01-01

    The ANSI/IEEE Standard 854-1987 for floating-point arithmetic is interpreted by converting the lexical descriptions in the standard into mathematical conditional descriptions organized in tables. The standard is represented in higher-order logic within the framework of the HOL (Higher Order Logic) system. The paper is divided in two parts with the first part the interpretation and the second part the description in HOL.

  15. Scaling Task Management in Space and Time: Reducing User Overhead in Ubiquitous-Computing Environments

    DTIC Science & Technology

    2005-03-28

    consequently users are torn between taking advantage of increasingly pervasive computing systems, and the price (in attention and skill) that they have to... advantage of the surrounding computing environments; and (c) that it is usable by non-experts. Second, from a software architect’s perspective, we...take full advantage of the computing systems accessible to them, much as they take advantage of the furniture in each physical space. In the example

  16. Termination factor Rho: From the control of pervasive transcription to cell fate determination in Bacillus subtilis

    PubMed Central

    Nicolas, Pierre; Repoila, Francis; Bardowski, Jacek; Aymerich, Stéphane

    2017-01-01

    In eukaryotes, RNA species originating from pervasive transcription are regulators of various cellular processes, from the expression of individual genes to the control of cellular development and oncogenesis. In prokaryotes, the function of pervasive transcription and its output on cell physiology is still unknown. Most bacteria possess termination factor Rho, which represses pervasive, mostly antisense, transcription. Here, we investigate the biological significance of Rho-controlled transcription in the Gram-positive model bacterium Bacillus subtilis. Rho inactivation strongly affected gene expression in B. subtilis, as assessed by transcriptome and proteome analysis of a rho–null mutant during exponential growth in rich medium. Subsequent physiological analyses demonstrated that a considerable part of Rho-controlled transcription is connected to balanced regulation of three mutually exclusive differentiation programs: cell motility, biofilm formation, and sporulation. In the absence of Rho, several up-regulated sense and antisense transcripts affect key structural and regulatory elements of these differentiation programs, thereby suppressing motility and biofilm formation and stimulating sporulation. We dissected how Rho is involved in the activity of the cell fate decision-making network, centered on the master regulator Spo0A. We also revealed a novel regulatory mechanism of Spo0A activation through Rho-dependent intragenic transcription termination of the protein kinase kinB gene. Altogether, our findings indicate that distinct Rho-controlled transcripts are functional and constitute a previously unknown built-in module for the control of cell differentiation in B. subtilis. In a broader context, our results highlight the recruitment of the termination factor Rho, for which the conserved biological role is probably to repress pervasive transcription, in highly integrated, bacterium-specific, regulatory networks. PMID:28723971

  17. Model Uncertainty and Robustness: A Computational Framework for Multimodel Analysis

    ERIC Educational Resources Information Center

    Young, Cristobal; Holsteen, Katherine

    2017-01-01

    Model uncertainty is pervasive in social science. A key question is how robust empirical results are to sensible changes in model specification. We present a new approach and applied statistical software for computational multimodel analysis. Our approach proceeds in two steps: First, we estimate the modeling distribution of estimates across all…

  18. Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing

    DTIC Science & Technology

    1988-12-01

    Given graph G = (V, E), weights w (v) for each v e V and L (e) for each e c E, and positive integers B and J, find a partition of V into disjoint...MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984, "Parallel...Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale, 1986, "A Large

  19. Detecting Subgroups in Children Diagnosed with Pervasive Developmental Disorder--Not Otherwise Specified

    ERIC Educational Resources Information Center

    Brennan, Laura; Barton, Marianne; Chen, Chi-Ming; Green, James; Fein, Deborah

    2015-01-01

    Hierarchical cluster analyses were used to detect three subgroups in a sample of children with pervasive developmental disorder--not otherwise specified (PDD-NOS) evaluated at ages 2 and 4. At age 2, Cluster 1 demonstrated few autism symptoms and high cognitive scores; 60% no longer met criteria for PDD at 4. Cluster 2 exhibited more autism…

  20. Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Palmen, Saskia J. M. C.; Pol, Hilleke E. Hulshoff; Kemner, Chantal; Schnack, Hugo G.; Janssen, Joost; Kahn, Rene S.; van Engeland, Herman

    2004-01-01

    Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and/or the white matter and is it global or more prominent in specific brain regions. Methods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely…

  1. A pseudo differential Gm—C complex filter with frequency tuning for IEEE802.15.4 applications

    NASA Astrophysics Data System (ADS)

    Xin, Cheng; Lungui, Zhong; Haigang, Yang; Fei, Liu; Tongqiang, Gao

    2011-07-01

    This paper presents a CMOS Gm—C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard.

  2. Investigation of Teachers' Attitudes towards Computer Use in Primary Education in Kurdistan

    ERIC Educational Resources Information Center

    Balisane, Hewa

    2015-01-01

    Technological advances have pervasively changed our behaviours, beliefs and approaches in working, socialising and entertaining. Educators, including those in primary education, have acknowledged the positive effects of computer use in the classroom in various ways. With regard to pedagogical consideration, primary school teachers have adopted…

  3. Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network

    DTIC Science & Technology

    2006-10-01

    Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network. In Dynamic Communications Management (pp. 10-1 – 10-16). Meeting Proceedings...mechanisms have been used for managing a limited bandwidth link within the IPv6 military narrowband network. The detailed description of these...confirms that implemented video rate adaptation mechanism enables improvement of qaulity of video transfer. Provision of QoS for Multimedia Services in

  4. Parent Perceptions of Time Spent Meaningfully by Young Adults with Pervasive Support Needs

    ERIC Educational Resources Information Center

    Rossetti, Zachary; Lehr, Donna; Lederer, Leslie; Pelerin, Dana; Huang, Shuoxi

    2015-01-01

    This article describes a qualitative study that examined how 23 young adults with pervasive support needs and limited functional communication spent their time and how their parents (n = 23) and direct support professionals (DSPs; n = 2) defined meaningfulness in relation to the young adults' experiences. Data were collected through…

  5. QCDOC: A 10-teraflops scale computer for lattice QCD

    NASA Astrophysics Data System (ADS)

    Chen, D.; Christ, N. H.; Cristian, C.; Dong, Z.; Gara, A.; Garg, K.; Joo, B.; Kim, C.; Levkova, L.; Liao, X.; Mawhinney, R. D.; Ohta, S.; Wettig, T.

    2001-03-01

    The architecture of a new class of computers, optimized for lattice QCD calculations, is described. An individual node is based on a single integrated circuit containing a PowerPC 32-bit integer processor with a 1 Gflops 64-bit IEEE floating point unit, 4 Mbyte of memory, 8 Gbit/sec nearest-neighbor communications and additional control and diagnostic circuitry. The machine's name, QCDOC, derives from "QCD On a Chip".

  6. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies

    PubMed Central

    Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe

    2016-01-01

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks. PMID:27164106

  7. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies.

    PubMed

    Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe

    2016-05-05

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  8. Pervasive Vulnerabilities: Sexual Harassment in School. Adolescent Cultures, School, and Society. Volume 54

    ERIC Educational Resources Information Center

    Rahimi, Regina; Liston, Delores D.

    2012-01-01

    "Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and…

  9. Curiosity, Interest and Engagement in Technology-Pervasive Learning Environments: A New Research Agenda

    ERIC Educational Resources Information Center

    Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia

    2011-01-01

    This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new…

  10. Response to 'pervasive sequence patents cover the entire human genome' - authors' reply.

    PubMed

    Rosenfeld, Jeffrey; Mason, Christopher

    2014-01-01

    An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14.

  11. Correcting pervasive errors in RNA crystallography through enumerative structure prediction.

    PubMed

    Chou, Fang-Chieh; Sripakdeevong, Parin; Dibrov, Sergey M; Hermann, Thomas; Das, Rhiju

    2013-01-01

    Three-dimensional RNA models fitted into crystallographic density maps exhibit pervasive conformational ambiguities, geometric errors and steric clashes. To address these problems, we present enumerative real-space refinement assisted by electron density under Rosetta (ERRASER), coupled to Python-based hierarchical environment for integrated 'xtallography' (PHENIX) diffraction-based refinement. On 24 data sets, ERRASER automatically corrects the majority of MolProbity-assessed errors, improves the average R(free) factor, resolves functionally important discrepancies in noncanonical structure and refines low-resolution models to better match higher-resolution models.

  12. Predictors and Moderators of Psychological Distress in Mothers of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Tobing, Lauren E.; Glenwick, David S.

    2006-01-01

    This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional…

  13. Low-power secure body area network for vital sensors toward IEEE802.15.6.

    PubMed

    Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

    2009-01-01

    Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.

  14. IEEE-802.15.4-based low-power body sensor node with RF energy harvester.

    PubMed

    Tran, Thang Viet; Chung, Wan-Young

    2014-01-01

    This paper proposes the design and implementation of a low-voltage and low-power body sensor node based on the IEEE 802.15.4 standard to collect electrocardiography (ECG) and photoplethysmography (PPG) signals. To achieve compact size, low supply voltage, and low power consumption, the proposed platform is integrated into a ZigBee mote, which contains a DC-DC booster, a PPG sensor interface module, and an ECG front-end circuit that has ultra-low current consumption. The input voltage of the proposed node is very low and has a wide range, from 0.65 V to 3.3 V. An RF energy harvester is also designed to charge the battery during the working mode or standby mode of the node. The power consumption of the proposed node reaches 14 mW in working mode to prolong the battery lifetime. The software is supported by the nesC language under the TinyOS environment, which enables the proposed node to be easily configured to function as an individual health monitoring node or a node in a wireless body sensor network (BSN). The proposed node is used to set up a wireless BSN that can simultaneously collect ECG and PPG signals and monitor the results on the personal computer.

  15. Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment

    ERIC Educational Resources Information Center

    Shen, Liping; Wang, Minjuan; Shen, Ruimin

    2009-01-01

    Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,…

  16. Interventions for Children with Pervasive Developmental Disorders in Low and Middle Income Countries

    ERIC Educational Resources Information Center

    Hastings, Richard P.; Robertson, Janet; Yasamy, M. T.

    2012-01-01

    Background: Although interventions for children with pervasive developmental disorders (PDD) have been the focus of research effort and evidence reviews in many Western countries, this evidence has not been assessed in the context of low- and middle-income (LAMI) countries especially in terms of the fit with different cultures and resources.…

  17. Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Cheng, Yufang; Huang, Ruowen

    2012-01-01

    The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…

  18. Electrocortical Reflections of Face and Gaze Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, C.; Schuller, A-M.; Van Engeland, H.

    2006-01-01

    Background: Children with pervasive developmental disorder (PDD) show behavioral abnormalities in gaze and face processing, but recent studies have indicated that normal activation of face-specific brain areas in response to faces is possible in this group. It is not clear whether the brain activity related to gaze processing is also normal in…

  19. Etiology of Pervasive versus Situational Antisocial Behaviors: A Multi-informant Longitudinal Cohort Study

    ERIC Educational Resources Information Center

    Wertz, Jasmin; Zavos, Helena M. S.; Matthews, Timothy; Gray, Rebecca; Best-Lane, Janis; Pariante, Carmine M.; Moffitt, Terrie E.; Arseneault, Louise

    2016-01-01

    The aim of this study was to disentangle pervasive from situational antisocial behaviors using multiple informants, and to investigate their genetic and environmental etiologies in preadolescence and across time. Antisocial behaviors were assessed in 2,232 twins from the Environmental Risk (E-Risk) Longitudinal Twin Study at ages 5 and 12.…

  20. Preschool Boys with Pervasive Hyperactivity: Early Peer Functioning and Mother-Child Relationship Influences

    ERIC Educational Resources Information Center

    Keown, Louise J.; Woodward, Lianne J.

    2006-01-01

    This study compared the peer functioning of a community sample of preschool boys with pervasive hyperactivity (N=33) and comparison boys (N=34), and examined the extent to which any differences in peer functioning between these groups could be explained by comorbid child conduct problems and parenting factors. The quality of boys' peer relations…

  1. Developmental Specificity in Targeting and Teaching Play Activities to Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Lifter, Karin; Ellis, James; Cannon, Barbara; Anderson, Stephen R.

    2005-01-01

    Developmentally specific play programs were designed for three children with pervasive developmental disorders being served in a home-based program. Using the Developmental Play Assessment, six activities for each of three adjacent developmentally sequenced play categories were targeted for direct instruction using different toy sets. A modified…

  2. The cortical mouse: a piece of forgotten history in noninvasive brain–computer interfaces.

    PubMed

    Principe, Jose C

    2013-07-01

    Early research on brain-computer interfaces (BCIs) was fueled by the study of event-related potentials (ERPs) by Farwell and Donchin, who are rightly credited for laying important groundwork for the BCI field. However, many other researchers have made substantial contributions that have escaped the radar screen of the current BCI community. For example, in the late 1980s, I worked with a brilliant multidisciplinary research group in electrical engineering at the University of Florida, Gainesville, headed by Dr. Donald Childers. Childers should be well known to long-time members of the IEEE Engineering in Medicine and Biology Society since he was the editor-in-chief of IEEE Transactions on Biomedical Engineering in the 1970s and the recipient of one of the most prestigious society awards, the William J. Morlock Award, in 1973.

  3. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  4. The Art of Gamification; Teaching Sustainability and System Thinking by Pervasive Game Development

    ERIC Educational Resources Information Center

    Nordby, Anders; Øygardslia, Kristine; Sverdrup, Ulrik; Sverdrup, Harald

    2016-01-01

    In 2013 Hedmark University College conducted a research project where students from a game development project/study program developed and tested a Pervasive Game for learning as part of a class in System Thinking. The overall game goal was to teach Sustainability through System Thinking, and to give the students a real world experience with their…

  5. Pervasive negative effects of rewards on intrinsic motivation: The myth continues.

    PubMed

    Cameron, J; Banko, K M; Pierce, W D

    2001-01-01

    A major concern in psychology and education is that rewards decrease intrinsic motivation to perform activities. Over the past 30 years, more than 100 experimental studies have been conducted on this topic. In 1994, Cameron and Pierce conducted a meta-analysis of this literature and concluded that negative effects of reward were limited and could be easily prevented in applied settings. A more recent meta-analysis of the literature by Deci, Koestner, and Ryan (1999) shows pervasive negative effects of reward. The purpose of the present article is to resolve differences in previous meta-analytic findings and to provide a meta-analysis of rewards and intrinsic motivation that permits tests of competing theoretical explanations. Our results suggest that in general, rewards are not harmful to motivation to perform a task. Rewards given for low-interest tasks enhance free-choice intrinsic motivation. On high-interest tasks, verbal rewards produce positive effects on free-choice motivation and self-reported task interest. Negative effects are found on high-interest tasks when the rewards are tangible, expected (offered beforehand), and loosely tied to level of performance. When rewards are linked to level of performance, measures of intrinsic motivation increase or do not differ from a nonrewarded control group. Overall, the pattern of results indicates that reward contingencies do not have pervasive negative effects on intrinsic motivation. Theoretical and practical implications of the findings are addressed.

  6. Introduction to IEEE 841-1994, IEEE standard for petroleum and chemical industry: Severe duty totally enclosed fan-cooled (TEFC) squirrel cage induction motors -- up to and including 500 hp

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doughty, R.L.

    1995-12-31

    IEEE 841, Recommended Practice for Chemical Industry Severe Duty Squirrel-Cage Induction Motors--600 V and Below, first issued in 1986, has been significantly revised and reissued as a Standard. The scope has been increased to include severe duty TEFC squirrel-cage induction motors with antifriction bearings in sizes up to and including 500 horsepower. Motor rated voltages of 2,300 V and 4,000 V have been added. Changes to the standard are reviewed in detail. Requirements are identified that improve motor reliability and increase motor life.

  7. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  8. Impact of electric vehicles on the IEEE 34 node distribution infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jiang, Zeming; Shalalfel, Laith; Beshir, Mohammed J.

    With the growing penetration of the electric vehicles to our daily life owing to their economic and environmental benefits, there will be both opportunities and challenges to the utilities when adopting plug-in electric vehicles (PEV) to the distribution network. In this study, a thorough analysis based on real-world project is conducted to evaluate the impacts of electric vehicles infrastructure on the grid relating to system load flow, load factor, and voltage stability. IEEE 34 node test feeder was selected and tested along with different case scenarios utilizing the electrical distribution design (EDD) software to find out the potential impacts tomore » the grid.« less

  9. Impact of electric vehicles on the IEEE 34 node distribution infrastructure

    DOE PAGES

    Jiang, Zeming; Shalalfel, Laith; Beshir, Mohammed J.

    2014-10-01

    With the growing penetration of the electric vehicles to our daily life owing to their economic and environmental benefits, there will be both opportunities and challenges to the utilities when adopting plug-in electric vehicles (PEV) to the distribution network. In this study, a thorough analysis based on real-world project is conducted to evaluate the impacts of electric vehicles infrastructure on the grid relating to system load flow, load factor, and voltage stability. IEEE 34 node test feeder was selected and tested along with different case scenarios utilizing the electrical distribution design (EDD) software to find out the potential impacts tomore » the grid.« less

  10. Implementing Remote Image Capture/Control in a Wireless Sensor Network Utilizing the IEEE 802.15.4 Standard

    DTIC Science & Technology

    2009-09-01

    with the flexibility provided by a wireless sensor network , could provide such enhancements. The objective of this research was to explore the...feasibility of remote management and control of a low-power/low-cost wireless sensor network by implementing a point-to-point wireless network utilizing IEEE

  11. An Efficient Power Saving Mechanism for Delay-Guaranteed Services in IEEE 802.16e

    NASA Astrophysics Data System (ADS)

    Park, Yunju; Hwang, Gang Uk

    As the IEEE 802.16e Wireless Metropolitan Access Network (WMAN) supports the mobility of a mobile station (MS), increasing MS power efficiency has become an important issue. In this paper, we analyze the sleep-mode operation for an efficient power saving mechanism for delay-guaranteed services in the IEEE 802.16e WMAN and observe the effects of the operating parameters related to this operation. For the analysis we use the M/GI/1/K queueing system with multiple vacations, exhaustive services and setup times. In the analysis, we consider the power consumption during the wake-mode period as well as the sleep-mode period. As a performance measure for the power consumption, we propose the power consumption per unit time per effective arrival which considers the power consumption and the packet blocking probability simultaneously. In addition, since we consider delay-guaranteed services, the average packet response delay is also considered as a performance measure. Based on the performance measures, we obtain the optimal sleep-mode operation which minimizes the power consumption per unit time per effective arrival with a given delay requirement. Numerical studies are also provided to investigate the system performance and to show how to achieve our objective.

  12. Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications.

    PubMed

    Isenberg, Petra; Heimerl, Florian; Koch, Steffen; Isenberg, Tobias; Xu, Panpan; Stolper, Charles D; Sedlmair, Michael; Chen, Jian; Moller, Torsten; Stasko, John

    2017-09-01

    We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, and Vis. The information about each paper includes its title, abstract, authors, and citations to other papers in the conference series, among many other attributes. This article describes the motivation for creating the dataset, as well as our process of coalescing and cleaning the data, and a set of three visualizations we created to facilitate exploration of the data. This data is meant to be useful to the broad data visualization community to help understand the evolution of the field and as an example document collection for text data visualization research.

  13. Commentary on the Integration of Model Sharing and Reproducibility Analysis to Scholarly Publishing Workflow in Computational Biomechanics

    PubMed Central

    Erdemir, Ahmet; Guess, Trent M.; Halloran, Jason P.; Modenese, Luca; Reinbolt, Jeffrey A.; Thelen, Darryl G.; Umberger, Brian R.

    2016-01-01

    Objective The overall goal of this document is to demonstrate that dissemination of models and analyses for assessing the reproducibility of simulation results can be incorporated in the scientific review process in biomechanics. Methods As part of a special issue on model sharing and reproducibility in IEEE Transactions on Biomedical Engineering, two manuscripts on computational biomechanics were submitted: A. Rajagopal et al., IEEE Trans. Biomed. Eng., 2016 and A. Schmitz and D. Piovesan, IEEE Trans. Biomed. Eng., 2016. Models used in these studies were shared with the scientific reviewers and the public. In addition to the standard review of the manuscripts, the reviewers downloaded the models and performed simulations that reproduced results reported in the studies. Results There was general agreement between simulation results of the authors and those of the reviewers. Discrepancies were resolved during the necessary revisions. The manuscripts and instructions for download and simulation were updated in response to the reviewers’ feedback; changes that may otherwise have been missed if explicit model sharing and simulation reproducibility analysis were not conducted in the review process. Increased burden on the authors and the reviewers, to facilitate model sharing and to repeat simulations, were noted. Conclusion When the authors of computational biomechanics studies provide access to models and data, the scientific reviewers can download and thoroughly explore the model, perform simulations, and evaluate simulation reproducibility beyond the traditional manuscript-only review process. Significance Model sharing and reproducibility analysis in scholarly publishing will result in a more rigorous review process, which will enhance the quality of modeling and simulation studies and inform future users of computational models. PMID:28072567

  14. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks

    PubMed Central

    Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-01-01

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin−1(x)≈x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector. PMID:29278404

  15. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.

    PubMed

    Zhang, Gaoyuan; Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-12-26

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin - 1 ( x ) ≈ x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector.

  16. Interaction of Social and Play Behaviors in Preschoolers With and Without Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Pierce-Jordan, Sandra; Lifter, Karin

    2005-01-01

    This study investigated the relationship between the social and play behaviors of young children with pervasive developmental disorder (PDD) and without PDD. Videotaped observations of 21 preschool children (12 with PDD and 9 without PDD) were examined independently for (a) social complexity and (b) play complexity that was assessed on an…

  17. Hemispheric Processing of Idioms and Irony in Adults with and without Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Saban-Bezalel, Ronit; Mashal, Nira

    2015-01-01

    Previous studies on individuals with pervasive developmental disorders (PDD) have pointed to difficulties in comprehension of figurative language. Using the divided visual field paradigm, the present study examined hemispheric processing of idioms and irony in 23 adults with PDD and in 24 typically developing (TD) adults. The results show that…

  18. Understanding Pervasive Language Impairment in Young Children: Exploring Patterns in Narrative Language and Functional Communication

    ERIC Educational Resources Information Center

    Waters, Anna Jeddeloh

    2013-01-01

    Research has identified language impairment as a pervasive disability (Bishop & Edmundson, 1987; Greenhalgh & Strong, 2001). Classroom communication behaviors have a role in the maintenance of special education eligibility and functional communication difficulties for young children with language impairment. This paper reviews the…

  19. BabelFish-Tools for IEEE C37.118.2-compliant real-time synchrophasor data mediation

    NASA Astrophysics Data System (ADS)

    Almas, M. S.; Vanfretti, L.; Baudette, M.

    BabelFish (BF) is a real-time data mediator for development and fast prototyping of synchrophasor applications. BF is compliant with the synchrophasor data transmission IEEE Std C37.118.2-2011. BF establishes a TCP/IP connection with any Phasor Measurement Unit (PMU) or Phasor Data Concentrator (PDC) stream and parses the IEEE Std C37.118.2-2011 frames in real-time to provide access to raw numerical data in the LabVIEW environment. Furthermore, BF allows the user to select "data-of-interest" and transmit it to either a local or remote application using the User Datagram Protocol (UDP) in order to support both unicast and multicast communication. In the power systems Wide Area Monitoring Protection and Control (WAMPAC) domain, BF provides the first Free/Libre and Open Source Software (FLOSS) for the purpose of giving the users tools for fast prototyping of new applications processing PMU measurements in their chosen environment, thus liberating them of time consuming synchrophasor data handling and allowing them to develop applications in a modular fashion, without a need of a large and monolithic synchrophasor software environment.

  20. Standard-compliant real-time transmission of ECGs: harmonization of ISO/IEEE 11073-PHD and SCP-ECG.

    PubMed

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2009-01-01

    Ambient assisted living and integrated care in an aging society is based on the vision of the lifelong Electronic Health Record calling for HealthCare Information Systems and medical device interoperability. For medical devices this aim can be achieved by the consistent implementation of harmonized international interoperability standards. The ISO/IEEE 11073 (x73) family of standards is a reference standard for medical device interoperability. In its Personal Health Device (PHD) version several devices have been included, but an ECG device specialization is not yet available. On the other hand, the SCP-ECG standard for short-term diagnostic ECGs (EN1064) has been recently approved as an international standard ISO/IEEE 11073-91064:2009. In this paper, the relationships between a proposed x73-PHD model for an ECG device and the fields of the SCP-ECG standard are investigated. A proof-of-concept implementation of the proposed x73-PHD ECG model is also presented, identifying open issues to be addressed by standards development for the wider interoperability adoption of x73-PHD standards.

  1. Response to ‘pervasive sequence patents cover the entire human genome’ - authors’ reply

    PubMed Central

    2014-01-01

    An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14 PMID:24764495

  2. Formal analysis and evaluation of the back-off procedure in IEEE802.11P VANET

    NASA Astrophysics Data System (ADS)

    Jin, Li; Zhang, Guoan; Zhu, Xiaojun

    2017-07-01

    The back-off procedure is one of the media access control technologies in 802.11P communication protocol. It plays an important role in avoiding message collisions and allocating channel resources. Formal methods are effective approaches for studying the performances of communication systems. In this paper, we establish a discrete time model for the back-off procedure. We use Markov Decision Processes (MDPs) to model the non-deterministic and probabilistic behaviors of the procedure, and use the probabilistic computation tree logic (PCTL) language to express different properties, which ensure that the discrete time model performs their basic functionality. Based on the model and PCTL specifications, we study the effect of contention window length on the number of senders in the neighborhood of given receivers, and that on the station’s expected cost required by the back-off procedure to successfully send packets. The variation of the window length may increase or decrease the maximum probability of correct transmissions within a time contention unit. We propose to use PRISM model checker to describe our proposed back-off procedure for IEEE802.11P protocol in vehicle network, and define different probability properties formulas to automatically verify the model and derive numerical results. The obtained results are helpful for justifying the values of the time contention unit.

  3. Cascading Policies Provide Fault Tolerance for Pervasive Clinical Communications.

    PubMed

    Williams, Rose; Jalan, Srikant; Stern, Edie; Lussier, Yves A

    2005-03-21

    We implemented an end-to-end notification system that pushed urgent clinical laboratory results to Blackberry 7510 devices over the Nextel cellular network. We designed our system to use user roles and notification policies to abstract and execute clinical notification procedures. We anticipated some problems with dropped and non-delivered messages when the device was out-of-network, however, we did not expect the same problems in other situations like device reconnection to the network. We addressed these problems by creating cascading "fault tolerance" policies to drive notification escalation when messages timed-out or delivery failed. This paper describes our experience in providing an adaptable, fault tolerant pervasive notification system for delivering secure, critical, time-sensitive patient laboratory results.

  4. Pervasive, hard-wired and male: Qualitative study of how UK adolescents view alcohol-related aggression.

    PubMed

    Whitaker, Lydia; Brown, Stephen L; Young, Bridget; Fereday, Richard; Coyne, Sarah M; Qualter, Pamela

    2018-01-01

    Laboratory studies of alcohol-inexperienced adolescents show that aggression can be primed by alcohol-related stimuli, suggesting that alcohol-related aggression is partly socially learned. Script theory proposes that alcohol-related aggression 'scripts' for social behaviors are culturally-available and learned by individuals. The purpose of the study was to understand the content and origins of alcohol-related aggression scripts learned by adolescents. This qualitative focus group study of 40 adolescents (ages 14-16 years) examined alcohol-related aggression scripts. Participants believed aggression and severe injury to be pervasive when young people drink. Viewed through a biological lens, participants described aggression as an 'instinctive' and 'hard-wired' male trait facilitated by intoxication. As such, alcohol-related aggression was not seen as intended or personally controllable and participants did not see it in moral terms. Females were largely viewed as either bystanders of inter-male aggression or potential victims of male sexual aggression. Participants attributed their views on the frequency and nature of alcohol-related aggression to current affairs and reality television, which they felt portrayed a reality of which they had little experience. The origins of the explicitly biological frameworks that participants used seemed to lie in pre-existing beliefs about the nature of gender differences. Perceptions of the pervasiveness of male alcohol-related aggression, and the consequent failure to view alcohol-related aggression in moral terms, could dispose some young people to alcohol-related aggression. Interventions could target (1) the beliefs that alcohol-related aggression is pervasive and uncontrollable in males, and (2) participants' dysfunctional views of masculinity that underpin those beliefs.

  5. Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

    2007-01-01

    This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological…

  6. Retrospective Evaluation of an Intensive Method of Treatment for Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Vorgraft, Yitzchak; Farbstein, Ilana; Spiegel, Rene; Apter, Alan

    2007-01-01

    The objective of this preliminary study was to evaluate a novel intensive therapy program in young children with pervasive developmental disorder (PDD). Twenty-three children treated at the Mifne Institute in Israel between 1997 and 1999 were assessed. Videos taken before coming to Mifne and after intensive treatment at the institute and before…

  7. Analyzing the Engineering Educational Research in Spain: A Global Vision through the Awards of CESEI-IEEE

    ERIC Educational Resources Information Center

    Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.

    2011-01-01

    CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…

  8. Automatic Processing of Emotional Faces in High-Functioning Pervasive Developmental Disorders: An Affective Priming Study

    ERIC Educational Resources Information Center

    Kamio, Yoko; Wolf, Julie; Fein, Deborah

    2006-01-01

    This study examined automatic processing of emotional faces in individuals with high-functioning Pervasive Developmental Disorders (HFPDD) using an affective priming paradigm. Sixteen participants (HFPDD and matched controls) were presented with happy faces, fearful faces or objects in both subliminal and supraliminal exposure conditions, followed…

  9. Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

    2012-01-01

    The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold…

  10. The pervasive nature of unconscious social information processing in executive control

    PubMed Central

    Prabhakaran, Ranjani; Gray, Jeremy R.

    2012-01-01

    Humans not only have impressive executive abilities, but we are also fundamentally social creatures. In the cognitive neuroscience literature, it has long been assumed that executive control mechanisms, which play a critical role in guiding goal-directed behavior, operate on consciously processed information. Although more recent evidence suggests that unconsciously processed information can also influence executive control, most of this literature has focused on visual masked priming paradigms. However, the social psychological literature has demonstrated that unconscious influences are pervasive, and social information can unintentionally influence a wide variety of behaviors, including some that are likely to require executive abilities. For example, social information can unconsciously influence attention processes, such that simply instructing participants to describe a previous situation in which they had power over someone or someone else had power over them has been shown to unconsciously influence their attentional focus abilities, a key aspect of executive control. In the current review, we consider behavioral and neural findings from a variety of paradigms, including priming of goals and social hierarchical roles, as well as interpersonal interactions, in order to highlight the pervasive nature of social influences on executive control. These findings suggest that social information can play a critical role in executive control, and that this influence often occurs in an unconscious fashion. We conclude by suggesting further avenues of research for investigation of the interplay between social factors and executive control. PMID:22557956

  11. Pervasive negative effects of rewards on intrinsic motivation: The myth continues

    PubMed Central

    Cameron, Judy; Banko, Katherine M.; Pierce, W. David

    2001-01-01

    A major concern in psychology and education is that rewards decrease intrinsic motivation to perform activities. Over the past 30 years, more than 100 experimental studies have been conducted on this topic. In 1994, Cameron and Pierce conducted a meta-analysis of this literature and concluded that negative effects of reward were limited and could be easily prevented in applied settings. A more recent meta-analysis of the literature by Deci, Koestner, and Ryan (1999) shows pervasive negative effects of reward. The purpose of the present article is to resolve differences in previous meta-analytic findings and to provide a meta-analysis of rewards and intrinsic motivation that permits tests of competing theoretical explanations. Our results suggest that in general, rewards are not harmful to motivation to perform a task. Rewards given for low-interest tasks enhance free-choice intrinsic motivation. On high-interest tasks, verbal rewards produce positive effects on free-choice motivation and self-reported task interest. Negative effects are found on high-interest tasks when the rewards are tangible, expected (offered beforehand), and loosely tied to level of performance. When rewards are linked to level of performance, measures of intrinsic motivation increase or do not differ from a nonrewarded control group. Overall, the pattern of results indicates that reward contingencies do not have pervasive negative effects on intrinsic motivation. Theoretical and practical implications of the findings are addressed. PMID:22478353

  12. [Obsessive-compulsive symptoms, tics, stereotypic movements or need for absolute consistency? The occurrence of repetitive activities in patients with pervasive developmental disorders--case studies].

    PubMed

    Bryńska, Anita; Lipińska, Elzbieta; Matelska, Monika

    2011-01-01

    Repetitive and stereotyped behaviours in the form of stereotyped interests or specific routine activities are one ofthe diagnostic criteria in pervasive developmental disorders. The occurrence of repetitive behaviours in patients with pervasive developmental disorders is a starting point for questions about the type and classification criteria of such behaviours. The aim of the article is to present case studies of patients with pervasive developmental disorders and co-morbid symptoms in the form of routine activities, tics, obsessive-compulsive symptoms or stereotyped behaviours. The first case study describes a patient with Asperger's syndrome and obsessive compulsive symptoms. The diagnostic problems regarding complex motor tics are discussed in the second case study which describes a patient with Asperger's syndrome and Gilles de la Tourette syndrome. The third and fourth case study describes mono-zygotic twins with so called High Functioning Autism whose repetitive activities point to either obsessive compulsive symptoms, stereotypic movements, need for absolute consistency or echopraxia. The possible comorbidity of pervasive developmental disorders and symptoms in the form of repetitive behaviours, possible interactions as well as diagnostic challenges is discussed in the article.

  13. The use of computer vision in an intelligent environment to support aging-in-place, safety, and independence in the home.

    PubMed

    Mihailidis, Alex; Carmichael, Brent; Boger, Jennifer

    2004-09-01

    This paper discusses the use of computer vision in pervasive healthcare systems, specifically in the design of a sensing agent for an intelligent environment that assists older adults with dementia during an activity of daily living. An overview of the techniques applied in this particular example is provided, along with results from preliminary trials completed using the new sensing agent. A discussion of the results obtained to date is presented, including technical and social issues that remain for the advancement and acceptance of this type of technology within pervasive healthcare.

  14. Computational estimation of magnetically induced electric fields in a rotating head

    NASA Astrophysics Data System (ADS)

    Ilvonen, Sami; Laakso, Ilkka

    2009-01-01

    Change in a magnetic field, or similarly, movement in a strong static magnetic field induces electric fields in human tissues, which could potentially cause harmful effects. In this paper, the fields induced by different rotational movements of a head in a strong homogeneous magnetic field are computed numerically. Average field magnitudes near the retinas and inner ears are studied in order to gain insight into the causes of phosphenes and vertigo-like effects, which are associated with extremely low-frequency (ELF) magnetic fields. The induced electric fields are calculated in four different anatomically realistic head models using an efficient finite-element method (FEM) solver. The results are compared with basic restriction limits by IEEE and ICNIRP. Under rotational movement of the head, with a magnetic flux rate of change of 1 T s-1, the maximum IEEE-averaged electric field and maximum ICNIRP-averaged current density were 337 mV m-1 and 8.84 mA m-2, respectively. The limits by IEEE seem significantly stricter than those by ICNIRP. The results show that a magnetic flux rate of change of 1 T s-1 may induce electric field in the range of 50 mV m-1 near retinas, and possibly even larger values near the inner ears. These results provide information for approximating the threshold electric field values of phosphenes and vertigo-like effects.

  15. Enhanced delegated computing using coherence

    NASA Astrophysics Data System (ADS)

    Barz, Stefanie; Dunjko, Vedran; Schlederer, Florian; Moore, Merritt; Kashefi, Elham; Walmsley, Ian A.

    2016-03-01

    A longstanding question is whether it is possible to delegate computational tasks securely—such that neither the computation nor the data is revealed to the server. Recently, both a classical and a quantum solution to this problem were found [C. Gentry, in Proceedings of the 41st Annual ACM Symposium on the Theory of Computing (Association for Computing Machinery, New York, 2009), pp. 167-178; A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, 2009), pp. 517-526]. Here, we study the first step towards the interplay between classical and quantum approaches and show how coherence can be used as a tool for secure delegated classical computation. We show that a client with limited computational capacity—restricted to an XOR gate—can perform universal classical computation by manipulating information carriers that may occupy superpositions of two states. Using single photonic qubits or coherent light, we experimentally implement secure delegated classical computations between an independent client and a server, which are installed in two different laboratories and separated by 50 m . The server has access to the light sources and measurement devices, whereas the client may use only a restricted set of passive optical devices to manipulate the information-carrying light beams. Thus, our work highlights how minimal quantum and classical resources can be combined and exploited for classical computing.

  16. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    PubMed Central

    Sakin, Sayef Azad; Alamri, Atif; Tran, Nguyen H.

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies. PMID:29215591

  17. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel.

    PubMed

    Sakin, Sayef Azad; Razzaque, Md Abdur; Hassan, Mohammad Mehedi; Alamri, Atif; Tran, Nguyen H; Fortino, Giancarlo

    2017-12-07

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  18. The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition

    ERIC Educational Resources Information Center

    Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.

    2008-01-01

    Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of…

  19. Preliminary Development of a Computational Model of a Dielectric Barrier Discharge

    DTIC Science & Technology

    2004-12-01

    Gerhard Pietsch . "Microdischarges in Air-Fed Ozonizers," Journal of Physics D: Applied Physics, Vol 24, 1991, pp 564-572. 14 Baldur Eliasson. "Modeling...Gibalov and Gerhard Pietsch . "Two-dimensional Modeling of the Dielectric Barrier Discharge in Air," Plasma Sources Science Technology, 1 (1992), pp. 166...Computer Modeling," IEEE Transactions on Plasma Science, 27 (1), February 1999, pp 36-37. 19 Valentin I Gibalov and Gerhard J. Pietsch . "The

  20. Promoting Social Skill Development in Children with Pervasive Developmental Disorders: A Feasibility and Efficacy Study

    ERIC Educational Resources Information Center

    Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence

    2010-01-01

    A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment…

  1. Architectural and Functional Design and Evaluation of E-Learning VUIS Based on the Proposed IEEE LTSA Reference Model.

    ERIC Educational Resources Information Center

    O'Droma, Mairtin S.; Ganchev, Ivan; McDonnell, Fergal

    2003-01-01

    Presents a comparative analysis from the Institute of Electrical and Electronics Engineers (IEEE) Learning Technology Standards Committee's (LTSC) of the architectural and functional design of e-learning delivery platforms and applications, e-learning course authoring tools, and learning management systems (LMSs), with a view of assessing how…

  2. Evaluating the Performance of the IEEE Standard 1366 Method for Identifying Major Event Days

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eto, Joseph H.; LaCommare, Kristina Hamachi; Sohn, Michael D.

    IEEE Standard 1366 offers a method for segmenting reliability performance data to isolate the effects of major events from the underlying year-to-year trends in reliability. Recent analysis by the IEEE Distribution Reliability Working Group (DRWG) has found that reliability performance of some utilities differs from the expectations that helped guide the development of the Standard 1366 method. This paper proposes quantitative metrics to evaluate the performance of the Standard 1366 method in identifying major events and in reducing year-to-year variability in utility reliability. The metrics are applied to a large sample of utility-reported reliability data to assess performance of themore » method with alternative specifications that have been considered by the DRWG. We find that none of the alternatives perform uniformly 'better' than the current Standard 1366 method. That is, none of the modifications uniformly lowers the year-to-year variability in System Average Interruption Duration Index without major events. Instead, for any given alternative, while it may lower the value of this metric for some utilities, it also increases it for other utilities (sometimes dramatically). Thus, we illustrate some of the trade-offs that must be considered in using the Standard 1366 method and highlight the usefulness of the metrics we have proposed in conducting these evaluations.« less

  3. Pervasive, hard-wired and male: Qualitative study of how UK adolescents view alcohol-related aggression

    PubMed Central

    Whitaker, Lydia; Young, Bridget; Fereday, Richard; Coyne, Sarah M.; Qualter, Pamela

    2018-01-01

    Laboratory studies of alcohol-inexperienced adolescents show that aggression can be primed by alcohol-related stimuli, suggesting that alcohol-related aggression is partly socially learned. Script theory proposes that alcohol-related aggression ‘scripts’ for social behaviors are culturally-available and learned by individuals. The purpose of the study was to understand the content and origins of alcohol-related aggression scripts learned by adolescents. This qualitative focus group study of 40 adolescents (ages 14–16 years) examined alcohol-related aggression scripts. Participants believed aggression and severe injury to be pervasive when young people drink. Viewed through a biological lens, participants described aggression as an ‘instinctive’ and ‘hard-wired’ male trait facilitated by intoxication. As such, alcohol-related aggression was not seen as intended or personally controllable and participants did not see it in moral terms. Females were largely viewed as either bystanders of inter-male aggression or potential victims of male sexual aggression. Participants attributed their views on the frequency and nature of alcohol-related aggression to current affairs and reality television, which they felt portrayed a reality of which they had little experience. The origins of the explicitly biological frameworks that participants used seemed to lie in pre-existing beliefs about the nature of gender differences. Perceptions of the pervasiveness of male alcohol-related aggression, and the consequent failure to view alcohol-related aggression in moral terms, could dispose some young people to alcohol-related aggression. Interventions could target (1) the beliefs that alcohol-related aggression is pervasive and uncontrollable in males, and (2) participants’ dysfunctional views of masculinity that underpin those beliefs. PMID:29408910

  4. Smartphone as a personal, pervasive health informatics services platform: literature review.

    PubMed

    Wac, K

    2012-01-01

    The article provides an overview of current trends in personal sensor, signal and imaging informatics, that are based on emerging mobile computing and communications technologies enclosed in a smartphone and enabling the provision of personal, pervasive health informatics services. The article reviews examples of these trends from the PubMed and Google scholar literature search engines, which, by no means claim to be complete, as the field is evolving and some recent advances may not be documented yet. There exist critical technological advances in the surveyed smartphone technologies, employed in provision and improvement of diagnosis, acute and chronic treatment and rehabilitation health services, as well as in education and training of healthcare practitioners. However, the most emerging trend relates to a routine application of these technologies in a prevention/wellness sector, helping its users in self-care to stay healthy. Smartphone-based personal health informatics services exist, but still have a long way to go to become an everyday, personalized healthcare-provisioning tool in the medical field and in a clinical practice. Key main challenge for their widespread adoption involve lack of user acceptance striving from variable credibility and reliability of applications and solutions as they a) lack evidence- based approach; b) have low levels of medical professional involvement in their design and content; c) are provided in an unreliable way, influencing negatively its usability; and, in some cases, d) being industry-driven, hence exposing bias in information provided, for example towards particular types of treatment or intervention procedures.

  5. Biomedical learning experiences for middle school girls sponsored by the Kansas State University Student Chapter of the IEEE EMBS.

    PubMed

    Gruber, Lucinda; Griffith, Connor; Young, Ethan; Sullivan, Adriann; Schuler, Jeff; Arnold-Christian, Susan; Warren, Steve

    2009-01-01

    Learning experiences for middle school girls are an effective means to steer young women toward secondary engineering curricula that they might not have otherwise considered. Sponsorship of such experiences by a collegiate student group is worthwhile, as it gives the group common purpose and places college students in a position to mentor these young women. This paper addresses learning experiences in different areas of bio-medical engineering offered to middle school girls in November 2008 via a day-long workshop entitled "Engineering The Body." The Kansas State University (KSU) Student Chapter of the IEEE Engineering in Medicine and Biology Society (EMBS) worked with the KSU Women in Engineering and Science Program (WESP) to design and sponsor these experiences, which addressed the areas of joint mechanics, electrocardiograms, membrane transport, computer mouse design, and audio filters for cochlear implants. Fifty five middle-school girls participated in this event, affirming the notion that biomedical engineering appeals to young women and that early education and recruitment efforts have the potential to expand the biomedical engineering talent pool.

  6. The ac power line protection for an IEEE 587 Class B environment

    NASA Technical Reports Server (NTRS)

    Roehr, W. D.; Clark, O. M.

    1984-01-01

    The 587B series of protectors are unique, low clamping voltage transient suppressors to protect ac-powered equipment from the 6000V peak open-circuit voltage and 3000A short circuit current as defined in IEEE standard 587 for Category B transients. The devices, which incorporate multiple-stage solid-state protector components, were specifically designed to operate under multiple exposures to maximum threat levels in this severe environment. The output voltage peaks are limited to 350V under maximum threat conditions for a 120V ac power line, thus providing adequate protection to vulnerable electronic equipment. The principle of operation and test performance data is discussed.

  7. IEEE-1588(Trademark) Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems

    DTIC Science & Technology

    2002-12-01

    34th Annual Precise Time and Time Interval (PTTI) Meeting 243 IEEE-1588™ STANDARD FOR A PRECISION CLOCK SYNCHRONIZATION PROTOCOL FOR... synchronization . 2. Cyclic-systems. In cyclic-systems, timing is periodic and is usually defined by the characteristics of a cyclic network or bus...incommensurate, timing schedules for each device are easily implemented. In addition, synchronization accuracy depends on the accuracy of the common

  8. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    PubMed

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.

  9. Multimodal and ubiquitous computing systems: supporting independent-living older users.

    PubMed

    Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate

    2004-09-01

    We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.

  10. Pervasive Developmental Disorder Behavior in Adolescents with Intellectual Disability and Co-Occurring Somatic Chronic Diseases

    ERIC Educational Resources Information Center

    Oeseburg, B.; Groothoff, J. W.; Dijkstra, G. J.; Reijneveld, S. A.; Jansen, D. E. M. C.

    2010-01-01

    Evidence on the association between somatic chronic diseases in ID-adolescents and the full range of pervasive developmental disorder behavior (PDD behavior) is scarce. The aim of the present study is to assess the association between somatic chronic diseases in ID-adolescents and mild PDD behavior. We obtained data on 1044 ID-adolescents, aged…

  11. A mathematical problem and a Spacecraft Control Laboratory Experiment (SCOLE) used to evaluate control laws for flexible spacecraft. NASA/IEEE design challenge

    NASA Technical Reports Server (NTRS)

    Taylor, Lawrence W., Jr.; Balakrishnan, A. V.

    1988-01-01

    The problen of controlling large, flexible space systems has been evaluated using computer simulation. In several cases, ground experiments have also been used to validate system performance under more realistic conditions. There remains a need, however, to test additional control laws for flexible spacecraft and to directly compare competing design techniques. A program is discussed which has been initiated to make direct comparisons of control laws for, first, a mathematical problem, then and experimental test article being assembled under the cognizance of the Spacecraft Control Branch at the NASA Langley Research Center with the advice and counsel of the IEEE Subcommittee on Large Space Structures. The physical apparatus will consist of a softly supported dynamic model of an antenna attached to the Shuttle by a flexible beam. The control objective will include the task of directing the line-of-sight of the Shuttle antenna configuration toward a fixed target, under conditions of noisy data, control authority and random disturbances.

  12. Social Skills Groups for Asperger’s Disorder and Pervasive Developmental Disorder Not Otherwise Specified

    PubMed Central

    2008-01-01

    Pervasive developmental disorders (PDD) including Asperger’s disorder are relatively rare conditions that can be very disabling for individuals affected. This article focuses on social skills therapy, looking at research that has been completed in a group therapy format and then using composite case examples to review basic techniques that have been used to teach social skills to children with a diagnosis of PDD. PMID:19727303

  13. Unlocking the Barriers to Women and Minorities in Computer Science and Information Systems Studies: Results from a Multi-Methodological Study Conducted at Two Minority Serving Institutions

    ERIC Educational Resources Information Center

    Buzzetto-More, Nicole; Ukoha, Ojiabo; Rustagi, Narendra

    2010-01-01

    The under representation of women and minorities in undergraduate computer science and information systems programs is a pervasive and persistent problem in the United States. Needed is a better understanding of the background and psychosocial factors that attract, or repel, minority students from computing disciplines. An examination of these…

  14. Designing an architectural style for Pervasive Healthcare systems.

    PubMed

    Rafe, Vahid; Hajvali, Masoumeh

    2013-04-01

    Nowadays, the Pervasive Healthcare (PH) systems are considered as an important research area. These systems have a dynamic structure and configuration. Therefore, an appropriate method for designing such systems is necessary. The Publish/Subscribe Architecture (pub/sub) is one of the convenient architectures to support such systems. PH systems are safety critical; hence, errors can bring disastrous results. To prevent such problems, a powerful analytical tool is required. So using a proper formal language like graph transformation systems for developing of these systems seems necessary. But even if software engineers use such high level methodologies, errors may occur in the system under design. Hence, it should be investigated automatically and formally that whether this model of system satisfies all their requirements or not. In this paper, a dynamic architectural style for developing PH systems is presented. Then, the behavior of these systems is modeled and evaluated using GROOVE toolset. The results of the analysis show its high reliability.

  15. Proceeding of the ACM/IEEE-CS Joint Conference on Digital Libraries (1st, Roanoke, Virginia, June 24-28, 2001).

    ERIC Educational Resources Information Center

    Association for Computing Machinery, New York, NY.

    Papers in this Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (Roanoke, Virginia, June 24-28, 2001) discuss: automatic genre analysis; text categorization; automated name authority control; automatic event generation; linked active content; designing e-books for legal research; metadata harvesting; mapping the…

  16. Semiconductor Nanowire and Nanoribbon Thermoelectrics: A Comprehensive Computational Study

    DTIC Science & Technology

    2013-05-01

    August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5698047 4. Z. Aksamija and I. Knezevic...Korea (August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5697827 5. D. Vasileska, K. Raleva, S. M...IWCE 2010) Available online through IEEE Xplore , http://dx.doi.org/10.1109/IWCE.2010.5677916 6. E. B. Ramayya and I. Knezevic, “Ultrascaled

  17. Introspections on the Semantic Gap

    DTIC Science & Technology

    2015-04-14

    cloud comput - ing. Zhang received an MS in computer science from Stony Brook University. Contact him at dozhang@ cs.stonybrook.edu. Donald E. Porter...designated by other documentation. ... 2 March/April 2015 Copublished by the IEEE Computer and Reliability Societies 1540-7993/15/$31.00 © 2015 IEEE IEEE S...pauses the VM, and the VMI tool introspects the process descriptor list. In contrast, an asynchronous mechanism would intro - spect memory

  18. Evidence of pervasive biologically functional secondary structures within the genomes of eukaryotic single-stranded DNA viruses.

    PubMed

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y F; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie; Martin, Darren Patrick

    2014-02-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here.

  19. Evidence of Pervasive Biologically Functional Secondary Structures within the Genomes of Eukaryotic Single-Stranded DNA Viruses

    PubMed Central

    Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adérito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie

    2014-01-01

    Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329

  20. No Pervasive Computing Without Intelligent Systems

    NASA Astrophysics Data System (ADS)

    Thompson, S. G.; Azvine, B.

    It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.

  1. Performance trade-off in an adaptive IEEE 802.11ad waveform design for a joint automotive radar and communication system.

    DOT National Transportation Integrated Search

    2017-05-01

    The IEEE 802.11ad waveform can be used for automotive radar by exploiting the Golay complementary sequences in the preamble of a frame. The performance of radar, however, is limited by the preamble structure. In this paper, we propose an adaptive pre...

  2. An Overview of High Performance Computing and Challenges for the Future

    ScienceCinema

    Google Tech Talks

    2017-12-09

    includes the development, testing and documentation of high quality mathematical software. He has contributed to the design and implementation of the following open source software packages and systems: EISPACK, LINPACK, the BLAS, LAPACK, ScaLAPACK, Netlib, PVM, MPI, NetSolve, Top500, ATLAS, and PAPI. He has published approximately 200 articles, papers, reports and technical memoranda and he is coauthor of several books. He was awarded the IEEE Sid Fernbach Award in 2004 for his contributions in the application of high performance computers using innovative approaches. He is a Fellow of the AAAS, ACM, and the IEEE and a member of the National Academy of Engineering.

  3. Beamforming Transmission in IEEE 802.11ac under Time-Varying Channels

    PubMed Central

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes. PMID:25152927

  4. Beamforming transmission in IEEE 802.11ac under time-varying channels.

    PubMed

    Yu, Heejung; Kim, Taejoon

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.

  5. Performance evaluation of complete data transfer of physical layer according to IEEE 802.15.4 standard

    NASA Astrophysics Data System (ADS)

    Raju, Kota Solomon; Merugu, Naresh Babu; Neetu, Babu, E. Ram

    2016-03-01

    ZigBee is well-accepted industrial standard for wireless sensor networks based on IEEE 802.15.4 standard. Wireless Sensor Networks is the major concern of communication these days. These Wireless Sensor Networks investigate the properties of networks of small battery-powered sensors with wireless communication. The communication between any two wireless nodes of wireless sensor networks is carried out through a protocol stack. This protocol stack has been designed by different vendors in various ways. Every custom vendor possesses his own protocol stack and algorithms especially at the MAC layer. But, many applications require modifications in their algorithms at various layers as per their requirements, especially energy efficient protocols at MAC layer that are simulated in Wireless sensor Network Simulators which are not being tested in real time systems because vendors do not allow the programmability of each layer in their protocol stack. This problem can be quoted as Vendor-Interoperability. The solution is to develop the programmable protocol stack where we can design our own application as required. As a part of the task first we tried implementing physical layer and transmission of data using physical layer. This paper describes about the transmission of the total number of bytes of Frame according to the IEEE 802.15.4 standard using Physical Layer.

  6. Facial Electromyographic Responses to Emotional Information from Faces and Voices in Individuals with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

    2007-01-01

    Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual…

  7. 7SK-BAF axis controls pervasive transcription at enhancers

    PubMed Central

    Flynn, Ryan A.; Do, Brian T.; Rubin, Adam J.; Calo, Eliezer; Lee, Byron; Kuchelmeister, Hannes; Rale, Michael; Chu, Ci; Kool, Eric T.; Wysocka, Joanna; Khavari, Paul A.

    2016-01-01

    RNA functions at enhancers remain mysterious. Here we show that the 7SK small nuclear RNA (snRNA) inhibits enhancer transcription by modulating nucleosome position. 7SK occupies enhancers and super enhancers genome-wide in mouse and human cells, and 7SK is required to limit eRNA initiation and synthesis in a manner distinct from promoter pausing. Clustered elements at super enhancers uniquely require 7SK to prevent convergent transcription and DNA damage signaling. 7SK physically interacts with the BAF chromatin remodeling complex, recruit BAF to enhancers, and inhibits enhancer transcription by modulating chromatin structure. In turn, 7SK occupancy at enhancers coincides with Brd4 and is exquisitely sensitive to the bromodomain inhibitor JQ1. Thus, 7SK employs distinct mechanisms to counteract diverse consequences of pervasive transcription that distinguish super enhancers, enhancers, and promoters. PMID:26878240

  8. Simple video format for mobile applications

    NASA Astrophysics Data System (ADS)

    Smith, John R.; Miao, Zhourong; Li, Chung-Sheng

    2000-04-01

    With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.

  9. A Novel Energy Saving Algorithm with Frame Response Delay Constraint in IEEE 802.16e

    NASA Astrophysics Data System (ADS)

    Nga, Dinh Thi Thuy; Kim, Mingon; Kang, Minho

    Sleep-mode operation of a Mobile Subscriber Station (MSS) in IEEE 802.16e effectively saves energy consumption; however, it induces frame response delay. In this letter, we propose an algorithm to quickly find the optimal value of the final sleep interval in sleep-mode in order to minimize energy consumption with respect to a given frame response delay constraint. The validations of our proposed algorithm through analytical results and simulation results suggest that our algorithm provide a potential guidance to energy saving.

  10. Computer vision-based classification of hand grip variations in neurorehabilitation.

    PubMed

    Zariffa, José; Steeves, John D

    2011-01-01

    The complexity of hand function is such that most existing upper limb rehabilitation robotic devices use only simplified hand interfaces. This is in contrast to the importance of the hand in regaining function after neurological injury. Computer vision technology has been used to identify hand posture in the field of Human Computer Interaction, but this approach has not been translated to the rehabilitation context. We describe a computer vision-based classifier that can be used to discriminate rehabilitation-relevant hand postures, and could be integrated into a virtual reality-based upper limb rehabilitation system. The proposed system was tested on a set of video recordings from able-bodied individuals performing cylindrical grasps, lateral key grips, and tip-to-tip pinches. The overall classification success rate was 91.2%, and was above 98% for 6 out of the 10 subjects. © 2011 IEEE

  11. Use of drawings in children with pervasive developmental disorder during hospitalization: a developmental perspective.

    PubMed

    Stefanatou, Athena

    2008-12-01

    The level and nature of emotional upheaval and relationship to developmental stage was studied in children with pervasive developmental disorder (PDD) hospitalized for head injury. The sample consisted of 25 hospitalized children aged 5-12 years. Children were asked to make the drawing of a ;person in hospital'. The drawings were evaluated by Koppitz's emotional indicators. Punishment and persecution were the main cognitive constructs of children in order to explain hospitalization.

  12. Emotional distress and its correlates among parents of children with pervasive developmental disorders.

    PubMed

    Yamada, Atsurou; Suzuki, Miyoshi; Kato, Misuzu; Suzuki, Mie; Tanaka, Sayumi; Shindo, Takuo; Taketani, Kazuo; Akechi, Tatsuo; Furukawa, Toshi A

    2007-12-01

    A number of studies have reported that parents of autistic children face higher levels of stress, but few studies examined the stress associated with the home care of children with pervasive developmental disorders (PDD) other than autistic disorder. The aims of the present study were therefore to (i) evaluate the emotional stress level of parents caring for their children with PDD; and (ii) explore the correlates of their emotional stress. Participants were 147 families (147 mothers and 122 fathers) of 158 children with PDD (42 with autistic disorder, 35 with Asperger's disorder and 81 with PDD not otherwise specified). K6 was used to measure the stress level of the parents. Marital relationships and personality were assessed with the Intimate Bond Measure and the NEO Five-Factor Inventory, respectively. The parents also rated the characteristics of their children with PDD through the Pervasive Developmental Disorder-Autism Society Japan Rating Scale (PARS). The mean K6 score of the mothers was significantly higher than that of the women in the general population in Japan. Stepwise multiple regression indicated that the emotional stress of the mothers was correlated with the personality traits of Neuroticism and Agreeableness, perceived Control by the husband, and the children's PARS score. Clinicians can deliver better service by paying appropriate attention to the emotional distress of mothers of children with not only autistic disorder but also other PDD.

  13. Pervasive developmental disorders: a 10-year review.

    PubMed

    Tanguay, P E

    2000-09-01

    To summarize recent advances about the nature, diagnosis, and treatment of pervasive developmental disorders. Review of Medline databases, books, and book chapters published between July 1989 and November 1999. Clinical and genetic studies support expansion of the concept of autism to include a broader spectrum of social communication handicaps. The prevalence of autism is approximately 1 per 2,000; the prevalence of autism and Asperger's disorder together is 1 per 1,000. The Checklist for Autism in Toddlers is a useful screening instrument for 18-month-old children; the Autism Diagnostic Interview-Revised and the Autism Diagnostic Observation Schedule are instruments of choice for research. Although twin and family studies clearly support genetic factors as important in autism, linkage analysis studies indicate that many genes may be involved. There is no one treatment of choice. Social-pragmatic approaches, augmented by individualized strategies and social coaching, may be best for teaching social communication skills. Pharmacological interventions have a limited role in improving social communication, but selective serotonin reuptake inhibitors and atypical neuroleptic medications may help ameliorate aggression, hyperactivity, and other secondary problems. Private and government agencies must continue to support basic and applied research.

  14. Donepezil in the Treatment of ADHD-Like Symptoms in Youths with Pervasive Developmental Disorder: A Case Series

    ERIC Educational Resources Information Center

    Doyle, Robert L.; Frazier, Jean; Spencer, Thomas J.; Geller, Daniel; Biederman, Joseph; Wilens, Timothy

    2006-01-01

    Background: Recent studies reported ADHD-like symptoms and cognitive deficits in pervasive developmental disorder (PDD). Because work in dementia documents improvement in executive function deficits with the acetylcholinesterase inhibitor donepezil, the authors reason that similar benefits could be obtained in PDD. Method: The authors describe…

  15. Permanency analysis on human electroencephalogram signals for pervasive Brain-Computer Interface systems.

    PubMed

    Sadeghi, Koosha; Junghyo Lee; Banerjee, Ayan; Sohankar, Javad; Gupta, Sandeep K S

    2017-07-01

    Brain-Computer Interface (BCI) systems use some permanent features of brain signals to recognize their corresponding cognitive states with high accuracy. However, these features are not perfectly permanent, and BCI system should be continuously trained over time, which is tedious and time consuming. Thus, analyzing the permanency of signal features is essential in determining how often to repeat training. In this paper, we monitor electroencephalogram (EEG) signals, and analyze their behavior through continuous and relatively long period of time. In our experiment, we record EEG signals corresponding to rest state (eyes open and closed) from one subject everyday, for three and a half months. The results show that signal features such as auto-regression coefficients remain permanent through time, while others such as power spectral density specifically in 5-7 Hz frequency band are not permanent. In addition, eyes open EEG data shows more permanency than eyes closed data.

  16. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    DTIC Science & Technology

    2015-06-01

    system accuracy. The AnRAD system was also generalized for the additional application of network intrusion detection . A self-structuring technique...to Host- based Intrusion Detection Systems using Contiguous and Discontiguous System Call Patterns,” IEEE Transactions on Computer, 63(4), pp. 807...square kilometer areas. The anomaly recognition and detection (AnRAD) system was built as a cogent confabulation network . It represented road

  17. The Pervasiveness of Racial Prejudice in Higher Education in the U.S.: Raising Awareness and Solution

    ERIC Educational Resources Information Center

    Osa, Justina O.

    2007-01-01

    Racial diversity is one of the greatest strengths of America?s higher education system. But racial prejudice is entrenched and pervasive in many campuses of institutions of higher learning. A close observation reveals that racial prejudice is not restricted to any race. As much as one would like to believe that simply passing legislations and…

  18. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    PubMed Central

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358

  19. A study of IEEE 802.15.4 security framework for wireless body area networks.

    PubMed

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  20. Memristive Computational Architecture of an Echo State Network for Real-Time Speech Emotion Recognition

    DTIC Science & Technology

    2015-05-28

    recognition is simpler and requires less computational resources compared to other inputs such as facial expressions . The Berlin database of Emotional ...Processing Magazine, IEEE, vol. 18, no. 1, pp. 32– 80, 2001. [15] K. R. Scherer, T. Johnstone, and G. Klasmeyer, “Vocal expression of emotion ...Network for Real-Time Speech- Emotion Recognition 5a. CONTRACT NUMBER IN-HOUSE 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 62788F 6. AUTHOR(S) Q

  1. Versatile, low-cost, computer-controlled, sample positioning system for vacuum applications

    NASA Technical Reports Server (NTRS)

    Vargas-Aburto, Carlos; Liff, Dale R.

    1991-01-01

    A versatile, low-cost, easy to implement, microprocessor-based motorized positioning system (MPS) suitable for accurate sample manipulation in a Second Ion Mass Spectrometry (SIMS) system, and for other ultra-high vacuum (UHV) applications was designed and built at NASA LeRC. The system can be operated manually or under computer control. In the latter case, local, as well as remote operation is possible via the IEEE-488 bus. The position of the sample can be controlled in three linear orthogonal and one angular coordinates.

  2. Automatically augmenting lifelog events using pervasively generated content from millions of people.

    PubMed

    Doherty, Aiden R; Smeaton, Alan F

    2010-01-01

    In sensor research we take advantage of additional contextual sensor information to disambiguate potentially erroneous sensor readings or to make better informed decisions on a single sensor's output. This use of additional information reinforces, validates, semantically enriches, and augments sensed data. Lifelog data is challenging to augment, as it tracks one's life with many images including the places they go, making it non-trivial to find associated sources of information. We investigate realising the goal of pervasive user-generated content based on sensors, by augmenting passive visual lifelogs with "Web 2.0" content collected by millions of other individuals.

  3. Video and computer games: effect on children and implications for health education.

    PubMed

    Dorman, S M

    1997-04-01

    Video and computer-based games have assumed a prominent role in the culture of American children and adolescents. Given the pervasiveness of their influence, it is likely that these games may affect the health and well-being of children. This paper examines the health effects of these games on children, suggests criteria upon which parents and teachers may evaluate the games, and notes some implications for health educators.

  4. Seven Pervasive Statistical Flaws in Cognitive Training Interventions

    PubMed Central

    Moreau, David; Kirk, Ian J.; Waldie, Karen E.

    2016-01-01

    The prospect of enhancing cognition is undoubtedly among the most exciting research questions currently bridging psychology, neuroscience, and evidence-based medicine. Yet, convincing claims in this line of work stem from designs that are prone to several shortcomings, thus threatening the credibility of training-induced cognitive enhancement. Here, we present seven pervasive statistical flaws in intervention designs: (i) lack of power; (ii) sampling error; (iii) continuous variable splits; (iv) erroneous interpretations of correlated gain scores; (v) single transfer assessments; (vi) multiple comparisons; and (vii) publication bias. Each flaw is illustrated with a Monte Carlo simulation to present its underlying mechanisms, gauge its magnitude, and discuss potential remedies. Although not restricted to training studies, these flaws are typically exacerbated in such designs, due to ubiquitous practices in data collection or data analysis. The article reviews these practices, so as to avoid common pitfalls when designing or analyzing an intervention. More generally, it is also intended as a reference for anyone interested in evaluating claims of cognitive enhancement. PMID:27148010

  5. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    PubMed

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  6. Pervasive developmental disorders and criminal behaviour: a case control study.

    PubMed

    Mouridsen, Svend Erik; Rich, Bente; Isager, Torben; Nedergaard, Niels Jørgen

    2008-04-01

    The prevalence and pattern of criminal behaviour in a population of 313 former child psychiatric in-patients with pervasive developmental disorders were studied. The patients were divided into three subgroups and compared with 933 matched controls from the general population. Age at follow-up was between 25 years and 59 years. An account of convictions in the nationwide Danish Register of Criminality was used as a measure of criminal behaviour. Among 113 cases with childhood autism, .9% had been convicted. In atypical autism (n=86) and Asperger's syndrome (n=114) the percentages were 8.1% and 18.4%, respectively. The corresponding rate of convictions in the comparison groups was 18.9%, 14.7%, and 19.6% respectively. Particular attention is given to arson in Asperger's syndrome (p= .0009).

  7. Some issues related to simulation of the tracking and communications computer network

    NASA Technical Reports Server (NTRS)

    Lacovara, Robert C.

    1989-01-01

    The Communications Performance and Integration branch of the Tracking and Communications Division has an ongoing involvement in the simulation of its flight hardware for Space Station Freedom. Specifically, the communication process between central processor(s) and orbital replaceable units (ORU's) is simulated with varying degrees of fidelity. The results of investigations into three aspects of this simulation effort are given. The most general area involves the use of computer assisted software engineering (CASE) tools for this particular simulation. The second area of interest is simulation methods for systems of mixed hardware and software. The final area investigated is the application of simulation methods to one of the proposed computer network protocols for space station, specifically IEEE 802.4.

  8. Some issues related to simulation of the tracking and communications computer network

    NASA Astrophysics Data System (ADS)

    Lacovara, Robert C.

    1989-12-01

    The Communications Performance and Integration branch of the Tracking and Communications Division has an ongoing involvement in the simulation of its flight hardware for Space Station Freedom. Specifically, the communication process between central processor(s) and orbital replaceable units (ORU's) is simulated with varying degrees of fidelity. The results of investigations into three aspects of this simulation effort are given. The most general area involves the use of computer assisted software engineering (CASE) tools for this particular simulation. The second area of interest is simulation methods for systems of mixed hardware and software. The final area investigated is the application of simulation methods to one of the proposed computer network protocols for space station, specifically IEEE 802.4.

  9. Pervasive liquid metal based direct writing electronics with roller-ball pen

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zheng, Yi; Zhang, Qin; Liu, Jing, E-mail: jliu@mail.ipc.ac.cn

    A roller-ball pen enabled direct writing electronics via room temperature liquid metal ink was proposed. With the rolling to print mechanism, the metallic inks were smoothly written on flexible polymer substrate to form conductive tracks and electronic devices. The contact angle analyzer and scanning electron microscope were implemented to disclose several unique inner properties of the obtained electronics. An ever high writing resolution with line width and thickness as 200 μm and 80 μm, respectively was realized. Further, with the administration of external writing pressure, GaIn{sub 24.5} droplets embody increasing wettability on polymer which demonstrates the pervasive adaptability of themore » roller-ball pen electronics.« less

  10. Improving the communication reliability of body sensor networks based on the IEEE 802.15.4 protocol.

    PubMed

    Gomes, Diogo; Afonso, José A

    2014-03-01

    Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee(®) (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access-collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.

  11. Path loss variation of on-body UWB channel in the frequency bands of IEEE 802.15.6 standard.

    PubMed

    Goswami, Dayananda; Sarma, Kanak C; Mahanta, Anil

    2016-06-01

    The wireless body area network (WBAN) has gaining tremendous attention among researchers and academicians for its envisioned applications in healthcare service. Ultra wideband (UWB) radio technology is considered as excellent air interface for communication among body area network devices. Characterisation and modelling of channel parameters are utmost prerequisite for the development of reliable communication system. The path loss of on-body UWB channel for each frequency band defined in IEEE 802.15.6 standard is experimentally determined. The parameters of path loss model are statistically determined by analysing measurement data. Both the line-of-sight and non-line-of-sight channel conditions are considered in the measurement. Variations of parameter values with the size of human body are analysed along with the variation of parameter values with the surrounding environments. It is observed that the parameters of the path loss model vary with the frequency band as well as with the body size and surrounding environment. The derived parameter values are specific to the particular frequency bands of IEEE 802.15.6 standard, which will be useful for the development of efficient UWB WBAN system.

  12. A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster

    DTIC Science & Technology

    2013-01-01

    M. Ahmadi, and M. Shridhar, “ Handwritten Numeral Recognition with Multiple Features and Multistage Classifiers,” Proc. IEEE Int’l Symp. Circuits...ARTICLE (Post Print) 3. DATES COVERED (From - To) SEP 2011 – SEP 2013 4. TITLE AND SUBTITLE A PARALLEL NEUROMORPHIC TEXT RECOGNITION SYSTEM AND ITS...research in computational intelligence has entered a new era. In this paper, we present an HPC-based context-aware intelligent text recognition

  13. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware.

    PubMed

    Daneels, Glenn; Municio, Esteban; Van de Velde, Bruno; Ergeerts, Glenn; Weyn, Maarten; Latré, Steven; Famaey, Jeroen

    2018-02-02

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks.

  14. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware

    PubMed Central

    Municio, Esteban; Van de Velde, Bruno; Latré, Steven

    2018-01-01

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks. PMID:29393900

  15. Qualitative Evaluation of the Design Variables of a Teaching Intervention to Expose Accounting Students to Pervasive Skills

    ERIC Educational Resources Information Center

    Viviers, Herman Albertus

    2016-01-01

    The primary objective of this article is to evaluate the design variables of a newly developed teaching intervention, "The Amazing Tax Race". It comprises a race against time in which accounting students participate within teams in multiple tax-related activities so that they are exposed to pervasive skills. The findings provide…

  16. Long-Term Safety and Adverse Events of Risperidone in Children, Adolescents, and Adults with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Hellings, Jessica A.; Cardona, Alicia M.; Schroeder, Stephen R.

    2010-01-01

    The objective of this study was to examine long-term adverse events of risperidone in 19 children, adolescents, and adults with Pervasive Developmental Disorders and intellectual disability, continuing risperidone for a mean of 186.5 weeks, following a 46-week risperidone study. Nineteen individuals continued long-term follow-up after our…

  17. Differential Language Markers of Pathology in Autism, Pervasive Developmental Disorder Not Otherwise Specified and Specific Language Impairment

    ERIC Educational Resources Information Center

    Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence

    2011-01-01

    Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether…

  18. Fluorine magnetic resonance spectroscopy measurement of brain fluvoxamine and fluoxetine in pediatric patients treated for pervasive developmental disorders.

    PubMed

    Strauss, Wayne L; Unis, Alan S; Cowan, Charles; Dawson, Geraldine; Dager, Stephen R

    2002-05-01

    Pediatric populations, including those with autistic disorder or other pervasive developmental disorders, increasingly are being prescribed selective serotonin reuptake inhibitors (SSRIs). Little is known about the age-related brain pharmacokinetics of SSRIs; there is a lack of data regarding optimal dosing of medications for children. The authors used fluorine magnetic resonance spectroscopy ((19)F MRS) to evaluate age effects on whole-brain concentrations of fluvoxamine and fluoxetine in children taking SSRIs. Twenty-one pediatric subjects with diagnoses of autistic disorder or other pervasive developmental disorders, 6-15 years old and stabilized with a consistent dose of fluvoxamine or fluoxetine, were recruited for the study; 16 successfully completed the imaging protocol. Whole-brain drug levels in this group were compared to similarly acquired data from 28 adults. A significant relationship between dose and brain drug concentration was observed for both drugs across the age range studied. Brain fluvoxamine concentration in the children was lower, consistent with a lower dose/body mass drug prescription; when brain concentration was adjusted for dose/mass, age effects were no longer significant. Brain fluoxetine concentration was similar between age groups; no significant age effects on brain fluoxetine drug levels remained after adjustment for dose/mass. Observations of brain fluoxetine bioavailability and elimination half-life also were similar between age groups. These findings suggest that fluvoxamine or fluoxetine prescriptions adjusted for dose/mass are an acceptable treatment approach for medicating children with autistic disorder or other pervasive developmental disorders. It must be determined whether these findings can be generalized to other pediatric populations.

  19. FPGA Implementation of Reed-Solomon Decoder for IEEE 802.16 WiMAX Systems using Simulink-Sysgen Design Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bobrek, Miljko; Albright, Austin P

    This paper presents FPGA implementation of the Reed-Solomon decoder for use in IEEE 802.16 WiMAX systems. The decoder is based on RS(255,239) code, and is additionally shortened and punctured according to the WiMAX specifications. Simulink model based on Sysgen library of Xilinx blocks was used for simulation and hardware implementation. At the end, simulation results and hardware implementation performances are presented.

  20. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah

    PubMed Central

    Tian, Le; Latré, Steven

    2017-01-01

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing

  1. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.

    PubMed

    Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen

    2017-07-04

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing

  2. Relationship between Motor and Executive Functioning in School-Age Children with Pervasive Developmental Disorder Not Otherwise Specified

    ERIC Educational Resources Information Center

    Schurink, J.; Hartman, E.; Scherder, E. J. A.; Houwen, S.; Visscher, C.

    2012-01-01

    This study examines the motor skills and executive functioning (EF) of 28 children diagnosed with pervasive developmental disorder-not otherwise specified (PDD-NOS; mean age: 10 years 6 months, range: 7-12 years; 19 boys, 9 girls) in comparison with age- and gender-matched typically developing children. The potential relationship between motor…

  3. An Overview of High Performance Computing and Challenges for the Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Google Tech Talks

    research includes the development, testing and documentation of high quality mathematical software. He has contributed to the design and implementation of the following open source software packages and systems: EISPACK, LINPACK, the BLAS, LAPACK, ScaLAPACK, Netlib, PVM, MPI, NetSolve, Top500, ATLAS, and PAPI. He has published approximately 200 articles, papers, reports and technical memoranda and he is coauthor of several books. He was awarded the IEEE Sid Fernbach Award in 2004 for his contributions in the application of high performance computers using innovative approaches. He is a Fellow of the AAAS, ACM, and the IEEE and a member of the National Academy of Engineering.« less

  4. Common and Unique Impairments in Facial-Expression Recognition in Pervasive Developmental Disorder-Not Otherwise Specified and Asperger's Disorder

    ERIC Educational Resources Information Center

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2013-01-01

    This study was designed to identify specific difficulties and associated features related to the problems with social interaction experienced by individuals with pervasive developmental disorder-not otherwise specified (PDD-NOS) using an emotion-recognition task. We compared individuals with PDD-NOS or Asperger's disorder (ASP) and typically…

  5. The 'Biologically-Inspired Computing' Column

    NASA Technical Reports Server (NTRS)

    Hinchey, Mike

    2006-01-01

    The field of Biology changed dramatically in 1953, with the determination by Francis Crick and James Dewey Watson of the double helix structure of DNA. This discovery changed Biology for ever, allowing the sequencing of the human genome, and the emergence of a "new Biology" focused on DNA, genes, proteins, data, and search. Computational Biology and Bioinformatics heavily rely on computing to facilitate research into life and development. Simultaneously, an understanding of the biology of living organisms indicates a parallel with computing systems: molecules in living cells interact, grow, and transform according to the "program" dictated by DNA. Moreover, paradigms of Computing are emerging based on modelling and developing computer-based systems exploiting ideas that are observed in nature. This includes building into computer systems self-management and self-governance mechanisms that are inspired by the human body's autonomic nervous system, modelling evolutionary systems analogous to colonies of ants or other insects, and developing highly-efficient and highly-complex distributed systems from large numbers of (often quite simple) largely homogeneous components to reflect the behaviour of flocks of birds, swarms of bees, herds of animals, or schools of fish. This new field of "Biologically-Inspired Computing", often known in other incarnations by other names, such as: Autonomic Computing, Pervasive Computing, Organic Computing, Biomimetics, and Artificial Life, amongst others, is poised at the intersection of Computer Science, Engineering, Mathematics, and the Life Sciences. Successes have been reported in the fields of drug discovery, data communications, computer animation, control and command, exploration systems for space, undersea, and harsh environments, to name but a few, and augur much promise for future progress.

  6. Learning, Engagement, and Technology: Middle School Students' Three-Year Experience in Pervasive Technology Environments in South Korea

    ERIC Educational Resources Information Center

    Hur, Jung Won; Oh, Jaekyeon

    2012-01-01

    This study explored an initiative that created a pervasive learning environment in a middle school in South Korea and examined its impact on student academic achievement and learning engagement. Forty students received a laptop to use for class projects, online collaboration, and lesson reviews over a 3-year period. To measure the effect of laptop…

  7. Empirically Based Phenotypic Profiles of Children with Pervasive Developmental Disorders: Interpretation in the Light of the DSM-5

    ERIC Educational Resources Information Center

    Greaves-Lord, Kirstin; Eussen, Mart L. J. M.; Verhulst, Frank C.; Minderaa, Ruud B.; Mandy, William; Hudziak, James J.; Steenhuis, Mark Peter; de Nijs, Pieter F.; Hartman, Catharina A.

    2013-01-01

    This study aimed to contribute to the Diagnostic and Statistical Manual (DSM) debates on the conceptualization of autism by investigating (1) whether empirically based distinct phenotypic profiles could be distinguished within a sample of mainly cognitively able children with pervasive developmental disorder (PDD), and (2) how profiles related to…

  8. On the usage of ultrasound computational models for decision making under ambiguity

    NASA Astrophysics Data System (ADS)

    Dib, Gerges; Sexton, Samuel; Prowant, Matthew; Crawford, Susan; Diaz, Aaron

    2018-04-01

    Computer modeling and simulation is becoming pervasive within the non-destructive evaluation (NDE) industry as a convenient tool for designing and assessing inspection techniques. This raises a pressing need for developing quantitative techniques for demonstrating the validity and applicability of the computational models. Computational models provide deterministic results based on deterministic and well-defined input, or stochastic results based on inputs defined by probability distributions. However, computational models cannot account for the effects of personnel, procedures, and equipment, resulting in ambiguity about the efficacy of inspections based on guidance from computational models only. In addition, ambiguity arises when model inputs, such as the representation of realistic cracks, cannot be defined deterministically, probabilistically, or by intervals. In this work, Pacific Northwest National Laboratory demonstrates the ability of computational models to represent field measurements under known variabilities, and quantify the differences using maximum amplitude and power spectrum density metrics. Sensitivity studies are also conducted to quantify the effects of different input parameters on the simulation results.

  9. Interoperable End-to-End Remote Patient Monitoring Platform Based on IEEE 11073 PHD and ZigBee Health Care Profile.

    PubMed

    Clarke, Malcolm; de Folter, Joost; Verma, Vivek; Gokalp, Hulya

    2018-05-01

    This paper describes the implementation of an end-to-end remote monitoring platform based on the IEEE 11073 standards for personal health devices (PHD). It provides an overview of the concepts and approaches and describes how the standard has been optimized for small devices with limited resources of processor, memory, and power that use short-range wireless technology. It explains aspects of IEEE 11073, including the domain information model, state model, and nomenclature, and how these support its plug-and-play architecture. It shows how these aspects underpin a much larger ecosystem of interoperable devices and systems that include IHE PCD-01, HL7, and BlueTooth LE medical devices, and the relationship to the Continua Guidelines, advocating the adoption of data standards and nomenclature to support semantic interoperability between health and ambient assisted living in future platforms. The paper further describes the adaptions that have been made in order to implement the standard on the ZigBee Health Care Profile and the experiences of implementing an end-to-end platform that has been deployed to frail elderly patients with chronic disease(s) and patients with diabetes.

  10. Why I think Computational Physics has been the most valuable part of my undergraduate physics education

    NASA Astrophysics Data System (ADS)

    Parsons, Matthew

    2015-04-01

    Computational physics is a rich and vibrant field in its own right, but often not given the attention that it should receive in the typical undergraduate physics curriculum. It appears that the partisan theorist vs. experimentalist view is still pervasive in academia, or at least still portrayed to students, while in fact there is a continuous spectrum of opportunities in between these two extremes. As a case study, I'll give my perspective as a graduating physics student with examples of computational coursework at Drexel University and research opportunities that this experience has led to.

  11. Microswitch- and VOCA-Assisted Programs for Two Post-Coma Persons with Minimally Conscious State and Pervasive Motor Disabilities

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Oliva, Doretta; Signorino, Mario; Megna, Gianfranco

    2009-01-01

    Intervention programs, based on learning principles and assistive technology, were assessed in two studies with two post-coma men with minimally conscious state and pervasive motor disabilities. Study I assessed a program that included (a) an optic microswitch, activated via double blinking, which allowed a man direct access to brief music…

  12. Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    PubMed Central

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results. PMID:22666076

  13. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    PubMed

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  14. IEEE/NASA Workshop on Leveraging Applications of Formal Methods, Verification, and Validation

    NASA Technical Reports Server (NTRS)

    Margaria, Tiziana (Editor); Steffen, Bernhard (Editor); Hichey, Michael G.

    2005-01-01

    This volume contains the Preliminary Proceedings of the 2005 IEEE ISoLA Workshop on Leveraging Applications of Formal Methods, Verification, and Validation, with a special track on the theme of Formal Methods in Human and Robotic Space Exploration. The workshop was held on 23-24 September 2005 at the Loyola College Graduate Center, Columbia, MD, USA. The idea behind the Workshop arose from the experience and feedback of ISoLA 2004, the 1st International Symposium on Leveraging Applications of Formal Methods held in Paphos (Cyprus) last October-November. ISoLA 2004 served the need of providing a forum for developers, users, and researchers to discuss issues related to the adoption and use of rigorous tools and methods for the specification, analysis, verification, certification, construction, test, and maintenance of systems from the point of view of their different application domains.

  15. The Usefulness of the Revised Psychoeducational Profile for the Assessment of Preschool Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Portoghese, Claudia; Buttiglione, Maura; Pavone, Francesca; Lozito, Vito; De Giacomo, Andrea; Martinelli, Domenico; Margari, Lucia

    2009-01-01

    Data from the Psychoeducational Profile-Revised (PEP-R) were analysed in a sample of 46 children, aged from 1.7 to 5.11 years, of whom 21 had autistic disorder (AD) and 25 had pervasive developmental disorder not otherwise specified (PDD-NOS). Analysis with a t-test for independent samples revealed a significant difference (p less than 0.05)…

  16. Pervasive positive selection on duplicated and nonduplicated vertebrate protein coding genes.

    PubMed

    Studer, Romain A; Penel, Simon; Duret, Laurent; Robinson-Rechavi, Marc

    2008-09-01

    A stringent branch-site codon model was used to detect positive selection in vertebrate evolution. We show that the test is robust to the large evolutionary distances involved. Positive selection was detected in 77% of 884 genes studied. Most positive selection concerns a few sites on a single branch of the phylogenetic tree: Between 0.9% and 4.7% of sites are affected by positive selection depending on the branches. No functional category was overrepresented among genes under positive selection. Surprisingly, whole genome duplication had no effect on the prevalence of positive selection, whether the fish-specific genome duplication or the two rounds at the origin of vertebrates. Thus positive selection has not been limited to a few gene classes, or to specific evolutionary events such as duplication, but has been pervasive during vertebrate evolution.

  17. Effects of Risperidone and Parent Training on Adaptive Functioning in Children with Pervasive Developmental Disorders and Serious Behavioral Problems

    ERIC Educational Resources Information Center

    Scahill, Lawrence; McDougle, Christopher J.; Aman, Michael G.; Johnson, Cynthia; Handen, Benjamin; Bearss, Karen; Dziura, James; Butter, Eric; Swiezy, Naomi G.; Arnold, L. Eugene; Stigler, Kimberly A.; Sukhodolsky, Denis D.; Lecavalier, Luc; Pozdol, Stacie L.; Nikolov, Roumen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Kohn, Arlene E.; Koenig, Kathleen; Grinnon, Stacie; Mulick, James A.; Yu, Sunkyung; Vitiello, Benedetto

    2012-01-01

    Objective: Children with Pervasive Developmental Disorders (PDDs) have social interaction deficits, delayed communication, and repetitive behaviors as well as impairments in adaptive functioning. Many children actually show a decline in adaptive skills compared with age mates over time. Method: This 24-week, three-site, controlled clinical trial…

  18. Pervasive developmental disorders in Prader-Willi syndrome: the Leuven experience in 59 subjects and controls.

    PubMed

    Descheemaeker, Mie-Jef; Govers, Veerle; Vermeulen, Peter; Fryns, Jean-Pierre

    2006-06-01

    In the present study we investigated the co-morbidity of pervasive developmental disorder (PDD) in 59 Prader-Willi syndrome (PWS) individuals and in 59 non-specific mentally retarded controls, matched for IQ, gender, and age. The 'Pervasive Developmental Disorder Mentally Retardation Scale' (PDD-MRScale), a screening questionnaire based on the DSM-III-R criteria for PDD, has been applied in the PWS group and in the control group. Results of the present study revealed a striking autistic-like behavioral phenotype in the majority of the PWS individuals, particularly deficits in the quality of language and communication and of imagination and interests. This intersection with autistic symptomatology is an important addition to the behavioral phenotype in PWS persons. A first approach to delineate subtypes of autistic symptomalogy among PWS persons was performed. Nineteen percent of the PWS group did meet the full diagnostic DSM-III-R criteria for PDD in comparison with 15% in the control group. Results revealed that a higher IQ in PWS does not protect to develop genuine PDD and that uniparental disomy/imprinting mutation as genetic origin seems to be an additional risk factor for developing genuine PDD. The results of the present study suggest the importance of reconsidering the commonly recognized obsessive-compulsive like behavior in PWS persons within the broader spectrum of autism disorders. Copyright 2006 Wiley-Liss, Inc.

  19. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    PubMed

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  20. Pervasive, Genome-Wide Transcription in the Organelle Genomes of Diverse Plastid-Bearing Protists.

    PubMed

    Sanitá Lima, Matheus; Smith, David Roy

    2017-11-06

    Organelle genomes are among the most sequenced kinds of chromosome. This is largely because they are small and widely used in molecular studies, but also because next-generation sequencing technologies made sequencing easier, faster, and cheaper. However, studies of organelle RNA have not kept pace with those of DNA, despite huge amounts of freely available eukaryotic RNA-sequencing (RNA-seq) data. Little is known about organelle transcription in nonmodel species, and most of the available eukaryotic RNA-seq data have not been mined for organelle transcripts. Here, we use publicly available RNA-seq experiments to investigate organelle transcription in 30 diverse plastid-bearing protists with varying organelle genomic architectures. Mapping RNA-seq data to organelle genomes revealed pervasive, genome-wide transcription, regardless of the taxonomic grouping, gene organization, or noncoding content. For every species analyzed, transcripts covered ≥85% of the mitochondrial and/or plastid genomes (all of which were ≤105 kb), indicating that most of the organelle DNA-coding and noncoding-is transcriptionally active. These results follow earlier studies of model species showing that organellar transcription is coupled and ubiquitous across the genome, requiring significant downstream processing of polycistronic transcripts. Our findings suggest that noncoding organelle DNA can be transcriptionally active, raising questions about the underlying function of these transcripts and underscoring the utility of publicly available RNA-seq data for recovering complete genome sequences. If pervasive transcription is also found in bigger organelle genomes (>105 kb) and across a broader range of eukaryotes, this could indicate that noncoding organelle RNAs are regulating fundamental processes within eukaryotic cells. Copyright © 2017 Sanitá Lima and Smith.

  1. Conduct problems and level of social competence in Head Start children: prevalence, pervasiveness, and associated risk factors.

    PubMed

    Webster-Stratton, C; Hammond, M

    1998-06-01

    The purpose of the current project was to determine the prevalence of conduct problems, low social competence, and associated risk factors in a sample of 4-year-old low-income children (N = 426) from 64 Head Start classrooms in the Seattle area. Conduct problems and social competence were assessed based on a combination of teacher reports, parent reports, and independent observations of children interacting with peers in the classroom and with parents at home. We examined the relative contribution of a variety of risk factors, including maternal history and socioeconomic background, current levels of stress and social support, mothers' emotional state, and parenting competence in relation to "pervasive" (i.e., at home and school) and "nonpervasive" conduct problems and low social competence. Findings indicated similar risk factors for conduct problems and for low social competence, with an ordered increase in the number of risk factors from normal to "nonpervasive" to "pervasive" groups. Harshness of parenting style (i.e., slapping, hitting, yelling) significantly distinguished between the three groups for low social competence and conduct problems. Positive affect, praise, and physical warmth from mothers were positively related to social competence but unrelated to conduct problems.

  2. Gross Motor Performance and Self-Perceived Motor Competence in Children with Emotional, Behavioural, and Pervasive Developmental Disorders: A Review

    ERIC Educational Resources Information Center

    Emck, Claudia; Bosscher, Ruud; Beek, Peter; Doreleijers, Theo

    2009-01-01

    Aims: Motor performance and self-perceived motor competence have a great impact on the psychosocial development of children in general. In this review, empirical studies of gross motor performance and self-perception of motor competence in children with emotional (depression and anxiety), behavioural, and pervasive developmental disorders are…

  3. IEEE 802.21 Assisted Seamless and Energy Efficient Handovers in Mixed Networks

    NASA Astrophysics Data System (ADS)

    Liu, Huaiyu; Maciocco, Christian; Kesavan, Vijay; Low, Andy L. Y.

    Network selection is the decision process for a mobile terminal to handoff between homogeneous or heterogeneous networks. With multiple available networks, the selection process must evaluate factors like network services/conditions, monetary cost, system conditions, user preferences etc. In this paper, we investigate network selection using a cost function and information provided by IEEE 802.21. The cost function provides flexibility to balance different factors in decision making and our research is focused on improving both seamlessness and energy efficiency of handovers. Our solution is evaluated using real WiFi, WiMax, and 3G signal strength traces. The results show that appropriate networks were selected based on selection policies, handovers were triggered at optimal times to increase overall network connectivity as compared to traditional triggering schemes, while at the same time the energy consumption of multi-radio devices for both on-going operations as well as during handovers is optimized.

  4. Behavior Change in a Student with a Dual Diagnosis of Deafness and Pervasive Development Disorder: A Case Study

    ERIC Educational Resources Information Center

    Easterbrooks, S. R.; Handley, C. M.

    2005-01-01

    The broad term "pervasive developmental disorder" (PPD) describes a set of symptoms that occur along a continuum of severity; these symptoms are often referred to as "autism spectrum disorders" (ASDs). Little is known about the incidence and prevalence of ASDs among students who are deaf or hard of hearing (DHH). Teachers of DHH students, who must…

  5. Collaborative Joins in a Pervasive Computing Environment

    DTIC Science & Technology

    2003-07-28

    the available resources of each device. For example, CQP allows a tourist to use her handheld device to ask for the closest cheapest laundromat that is...open, given her current location, time of the day and a price range. The protocol also allows the tourist to ask for the closest laundromat adjacent

  6. Using OWL in a Pervasive Computing Broker

    DTIC Science & Technology

    2005-01-01

    carries or wears (e.g., cell phones , PDAs and headphones), services that are provided by de- vices in a room (e.g., projector service, light controller...ence of the users’ devices and clothing. As Alice enters the room, these sensors inform the R210 broker that a cell phone belonging to her is present and...the broker adds this fact in its knowledge base. As she sits, the agent on Alice’s Bluetooth enabled cell phone discovers R210’s broker and engages

  7. Improving Mobile Infrastructure for Pervasive Personal Computing

    DTIC Science & Technology

    2007-11-01

    fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam

  8. Addressing Security Challenges in Pervasive Computing Applications

    DTIC Science & Technology

    2010-10-10

    Personalized Privacy for Location - Based Services ", Transactions on Data Privacy, 2(1), 2009. 22. Indrakshi Ray, Indrajit Ray and Sudip Chakraborty, "An...Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley, "Query m-Invariance: Pre- venting Query Disclosures in Continuous Location - Based Services ", Proceedings...location information is used to provide better services. Often such applications need continuous location - based services (LBS) where the mobile object must

  9. IEEE TRANSACTIONS ON CYBERNETICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig R. RIeger; David H. Scheidt; William D. Smart

    2014-11-01

    MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures

  10. Learning from failure in health care: frequent opportunities, pervasive barriers.

    PubMed

    Edmondson, A C

    2004-12-01

    The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety.

  11. Learning from failure in health care: frequent opportunities, pervasive barriers

    PubMed Central

    Edmondson, A

    2004-01-01

    The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety. PMID:15576689

  12. Current state and future direction of computer systems at NASA Langley Research Center

    NASA Technical Reports Server (NTRS)

    Rogers, James L. (Editor); Tucker, Jerry H. (Editor)

    1992-01-01

    Computer systems have advanced at a rate unmatched by any other area of technology. As performance has dramatically increased there has been an equally dramatic reduction in cost. This constant cost performance improvement has precipitated the pervasiveness of computer systems into virtually all areas of technology. This improvement is due primarily to advances in microelectronics. Most people are now convinced that the new generation of supercomputers will be built using a large number (possibly thousands) of high performance microprocessors. Although the spectacular improvements in computer systems have come about because of these hardware advances, there has also been a steady improvement in software techniques. In an effort to understand how these hardware and software advances will effect research at NASA LaRC, the Computer Systems Technical Committee drafted this white paper to examine the current state and possible future directions of computer systems at the Center. This paper discusses selected important areas of computer systems including real-time systems, embedded systems, high performance computing, distributed computing networks, data acquisition systems, artificial intelligence, and visualization.

  13. Notice of Violation of IEEE Publication PrinciplesJoint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath

    NASA Astrophysics Data System (ADS)

    Li, Lei; Hu, Jianhao

    2010-12-01

    Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed

  14. Platelet Serotonin Levels in Pervasive Developmental Disorders and Mental Retardation: Diagnostic Group Differences, Within-Group Distribution, and Behavioral Correlates.

    ERIC Educational Resources Information Center

    Mulder, Erik J.; Anderson, George M.; Kema, Ido P.; De Bildt, Annelies; Van Lang, Natasja D.J.; Den Boer, Johan A.; Minderaa Ruud B.

    2004-01-01

    Objective: To investigate group differences, the within-group distributions, and the clinical correlates of platelet serotonin (5-HT) levels in pervasive developmental disorders (PDD). Method: Platelet 5-HT levels were measured in Dutch children and young adults, recruited from 2001 through 2003, with PDD (autism, Asperger's and PDD-not otherwise…

  15. IEEE Validation of the Continuing Education Achievement of Engineers Registry System. Procedures for Use with a CPT 8000 Word Processor and Communications Package.

    ERIC Educational Resources Information Center

    Institute of Electrical and Electronics Engineers, Inc., New York, NY.

    The Institute of Electrical and Electronics Engineers (IEEE) validation program is designed to motivate persons practicing in electrical and electronics engineering to pursue quality technical continuing education courses offered by any responsible sponsor. The rapid acceptance of the validation program necessitated the additional development of a…

  16. Introduction to the special issue on the 2011 Joint IEEE International Frequency Control Symposium and European Frequency and Time Forum.

    PubMed

    Burt, Eric; Gill, Patrick

    2012-03-01

    The 8 invited and 17 contributed papers in this special issue focus on the following topical areas covered at the 2011 Joint IEEE International Frequency Control Symposium and European Frequency and Time Forum, held in San Francisco, California: 1) Materials and Resonators; 2) Oscillators, Synthesizers, and Noise; 3) Microwave Frequency Standards; 4) Sensors and Transducers; 5) Timekeeping and Time and Frequency Transfer; and 6) Optical Frequency Standards.

  17. Pervasively Altered Hematite-Rich Deposits Southeast of Home Plate, Gusev Crater, Mars

    NASA Technical Reports Server (NTRS)

    Schroder, C.; Arvidson, R. E.; Schmidt, M. E.; Gellert, R.; Klingelhoefer, G.; Ming, D. W.; Morris, R. V.; Rice, J. W.; Yen, A. S.; deSouza, P. A., Jr.

    2008-01-01

    The investigation of Home Plate and its surroundings in the Inner Basin of the Columbia Hills in Gusev Crater has added substantially to the water story on Mars. Textural, morphological, and geochemical evidence from Home Plate point towards an explosive origin, probably a hydrovolcanic explosion [1]. High silica deposits in the immediate vicinity of Home Plate suggest hydrothermal alteration [e.g. 2,3]. Pervasively altered deposits rich in hematite were investigated to the southeast of Home Plate. Of these, the target Halley, the target KingGeorgeIsland on the GrahamLand outcrop, and the targets Montalva and Riquelme on the Troll outcrop were investigated in situ with the Alpha Particle X-ray spectrometer (APXS), the Microscopic Imager (MI), and the Moessbauer (MB) spectrometer (Fig. 1).

  18. Brief report: Representational momentum for dynamic facial expressions in pervasive developmental disorder.

    PubMed

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2010-03-01

    Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of expressed emotion in 13 individuals with PDD and 13 typically developing controls. We presented dynamic and static emotional (fearful and happy) expressions. Participants were asked to match a changeable emotional face display with the last presented image. The results showed that both groups perceived the last image of dynamic facial expression to be more emotionally exaggerated than the static facial expression. This finding suggests that individuals with PDD have an intact perceptual mechanism for processing dynamic information in another individual's face.

  19. Antenna Efficiency and the Genius of the IEEE Standard for Antenna Terms [Education Column

    NASA Astrophysics Data System (ADS)

    Warnick, Karl F.

    2012-08-01

    At a 2007 Square Kilometre Array Design Studies (SKADS) workshop in Dwingeloo, Wim van Cappellen of the Nether lands Institute for Radio Astronomy (ASTRON) gave a presentation on figures of merit, in which he memorably compared antenna terms to apples. What seems like a simple, homogeneous fruit comes in all colors and varieties. Similarly, a survey of antenna literature and textbooks shows that authors use a wide variety of antenna figures of merit, often not in compliance with the relevant IEEE Standard Definitions of Terms for Antennas [1]. Since this standard is now in the process of revision by the Antennas and Propagation Society Antenna Standards Committee, it seems worth while to consider the standard, and clarify some common misunderstandings and inconsistent usages.

  20. Unconditionally verifiable blind quantum computation

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph F.; Kashefi, Elham

    2017-07-01

    Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.

  1. A Review of the Suitability of Available Computer Aided Software Engineering (CASE) Tools for the Small Software Development Environment

    DTIC Science & Technology

    1989-07-11

    LITERATURE CITED [Boeh73] Boehm, Barry W., "Software and its Impact: A Quantitative Assessment," Datamation, 19, 5, (May 1973), pp 48-59. [Boeh76...Boehm, Barry W., "Software Engineering," IEEE Transactions on Computers, C-25, 12, (December 1976), pp 1226-1241. [Boeh81a] Boehm, Barry W., Software...Engineering Economics, Prentice-Hall, Inc., Englewood Cliffs, NJ, (1981). [Boeh8lb] Boehm, Barry W., "An Experiment in Small Scale Application Software

  2. Medication and Parent Training in Children with Pervasive Developmental Disorders and Serious Behavior Problems: Results from a Randomized Clinical Trial

    ERIC Educational Resources Information Center

    Aman, Michael G.; McDougle, Christopher J.; Scahill, Lawrence; Handen, Benjamin; Arnold, L. Eugene; Johnson, Cynthia; Stigler, Kimberly A.; Bearss, Karen; Butter, Eric; Swiezy, Naomi B.; Sukhodolsky, Denis D.; Ramadan, Yaser; Pozdol, Stacie L.; Nikolov, Roumen; Lecavalier, Luc; Kohn, Arlene E.; Koenig, Kathleen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Mulick, James A.; Hall, Kristy L.; Dziura, James; Ritz, Louise; Trollinger, Stacie; Yu, Sunkyung; Vitiello, Benedetto; Wagner, Ann

    2009-01-01

    Objective: Many children with pervasive developmental disorders (PDDs) have serious, functionally impairing behavioral problems. We tested whether combined treatment (COMB) with risperidone and parent training (PT) in behavior management is superior to medication alone (MED) in improving severe behavioral problems in children with PDDs. Method:…

  3. The Sound of Freedom. Naval Weapons Technology at Dahlgren, Virginia, 1918-2006

    DTIC Science & Technology

    2006-01-01

    the TRINITY device, before later succeeding J. Robert Oppenheimer as the director of Los Alamos National Laboratory. Other former Dahlgren...and the Computer (Cambridge, Mass.: The MIT Press, 1999); Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE...Minutes of Advisory Council. 3. Ibid. 4. Ibid.; Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE Computer

  4. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks.

    PubMed

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-03-29

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  5. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks

    PubMed Central

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-01-01

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error. PMID:28353676

  6. Emerging and Future Computing Paradigms and Their Impact on the Research, Training, and Design Environments of the Aerospace Workforce

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K. (Compiler)

    2003-01-01

    The document contains the proceedings of the training workshop on Emerging and Future Computing Paradigms and their impact on the Research, Training and Design Environments of the Aerospace Workforce. The workshop was held at NASA Langley Research Center, Hampton, Virginia, March 18 and 19, 2003. The workshop was jointly sponsored by Old Dominion University and NASA. Workshop attendees came from NASA, other government agencies, industry and universities. The objectives of the workshop were to a) provide broad overviews of the diverse activities related to new computing paradigms, including grid computing, pervasive computing, high-productivity computing, and the IBM-led autonomic computing; and b) identify future directions for research that have high potential for future aerospace workforce environments. The format of the workshop included twenty-one, half-hour overview-type presentations and three exhibits by vendors.

  7. 2011 IEEE Visualization Contest winner: Visualizing unsteady vortical behavior of a centrifugal pump.

    PubMed

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump's effectiveness. The winning entry split analysis of the pump into three parts based on the pump's functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump.

  8. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    PubMed

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  9. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  10. Extending the IEEE-LTSA.

    ERIC Educational Resources Information Center

    Voskamp, Jorg; Hambach, Sybille

    An Internet-based course management system has been under development at the Fraunhofer-Institute for Computer Graphics Rostock (Germany) for the past 5 years. It is used by experts for distributing their courses via the Internet and by students for learning with the material distributed. The "Course Management System for WWW--CMS-W3"…

  11. Computing through Scientific Abstractions in SysBioPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chin, George; Stephan, Eric G.; Gracio, Deborah K.

    2004-10-13

    Today, biologists and bioinformaticists have a tremendous amount of computational power at their disposal. With the availability of supercomputers, burgeoning scientific databases and digital libraries such as GenBank and PubMed, and pervasive computational environments such as the Grid, biologists have access to a wealth of computational capabilities and scientific data at hand. Yet, the rapid development of computational technologies has far exceeded the typical biologist’s ability to effectively apply the technology in their research. Computational sciences research and development efforts such as the Biology Workbench, BioSPICE (Biological Simulation Program for Intra-Cellular Evaluation), and BioCoRE (Biological Collaborative Research Environment) are importantmore » in connecting biologists and their scientific problems to computational infrastructures. On the Computational Cell Environment and Heuristic Entity-Relationship Building Environment projects at the Pacific Northwest National Laboratory, we are jointly developing a new breed of scientific problem solving environment called SysBioPSE that will allow biologists to access and apply computational resources in the scientific research context. In contrast to other computational science environments, SysBioPSE operates as an abstraction layer above a computational infrastructure. The goal of SysBioPSE is to allow biologists to apply computational resources in the context of the scientific problems they are addressing and the scientific perspectives from which they conduct their research. More specifically, SysBioPSE allows biologists to capture and represent scientific concepts and theories and experimental processes, and to link these views to scientific applications, data repositories, and computer systems.« less

  12. UTC Time Transfer for High Frequency Trading Using IS-95 CDMA Base Station Transmissions and IEEE-1588 Precision Time Protocol

    DTIC Science & Technology

    2010-11-01

    CDMA base stations are each synchronized by GPS receivers, they provide an indirect link to GPS system time and UTC time . The major stock...antenna synchronizes the Local Area Network (LAN) to within 10 microseconds of UTC using the IEEE-1588 Precision Time Protocol (PTP). This is an...activities. Understanding and measuring latency on the LAN is key to the success of HFTs. Without precise time synchronization below 1 millisecond

  13. Parent-Rated Anxiety Symptoms in Children with Pervasive Developmental Disorders: Frequency and Association with Core Autism Symptoms and Cognitive Functioning

    ERIC Educational Resources Information Center

    Sukhodolsky, Denis G.; Scahill, Lawrence; Gadow, Kenneth D.; Arnold, L. Eugene; Aman, Michael G.; McDougle, Christopher J.; McCracken, James T.; Tierney, Elaine; White, Susan Williams; Lecavalier, Luc; Vitiello, Benedetto

    2008-01-01

    Background: In addition to the core symptoms, children with Pervasive Developmental Disorders (PDD) often exhibit other problem behaviors such as aggression, hyperactivity, and anxiety, which can contribute to overall impairment and, therefore, become the focus of clinical attention. Limited data are available on the prevalence of anxiety in these…

  14. Efficacy of Atomoxetine for the Treatment of ADHD Symptoms in Patients with Pervasive Developmental Disorders: A Prospective, Open-Label Study

    ERIC Educational Resources Information Center

    Fernandez-Jaen, Alberto; Fernandez-Mayoralas, Daniel Martin; Calleja-Perez, Beatriz; Munoz-Jareno, Nuria; Campos Diaz, Maria del Rosario; Lopez-Arribas, Sonia

    2013-01-01

    Objective: Atomoxetine's tolerance and efficacy were studied in 24 patients with pervasive developmental disorder and symptoms of ADHD. Method: Prospective, open-label, 16-week study was performed, using the variables of the Clinical Global Impression Scale and the Conners' Scale, among others. Results: A significant difference was found between…

  15. An Examination of Specific Child Behavior Problems as Predictors of Parenting Stress among Families of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Davis, Allyson L.; Neece, Cameron L.

    2017-01-01

    Introduction: Studies have shown that parents of children with pervasive developmental disorders (PDD) exhibit higher levels of stress than parents of typically developing children or children with other types of developmental delays (DD). This relationship appears to be mediated by elevated levels of behavior problems observed in children with…

  16. Framework of sensor-based monitoring for pervasive patient care.

    PubMed

    Triantafyllidis, Andreas K; Koutkias, Vassilis G; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos

    2016-09-01

    Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors' approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach.

  17. Framework of sensor-based monitoring for pervasive patient care

    PubMed Central

    Koutkias, Vassilis G.; Chouvarda, Ioanna; Adami, Ilia; Kouroubali, Angelina; Maglaveras, Nicos

    2016-01-01

    Sensor-based health systems can often become difficult to use, extend and sustain. The authors propose a framework for designing sensor-based health monitoring systems aiming to provide extensible and usable monitoring services in the scope of pervasive patient care. The authors’ approach relies on a distributed system for monitoring the patient health status anytime-anywhere and detecting potential health complications, for which healthcare professionals and patients are notified accordingly. Portable or wearable sensing devices measure the patient's physiological parameters, a smart mobile device collects and analyses the sensor data, a Medical Center system receives notifications on the detected health condition, and a Health Professional Platform is used by formal caregivers in order to review the patient condition and configure monitoring schemas. A Service-oriented architecture is utilised to provide extensible functional components and interoperable interactions among the diversified system components. The framework was applied within the REMOTE ambient-assisted living project in which a prototype system was developed, utilising Bluetooth to communicate with the sensors and Web services for data exchange. A scenario of using the REMOTE system and preliminary usability results show the applicability, usefulness and virtue of our approach. PMID:27733920

  18. Programmer/Analyst Guide for the Army Unit Resiliency Analysis (AURA) computer Simulation Model. Volume 1. AURA Methodology

    DTIC Science & Technology

    1990-10-01

    involving a heavy artillery barrage, the impact point output alone could consume upwards of 10,000 pages of computer paper. For this reason, AURA provides...but pervasive factor: the asset allocation model must be compatible with the mathematical behavior of the input data. Thus, for example, if assets are...described as expendable during repair or decontamination activities, it must have HOMELINKS which appear in the consuming repair SUBCHAINs

  19. Historical introgression drives pervasive mitochondrial admixture between two species of pelagic sharks.

    PubMed

    Corrigan, Shannon; Maisano Delser, Pierpaolo; Eddy, Corey; Duffy, Clinton; Yang, Lei; Li, Chenhong; Bazinet, Adam L; Mona, Stefano; Naylor, Gavin J P

    2017-05-01

    We use a genomic sampling of both nuclear and mitochondrial DNA markers to examine a pattern of genetic admixture between Carcharhinus galapagensis (Galapagos sharks) and Carcharhinus obscurus (dusky sharks), two well-known and closely related sharks that have been recognized as valid species for more than 100years. We describe widespread mitochondrial-nuclear discordance in which these species are readily distinguishable based on 2152 nuclear single nucleotide polymorphisms from 910 independent autosomal regions, but show pervasive mitochondrial admixture. The species are superficially morphologically cryptic as adults but show marked differences in internal anatomy, as well as niche separation. There was no indication of ongoing hybridization between the species. We conclude that the observed mitochondrial-nuclear discordance is likely due to historical mitochondrial introgression following a range expansion. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Adaptive Behavior in Autism and Pervasive Developmental Disorder-Not Otherwise Specified: Microanalysis of Scores on the Vineland Adaptive Behavior Scales

    ERIC Educational Resources Information Center

    Paul, Rhea; Miles, Stephanie; Cicchetti, Domenic; Sparrow, Sara; Klin, Ami; Volkmar, Fred; Coflin, Megan; Booker, Shelley

    2004-01-01

    The purpose of this study is to provide a microanalysis of differences in adaptive functioning seen between well-matched groups of school-aged children with autism and those diagnosed as having Pervasive Developmental Disorder-Not Otherwise Specified, all of whom functioned in the mild to moderate range of intellectual impairment. Findings…

  1. A review on architectures and communications technologies for wearable health-monitoring systems.

    PubMed

    Custodio, Víctor; Herrera, Francisco J; López, Gregorio; Moreno, José Ignacio

    2012-10-16

    Nowadays society is demanding more and more smart healthcare services that allow monitoring patient status in a non-invasive way, anywhere and anytime. Thus, healthcare applications are currently facing important challenges guided by the u-health (ubiquitous health) and p-health (pervasive health) paradigms. New emerging technologies can be combined with other widely deployed ones to develop such next-generation healthcare systems. The main objective of this paper is to review and provide more details on the work presented in "LOBIN: E-Textile and Wireless-Sensor-Network-Based Platform for Healthcare Monitoring in Future Hospital Environments", published in the IEEE Transactions on Information Technology in Biomedicine, as well as to extend and update the comparison with other similar systems. As a result, the paper discusses the main advantages and disadvantages of using different architectures and communications technologies to develop wearable systems for pervasive healthcare applications.

  2. A Review on Architectures and Communications Technologies for Wearable Health-Monitoring Systems

    PubMed Central

    Custodio, Víctor; Herrera, Francisco J.; López, Gregorio; Moreno, José Ignacio

    2012-01-01

    Nowadays society is demanding more and more smart healthcare services that allow monitoring patient status in a non-invasive way, anywhere and anytime. Thus, healthcare applications are currently facing important challenges guided by the u-health (ubiquitous health) and p-health (pervasive health) paradigms. New emerging technologies can be combined with other widely deployed ones to develop such next-generation healthcare systems. The main objective of this paper is to review and provide more details on the work presented in “LOBIN: E-Textile and Wireless-Sensor-Network-Based Platform for Healthcare Monitoring in Future Hospital Environments”, published in the IEEE Transactions on Information Technology in Biomedicine, as well as to extend and update the comparison with other similar systems. As a result, the paper discusses the main advantages and disadvantages of using different architectures and communications technologies to develop wearable systems for pervasive healthcare applications. PMID:23202028

  3. Biomedical, Artificial Intelligence, and DNA Computing Photonics Applications and Web Engineering, Wilga, May 2012

    NASA Astrophysics Data System (ADS)

    Romaniuk, Ryszard S.

    2012-05-01

    This paper is the fifth part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with Biomedical, Artificial Intelligence and DNA Computing technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JET tokamak and pi-of-the sky experiments development. The symposium is an annual summary in the development of numerable Ph.D. theses carried out in this country in the area of advanced electronic and photonic systems. It is also a great occasion for SPIE, IEEE, OSA and PSP students to meet together in a large group spanning the whole country with guests from this part of Europe. A digest of Wilga references is presented [1-270].

  4. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  5. Pervasive Sound Sensing: A Weakly Supervised Training Approach.

    PubMed

    Kelly, Daniel; Caulfield, Brian

    2016-01-01

    Modern smartphones present an ideal device for pervasive sensing of human behavior. Microphones have the potential to reveal key information about a person's behavior. However, they have been utilized to a significantly lesser extent than other smartphone sensors in the context of human behavior sensing. We postulate that, in order for microphones to be useful in behavior sensing applications, the analysis techniques must be flexible and allow easy modification of the types of sounds to be sensed. A simplification of the training data collection process could allow a more flexible sound classification framework. We hypothesize that detailed training, a prerequisite for the majority of sound sensing techniques, is not necessary and that a significantly less detailed and time consuming data collection process can be carried out, allowing even a nonexpert to conduct the collection, labeling, and training process. To test this hypothesis, we implement a diverse density-based multiple instance learning framework, to identify a target sound, and a bag trimming algorithm, which, using the target sound, automatically segments weakly labeled sound clips to construct an accurate training set. Experiments reveal that our hypothesis is a valid one and results show that classifiers, trained using the automatically segmented training sets, were able to accurately classify unseen sound samples with accuracies comparable to supervised classifiers, achieving an average F -measure of 0.969 and 0.87 for two weakly supervised datasets.

  6. Low-frequency electrical dosimetry: research agenda of the IEEE International Committee on Electromagnetic Safety.

    PubMed

    Reilly, J Patrick; Hirata, Akimasa

    2016-06-21

    This article treats unsettled issues in the use of numerical models of electrical dosimetry as applied to international limits on human exposure to low-frequency (typically  <  100 kHz) electromagnetic fields and contact current. The perspective in this publication is that of Subcommittee 6 of IEEE-ICES (International Committee on Electromagnetic Safety) Technical Committee 95. The paper discusses 25 issues needing attention, fitting into three general categories: induction models; electrostimulation models; and human exposure limits. Of these, 9 were voted as 'high priority' by members of Subcommittee 6. The list is presented as a research agenda for refinements in numerical modeling with applications to human exposure limits. It is likely that such issues are also important in medical and electrical product safety design applications.

  7. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic

    PubMed Central

    Kerkhove, Dwight; Tian, Le; Munteanu, Adrian; De Poorter, Eli

    2018-01-01

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  8. A computational perspective on autism

    PubMed Central

    Rosenberg, Ari; Patterson, Jaclyn Sky; Angelaki, Dora E.

    2015-01-01

    Autism is a neurodevelopmental disorder that manifests as a heterogeneous set of social, cognitive, motor, and perceptual symptoms. This system-wide pervasiveness suggests that, rather than narrowly impacting individual systems such as affection or vision, autism may broadly alter neural computation. Here, we propose that alterations in nonlinear, canonical computations occurring throughout the brain may underlie the behavioral characteristics of autism. One such computation, called divisive normalization, balances a neuron’s net excitation with inhibition reflecting the overall activity of the neuronal population. Through neural network simulations, we investigate how alterations in divisive normalization may give rise to autism symptomatology. Our findings show that a reduction in the amount of inhibition that occurs through divisive normalization can account for perceptual consequences of autism, consistent with the hypothesis of an increased ratio of neural excitation to inhibition (E/I) in the disorder. These results thus establish a bridge between an E/I imbalance and behavioral data on autism that is currently absent. Interestingly, our findings implicate the context-dependent, neuronal milieu as a key factor in autism symptomatology, with autism reflecting a less “social” neuronal population. Through a broader discussion of perceptual data, we further examine how altered divisive normalization may contribute to a wide array of the disorder’s behavioral consequences. These analyses show how a computational framework can provide insights into the neural basis of autism and facilitate the generation of falsifiable hypotheses. A computational perspective on autism may help resolve debates within the field and aid in identifying physiological pathways to target in the treatment of the disorder. PMID:26170299

  9. A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints

    ERIC Educational Resources Information Center

    Reyes Alamo, Jose M.

    2010-01-01

    The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

  10. DESPIC: Detecting Early Signatures of Persuasion in Information Cascades

    DTIC Science & Technology

    2015-08-27

    over NoSQL Databases, Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). 26-MAY-14, . : , P...over NoSQL Databases. Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). Chicago, IL, USA...distributed NoSQL databases including HBase and Riak, we finalized the requirements of the optimal computational architecture to support our framework

  11. Not just fear and sadness: meta-analytic evidence of pervasive emotion recognition deficits for facial and vocal expressions in psychopathy.

    PubMed

    Dawel, Amy; O'Kearney, Richard; McKone, Elinor; Palermo, Romina

    2012-11-01

    The present meta-analysis aimed to clarify whether deficits in emotion recognition in psychopathy are restricted to certain emotions and modalities or whether they are more pervasive. We also attempted to assess the influence of other important variables: age, and the affective factor of psychopathy. A systematic search of electronic databases and a subsequent manual search identified 26 studies that included 29 experiments (N = 1376) involving six emotion categories (anger, disgust, fear, happiness, sadness, surprise) across three modalities (facial, vocal, postural). Meta-analyses found evidence of pervasive impairments across modalities (facial and vocal) with significant deficits evident for several emotions (i.e., not only fear and sadness) in both adults and children/adolescents. These results are consistent with recent theorizing that the amygdala, which is believed to be dysfunctional in psychopathy, has a broad role in emotion processing. We discuss limitations of the available data that restrict the ability of meta-analysis to consider the influence of age and separate the sub-factors of psychopathy, highlighting important directions for future research. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Pervasive community care platform: Ambient Intelligence leveraging sensor networks and mobile agents

    NASA Astrophysics Data System (ADS)

    Su, Chuan-Jun; Chiang, Chang-Yu

    2014-04-01

    Several powerful trends are contributing to an aging of much of the world's population, especially in economically developed countries. To mitigate the negative effects of rapidly ageing populations, societies must act early to plan for the welfare, medical care and residential arrangements of their senior citizens, and for the manpower and associated training needed to execute these plans. This paper describes the development of an Ambient Intelligent Community Care Platform (AICCP), which creates an environment of Ambient Intelligence through the use of sensor network and mobile agent (MA) technologies. The AICCP allows caregivers to quickly and accurately locate their charges; access, update and share critical treatment and wellness data; and automatically archive all records. The AICCP presented in this paper is expected to enable caregivers and communities to offer pervasive, accurate and context-aware care services.

  13. Unique transposon landscapes are pervasive across Drosophila melanogaster genomes

    PubMed Central

    Rahman, Reazur; Chirn, Gung-wei; Kanodia, Abhay; Sytnikova, Yuliya A.; Brembs, Björn; Bergman, Casey M.; Lau, Nelson C.

    2015-01-01

    To understand how transposon landscapes (TLs) vary across animal genomes, we describe a new method called the Transposon Insertion and Depletion AnaLyzer (TIDAL) and a database of >300 TLs in Drosophila melanogaster (TIDAL-Fly). Our analysis reveals pervasive TL diversity across cell lines and fly strains, even for identically named sub-strains from different laboratories such as the ISO1 strain used for the reference genome sequence. On average, >500 novel insertions exist in every lab strain, inbred strains of the Drosophila Genetic Reference Panel (DGRP), and fly isolates in the Drosophila Genome Nexus (DGN). A minority (<25%) of transposon families comprise the majority (>70%) of TL diversity across fly strains. A sharp contrast between insertion and depletion patterns indicates that many transposons are unique to the ISO1 reference genome sequence. Although TL diversity from fly strains reaches asymptotic limits with increasing sequencing depth, rampant TL diversity causes unsaturated detection of TLs in pools of flies. Finally, we show novel transposon insertions negatively correlate with Piwi-interacting RNA (piRNA) levels for most transposon families, except for the highly-abundant roo retrotransposon. Our study provides a useful resource for Drosophila geneticists to understand how transposons create extensive genomic diversity in fly cell lines and strains. PMID:26578579

  14. Pervasive refusal syndrome. Three German cases provide further illustration.

    PubMed

    Jans, Thomas; Ball, Juliane; Preiss, Maike; Haberhausen, Michael; Warnke, Andreas; Renner, Tobias J

    2011-09-01

    Pervasive refusal syndrome (PRS) has been proposed as a new diagnostic entity among child and adolescent psychiatric disorders. It is characterized by a cluster of life-threatening symptoms including refusal of hood intake, decreased or complete lack of mobilization, and lack of communication as well as retreat from normal life activities. Active refusal to accept help as well as neglect of personal care have been core features of PRS in the limited number of cases reported in the last decade. There have, however; been cases with predominantly passive resistance, indicating the possibility that there may be a continuum from active refusal to passive resistance within PRS. Postulating this continuum allows for the integration of "depressive devitalization" -- a refusal syndrome mainly characterized by passive resistance -- into the concept of PRS. Here, three case vignettes of adolescent patients with PRS are presented. The patients' symptomatology can be allocated on this continuum of PRS. PRS and dissociative disorders are compared in greater detail and contrasted within this discussion of differential diagnoses at the poles of such a continuum. PRS is a useful diagnosis for cases involving symptoms of predominating refusal and retreat which cannot satisfactorily be classified by existing diagnostic categories, and which can mostly clearly be separated from dissociative disorder.

  15. Global Prevalence of Autism and Other Pervasive Developmental Disorders

    PubMed Central

    Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcín, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

    2012-01-01

    We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160–179. © 2012 International Society for Autism Research, Wiley Periodicals, Inc. PMID:22495912

  16. Determining Differences in Social Cognition between High-Functioning Autistic Disorder and Other Pervasive Developmental Disorders Using New Advanced "Mind-Reading" Tasks

    ERIC Educational Resources Information Center

    Kuroda, Miho; Wakabayashi, Akio; Uchiyama, Tokio; Yoshida, Yuko; Koyama, Tomonori; Kamio, Yoko

    2011-01-01

    Deficits in understanding the mental state of others ("mind-reading") have been well documented in individuals with pervasive developmental disorders (PDD). However, it is unclear whether this deficit in social cognition differs between the subgroups of PDD defined by the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text…

  17. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  18. A programmable positioning stepper-motor controller with a multibus/IEEE 796 compatible interface.

    PubMed

    Papoff, P; Ricci, D

    1984-02-01

    A programmable positioning stepper-motor controller, based on the Multibus/IEEE 796 standard interface, has been assembled by use of some intelligent and programmable integrated circuits. This controller, organized as a bus-slave unit, has been planned for local management of up to four stepper motors working simultaneously. The number of steps, the direction of rotation and the step-rate for the positioning of each motor are issued by the bus master microcomputer to the controller which handles all the required operations. Once each positioning has been performed, the controller informs the master by generating a proper bus-vectored interrupt. Displacements in up to 64,000 steps may be programmed with step-rates ranging from 0.1 to 6550 steps/sec. This device, for which only low-cost, high-performance components are required, can be successfully used in a wide range of applications and can be easily extended to control more than four stepper motors.

  19. Comparison of developmental/intellectual changes between autistic disorder and pervasive developmental disorder not otherwise specified in preschool years.

    PubMed

    Takeda, Toshinobu; Koyama, Tomonori; Kurita, Hiroshi

    2007-12-01

    This study is the first to compare the change in developmental quotient (DQ) or IQ between autistic disorder (AD) and pervasive developmental disorder not otherwise specified (PDDNOS) in preschool years. Forty-nine AD children and 77 PDDNOS children were evaluated at age 2 and at age > or =5. The AD children were significantly lower in DQ/IQ at initial evaluation and outcome evaluation (also with initial DQ being controlled for) than the PDDNOS children.

  20. Systematic Review and Meta-Analysis of Pharmacological Treatment of the Symptoms of Attention-Deficit/Hyperactivity Disorder in Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Reichow, Brian; Volkmar, Fred R.; Bloch, Michael H.

    2013-01-01

    Many children with pervasive developmental disorders (PDD) exhibit behaviors and symptoms of attention-deficit/hyperactivity disorder (ADHD). We sought to determine the relative efficacy of medications for treating ADHD symptoms in children with PDD by identifying all double-blind, randomized, placebo-controlled trials examining the efficacy of…

  1. Exploring the Boundaries of Pervasive Developmental Disorder Not Otherwise Specified: Analyses of Data from the DSM-IV Autistic Disorder Field Trial.

    ERIC Educational Resources Information Center

    Buitelaar, Jan K.; Van der Gaag, Rutger; Klin, Ami; Volkmar, Fred

    1999-01-01

    A study compared characteristics of individuals with mild retardation and clinically classified as autistic disorder (n=205), Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS) (n=80), and other non-PDD disorders (n=174). Only a few items from the ICD-10 and DSM-IV discriminated the PDDNOS group from other disorders. Suggested…

  2. A comparison between the ANSI/IEEE and the CENELEC/IEC approach to overload protection of insulated power cables

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parise, G.; Rubino, G.

    1995-12-31

    The same basic principles, on which the methods of power cables protection against overloads are based, are summed up by different criteria and formulations within ANSI/IEEE and CENELEC/IEC publications. The studies carried out by the technical committees of these organizations have been examined and compared in order to point out not only their differences but also their complementary aspects. By arranging the two approaches, it has been possible to outline a third way to determine the admissible duration of overload currents and define intermediate criteria for the emergency ratings of cables and for the coordination of protective devices.

  3. Using cluster ensemble and validation to identify subtypes of pervasive developmental disorders.

    PubMed

    Shen, Jess J; Lee, Phil-Hyoun; Holden, Jeanette J A; Shatkay, Hagit

    2007-10-11

    Pervasive Developmental Disorders (PDD) are neurodevelopmental disorders characterized by impairments in social interaction, communication and behavior. Given the diversity and varying severity of PDD, diagnostic tools attempt to identify homogeneous subtypes within PDD. Identifying subtypes can lead to targeted etiology studies and to effective type-specific intervention. Cluster analysis can suggest coherent subsets in data; however, different methods and assumptions lead to different results. Several previous studies applied clustering to PDD data, varying in number and characteristics of the produced subtypes. Most studies used a relatively small dataset (fewer than 150 subjects), and all applied only a single clustering method. Here we study a relatively large dataset (358 PDD patients), using an ensemble of three clustering methods. The results are evaluated using several validation methods, and consolidated through an integration step. Four clusters are identified, analyzed and compared to subtypes previously defined by the widely used diagnostic tool DSM-IV.

  4. Adaptive threshold control for auto-rate fallback algorithm in IEEE 802.11 multi-rate WLANs

    NASA Astrophysics Data System (ADS)

    Wu, Qilin; Lu, Yang; Zhu, Xiaolin; Ge, Fangzhen

    2012-03-01

    The IEEE 802.11 standard supports multiple rates for data transmission in the physical layer. Nowadays, to improve network performance, a rate adaptation scheme called auto-rate fallback (ARF) is widely adopted in practice. However, ARF scheme suffers performance degradation in multiple contending nodes environments. In this article, we propose a novel rate adaptation scheme called ARF with adaptive threshold control. In multiple contending nodes environment, the proposed scheme can effectively mitigate the frame collision effect on rate adaptation decision by adaptively adjusting rate-up and rate-down threshold according to the current collision level. Simulation results show that the proposed scheme can achieve significantly higher throughput than the other existing rate adaptation schemes. Furthermore, the simulation results also demonstrate that the proposed scheme can effectively respond to the varying channel condition.

  5. Computational Physics? Some perspectives and responses of the undergraduate physics community

    NASA Astrophysics Data System (ADS)

    Chonacky, Norman

    2011-03-01

    Any of the many answers possible to the evocative question ``What is ...'' will likely be heavily shaded by the experience of the respondent. This is partly due to absence of a canon of practice in this still immature, hence dynamic and exciting, method of physics. The diversity of responses is even more apparent in the area of physics education, and more disruptive because an undergraduate educational canon uniformly accepted across institutions for decades already exists. I will present evidence of this educational community's lagging response to the challenge of the current dynamic and diverse practice of computational physics in research. I will also summarize current measures that attempt respond to this lag, discuss a researched-based approach for moving beyond these early measures, and suggest how DCOMP might help. I hope this will generate criticisms and concurrences from the floor. Research support for material in this talk was from: IEEE-Computer Society; Shodor Foundation; Teragrid Project.

  6. Reliability and Diagnostic Efficiency of the Diagnostic Inventory for Disharmony (DID) in Youths with Pervasive Developmental Disorder and Multiple Complex Developmental Disorder

    ERIC Educational Resources Information Center

    Xavier, Jean; Vannetzel, Leonard; Viaux, Sylvie; Leroy, Arthur; Plaza, Monique; Tordjman, Sylvie; Mille, Christian; Bursztejn, Claude; Cohen, David; Guile, Jean-Marc

    2011-01-01

    The Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS) category is a psychopathological entity few have described and is poorly, and mainly negatively, defined by autism exclusion. In order to limit PDD-NOS heterogeneity, alternative clinical constructs have been developed. This study explored the reliability and the diagnostic…

  7. Software And Systems Engineering Risk Management

    DTIC Science & Technology

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  8. Determination of safety distance limits for a human near a cellular base station antenna, adopting the IEEE standard or ICNIRP guidelines.

    PubMed

    Cooper, Justin; Marx, Bernd; Buhl, Johannes; Hombach, Volker

    2002-09-01

    This paper investigates the minimum distance for a human body in the near field of a cellular telephone base station antenna for which there is compliance with the IEEE or ICNIRP threshold values for radio frequency electromagnetic energy absorption in the human body. First, local maximum specific absorption rates (SARs), measured and averaged over volumes equivalent to 1 and to 10 g tissue within the trunk region of a physical, liquid filled shell phantom facing and irradiated by a typical GSM 900 base station antenna, were compared to corresponding calculated SAR values. The calculation used a homogeneous Visible Human body model in front of a simulated base station antenna of the same type. Both real and simulated base station antennas operated at 935 MHz. Antenna-body distances were between 1 and 65 cm. The agreement between measurements and calculations was excellent. This gave confidence in the subsequent calculated SAR values for the heterogeneous Visible Human model, for which each tissue was assigned the currently accepted values for permittivity and conductivity at 935 MHz. Calculated SAR values within the trunk of the body were found to be about double those for the homogeneous case. When the IEEE standard and the ICNIRP guidelines are both to be complied with, the local SAR averaged over 1 g tissue was found to be the determining parameter. Emitted power values from the antenna that produced the maximum SAR value over 1 g specified in the IEEE standard at the base station are less than those needed to reach the ICNIRP threshold specified for the local SAR averaged over 10 g. For the GSM base station antenna investigated here operating at 935 MHz with 40 W emitted power, the model indicates that the human body should not be closer to the antenna than 18 cm for controlled environment exposure, or about 95 cm for uncontrolled environment exposure. These safe distance limits are for SARs averaged over 1 g tissue. The corresponding safety distance limits

  9. Pervasive antagonistic interactions among hybrid incompatibility loci

    PubMed Central

    Josway, Sarah

    2017-01-01

    Species barriers, expressed as hybrid inviability and sterility, are often due to epistatic interactions between divergent loci from two lineages. Theoretical models indicate that the strength, direction, and complexity of these genetic interactions can strongly affect the expression of interspecific reproductive isolation and the rates at which new species evolve. Nonetheless, empirical analyses have not quantified the frequency with which loci are involved in interactions affecting hybrid fitness, and whether these loci predominantly interact synergistically or antagonistically, or preferentially involve loci that have strong individual effects on hybrid fitness. We systematically examined the prevalence of interactions between pairs of short chromosomal regions from one species (Solanum habrochaites) co-introgressed into a heterospecific genetic background (Solanum lycopersicum), using lines containing pairwise combinations of 15 chromosomal segments from S. habrochaites in the background of S. lycopersicum (i.e., 95 double introgression lines). We compared the strength of hybrid incompatibility (either pollen sterility or seed sterility) expressed in each double introgression line to the expected additive effect of its two component single introgressions. We found that epistasis was common among co-introgressed regions. Interactions for hybrid dysfunction were substantially more prevalent in pollen fertility compared to seed fertility phenotypes, and were overwhelmingly antagonistic (i.e., double hybrids were less unfit than expected from additive single introgression effects). This pervasive antagonism is expected to attenuate the rate at which hybrid infertility accumulates among lineages over time (i.e., giving diminishing returns as more reproductive isolation loci accumulate), as well as decouple patterns of accumulation of sterility loci and hybrid incompatibility phenotypes. This decoupling effect might explain observed differences between pollen and

  10. A cloud computing based 12-lead ECG telemedicine service.

    PubMed

    Hsieh, Jui-Chien; Hsu, Meng-Wei

    2012-07-28

    Due to the great variability of 12-lead ECG instruments and medical specialists' interpretation skills, it remains a challenge to deliver rapid and accurate 12-lead ECG reports with senior cardiologists' decision making support in emergency telecardiology. We create a new cloud and pervasive computing based 12-lead Electrocardiography (ECG) service to realize ubiquitous 12-lead ECG tele-diagnosis. This developed service enables ECG to be transmitted and interpreted via mobile phones. That is, tele-consultation can take place while the patient is on the ambulance, between the onsite clinicians and the off-site senior cardiologists, or among hospitals. Most importantly, this developed service is convenient, efficient, and inexpensive. This cloud computing based ECG tele-consultation service expands the traditional 12-lead ECG applications onto the collaboration of clinicians at different locations or among hospitals. In short, this service can greatly improve medical service quality and efficiency, especially for patients in rural areas. This service has been evaluated and proved to be useful by cardiologists in Taiwan.

  11. NASA/IEEE MSST 2004 Twelfth NASA Goddard Conference on Mass Storage Systems and Technologies in cooperation with the Twenty-First IEEE Conference on Mass Storage Systems and Technologies

    NASA Technical Reports Server (NTRS)

    Kobler, Ben (Editor); Hariharan, P. C. (Editor)

    2004-01-01

    MSST2004, the Twelfth NASA Goddard / Twenty-first IEEE Conference on Mass Storage Systems and Technologies has as its focus long-term stewardship of globally-distributed storage. The increasing prevalence of e-anything brought about by widespread use of applications based, among others, on the World Wide Web, has contributed to rapid growth of online data holdings. A study released by the School of Information Management and Systems at the University of California, Berkeley, estimates that over 5 exabytes of data was created in 2002. Almost 99 percent of this information originally appeared on magnetic media. The theme for MSST2004 is therefore both timely and appropriate. There have been many discussions about rapid technological obsolescence, incompatible formats and inadequate attention to the permanent preservation of knowledge committed to digital storage. Tutorial sessions at MSST2004 detail some of these concerns, and steps being taken to alleviate them. Over 30 papers deal with topics as diverse as performance, file systems, and stewardship and preservation. A number of short papers, extemporaneous presentations, and works in progress will detail current and relevant research on the MSST2004 theme.

  12. Pervasive Radio Mapping of Industrial Environments Using a Virtual Reality Approach

    PubMed Central

    Nedelcu, Adrian-Valentin; Machedon-Pisu, Mihai; Talaba, Doru

    2015-01-01

    Wireless communications in industrial environments are seriously affected by reliability and performance issues, due to the multipath nature of obstacles within such environments. Special attention needs to be given to planning a wireless industrial network, so as to find the optimum spatial position for each of the nodes within the network, and especially for key nodes such as gateways or cluster heads. The aim of this paper is to present a pervasive radio mapping system which captures (senses) data regarding the radio spectrum, using low-cost wireless sensor nodes. This data is the input of radio mapping algorithms that generate electromagnetic propagation profiles. Such profiles are used for identifying obstacles within the environment and optimum propagation pathways. With the purpose of further optimizing the radio planning process, the authors propose a novel human-network interaction (HNI) paradigm that uses 3D virtual environments in order to display the radio maps in a natural, easy-to-perceive manner. The results of this approach illustrate its added value to the field of radio resource planning of industrial communication systems. PMID:26167533

  13. Pervasive Radio Mapping of Industrial Environments Using a Virtual Reality Approach.

    PubMed

    Nedelcu, Adrian-Valentin; Machedon-Pisu, Mihai; Duguleana, Mihai; Talaba, Doru

    2015-01-01

    Wireless communications in industrial environments are seriously affected by reliability and performance issues, due to the multipath nature of obstacles within such environments. Special attention needs to be given to planning a wireless industrial network, so as to find the optimum spatial position for each of the nodes within the network, and especially for key nodes such as gateways or cluster heads. The aim of this paper is to present a pervasive radio mapping system which captures (senses) data regarding the radio spectrum, using low-cost wireless sensor nodes. This data is the input of radio mapping algorithms that generate electromagnetic propagation profiles. Such profiles are used for identifying obstacles within the environment and optimum propagation pathways. With the purpose of further optimizing the radio planning process, the authors propose a novel human-network interaction (HNI) paradigm that uses 3D virtual environments in order to display the radio maps in a natural, easy-to-perceive manner. The results of this approach illustrate its added value to the field of radio resource planning of industrial communication systems.

  14. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    NASA Astrophysics Data System (ADS)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  15. A pervasive visual-haptic framework for virtual delivery training.

    PubMed

    Abate, Andrea F; Acampora, Giovanni; Loia, Vincenzo; Ricciardi, Stefano; Vasilakos, Athanasios V

    2010-03-01

    Thanks to the advances of voltage regulator (VR) technologies and haptic systems, virtual simulators are increasingly becoming a viable alternative to physical simulators in medicine and surgery, though many challenges still remain. In this study, a pervasive visual-haptic framework aimed to the training of obstetricians and midwives to vaginal delivery is described. The haptic feedback is provided by means of two hand-based haptic devices able to reproduce force-feedbacks on fingers and arms, thus enabling a much more realistic manipulation respect to stylus-based solutions. The interactive simulation is not solely driven by an approximated model of complex forces and physical constraints but, instead, is approached by a formal modeling of the whole labor and of the assistance/intervention procedures performed by means of a timed automata network and applied to a parametrical 3-D model of the anatomy, able to mimic a wide range of configurations. This novel methodology is able to represent not only the sequence of the main events associated to either a spontaneous or to an operative childbirth process, but also to help in validating the manual intervention as the actions performed by the user during the simulation are evaluated according to established medical guidelines. A discussion on the first results as well as on the challenges still unaddressed is included.

  16. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  17. Hemispheric Processing of Idioms and Irony in Adults With and Without Pervasive Developmental Disorder.

    PubMed

    Saban-Bezalel, Ronit; Mashal, Nira

    2015-11-01

    Previous studies on individuals with pervasive developmental disorders (PDD) have pointed to difficulties in comprehension of figurative language. Using the divided visual field paradigm, the present study examined hemispheric processing of idioms and irony in 23 adults with PDD and in 24 typically developing (TD) adults. The results show that adults with PDD were relatively unimpaired in understanding figurative language. While the TD group demonstrated a right hemisphere advantage in processing the non-salient meanings of idioms as well as the ironic endings of paragraphs, the PDD group processed these stimuli bilaterally. Our findings suggest that brain lateralization is atypical in adults with PDD. Successful performance along with bilateral brain activation suggests that the PDD group uses a compensation mechanism.

  18. Network Analyses Reveal Pervasive Functional Regulation Between Proteases in the Human Protease Web

    PubMed Central

    Fortelny, Nikolaus; Cox, Jennifer H.; Kappelhoff, Reinhild; Starr, Amanda E.; Lange, Philipp F.; Pavlidis, Paul; Overall, Christopher M.

    2014-01-01

    Proteolytic processing is an irreversible posttranslational modification affecting a large portion of the proteome. Protease-cleaved mediators frequently exhibit altered activity, and biological pathways are often regulated by proteolytic processing. Many of these mechanisms have not been appreciated as being protease-dependent, and the potential in unraveling a complex new dimension of biological control is increasingly recognized. Proteases are currently believed to act individually or in isolated cascades. However, conclusive but scattered biochemical evidence indicates broader regulation of proteases by protease and inhibitor interactions. Therefore, to systematically study such interactions, we assembled curated protease cleavage and inhibition data into a global, computational representation, termed the protease web. This revealed that proteases pervasively influence the activity of other proteases directly or by cleaving intermediate proteases or protease inhibitors. The protease web spans four classes of proteases and inhibitors and so links both recently and classically described protease groups and cascades, which can no longer be viewed as operating in isolation in vivo. We demonstrated that this observation, termed reachability, is robust to alterations in the data and will only increase in the future as additional data are added. We further show how subnetworks of the web are operational in 23 different tissues reflecting different phenotypes. We applied our network to develop novel insights into biologically relevant protease interactions using cell-specific proteases of the polymorphonuclear leukocyte as a system. Predictions from the protease web on the activity of matrix metalloproteinase 8 (MMP8) and neutrophil elastase being linked by an inactivating cleavage of serpinA1 by MMP8 were validated and explain perplexing Mmp8 −/− versus wild-type polymorphonuclear chemokine cleavages in vivo. Our findings supply systematically derived and

  19. Context-awareness in ubiquitous computing and the mobile devices

    NASA Astrophysics Data System (ADS)

    Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur

    2015-06-01

    Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.

  20. Pervasive Home Environments

    NASA Astrophysics Data System (ADS)

    Bull, P.; Limb, R.; Payne, R.

    An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.